Browsing by Author "Munasinghe, M.A.K.S."
Now showing 1 - 10 of 10
- Results Per Page
- Sort Options
Item An Analysis on Trends in Using Pali Thripitaka as an Electronic Source(University of Kelaniya, 2015) Munasinghe, M.A.K.S.Research question of this study is to identify whether Pali Thripitaka has been prepared formally for using as an electronic source. Objective of this study is to identify the obstacles encountered in using Thripitaka as an electronic source. A formal survey was carried out to implement a suitable method as a solution for the issues. The study was carried out with primary and secondary data. As the online survey does not support to identify the user related issues, interviews were conducted for collecting data during the research. Sthirawadaya or Therawadaya, one of the branches of Buddhism is based on the teachings of Thripitaka. The Pali term Pitaka defines the basket or the container. There are three Thripitaka in Lord Buddha’s teaching and it is known as Thripitaka. Dharmaya and Vinaya were divided into Thripitaka during the first Dharma Sangayana. Thripitaka was transmitted for generation to generation through the process memorizing by the Rahath Thero. For the first time in 80 AC during the reign of King Walagambahu, the Thripitaka was written in books at Aluwiharaya Temple, Mathale. When Thripitaka become an electronic source via internet, there were advantages such as user friendliness and cost effectiveness. This electronic version of Thripitaka was much supportive for opening Buddhist philosophy to the world. Thus, there are various issues and obstacles encountered by the users in referring Thripitaka as an electronic source. It was identified during the research that the E-book method should be used instead of PDF version in both internal and external programs. Few selected sections of Thripitaka were referred as a case study during the study in order to introduce the Thripitaka as an E-book that can be read page by page with accurate pronunciation, with automatic page system. Attention is focused onto create internet extensions for searching more details. Several software applications were used in creating this E-book. User friendliness and creating interesting in readers are the other expected objectives of this research.Item An exploratory overview on Library Professionals’ Training Series (LPTS) of library, University of Kelaniya.(Felicitation Volume - Mr. N.T.S.A. Senadeera. Manuscript submitted for publication. Library, University of Peradeniya, Sri Lanka, 2020) Munasinghe, M.A.K.S.; Warnasooriya, ThrishalaComputer literacy is essential for library staff to provide a high quality, timely responsive, cost effective library services to its users in a techno-savvy library environment in this digital era. Specially computer literacy is a key requirement for non-academic staff to operate the library technical services. Most of the libraries across the world have taken actions to develop various staff development programmes. Those can be varied based on the type of the library and its users, capacity of the staff, attitude, technology, budget, mother institution, rules and regulations, and country. Therefore, developing a unique Computer literacy enhancement programme for a certain library is ideal. ‘Library Professionals’ Training Series (LPTS) containing 3 levels was developed by Interactive Media Unit (IMU) to enhance the computer literacy of the staff. As level I could be successfully completed, a progress of the staff was noticed. Therefore, this paper presents an exploratory overview on this programme by setting an example for other libraries in Sri Lanka.Item Implementing a Web Content Management Framework for University of Kelaniya based on Webometric Assessment(3rd International Conference on Library and Information Management, Department of Library and Information Science, Faculty of Social Sciences, University of Kelaniya, Sri Lanka, 2019) Munasinghe, M.A.K.S.With the increase of web technologies in the 21st century, a world trend was created to analyze the online performance of universities across the world. On the other hand, it was considered as one of criteria in university ranking system either. In most of the cases, the online performance of a university is calculated based on the number of Google searches available under the search term of a particular university name. However, it cannot be taken as a reliable criterion to check the online performances as universities are the knowledge hubs from which new research and publications should emerge for the betterment of the world community. Although most of Sri Lankan universities use CMS for web development, designing a more accurate and reliable frame work based on WIF to change the existing web policy in University of Kelaniya was the main purpose of the research. The analysis of collected data from 310 people in the university declare that the awareness on web metrics ranking system was not in a satisfactory level, the attention on the developing backlinks is not a great concern, the cited amount of research and publications in web metrics is low in the university. Hence, an effective linkage should immediately be created between the academics and web metrics team, to increase the WIF in order to uplift the position of the university rankingsItem Innovative User Experience in E-Learning Management System for Department Academic Purpose .(Department of Library and Information Science, Faculty of Social Sciences, University of Kelaniya,Sri Lanka., 2017) Munasinghe, M.A.K.S.The way in which edifiers perceive the Moodle platform, the paramountcy they confer on it, the sodalities they make in cognation to the transmutations that are going on in higher edification, their desiderata and prospects, gratification, the attribution of consequential relationships between the cull of resources and activities made available by the platform and the evolution of these practices over time, some issues that intend to explore in the study presented here. The fact that some researchers accentuate that higher edification is subject to external and internal influence in integrating information and communication technologies through Learning Management Environments, as well as the conviction that the potential of the platforms is underused, has incremented our interest in verifying what is transpiring in the edifying institution in which edify. The present article intends to present the study that is being developed by us, starting with the framework, explication of the study object and objectives, the contributions hope to give, the procedures, the methodology and the steps to be taken until the final project guide line. Alongside the innovation based techniques, new instructive advances are in effect increasingly and more utilized. These days Web based learning (WBL) educating depends on an expansive wide range of educating techniques. Department E-Learning Management System administration framework finds ideal methods for learning and ideal learning comes about. DELMS framework plays an essential part as far as measuring understudy's learning aptitudes what's more, disciplinary practices. DELMS log records help the educators to preprocess the information, anticipate learning systems and outline the site structure as indicated by student's enthusiasm by applying mining procedures... Utilizing this DELMS framework understudies accentuate this strategy and makes the learning forms less demanding and all the more intriguing. Learning Management systems are getting to be far reaching innovation embraced at instructive frameworks. Moodle framework is utilized to record the client involvement in e-learning condition. In Moodle framework, the client encounter is recorded and should be examined and examined to give the ideal answer for meet academic prerequisites of the two understudies and instructors in all territories. Findings in this research Department E-Learning frameworks can offer an expansive assortment of workspaces to smooth the advance of data sharing and correspondence among members in e-learning courses.This examination assesses an open source Moodle learning administration framework to enable academicians to make powerful on the web learning groups utilizing information mining procedures. Finally, the model is founded to ameliorate utilizing functions in the Moodle, and the model authentically solved the quandary of this research fully interconnected relation with lecturers and students that will be coming into academic purpose soon, the first stages towards embracing this technology will be in implementing appropriate to develop e-learning experience.Item Internet of Things Security (IoT sec) Challenges, Current Status, Trends and Architecture.(Department of Library and Information Science, Faculty of Social Sciences, University of Kelaniya,Sri Lanka., 2017) Munasinghe, M.A.K.S.; Botheju, D.; Silva, L.; Sandaru, T.This paper presents a survey on the challenges, current status, trends and the architecture of Internet of Things (IoT) Security. Security is a major part in the Information era and IoTnow plays a very important role in the information era as well. Internet of Things consists of different layers and different security principles that will be and can be implemented at different layers of IoT to maintain a secure and a standardized behavior. IoT Security challenges, current status, trends and architecture will be analyzed thoroughly to have a better understanding ofthe importance of Security on IoT and the implementation of IoT Security. With the recent trends in technology and advancements, all devices around us used in our day to day activities, are somehow being connected with technology. Technologies such as cloud computing and improved broadband connections are a key contributor to this. Since more “things” are being connected to internet all around the world, the security factor too should be analyzed, as by the growing trend of IOT in the future with more devices being used, security will be a vital part of these devices and their users. With the advancement of technology, security vulnerabilities all over the world too increase and these must be handled. From accessories we wear, things we use, work we do, mobiles and other devices we use, and up to cars we drive, everything is being made smart. The big era of smart computers is evolving very rapidly, drives getting smaller and smaller, and from wired to wireless. However, even though these devices have evolved, are we certain that the security of these have also evolved,and in comparison, when will we feel safe to use them without any exposure to threats and risks. IoT is a great space where these devices that we use are still in their wired old-fashioned state. With the growth of IoT devices and their possible uses in the real world, we need to look at challenges to IoT and its security concerns that have been and not yet been addressed as yet. From viruses and malware to denial of service attacks and cyber warfare, security concerns have advanced in their aspect of technology with time, and this has become a hot topic in the industry as well as a major concern. The risks and their direct and indirect threats can cause many companies to panic and endanger their valuable data.With the growing use of IoT devices in workplaces and private homes, attached to high processing speed, sensitive, high capacity sensors and actuators, security solutions available in today's industry must be applied to these devices. Also, concurrently more IoT devices and appropriate security protocols will be researched into and analyzed. As we can see a fully interconnected network with IoT devices that will be coming into our society in the near future, the first stages towards embracing this technology will be in implementing appropriate security models.Item Library service enhancement for differently abled undergraduates at University of Kelaniya, Sri Lanka: A review of project(University of Jaffna, 2022) Warnasooriya, Thrishala; Munasinghe, M.A.K.S.The library, University of Kelaniya, has given special attention to ensuring the equal provision of facilities for differently abled undergraduates. Accordingly, a service enhancement project was initiated to encourage them to visit the library, access the physical collection and gain a first-hand experience. Accordingly, audio-visual cubicles were established to encourage the library usage of differently abled under- graduates. The users were facilitated with a braille book collection, together with a management system, CD and cassette collection, and on-demand reading service, which consisted of 568 items, both lending and reference materials. The collections were searched from the access points of author, title, ISBN, and subject headings. Further, a bilingual searching facility was enabled. CD and cassettes can be played at the given cubicles during library opening hours. A trained library staff member was available for on-demand reading service. The printed books were issued from the lending or reference section. Further, e-resources were read for the users’ requests. In the project’s next phase, the selected recommended readings authored by the University Academics will be converted into a braille document. The project enabled the library to play the role of facilitator to provide equal provision for all users.Item A Scrutiny on Trends in Study Tipitaka as an Electronic and Mobile Sources(Faculty of Computing and Technology, University of Kelaniya, Sri Lanka., 2017) Munasinghe, M.A.K.S.During the reign of King Walagambahu, the Tipitaka which contains lord Buddha’s philosophical doctrines was transcribed to text for the first time in 80 AC at Aluwihare cave temple, Matale, Sri Lanka, for the preservation and use of future generations. Recently, Tipitaka is available as an electronic source via the internet which includes advantages such as user friendliness, cost effectiveness and good accessibility as well as carrying Buddhist philosophy to the whole world. However, there are various issues encountered by the users in referring the current electronic versions of Tipitaka. These were identified during the current research and it was apparent that an e-book would be more suitable than the conventional PDF format. Main focus of this study was to identify the possibilities of developing a user-friendly electronic interface for Tipitaka. In this study, few selected sections of Tipitaka were used to develop a multifunctional e-book that can be read efficiently with accurate pronunciation, with automatic page system as well as possibilities to use internet extensions which enable user-friendly searching facilities. In this work, an efficient Graphical User Interface (GUI) was designed that loads only the thumbnail of the target page, saving time without loading any pdf material. Conventionally in pdf based e-books, when a user demands for a specific word / phrase search, the result is shown scrolling through the whole pdf document. When referring the Tipitaka a summarized result of the searching content is expected to be more useful, rather than directly displaying each and every page. Considering this need, an efficient searching facility was designed in this work, using Optical Character Recognition (OCR) to display a summarized list as the primary result. Since the keywords are already indexed at the editorial stage, the searching function quickly generates the primary result where the user is allowed to choose the exact target page efficiently from that summarized list. This application was developed in Java Programming Language by using the Android Studios Integrated Development Environment (IDE). Android Software Development Kit (SDK) was used to develop the mobile application, embedding a variety of customized tools, on the Android platform. Especially, Android Emulator and the Android Development Tools (ADT) plug-in for Android Studios were very useful in this implementation. Among the growing number of Android based mobile applications available on this area, this Tipitaka application is also expected to stimulate the interest of many researchers, encouraging unique prototype mobile applications aligned with their research works.Item A Study on a Practical Approach to Enhance Computer Literacy of the Non-Academic Library Staff, University of Kelaniya(International Postgraduate Research Conference 2019, Faculty of Graduate Studies, University of Kelaniya, Sri Lanka, 2019) Munasinghe, M.A.K.S.; Warnasooriya, W.W.S.T.A qualified and well – trained library staff is a major factor facilitating effective library services. As a result of the rapid growth of the computer and technology, the role of the library profession, functions and its image were eventually changed. At present, the majority of non-academic staff attached to the library, university of Kelaniya are digital immigrants who have to fulfill the library requirements of the digital natives. This seems to be rather a challenge in enhancing the quality of the library services in this digital era. On the other hand, as the mission of the library states, the library functions as a ‘learning support service center’ providing a coordinated range of high quality, timely responsive, cost effective library services to its users. To fulfill that task, higher computer literacy of the library staff should be taken into account. Hence, the main objective of the study was to enhance the computer literacy of the staff while evaluating computer literacy of them was the interlinked objective. For this survey, the entire non-academic library staff (i.e. 62) was selected as the sample of the study to gather data through an online questionnaire which basically consisted of computer fundamentals and the use of computer technology in the library environment. Accordingly, the majority (i.e. 36%) of the staff was in a very satisfactory level; 22% - not satisfactory; 18% - satisfactory; 5% - excellent and 19% was absent. The enhancement of computer literacy among library staff is excepted as one main task of the Interactive Media Unit of the library. Therefore, it was decided and permitted to commence a series of workshop named ‘Library Professionals’ Training Series (LPTS) -Part I, II and III’. Accordingly, the entire staff was grouped into 3 sects based on the above evaluation and the program has already been started with a new syllabus and new teaching aids. The practical sessions were the most impressive parts in every program in which their awareness and knowledge on modern technology, technical devices, modern library trends, internet, web and related technologies could be expanded. The duration of each LPTS program is 3 months (6 hours per week). The termination of each program will be marked with issuing certificates.Item Virtualization Appliances for Library and Information Management Studies(Department of Library and Information Science, Faculty of Social Sciences, University of Kelaniya, Sri Lanka, 2016) Munasinghe, M.A.K.S.; Sumangala Thero, P.Virtualization provides means to create several virtual computers on one physical computer, therefore number of physical computers can be reduced radically .Students can connect to virtual computers using remote connection .With virtualization teachers can utilize new technologies such as the newest operating systems in teaching, even if those are not used in physical computers .One of the advantages of this method is to provide totally isolated and unrestricted learning environment for students, who will gain the administrative rights for the virtualized operating system. That use to learning those library and information science methods .Therefore, installation and configuration library management system like KOHA or GREENSTONE etc.A hypothesis of this study is to explore if the use of virtualization in learning environment is more effective than traditional teaching method .The base of library and information science education environment is individual learning styles and experiential learning. Rapid advances in information technology have provided new learning methods and environments .This has been the case for the teaching of librarianship and Information centers .Library and information Students pointed out deficiencies and inadequacies in ICT resources and facilities, and suggested upgrading software and hardware .They appeared to be satisfied with the ICT skills being targeted by visualization environment .They also appeared to be satisfied with the ICT instructors. Librarians and information management officers need special knowledge and skills including techniques of using software and hardware, selection and assessment of resources, use of information systems, ability to search networks and databases, as well as problem-solving and research skills and the ability to teach users . The study pointed out a need for collaboration with professional forums for continuing education programs and the need for revisions in curricula to introduce more focused courses that meet the needs of the ever-changing market requirements and give the students access to professional.Item Virtualization Security for information Centers(Research Centre for Social Sciences, Faculty of Social Sciences, University of Kelaniya, Sri Lanka, 2016) Munasinghe, M.A.K.S.; Pathirana, T.The use of virtualization technologies comes with many benefits such as agility, flexibility and cost efficiency. Virtualization and its unique architecture have many characteristics and advantages over traditional non-virtualized machines. The virtualization security system excels the traditional normal security. Each users of information centers cannot be provided each physical computers due to some unavoidable reasons and causes. Therefore, a number of individuals have been facing considerable problems and difficulties such as inability of using physical computers, attaching of wrong and unrecognized information to information gateways. The technology is in the process of developing for applications while VMs and checkpoint firewall is in the for front all server loads run and security respectively. This paper attempts to identify the differences, issues, challenges, risks, etc. caused by traditional non-virtualized machines and to illustrate the other side of this. Virtualization security for information Centers have already utilized many of the solution concepts into their products to combat the vulnerabilities that are present. Security in a virtualized information center can also be more fully automated. As a Result of this Administrator is helped to protect the information security policies of the information centers. The purpose of this abstract is to provide a good starting point for spreading better information security behaviors. Hear, I intent to mention the utility of the information adding day by day for the interaction between distribution and management of security architecture. Therefore, users can have a direct access for reliable information they want. Therefore, this research can be considered as a practical solution for the problem of physical technology from the virtualization security options.