Search results for: K. Y. Abeywardena
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4

Search results for: K. Y. Abeywardena

4 A Bio-Inspired Approach to Produce Wettable Nylon Fabrics

Authors: Sujani B. Y. Abeywardena, Srimala Perera, K. M. Nalin De Silva, S. Walpalage

Abstract:

Surface modifications are vital to accomplish the moisture management property in highly demanded synthetic fabrics. Biomimetic and bio-inspired surface modifications are identified as one of the fascinating areas of research. In this study, nature’s way of cooling elephants’ body temperature using mud bathing was mimicked to create a superior wettable nylon fabric with improved comfortability. For that, bentonite nanoclay was covalently grafted on nylon fabric using silane as a coupling agent. Fourier transform infrared spectra and Scanning electron microscopy images confirmed the successful grafting of nanoclay on nylon. The superior wettability of surface modified nylon was proved by standard protocols. This fabric coating strongly withstands more than 50 cycles of laundry. It is expected that this bio-inspired wettable nylon fabric may break the barrier of using nylon in various hydrophilic textile applications.

Keywords: bentonite nanoclay, biomimetic, covalent modification, nylon fabric, surface, wettability

Procedia PDF Downloads 199
3 Detecting Cyberbullying, Spam and Bot Behavior and Fake News in Social Media Accounts Using Machine Learning

Authors: M. D. D. Chathurangi, M. G. K. Nayanathara, K. M. H. M. M. Gunapala, G. M. R. G. Dayananda, Kavinga Yapa Abeywardena, Deemantha Siriwardana

Abstract:

Due to the growing popularity of social media platforms at present, there are various concerns, mostly cyberbullying, spam, bot accounts, and the spread of incorrect information. To develop a risk score calculation system as a thorough method for deciphering and exposing unethical social media profiles, this research explores the most suitable algorithms to our best knowledge in detecting the mentioned concerns. Various multiple models, such as Naïve Bayes, CNN, KNN, Stochastic Gradient Descent, Gradient Boosting Classifier, etc., were examined, and the best results were taken into the development of the risk score system. For cyberbullying, the Logistic Regression algorithm achieved an accuracy of 84.9%, while the spam-detecting MLP model gained 98.02% accuracy. The bot accounts identifying the Random Forest algorithm obtained 91.06% accuracy, and 84% accuracy was acquired for fake news detection using SVM.

Keywords: cyberbullying, spam behavior, bot accounts, fake news, machine learning

Procedia PDF Downloads 35
2 Water Immersion Recovery for Swimmers in Hot Environments

Authors: Thanura Randula Abeywardena

Abstract:

This study recognized the effectiveness of cold-water immersion recovery post exhaustive short-term exercise. The purpose of this study was to understand if 16- 20°C of cold-water immersion would be beneficial in a tropical environment to achieve optimal recovery in sprint swim performance in comparison to 10-15°C of water immersion. Two 100m-sprint swim performance times were measured along with blood lactate (BLa), heart rate (HR) and rate of perceived exertion (RPE) in a 25m swimming pool with full body head out horizontal water immersions of 10-15°C, 16-20°C and 29-32°C (pool temperature) for 10 minutes followed by 5 minutes of seated passive rest outside; in between the two swim performances. Twelve well-trained adult swimmers (5 male and 5 female) within the top twenty in the Sri Lankan national swimming championships in 100m Butterfly and Freestyle in the years 2020 & 2021 volunteered for this study. One-way ANOVA analysis (p<0.05) suggested performance time, Bla and HR had no significant differences between the 3 conditions after the second sprint; however, RPE was significantly different with p=0.034 between 10-15°C and 16-20°C immersion conditions. The study suggested that the recovery post the two cold-water immersion conditions were similar in terms of performance and physiological factors; however, the 16-20°C temperature had a better “feel good” factor post sprint 2. Further study is recommended as there was participant bias with the swimmers not reaching optimal levels in sprint 1. Therefore, they might have possibly fully recovered before sprint 2, invalidating the physiological effect of recovery.

Keywords: hydrotherapy, blood lactate, fatigue, recovery, sprint-performance, sprint-swimming

Procedia PDF Downloads 99
1 R-Killer: An Email-Based Ransomware Protection Tool

Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena

Abstract:

Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.

Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine

Procedia PDF Downloads 209