Ajantha Herath

Learn More
During the last few decades, the requirments of the international market imposed by economic forces have led to the necessity to develop effective and efficent electronic natural language processing tools. Many Machine Translation (MT) systems are being developed world wide, especially in Japan and Europe to address this chalanges in the 21 century. The(More)
-Resolving ambiguity requires little conscious effort in human communications. To make decisions about the intended sense of a word we use our broad understanding of the language and the real-world knowledge. Disambiguation in translations is the selection of the intended sense from a known finite set of possible meanings of an ambiguous word. This choice(More)
High level programming languages use system defined data types and the user defined data types in computations. We have developed a project-based CS/IS-1 course to substitute the traditional lecture based classroom to help students design and use at least two user defined data types in their computations to solve real world problems. Abstract data types and(More)
This paper describes a task based active learning module developed with projects to help students understand secure protocols, algorithms and modeling web applications to prevent attacks. We have been developing and continuously improving cyber security courses with methods for introducing important concepts for computing majors for more than a decade.(More)
E-collaboration goes beyond ordinary buying and selling activities. It includes information sharing and integration, decision-making, as well as process and resource allocation among people and organizations via the Internet, e-mail, web, video, and wireless devices to achieve optimal productivity and high performance. It promotes international commerce,(More)
Providing security and assurance to information systems and communications is one of the highest national priorities. It is our task to prepare computer information system security professionals with current security and assurance information to achieve this objective. To meet this urgent need, the faculty must have the knowledge and skills to be taught in(More)
Most computer science, information systems and engineering programs have two or more computer architecture courses but lack suitable active learning and design experience in the classroom. Computer architecture at the intermediate level should focus on the implementation of basic programming constructs in different instruction set architectures. To(More)
Often students have difficulties mastering cryptographic algorithms. For some time we have been developing with methods for introducing important security concepts for both undergraduate and graduate students in Information Systems, Computer Science and Engineering students. To achieve this goal, Sequence diagrams and spatial circuit derivation from(More)
During the last two decades postal mail became e-mail, cash transactions became cashless, libraries became digital libraries, learning became e-learning, banking became online banking, news, TV and games became online entertainment. As soon as a computer starts to share the resources available on the web or local network, it immediately becomes vulnerable(More)
Most computer science and engineering programs have two or more required computer architecture courses but lack suitable interfacing laboratory experience for other upper-level classes. Information assurance and network security tracks have been developed over the recent years without providing necessary and sufficient background knowledge in logic,(More)