Ajantha Herath

Learn More
Most computer science, information systems and engineering programs have two or more computer architecture courses but lack suitable active learning and design experience in the classroom. Computer architecture at the intermediate level should focus on the implementation of basic programming constructs in different instruction set architectures. To(More)
Most computer science and engineering programs have two or more required computer architecture courses but lack suitable interfacing laboratory experience for other upper-level classes. Information assurance and network security tracks have been developed over the recent years without providing necessary and sufficient background knowledge in logic,(More)
During the last few decades, the requirments of the international market imposed by economic forces have led to the necessity to develop effective and efficent electronic natural language processing tools. Many Machine Translation (MT) systems are being developed world wide, especially in Japan and Europe to address this chalanges in the 21 century. The(More)
—High level programming languages use system defined data types and the user defined data types in computations. We have developed a project-based CS/IS-1 course to substitute the traditional lecture based classroom to help students design and use at least two user defined data types in their computations to solve real world problems. Abstract data types(More)
During the last two decades postal mail became e-mail, cash transactions became cashless, libraries became digital libraries, learning became e-learning, banking became online banking, news, TV and games became online entertainment. As soon as a computer starts to share the resources available on the web or local network, it immediately becomes vulnerable(More)
Providing security and assurance to information systems and communications is one of the highest national priorities. It is our task to prepare computer information system security professionals with current security and assurance information to achieve this objective. To meet this urgent need, the faculty must have the knowledge and skills to be taught in(More)
— Often students have difficulties mastering cryptographic algorithms. For some time we have been developing with methods for introducing important security concepts for both undergraduate and graduate students in Information Systems, Computer Science and Engineering students. To achieve this goal, Sequence diagrams and spatial circuit derivation from(More)
This paper describes a task based active learning module developed with projects to help students understand secure protocols, algorithms and modeling web applications to prevent attacks. We have been developing and continuously improving cyber security courses with methods for introducing important concepts for computing majors for more than a decade.(More)
E-collaboration goes beyond ordinary buying and selling activities. It includes information sharing and integration, decision-making, as well as process and resource allocation among people and organizations via the Internet, e-mail, web, video, and wireless devices to achieve optimal productivity and high performance. It promotes international commerce,(More)