Skip to main content

Showing 1–28 of 28 results for author: Ragel, R G

.
  1. An optimized Parallel Failure-less Aho-Corasick algorithm for DNA sequence matching

    Authors: Vajira Thambawita, Roshan G. Ragel, Dhammike Elkaduwe

    Abstract: The Aho-Corasick algorithm is multiple patterns searching algorithm running sequentially in various applications like network intrusion detection and bioinformatics for finding several input strings within a given large input string. The parallel version of the Aho-Corasick algorithm is called as Parallel Failure-less Aho-Corasick algorithm because it doesn't need failure links like in the origina… ▽ More

    Submitted 26 November, 2018; originally announced November 2018.

    Comments: 6 pages, 3 figures, 4 tables, 5 graphs, 2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS)

  2. To Use or Not to Use: CPUs' Cache Optimization Techniques on GPGPUs

    Authors: Vajira Thambawita, Roshan G. Ragel, Dhammike Elkaduwe

    Abstract: General Purpose Graphic Processing Unit(GPGPU) is used widely for achieving high performance or high throughput in parallel programming. This capability of GPGPUs is very famous in the new era and mostly used for scientific computing which requires more processing power than normal personal computers. Therefore, most of the programmers, researchers and industry use this new concept for their work.… ▽ More

    Submitted 9 October, 2018; originally announced October 2018.

    Comments: 6 pages, 15 Figures

    Journal ref: ICIAfS 2016- IEEE International Conference on Information and Automation for Sustainability

  3. arXiv:1511.01946  [pdf, ps, other

    cs.AR

    SecureD: A Secure Dual Core Embedded Processor

    Authors: Roshan G. Ragel, Jude A. Ambrose, Sri Parameswaran

    Abstract: Security of embedded computing systems is becoming of paramount concern as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Security attacks targeting embedded systems illegally gain access to the information in these devices or destroy information. The two most common types of attacks embedded systems encounter are code-injec… ▽ More

    Submitted 5 November, 2015; originally announced November 2015.

  4. arXiv:1412.8467  [pdf

    cs.CE cs.PF

    A Structured Hardware Software Architecture for Peptide Based Diagnosis - Sub-string Matching Problem with Limited Tolerance (ICIAfS14)

    Authors: S. M. Vidanagamachchi, S. D. Dewasurendra, R. G. Ragel, M. Niranjan

    Abstract: The problem of inferring proteins from complex peptide samples in shotgun proteomic workflow sets extreme demands on computational resources. This is exacerbated by the fact that, in general, a given protein cannot be defined by a fixed sequence of amino acids due to the existence of splice variants and isoforms of that protein. Therefore, the problem of protein inference could be considered as on… ▽ More

    Submitted 25 December, 2014; originally announced December 2014.

    Comments: appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014. arXiv admin note: substantial text overlap with arXiv:1412.7811

  5. arXiv:1412.7813  [pdf

    cs.CY

    Students Behavioural Analysis in an Online Learning Environment Using Data Mining (ICIAfS)

    Authors: I. P. Ratnapala, R. G. Ragel, S. Deegalla

    Abstract: The focus of this research was to use Educational Data Mining (EDM) techniques to conduct a quantitative analysis of students interaction with an e-learning system through instructor-led non-graded and graded courses. This exercise is useful for establishing a guideline for a series of online short courses for them. A group of 412 students' access behaviour in an e-learning system were analysed an… ▽ More

    Submitted 25 December, 2014; originally announced December 2014.

    Comments: appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  6. arXiv:1412.7811  [pdf

    cs.CE

    A Structured Hardware Software Architecture for Peptide Based Diagnosis of Baylisascaris Procyonis Infection (ICIAfS14)

    Authors: S. M. Vidanagamachchi, S. D. Dewasurendra, R. G. Ragel, M. Niranjan

    Abstract: The problem of inferring proteins from complex peptide cocktails (digestion products of biological samples) in shotgun proteomic workflow sets extreme demands on computational resources in respect of the required very high processing throughputs, rapid processing rates and reliability of results. This is exacerbated by the fact that, in general, a given protein cannot be defined by a fixed sequenc… ▽ More

    Submitted 25 December, 2014; originally announced December 2014.

    Comments: appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  7. arXiv:1412.7782  [pdf

    cs.IR cs.CL

    Plagiarism Detection on Electronic Text based Assignments using Vector Space Model (ICIAfS14)

    Authors: MAC Jiffriya, MAC Akmal Jahan, Roshan G. Ragel

    Abstract: Plagiarism is known as illegal use of others' part of work or whole work as one's own in any field such as art, poetry, literature, cinema, research and other creative forms of study. Plagiarism is one of the important issues in academic and research fields and giving more concern in academic systems. The situation is even worse with the availability of ample resources on the web. This paper focus… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  8. arXiv:1412.7692  [pdf

    cs.AR

    A Feasibility Study on Programmer Specific Instruction Set Processors (PSISPs)

    Authors: T. M. R. L. B. Abeysinghe, N. Hassan, R. G. Ragel

    Abstract: ASIPs are designed in order to execute instructions of a particular domain of applications. The designing of ASIPs addresses the major challenges faced by a system on chip such as size, cost, performance and energy consumption. The higher the number of similar instructions within the domain to be mapped the lesser the energy consumption, the smaller the size and the higher the performance of the A… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  9. arXiv:1412.7689  [pdf

    cs.CV

    Locating Tables in Scanned Documents for Reconstructing and Republishing (ICIAfS14)

    Authors: Akmal Jahan Mac, Roshan G Ragel

    Abstract: Pool of knowledge available to the mankind depends on the source of learning resources, which can vary from ancient printed documents to present electronic material. The rapid conversion of material available in traditional libraries to digital form needs a significant amount of work if we are to maintain the format and the look of the electronic documents as same as their printed counterparts. Mo… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  10. arXiv:1412.7684  [pdf

    cs.NI

    Efficient Switch Architectures for Pre-configured Backup Protection with Sharing in Elastic Optical Networks (EON)

    Authors: Suthaharan Satkunarajah, Krishanthmohan Ratnam, Roshan G. Ragel

    Abstract: In this paper, we address the problem of providing survivability in elastic optical networks (EONs). EONs use fine granular frequency slots or flexible grids, when compared to the conventional fixed grid networks and therefore utilize the frequency spectrum efficiently. For providing survivability in EONs, we consider a recently proposed survivability method for conventional fixed grid networks, k… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  11. arXiv:1412.7680  [pdf

    cs.CV

    A Fuzzy Based Model to Identify Printed Sinhala Characters (ICIAfS14)

    Authors: G. I. Gunarathna, M. A. P. Chamikara, R. G. Ragel

    Abstract: Character recognition techniques for printed documents are widely used for English language. However, the systems that are implemented to recognize Asian languages struggle to increase the accuracy of recognition. Among other Asian languages (such as Arabic, Tamil, Chinese), Sinhala characters are unique, mainly because they are round in shape. This unique feature makes it a challenge to extend th… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  12. arXiv:1412.7677  [pdf

    cs.HC

    LineCAPTCHA Mobile: A User Friendly Replacement for Unfriendly Reverse Turing Tests for Mobile Devices (ICIAfS14)

    Authors: C. B Bulumulla, R. G. Ragel

    Abstract: As smart phones and tablets are becoming ubiquitous and taking over as the primary choice for accessing the Internet worldwide, ensuring a secure gateway to the servers serving such devices become essential. CAPTCHAs play an important role in identifying human users in internet to prevent unauthorized bot attacks. Even though there are numerous CAPTCHA alternatives available today, there are certa… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  13. arXiv:1412.7664  [pdf

    cs.PL

    Register Spilling for Specific Application Domains in Application Specific Instruction-set Processors

    Authors: M. G. G. C. R. Salgado, R. G. Ragel

    Abstract: An Application Specific Instruction set Processor (ASIP) is an important component in designing embedded systems. One of the problems in designing an instruction set for such processors is determining the number of registers is needed in the processor that will optimize the computational time and the cost. The performance of a processor may fall short due to register spilling, which is caused by t… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  14. Heterogeneous processor pipeline for a product cipher application

    Authors: I. B. Nawinne, M. S. Wickramasinghe, R. G. Ragel, S. Radhakrishnan

    Abstract: Processing data received as a stream is a task commonly performed by modern embedded devices, in a wide range of applications such as multimedia (encoding/decoding/ playing media), networking (switching and routing), digital security, scientific data processing, etc. Such processing normally tends to be calculation intensive and therefore requiring significant processing power. Therefore, hardware… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2011 6th IEEE International Conference on, 16-19 Aug 2011, pp. 32 - 37, Kandy

  15. Tile optimization for area in FPGA based hardware acceleration of peptide identification

    Authors: S. M. Vidanagamachchi, S. D. Dewasurendra, R. G. Ragel, M. Niranjan

    Abstract: Advances in life sciences over the last few decades have lead to the generation of a huge amount of biological data. Computing research has become a vital part in driving biological discovery where analysis and categorization of biological data are involved. String matching algorithms can be applied for protein/gene sequence matching and with the phenomenal increase in the size of string databases… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2011 6th IEEE International Conference on, 16-19 Aug. 2011, pp. 140 - 145, Kandy

  16. Improving the throughput of the AES algorithm with multicore processors

    Authors: A. Barnes, R. Fernando, K. Mettananda, R. G. Ragel

    Abstract: AES, Advanced Encryption Standard, can be considered the most widely used modern symmetric key encryption standard. To encrypt/decrypt a file using the AES algorithm, the file must undergo a set of complex computational steps. Therefore a software implementation of AES algorithm would be slow and consume large amount of time to complete. The immense increase of both stored and transferred data in… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2012 7th IEEE International Conference on, 6-9 Aug. 2012, Chennai

  17. Accelerating string matching for bio-computing applications on multi-core CPUs

    Authors: D. Herath, C. Lakmali, R. G. Ragel

    Abstract: Huge amount of data in the form of strings are being handled in bio-computing applications and searching algorithms are quite frequently used in them. Many methods utilizing on both software and hardware are being proposed to accelerate processing of such data. The typical hardware-based acceleration techniques either require special hardware such as general purpose graphics processing units (GPGP… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2012 7th IEEE International Conference on, 6-9 Aug. 2012, pp. 1-6, Chennai

  18. Constant time encryption as a countermeasure against remote cache timing attacks

    Authors: D. Jayasinghe, R. G. Ragel, D. Elkaduwe

    Abstract: Rijndael was standardized in 2001 by National Institute of Standard and Technology as the Advanced Encryption Standard (AES). AES is still being used to encrypt financial, military and even government confidential data. In 2005, Bernstein illustrated a remote cache timing attack on AES using the client-server architecture and therefore proved a side channel in its software implementation. Over the… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Information and Automation for Sustainability (ICIAfS), 2012 IEEE 6th International Conference on, 27-29 Sept 2012, pp 129-134, Beijing

  19. Instruction-set Selection for Multi-application based ASIP Design: An Instruction-level Study

    Authors: R. G. Ragel, Swarnalatha Radhakrishnan, Angelo Ambrose

    Abstract: Efficiency in embedded systems is paramount to achieve high performance while consuming less area and power. Processors in embedded systems have to be designed carefully to achieve such design constraints. Application Specific Instruction set Processors (ASIPs) exploit the nature of applications to design an optimal instruction set. Despite being not general to execute any application, ASIPs are h… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Information and Automation for Sustainability (ICIAfS), 2012 IEEE 6th International Conference on, 27-29 Sept 2012, pp 141-146, Beijing

  20. Software implementation level countermeasures against the cache timing attack on advanced encryption standard

    Authors: U. Herath, J. Alawatugoda, R. G. Ragel

    Abstract: Advanced Encryption Standard (AES) is a symmetric key encryption algorithm which is extensively used in secure electronic data transmission. When introduced, although it was tested and declared as secure, in 2005, a researcher named Bernstein claimed that it is vulnerable to side channel attacks. The cache-based timing attack is the type of side channel attack demonstrated by Bernstein, which uses… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 75-80, 17-20 Dec. 2013

  21. Hardware accelerated protein inference framework

    Authors: S. M. Vidanagamachchi, S. D. Dewasurendra, R. G. Ragel

    Abstract: Protein inference plays a vital role in the proteomics study. Two major approaches could be used to handle the problem of protein inference; top-down and bottom-up. This paper presents a framework for protein inference, which uses hardware accelerated protein inference framework for handling the most important step in a bottom-up approach, viz. peptide identification during the assembling process.… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 649-653, 17-20 Dec. 2013

  22. Hardware software co-design of the Aho-Corasick algorithm: Scalable for protein identification?

    Authors: S. M. Vidanagamachchi, S. D. Dewasurendra, R. G. Ragel

    Abstract: Pattern matching is commonly required in many application areas and bioinformatics is a major area of interest that requires both exact and approximate pattern matching. Much work has been done in this area, yet there is still a significant space for improvement in efficiency, flexibility, and throughput. This paper presents a hardware software co-design of Aho-Corasick algorithm in Nios II soft-p… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 321-325, 17-20 Dec. 2013

  23. Authorship detection of SMS messages using unigrams

    Authors: R. G. Ragel, P. Herath, U. Senanayake

    Abstract: SMS messaging is a popular media of communication. Because of its popularity and privacy, it could be used for many illegal purposes. Additionally, since they are part of the day to day life, SMSes can be used as evidence for many legal disputes. Since a cellular phone might be accessible to people close to the owner, it is important to establish the fact that the sender of the message is indeed t… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 387-392 , 17-20 Dec. 2013

  24. Accelerating motif finding in DNA sequences with multicore CPUs

    Authors: P. Perera, R. G. Ragel

    Abstract: Motif discovery in DNA sequences is a challenging task in molecular biology. In computational motif discovery, Planted (l, d) motif finding is a widely studied problem and numerous algorithms are available to solve it. Both hardware and software accelerators have been introduced to accelerate the motif finding algorithms. However, the use of hardware accelerators such as FPGAs needs hardware speci… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 242-247, 17-20 Dec. 2013

  25. AntiPlag: Plagiarism Detection on Electronic Submissions of Text Based Assignments

    Authors: M. A. C. Jiffriya, M. A. C. Akmal Jahan, R. G. Ragel, S. Deegalla

    Abstract: Plagiarism is one of the growing issues in academia and is always a concern in Universities and other academic institutions. The situation is becoming even worse with the availability of ample resources on the web. This paper focuses on creating an effective and fast tool for plagiarism detection for text based electronic assignments. Our plagiarism detection tool named AntiPlag is developed using… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 376 - 380, 17-20 Dec. 2013

  26. String Matching with Multicore CPUs: Performing Better with the Aho-Corasick Algorithm

    Authors: S. Arudchutha, T. Nishanthy, R. G. Ragel

    Abstract: Multiple string matching is known as locating all the occurrences of a given number of patterns in an arbitrary string. It is used in bio-computing applications where the algorithms are commonly used for retrieval of information such as sequence analysis and gene/protein identification. Extremely large amount of data in the form of strings has to be processed in such bio-computing applications. Th… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: 8th IEEE International Conference on Industrial and Information Systems (ICIIS), 2013, pp. 231-236, 17-20 Dec. 2013

  27. User Friendly Line CAPTCHAs

    Authors: A. K. B. Karunathilake, B. M. D. Balasuriya, R. G. Ragel

    Abstract: CAPTCHAs or reverse Turing tests are real-time assessments used by programs (or computers) to tell humans and machines apart. This is achieved by assigning and assessing hard AI problems that could only be solved easily by human but not by machines. Applications of such assessments range from stopping spammers from automatically filling online forms to preventing hackers from performing dictionary… ▽ More

    Submitted 4 February, 2014; originally announced February 2014.

    Comments: 6 pages

    Journal ref: Industrial and Information Systems (ICIIS), 2009 International Conference on , pp.210,215, 28-31 Dec. 2009

  28. Axis2UNO: Web Services Enabled Openoffice.org

    Authors: B. A. N. M. Bambarasinghe, H. M. S. Huruggamuwa, R. G. Ragel, S. Radhakrishnan

    Abstract: Openoffice.org is a popular, free and open source office product. This product is used by millions of people and developed, maintained and extended by thousands of developers worldwide. Playing a dominant role in the web, web services technology is serving millions of people every day. Axis2 is one of the most popular, free and open source web service engines. The framework presented in this paper… ▽ More

    Submitted 4 February, 2014; originally announced February 2014.

    Comments: 6 pages, 4th International Conference on Information and Automation for Sustainability, 2008. ICIAFS 2008

    Journal ref: ICIAFS 2008. 437-442, 12-14 Dec. 2008