Skip to main content

Showing 1–38 of 38 results for author: Ragel, R

.
  1. arXiv:2401.13785  [pdf, other

    cs.CV

    Unified Spatio-Temporal Tri-Perspective View Representation for 3D Semantic Occupancy Prediction

    Authors: Sathira Silva, Savindu Bhashitha Wannigama, Gihan Jayatilaka, Muhammad Haris Khan, Roshan Ragel

    Abstract: Holistic understanding and reasoning in 3D scenes play a vital role in the success of autonomous driving systems. The evolution of 3D semantic occupancy prediction as a pretraining task for autonomous driving and robotic downstream tasks capture finer 3D details compared to methods like 3D detection. Existing approaches predominantly focus on spatial cues such as tri-perspective view embeddings (T… ▽ More

    Submitted 4 April, 2024; v1 submitted 24 January, 2024; originally announced January 2024.

  2. An Optical physics inspired CNN approach for intrinsic image decomposition

    Authors: Harshana Weligampola, Gihan Jayatilaka, Suren Sritharan, Parakrama Ekanayake, Roshan Ragel, Vijitha Herath, Roshan Godaliyadda

    Abstract: Intrinsic Image Decomposition is an open problem of generating the constituents of an image. Generating reflectance and shading from a single image is a challenging task specifically when there is no ground truth. There is a lack of unsupervised learning approaches for decomposing an image into reflectance and shading using a single image. We propose a neural network architecture capable of this d… ▽ More

    Submitted 20 December, 2021; v1 submitted 20 May, 2021; originally announced May 2021.

    Comments: 5 pages, 3 figures, 1 table, ICIP 2021

    Journal ref: IEEE International Conference on Image Processing (ICIP), 2021, pp. 1864-1868

  3. A Retinex based GAN Pipeline to Utilize Paired and Unpaired Datasets for Enhancing Low Light Images

    Authors: Harshana Weligampola, Gihan Jayatilaka, Suren Sritharan, Roshan Godaliyadda, Parakrama Ekanayaka, Roshan Ragel, Vijitha Herath

    Abstract: Low light image enhancement is an important challenge for the development of robust computer vision algorithms. The machine learning approaches to this have been either unsupervised, supervised based on paired dataset or supervised based on unpaired dataset. This paper presents a novel deep learning pipeline that can learn from both paired and unpaired datasets. Convolution Neural Networks (CNNs)… ▽ More

    Submitted 21 October, 2021; v1 submitted 27 June, 2020; originally announced June 2020.

  4. Non-contact Infant Sleep Apnea Detection

    Authors: Gihan Jayatilaka, Harshana Weligampola, Suren Sritharan, Pankayraj Pathmanathan, Roshan Ragel, Isuru Nawinne

    Abstract: Sleep apnea is a breathing disorder where a person repeatedly stops breathing in sleep. Early detection is crucial for infants because it might bring long term adversities. The existing accurate detection mechanism (pulse oximetry) is a skin contact measurement. The existing non-contact mechanisms (acoustics, video processing) are not accurate enough. This paper presents a novel algorithm for the… ▽ More

    Submitted 10 October, 2019; originally announced October 2019.

    Comments: Gihan Jayatilaka, Harshana Weligampola and Suren Sritharan are equally contributing authors

  5. An optimized Parallel Failure-less Aho-Corasick algorithm for DNA sequence matching

    Authors: Vajira Thambawita, Roshan G. Ragel, Dhammike Elkaduwe

    Abstract: The Aho-Corasick algorithm is multiple patterns searching algorithm running sequentially in various applications like network intrusion detection and bioinformatics for finding several input strings within a given large input string. The parallel version of the Aho-Corasick algorithm is called as Parallel Failure-less Aho-Corasick algorithm because it doesn't need failure links like in the origina… ▽ More

    Submitted 26 November, 2018; originally announced November 2018.

    Comments: 6 pages, 3 figures, 4 tables, 5 graphs, 2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS)

  6. Near Real-Time Data Labeling Using a Depth Sensor for EMG Based Prosthetic Arms

    Authors: Geesara Prathap, Titus Nanda Kumara, Roshan Ragel

    Abstract: Recognizing sEMG (Surface Electromyography) signals belonging to a particular action (e.g., lateral arm raise) automatically is a challenging task as EMG signals themselves have a lot of variation even for the same action due to several factors. To overcome this issue, there should be a proper separation which indicates similar patterns repetitively for a particular action in raw signals. A repeti… ▽ More

    Submitted 10 November, 2018; originally announced November 2018.

  7. To Use or Not to Use: CPUs' Cache Optimization Techniques on GPGPUs

    Authors: Vajira Thambawita, Roshan G. Ragel, Dhammike Elkaduwe

    Abstract: General Purpose Graphic Processing Unit(GPGPU) is used widely for achieving high performance or high throughput in parallel programming. This capability of GPGPUs is very famous in the new era and mostly used for scientific computing which requires more processing power than normal personal computers. Therefore, most of the programmers, researchers and industry use this new concept for their work.… ▽ More

    Submitted 9 October, 2018; originally announced October 2018.

    Comments: 6 pages, 15 Figures

    Journal ref: ICIAfS 2016- IEEE International Conference on Information and Automation for Sustainability

  8. arXiv:1511.01946  [pdf, ps, other

    cs.AR

    SecureD: A Secure Dual Core Embedded Processor

    Authors: Roshan G. Ragel, Jude A. Ambrose, Sri Parameswaran

    Abstract: Security of embedded computing systems is becoming of paramount concern as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Security attacks targeting embedded systems illegally gain access to the information in these devices or destroy information. The two most common types of attacks embedded systems encounter are code-injec… ▽ More

    Submitted 5 November, 2015; originally announced November 2015.

  9. arXiv:1412.8467  [pdf

    cs.CE cs.PF

    A Structured Hardware Software Architecture for Peptide Based Diagnosis - Sub-string Matching Problem with Limited Tolerance (ICIAfS14)

    Authors: S. M. Vidanagamachchi, S. D. Dewasurendra, R. G. Ragel, M. Niranjan

    Abstract: The problem of inferring proteins from complex peptide samples in shotgun proteomic workflow sets extreme demands on computational resources. This is exacerbated by the fact that, in general, a given protein cannot be defined by a fixed sequence of amino acids due to the existence of splice variants and isoforms of that protein. Therefore, the problem of protein inference could be considered as on… ▽ More

    Submitted 25 December, 2014; originally announced December 2014.

    Comments: appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014. arXiv admin note: substantial text overlap with arXiv:1412.7811

  10. arXiv:1412.7813  [pdf

    cs.CY

    Students Behavioural Analysis in an Online Learning Environment Using Data Mining (ICIAfS)

    Authors: I. P. Ratnapala, R. G. Ragel, S. Deegalla

    Abstract: The focus of this research was to use Educational Data Mining (EDM) techniques to conduct a quantitative analysis of students interaction with an e-learning system through instructor-led non-graded and graded courses. This exercise is useful for establishing a guideline for a series of online short courses for them. A group of 412 students' access behaviour in an e-learning system were analysed an… ▽ More

    Submitted 25 December, 2014; originally announced December 2014.

    Comments: appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  11. arXiv:1412.7811  [pdf

    cs.CE

    A Structured Hardware Software Architecture for Peptide Based Diagnosis of Baylisascaris Procyonis Infection (ICIAfS14)

    Authors: S. M. Vidanagamachchi, S. D. Dewasurendra, R. G. Ragel, M. Niranjan

    Abstract: The problem of inferring proteins from complex peptide cocktails (digestion products of biological samples) in shotgun proteomic workflow sets extreme demands on computational resources in respect of the required very high processing throughputs, rapid processing rates and reliability of results. This is exacerbated by the fact that, in general, a given protein cannot be defined by a fixed sequenc… ▽ More

    Submitted 25 December, 2014; originally announced December 2014.

    Comments: appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  12. arXiv:1412.7789  [pdf

    cs.DC cs.PF

    To Use or Not to Use: Graphics Processing Units for Pattern Matching Algorithms

    Authors: Vajira Thambawita, Roshan Ragel, Dhammika Elkaduwe

    Abstract: String matching is an important part in today's computer applications and Aho-Corasick algorithm is one of the main string matching algorithms used to accomplish this. This paper discusses that when can the GPUs be used for string matching applications using the Aho-Corasick algorithm as a benchmark. We have to identify the best unit to run our string matching algorithm according to the performanc… ▽ More

    Submitted 25 December, 2014; originally announced December 2014.

    Comments: appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  13. arXiv:1412.7782  [pdf

    cs.IR cs.CL

    Plagiarism Detection on Electronic Text based Assignments using Vector Space Model (ICIAfS14)

    Authors: MAC Jiffriya, MAC Akmal Jahan, Roshan G. Ragel

    Abstract: Plagiarism is known as illegal use of others' part of work or whole work as one's own in any field such as art, poetry, literature, cinema, research and other creative forms of study. Plagiarism is one of the important issues in academic and research fields and giving more concern in academic systems. The situation is even worse with the availability of ample resources on the web. This paper focus… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: appears in The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  14. arXiv:1412.7692  [pdf

    cs.AR

    A Feasibility Study on Programmer Specific Instruction Set Processors (PSISPs)

    Authors: T. M. R. L. B. Abeysinghe, N. Hassan, R. G. Ragel

    Abstract: ASIPs are designed in order to execute instructions of a particular domain of applications. The designing of ASIPs addresses the major challenges faced by a system on chip such as size, cost, performance and energy consumption. The higher the number of similar instructions within the domain to be mapped the lesser the energy consumption, the smaller the size and the higher the performance of the A… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  15. arXiv:1412.7689  [pdf

    cs.CV

    Locating Tables in Scanned Documents for Reconstructing and Republishing (ICIAfS14)

    Authors: Akmal Jahan Mac, Roshan G Ragel

    Abstract: Pool of knowledge available to the mankind depends on the source of learning resources, which can vary from ancient printed documents to present electronic material. The rapid conversion of material available in traditional libraries to digital form needs a significant amount of work if we are to maintain the format and the look of the electronic documents as same as their printed counterparts. Mo… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  16. arXiv:1412.7684  [pdf

    cs.NI

    Efficient Switch Architectures for Pre-configured Backup Protection with Sharing in Elastic Optical Networks (EON)

    Authors: Suthaharan Satkunarajah, Krishanthmohan Ratnam, Roshan G. Ragel

    Abstract: In this paper, we address the problem of providing survivability in elastic optical networks (EONs). EONs use fine granular frequency slots or flexible grids, when compared to the conventional fixed grid networks and therefore utilize the frequency spectrum efficiently. For providing survivability in EONs, we consider a recently proposed survivability method for conventional fixed grid networks, k… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  17. arXiv:1412.7682  [pdf

    cs.PF

    Accelerating Correlation Power Analysis Using Graphics Processing Units

    Authors: Hasindu Gamaarachchi, Roshan Ragel, Darshana Jayasinghe

    Abstract: Correlation Power Analysis (CPA) is a type of power analysis based side channel attack that can be used to derive the secret key of encryption algorithms including DES (Data Encryption Standard) and AES (Advanced Encryption Standard). A typical CPA attack on unprotected AES is performed by analysing a few thousand power traces that requires about an hour of computational time on a general purpose… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  18. arXiv:1412.7680  [pdf

    cs.CV

    A Fuzzy Based Model to Identify Printed Sinhala Characters (ICIAfS14)

    Authors: G. I. Gunarathna, M. A. P. Chamikara, R. G. Ragel

    Abstract: Character recognition techniques for printed documents are widely used for English language. However, the systems that are implemented to recognize Asian languages struggle to increase the accuracy of recognition. Among other Asian languages (such as Arabic, Tamil, Chinese), Sinhala characters are unique, mainly because they are round in shape. This unique feature makes it a challenge to extend th… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  19. arXiv:1412.7677  [pdf

    cs.HC

    LineCAPTCHA Mobile: A User Friendly Replacement for Unfriendly Reverse Turing Tests for Mobile Devices (ICIAfS14)

    Authors: C. B Bulumulla, R. G. Ragel

    Abstract: As smart phones and tablets are becoming ubiquitous and taking over as the primary choice for accessing the Internet worldwide, ensuring a secure gateway to the servers serving such devices become essential. CAPTCHAs play an important role in identifying human users in internet to prevent unauthorized bot attacks. Even though there are numerous CAPTCHA alternatives available today, there are certa… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  20. arXiv:1412.7664  [pdf

    cs.PL

    Register Spilling for Specific Application Domains in Application Specific Instruction-set Processors

    Authors: M. G. G. C. R. Salgado, R. G. Ragel

    Abstract: An Application Specific Instruction set Processor (ASIP) is an important component in designing embedded systems. One of the problems in designing an instruction set for such processors is determining the number of registers is needed in the processor that will optimize the computational time and the cost. The performance of a processor may fall short due to register spilling, which is caused by t… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014

  21. Heterogeneous processor pipeline for a product cipher application

    Authors: I. B. Nawinne, M. S. Wickramasinghe, R. G. Ragel, S. Radhakrishnan

    Abstract: Processing data received as a stream is a task commonly performed by modern embedded devices, in a wide range of applications such as multimedia (encoding/decoding/ playing media), networking (switching and routing), digital security, scientific data processing, etc. Such processing normally tends to be calculation intensive and therefore requiring significant processing power. Therefore, hardware… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2011 6th IEEE International Conference on, 16-19 Aug 2011, pp. 32 - 37, Kandy

  22. Countermeasures against Bernstein's remote cache timing attack

    Authors: Janaka Alawatugoda, Darshana Jayasinghe, Roshan Ragel

    Abstract: Cache timing attack is a type of side channel attack where the leaking timing information due to the cache behaviour of a crypto system is used by an attacker to break the system. Advanced Encryption Standard (AES) was considered a secure encryption standard until 2005 when Daniel Bernstein claimed that the software implementation of AES is vulnerable to cache timing attack. Bernstein demonstrated… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2011 6th IEEE International Conference on, 16-19 Aug. 2011, pp. 43-48, Kandy

  23. Tile optimization for area in FPGA based hardware acceleration of peptide identification

    Authors: S. M. Vidanagamachchi, S. D. Dewasurendra, R. G. Ragel, M. Niranjan

    Abstract: Advances in life sciences over the last few decades have lead to the generation of a huge amount of biological data. Computing research has become a vital part in driving biological discovery where analysis and categorization of biological data are involved. String matching algorithms can be applied for protein/gene sequence matching and with the phenomenal increase in the size of string databases… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2011 6th IEEE International Conference on, 16-19 Aug. 2011, pp. 140 - 145, Kandy

  24. Improving the throughput of the AES algorithm with multicore processors

    Authors: A. Barnes, R. Fernando, K. Mettananda, R. G. Ragel

    Abstract: AES, Advanced Encryption Standard, can be considered the most widely used modern symmetric key encryption standard. To encrypt/decrypt a file using the AES algorithm, the file must undergo a set of complex computational steps. Therefore a software implementation of AES algorithm would be slow and consume large amount of time to complete. The immense increase of both stored and transferred data in… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2012 7th IEEE International Conference on, 6-9 Aug. 2012, Chennai

  25. Accelerating string matching for bio-computing applications on multi-core CPUs

    Authors: D. Herath, C. Lakmali, R. G. Ragel

    Abstract: Huge amount of data in the form of strings are being handled in bio-computing applications and searching algorithms are quite frequently used in them. Many methods utilizing on both software and hardware are being proposed to accelerate processing of such data. The typical hardware-based acceleration techniques either require special hardware such as general purpose graphics processing units (GPGP… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2012 7th IEEE International Conference on, 6-9 Aug. 2012, pp. 1-6, Chennai

  26. Constant time encryption as a countermeasure against remote cache timing attacks

    Authors: D. Jayasinghe, R. G. Ragel, D. Elkaduwe

    Abstract: Rijndael was standardized in 2001 by National Institute of Standard and Technology as the Advanced Encryption Standard (AES). AES is still being used to encrypt financial, military and even government confidential data. In 2005, Bernstein illustrated a remote cache timing attack on AES using the client-server architecture and therefore proved a side channel in its software implementation. Over the… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Information and Automation for Sustainability (ICIAfS), 2012 IEEE 6th International Conference on, 27-29 Sept 2012, pp 129-134, Bei**g

  27. Instruction-set Selection for Multi-application based ASIP Design: An Instruction-level Study

    Authors: R. G. Ragel, Swarnalatha Radhakrishnan, Angelo Ambrose

    Abstract: Efficiency in embedded systems is paramount to achieve high performance while consuming less area and power. Processors in embedded systems have to be designed carefully to achieve such design constraints. Application Specific Instruction set Processors (ASIPs) exploit the nature of applications to design an optimal instruction set. Despite being not general to execute any application, ASIPs are h… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Information and Automation for Sustainability (ICIAfS), 2012 IEEE 6th International Conference on, 27-29 Sept 2012, pp 141-146, Bei**g

  28. Software implementation level countermeasures against the cache timing attack on advanced encryption standard

    Authors: U. Herath, J. Alawatugoda, R. G. Ragel

    Abstract: Advanced Encryption Standard (AES) is a symmetric key encryption algorithm which is extensively used in secure electronic data transmission. When introduced, although it was tested and declared as secure, in 2005, a researcher named Bernstein claimed that it is vulnerable to side channel attacks. The cache-based timing attack is the type of side channel attack demonstrated by Bernstein, which uses… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 75-80, 17-20 Dec. 2013

  29. Hardware accelerated protein inference framework

    Authors: S. M. Vidanagamachchi, S. D. Dewasurendra, R. G. Ragel

    Abstract: Protein inference plays a vital role in the proteomics study. Two major approaches could be used to handle the problem of protein inference; top-down and bottom-up. This paper presents a framework for protein inference, which uses hardware accelerated protein inference framework for handling the most important step in a bottom-up approach, viz. peptide identification during the assembling process.… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 649-653, 17-20 Dec. 2013

  30. Hardware software co-design of the Aho-Corasick algorithm: Scalable for protein identification?

    Authors: S. M. Vidanagamachchi, S. D. Dewasurendra, R. G. Ragel

    Abstract: Pattern matching is commonly required in many application areas and bioinformatics is a major area of interest that requires both exact and approximate pattern matching. Much work has been done in this area, yet there is still a significant space for improvement in efficiency, flexibility, and throughput. This paper presents a hardware software co-design of Aho-Corasick algorithm in Nios II soft-p… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 321-325, 17-20 Dec. 2013

  31. Authorship detection of SMS messages using unigrams

    Authors: R. G. Ragel, P. Herath, U. Senanayake

    Abstract: SMS messaging is a popular media of communication. Because of its popularity and privacy, it could be used for many illegal purposes. Additionally, since they are part of the day to day life, SMSes can be used as evidence for many legal disputes. Since a cellular phone might be accessible to people close to the owner, it is important to establish the fact that the sender of the message is indeed t… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 387-392 , 17-20 Dec. 2013

  32. Accelerating motif finding in DNA sequences with multicore CPUs

    Authors: P. Perera, R. G. Ragel

    Abstract: Motif discovery in DNA sequences is a challenging task in molecular biology. In computational motif discovery, Planted (l, d) motif finding is a widely studied problem and numerous algorithms are available to solve it. Both hardware and software accelerators have been introduced to accelerate the motif finding algorithms. However, the use of hardware accelerators such as FPGAs needs hardware speci… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 242-247, 17-20 Dec. 2013

  33. AntiPlag: Plagiarism Detection on Electronic Submissions of Text Based Assignments

    Authors: M. A. C. Jiffriya, M. A. C. Akmal Jahan, R. G. Ragel, S. Deegalla

    Abstract: Plagiarism is one of the growing issues in academia and is always a concern in Universities and other academic institutions. The situation is becoming even worse with the availability of ample resources on the web. This paper focuses on creating an effective and fast tool for plagiarism detection for text based electronic assignments. Our plagiarism detection tool named AntiPlag is developed using… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 376 - 380, 17-20 Dec. 2013

  34. String Matching with Multicore CPUs: Performing Better with the Aho-Corasick Algorithm

    Authors: S. Arudchutha, T. Nishanthy, R. G. Ragel

    Abstract: Multiple string matching is known as locating all the occurrences of a given number of patterns in an arbitrary string. It is used in bio-computing applications where the algorithms are commonly used for retrieval of information such as sequence analysis and gene/protein identification. Extremely large amount of data in the form of strings has to be processed in such bio-computing applications. Th… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Journal ref: 8th IEEE International Conference on Industrial and Information Systems (ICIIS), 2013, pp. 231-236, 17-20 Dec. 2013

  35. User Friendly Line CAPTCHAs

    Authors: A. K. B. Karunathilake, B. M. D. Balasuriya, R. G. Ragel

    Abstract: CAPTCHAs or reverse Turing tests are real-time assessments used by programs (or computers) to tell humans and machines apart. This is achieved by assigning and assessing hard AI problems that could only be solved easily by human but not by machines. Applications of such assessments range from stop** spammers from automatically filling online forms to preventing hackers from performing dictionary… ▽ More

    Submitted 4 February, 2014; originally announced February 2014.

    Comments: 6 pages

    Journal ref: Industrial and Information Systems (ICIIS), 2009 International Conference on , pp.210,215, 28-31 Dec. 2009

  36. Loop Unrolling in Multi-pipeline ASIP Design

    Authors: Rajitha Navarathna, Swarnalatha Radhakrishnan, Roshan Ragel

    Abstract: Application Specific Instruction-set Processor (ASIP) is one of the popular processor design techniques for embedded systems which allows customizability in processor design without overly hindering design flexibility. Multi-pipeline ASIPs were proposed to improve the performance of such systems by compromising between speed and processor area. One of the problems in the multi-pipeline design is t… ▽ More

    Submitted 4 February, 2014; originally announced February 2014.

    Comments: 6 pages

    Journal ref: Navarathna, H. M R D B; Radhakrishnan, S.; Ragel, R.G., "Loop unrolling in multi-pipeline ASIP design," Industrial and Information Systems (ICIIS), 2009 International Conference on , pp.306-311, 28-31 Dec. 2009

  37. Axis2UNO: Web Services Enabled Openoffice.org

    Authors: B. A. N. M. Bambarasinghe, H. M. S. Huruggamuwa, R. G. Ragel, S. Radhakrishnan

    Abstract: Openoffice.org is a popular, free and open source office product. This product is used by millions of people and developed, maintained and extended by thousands of developers worldwide. Playing a dominant role in the web, web services technology is serving millions of people every day. Axis2 is one of the most popular, free and open source web service engines. The framework presented in this paper… ▽ More

    Submitted 4 February, 2014; originally announced February 2014.

    Comments: 6 pages, 4th International Conference on Information and Automation for Sustainability, 2008. ICIAFS 2008

    Journal ref: ICIAFS 2008. 437-442, 12-14 Dec. 2008

  38. High Throughput Virtual Screening with Data Level Parallelism in Multi-core Processors

    Authors: Upul Senanayake, Rahal Prabuddha, Roshan Ragel

    Abstract: Improving the throughput of molecular docking, a computationally intensive phase of the virtual screening process, is a highly sought area of research since it has a significant weight in the drug designing process. With such improvements, the world might find cures for incurable diseases like HIV disease and Cancer sooner. Our approach presented in this paper is to utilize a multi-core environmen… ▽ More

    Submitted 3 December, 2013; originally announced December 2013.

    Comments: Information and Automation for Sustainability (ICIAfS), 2012 IEEE 6th International Conference on