115 research outputs found
Outlier detection from ETL Execution trace
Extract, Transform, Load (ETL) is an integral part of Data Warehousing (DW)
implementation. The commercial tools that are used for this purpose captures
lot of execution trace in form of various log files with plethora of
information. However there has been hardly any initiative where any proactive
analyses have been done on the ETL logs to improve their efficiency. In this
paper we utilize outlier detection technique to find the processes varying most
from the group in terms of execution trace. As our experiment was carried on
actual production processes, any outlier we would consider as a signal rather
than a noise. To identify the input parameters for the outlier detection
algorithm we employ a survey among developer community with varied mix of
experience and expertise. We use simple text parsing to extract these features
from the logs, as shortlisted from the survey. Subsequently we applied outlier
detection technique (Clustering based) on the logs. By this process we reduced
our domain of detailed analysis from 500 logs to 44 logs (8 Percentage). Among
the 5 outlier cluster, 2 of them are genuine concern, while the other 3 figure
out because of the huge number of rows involved.Comment: 2011 3rd International Conference on Electronics Computer Technology
(ICECT 2011
Hardware Implementation of four byte per clock RC4 algorithm
In the field of cryptography till date the 2-byte in 1-clock is the best
known RC4 hardware design [1], while 1-byte in 1-clock [2], and the 1-byte in 3
clocks [3][4] are the best known implementation. The design algorithm in[2]
considers two consecutive bytes together and processes them in 2 clocks. The
design [1] is a pipelining architecture of [2]. The design of 1-byte in
3-clocks is too much modular and clock hungry. In this paper considering the
RC4 algorithm, as it is, a simpler RC4 hardware design providing higher
throughput is proposed in which 6 different architecture has been proposed. In
design 1, 1-byte is processed in 1-clock, design 2 is a dynamic KSA-PRGA
architecture of Design 1. Design 3 can process 2 byte in a single clock, where
as Design 4 is Dynamic KSA-PRGA architecture of Design 3. Design 5 and Design 6
are parallelization architecture design 2 and design 4 which can compute 4 byte
in a single clock. The maturity in terms of throughput, power consumption and
resource usage, has been achieved from design 1 to design 6. The RC4 encryption
and decryption designs are respectively embedded on two FPGA boards as
co-processor hardware, the communication between the two boards performed using
Ethernet.Comment: This is an unpublished draft versio
A Brief Survey of Recent Edge-Preserving Smoothing Algorithms on Digital Images
Edge preserving filters preserve the edges and its information while blurring
an image. In other words they are used to smooth an image, while reducing the
edge blurring effects across the edge like halos, phantom etc. They are
nonlinear in nature. Examples are bilateral filter, anisotropic diffusion
filter, guided filter, trilateral filter etc. Hence these family of filters are
very useful in reducing the noise in an image making it very demanding in
computer vision and computational photography applications like denoising,
video abstraction, demosaicing, optical-flow estimation, stereo matching, tone
mapping, style transfer, relighting etc. This paper provides a concrete
introduction to edge preserving filters starting from the heat diffusion
equation in olden to recent eras, an overview of its numerous applications, as
well as mathematical analysis, various efficient and optimized ways of
implementation and their interrelationships, keeping focus on preserving the
boundaries, spikes and canyons in presence of noise. Furthermore it provides a
realistic notion for efficient implementation with a research scope for
hardware realization for further acceleration.Comment: Manuscrip
Fault Detection for RC4 Algorithm and its Implementation on FPGA Platform
In hardware implementation of a cryptographic algorithm, one may achieve
leakage of secret information by creating scopes to introduce controlled faulty
bit(s) even though the algorithm is mathematically a secured one. The technique
is very effective in respect of crypto processors embedded in smart cards. In
this paper few fault detecting architectures for RC4 algorithm are designed and
implemented on Virtex5(ML505, LX110t) FPGA board. The results indicate that the
proposed architectures can handle most of the faults without loss of throughput
consuming marginally additional hardware and power.Comment: Published Book Title: Elsevier Science and Technology, ICCN 2013,
Bangalore, Page(s): 224 - 232, Volume 3, DOI-03.elsevierst.2013.3.ICCN25,
ISBN :978935107104
Multi Core SSL/TLS Security Processor Architecture Prototype Design with automated Preferential Algorithm in FPGA
In this paper a pipelined architecture of a high speed network security
processor (NSP) for SSL,TLS protocol is implemented on a system on chip (SOC)
where hardware information of all encryption, hashing and key exchange
algorithms are stored in flash memory in terms of bit files, in contrary to
related works where all are actually implemented in hardware. The NSP finds
applications in e-commerce, virtual private network (VPN) and in other fields
that require data confidentiality. The motivation of the present work is to
dynamically execute applications with stipulated throughput within budgeted
hardware resource and power. A preferential algorithm choosing an appropriate
cipher suite is proposed, which is based on Efficient System Index (ESI) budget
comprising of power, throughput and resource given by the user. The bit files
of the chosen security algorithms are downloaded from the flash memory to the
partial region of field programmable gate array (FPGA). The proposed SOC
controls data communication between an application running in a system through
a PCI and the Ethernet interface of a network. Partial configuration feature is
used in ISE14.4 suite with ZYNQ 7z020-clg484 FPGA platform. The performancesComment: This is Manuscrip
A Novel Approach for Human Action Recognition from Silhouette Images
In this paper, a novel human action recognition technique from video is
presented. Any action of human is a combination of several micro action
sequences performed by one or more body parts of the human. The proposed
approach uses spatio-temporal body parts movement (STBPM) features extracted
from foreground silhouette of the human objects. The newly proposed STBPM
feature estimates the movements of different body parts for any given time
segment to classify actions. We also proposed a rule based logic named rule
action classifier (RAC), which uses a series of condition action rules based on
prior knowledge and hence does not required training to classify any action.
Since we don't require training to classify actions, the proposed approach is
view independent. The experimental results on publicly available Wizeman and
MuHVAi datasets are compared with that of the related research work in terms of
accuracy in the human action detection, and proposed technique outperforms the
others.Comment: Manuscrip
An Approach for Reducing Outliers of Non Local Means Image Denoising Filter
We propose an adaptive approach for non local means (NLM) image filtering
termed as non local adaptive clipped means (NLACM), which reduces the effect of
outliers and improves the denoising quality as compared to traditional NLM.
Common method to neglect outliers from a data population is computation of mean
in a range defined by mean and standard deviation. In NLACM we perform the
median within the defined range based on statistical estimation of the
neighbourhood region of a pixel to be denoised. As parameters of the range are
independent of any additional input and is based on local intensity values,
hence the approach is adaptive. Experimental results for NLACM show better
estimation of true intensity from noisy neighbourhood observation as compared
to NLM at high noise levels. We have verified the technique for speckle noise
reduction and we have tested it on ultrasound (US) image of lumbar spine. These
ultrasound images act as guidance for injection therapy for treatment of lumbar
radiculopathy. We believe that the proposed approach for image denoising is
first of its kind and its efficiency can be well justified as it shows better
performance in image restoration.Comment: The paper presents an improvement in denoising algorithm for
ultrasound images using the filter non-local means. The paper is accepted in
MedImage2014 (IISc Bangalore). The research was supported by Centre of
Excellence in Systems Biology and Biomedical Engineering (TEQIP PHASE-II),
University of Calcutta and National Institute for the Orthopaedically
Handicapped, Kolkata, Indi
Linear Nearest Neighbor Synthesis of Reversible Circuits by Graph Partitioning
Linear Nearest Neighbor (LNN) synthesis in reversible circuits has emerged as
an important issue in terms of technological implementation for quantum
computation. The objective is to obtain a LNN architecture with minimum gate
cost. As achieving optimal synthesis is a hard problem, heuristic methods have
been proposed in recent literature. In this work we present a graph
partitioning based approach for LNN synthesis with reduction in circuit cost.
In particular, the number of SWAP gates required to convert a given gate-level
quantum circuit to its equivalent LNN configuration is minimized. Our algorithm
determines the reordering of indices of the qubit line(s) for both single
control and multiple controlled gates. Experimental results for placing the
target qubits of Multiple Controlled Toffoli (MCT) library of benchmark
circuits show a significant reduction in gate count and quantum gate cost
compared to those of related research works
Cobb Angle Measurement of Scoliosis with Reduced Variability
Cobb angle, which is a measure of spinal curvature is the standard method for
quantifying the magnitude of Scoliosis related to spinal deformity in
orthopedics. Determining the Cobb angle through manual process is subject to
human errors. In this work, we propose a methodology to measure the magnitude
of Cobb angle, which appreciably reduces the variability related to its
measurement compared to the related works. The proposed methodology is
facilitated by using a suitable new improved version of Non-Local Means for
image denoisation and Otsus automatic threshold selection for Canny edge
detection. We have selected NLM for preprocessing of the image as it is one of
the fine states of art for image denoisation and helps in retaining the image
quality. Trimmedmean, median are more robust to outliners than mean and
following this concept we observed that NLM denoising quality performance can
be enhanced by using Euclidean trimmed-mean replacing the mean. To prove the
better performance of the Non-Local Euclidean Trimmed-mean denoising filter, we
have provided some comparative study results of the proposed denoising
technique with traditional NLM and NonLocal Euclidean Medians. The experimental
results for Cobb angle measurement over intra observer and inter observer
experimental data reveals the better performance and superiority of the
proposed approach compared to the related works. MATLAB2009b image processing
toolbox was used for the purpose of simulation and verification of the proposed
methodology.Comment: MedImage201
Performance Evaluation of ECC in Single and Multi Processor Architectures on FPGA Based Embedded System
Cryptographic algorithms are computationally costly and the challenge is more
if we need to execute them in resource constrained embedded systems. Field
Programmable Gate Arrays (FPGAs) having programmable logic de- vices and
processing cores, have proven to be highly feasible implementation platforms
for embedded systems providing lesser design time and reconfig- urability.
Design parameters like throughput, resource utilization and power requirements
are the key issues. The popular Elliptic Curve Cryptography (ECC), which is
superior over other public-key crypto-systems like RSA in many ways, such as
providing greater security for a smaller key size, is cho- sen in this work and
the possibilities of its implementation in FPGA based embedded systems for both
single and dual processor core architectures in- volving task parallelization
have been explored. This exploration, which is first of its kind considering
the other existing works, is a needed activity for evaluating the best possible
architectural environment for ECC implementa- tion on FPGA (Virtex4 XC4VFX12,
FF668, -10) based embedded platform.Comment: Published Book Title: Elsevier Science and Technology, ICCN 2013,
Bangalore, Page(s): 140 - 147, Volume 3, 03.elsevierst.2013.3.ICCN16, ISBN
:9789351071044, Paper
link:-http://searchdl.org/index.php/book_series/view/91
- …