Machine Intelligence Research Labs (MIR Labs)

Displaying 1-28 of 28 results

  • White Papers // Feb 2013

    Observation-Based Fine Grained Access Control of Data

    In this paper, the authors propose an Observation-based Fine Grained Access Control (OFGAC) mechanism where data are made accessible at various levels of abstractions according to their sensitivity levels. In this setting, unauthorized users are not able to infer the exact content of the confidential data, while they are allowed...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Oct 2012

    Code Clones in Program Test Sequence Identification

    Code clones are portions of source code which are similar to the original program code. The presence of code clones is considered as a bad feature of software as the maintenance of software becomes difficult due to the presence of code clones. Methods for code clone detection have gained immense...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Oct 2012

    Network Traffic Monitoring and Control for Multi Core Processors in Cloud Computing Applications

    Parallel Programming (PP) used to be an area is confined to scientific and cloud computing applications. However, with the proliferation of multicore processors, parallel programming has definitely become a mainstream of concern. To satisfy the requirement, one can leverage multi-core architectures to parallelize traffic monitoring so as to progress information...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    QoS4WSC: A Framework for Web Services Composition Based on QoS Constraints

    Web Services Composition (WSC) is a paradigm for enabling application integration within and across organizational boundaries. Nowadays, the main challenges of WSC in environment like Internet are to ensure high quality execution. Former works on service composition have enabled the elaboration of the BPEL4WS standard. Nevertheless, the management of the...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    Fuzzy-DDE: A Fuzzy Method for the Extraction of Document Cluster Descriptors

    Good cluster descriptors facilitate the efficient storage and retrieval of information. In particular, when the imprecision and uncertainty of textual information is considered, the extraction of cluster descriptors, which represent the compatibility of a document with a cluster in a more precise way, is a challenging problem. Therefore, in this...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    Data Mining and Wireless Sensor Network for Groundnut Pest/Disease Interaction and Predictions - A Preliminary Study

    Data driven precision agriculture aspects, particularly the pest/disease management, require a dynamic crop-weather data. An experiment was conducted in semi-arid region of India to understand the crop-weather-pest/disease relations using wireless sensory and field-level surveillance data on closely related and interdependent pest (Thrips) - disease (Bud Necrosis) dynamics of groundnut (peanut)...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    Link Distance Link Cost Link Error Based Energy Efficient Cross Layer Reliable Routing for Wireless Sensor Network

    In this paper, a new energy efficient cross layer routing protocol is introduced for Wireless Sensor Networks (WSNs). Energy consumption and routing is the most challenging and demanding in designing routing protocol for WSNs. The authors develop LDCE routing protocol based on (Link Distance, link Cost and link Error). The...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    Design Coordination Using Cloud-Based Smart Building Element Models

    Construction industry involves a multitude of stakeholders who perform their project-centric work from various dispersed locations. This involvement of numerous stakeholders, which is common in the construction industry compared to the other industries, has led to fragmentation of the design process. The limitations and complexities resulting from this fragmentation can...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    Genetic Algorithm and Fuzzy-Rough Based Dimensionality Reduction Applied on Real Valued Dataset

    Real-world datasets are often vague and redundant, creating problem to take decision accurately. Very recently, Rough-set theory has been used successfully for dimensionality reduction but is applicable only on discrete dataset. Discretisation of data leads to information loss and may add inconsistency in the datasets. The paper aims at applying...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jul 2012

    Aspect-Oriented Trust Based Mobile Recommender System

    With the rapid advancement of wireless technologies and mobile devices, service recommendations have become a crucial and important research area in mobile computing. Although various recommender systems have been developed to help users to deal with information overload, few systems focus on personalized trustworthy recommendation generation for mobile users. In...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jul 2012

    Ontology Exemplification and Modeling for ASPOCMS in the Semantic Web

    Ontology can not only describe the workflow data of the any university more easily understood by computers in semantic encoding scenario, but can also integrate users data from different sources and in different forms for reasoning. Workflow technology promises to increase the efficiency in the execution of workflow based processes....

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    Resource Allocation and Resource Leveling in Heterogeneous SANET Environments

    Actual research projects in the field of wireless communication systems focus on distributed, heterogeneous architectures for advanced Sensor-Actor-NETworks (SANETs). Each subsystem provides specific capabilities for measuring or manipulating its environment. At the same time, a huge amount of sensor, status and control data has to be transmitted over different network...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    Toward Next Generation E-Marketplace for Small Business

    This paper is to shift the e-marketplaces' focus from search-oriented matching, toward assistance-providing business matching systems for the next generation e-marketplaces for small business. By addressing the issue of business-matching and recommending in business-to-business e-marketplaces, through the use of Collective Intelligence (CI) means. To make the most of CI's capabilities,...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    A Framework for Process and Performance Management in Service Oriented Virtual Organizations

    Virtual Organization (VO) is a network of autonomous organizations sharing their competitive advantage to address a specific business opportunity. Due to autonomy of partners and the temporal and dynamic nature of VOs, collaborative VO management is crucial to its success. In addition, performance measurement plays an important role in non-centralized...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    Model-Driven Security: From Theory to Application

    As a specialization of model-driven architecture, Model-Driven Security (MDS) is an approach that uses models to capture and represent a system's architecture and security requirements in software development. Through layers of abstraction, system designers and developers can leverage simple and abstract models to design large and complex systems and generate...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    Fault Tree Analysis Speed-Up With GPU Parallel Computing

    The reliability analysis of critical systems can be performed using fault tree analysis. One of the common approaches used for fault tree analysis is Monte Carlo simulation. The purpose of this paper is therefore to show an algorithm to speed up Monte Carlo simulation for analyzing fault tree with parallel...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    Personalization on E-Content Retrieval Based on Semantic Web Services

    In the current educational context there has been a significant increase in Learning Object Repositories (LOR), which are found in large databases available on the hidden web. All these information is described in any metadata labeling standard (LOM, Dublin Core, etc). It is necessary to work and develop solutions that...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // May 2012

    Towards the Evolution of Publish/Subscribe Internetworking Mechanisms With PSIRP

    Despite its enormous success, the current Internet's architecture has not evolved in a scalable manner. There are many issues concerning simple services that need complex network systems in order to work. Future Internet architectures are candidates to solve some of the problems related to the current Internet. This paper describes...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // May 2012

    Secure Auditing and e-Commerce

    Information society has produced new concepts in human relationships that give raise to e-systems that organize or promote wider relationships and activities such as e-commerce, e-learning or e-governance. This paper deals with the necessity of protecting information in the auditing process mainly in the actual e-society characterized for the continuous...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Mar 2012

    Quantization of Sparse and Dense Mode Protocols in Ring Topology Networks

    This paper provides analytical tools to assess the improvements of existing, modified or entirely new multicast protocols at an early stage of design. In particular, the authors investigate the general properties of Sparse Mode (SM) and Dense Mode (DM) protocols and their variants. Specifically, they quantify the performance of these...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jan 2012

    Human Activity Monitoring With Wearable Sensors and Hybrid Classifiers

    Activity monitoring plays a crucial role in ambient living environments for assessing changes in the normal behavioral pattern of elderly people. In this paper, the authors present an action description and detection mechanism for real-time activity monitoring using wearable sensors and hybrid classifiers. First a Single Sensor Single Classifier model...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Nov 2011

    Efficiency Enhancement Techniques for Wireless Communication Systems

    In this paper forward error correction techniques have been analyzed and investigated. It is used to enhance the efficiency and accuracy of information transmitted over a channel. The principle this method is to add some redundancy to the data to be transmitted over a channel. Amongst so many technique of...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Sep 2011

    Dynamic Multi Level Hierarchical Clustering Approach for Sensor Networks

    Wireless sensor networks have the problem of lifetime and scalability. To increase lifetime and scalability it is necessary to have control over topology of the network even when dynamically changes are observed. Dynamic clustering with adaptive feature is the best way to achieve the above. In this paper, the authors...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Feb 2011

    Fuzzy Rules for Document Classification to Improve Information Retrieval

    In this paper, the authors present a method to generate, from text documents, fuzzy rules used to classify documents and to improve the information retrieval. With this method, they face the issue of dimensionality in text documents for information retrieval. They also present a comparison analysis among the method that...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Dec 2010

    Segmentation of Infrared Images and Objectives Detection Using Maximum Entropy Method Based on the Bee Algorithm

    Thresholding is a popular image segmentation method that converts a gray-level image into a binary image. Many thresholding techniques have been proposed in the recent years. Among them, the maximum entropy thresholding has been widely applied. Image entropy thresholding approach has drawn the attentions in image segmentation. In this paper,...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Dec 2010

    Selecting the Most Favourable Edge Detection Technique for Liquid Level Inspection in Bottles

    In this paper few edge detection techniques viz. Optimal & Template Based are compared to inspect the over and under fill liquid level of bottle in machine vision system. The text represents the steps and approaches for the inspection of over and under filled level in the bottle which would...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Nov 2010

    Design and Implementation of Zero-Copy for Linux

    Zero-Copy has been a hot research topic for a long history, which is an underlying technology to support many applications, including multimedia retrieval, data mining, efficient data transferring, and so on. Zero-Copy means during message transmission, there is no data copy among memory segments on any network node. When a...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2009

    A Security Policy and Network Cartography Based Intrusion Detection and Prevention Systems

    During this time when Internet provides essential communication between an infinite numbers of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are now considered a mainstream security technology. IDS...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Nov 2011

    Efficiency Enhancement Techniques for Wireless Communication Systems

    In this paper forward error correction techniques have been analyzed and investigated. It is used to enhance the efficiency and accuracy of information transmitted over a channel. The principle this method is to add some redundancy to the data to be transmitted over a channel. Amongst so many technique of...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    Fuzzy-DDE: A Fuzzy Method for the Extraction of Document Cluster Descriptors

    Good cluster descriptors facilitate the efficient storage and retrieval of information. In particular, when the imprecision and uncertainty of textual information is considered, the extraction of cluster descriptors, which represent the compatibility of a document with a cluster in a more precise way, is a challenging problem. Therefore, in this...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Oct 2012

    Code Clones in Program Test Sequence Identification

    Code clones are portions of source code which are similar to the original program code. The presence of code clones is considered as a bad feature of software as the maintenance of software becomes difficult due to the presence of code clones. Methods for code clone detection have gained immense...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // May 2012

    Secure Auditing and e-Commerce

    Information society has produced new concepts in human relationships that give raise to e-systems that organize or promote wider relationships and activities such as e-commerce, e-learning or e-governance. This paper deals with the necessity of protecting information in the auditing process mainly in the actual e-society characterized for the continuous...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Feb 2013

    Observation-Based Fine Grained Access Control of Data

    In this paper, the authors propose an Observation-based Fine Grained Access Control (OFGAC) mechanism where data are made accessible at various levels of abstractions according to their sensitivity levels. In this setting, unauthorized users are not able to infer the exact content of the confidential data, while they are allowed...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Feb 2011

    Fuzzy Rules for Document Classification to Improve Information Retrieval

    In this paper, the authors present a method to generate, from text documents, fuzzy rules used to classify documents and to improve the information retrieval. With this method, they face the issue of dimensionality in text documents for information retrieval. They also present a comparison analysis among the method that...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2009

    A Security Policy and Network Cartography Based Intrusion Detection and Prevention Systems

    During this time when Internet provides essential communication between an infinite numbers of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are now considered a mainstream security technology. IDS...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Sep 2011

    Dynamic Multi Level Hierarchical Clustering Approach for Sensor Networks

    Wireless sensor networks have the problem of lifetime and scalability. To increase lifetime and scalability it is necessary to have control over topology of the network even when dynamically changes are observed. Dynamic clustering with adaptive feature is the best way to achieve the above. In this paper, the authors...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // May 2012

    Towards the Evolution of Publish/Subscribe Internetworking Mechanisms With PSIRP

    Despite its enormous success, the current Internet's architecture has not evolved in a scalable manner. There are many issues concerning simple services that need complex network systems in order to work. Future Internet architectures are candidates to solve some of the problems related to the current Internet. This paper describes...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    Fault Tree Analysis Speed-Up With GPU Parallel Computing

    The reliability analysis of critical systems can be performed using fault tree analysis. One of the common approaches used for fault tree analysis is Monte Carlo simulation. The purpose of this paper is therefore to show an algorithm to speed up Monte Carlo simulation for analyzing fault tree with parallel...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    Model-Driven Security: From Theory to Application

    As a specialization of model-driven architecture, Model-Driven Security (MDS) is an approach that uses models to capture and represent a system's architecture and security requirements in software development. Through layers of abstraction, system designers and developers can leverage simple and abstract models to design large and complex systems and generate...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    A Framework for Process and Performance Management in Service Oriented Virtual Organizations

    Virtual Organization (VO) is a network of autonomous organizations sharing their competitive advantage to address a specific business opportunity. Due to autonomy of partners and the temporal and dynamic nature of VOs, collaborative VO management is crucial to its success. In addition, performance measurement plays an important role in non-centralized...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    Toward Next Generation E-Marketplace for Small Business

    This paper is to shift the e-marketplaces' focus from search-oriented matching, toward assistance-providing business matching systems for the next generation e-marketplaces for small business. By addressing the issue of business-matching and recommending in business-to-business e-marketplaces, through the use of Collective Intelligence (CI) means. To make the most of CI's capabilities,...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    Personalization on E-Content Retrieval Based on Semantic Web Services

    In the current educational context there has been a significant increase in Learning Object Repositories (LOR), which are found in large databases available on the hidden web. All these information is described in any metadata labeling standard (LOM, Dublin Core, etc). It is necessary to work and develop solutions that...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jun 2012

    Resource Allocation and Resource Leveling in Heterogeneous SANET Environments

    Actual research projects in the field of wireless communication systems focus on distributed, heterogeneous architectures for advanced Sensor-Actor-NETworks (SANETs). Each subsystem provides specific capabilities for measuring or manipulating its environment. At the same time, a huge amount of sensor, status and control data has to be transmitted over different network...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jan 2012

    Human Activity Monitoring With Wearable Sensors and Hybrid Classifiers

    Activity monitoring plays a crucial role in ambient living environments for assessing changes in the normal behavioral pattern of elderly people. In this paper, the authors present an action description and detection mechanism for real-time activity monitoring using wearable sensors and hybrid classifiers. First a Single Sensor Single Classifier model...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jul 2012

    Aspect-Oriented Trust Based Mobile Recommender System

    With the rapid advancement of wireless technologies and mobile devices, service recommendations have become a crucial and important research area in mobile computing. Although various recommender systems have been developed to help users to deal with information overload, few systems focus on personalized trustworthy recommendation generation for mobile users. In...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    Data Mining and Wireless Sensor Network for Groundnut Pest/Disease Interaction and Predictions - A Preliminary Study

    Data driven precision agriculture aspects, particularly the pest/disease management, require a dynamic crop-weather data. An experiment was conducted in semi-arid region of India to understand the crop-weather-pest/disease relations using wireless sensory and field-level surveillance data on closely related and interdependent pest (Thrips) - disease (Bud Necrosis) dynamics of groundnut (peanut)...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    Link Distance Link Cost Link Error Based Energy Efficient Cross Layer Reliable Routing for Wireless Sensor Network

    In this paper, a new energy efficient cross layer routing protocol is introduced for Wireless Sensor Networks (WSNs). Energy consumption and routing is the most challenging and demanding in designing routing protocol for WSNs. The authors develop LDCE routing protocol based on (Link Distance, link Cost and link Error). The...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    Design Coordination Using Cloud-Based Smart Building Element Models

    Construction industry involves a multitude of stakeholders who perform their project-centric work from various dispersed locations. This involvement of numerous stakeholders, which is common in the construction industry compared to the other industries, has led to fragmentation of the design process. The limitations and complexities resulting from this fragmentation can...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    Genetic Algorithm and Fuzzy-Rough Based Dimensionality Reduction Applied on Real Valued Dataset

    Real-world datasets are often vague and redundant, creating problem to take decision accurately. Very recently, Rough-set theory has been used successfully for dimensionality reduction but is applicable only on discrete dataset. Discretisation of data leads to information loss and may add inconsistency in the datasets. The paper aims at applying...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Aug 2012

    QoS4WSC: A Framework for Web Services Composition Based on QoS Constraints

    Web Services Composition (WSC) is a paradigm for enabling application integration within and across organizational boundaries. Nowadays, the main challenges of WSC in environment like Internet are to ensure high quality execution. Former works on service composition have enabled the elaboration of the BPEL4WS standard. Nevertheless, the management of the...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Jul 2012

    Ontology Exemplification and Modeling for ASPOCMS in the Semantic Web

    Ontology can not only describe the workflow data of the any university more easily understood by computers in semantic encoding scenario, but can also integrate users data from different sources and in different forms for reasoning. Workflow technology promises to increase the efficiency in the execution of workflow based processes....

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Oct 2012

    Network Traffic Monitoring and Control for Multi Core Processors in Cloud Computing Applications

    Parallel Programming (PP) used to be an area is confined to scientific and cloud computing applications. However, with the proliferation of multicore processors, parallel programming has definitely become a mainstream of concern. To satisfy the requirement, one can leverage multi-core architectures to parallelize traffic monitoring so as to progress information...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Mar 2012

    Quantization of Sparse and Dense Mode Protocols in Ring Topology Networks

    This paper provides analytical tools to assess the improvements of existing, modified or entirely new multicast protocols at an early stage of design. In particular, the authors investigate the general properties of Sparse Mode (SM) and Dense Mode (DM) protocols and their variants. Specifically, they quantify the performance of these...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Nov 2010

    Design and Implementation of Zero-Copy for Linux

    Zero-Copy has been a hot research topic for a long history, which is an underlying technology to support many applications, including multimedia retrieval, data mining, efficient data transferring, and so on. Zero-Copy means during message transmission, there is no data copy among memory segments on any network node. When a...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Dec 2010

    Segmentation of Infrared Images and Objectives Detection Using Maximum Entropy Method Based on the Bee Algorithm

    Thresholding is a popular image segmentation method that converts a gray-level image into a binary image. Many thresholding techniques have been proposed in the recent years. Among them, the maximum entropy thresholding has been widely applied. Image entropy thresholding approach has drawn the attentions in image segmentation. In this paper,...

    Provided By Machine Intelligence Research Labs (MIR Labs)

  • White Papers // Dec 2010

    Selecting the Most Favourable Edge Detection Technique for Liquid Level Inspection in Bottles

    In this paper few edge detection techniques viz. Optimal & Template Based are compared to inspect the over and under fill liquid level of bottle in machine vision system. The text represents the steps and approaches for the inspection of over and under filled level in the bottle which would...

    Provided By Machine Intelligence Research Labs (MIR Labs)