{"title":"A Survey to Nature Inspired Soft Computing","authors":"Deepak Kumar, Sushil Kumar, Rohit Bansal, Parveen Singla","doi":"10.4018/IJISMD.2017040107","DOIUrl":"https://doi.org/10.4018/IJISMD.2017040107","url":null,"abstract":"This article describes how swarm intelligence (SI) and bio-inspired techniques shape in-vogue topics in the advancements of the latest algorithms. These algorithms can work on the basis of SI, using physical, chemical and biological frameworks. The authors can name these algorithms as SI-based, inspired by biology, physics and chemistry as per the basic concept behind the particular algorithm. A couple of calculations have ended up being exceptionally effective and consequently have turned out to be the mainstream devices for taking care of real-world issues. In this article, the reason for this survey is to show a moderately complete list of the considerable number of algorithms in order to boost research in these algorithms. This article discusses Ant Colony Optimization (ACO), the Cuckoo Search, the Firefly Algorithm, Particle Swarm Optimization and Genetic Algorithms in detail. For ACO a real-time problem, known as Travelling Salesman Problem, is considered while for other algorithms a min-sphere problem is considered, which is well known for comparison of swarm techniques.","PeriodicalId":289800,"journal":{"name":"Int. J. Inf. Syst. Model. Des.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134360657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Discover the Stable Routes in BGP Confederations","authors":"S. Shukla, Mahesh Kumar","doi":"10.4018/IJISMD.2017040108","DOIUrl":"https://doi.org/10.4018/IJISMD.2017040108","url":null,"abstract":"","PeriodicalId":289800,"journal":{"name":"Int. J. Inf. Syst. Model. Des.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131328483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Texture Classification Using Local Binary Pattern and Its Variants","authors":"Richa Sharma, M. Lal","doi":"10.4018/IJISMD.2017040103","DOIUrl":"https://doi.org/10.4018/IJISMD.2017040103","url":null,"abstract":"","PeriodicalId":289800,"journal":{"name":"Int. J. Inf. Syst. Model. Des.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor Network","authors":"Nagesh Kumar, Yashwant Singh, P. Singh","doi":"10.4018/IJISMD.2017040102","DOIUrl":"https://doi.org/10.4018/IJISMD.2017040102","url":null,"abstract":"As the wireless sensor networks (WSN) are gaining popularity the need of reliable delivery of data packets becomes more important. The reliable delivery is only possible when the routing protocols are efficient and secure. Because of lack of resources it is not possible to use existing cryptosystems to provide security in WSN. But, trust aware routing can provide the security with lesser resources, which become popular in last three to four years. In this paper, a new energy efficient and trust aware reliable opportunistic routing (TAEROR) protocol is proposed. The protocol consists of a trust metric and also a relay selection algorithm. The trust aware metric detects the malicious nodes on the basis of forwarding sincerity, energy consumption and acknowledgement sincerity. Relay selection algorithms avoid these malicious nodes to get selected in the routing process. The protocol is simulated and compared to existing trust aware routing protocols. Proposed protocol TEAROR presents better results than the other compared protocols.","PeriodicalId":289800,"journal":{"name":"Int. J. Inf. Syst. Model. Des.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126474745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient and Congestion Aware Fuzzy Based Output Selection Strategy for On-Chip Routers","authors":"Ashima Arora, N. Shukla","doi":"10.4018/IJISMD.2017040104","DOIUrl":"https://doi.org/10.4018/IJISMD.2017040104","url":null,"abstract":"","PeriodicalId":289800,"journal":{"name":"Int. J. Inf. Syst. Model. Des.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129941349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Verbalization of ORM Models in Malay and Mandarin","authors":"Shin Huei Lim, T. Halpin","doi":"10.4018/IJISMD.2016100101","DOIUrl":"https://doi.org/10.4018/IJISMD.2016100101","url":null,"abstract":"Fact-oriented modeling approaches such as Object-Role Modeling ORM include a rich graphical notation for capturing business constraints, allowing modelers to visualize fine details of their data models. These data models should be validated with domain experts who best understand the business requirements, even if unfamiliar with the graphical notation. Hence, the data models are best validated by verbalizing the models in a controlled natural language, and by populating the relevant fact types with examples. Comparatively little support exists for verbalizing fact-based models in non-English languages, especially Asian languages. This paper describes the authors' work on verbalizing ORM models in Bahasa Melayu Malay and Mandarin. The authors specify some typical transformation patterns, discuss features of these languages requiring special treatment e.g. noun classifiers, repositioning of modal operators, and different uses for terms equivalent to \"who\" and \"that\" in English, and describe their current implementation efforts.","PeriodicalId":289800,"journal":{"name":"Int. J. Inf. Syst. Model. Des.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126726166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bridging Services and Resources with Structural Services","authors":"J. Delgado","doi":"10.4018/IJISMD.2016100105","DOIUrl":"https://doi.org/10.4018/IJISMD.2016100105","url":null,"abstract":"The most used approaches for distributed application integration are based on the Service-Oriented Architecture SOA and Representational State Transfer REST architectural styles. Each is more adequate to a different class of applications and exhibits advantages and disadvantages. This paper not only shows that they are dual architectural styles, SOA oriented towards behavior services and REST towards state structured resources, but also contends that it is possible to combine them to maximize the advantages and to minimize the disadvantages. A new architectural style, Structural Services, is proposed and described. Unlike REST, resources are not constrained to offer a fixed set of operations and, unlike SOA, services are allowed to have structure. To minimize resource coupling, this style uses structural interoperability based on the concepts of structural compliance and conformance, instead of schema sharing as in SOA or standardized and previously agreed upon media types as in REST.","PeriodicalId":289800,"journal":{"name":"Int. J. Inf. Syst. Model. Des.","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116391681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}