You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

Soft computing and intelligent systems: Techniques and applications

This special issue is a collection of selected papers submitted to the Third International Symposium on Intelligent Systems Technologies and Applications (ISTA’ 17) held in Manipal University, India, during September 13-16, 2017. These papers have been peer reviewed and accepted for presentation at the symposium. A second review has been conducted to improve content and presentation of the manuscripts published in this special issue. The 48 papers cover a wide range of powerful techniques and current applications of soft computing and intelligent systems.

The International Symposium on Intelligent Systems Technologies and Applications aims to bring together researchers in related fields and provides a venue to explore and discuss various aspects of intelligent systems technologies and their applications. It provides excellent opportunities for the presentation and discussion of interesting new research results, which contributes to effective transfer of knowledge and dissemination of innovative ideas.

Listed is a summary of the contributions of the papers pertaining to various application domains:

Cybersecurity is an important concern for every organization. In this special issue, twelve papers deal with intrusion detection, integrity, and confidentiality. In [1], the authors describe an intrusion detection system for wireless mesh networks that identifies intrusion activities using a support vector machine classifier. The proposed method employs a hybrid genetic algorithm and a mutual-information technique for feature selection. In [2], a scheme is proposed to provide a secure outsourcing solution for the matrix-chain multiplication problem in cloud computing. For preserving data confidentiality, the client employs few linear transformation schemes. The proposed verification scheme helps to maintain the integrity of the computed result. In [3], the authors evaluate the efficiency of various deep learning methods to detect and classify domain names as either malicious or benign by automatically extracting the required features thus reducing the burden of manual feature engineering approaches. In [4], the effectiveness of recurrent neural network (RNN) and its variant long short-term memory (LSTM) is analyzed for Android malware detection of time-varying sequences of benign and malicious applications. This paper also provides a comparative analysis with other machine-learning classifiers. In [5], the authors propose a data-driven intrusion detection system for Industrial Internet of Things (IIoT) to hybridize both anomaly and specification-based schemes. In [6], an intelligent monitoring technique for smart grid security assessment using interleaved index is proposed. In [7], a dual encryption methodology using an optimal asymmetric encryption and a probabilistic approach is proposed for balancing both security and efficiency of the binding update for IPv6 mobility. In [8], the security of a chaotic system based image encryption algorithm is evaluated to reveal its unknown defects using chosen-plaintext and known-plaintext attacks. In [9], deep learning is employed for detecting malicious URLs. In [10], a scheme is proposed for secure information retrieval in the cloud. In this approach, the keywords extracted from the documents are distributed into different buckets and during the search process each search query is compared with the document indexes within appropriate buckets. In [11], the authors investigate the event data generated by the Domain Name System (DNS) Internet protocol for the purpose of Cyber threat situational awareness. Deep learning has been employed to classify the domain name as either benign or malicious. In [12], the authors present an extended taxonomy of intrusion detection systems and review the state-of-the-art techniques of related data pre-processing.

Biometrics technology is widely used as a security measure for verifying identity and detecting criminals. This special issue includes five papers on biometrics. In [13], speech data have been collected from various scenarios and a speaker identification system is developed. Based on the study, the authors conclude that performance degrades when mismatching occurs in training and testing sensors. In [14], a system level design for Hierarchical Temporal Memory (HTM) that exploits the combination of a memristive crossbar based Spatial Pooler and a conceptual analog Temporal Memory is presented. In [15], the authors propose a secured authentication protocol for remote Internet of Things (IoT)-based services. Another interesting idea is presented in [16] to detect face spoofing attacks by extracting various feature descriptors concatenated and classified by Logistic Regression. In [17], an automatic tongue-print identification method is proposed. The texture patterns are extracted from tongue images using the Local Binary Pattern (LBP) texture representation method.

Natural Language Processing (NLP) is an interdisciplinary area that is mainly applied for improving communication between humans and machines. Four papers in this special issue deal with issues related to NLP. In [18], a novel spell checker for the Malayalam language using deep learning is implemented. The tool comprises of both error detection and error correction. In [19], a mechanism for extracting named entities in Tamil Tweets is proposed. The system extracts Tamil texts from Twitter, tags unlabelled corpora and experiments with tri-gram embedding in word and glove model. In [20], attention-based mechanism is employed for developing English to Punjabi neural machine translation system. The work also includes a parallel corpus for English-Punjabi language pair. In [21], a new authorship analysis technique using style word pattern identification is proposed. The method enables identification of author traits in case of authors belonging to the same domain of interest thus providing a mechanism to resist manipulations of online posting activities.

Three papers are related to control and robotics. In [22], a design of a novel Nonlinear Fractional Proportional-Integral-Derivative (NLF-PID) for control of a two-link rigid manipulator is presented. The controller is developed by cascading a hyperbolic function of instantaneous state and current error with linear FO-PID scheme. In [23], a self-learning adaptive and optimal Lyapunov fuzzy Markov game controller for safe and stable tracking control of two-link robotic manipulators is proposed. In [24], the authors use Interval Type-2 fuzzy logic controller design to control chaos and associated instability in a nonlinear dynamical power system.

Another important area in decision making are the recommendation systems that provide suggestions based on previous usage behaviour. In [25], the authors present a recommender system that utilizes clickstream data. The proposed system predicts the preferences for the products clicked by the customers with the help of machine learning classifiers. In [26], the authors propose a community-based hashtag recommender system for twitter users. The work applies sentiment analysis for community detection using collaborative filtering. In [27], a parallel proactive cross-domain recommender system that helps to accelerate the computation in the multi-agent environment is proposed. In [28], the authors define fuzzy soft cardinality and fuzzy soft relative cardinality and discuss the related properties. Finally, the lattice ordered fuzzy soft group is applied in decision-making problems to find suitable solutions. In [29], a hybrid credit scoring model based on Neighborhood Rough Set and layered ensemble classification with weighted voting is proposed for computing the credit score.

Nine papers in this special issue discuss optimization and nature-inspired techniques. In [30], a scheme based on ant colonies for solving the load imbalance problem in multiprocessor environments is proposed. In [31], a power efficient scheduling and Virtual Machine (VM) Consolidation algorithm is proposed for effectively managing energy resources. In [32], a population-based nature-inspired optimization algorithm that simulates the hunting mechanism of barn owls is proposed. In [33], the authors present an extended version of Teaching Learning Based Optimization (TLBO) for enhancing the exploration and exploitation capacities by introducing the concept of Neighbour Learning strategy. In [34], a privacy-preserving collaborative e-healthcare system that employs a k-centroid multi-view point clustering scheme is proposed. In [35], the authors propose a multi-directional model for rule analysis and risk prediction of any disease based on input parameters. In [36], a top down semi-supervised subspace clustering is proposed to identify a subset of important attributes based on the known label for each data instance. In [37], the authors propose a training method that employs Deep Neural Networks (DNNs) to map the sensory data into a representation space aligned with human concepts. The DNNs become interpretable with human knowledge and become easy to be trained by a small amount of training data with prior knowledge. In [38], an algorithm for finding the all-pair shortest-path using the transitive closure property that reduces the number of iterations in finding the path is proposed.

Seven papers in this special issue address important problems in image and signal processing areas. In [39], a memristor-based circuit design that exhibits parallel processing capabilities and neuromorphic architectures to perform G-neighborhood selection for image denoising applications is proposed. In [40], the authors applied two classification techniques on electroencephalogram (EEG) signals to diagnose epileptic seizure by extracting various time and frequency domain features. In [41], region and texture features are employed for image forgery detection. These features are optimized using Non-Negative Matrix Factorization and fed to a Support Vector Machine for classification. In [42], LWT based watermarking scheme incorporating an artificial neural network (ANN) for digital watermark extraction is proposed. In [43], the authors propose a two-step approach using Variational Mode Decomposition and l1 trend filter for enhancing speech signals degraded by white Gaussian noise. In [44], an eye gaze-based optic disc detection system is proposed to detect the optic disc (OD) using eye-gaze tracking along with an image-processing technique. In [45], the effect of gravitational perturbation forces on the orbital elements is discussed. Based on several experimental results, the authors conclude that the variations in semi-major axis affect the spatial representation of selected features registered in the satellite image data that have a direct bearing on the gravity-based perturbation forces.

Three papers are related to the software engineering field. In [46], a modelling framework for automotive software design and optimal test path generation scheme is proposed. In [47], the authors propose a fuzzy-based recommendation system that recommends programming skills and competency level of individuals based on eye movement data. In [48], the authors primarily explore the capability of evolution-based metrics when used in conjunction with object-oriented metrics for ascertaining change prone nature of classes. Four possible scenarios were evaluated for predicting change prone. The study also evaluates the use of seven machine learning techniques to determine change prone nature of classes in object-oriented software.

In conclusion, this special issue would not have been possible without the help of many people. As guest editors, we would like to take this opportunity to thank the authors for their contributions and the reviewers for their invaluable comments and timely responses. We would also like to thank the JIFS Editor-in-Chief and staff for their support during the preparation and production of this special issue.

References

[1] 

Vijayanand R. , Devaraj D. and Kannapiran B. , A novel IDS for WMNwith hybrid feature selection technique based on GA and MI, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[2] 

Kumar M. and Vardhan M. , Data confidentiality and integrity preserving outsourcing algorithm for matrix chain multiplication over malicious cloud server, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[3] 

Vinayakumar R. , Soman K.P. , Poornachandran P.P. and Kumar S.S. , Evaluating deep learning approaches to characterize and classify the DGAs at scale, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[4] 

Vinayakumar R. , Soman K.P. , Poornachandran P.P. and Kumar S.S. , Detecting Android malware using long short-term memory (LSTM), Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[5] 

Madhawa S. , Balakrishnan P. and Arumugam U. , Data driven intrusion detection system for software defined networking enabled IIoT, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[6] 

Nangrani S. and Bhat S. , Smart grid security assessment using intelligent technique based on novel chaotic performance index, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[7] 

Senthilkumar M. and Srilakshmy K. , An optimized and secure BUTE - binding update protocol using twofold encryption for next generation IP mobility, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[8] 

Ahmad M. , Alam M.Z. , Ansari S. , Lambić D. and Al-Sharari H. , Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[9] 

Vinayakumar R. , Soman K.P. and Poornachandran P.P. , Evaluating deep learning approaches to characterize and classify malicious URL’s, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[10] 

Handa R. , Krishna C.R. and Aggarwal N. , An efficient approach for secure information retrieval on cloud, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[11] 

Vinayakumar R. , Soman K.P. and Poornachandran P.P. , Detecting malicious domain names using deep learning approaches at scale, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[12] 

Al-Utaibi K. and El-Alfy E.-S.M. , Intrusion detection taxonomy and data preprocessing mechanisms, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[13] 

Srivastava S. , Chaudhary G. and Bhardwaj S. , Multi-scenario dataset for speaker recognition, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[14] 

James A.P. , Krestinskaya O. , Ibrayev T. , Myrzakhan U. and Irmanova A. , On-chip face recognition system design with memristive hierarchical temporal memory, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[15] 

Roy S. , Chatterjee S. and Mahapatra G. , An efficient biometric based remote user authentication scheme for secure internet of things environment, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[16] 

Mohanraj V. , Chakkaravarthy S.S. , Gogul I. , Vaidehi V. , Kumar S. and Kumar R. , Hybrid feature descriptors to detect face spoof attacks, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[17] 

Sivakumar T. , Nair S. , Geevar C. , Nair M.S. and Joseph A. , Identification of tongue print images for forensic science and biometric authentication, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[18] 

Sudhakaran S. , Manjusha K. , Kumar A.M. and Soman K.P. , Deep learning based spell checker for Malayalam language, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[19] 

Remmiya G. , Kumar A.M. and Soman K.P. , Co-occurrence based word representation for extracting named entities in Tamil tweets, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[20] 

Sokhey S.S. , Kumar A.M. and Soman K.P. , Attention based English to Punjabi neural machine translation, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[21] 

Athira U. and Thampi S.M. , An author-specific model-based authorship analysis using psycholinguistic aspects and style word patterns, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[22] 

Mohan V. , Chhabra H. , Rani A. and Singh V. , Robust selftuning fractional order PID controller dedicated to non-linear dynamic system, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[23] 

Kumar A. , Sharma R. and Varshney P. , Lyapunov fuzzy Markov game controller for two link robotic manipulator, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[24] 

Nangrani S. , Singh A.R. and Chandan A. , Chaos driven instability control using interval type-2 fuzzy logic controller for better performance, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[25] 

Gupta S. and Dixit V.S. , Scalable online product recommendation engine based on implicit feature extraction domain, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[26] 

Sharma C. and Bedi P. , Community based hashtag recommender system (CHRS) for twitter, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[27] 

Singh R. and Bedi P. , Parallel proactive cross domain context aware recommender system, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[28] 

Jayakumar J.V. , Reeta A. and Ilamathi V.S.A. , A study on fuzzy soft cardinality in lattice ordered fuzzy soft group and its application in decision-making problems, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[29] 

Tripathi D. , Edla D.R. and Cheruku R. , Hybrid credit scoring model using neighborhood rough set and multi-layer ensemble classification, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[30] 

Ahmed K. , El-Alfy E.-S.M. and Awad W. , Ant colony inspired method for reducing load imbalance in multiprocessor systems, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[31] 

Narayanan M. , Govardhanan K. , Balakrishnan P. and Chellaiah P.R. , Energy efficient workflow scheduling with virtual machine consolidation for green cloud computing, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[32] 

Jain M. , Maurya S. , Rani A. and Singh V. , Owl search algorithm a novel nature-inspired heuristic paradigm for global optimization, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[33] 

Kumar M. , Shukla A. , Singh P. and Vardhan M. , Neighbour teaching learning based optimization for global optimization problems, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[34] 

Kakarla C. and Nagarajan S.K. , An optimal cloud-based ehealthcare system using k-centroid MVS clustering scheme, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[35] 

Mathew T. , Elizabeth S. and Alcantud J.C. , A multimodal adaptive approach on soft set based diagnostic risk prediction system, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[36] 

Harikumar S. and Akhil A.S. , Semi-supervised approach towards subspace clustering, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[37] 

Dai Y. , Wang G. and Li K.-C. , Conceptual alignment deep neural networks, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[38] 

Gayathri G. and Nair J.J. , ex-FTCD: A novel mapreduce model for distributed multi-source shortest path problem, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[39] 

James A.P. , Aliakhmet K. , Sadykova D. and Mathew J. , Memristive system design for variable pixel g-neighbor denoising filter, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[40] 

Narang A. , Batra B. , Ahuja A. , Yadav J. and Pachauri N. , Classification of EEG signals for epileptic seizures using Levenberg-Marquardt algorithm based multilayer perceptron neural network, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[41] 

Isaac M. and Wilscy M. , Image forgery detection using regionbased rotation invariant co-occurrences among adjacent LBPs, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[42] 

Islam M. , Roy A. and Laskar R. , Neural network based robust image watermarking technique in LWT domain, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[43] 

Gowri G.B. and Soman K.P. , Enhancement of white Gaussian noise affected speech using vmd-‘1 trend filter method, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[44] 

Kulkarni N. and Amudha J. , Eye gaze-based optic disc detection system, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[45] 

Sundaram G.A.S. and Reshma R. , Influence of orbital perturbations due to non-spherical earth shape on the landsat multispectral imaging platform, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[46] 

Kaur P. and Sobti R. , A modelling framework for automotive software design and optimal test path generation, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[47] 

Chandrika K.R. and Amudha J. , A fuzzy inference system to recommend skills for source code review using eye movement data, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press.

[48] 

Malhotra R. and Khanna M. , Prediction of change prone classes using evolution- based and object-oriented metrics, Journal of Intelligent & Fuzzy Systems (JIFS) (2018). IOS Press