You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

Soft computing and intelligent systems: Techniques and applications

This special issue is composed of a collection of selected papers presented at the Fifth International Symposium on Intelligent Systems Technologies and Applications (ISTA’19) that was organized in association with Springer, Germany and IOS-Press, Netherlands. ISTA’19 was co-affiliated with the International Conference on Applied Soft computing and Communication Networks (ACN’19), held in Trivandrum, Kerala, India during December 18–21, 2019. The Symposium brought together researchers in related fields and provided a venue to explore and discuss various aspects and recent advances in the area of intelligent systems technologies and applications. It offered an excellent opportunity for the presentation and discussion of interesting new research results, which contributed to effective dissemination and transfer of knowledge.

Included in this special issues are 50 selected papers covering topics pertaining to the application of soft computing and computational intelligence techniques to a wide spectrum of issues in the areas of image processing and computer vision, natural language processing, pattern recognition, biometric identification, security systems and data encryption, cloud computing, control systems, and network design.

Several papers in this special issue have addressed natural language processing. Contribution [1] describes a technique for solving the word sense disambiguation using combinatorial particle swan optimization. A multi-document summarization technique proposed in [2] is based on the integration of regression and topic-based models to improve the reported results. Sentiment analysis of social media data is an evolving area in natural language processing in recent years. Several machine learning algorithms [3] are compared for imbalanced learning of sentiment polarity as a tool to understand the opinions of participants in social media. An automated genre-based sentiment lexicon is proposed in [4] to address the challenge due to variation in sentiments across multiple domains. Another important related area due to the explosive growth of online information is using recommendation systems to filter information in activities such as watching videos and movies, tourism and traveling, as well as food and restaurants. In [5], the researchers developed a system that combines social factors such as trust and reputation to determine influential users in cross domain group recommender systems.

Another vital area is pattern recognition and visual computing. A computationally and storage efficient method is presented in [6] for recognizing human activities from depth videos. A more accurate, time and cost-effective ensemble machine learning is proposed in [7] for recognition of coal category from microscopic images. The identification of landmark features in retinal fundus photograph such as optic disc (OD) is of high prognostic significance in diagnosing various ophthalmic diseases. In [8], a fully convolutional neural network framework is proposed for the localization of optic disc based on the underlying architecture of YOLOv3. Automatic separation and classification of tumors in ultrasound images is difficult due to the noisy and low contrast nature of the image. A proposed evolutionary intelligence method [9] is invariant to scale changes and does not require an operator defined initial region of interest. A layered approach is described in [10] for deploying live video surveillance with a deep learning strategy to detect elephants and mitigate the problem of human-elephant conflict in rural areas of India. A study in [11], proposed to develop a system to support a psychologist to understand the participant performance in a trail making test, which is a cognitive impairment test used for understanding the visual attention during a visual search task. Another problem addressed in this special issue related to scene understanding and exploration is the target search problem using a fuzzy-based system to predict the salient locations in an image for visual attention [12]. The algorithm described in [13] aims to detect localized edges in noisy images without duplicate and integrating them into meaningful object boundaries.

Signal processing and speech analysis are active fields that have received great interest in many applications. In [14], the authors utilized speech cues represented by excitation source features, voice quality features, and prosodic features to identify patients affected by a vital neurodegenerative condition of Parkinson disease (PD) from healthy individuals who have no history of such disorder. Two machine learning classification techniques (random forest and support vector machine) have been evaluated using a Parkinson’s database from the University of California Irvine (UCI) Machine Learning repository. A cascade of two deep-learning architecture is proposed in [15] for accent identification. The model has been developed and tested on common voice datasets with five popular English accents: India, Australia, US, England, and Canada. In [16], a random kitchen sink based approach is proposed for music-speech classification using temporal and spectral features achieving scores comparable to other methods reported in the literature. Acquiring and processing brain signals to understand students concentration may have a great impact on education. A case study presented in [17] analyzes the influence of practicing Yoga on the concentration levels of engineering students. Underwater acoustics poses several challenges that attracted increasing attention to address problems such as sensors sensitivity, sound intensity measurement, and target localization. The authors of [18] propose to enhance the fiber optic hydrophone sensitivity by varying parameters as demonstrated through analytical results. Another interesting problem is addressed in [19] where a hybrid architecture that performs multiple transforms of digital signals such as Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), Discrete Sine Transform (DST), and Discrete Wavelet Transform (DWT) was proposed. The designed architecture produces output of transform sequence in order and may be used to handle large sized transforms by repeatedly using fixed size architecture for a large number of points without increasing the number of processing elements.

Security and digital forensic represent several challenges that have attracted significant research efforts. With the availability of powerful image editing tools, manipulating images to change their content is becoming a concern. Image integrity and forgery detection are addressed in [20] using deep textural features from Local Binary Pattern (LBP) map. Benchmarking the proposed methodology is reported using four datasets (CASIA v1.0, CASIA v2.0, CUISDE, and IFS-TC). Information hiding in digital images is another important issue in data security. A novel technique with high payload is presented in [21] for hiding confidential messages in encrypted images while enabling separate image recovery and information extraction. The test results show high embedding capacity with 100% restoration of cover images and extraction of secret information. Biometric identification is addressed in [22, 23]. In [22], the authors propose a deep learning approach for an emerging biometric trait using tongue print identification based on the remarkable success of convolutional neural networks for feature extraction and pattern recognition. A dataset is also created for testing the proposed approach. The approach in [23] targets face recognition in unconstrained environment where images are affected by various types of occlusion. A multi-biometric cryptosystem is presented in [24] for safe and secure cloud authentication mechanism. Outsourcing data and computation to the third-party cloud servers brings multifarious security and privacy challenges. In [25], an improved algorithm is proposed for secure outsourcing of matrix multiplication to minimize the execution burden without sacrificing the confidentiality and integrity of the inputs and outputs. The theory of algebraic hyperstructures has many application including cryptography. In [26], the authors propose the concept of fuzzy hyperlattice ordered group.

Transferring digital images over the network is susceptible to various types of attacks including cropping, JPEG compression, median filtering, Gaussian blur noise, rotation, and salt & pepper noise. In [27], the researchers propose a method for digital image watermarking based on a combination of artificial neural networks and advanced encryption and decryption technique to provide copyright protection and security to digital bank cheque images. Wireless sensor networks are widely deployed in many applications for monitoring environments. A major concern in such networks is the secure and accurate communication of aggregated data. In [28], a cluster based method is proposed for confidentiality and integrity of concealed data aggregation in wireless sensor networks. The proposed method uses Elliptic Curve Cryptography-based Elgamal additive homomorphic encryption scheme for providing confidentiality and integrity. A nonce reuse/misuse resistance authentication encryption technique for better security bounds on modern TLS Cipher Suites and QUIC (Quick UDP Internet Communications) based Web Servers was used in [29]. Exploration of sensitive information retrieved from cloud databases is addressed in [30] where the authors present a homomorphic encryption approach that allows cloud servers to respond to queries while preserving privacy.

With the increasing popularity of speech recognition applications such as Alexa, Google Home, and Cortana, voice user interfaces (VUIs) are becoming common to interact with smartphones and consumer products. In [31] a prototype, known as GEORGIE, is used to achieve novel means of interaction inspired by the principles of hypnotherapy (a discrete interface ensuring that end-users’ privacy is not compromised). Malicious software such as viruses automatically evolve to evade popular anti-malware scanners. Evolutionary algorithms are utilized in [32] to mutate the timid virus with a simple code evasion strategy to generate authentic variants of the malware. Distributed denial of service (DDoS) is one the notable threats in computer and network security during the past decade. It occurs when multiple machines generate massive amount of traffic to attach a specific target. In [33], a high scalable Spark streaming-based distributed and real-time DDoS detection system is proposed using k-means clustering algorithm. An improved method based on particle swan optimization to solve the tradeoff among the conflicting objectives in intrusion detection systems is descibed in [34].

Several articles in this special issue have addressed the design of optimal solutions for a variety of applications. In [35], the authors propose a multiobjective optimization model to reduce delay and energy consumption in vehicular fog computing (VFC). The results reveal superiority of the proposed VFC framework over generic cloud platforms. The approach in [36] applies unsupervised machine learning techniques based on fuzzy c-means++ clustering algorithm for designing routing protocol in wireless sensor networks with low power consumption. The growing number of nodes in wireless sensor networks require that architectures maintain low-power consumption per-node to comply with energy guaranty acceptable network lifetime. In [37], the authors propose to optimize the length of the mobile sink’s traveling path to reduce the delay during data gathering in large-scale wireless sensor networks. An optimal data storage hosting model for multi-cloud environments using Sugeno-type fuzzy inference system that selects the appropriate storage type by considering the users’ purpose and nature of usage in a cost-effective way was proposed in [39]. The study in [40] introduces a novel and efficient L-band log-periodic spiral antenna array design in radio interferometry for synthesis imaging.

An intelligent autonomous navigation system for unmanned aerial vehicles (UAV) in randomly changing complex environments is described in [41]. Road accidents in developing countries are increasing at an alarming rate. A case study presented in [42] develops a prediction model for road accidents in the State of Haryana, India using machine learning technique. Data mining and knowledge discovery has significant applications using medical and biological datasets. The study in [43] identifies an optimal subset of relevant features by integrating ReliefF and correlation feature selection techniques. Several optimization paradigms have been inspired from nature. A new modification of Moth-Flame Optimization is described in [44] by adding the concept of orthogonality in order to improve the performance for global optimization. Many complex real-world problems may be modeled using graphs. In [45], the authors present a link prediction model using topological feature extraction based on a geodesic distance measure. Another approach presented in [46] improves the performance of nature-inspired Spotted Hyena Optimizer through the combination of oppositional learning concept with mutation operator. In [47], the authors describe a new scalable parallel architecture to improve the performance of Galactic Swarm Optimization algorithm that was inspired from the motion of stars and galaxies under the influence of gravity. An application of meta-heuristic based Elitist Teaching Learning Based Optimization to nonlinear fractional order proportional integral derivative (PID) controller for tracking maximum power in photo-voltaic systems is presented in [48]. In [49], an improved multiverse optimization (IMVO) assisted global maximum power point tacking (MPPT) algorithm is presented for partially shaded photovoltaic system to obtain maximum power. A comprehensive review and classified list of more than 50 studies of strange behavior of nonlinear dynamic systems is presented in [50] to enable prevention of blackouts, disasters, and failures.

This special issue would not have been possible without the help of many participants. As guest editors, we take this opportunity to thank the authors for their contributions and the reviewers for their invaluable comments and timely responses. We would also like to thank the JIFS Editor-in-Chief and staff for their support during the preparation and production of this special issue.

References

[1] 

Ajeena Beegom A.S. and Chinmayan P. , Solvingword sense disambiguation problem using combinatorial pso, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[2] 

Akhtar N. , Sufyan Beg M.M. and Hussain M. , Extractive multi-document summarization using relative redundancy and coherence scores, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[3] 

El-Alfy E.-S.M. and Al-Azani S. , Empirical study on imbalanced learning of arabic sentiment polaritywith neuralword embedding, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[4] 

Sanagar S. and Gupta D. , Automated genre-basedmulti-domain sentiment lexicon adaptation using unlabeled data, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[5] 

Gupta N. , Singh R. and Bedi P. , Combining trust and reputation as user influence in cross domain group recommender system (cdgrs), Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[6] 

Sujitha P. and Philomina S. , A computationally efficient method for human activity recognition based on spatio temporal cuboid and super normal vector, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[7] 

Alpana A. and Chand S. , An intelligent technique for the characterization of coalmicroscopic images using ensemble learning, Journal of Intelligent&Fuzzy Systems (JIFS), IOS Press, 2020.

[8] 

Ramachandran S. , Kochitty S. , Vinekar A. and John R. , A fully convolutional neural network approach for the localization of optic disc in retinopathy of prematurity diagnosis, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[9] 

Shiji T.P. , Vinu T. , Rekha L. , Remya S. and Thara P. , Fevolutionary intelligence for breast lesion detection in ultrasound images: A wavelet modulus maxima and svm based approach, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[10] 

Dayanand V. , Gowtham R. , Senthilkumar M. , Sini R.P. and Sourav R. , A layered approach to detect elephants in live surveillance video streams using convolution neural networks, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[11] 

Jyotsna C. , Amudha J. , Raghavendra R. and Ravi N. , Intelligent gaze tracking approach for trail making test, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[12] 

Amudha J. , Divya K.V. and Aarthi R. , A fuzzy based system for target search using top-down visual attention, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[13] 

Navdeep Y. , Vijander; S. , Asha R. and Sonal G. , An improved hyper smoothing function based edge detection algorithm for noisy images, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[14] 

Lalitha S. , Jahnavi S. and Supraja S. , A vital neurodegenerative disorder detection using speech cues, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[15] 

Utkarsh S. , Akshay G. , Dipjyoti B. and Wasim A. , Pforeign accent classification using deep neural nets, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[16] 

Vyshnav M.T. , Sachin K.S. , Neethu M. and Soman K.P. , Random fourier feature based music-speech classification, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[17] 

Hemendra S. , Devashri P. , Damodar R.E. , Annushree B. and Malkauthekar M. , Brain computer interface for measuring the impact of yoga on concentration levels in engineering students, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[18] 

Manu D.K. and Karthik P. , Enhancement of hydrophone sensitivity by varying mandrel parameters for detection of acousticwaves in underwater environment, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[19] 

Dodla C.C.K. and Shikha T. , Hybrid architecture for multiple transforms for signal processing applications, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[20] 

Remya R.K. and Wilscy M. , Image forgery detection using deep textural features from local binary pattern map, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[21] 

Anushiadevi R. , Padmapriya P. , Balaguru R.J. and Rengarajan A. , A high payload separable reversible data hiding in cipher image with good decipher image quality, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[22] 

Santhu S. , Trivandrum S. , Anna P.J. , Chemmannur G. and Madhu N. , Tongue print identification using deep cnn for forensic analysis, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[23] 

Jitendra A.M. and Poonam S. , Occluded face recognition using noncoherent dictionary, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[24] 

Ashoka R.R. and Kumaran P. , Multi-biometric cryptosystem using graph for secure cloud authentication, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[25] 

Malay K. , Vaibhav M. , Anurag S. , Munendra S. and Manu V. , A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplication, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[26] 

Preethi D. , Vimala J. , Bijan D. and Rajareega S. , Biological inheritance on fuzzy hyperlattice ordered group, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[27] 

Sudhanshu S.G. , Combination of neural network and advanced encryption and decryption technique is used for digital image watermarking, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[28] 

Suriya P.T. , Meena V. , Prachetha K. , Aravind B. , Bharathkumar K.C.S. and Sethukarasi T. , Energy measure cluster based concealed aggregation for confidentiality and integrity in wsn, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[29] 

Arunkumar B. and Kousalya G. , Nonce reuse/misuse resistance authentication encryption schemes for modern tls cipher suites and quic based web servers, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[30] 

Jitendra S.R. and Kunwar S.V. , Homomorphic encryption approach for exploration of sensitive information retrieval, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[31] 

Anirban C. and Rithvik R. , Hypnotic computer interface (hypci) using georgie: An approach to design discrete voice user interfaces, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[32] 

Ritwik M. and Velayutham C.S. , A preliminary investigation into automatically evolving computer viruses using evolutionary algorithms, Journal of Intelligent&Fuzzy Systems (JIFS), IOS Press, 2020.

[33] 

Nilesh V.P. , Krishna C.R. and Krishan K. , S-ddos:Apache spark based real-time ddos detection system, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[34] 

Anne D. and Ciza T. , Improved pso for optimizing the performance of intrusion detection systems, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[35] 

Hussain M. , Alam M.S. , Akhtar N. and Sufyan Beg M.M. , Towards minimizing delay and energy consumption in vehicular fog computing (vfc), Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[36] 

Veervrat S.C. , Rajiv T. and Rahul P. , An intelligent low power consumption routing protocol to extend the lifetime ofwireless sensor networks based on fuzzy c-means++ clustering algorithm, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[37] 

Suriya P.T. , Sethukarasi T. and Veeramuthu V. , Krill herd based tsp approach for mobile sink path optimization in large scale wireless sensor networks, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[38] 

Senthilkumar M. , Eric J. , Advaith M.S. , Gopikrishna K.S. and Rohit G. , A flattened architecture for distributed mobility management in ipv6 networks, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[39] 

Sujatha M. , Geetha K. , Balakrishnan P. and Renugadevi T. , An optimal data storage hosting model using sugeno-type fuzzy inference system for multi-cloud environments, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[40] 

Pradeep K. , Rajagopalan T. and Sundaram G.A.S. , A log-periodic spiral antenna array for l-band radio interferometric imaging, Journal of Intelligent&Fuzzy Systems (JIFS), IOS Press, 2020.

[41] 

Anton Z. , Sergei C. , Sergei S. and Anatoliy N. , Intelligent autonomous navigation system for uav in randomly changing environmental conditions, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[42] 

Navdeep M. , Hemant S. and Tripta G. , Application of machine-learning technique for prediction of road accidents in state of haryana-a novel approach, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[43] 

Alok S. , Sanjeev K.P. , Srishti G. , Reddy B. and Diwakar T. , Knowledge discovery in medical and biological datasets by integration of relief-f and correlation feature selection techniques, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[44] 

Rosy P. , Santosh K.M. and Jemarani J. , An orthogonal moth flame optimization for global optimization and application to model order reduction problem, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[45] 

Salam J.D. and Buddha S. , Link prediction model based on geodesic distance measure using various machine learning classification models, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[46] 

Nibedan P. , Santosh K.M. , Sarishma S. and Abhirup K. , Oppositional spotted hyena optimizer with mutation operator for global optimization and application in training wavelet neural network, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[47] 

Phadke D.A. , Umadevi K.S. , Bhardwaj B.P.S. and Amali G.B. , A new parallel galactic swarm optimization algorithm for training artificial neural networks, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[48] 

Anuj R. , Shyama K.J. , Bhavnesh K. and Vijay M. , Nonlinear fractional order pid controller for tracking maximum power in photo-voltaic system, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[49] 

Urvashi C. , Vijander S. , Bhavnesh K. and Asha R. , An improved mvo assisted global mppt algorithm for partially shaded pv system, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.

[50] 

Sunil N. and Kantilal J. , Trends in chaos and instability for understanding system complexity, Journal of Intelligent & Fuzzy Systems (JIFS), IOS Press, 2020.