Abstract

This special issue is composed of a collection of selected papers presented at the Fifth International Symposium on Intelligent Systems Technologies and Applications (ISTA’19) that was organized in association with Springer, Germany and IOS-Press, Netherlands. ISTA’19 was co-affiliated with the International Conference on Applied Soft computing and Communication Networks (ACN’19), held in Trivandrum, Kerala, India during December 18–21, 2019. The Symposium brought together researchers in related fields and provided a venue to explore and discuss various aspects and recent advances in the area of intelligent systems technologies and applications. It offered an excellent opportunity for the presentation and discussion of interesting new research results, which contributed to effective dissemination and transfer of knowledge.
Included in this special issues are 50 selected papers covering topics pertaining to the application of soft computing and computational intelligence techniques to a wide spectrum of issues in the areas of image processing and computer vision, natural language processing, pattern recognition, biometric identification, security systems and data encryption, cloud computing, control systems, and network design.
Several papers in this special issue have addressed natural language processing. Contribution [1] describes a technique for solving the word sense disambiguation using combinatorial particle swan optimization. A multi-document summarization technique proposed in [2] is based on the integration of regression and topic-based models to improve the reported results. Sentiment analysis of social media data is an evolving area in natural language processing in recent years. Several machine learning algorithms [3] are compared for imbalanced learning of sentiment polarity as a tool to understand the opinions of participants in social media. An automated genre-based sentiment lexicon is proposed in [4] to address the challenge due to variation in sentiments across multiple domains. Another important related area due to the explosive growth of online information is using recommendation systems to filter information in activities such as watching videos and movies, tourism and traveling, as well as food and restaurants. In [5], the researchers developed a system that combines social factors such as trust and reputation to determine influential users in cross domain group recommender systems.
Another vital area is pattern recognition and visual computing. A computationally and storage efficient method is presented in [6] for recognizing human activities from depth videos. A more accurate, time and cost-effective ensemble machine learning is proposed in [7] for recognition of coal category from microscopic images. The identification of landmark features in retinal fundus photograph such as optic disc (OD) is of high prognostic significance in diagnosing various ophthalmic diseases. In [8], a fully convolutional neural network framework is proposed for the localization of optic disc based on the underlying architecture of YOLOv3. Automatic separation and classification of tumors in ultrasound images is difficult due to the noisy and low contrast nature of the image. A proposed evolutionary intelligence method [9] is invariant to scale changes and does not require an operator defined initial region of interest. A layered approach is described in [10] for deploying live video surveillance with a deep learning strategy to detect elephants and mitigate the problem of human-elephant conflict in rural areas of India. A study in [11], proposed to develop a system to support a psychologist to understand the participant performance in a trail making test, which is a cognitive impairment test used for understanding the visual attention during a visual search task. Another problem addressed in this special issue related to scene understanding and exploration is the target search problem using a fuzzy-based system to predict the salient locations in an image for visual attention [12]. The algorithm described in [13] aims to detect localized edges in noisy images without duplicate and integrating them into meaningful object boundaries.
Signal processing and speech analysis are active fields that have received great interest in many applications. In [14], the authors utilized speech cues represented by excitation source features, voice quality features, and prosodic features to identify patients affected by a vital neurodegenerative condition of Parkinson disease (PD) from healthy individuals who have no history of such disorder. Two machine learning classification techniques (random forest and support vector machine) have been evaluated using a Parkinson’s database from the University of California Irvine (UCI) Machine Learning repository. A cascade of two deep-learning architecture is proposed in [15] for accent identification. The model has been developed and tested on common voice datasets with five popular English accents: India, Australia, US, England, and Canada. In [16], a random kitchen sink based approach is proposed for music-speech classification using temporal and spectral features achieving scores comparable to other methods reported in the literature. Acquiring and processing brain signals to understand students concentration may have a great impact on education. A case study presented in [17] analyzes the influence of practicing Yoga on the concentration levels of engineering students. Underwater acoustics poses several challenges that attracted increasing attention to address problems such as sensors sensitivity, sound intensity measurement, and target localization. The authors of [18] propose to enhance the fiber optic hydrophone sensitivity by varying parameters as demonstrated through analytical results. Another interesting problem is addressed in [19] where a hybrid architecture that performs multiple transforms of digital signals such as Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), Discrete Sine Transform (DST), and Discrete Wavelet Transform (DWT) was proposed. The designed architecture produces output of transform sequence in order and may be used to handle large sized transforms by repeatedly using fixed size architecture for a large number of points without increasing the number of processing elements.
Security and digital forensic represent several challenges that have attracted significant research efforts. With the availability of powerful image editing tools, manipulating images to change their content is becoming a concern. Image integrity and forgery detection are addressed in [20] using deep textural features from Local Binary Pattern (LBP) map. Benchmarking the proposed methodology is reported using four datasets (CASIA v1.0, CASIA v2.0, CUISDE, and IFS-TC). Information hiding in digital images is another important issue in data security. A novel technique with high payload is presented in [21] for hiding confidential messages in encrypted images while enabling separate image recovery and information extraction. The test results show high embedding capacity with 100% restoration of cover images and extraction of secret information. Biometric identification is addressed in [22, 23]. In [22], the authors propose a deep learning approach for an emerging biometric trait using tongue print identification based on the remarkable success of convolutional neural networks for feature extraction and pattern recognition. A dataset is also created for testing the proposed approach. The approach in [23] targets face recognition in unconstrained environment where images are affected by various types of occlusion. A multi-biometric cryptosystem is presented in [24] for safe and secure cloud authentication mechanism. Outsourcing data and computation to the third-party cloud servers brings multifarious security and privacy challenges. In [25], an improved algorithm is proposed for secure outsourcing of matrix multiplication to minimize the execution burden without sacrificing the confidentiality and integrity of the inputs and outputs. The theory of algebraic hyperstructures has many application including cryptography. In [26], the authors propose the concept of fuzzy hyperlattice ordered group.
Transferring digital images over the network is susceptible to various types of attacks including cropping, JPEG compression, median filtering, Gaussian blur noise, rotation, and salt & pepper noise. In [27], the researchers propose a method for digital image watermarking based on a combination of artificial neural networks and advanced encryption and decryption technique to provide copyright protection and security to digital bank cheque images. Wireless sensor networks are widely deployed in many applications for monitoring environments. A major concern in such networks is the secure and accurate communication of aggregated data. In [28], a cluster based method is proposed for confidentiality and integrity of concealed data aggregation in wireless sensor networks. The proposed method uses Elliptic Curve Cryptography-based Elgamal additive homomorphic encryption scheme for providing confidentiality and integrity. A nonce reuse/misuse resistance authentication encryption technique for better security bounds on modern TLS Cipher Suites and QUIC (Quick UDP Internet Communications) based Web Servers was used in [29]. Exploration of sensitive information retrieved from cloud databases is addressed in [30] where the authors present a homomorphic encryption approach that allows cloud servers to respond to queries while preserving privacy.
With the increasing popularity of speech recognition applications such as Alexa, Google Home, and Cortana, voice user interfaces (VUIs) are becoming common to interact with smartphones and consumer products. In [31] a prototype, known as GEORGIE, is used to achieve novel means of interaction inspired by the principles of hypnotherapy (a discrete interface ensuring that end-users’ privacy is not compromised). Malicious software such as viruses automatically evolve to evade popular anti-malware scanners. Evolutionary algorithms are utilized in [32] to mutate the timid virus with a simple code evasion strategy to generate authentic variants of the malware. Distributed denial of service (DDoS) is one the notable threats in computer and network security during the past decade. It occurs when multiple machines generate massive amount of traffic to attach a specific target. In [33], a high scalable Spark streaming-based distributed and real-time DDoS detection system is proposed using k-means clustering algorithm. An improved method based on particle swan optimization to solve the tradeoff among the conflicting objectives in intrusion detection systems is descibed in [34].
Several articles in this special issue have addressed the design of optimal solutions for a variety of applications. In [35], the authors propose a multiobjective optimization model to reduce delay and energy consumption in vehicular fog computing (VFC). The results reveal superiority of the proposed VFC framework over generic cloud platforms. The approach in [36] applies unsupervised machine learning techniques based on fuzzy c-means++ clustering algorithm for designing routing protocol in wireless sensor networks with low power consumption. The growing number of nodes in wireless sensor networks require that architectures maintain low-power consumption per-node to comply with energy guaranty acceptable network lifetime. In [37], the authors propose to optimize the length of the mobile sink’s traveling path to reduce the delay during data gathering in large-scale wireless sensor networks. An optimal data storage hosting model for multi-cloud environments using Sugeno-type fuzzy inference system that selects the appropriate storage type by considering the users’ purpose and nature of usage in a cost-effective way was proposed in [39]. The study in [40] introduces a novel and efficient L-band log-periodic spiral antenna array design in radio interferometry for synthesis imaging.
An intelligent autonomous navigation system for unmanned aerial vehicles (UAV) in randomly changing complex environments is described in [41]. Road accidents in developing countries are increasing at an alarming rate. A case study presented in [42] develops a prediction model for road accidents in the State of Haryana, India using machine learning technique. Data mining and knowledge discovery has significant applications using medical and biological datasets. The study in [43] identifies an optimal subset of relevant features by integrating ReliefF and correlation feature selection techniques. Several optimization paradigms have been inspired from nature. A new modification of Moth-Flame Optimization is described in [44] by adding the concept of orthogonality in order to improve the performance for global optimization. Many complex real-world problems may be modeled using graphs. In [45], the authors present a link prediction model using topological feature extraction based on a geodesic distance measure. Another approach presented in [46] improves the performance of nature-inspired Spotted Hyena Optimizer through the combination of oppositional learning concept with mutation operator. In [47], the authors describe a new scalable parallel architecture to improve the performance of Galactic Swarm Optimization algorithm that was inspired from the motion of stars and galaxies under the influence of gravity. An application of meta-heuristic based Elitist Teaching Learning Based Optimization to nonlinear fractional order proportional integral derivative (PID) controller for tracking maximum power in photo-voltaic systems is presented in [48]. In [49], an improved multiverse optimization (IMVO) assisted global maximum power point tacking (MPPT) algorithm is presented for partially shaded photovoltaic system to obtain maximum power. A comprehensive review and classified list of more than 50 studies of strange behavior of nonlinear dynamic systems is presented in [50] to enable prevention of blackouts, disasters, and failures.
This special issue would not have been possible without the help of many participants. As guest editors, we take this opportunity to thank the authors for their contributions and the reviewers for their invaluable comments and timely responses. We would also like to thank the JIFS Editor-in-Chief and staff for their support during the preparation and production of this special issue.
