Forthcoming articles

International Journal of Intelligent Systems Technologies and Applications

International Journal of Intelligent Systems Technologies and Applications (IJISTA)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Intelligent Systems Technologies and Applications (30 papers in press)

Regular Issues

  • Biased Face Patching Approach for Age Invariant Face Recognition using Convolutional Neural Network   Order a copy of this article
    by Mrudula Nimbarte, Kishor K. Bhoyar 
    Abstract: In recent years, a lot of interest is observed among researchers, in the domain of age invariant face recognition. The growing research interest is due to its commercial applications in many real-world scenarios. Many researchers have proposed innovative approaches to solve this problem, but still there is a significant gap. In this paper, we propose a novel technique to fill in the gap, where instead of using a whole face of a person, we use horizontal and vertical face patches. Two different feature vectors are obtained from these patches using Convolutional Neural Networks (CNN). Then fusion of these two feature vectors is done using weighted average of features of both patches. Lastly, SVM is used as a classifier on the fused vector. Two publicly available datasets, FGNET and MORPH (Album 2) are used for testing the performance of the system. This novel approach outperforms the other contemporary approaches with very good Rank-1 recognition rate, on both datasets.
    Keywords: Face Recognition; AIFR; Aging Model; Deep Learning; CNN; Weighted Average.

  • Automatic Sizing of CMOS based Analog Circuits Using Cuckoo Search Algorithm   Order a copy of this article
    by Pankaj Prajapati 
    Abstract: The increasing complexity of physical models ofMOSFETand process variations with downscaling of CMOS technology have made the manual design of analog circuits challenging and time-consuming. Therefore, development of efficient automatic analog circuit design techniques looks very attractive. In this work, the Cuckoo Search (CS) algorithm has been tested for the optimum design of CMOS based analog circuits with high optimization fitness. The CS algorithm has been implemented using C language and interfaced with Ng-spice circuit simulator. In this work, the CS algorithm has been used as a searching tool for transistor sizing and Ng-spice has been used as a fitness creator. Various analog circuits like CMOS common-source amplifier, CMOS cascode amplifier and CMOS differential amplifier using a current mirror load have been optimized using this automatic optimization tool with BSIM3v3MOSFETmodels using 180 nm CMOS technology. This technique gives more accurate results and consumes less time as compared to manual circuit design.
    Keywords: Cuckoo Search algorithm; Optimization; Fitness; Simulator ; Transistor Sizing.

  • Product Service Model Constructing Method for intelligent home based on Positive Creative Design Thinking   Order a copy of this article
    by Weiwei Wang, Ting Wei 
    Abstract: With the booming market economy, companies need to maintain competitive advantage through positive and innovative design thinking. Building a service model is an indispensable part of this approach. The design aims to improve the competitiveness of the enterprise by extracting effective user value, establishing a product service system, satisfying the user's needs, and analyzing the method of extracting the shape. In this paper, the researcher first selects the target user, draws the user journey map, analyzes the user's psychological activities, and uses the innovative design thinking to extract the user value. Secondly, according to the positive value element, the human-object three-dimensional ecological circle is created, at the same time, using AHP Hierarchical Analysis software to analyze product modeling and build the product service model. Finally, the reliability of the model construction method was verified by the intelligent air-housekeeper product service system, and the requirements to meet the needs of users were met. At the same time, it can also provide certain reference for other product service design, reflecting the market competitive advantage of the product.
    Keywords: Product Service Model; User Value; Positive Creative Design Thinking; Intelligent Air-housekeeper Product Service.

  • Local and Global Features Fusion to estimate Expression Invariant Human Age   Order a copy of this article
    by Subhash Chand Agrawal, Anand Singh Jalal, Rajesh Kumar Tripathi 
    Abstract: Human beings can easily estimate the age or age group of a person from a facial image where as this capability is not prominent in machines. This problem becomes more complex in the presence of facial expressions and due to age progression. In this paper, we introduced a novel method for age prediction using combination of local and global features. After detecting the face from image, we partition the facial image in 16*16 non-overlapping blocks and apply Grey-Level Co-Occurrence matrix (GLCM) on these blocks. After calculating four facial parts (Eyes, forehead, left cheek and right cheek) from facial image, features from second local feature Gabor filter are obtained. Global feature, Histogram of Oriented Gradients (HOG) is used to extract features from complete face image. Experimental results show that fusion of local and global features perform better than existing approaches and reported 6.31years mean absolute error (MAE) on PAL dataset.
    Keywords: GLCM; Local feature; Global feature; Facial Expression.

  • Improving English-Arabic statistical machine translation with morpho-syntactic and semantic word class   Order a copy of this article
    by Ines Turki 
    Abstract: In this paper, we present a new method for the extraction and integrating of morpho-syntactic and semantic word classes in a Statistical Machine Translation (SMT) context to improve the quality of English-Arabic translation. It can be applied across different statistical machine translations and with languages that have complicated morphological paradigms. In our method, we first identify morpho-syntactic word classes to build up our statistical language model. Then, we apply a semantic word clustering algorithm for English. The obtained semantic word classes are projected from the English side to the featured Arabic side. This projection is based on available word alignment provided by the alignment step using GIZA++ tool. Finally, we apply a new process to incorporate semantic classes in order to improve the SMT quality. We show its efficacy on small and larger English to Arabic translation tasks. The experimental results show that introducing morpho-syntactic and semantic word classes achieves 7.7 % of relative improvement on the BLEU score.
    Keywords: Morpho-syntactic word classes; semantic word classes; alignment; Statistical machine translation.

  • A QoS-aware virtual resource pricing service based on game theory in federated clouds   Order a copy of this article
    by Tienan Zhang 
    Abstract: Recently, federated cloud platform has become a promising paradigm to provide cloud services for various kinds of users in a distributed manner. To compete for cloud users, it is critically important for each cloud provider to select an optimal price that best corresponds to their service qualities as well as remains attractive to cloud users. In this paper, we first formulate the pricing strategy of individual cloud provider as a constrained optimization programming problem to analyze the behaviours of both cloud users and cloud providers. Then, we present game-based model which introduces a set of virtual resource agents to help providers adjusting their prices with aiming at achieving a global optimal solution. Theoretical analysis is present to prove the validity and effectiveness of the proposed game model, and extensive experiments are conducted in a real-world cloud platform to evaluate its performance. The experimental results show that the proposed pricing model can significantly improve the resource revenue for cloud providers and provide desirable quality-of-service (QoS) for user tasks in terms of various performance metrics.
    Keywords: cloud computing; pricing strategy; virtual machine; quality-of-service.

  • On Collaborative Filtering Model Optimized with Multi-Item Attribute Information Space for Enhanced Recommendation Accuracy   Order a copy of this article
    by Folasade Isinkaye, Yetunde Folajimi, Adesesan Adeyemo 
    Abstract: Recommender system is a type of information filtering system that is designed to curtail the difficulties of information overload by automatically suggesting relevant items to users tailored to their preferences. Bayesian Personalized Smart Linear Methods (BPRSLIM) is a variant of item-based collaborative filtering technique used in information filtering system. Although, this algorithm has shown outstanding performance in a range of applications, nevertheless it suffers serious limitation of inability to provide accurate and reliable recommendations when the user-item matrix contains insufficient rating information, this always reduces its accuracy. In this paper, we propose a framework that integrates multi-item attribute information besides the classic information of users and items into BPRSLIM model in order to ease the sparsity problem associated with it and hence improves its performance accuracy. The enhanced model is expected to outperform the original BPRSLIM model
    Keywords: BPRSLIM; Sparsity Problem; Recommender System; Collaborative Filtering; Item Attribute Information; Optimization.

  • Image Matching Technique Based on SURF Descriptors for Offline Handwritten Arabic Word Segmentation   Order a copy of this article
    by Maamar Kef, Leila Chergui 
    Abstract: Image matching is an important task with many applications in computer vision and robotics. Recently, several scale-invariant features have been proposed in the literature and one of them is the local descriptors namely Speeded-Up Robust Features (SURF). Those features are scale and rotation-invariant descriptor, and have the advantage to being calculated quickly and efficiently. In this paper we presents a new segmentation system of handwritten Arabic words based on SURF descriptors. Firstly, a set of Arabic characters images were used to build 106 characters' patterns, which are used by a segmentation process based on an image matching technique. Tests were performed on our new databese of handwritten Arabic words. A high correct segmentation rate was reported.
    Keywords: Image Matching; SURF Descriptors; Arabic Handwriting Recognition; Keypoints; Segmentation.

  • Improved motorized spindle control using a biogeography-based optimization algorithm   Order a copy of this article
    by Yuhou Wu, Zhen Ning Pan, LiXiu Zhang 
    Abstract: The control performance of motorized spindle affects the development of equipment manufacturing technology. The control theory, represented by direct torque control (DTC), is applied to the control of motorized spindle, which makes more intelligent algorithms applied to the control of motorized spindle. The biogeography-based optimization (BBO) algorithm is introduced to estimate the equivalent stator resistance in the classical DTC method. The random disturbance operator is added to the algorithm because it can enhance the exploitation ability by maintaining the original exploration ability and can effectively identify the equivalent stator resistance to obtain an accurate estimation of the stator flux and improve the control performance of the DTC. The paper designs a new BBO-DTC algorithm according to the characteristics of the BBO algorithm. Using the classical DTC, BBO-DTC and ANN-CBR (artificial neural networks and case based reasoning) algorithms to simulate the online identification of stator resistance, the results show that the BBO-DTC algorithm has higher accuracy in identifying the equivalent stator resistance, which verifies the effectiveness of the algorithm. BBO-DTC algorithm achieves the purpose of suppressing current harmonics and reducing torque by improving the online identification accuracy of the stator resistance of the motorized spindle, thus improving the performance of the motorized spindle control system. The DSP (digital signal processing) and IGBT (insulated gate bipolar transistor) modules are used to establish the hardware of the experimental circuit. The results show that the vibrational speed of the motorized spindle is significantly reduced at each operating frequency after using the BBO-DTC algorithm. The torque ripple of the motorized spindle is obviously reduced, especially at 150 Hz and from 450~600 Hz. Additionally, the fluctuation in the no-load relative input torque is also reduced, and the torque takes only 0.03 s to reach a relatively stable state. Analyses of the electromagnetic vibration speed of the motorized spindle and the experimental input torque data indicate that the control performance of the BBO-DTC algorithm is improved. Not only is the dynamic performance of the system improved, but variations in the electromagnetic flux and the electromagnetic torque are also reduced. The control performance of motorized spindle is effectively improved.
    Keywords: DTC; BBO; BBO-DTC; Migration operator; Perturbation operator; Stator resistance; Stator flux.

  • Deploying NSBA algorithm for Bi-Objective Manufacturing Cells Considering Percentage Utilization of Machines   Order a copy of this article
    by Tamal Ghosh, Kristian Martinsen 
    Abstract: Percentage Utilization of Machines is considered as an important production factor for manufacturing Cell Formation Problem (CFP) in Cellular Manufacturing (CM). This recently developed concept correctly emphasize ration data in context of CM. In this paper, a utilization based bi-objective mathematical model is developed, which minimizes the total machine utilization induced by bottleneck machines and number of voids. Thereafter, a new data-generating algorithm is introduced. The abovementioned bi-objective CFP is solved using a Non-Dominated Sorting Bat Algorithm (NSBA), which is compared with published Multi-Objective Bat Algorithm (MOBA) successfully. Statistical tests are conducted and data consistency is confirmed on obtained results. The computational experiments depict that the Pareto solutions of NSBA are 35.7% improved. The contribution of this research is threefold. First, an accurate bi-objective mathematical expression is developed for utilization based CFPs. Second, a novel data-generating algorithm is stated. Third, NSBA technique is successfully tested.
    Keywords: Machine Utilization Percentage; Cellular Manufacturing; NSBA; Bi-Objective Mathematical Model.

  • Application of Artificial Intelligence to Wind Power Generation: Modeling, Control and Fault Detection   Order a copy of this article
    by Hadjira BOUAZZA 
    Abstract: Power converters play a key-role in the grid-integration of wind power generation and as any physical device, they are prone to mal function and failure. There is, therefore, a need for converter health monitoring and fault detection to ensure a reliable and sustainable operation of the wind turbine. This paper presents different artificial intelligence-based fault detection using fuzzy and neuro-fuzzy techniques. The proposed methods are designed for the detection of one or two open-circuit fault in the power switches of the rotor side converter (RSC) of a doubly-fed induction generation (DFIG) wind energy conversion system (WECS). In the proposed detection method only the average values of the three-phase rotor current are used to identify the faulty switch. Alongside these condition monitoring strategies, the paper also present two fuzzy logic-based controllers for the regulation of the real and reactive power flow between the grid and the converter. The performances of the controllers are evaluated under different operating conditions of the power system and the reliability, feasibility and the effectiveness of the proposed fault detection have been verified under various open-switch fault conditions.
    Keywords: Wind energy; DFIG; MPPT; fault detection; open-switch fault; type 2 fuzzy logic; ANFIS.

  • GEOSS: An Intelligent Methodology for Identifying Site Suitability of Air Sample Collection   Order a copy of this article
    by Kamonasish Mistry, Biplab Biswas, Siwen Zhang, Tao Wu, Liang Zhou, Abdelfettah Benchrif, Srimanta Gupta 
    Abstract: Epistemology of Air Pollution (AP) has well known through numerous researches and a few literature has proved that AP level changes with changes in land use land cover (LULC) types. However, there is no such attempt to develop any common methodology or model for optimum sampling which can be correlate between LULC types and changes with the AP level and changes. A pre-planned, well-calculated Geospatial method is an ultimate need to evaluate the ambient AP level, type and its variation over different LULC types. GEOSS (Geospatial Estimation of Optimum Sample Site) has been innovated to identify the optimum AP sampling sites so that it can represent the wide spatial coverage over varied LULC types. Image processing using geospatial techniques and statistical tools have used to select the optimum location of sampling. While few studies have collected AP samples from the field mostly used random sampling method, which always do not reflect all the LULC types, and most often, they are clustered in distribution, GEOSS has tried to overcome the major issues of random sampling with giving emphasis on geospatial techniques to select the optimum location of sites for sample collection. Validation approach based on Nearest Neighbour Analysis has justified that GEOSS employed sampling points are distributed that is more systematic and are fulfilled all the basic assumptions of the present sampling procedure.
    Keywords: Geospatial Modelling; Optimum location; Land use land cover; Kolkata Metropolitan Area; Air pollution level and change; Sampling techniques.

  • Study of the Fractal Nature of Evapotranspiration Time Series from Agricultural Regions of Northern Karnataka   Order a copy of this article
    by Uttam Patil, Nandini Sidnal 
    Abstract: Multifractal detrended fluctuation analysis (MFDFA) renders valuablerninsights pertaining to the randomness, inner regularity and long range correlations in the time series data. We applied this technique to assess the fractal behavior and inherent correlations of the potential and reference crop evapotranspiration data collected from two regions of Karnataka, viz., Belgaum and Raichur. The annual periodic nature of thernevapotranspiration data series was removed using seasonal trend decomposition method and it was seen that all the decomposed series consisted of long-term persistence. The multifractal behvaior in the evapotranspiration series at the two stations were seen owing to the strong dependency of generalized Hurst exponent H(q) on the values of q. We also tested for the reduction in the dependence of h(q) on q by shuffling thernevapotranspiration time series and it is indicative of the fact that the multifractality is responsible for the correlation characteristics and also the probability density function of the evapotranspiration data series. The two regions, Belgaum and Raichur vary considerably in climatic and geomorphic conditions and this difference is evident in their corresponding evapotranspiration data as fractal properties. This is depicted by the values of the generalized Hurst exponent H(q) obtained using MFDFA technique.
    Keywords: Agriculture; Evapotranspiration; MFDFA.

  • A survey on hand gesture recognition for Mobile Devices   Order a copy of this article
    by Houssem Lahiani, Mahmoud Neji 
    Abstract: As smartphones and mobile devices become ubiquitous in the daily life of Human beings, facilitating interaction with them will have a positive impact on their use. This paper presents an emerging and important area for research on Human-Machine Interaction, involving interaction with mobile devices. Hand Gesture recognition is already a quite mature field and its integration on advanced technologies like smartphones makes a survey an interesting and needed contribution. The design of interactive mobile applications should differ from traditional desktop applications. For this purpose, the paper discusses some concepts that help to understand new challenges and introduces techniques that may be useful to properly exploit these devices. Thus, researchers in the field of Human-Machine Interaction aim to develop systems able to recognize hand gestures in the air to control smartphones and portable devices. Gestures have long been seen as a method of interaction that can potentially provide more natural and intuitive ways to communicate with computers. They represent an efficient way to interact with computers. Efficient and robust hand gesture recognition techniques for mobile devices are still in development phase. The main steps associated with the design of hand gesture recognition systems are discussed in this paper. We provide in this paper a literature review of current research works and an analysis of comparative studies in this field. This paper focuses on the main steps of hand gesture recognition for mobile devices like detection, tracking and recognition. This work also gives an analysis of the existing literature on gesture recognition systems for mobile devices by classifying them under various key parameters. This paper gives also an overview of recent works done on vision-based and contact based hand gesture recognition systems for mobile devices. Used techniques and approaches are also discussed. At the end, we conclude with some reflections.
    Keywords: Mobile computing; android; gesture recognition; Human-machine interaction.

  • Packet Loss Concealment Based Estimation of Polynomial Interpolation for Improving Speech Quality in VoIP   Order a copy of this article
    by Adil Bakri, Abderrahmane Amrouche 
    Abstract: The main objective of Packet Loss Concealment (PLC) techniquesrnis to improve the speech quality in Voice over IP (VoIP). These techniquesrngenerate a synthetic speech signal to cover the missing data or the lost packetsrnin a received bit-stream. This paper is concerned with performing a new PLCrntechnique using the Estimation of Polynomial Interpolation (EPI) method,rnwhich is designed to seek the approximate function as a polynomial. This function can be used to predict the lost packet from previous packets. A two-rnstate Markov model, particularly, is used to represent the lost packets. Thernused test vectors, in the proposed PLC evaluation, are the TIMIT database.rnThus, the proposed PLC algorithm, which is provided better speech quality,rnis evaluated by the PESQ and SNR and compared to the two techniques,rnhidden Markov model (HMM)-based PLC algorithm and deep neural networkrn(DNN)-based PLC.
    Keywords: Packet loss concealment; VoIP; Speech quality; Packet loss model.

  • Palm vein recognition system based on multi-block statistical features encoding by phase response information of Nonsubsampled contourlet transform   Order a copy of this article
    by Amira Oueslatihermi 
    Abstract: In this paper, we improve our palm vein recognition system to be based on phase response information of nonsubsampled contourlet transform (NSCT). First, we localize the Region of Interest (ROI), next, we have divided the region of interest inti a non-overlapping block and we proposed an encoding method based on extracting phase response information of NSCT coefficients, then XOR pattern is applied to extract invariant from local region of the palm vein to create a palm vein template of 512 bytes. Finally, we have calculated the modified Hamming distance between templates to estimate the similarity between two palm veins filtered images. The method is tested on the CASIA Multispectral Palm-print database. The experimental results illustrate the effectiveness of this coding in two modes of biometric palm vein: 99.90 % of rank-one recognition rate and 0.19% of equal error rate in verification.
    Keywords: Palm-vein; recognition; ROI Extraction; Nonsubsampled contourlet transform; Feature Extraction; phase response information; XOR pattern; Statistical Descriptor; multi-blocks.

  • Refurbishing ANN with the Aid of Adaptive Crow Search Optimization for Effectively Diagnosing Railway Wheel Condition   Order a copy of this article
    by Kota Venkateswarlu, .Venkatachalapathy V.S.K, Velmurugan K., Thiagarajan A. 
    Abstract: The research intends to diagnosis the railway wheel condition with the aid of an Artificial Neural Network (ANN). In diagnosing, ANN has been proven its convenience over manual computation in various industrial and transportation applications. The research utilizes optimization techniques for identifying appropriate hidden layers and their associated neurons to enhance the performance of ANN techniques. This configuration process includes optimization techniques like Evolutionary Algorithm (EA), Genetic Algorithm (GA), Particle Swarm Optimization (PSO), and Crow Search Optimization (CSO). Also, this research includes modified and improved conventional strategy in CSO, which urge incorporating novel strategy called Adaptive Crow Search Optimization (ACSO) to enhance the performance of ANN further. The proposed novel strategy unveils proficient performance of 99.2% accuracy, which is 1.7% greater than the conventional ANN model and an average of 0.9% greater than other contest optimization techniques utilized to configure the ANN model. The credibility of the ANN model gets increased while employs the optimization techniques in diagnosing the railway wheel condition.
    Keywords: Artificial Neural Network (ANN); Evolutionary Algorithm (EA); Genetic Algorithm (GA); Particle Swarm Optimization (PSO) and Adaptive Crow Search Optimization (ACSO).

  • An Ant Colony Optimization based Framework for the Detection of Suspicious Content and Profile from Text Corpus   Order a copy of this article
    by Asha Kumari, Balkishan  
    Abstract: The technical advancements in the field of short message communication have swiftly raised the menace of suspiciousness along with human communication means. This uncontrolled enhancement of unsolicited suspicious content has become the motivation for the researchers to work and control this peril. Suspicious content can be related to any uninvited message that can lead to rumors, fake news, spam, malicious, and threatening activities. Although there are numerous classical content-based methods for the detection of suspicious activities, these methods lack in case of short messages such as SMS and microblogs. This research work addresses the problem of suspicious content and profile identification from SMS and Twitter Microblogs. A framework based on Ant Colony Optimization is presented for the Detection of Suspicious Content and Profile (ACODSCP). In this study, one twitter Microblogs based text dataset and two SMS based text corpora are utilized. The global optimization behavior of ant colony optimization (ACO) concept incorporates to determine the suspicious activities and profiles effectively with the minimal feature set. The performance of the proposed ACODSCP system is assessed in terms of precision, recall, and f-measure. The evaluated results in terms of mentioned parameters indicate the promising results of the proposed concept in comparison with existing concepts.
    Keywords: Suspicious Content; Swarm Intelligence; Ant Colony Optimization; Short Message Service (SMS); Twitter Microblogs; Spam; Social Communication Means.

  • A dynamic configuration with a shared knowledge center for multi objective ant colony optimization algorithms   Order a copy of this article
    by Mohamed RHAZZAF, Taw?k MASROUR 
    Abstract: This paper proposes a dynamic configuration approach to the ant colony optimization algorithm configuration, applied to multi-objective optimization problems. Indeed, the inertia of the static vision of the pheromone or visibility preferences values makes our dynamic approach desired. We propose a model based on a collective knowledge center shared by the colony members, storing the best configurations based on the old colony's experiments during the learning phase for random problems. The construction of this center is based on a statistical and qualitative studies of the evaluation criteria that will be explained over the paper. Our model gives results that show a rise in quality of the outputs, as well as a proof of concept for the artificial learning approach.
    Keywords: {Swarm Intelligence; Multi Agents System; Multi-criteria Optimization; Ant Colony Optimization; Traveling salesman problems.

  • An ECC Based Authentication Protocol for Fog-IoT Enabled Smart Home Environment   Order a copy of this article
    by Bhabendu Kumar Mohanta, Debasish Jena, Srikanta Patnaik 
    Abstract: Internet of Things(IoT) enabled smart home means all the home appliances are connected to the internet.All these devices are monitored and controlled using a mobile device, iPhone, or iPad regardless of location or time constraint. In an IoT based smart home network, associated users and devices need to be recognized otherwise unauthorized access reduce the security and privacy of the smart environment. In this paper, contributions are first proposed an Elliptical curve cryptography based authentication protocol for Fog nodes and users in the IoT-based smart home environment. Secondly, the simulation for security analysis of the proposed authentication protocol using AVISPA tools has been done. Thirdly, BAN logic is used to verify that the devices in the smart home environment are achieved security goals. Finally, a comparison with some existingworks has been done and it has been seen that proposed protocol achieved better security goals in a smart home environment.
    Keywords: Authentication,IoT; Smart Home Environment,Security,Elliptic curve cryptography.

Special Issue on: SoCTA 2018 Nature-Inspired Computing in Image and Video Processing

  • Denoising 1D Signal Using Wavelets   Order a copy of this article
    Abstract: Signal denoising is one of the most important areas in signal processing. In the present paper, we have denoised a 1D piecewise constant (PWC) signal corrupted by additive white Gaussian noise (AWGN) using the thresholded Haar wavelet denoising method. The central idea of the wavelet transform is the multiresolution decomposition of signals. This becomes advantageous because small objects require high resolution and low resolution is suitable for large objects. In multiresolution decomposition, an approximation component is created using a scaling function, which is often termed as a lowpass filter. Detail components are obtained using wavelet functions, which are often known as highpass filters. A series of approximations of a signal is thus obtained, which has difference in resolution among them by a factor 2. Detail components contain the difference between adjacent approximations. Proper thresholding of the transformed signal results in reduced noise because, in general, the noise component of a signal has a relatively smaller magnitude and wider bandwidth. We show that our method outperforms recently reported non-convex regularization based convex 1D total variation denoising method on PWC signals.
    Keywords: Wavelets; Thresholding; Denoising; Multiresolution analysis.

    by Nitish , Amit Kumar Singh 
    Abstract: From last two decade automatic detection of brain tumor in MR images is an emerging area of research in medical Science. A brain tumor is an abnormal mass of tissues in which cells grow and multiply uncontrollably, seemingly unchecked by the mechanisms that control normal cells. A brain tumor is the second leading cause of cancer-related deaths in men and the fifth leading cause among women. Diagnosis of the tumor at earlier stage is a very important part of its treatment. For detecting the brain tumor MRI and CT Scan are the most significant techniques. Despite promising techniques like MRI, CT Scan, characterization of abnormalities is still a challenging and difficult task. This paper presented an automated computer-aided brain tumor detection system which first classifies the tumorous from non-tumorous MRI images and then calculates the area of the affected region using Hysteresis thresholding technique which segments the lesion region from other part, feature extraction using Gabor filters and then SVM classifier for classification. The pursuance of the suggested system is evaluated in term of sensitivity, specificity, classification accuracy and Area under Curve (AUC) using ground truth images. The proposed system gives an average accuracy of 97%.
    Keywords: MRI; Tumor; Hysteresis thresholding; Wavelet transform; Gabor filters; Dimensionality reduction; classification; Confusion matrix; SVM; Sensitivity; Specificity; ROC; AUC.

Special Issue on: Recent Advancements in Autonomous Devices for Real-World Applications

  • Improving Network Lifetime and Speed for 6LoWPAN Networks Using Machine Learning   Order a copy of this article
    by Shubhangi Kharche, Sanjay Pawar 
    Abstract: Wireless communication networks have an inherent optimization issue of effectively routing data between nodes. This issue is multi-objective in nature, and covers optimization of routing speed, the network lifetime, packet delivery ratio and overall network throughput. In this paper, a machine learning (ML) based algorithm is proposed for minimizing the network delay and increasing network lifetime for 6LoWPAN networks based on RPL routing. The ML based approach is compared with normal RPL routing in order to check the performance of the system when compared to recent routing protocols. It is observed that the proposed machine learning based approach reduces the network delay by more than 20% and improves the network lifetime by more than 25% when compared to RPL based 6LoWPAN networks. The machine learning approach also takes into account the link quality between the nodes, thereby improving the overall QoS of the communication system by selecting paths with minimal delay, minimal energy consumption and maximum link quality.
    Keywords: Machine learning; 6LoWPAN; RPL; Feedback mechanism; Artificial Intelligence;.
    DOI: 10.1504/IJISTA.2020.10027027
    by D. Haripriya, S. Ramyasree 
    Abstract: In airports, there is a possibility of individual entry using fake tickets to involve in crime activities. The baggage mislaid and delay of flight service may lead to dissatisfaction among the passengers. The fake ticket identification, avoiding mislaid baggage and flight service delay notification are focused in this paper as existing systems are not attending all the issues together. An automated system is designed to increase the customer facilities in terms of flight delay notification, baggage mislaid alert and ticket bookings. The Baggage are handled using RFID tags whereas fake tickets are identified through QR scanning. The flight delays are predicted using machine learning based linear regression technique with 97% accuracy. Mobile app is developed for ticket booking to improve the passenger facilitation to a greater extent and web app is developed for airport management to verify the fake ticket. The proposed airport management system makes the air travel more customer friendly with high security.
    Keywords: Linear regression technique; RFID; QR code; Machine learning; Airport management.

  • Design of BTI Sensor Based Improved SRAM for Mobile Computing Applications   Order a copy of this article
    by Kumar Neeraj, J.K. Das, Hari Shanker Srivastava 
    Abstract: Reliability of electronic components is the major concern as the CMOS technology is scaled down especially in mobile computing applications of MPEG video processor design. Scaling CMOS technology leads to increase in power density per unit area in an exponentially manner. BTI is one of the serious problems in SRAM cell design at low technology level. In this paper a detection technique is proposed which detects the BTI effect on SRAM using SNM calculation. The proposed prototype is used to detect faults during read and write cycle of aged SRAM, which affects the reliability of the circuit. The diagnostics of fault is done by detection of BTI effect on SRAM using static noise margin (SNM) calculation. The circuit design on CMOS technology is carried out using HSPICE simulator in cadence.
    Keywords: Static RAM cell; CMOS technology; Bias Temperature Instability (BTI); Technology Scaling; Static Noise Margin (SNM).

  • Hybrid Genetic Algorithm in Partial Transmit Sequence to Improve OFDM   Order a copy of this article
    by Ravikumar Polukonda 
    Abstract: The work takes into consideration use of a technique known as the Partial Transmit Sequence (PTS) for the diminution of a Peak-to-Average-Power-Ratio (PAPR) of the Orthogonal Frequency Division Multiplexing (OFDM) signal in that of the wireless communication systems. The conventional scheme of the PTS uses extensive random search to explore the combinations of the phase vectors to improve PAPR, but this elevates the complexity of the search and also exponentially increase the number of phase vectors that demands high computational cost and compromise on accuracy. Here in this work, there is a suboptimal algorithm used for the phase optimization which is based on an enhanced version of the Genetic Algorithm (GA) which is applied for exploring optimal combination of the phase vectors providing an enhanced performance which is compared with the currently active algorithms like the Particle Swarm Optimization (PSO) algorithm or the Bacterial Foraging Optimization (BFO) algorithm. This hybrid GA will enhance the accuracy and the rate of convergence of all conventional algorithms with only a few parameters that required adjustment. The results of simulation proved that the hybrid GA-PSO and the GA-BFO based PTS algorithm was able to attain a reasonable reduction in the PAPR by employing a simple network structure on being compared to the other conventional algorithms.
    Keywords: Orthogonal Frequency Division Multiplexing (OFDM); rnPartial Transmit Sequence (PTS); rnPeak to Average Power Ratio (PAPR); rnGenetic Algorithm (GA); rnParticle Swarm Optimization (PSO) and rnBacterial Foraging Optimization (BFO).

    by Sekhar Babu, P.V. Naganjaneyulu, K. Satya Prasad 
    Abstract: The modern communication systemsface several issues that are quite challenging, more so in those involving smart antennas such as the antenna array beam. The antennas help the array in improving reception of that of a signal thereby improving the Signal-to-Interference Ratio (SIR). In the case of some of these coherent Multiple Input Multiple Output (MIMO) radar an optimal target signal and its processing can be achieved for any of the waveforms that are transmitted or the pattern of the radiation beam, thus making a transmit beam to be forming through a waveform design without bringing down the performance of target detection. There are several other techniques of that of Adaptive Beam Forming (ABF) which were proposed until now for optimizing the ability of steering of the array with regard to that of the main load and nulls, thus improving the Signal-to-Interference-Plus-Noise Ratio (SINR). In this work, an optimized neural network based on Bacterial Foraging Optimization Algorithm (BFOA) along with a Greedy Algorithm and a Tabu Search (TS) algorithm for the channel selection having an adaptive beam which is formed by using a steering vector is proposed. In the proposed hybrid, adaptive seed dispersion will make the BFOA-TS be able to converge faster when compared to a BFOA-Greedy. This type of behaviour has been duly verified by means of an application of the BFOA-TS and the BFOA-Greedy on the test functions which are well-known. The results of this experiment proved that the method proposed was able to achieve a better performance compared to that of the others.
    Keywords: Beam Forming; Smart Antenna; Multiple Input Multiple Output (MIMO) System; Channel Selection; Bacterial Foraging Optimization Algorithm (BFOA); Greedy algorithm and Tabu Search (TS).

  • Multiple data cost based stereo matching method to generate dense disparity maps from images under radiometric variations.   Order a copy of this article
    by Akhil Appu Shetty, V.I. George, C. Gurudas Nayak, Raviraj Shetty 
    Abstract: Stereo matching algorithms are capable of providing dense 3D information of the environment, through two images taken simultaneously from a pair of cameras placed horizontally and parallel to each other. This 3D information is generated in the form of disparity maps. The depth of the objects in the images can be extracted from the disparity map through the equation (b*f/d), where (b) and (f) indicate the baseline and focal length of the cameras, while (d) indicates the disparity obtained through the stereo matching method. Obtaining an accurate disparity map from a stereo image pair is not only a challenging task but also computationally expensive as we have to search for similar pixels in the reference and target images. In addition to this, if we take into consideration the environmental effect like difference in illumination and exposure conditions, then the difficulty of the task in hand increases drastically. The authors, in this research work, try to overcome this problem by combining multiple stereo cost functions in the form of a linear equation. Moreover, to reduce the computation time, a segmentation based cost aggregation method is followed in an attempt to produce an accurate disparity map even in the presence of radiometric variations in the images. The radiometric condition in the target image (left image) is fixed to (11), which indicates the illumination and exposure condition for the image. The radiometric conditions (exposure and illumination) for the target image (right image) are varied from (10) to (22) indicating a large variation in both illumination and exposure. The performance of the proposed algorithm is observed while varying the relationship parameter ? between the cost functions and the number of segments the images are broken into. Different image pairs with varying radiometric conditions used in this research work were obtained from the Middlebury stereo dataset.
    Keywords: Stereo matching;Middlebury stereo dataset;SLIC segmentation;disparity maps.

  • Neural Network Decoder for (7, 4) Hamming Code   Order a copy of this article
    by Aldrin Vaz, C. Gurudas Nayak, Dayananda Nayak 
    Abstract: To ensure the accuracy, integrity and fault-tolerance in the data to be transmitted, Error Correcting Codes (ECC) are used. To decode the received data and correct the errors, different techniques have been developed. In this paper, Artificial Neural Networks (ANN) have been used instead of traditional error correcting techniques, because of their real-time operation, self-organization and adaptive learning and to project what will most likely happen on the analogy of human brain. A decoding approach based on Back propagation Algorithm for feed forward ANN has been simulated using MATLAB for (7, 4) Hamming Code. The designed ANN is trained on all possible combination of code words such that it can detect and correct up to 1-bit error. The synaptic weights are updated during each training cycle of the network. The simulation results show that the proposed technique is correctly able to detect and correct 1-bit error in the received data.
    Keywords: Artificial Neural Network; Back Propagation Algorithm; Error Correcting Code; Hamming Code.

  • Implementation and Evaluation of a Trust Model with Data Integrity Based Scheduling in Cloud   Order a copy of this article
    by A.V.H. Sai Prasad, G.V.S. Raj Kumar 
    Abstract: Cloud computing is a model which provide services to the users as per their demand using the infrastructure belonging to various systems on a cloud that can be accessed using internet. By means of a simple and easy to understand Graphical User Interface (GUI) or Applications Programming Interface (API), the cloud computer can hide the inherent complexity of the infrastructure and associated fine details. Jobs in cloud computing are created based on priorities. By assigning the job to a suitable resource until a valid or optimal schedule is reached, the job that has the highest associated priority is first executed. This has introduced several challenges and also risks, from a security point of view and this also decreases the efficacy of the conventional protective approaches. To address the cloud challenges, data integrity plays a vital role and provides accuracy and consistence of the stored data without modified. This work suggests a trust based Min-Min and Max-Min algorithm as several unknown parties or enterprises provide various services. Max-Min schedules the longer task first when the instance is being scheduled and the Min-Min allows the task having the shortest computation time to take precedence. The Min-Min and Max-Min is based on the completion time and execution time only. Hence the trust factor is added to the conventional Min-Min and Max-Min algorithm along with the completion and execution time to support security and integrity in cloud. The specific characteristics of security within the cloud environment are assured using Trusted Third Party (TTP). For making the confidentiality, integrity and the authentication of the data and communication that are involved, cryptography has to be used. A horizontal level of service is presented by the solution which is made available to all the entities that are involved, this solution makes use of security mesh inside which the required trust is maintained.
    Keywords: Cloud Computing; \r\nScheduling; \r\nSecurity; \r\nMin-Min Algorithm; \r\nMax-Min Algorithm and \r\nTrust Model.