<p>This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference on
Soft Computing: Theories and Applications: Proceedings of SoCTA 2018 (Advances in Intelligent Systems and Computing, 1053)
â Scribed by Millie Pant (editor), Tarun K. Sharma (editor), Om Prakash Verma (editor), Rajesh Singla (editor), Afzal Sikander (editor)
- Publisher
- Springer
- Year
- 2020
- Tongue
- English
- Leaves
- 1403
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
The book focuses on soft computing and its applications to solve real-world problems in different domains, ranging from medicine and health care, to supply chain management, image processing and cryptanalysis. It includes high-quality papers presented at the International Conference on Soft Computing: Theories and Applications (SoCTA 2018), organized by Dr. B. R. Ambedkar National Institute of Technology, Jalandhar, Punjab, India. Offering significant insights into soft computing for teachers and researchers alike, the book inspires more researchers to work in the field of soft computing.
⊠Table of Contents
Preface
Contents
About the Editors
A Low Cost Charcoal Film Based Moisture Sensor: Fabrication and Computing
1 Introduction
2 Fabrication
3 Experimental Set-Up and Methodology
3.1 Experimental Set-Up
3.2 Methodology
4 Results and Discussion
5 Conclusion
References
Analysis of SMAW Parameters Using Self Organizing Maps and Probability Density Distributions
1 Introduction
2 Experimental Setup
2.1 Data Acquisition and Welding Setup
3 Results and Discussions
3.1 Evaluation of Welding Power Sources
3.2 Statistical (PDD) Analysis
3.3 SOM Analysis
3.4 Effect of Welding Current in SMAW Process
4 Conclusion
References
Inverted LSB Image Steganography
1 Introduction
2 Implementation
3 Conclusion
References
Emerging Ontology Formulation of Optimized Internet of Things (IOT) Services with Cloud Computing
1 Introduction
2 Literature Review
2.1 Cloud Performance Model
2.2 Ontological Model
3 Problem Formulation
4 Experimental Results and Simulation
4.1 Results Between Cloud Users and Cloud Parameters
5 Conclusion
References
Trend Analysis for Retail Chain Using Statistical Analysis System
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset
3.2 Data Preprocessing
3.3 Procedure
4 Results
4.1 PricingâWhat Affects Change in Prices?
4.2 How Location is Influencing Sales?
4.3 Other Inferences
4.4 Regression Analysis
5 Conclusion
References
An Optimizing Preprocessing Algorithm for Enhanced Web Content
1 Introduction
2 Preprocessing Methods
2.1 Stop-Words Removal
2.2 Tokenization
2.3 Stemming
2.4 Spelling Correction
2.5 Determine Correct Words
3 Proposed Model
3.1 Objectives
4 Results
5 Conclusion
References
Brain Tumor Classification from MRI Images and Calculation of Tumor Area
1 Introduction
2 Proposed Work
2.1 Feature Extraction
2.2 Feature Selection
2.3 Feature Classification
3 Experiment and Results
4 Performance Evaluation
5 Conclusion
References
The Min-transitive Fuzzy Left-Relation λd(A, B) on Intervals: A Generalization of λ(A, B)
1 Introduction
1.1 Orlovsky's Construction and λd(A, B)
2 Definition of λ(A, B)
2.1 Superiority of λ(A, B) over Ï(A, B)
2.2 Non-Min-transitivity of LeftM(cdot, cdot)
3 Generalization λd(A, B)
4 Comparison with Other Works
5 Conclusion
References
Rule-Based Customer Churn Prediction Model Using Artificial Neural Network Based and Rough Set Theory
1 Introduction
2 Artificial Neural Network
3 Rough Sets
4 Sentiment Analysis
5 Data Collection and Data Preprocessing
6 Proposed Framework
7 Results
8 Conclusion
References
Sigmoidal Spider Monkey Optimization Algorithm
1 Introduction
2 SMO Algorithm
2.1 Local Leader Phase (LLP)
2.2 Global Leader Phase (GLP)
2.3 Global Leader Learning (GLL) Phase
2.4 Local Leader Learning (LLL) Phase
2.5 Local Leader Decision (LLD) Phase
3 Sigmoidal SMO
4 Experimental Setup and Result Analysis
4.1 Result Analysis of SSMO
5 Conclusion
References
Concrete Mix Design Optimization Using a Multi-objective Cuckoo Search Algorithm
1 Introduction
2 Optimization Using the Cuckoo Search
2.1 Cuckoo Search Algorithm (Single Objective): [13]
2.2 Cuckoo Search Algorithm (Multi-objective) [11]
3 NSGAII
4 Mathematical Formulation of the Problem
5 Results
6 Conclusions
References
3D Scene Reconstruction of Vision Information for Mobile Robot Applications
1 Introduction
1.1 Hardware
2 Methodology
2.1 3D Reconstruction Using Optimised Mid-point Triangulation Method
3 Experimental Setup
3.1 Experimental Results
4 Conclusion
References
SCM Enterprise Solution Using Soft Computing Techniques
1 Supply Chain Management
2 Agile Supply Chain (ASC)
3 Soft Computing Techniques
4 Questionnaires AnalysisâAgile SCM with Soft Computing Mapping
5 Conclusion
References
Performance Analysis of the State-of-the-Art Neural Named Entity Recognition Model on Judicial Domain
1 Introduction
2 Related Work
3 Entities in the Judicial Domain
4 Experimental Setup and Results
4.1 Datasets
5 Error Analysis
6 Conclusion
References
Integrated Design of Model-Based Passive Fault-Tolerant Control for Nonlinear Systems Based on PID and Fuzzy Control
1 Introduction
2 Process Description and Mathematical Model
2.1 Linear State Space Model
3 PFTC Design for TTIHS
4 Simulation Results with Fault Scenarios
5 Conclusion
Appendix A
Appendix B
References
Performance Analysis of Evolutionary Technique Based Partitional Clustering Algorithms for Wireless Sensor Networks
1 Introduction
2 Related Works
3 Proposed Hybrid Clustering Algorithms
3.1 Phase1: Cluster Formation Phase
3.2 Phase 2: Cluster Head Selection Phase
3.3 Phase 3: Dissipated Energy Calculation Phase
4 Simulation Results
5 Conclusion
References
Dragon-AODV: Efficient Ad Hoc On-Demand Distance Vector Routing Protocol Using Dragon Fly Algorithm
1 Introduction
2 AODV Routing Protocol
2.1 AODV Message Type
2.2 Sequence Numbers
2.3 Routing Table Management
2.4 Functions of AODV Routing Protocol
3 Dragonfly Algorithm
4 Proposed Dragon AODV Algorithm
5 Result and Discussion
6 Conclusion
References
Comparative Analysis of Post-wavelet Denoising for Interpolated Images Having Various Noises
1 Introduction
2 Image Interpolation
3 Wavelet-Based Denoising
4 Noises in Images
4.1 Compression Artifacts
4.2 Other Noises
5 Proposed Analysis Model
6 Simulations Results
6.1 Wavelet Denoising Along with Bilinear Interpolation
6.2 Wavelet Denoising Along with Nearest Neighbor Interpolation
6.3 Wavelet Denoising Along with Cubic Interpolation
7 Conclusion
References
Analysis of OLSR and GPSR Routing Protocols in Airborne Networks for UDP and TCP Environment
1 Introduction
2 Related Research Work
3 Routing Protocols and Mobility Model
3.1 Optimized Link State Routing (OLSR) Algorithm
3.2 Greedy Perimeter Stateless Routing Algorithm (GPSR)
3.3 Mobility Model
4 Simulation Environment
4.1 Simulation Platform
4.2 Performance Metrics
4.3 Simulation Scenario
4.4 Results and Analysis
5 Conclusions and Future Scope
References
Deep Neural Network Model for Monthly Natural Gas Prediction
1 Introduction
2 Related Work
3 Methodology
4 Discussion and Results
5 Conclusion
References
Revisiting Cloud Security Threats: IP Spoofing
1 Introduction
2 Root Cause Study
3 A Survey of Related Work
4 Conclusive Findings
5 Conclusion and Future Work
References
Query-Oriented Patent Document Summarization System (QPSS)
1 Introduction
2 Methodology
2.1 Document Retrieval Through Google Search API
2.2 Patent Document Filterer
2.3 Patent Document Pre-processor
2.4 Extractive Summary Generator
3 Experimental Results
3.1 Results and Discussion
4 Conclusion
References
Further Results on the Stability of Discrete-Time State-Delayed Systems Under the Influence of Saturation Nonlinearities
1 Introduction
2 System Description
3 Main Results
4 Numerical Example
5 Conclusion
References
Sentiment Analysis of IPL Teams Using Supervised Machine Learning Approach
1 Introduction
2 Domain Analysis
3 Sentiment Analysis Using Machine Learning: AÂ Brief Survey
4 Implementation Details
4.1 Proposed Architecture
4.2 Data Collection
4.3 Data Pre-processing
4.4 Classification
4.5 Feature Vector Extraction
4.6 Classifier Accuracy for Training Data Analysis
5 Result and Discussion
5.1 Sentiment Results
6 Conclusion
7 Future Scope
References
Cryptosystem Based on Double Random Phase Encryption in Hybrid Transform Domain
1 Introduction
2 Overview
2.1 Double Random Phase Encryption
2.2 Hybrid Transform and Its Generation
2.3 Proposed Encryption Scheme
3 Results and Analysis
3.1 Fractional Ordersâ Sensitivity
3.2 Noise Attack Analysis
3.3 Occlusion Attack Analysis
4 Conclusion
References
Sustainable Supplier Selection Using Combined Thinking Process
1 Introduction
2 Materials and Methods
3 Result and Discussion
3.1 Identify the Constraint Value and the Process to Be Improved
3.2 Exploit the Constraint by Measuring the Value Stream
3.3 Subordinate and Maintain the Flow to Sustain the Improvement
3.4 Evaluate the Constraints
3.5 Work Toward Perfection and Check for Next Constraints
4 Conclusion
References
An Integrated Fuzzy-Based Methodology for Selection of Casting Pattern Material
1 Introduction
2 Research Methodology
3 Case Study
4 Conclusion and Future Scope
References
Efficient VM Placement Policy for Data Centre in Cloud Environment
1 Introduction
2 Related Work
3 Proposed Work
3.1 Proposed Policy Architecture
3.2 Flow Chart
3.3 Pseudocode
4 Experimental Result
5 Conclusion
References
Digital Image Forensics Using Local Optimal-Oriented Pattern and ELM
1 Introduction
1.1 Contributions of the Proposed Algorithm
1.2 Related Work
2 Methodology
2.1 Preprocessing Step
2.2 Feature Extraction
2.3 Classifier
3 Experimental Results
3.1 Experimental Environment
4 Conclusion
References
Feature Extraction-Based Segmentation of Anti-personnel Landmines and Its Optimization Using Genetic Algorithm
1 Introduction
2 Research Methodology
2.1 Polynomial Curve Fitting
2.2 Discrete Wavelet Transform (DWT)
2.3 Adaptive Thresholding Technique
2.4 K-means Algorithm
2.5 Fuzzy c-mean Algorithm
2.6 Proposed Algorithm
3 Experimental Setup
4 Results and Discussions
5 Conclusion and Future Scope
References
Image Steganography: Hiding Secrets in Random LSB Pixels
1 Introduction
2 Linear Feedback Shift Register (LFSR)
3 LFSR-Based Unique Random Number Generator (LFSR-URNG)
3.1 Basic Terms
3.2 Algorithm
4 Proposed Method
4.1 The Embedding Process
4.2 The Recovery Process
5 Results and Analysis
5.1 Peak Signal-to-Noise Ratio (PSNR)
5.2 Data Hiding Capacity
5.3 Histogram Analysis
5.4 Visual Steganalysis
5.5 RS Detection Attack
6 Conclusion
References
A Survey of Similarity Measures for Collaborative Filtering-Based Recommender System
1 Introduction
2 Objective and Analysis
3 Related Work
3.1 Pearson Correlation Coefficient
3.2 Cosine Correlation Coefficient
3.3 Jaccard Similarity Coefficient
3.4 Constrained Pearson Correlation and Sigmoid Function-Based Pearson Correlation
3.5 Euclidean Distance Measure and City Block Distance Measure
4 Results and Discussion
5 Conclusion
References
Function Classification of EEG Signal for HumanâComputer Interface
1 Introduction
2 Data Acquisition
3 Feature Extraction Using Discrete Wavelet Transform (DWT)
4 Dimensionality Reduction Technique
5 Function Classification Using SVM
6 Result Analysis
7 Conclusion
References
Robust Control of Flexible Link Manipulator
1 Introduction
2 Mathematical Modelling
2.1 Dynamic Modelling
2.2 LFT Modelling
2.3 Open-Loop Interconnected System
3 Hâ Controller Design
3.1 Hâ Controller
4 Simulation and Results
5 Conclusion
References
Peregrine Preying Pattern-Based Differential Evolution
1 Introduction
2 Overview of DE Algorithm
2.1 Mutation
2.2 Crossover
2.3 Selection
3 Peregrine Preying Pattern-Based DE Algorithm
4 Experimental Results and Discussion
4.1 Experimental Setting
4.2 Results Analysis of Experiments
4.3 Statistical Analysis
5 Conclusion
References
User Authentication in Big Data
1 Introduction
1.1 Kerberos
1.2 Secure Remote Password (SRP) Protocol
1.3 Mandatory Access Control (MAC)
1.4 Signcryption
1.5 Quantum Cryptography (QC)
2 Related Work
2.1 Steganography
2.2 Soft Dipole Representation
3 Proposed Model
3.1 Model of the Proposed Method
3.2 Phases of the Proposed Method
3.3 Algorithms of the Proposed Method
4 Security Analysis
5 Conclusion
References
A New Reputation-Based Algorithm (RBA) to Detect Malicious Nodes in Vehicular Ad Hoc Networks (VANETs)
1 Introduction
2 Literature Survey
3 Proposed Security Model for VANET
3.1 Assumptions for the Proposed Algorithm
3.2 Proposed Algorithm
4 Performance Evaluation
4.1 Performance Metrics
4.2 Result Evaluation
5 Conclusion and Future Scope
References
Implementation of Single Image De-hazing System on DSP TMS320C6748 Processor
1 Introduction
2 Implementation Issues
2.1 Image De-hazing System
2.2 The Selection of Hardware Platform
2.3 Speed-Up Techniques
3 Methodology
4 Results and Discussion
5 Conclusion
References
The Hardware Design Prospective of Object Detection by Using Background Subtraction Techniques: An Analytical Review
1 Introduction
2 Techniques of Background Subtraction
3 Systematic Development of Literature
4 Result
5 Application
6 Conclusion and Scope for Future Work
References
Performance of Elementary Schools by Data Envelopment Analysis and Differential Evolution
1 Introduction
2 Literature Review and Related Work
3 Preliminaries
3.1 Data Envelopment Analysis (DEA)
3.2 Differential Evolution (DE) and Multi-Objective Differential Evolution (MODE)
3.3 Adaptive Constraint Handling
4 Proposed Approach
5 Experimental Results
6 Conclusions
References
Solution of Branched Network Problems Using Meta-heuristics
1 Introduction
2 Branched Water Distribution Network
2.1 Problem Formulation
2.2 Single Load Distribution Network
2.3 Multiple Load Distribution Network
2.4 Constraint Handling
3 Meta-heuristics Algorithms
3.1 Particle Swarm Optimization (PSO)
3.2 Differential Evolution (DE)
3.3 Artificial Bee Colony (ABC)
3.4 Genetic Algorithm (GA)
3.5 Cuckoo Search (CS)
3.6 Simulated Annealing (SA)
3.7 Parameter Settings
4 Results
5 Conclusion
References
A GEANT4 Simulation Studies on Estimating the Efficiency of 10B-Based Stacked Semiconductor Neutron Detector
1 Introduction
2 Experimental Setup
3 Results and Discussions
4 Conclusions
References
Fuzzy Clustering-Based Process-Monitoring Strategy for a Multistage Manufacturing Facility
1 Introduction
2 Methodology
2.1 Blocking of the Process Variables via Fuzzy Clustering Technique
2.2 Development of a Process Model or Representation
2.3 Segregation of the Upset Condition or Faults in the Process
2.4 Diagnosis of the Detected Upset Conditions or Faults
3 Case Study Brief
4 Analysis and Results
5 Conclusions
References
Investigation of Filter Bank Multicarrier-Aided OFDM System
1 Introduction
2 Orthogonal Frequency Division Multiplexing (OFDM)
3 Filter Bank Multicarrier System (FBMC)
3.1 Compatibility of FBMC Framework with OFDM System
4 Simulation Results and Discussion
5 Conclusion
References
Fuzzy Multi-Objective Reliability Optimization of the Mixed SeriesâParallel System Using Hybrid NSGA-II
1 Introduction
2 Elitist Non-dominated Sorting Genetic Algorithm (NSGA-II)
3 Mathematical Model and Its Solution Methodology
3.1 Numerical Example
3.2 Parameter Settings
4 Results and Discussion
5 Conclusion
References
Effective Approach for Sentiment Analysis on Movie Reviews
1 Introduction
2 Background
3 Tools for Sentiment Analysis
3.1 Sentiwordnet
3.2 Python NLTK (Natural Language Toolkit)
3.3 Rapid Miner
3.4 Semantria
4 Sentiment Analysis Approaches
4.1 Sentiment Analysis in the view of Supervised Machine Learning Strategy
4.2 Sentiment Analysis by Using Lexicon-Based Technique
4.3 Hybrid Sentiment Analysis
4.4 Machine Learning Technique for Classification
5 Data Collection
6 Proposed Sentiment Analysis Framework
7 Result Analysis
8 Conclusion
References
A Makespan Based Framework for Detection of SLA Violations in Cloud Computing Environment
1 Introduction
1.1 Service Level Agreement (SLA)
1.2 SLA Components
1.3 SLA Metrics and Parameters
2 Related Work
3 Proposed Work
4 Results and Discussion
5 Future Scope
References
Integer Wavelet Transform-Based ECG Steganography for Hiding Patientsâ Confidential Information in e-Healthcare Systems
1 Introduction
2 Related Work
3 Preliminaries
3.1 Lifting Scheme-Based Integer Wavelet Transform
3.2 Chaotic Maps
3.3 ECG Database
4 Methodology
4.1 Preprocessing of ECG Signal
4.2 Conversion of Confidential Information into Ciphertext
4.3 Embedding Process
4.4 Extraction Process
5 Results and Discussions
6 Key Space Analysis
7 Conclusion
References
Effective Approach for Sentiment Analysis of Food Delivery Apps
1 Introduction
2 Related Work
3 Data Assemblage and Pre-processing
3.1 Data Collection Steps
3.2 Data Pre-processing
4 Proposed Framework
5 Experimental Analysis
6 Conclusion
References
Inferential Aspects of Doubly Truncated Generalized Gaussian Distribution
1 Introduction
1.1 Order Statistics of the Distribution
1.2 Order Statistic for Joint Moments
2 Inferential Aspects of the Distribution
2.1 Methods of Moments
2.2 Method of MLE
3 Application
4 Conclusion
References
No-Wait Flowshop Scheduling Problem with Bicriteria of Idle Time and Makespan
1 Introduction
2 Assumptions and Notations
3 Proposed Heuristic
3.1 Phase 1
3.2 Second Phase
3.3 Numerical Illustration
4 Computation Efficiency
5 Conclusion
References
Classification of Brain MRI Using Deep Learning Techniques
1 Introduction
1.1 Organization of the Paper
2 A Brief Review of Different Classification Techniques
2.1 Deep Learning
2.2 Convolution Neural Network (CNN)
3 Classification of Brain MRI Images Using CNN Based Model
3.1 ConvNet
3.2 LeNet
3.3 ResNet
3.4 DenseNet
4 Experimental Results
4.1 Evaluation Strategies
4.2 A Brief Comparison of Experimental Results for Different CNN Architectures
5 Conclusion
References
Multi-factor-Based Energy-Efficient Clustering and Routing Algorithm for WSN
1 Introduction
2 Related Work
3 Proposed Work
3.1 Enhanced Energy-Efficient Heterogeneous Clustering: (EEEHC)
3.2 Route Identification Technique:
4 Result and Experimental Simulation
5 Conclusion
References
Maximize Resource Utilization Using ACO in Cloud Computing Environment for Load Balancing
1 Introduction
2 Related Work
3 ACO in Cloud Computing
4 CLOUDSIMâAÂ Simulation Toolkit
5 Simulation Result and Analysis
6 Conclusion and Future Work
References
Biased Maps in Modified Intuitionistic Fuzzy Metric Space and Common Fixed Point Results
1 Introduction
2 Main Results
3 Conclusion
References
Performance Analysis of Jaya Algorithm Using CECâ2013 Benchmark Functions
1 Introduction
2 Related Work: Jaya Algorithm
3 Experimental Details and Results
3.1 Results of Jaya for CECâ13 Functions with Dimension 2, 5, 10, 30, 50, and 100
3.2 Comparison of JAYA with PSO and DGPA
4 Conclusions
References
Comparative Analysis of SEP, I-SEP, LEACH and PSO-Based Clustering Protocols in WSN
1 Introduction
2 Hierarchal Routing Protocols
2.1 Leach
2.2 Stable Election Protocol (Heterogeneous LEACH)
2.3 Improved Stable Election Protocol
2.4 Particle Swarm Optimization Based LEACH
3 Simulation Results
4 Conclusions
References
AI-Based Recommendation System for Social Networking
1 Introduction
2 Construction of Recommendation System
3 Related Work
4 Methodology Framework
4.1 Training Phase
4.2 Testing Phase
5 Result and Analysis
6 Conclusion
References
Agriculture Monitoring System Using IoTâAÂ Survey
1 Introduction
2 Related Works
3 Comparison of Different Monitoring System for the Agriculture Using IoT
4 Conclusion
References
A Hybrid Image Steganography Using Chaotic Maps in DCT Domain
1 Introduction
2 Preliminary
2.1 Discrete Cosine Transform (DCT)
2.2 Chaotic Map
3 Proposed Methodology
3.1 Embedding Process
3.2 Extraction Process
4 Performance Measures
4.1 Peak Signal to Noise Ratio (PSNR)
4.2 Embedding Capacity (EC)
4.3 Bit Error Rate (BER)
4.4 Universal Image Quality Index (Q)
5 Results and Discussion
6 Conclusion
References
Implementation of Quasi-Euclidean Distance-Based Similarity Model for Retrieving Information from OHSUMED Dataset
1 Introduction
2 Literature Review
3 Quasi-Euclidean-Based Similarity Measure
4 Implementation of the Proposed Quasi-Euclidean-Based Similarity Measure for Retrieving Information
5 Experimental Results and Discussion
6 Conclusion
References
M2P2: Movie's Trailer Reviews Based Movie Popularity Prediction System
1 Introduction
2 Related Work
3 Proposed Method
3.1 Phase 1: Pre-processing
3.2 Phase 2: Extracting Features from Trailers
3.3 Phase 3: Logistic Regression for Popularity Prediction
4 Results and Experiments
4.1 Qualitative Analysis
5 Conclusion and Future Work
References
Proposed Model/Framework to Avoid Sudden Cardiac Arrest (SCA) and Sudden Cardiac Death (SCD) at Early Stage
1 Introduction
1.1 Causes
1.2 Symptoms
1.3 Treatment
1.4 Prevention
2 Related Work
3 Todayâs Lifestyle and Risk Factors
4 Need of Lifestyle Moderation and Follow-up
5 Present Scenario
5.1 Atherosclerosis
5.2 Plaque Avoidance in Arteries
6 Proposed Model/Framework
7 Conclusion
References
Navigation System for Visually Impaired Using Li-Fi Technology
1 Introduction
2 Related Work
3 Proposed Work
3.1 System Architecture
3.2 Proposed Flowchart
3.3 Hardware Unit
4 Conclusion
References
A New Protein Sequence Classification Approach Using Positional-Average Values of Features
1 Introduction
2 Literature Review
3 Feature Extraction Using Molecular Weight and Iso-electric Point Calculation
4 Problem Analysis and Methodology
5 Experimental Result Analysis
6 Conclusion
References
Analytical Approach to Cross Project Defect Prediction
1 Introduction
2 Literature Review
3 Performance Indicators
3.1 Machine Learning Techniques
4 Granularity
5 Discussion
6 Challenges in Cross Project Defect Prediction
7 Conclusion
8 Future Scope
References
Detection and Classification of Citrus Leaf Disease Using Hybrid Features
1 Introduction
2 Methodology of Proposed Work
2.1 Image Data Acquisition
2.2 Image Preprocessing
2.3 Image Segmentation
2.4 Feature Extraction
2.5 Feature Selection
2.6 Classification
3 Experimental Set-Up and Result Analysis
4 Comparison with Existing Work
5 Conclusion and Future Scope
References
Short-Term Load Forecasting Using Parametric and Non-parametric Approaches
1 Introduction
2 Background
3 Methodology
3.1 Data Preprocessing
3.2 Observations
3.3 Predictive Models
4 Results
5 Conclusion
References
Analysis of Dynamic and Static Scheduling Algorithms in Soft Real-Time System with Its Implementation
1 Introduction
2 Dynamic Scheduling Algorithms
2.1 Earliest Deadline First (EDF)
2.2 Least Slack Time First (LST)
3 Static Scheduling Algorithms
3.1 The Rate Monotonic (RM)
3.2 The Shortest Job First (SJF)
4 Background Work
5 The Process Set and System Consideration
6 Practical Environment and Measuring Parameter
7 Result and Analysis
8 Conclusion
References
Particulate Matter Estimation Based on Haze Degree Factor
1 Introduction
2 Method and Materials
2.1 Preprocessing of AMOS Images
3 Haze Degree Estimation Function
4 Experimental Results
5 Conclusion
References
Audio Transmission Over Wavelet-Based Wireless VoIP
1 Introduction
2 Related Work
3 Methodology
3.1 Proposed Work
4 Analysis of Variance (ANOVA) Statistical Technique
5 Featuresâ Extraction for Performance Analysis
5.1 Percentage of Retained Signal Energy (PRSE)
5.2 Normalized Root Mean Square Error (NRMSE)
5.3 Compression Ratio (CR)
5.4 Signal-to-Noise (S/N) Ratio
5.5 Peak Signal-to-Noise Ratio (PSNR)
6 Results and Discussions
7 Conclusion
References
Revisiting Requirements Documentation Techniques and Challenges
1 Introduction
2 RD Process
2.1 Gathering Requirements
2.2 Recording Requirements
2.3 Classification of Requirements
2.4 Prioritizing Requirements
2.5 Writing the Document
2.6 Requirements Validation
3 Major Requirements Documentation Techniques and Challenges
3.1 Narrative Documentation
3.2 Data Flow Diagrams
3.3 Flowcharts
3.4 Unified Modeling Language (UML)
3.5 EntityâRelationship Diagramâ(ERD)
3.6 Business Process Modeling
4 Conclusion and Future Work
References
A Review of Parabolic Trough Collector and Its Modeling
1 Introduction
2 PTC and Competitive Technologies
3 Parabolic Trough Collectors
4 Modeling and Simulation of PTC
5 Applications of PTCs
5.1 Solar Power Generation
5.2 Industrial Purposes
5.3 Solar Desalination
6 Conclusion and Future Scope
References
Processing and Properties of SiC/SiC Composites
1 Introduction
2 Chemical Vapor Infiltration (CVI)
3 Reactive Infiltration
4 Polymer Infiltration and Pyrolysis (PIP)
5 Reaction Bonding Silicon Carbide (RBSC)
6 Conclusion
References
A Support Vector Machine Based Approach for Effective Fault Localization
1 Introduction
2 Related Work
3 Overview of SVM
4 Proposed Algorithm
5 Results and Analysis
6 Conclusions
References
Underwater Object Detection and Tracking
1 Introduction
2 Object Detection
2.1 Deciding the Target Image Amongst the Reference Image
2.2 Feature Extraction
2.3 Matching the Feature Points
3 Object Tracking
3.1 Detection
3.2 Prediction
3.3 Data Association
4 Results
5 Limitations
6 Future Work
References
Drift-Diffusion Model Parameters Underlying Cognitive Mechanism and Perceptual Learning in Autism Spectrum Disorder
1 Introduction
2 Methods and Apparatus
2.1 Methodology
2.2 Subjects Recruited
2.3 Stimuli and Procedure
3 Results and Discussion
3.1 Statistical Behavior Analysis
3.2 Behavioral Modeling
4 Conclusion
References
A Study of Spectral Data Processing with Emphasis on Spectral Similarity Measures for Hyperspectral Image Processing
1 Introduction
2 Methods for Spectroscopy Analysis
2.1 Empirical Mode Decomposition
2.2 Amplitude and Shape Feature Vector
2.3 Spectral Similarity Measure Methods Based on Amplitude Features
2.4 Spectral Similarity Measure Methods Based on Shape Features
3 Simulation Results
4 Conclusion and Future Work
References
Accessibility Evaluation of Private and Public Websites in India
1 Introduction
2 Review of Literature
2.1 Evaluation of Web Accessibility
2.2 Accessibility Guidelines
3 Methodology
3.1 Sample Websites for Evaluation
3.2 Tools and Guidelines for Evaluation
3.3 Procedure for Evaluation
4 Results
4.1 Level of Web Accessibility
4.2 Evaluation and Comparison of Different Categories of Private and Public Websites in India
5 Recommendation for Accessibility Barriers
6 Conclusion
References
Parallel Selective Sampling for Imbalance Data Sports Activities
1 Introduction
1.1 Computational Complexity
1.2 Minority Class
2 Parallel Selective Sampling
3 Relevance Vector Machine
3.1 Data Partitioning
3.2 Computing Tomek Links
4 Result
5 Conclusion
References
A Novel Approach for Handwritten Character Recognition Using K-NN Classifier
1 Introduction
2 Proposed Model
2.1 Preprocessing
2.2 Python Libraries
2.3 Implementation of K-NN
3 Experimental Result and Analysis
3.1 Digit Recognition
3.2 English Alphabet Recognition
3.3 Integrated Model for English Alphabet Recognition and Digit Recognition
4 Conclusion
References
Fuzzy Particle Swarm Page Rank Clustering Algorithm
1 Introduction
2 Background
2.1 FCM Algorithm
2.2 Particle Swarm Optimization
2.3 MPSOPR Algorithm
3 Proposed Fuzzy-PSOPRC Algorithm
4 Experimental Results
4.1 Results and Discussion
5 Conclusions
References
VEDL: A Novel Video Event Searching Technique Using Deep Learning
1 Introduction
2 Related Work
3 Proposed Method
3.1 Step 1: Key-Frame Extraction
3.2 Step 2: Event Detection
3.3 Step 3: Event Boundary Determination and Index Creation
4 Analysis
5 Conclusion
References
Design of Wearable Antennas for Body Area Networks
1 Introduction
2 Developments in Microstrip Patch Antenna
2.1 Microstrip Patch Antenna Developments Between 2008 and 2013
2.2 Microstrip Patch Antenna Developments Between 2013 and 2018
2.3 Microstrip Patch Antenna Developments 2018 Onward
3 Comparison on the Basis of Different Antenna Design Parameters
4 Conclusion
5 Future Scope
References
State-of-the-Art Object Recognition Techniques: AÂ Comparative Study
1 Introduction
2 Related Work
3 Object Recognition Techniques
3.1 Feature-Based Methods
3.2 Appearance-Based Methods
3.3 Artificial Neural Network (ANN)
4 Performance Analysis
5 Conclusion
References
Image Fusion and Its Separation Using SVD-Based ICA Method
1 Introduction
2 Image Separation Method
3 Concept Behind ICA
4 SVD Concept for Image Separation
5 Complete Analysis
6 Separated Images with SVD-Based ICA
7 Conclusion
References
Design of Wearable Health and Hazard Monitoring Device
1 Introduction
2 Objectives
3 Design of Prototype
3.1 Modelling
3.2 Components Used
3.3 Basic Circuit Connection
3.4 Android Application
4 Observation and Discussion
5 Conclusion and Future Work
6 Statement on Ethical Approval
References
A Source and Ownership Identification Framework for Mobile-Based Messenger Applications
1 Introduction
2 Proposed Method
2.1 Watermark Embedding
2.2 Watermark Extraction
3 Results and Discussions
4 Conclusion
References
Analysis of Cryptographic Communications Using Bit-Plane Measures and Fuzzy Computing
1 Introduction
2 Methodology
2.1 Images Encryption and Characteristics
2.2 Bit-Plane Specific Image Measures
2.3 Fuzzy Identification
3 Results and Discussions
3.1 Examples for Plain Images
3.2 Examples for XOR of Images Encrypted with Same Keys
4 Conclusion
References
Impact of Spacer Engineering on Hybrid Channel Junctionless Transistor Performance
1 Introduction
2 Device Structure and Simulation
3 Results and Discussion
4 Conclusion
References
Politics in the Cloud: A Review of Cloud Technology Applications in the Domain of Politics
1 Introduction
2 Nature of Cloud Computing
2.1 Operation Mode of Cloud Computing
2.2 Deployment and Service Models
2.3 Advantages of Cloud Computing
3 Cloud Computing Application Domains
3.1 Cloud Computing in Business
3.2 Cloud Computing in Healthcare
3.3 Cloud Computing in Education
4 The Nature of Politics
4.1 Politics Differs from Governance
5 Use of Cloud Computing in Various Sectors
6 Cloud Computing Applications in Politics
7 Conclusion, Recommendations, and Further Research
References
Applications of Metaheuristics in Hyperspectral Imaging: A Review
1 Introduction
2 Band Selection or Feature Selection
3 Spectral Unmixing or Endmember Extraction
4 Spatial Resolution Enhancement
5 Hyperspectral Image Classification and Clustering
6 Image Registration
7 Research Trends
8 Conclusion and Future Scope
References
Paradigm Shift of Water Demand Forecasting Techniques
1 Introduction
2 Water Demand, Production and Supply
2.1 Technologies Penetration
3 Water Demand Forecasting Techniques
3.1 Role and Expectation from Forecasting
3.2 Factors Affecting to Demand Forecasting
3.3 Conventional and Modern Techniques
3.4 Evolution of Water Demand Forecasting Techniques
3.5 Modern Techniques
4 Conclusion
References
A Brief Review on Multi-objective Differential Evolution
1 Introduction
2 Differential Evolution
2.1 Working of Differential Evolution
3 Multi-objective Differential Evolution (MODE)
3.1 Working of MODE
4 Application of Multi-objective Differential Evolution
5 Conclusion
References
Denoising of Continuous Glucose Monitoring Signal with Adaptive SG Filter
1 Introduction
2 Material and Method
2.1 SavitzkyâGolay Filter
2.2 Optimization Techniques
2.3 Continuous Glucose Monitoring (CGM)
2.4 Source of Data
3 Intelligent SG Filter
4 Results and Discussion
5 Conclusion
References
Design of FOPID Controller for Regulating Anesthesia
1 Introduction
2 Patient Anesthetic Model
2.1 Multiple Variable Anesthesia Model
3 Fractional-Order PID
4 Grey Wolf Algorithm
5 Experiment and Results
5.1 Robustness Analysis Under Parameter Uncertainties
5.2 Robustness Analysis Under Gaussian Noise
6 Conclusion
References
Machine Learning Application for Oscillation Detection in Control Loops
1 Introduction
2 Proposed Method
2.1 Training Database Description
2.2 Feature Extraction
2.3 ANN Classifier
3 Results and Discussion
4 Conclusion and Future Scope
References
Feature Preserving Regularized SavitzkyâGolay Filter for Ultrasonic Images
1 Introduction
2 Materials and Methods
2.1 SavitzkyâGolay Smoothing Filter (SGSF)
2.2 Total Generalized Variation
3 Results and Discussion
3.1 Synthetic Image
3.2 Field II Kidney Simulated Image
3.3 Real Image
4 Conclusion
References
Sentimental Analysis Using Twitter to Predict the 2019 PM Elections
1 Introduction
2 Background
3 Methodology
3.1 Data Collection
3.2 Data Analysis
3.3 Experimental Results
4 Conclusion
References
Quantification of Thought Analysis of Alcohol-Addicted Persons and Memory Loss of Patients Suffering from Stage 4 Liver Cancer
1 Introduction
2 Thought Analysis of Alcohol-Addicted Persons
3 Thought Analysis of Persons Suffering from Stage 4 Liver Cancer
4 Conclusion
Improved Parameter Estimation of Smart Grid by Hybridization of Kalman Filter with Bayesian Approach
1 Introduction
1.1 Load Flow Problem
2 Literature Review
3 Proposed Methodology
3.1 Optimization
4 Results Analysis
5 Conclusion
References
Performance of Cooperative Relaying Techniques Over Different Fading Channels in Industrial Wireless Sensor Networks
1 Introduction
2 System Model
2.1 Amplify and Forward (AF)
2.2 Decode and Forward (DF)
2.3 Maximum-Ratio Combining Diversity Technique (MRC)
3 Simulation Result
3.1 Performance of Relaying Techniques Over Nakagami-m Fading Channel
3.2 Performance of Relaying Techniques Over Rayleigh Fading Channel
4 Conclusion
References
Exploring Deep Convolution Neural Networks with Transfer Learning for Transformation Zone Type Prediction in Cervical Cancer
1 Introduction
2 Cervical Cancer Screening
2.1 Cellular-Based Approach
2.2 Tissue-Based Approach
3 Literature Survey
4 Dataset
4.1 Overview
4.2 Dataset Splitting
5 Methods
5.1 Cervix Net-I Residual Network
5.2 Cervix Net-II Inceptionv3
5.3 Dropout
5.4 Optimizer
6 Experiments, Results, and Discussion
6.1 CevixNet-I with Inceptionv3
6.2 CevixNet-III with ResNet34
7 Conclusion and Future Work
References
Automatic Extraction of Vessels from Newly Accessible Dataset
1 Introduction
2 Proposed Method
2.1 Mask Generation
2.2 Vessel Enhancement
2.3 Gray-Level Co-occurrence Matrix (GLCM) Computation
2.4 Second-Entropy Thresholding Segmentation
3 Performance Measurement
4 Experimental Results
5 Conclusion
References
Optimization of Wear Behavior of AZ91D-SiC-Gr Hybrid Composites Using Taguchi Experimental Design
1 Introduction
2 Experimental Details
2.1 Material and Hybrid Composite Fabrication
2.2 Wear Test
2.3 Experimental Design
3 Results and Discussion
3.1 Effect of Control Parameters on Weight Loss
3.2 ANOVA
3.3 Multiple Linear Regression Models
3.4 Confirmation Test
3.5 Worn Surface Analysis
4 Conclusions
References
Development of Disaster Management and Awareness System Using Twitter Analysis: A Case Study of 2018 Kerala Floods
1 Introduction
2 Methodology
2.1 Code Development for the Analysis
3 Data Analysis and Classification
3.1 State-Wise Analysis of Tweets
3.2 City-Wise Analysis of Tweets
3.3 Analysis of Effect of Neighbouring States
3.4 Per Capita Income Analysis of Various States
4 Conclusion and Future Work
References
Different Approaches of Classification of Brain Tumor in MRI Using Gabor Filters for Feature Extraction
1 Introduction
2 Related Work
3 Proposed Work and Methodology
3.1 Problem Statement
3.2 System Architecture
3.3 Texture Feature Extraction Using Gabor Filter
4 Results and Discussion
5 Conclusions
6 Future Work
References
Review on Analysis Techniques for Road Pothole Detection
1 Introduction
2 Techniques for Road Pothole Detection
3 Conclusion
References
Early Stage Detection of Psoriasis Using Artificial Intelligence and Image Processing
1 Introduction
2 Literature Survey
2.1 Skin Detection: A Random Forest Approach bibc1
2.2 Other Related Work
3 Existing Method
3.1 Psoriasis Detection Using Texture Features and Color bibc14
3.2 Neuro-fuzzy Approach to the Segmentation of Psoriasis Images bibc15
4 Proposed Method
4.1 Symptom Data Training Using Back Propagation Network
4.2 Image Training and Classification
5 Model for Skin Disease Detection
6 Android Application Module
7 Results and Analysis
8 Ethical Conduct
9 Future Scope
10 Conclusion
References
Modelling and Simulation of Reverse Osmosis System Using PSO-ANN Prediction TechniqueÂ
1 Introduction
2 Model Development
2.1 Particle Swarm Optimization (PSO)
2.2 Modelling of an RO Plant Using PSO-ANN Prediction Technique
3 Results and Discussion
4 Conclusion
References
High-Performance Fuzzy C-Means Image Clustering Based on Adaptive Frequency-Domain Filtering and Morphological Reconstruction
1 Introduction
2 Literature Review
3 Methodology
3.1 Fuzzy Logic
3.2 Fuzzy C-Means
3.3 Morphology
4 Proposed Work
5 Experimental Result and Discussion
6 Conclusion
References
Content-Based Retrieval of Multimedia Information Using Multiple Similarity Indexes
1 Introduction
2 Layered Architecture for Content-Based Retrieval of Images
2.1 Media Layer
2.2 Feature Extraction Layer
2.3 Similarity Mapping Layer
2.4 Conceptual Layer
3 Implementation
3.1 Creation of Multiple Similarity Index
4 Result Analysis
5 Conclusion
References
Handwritten Devanagari Character Generation Using Deep Convolutional Generative Adversarial Network
1 Introduction
2 Related Work
3 Methodology
3.1 Generative Modeling
3.2 Generative Adversarial Networks
3.3 Deep Convolutional Generative Adversarial Network (DCGAN)
4 Experiments and Discussions
4.1 Dataset
4.2 Experiment Setup
4.3 Results
5 Conclusion and Future Scope
References
Data Integrity Authentication Techniques in Cloud Computing: A Survey
1 Introduction
2 Data Integrity
3 Related Work
4 Data Integrity Authentication Techniques
4.1 Provable Data Possession (PDP)
4.2 Basic PDP Scheme Based on MAC
4.3 Scalable PDP
4.4 Dynamic PDP
4.5 Proof of Retrievability (PoR)
4.6 PoR Based on Keyed Hash Function hk(X)
4.7 Proof of Retrievability for Large Files
4.8 HAIL
4.9 PoR Based on Selecting Random Bits in Data Blocks
4.10 Model of PoR
5 Conclusion
References
Lossless Color Image Watermarking Based on Lifting Scheme and GWO for Copyright Protection
1 Introduction
2 Approaches
3 Proposed Watermarking Scheme
3.1 Embedding Method
3.2 Extraction Method
4 Results and Discussions
4.1 Performance Parameters
4.2 Experimental Results
5 Comparative Analysis
6 Conclusions
References
An Integrated TOE-DoI Framework for Cloud Computing Adoption in Higher Education: The Case of Sub-Saharan Africa, Ethiopia
1 Introduction
2 Technology Adoption
3 The Literature Review
3.1 The DoI
3.2 The TOE Framework
4 Research Methodology
4.1 Data Collection
4.2 Research Design
5 Results
6 Findings
7 Conclusion
References
A Monte Carlo Simulation Study of the Angular Correlations by Using Z+Jets Events at Centre of Mass Energy of 14 TeV
1 Event Generation, Selection and Validation
2 Track Selection
3 Calculation of Two-Particle Angular Correlation Function
4 Results
References
Generalized Mathematical Modeling of MEE for Calculation of Steam Efficiency and Steam Consumption
1 Introduction
2 Generalized Linear Mathematical Modeling of a Heptadâs Effect MEE
2.1 Parallel Feed Configuration
2.2 Backward Feed Configuration
3 Model Simulation
4 Result and Discussions
5 Summary
References
Controller Design Strategies for Load Frequency Control in Power System
1 Introduction
2 Modeling and Description of LFC System
3 PID Controller Design Techniques
3.1 Design Method Using Frequency Domain Through Direct Synthesis (DS) Approach
3.2 Design Method Using Laurent Series Expansion
3.3 Design via Linear Matrix Inequality (LMI) Approach
3.4 Design Technique Using Quadratic Regulator Approach with Compensating Pole (QRAWCP)
3.5 Design via Internal Model Controller (IMC)
4 Fractional-Order PID (FOPID) Controller Design Technique
5 Computational Results
6 Conclusion
References
DVCC Based Oscillator and Bandpass Filter with Grounded Passive Components
1 Introduction
2 Circuit Description
2.1 Proposed Oscillator Circuit
2.2 Proposed Bandpass Filter
3 Simulation Results
4 Conclusions
References
Decadal Growth of BCIs: A Review
1 Introduction
2 Literature Review
3 Conclusion
References
Export Performance and Comparative Advantage of India in Healthcare Merchandise Export
1 Introduction
2 Theoretical Background
3 Methodology
4 Trends and Export Performance of India for Healthcare Merchandises
4.1 Exports and Global Export Growth Rate of India (2001â2016)
4.2 Indiaâs Export/Import Ratio in Context of Healthcare Merchandise (2001â16)
5 Competitive Positioning of Indian Healthcare Product: An Aggregated Evaluation
5.1 Competitively Positioned (CP)
5.2 Threatened Healthcare Product (TP)
5.3 Emerging Products (EP) (Tier-I and Tier-II)
5.4 Weakly Positioned Products (WP) (Tier-I and Tier-II)
6 A Sectorial Analysis of Competitive Positioning of Healthcare Products
6.1 Bulk Medicines
6.2 Inputs Specific to the Pharmaceutical Industry
6.3 Chemical Inputs of General Purpose
6.4 Hospital and Laboratory Inputs
6.5 Medical Technology Equipment
7 Conclusion and Discussion of the Study
References
A New System Approximation Approach for Modelling of DCâDC Converter
1 Introduction
2 Mathematical Modelling of DCâDC Converter
2.1 When Switch Is Turned on
2.2 When Switch Is Turned off
3 Description of Proposed Method
3.1 Calculation of Lower-Order Denominator Polynomial
3.2 Calculation of Lower-Order Numerator Polynomial
4 Performance Evaluation and Discussion
5 Conclusion
References
Temperature as a Predictor of Neonatal Sepsis
1 Introduction
2 Materials and Methods
3 Results
4 Discussions
5 Conclusion
References
Isomorphic Subgraph for Identification of Singleton Attractors in Boolean Networks
1 Introduction
2 Materials and Methods
2.1 Definitions
2.2 Generation of Subgraphs and Subgraph Isomorphism:
2.3 Proposed Method and Analysis
3 Results and Discussion
3.1 Illustration Using Toy Network
3.2 Biological Boolean Network
4 Conclusion
References
Integrating Customer Preference Rating Approach with TOPSIS to Evaluate the Quality of Pulp
1 Introduction
2 Literature Review
3 Methodology
3.1 Customer Preference Rating (CPR)
3.2 Technique for Order Preference by Similarity to Ideal Solution (TOPSIS)
4 Case Study
4.1 Results and Analysis
5 Conclusions
References
Online Estimation of Liquid Viscosity and Density Based on Artificial Neural Network Approach
1 Introduction
2 Design and Working Mechanism
3 Theoretical Analysis
4 Result and Discussion
5 Conclusion
References
Comparative Analysis of Internet of Things Monitoring Devices in Smart Agriculture Using Deep-Learning Techniques
1 Introduction
2 IoT Monitoring Devices and Deep-Learning Techniques for Smart Agriculture
3 Key Points for Improving Production and Quality of Crop
4 Conclusion and Future Work
References
Security Issues in Internet of Things (IoT)-Enabled Systems: Problem and Prospects
1 Introduction
2 Security Issues and Challenges of IoT-Enabled Systems
3 Proposed Mitigation MechanismâTechnical Perspective and Managerial Perspective
4 Conclusion and Future Work
References
Soil Fertilization Status Assessment for IC-HAPI Zone of Rajasthan with SFM Computational Model
1 Introduction
2 Materials and Methods
2.1 Study Area
2.2 Soil Sampling
2.3 Physicochemical Measurement
2.4 Statistical Analysis
2.5 SFM Model
3 Results and Discussion
3.1 Physical Parameter Analysis of Farmland Soil (FLS)
3.2 Physical Parameter Analysis of Wasteland Soil (WLS)
3.3 Chemical Parameter Analysis of FLS
3.4 Chemical Parameter Analysis of WLS
3.5 DI Value Between FLS and WLS
3.6 Data Analysis by SFM Model
4 Conclusions
References
Enhanced Local Search in Shuffled Frog Leaping Algorithm
1 Introduction
2 Developments and Applications of SFLA
3 Concept of Shuffled Frog Leaping Algorithm
4 Modification in SFLA Structure
5 Human Resource Allocation Problem
6 Parameter Setting and Result Analyses
7 Conclusions
References
Author Index
đ SIMILAR VOLUMES
<p><p><p>The book focuses on soft computing and its applications to solve real-world problems occurring in different domains ranging from medicine and healthcare, and supply chain management to image processing and cryptanalysis. It includes high-quality papers presented in the International Confere
<span>Soft computing techniques open significant opportunities in several areas, such as industry, medicine, energy, security, transportation, and education. This book provides theory and applications development using soft computing techniques by organizing intelligent systems for many applications
<div>This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference o
<p><span>This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and health care, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Confere
<p><p>This book focuses on soft computing and its applications to solve real-life problems occurring in different domains ranging from medical and health care, supply chain management and image processing to cryptanalysis. It presents the proceedings of International Conference on Soft Computing: Th