scispace - formally typeset
Search or ask a question
Topic

Soft computing

About: Soft computing is a research topic. Over the lifetime, 6710 publications have been published within this topic receiving 118508 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a wrapper-based feature selection method called "Tabu Search - Random Forest (TS-RF)" was proposed for Network Intrusion Detection Systems (NIDS) to reduce dimensionality of data.

36 citations

Journal ArticleDOI
TL;DR: Computational experience with benchmark examples and solvent design MINLP models indicate strongly that the approach gives near globally optimal solutions.

36 citations

Journal ArticleDOI
01 May 2016
TL;DR: From the experimental results, it is inferred that proposed methods for determining optimal thresholds take less time for determining the optimal thresholds when compared with existing methods such as Otsu and Kapur methods.
Abstract: Multilevel thresholding is the method applied to segment the given image into unique sub-regions when the gray value distribution of the pixels is not distinct. The segmentation results are affected by factors such as number of threshold and threshold values. Hence, this paper proposes different methods for determining optimal thresholds using optimization techniques namely GA, PSO and hybrid model. Parallel algorithms are also proposed and implemented for these methods to reduce the execution time. From the experimental results, it is inferred that proposed methods take less time for determining the optimal thresholds when compared with existing methods such as Otsu and Kapur methods.

36 citations

Journal ArticleDOI
TL;DR: A survey of recent research publications that use Soft Computing methods to answer education-related problems based on the analysis of educational data ‘mined’ mainly from interactive/e-learning systems finds that top research questions in education today seeking answers through soft computing methods refer directly to the issue of quality.
Abstract: The aim of this paper is to survey recent research publications that use Soft Computing methods to answer education-related problems based on the analysis of educational data ‘mined’ mainly from interactive/e-learning systems. Such systems are known to generate and store large volumes of data that can be exploited to assess the learner, the system and the quality of the interaction between them. Educational Data Mining (EDM) and Learning Analytics (LA) are two distinct and yet closely related research areas that focus on this data aiming to address open education-related questions or issues. Besides ‘classic’ data analysis methods such as clustering, classification, identification or regression/analysis of variances, soft computing methods are often employed by EDM and LA researchers to achieve their various tasks. Their very nature as iterative optimization algorithms that avoid the exhaustive search of the solutions space and go for possibly suboptimal solutions yet at realistic time and effort, along with their heavy reliance on rich data sets for training, make soft computing methods ideal tools for the EDM or LA type of problems. Decision trees, random forests, artificial neural networks, fuzzy logic, support vector machines and genetic/evolutionary algorithms are a few examples of soft computing approaches that, given enough data, can successfully deal with uncertainty, qualitatively stated problems and incomplete, imprecise or even contradictory data sets – features that the field of education shares with all humanities/social sciences fields. The present review focuses, therefore, on recent EDM and LA research that employs at least one soft computing method, and aims to identify (i) the major education problems/issues addressed and, consequently, research goals/objectives set, (ii) the learning contexts/settings within which relevant research and educational interventions take place, (iii) the relation between classic and soft computing methods employed to solve specific problems/issues, and (iv) the means of dissemination (publication journals) of the relevant research results. Selection and analysis of a body of 300 journal publications reveals that top research questions in education today seeking answers through soft computing methods refer directly to the issue of quality – a critical issue given the currently dominant educational/pedagogical models that favor e-learning or computer- or technology-mediated learning contexts. Moreover, results identify the most frequently used methods and tools within EDM/LA research and, comparatively, within their soft computing subsets, along with the major journals relevant research is being published worldwide. Weaknesses and issues that need further attention in order to fully exploit the benefits of research results to improve both the learning experience and the learning outcomes are discussed in the conclusions.

36 citations

Journal ArticleDOI
TL;DR: This research proposes an optimized intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates, and uses Genetic Algorithm in the optimum selection of principal components.
Abstract: Intrusion detection is an important technique in computer and network security. A variety of intrusion detection approaches be present to resolve this severe issue but the main problem is performance. It is important to increase the detection rates and reduce false alarm rates in the area of intrusion detection. Therefore, in this research, an optimized intrusion detection mechanism using soft computing techniques is proposed to overcome performance issues. The KDD-cup dataset is used that is a benchmark for evaluating the security detection mechanisms. The Principal Component Analysis (PCA) is applied to transform the input samples into a new feature space. The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. The Support Vector Machine (SVM) is used for classification purpose. The performance of this approach is addresses. Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates.

36 citations


Network Information
Related Topics (5)
Fuzzy logic
151.2K papers, 2.3M citations
90% related
Artificial neural network
207K papers, 4.5M citations
86% related
Optimization problem
96.4K papers, 2.1M citations
84% related
Feature extraction
111.8K papers, 2.1M citations
82% related
Cluster analysis
146.5K papers, 2.9M citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023159
2022270
2021319
2020332
2019313
2018348