SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 6 Issue 2, January-February 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 870
Soft Computing in Human Sciences
Matthew N. O. Sadiku1
, Uwakwe C. Chukwu2
, Abayomi Ajayi-Majebi3
, Sarhan M. Musa1
1
Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX, USA
2
Department of Engineering Technology, South Carolina State University, Orangeburg, SC, USA
3
Department of Manufacturing Engineering, Central State University, Wilberforce, OH, USA
ABSTRACT
There are various problems that cannot be solved by conventional,
hard techniques. Soft computing has emerged as a way of solving
these problems, the way humans do. It is a new approach to
computing. It is an effective technique for solving problems of
classification, prediction, optimization, pattern recognition, image
processing, etc. Soft computing techniques include fuzzy logic,
genetic algorithms, evolution strategies, artificial neural network,
expert systems, and machine learning. These techniques have been
used in human-related sciences to solve practical problems related to
humans: their activities, health, and social needs. This paper provides
an introduction to various applications of soft computing techniques
in the human sciences.
KEYWORDS: soft computing, hard computing, computer science,
human sciences, natural sciences
How to cite this paper: Matthew N. O.
Sadiku | Uwakwe C. Chukwu | Abayomi
Ajayi-Majebi | Sarhan M. Musa "Soft
Computing in Human Sciences"
Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN:
2456-6470,
Volume-6 | Issue-2,
February 2022, pp.870-875, URL:
www.ijtsrd.com/papers/ijtsrd49305.pdf
Copyright © 2022 by author (s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
INTRODUCTION
Computing is the study of natural and artificial
information processes. It has now become a natural
science. Today, computing supports online
communities, who work through people, who work
through software that works through hardware. New
ways to view computing affects how we design and
build computing systems. As new principles are
discovered, computing is evolving and thriving
constantly. Figure 1 shows how computing evolved
through the four stages of hardware, software, people,
and community [1]. Every day more people use
computers to do more things in different ways, so
engineering, computer science, health, business,
psychology, mathematics, and education compete for
the computing crown. Academic institutions that
compartmentalize computing research into isolated
groups deny its multi-disciplinary future.
Computing includes computer science, computer
engineering, software engineering, information
technology, information science, and information
systems. The main functions of computing systems
include design, computation, communication, and
automation. Computation is the execution of
algorithms on a computer. The computer is the tool,
computation is the principle [2].
Computation is a process of converting the input of
one form to some other desired output form using
some actions. Computation was present long before
computers were invented, but the remarkable shift to
this realization occurred only in the last decade. In the
1940s, computation was seen as a tool for solving
problems, cracking codes, analyzing data, managing
business processes, and running simulation models.
Computation has established itself as a powerful tool
that made formerly intractable analyses tractable. It
has become a third pillar of science, joining theory
and experiment. Computation has become utterly
indispensable in many fields leading to computational
biology, computational chemistry, computational
physics, computational anatomy, computational
electromagnetics, computational fluids, computation
IJTSRD49305
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 871
social sciences, etc. [3]. Computation is everywhere
and is evolving to higher levels.
There is a major paradigm shift in the methods of
computing, which is the evolution from hard
computing to soft computing. The term “soft
computing” was coined by Lofti A. Zadeh in 1991.
Since then, the area has experienced rapid
development. Soft computing became a discipline
within computer science in the early1990s. The terms
“machine intelligence” and “computational
intelligence” have been used to have close meaning as
soft computing. The principal premise of soft
computing (SC) is that we live in a world that is
imprecise and uncertain. Soft computing refers to the
use of “inexact” solutions to computationally hard
tasks [4]. Soft computing’s aim is to exploit tolerance
for approximation, partial truth, uncertainty, and
imprecision, achieving close resemblance with human
like decision making. It can be used in human-related
sciences to solve practical problems related to
humans: their activities, health, and social needs.
OVERVIEW OF SOFT COMPUTING
There are two types of computing: hard computing
and soft computing. Hard computing is traditional
computing that requires precisely stated analytical
model and very large computation time. It is a process
of programming the computer to solve problems
using existing mathematical algorithms. It is facing
the problem of “living with” some aspects of
vagueness. Unlike the conventional hard computing,
soft computing is widely used for coping with the
tolerant of imprecision, uncertainty, partial truth, and
approximation.
It differs from the conventional hard computing as it
can handle uncertainty, imprecision easily. While
conventional hard computing is based on crisp values
and binary numbers, SC uses soft values and fuzzy
sets.
Soft computing is a consortium of techniques which
work with real life problems and provides flexible
information processing capabilities for handling real-
life and complex situations. The techniques strive to
provide approximate solutions at low cost, thereby
speeding up the process [5]. Soft computing (SC) is a
branch of computer science that resembles the
processes of the human brain. It may also be regarded
as a newly emerging multidisciplinary field. Its main
objective is to develop intelligent machines in order
to solve real- world problems.
Soft computing provides insights into real-world
problems and is just not limited to theory. It is the
process of solving real-life complex problems using
approximate calculations just like the human brain
works. It has tolerance for uncertainty and is
imprecise in nature due to which it has spread widely
into various industries.
Soft computing refers to a collection of computational
techniques in computer science, artificial intelligence,
and machine learning. The techniques aim to exploit
the tolerance of imprecision and uncertainty to
achieve tractability, robustness, and low solution cost.
Its principle components include:
Neural networks
Expert systems
Machine learning
Probabilistic reasoning
Evolutionary algorithms
Artificial neural networks
Fuzzy logic
Swarm intelligence
Interactive computational models
These computation methods or technologies provide
information processing capabilities to solve complex
practical problems. Some of these techniques are
illustrated in Figure 2 [6]. Soft computing combines
these technologies is to solve real-world problems,
which cannot be solved by hard computing.
APPLICATIONS OF SC IN HUMAN SCIENCES
Soft computing is used for solving real-life problems
and can be applied in different fields such as
education, healthcare, business, industry, engineering,
power systems, transportation, communication
systems, wireless communications, data mining,
home appliances, robotics, etc. [7]. Although a lot of
applications of soft computing have been made in the
natural sciences, few applications of soft computing
have been made in the human sciences, such as the
social and the behavioral sciences. Soft Computing
seems to enjoy a wide range of applications in human
sciences. Some common applications are presented as
follows.
Biometrics: Every human has unique
physiological and behavioral characteristics.
These characteristics are referred to as biometrics.
There are generally two types of biometrics: static
and dynamic. Static biometrics remain the same
throughout the lifespan while dynamic
characteristics may change gradually with time.
Examples of static biometrics include
fingerprints, iris patterns, face proportions, and
DNA. Dynamic biometrics includes voice, lips
movement, handwriting, and typing biometrics.
One of the most important application areas of
biometrics is in security. Computerized systems
need a robust and accurate security measure to
authenticate the identity of users. Typing
biometrics and neural network have been used as
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 872
an additional security layer for conventional
password-based or PIN-based protection for
computer users [8].
Handwriting Analysis: This is another form of
biometric modality. It is a technique for modeling
human activities and judging the human as a
device. It is also used to determine the types of
human mental state. The need of human
personality recognition is important in the modern
world. The handwritings reveal many things such
as a mental problem, hidden talents, morality,
health issue, past experience, etc. Handwriting
work indicates personality and behavior of
humans such as handwriting, speech, hand
gestures, American Sign Language, interviewing,
recruitment, selection, team-building, counseling,
and career-planning. Handwriting tends to expose
the true behavior, emotional outlay, fears, and
many other traits. It is referring to intelligence or
brain writing [9].
Human Activity Recognition (HAR): This
apprehends the regard of various computer
science communities just because of its potency
in real world applications. Human activity
recognition is done over the sensor based system.
There are two ways to recognize activity: online
and offline activity recognition. HAR can be done
into three main steps: data collection, features
extraction, and classification training and testing.
Various HAR tools are used in developing
devices for real world process. HAR systems are
used in military, healthcare, intelligent homes,
security etc. Soft computing is the science of
reasoning and deduction that uses the real world
phenomena of grouping, memberships, and
classification of various quantities. Human
activity recognition uses classifier that is support
vector machine (SVM), a soft computing
approach, which is well known classifier [10].
Rainfall Forecasting: Rain is one of the nature's
indispensable gifts and the entire agriculture
industry depends on rain in developing nations.
Therefore, rainfall prediction is essential in
countries thriving on agro-based economy. It is
well known that rainfall and climate are highly
non-linear and complex phenomena in nature.
Due to the complex nature of the parameters
involved, there is uncertainty in a rainfall
prediction. Soft computing is an innovative
approach to construct computationally intelligent
systems that possess humanlike expertise. Unlike
conventional hard computing techniques the
guiding principle of soft computing is to exploit
tolerance for imprecision, uncertainty, robustness,
partial truth to achieve tractability, and better
rapport with reality [11,12].
Obesity Prediction: Since obesity started
capturing headlines on all forms of media,
researches have spurred in all possible directions.
There has been a global interest on combating
obesity. Obesity is an abnormal accumulation of
body fat. It is associated with an increased risk of
illness, disability, and death. Although many
researches have been conducted to find the cause
of obesity by using statistical approaches, none of
them has concluded in any substantial results.
Real-world phenomena such as obesity are very
complex in nature to model. Soft computing
methods have addressed childhood obesity
prediction problem [13].
Terrorism Analysis: Terrorism is a globally
prevalent crime against humanity in modern
society. It is threat to humanity and stable
governance in both developing nations and
developed nations. Counter-terrorism efforts
require precise and reliable techniques to analyze
the patterns existing in data of previous terrorist
activities. Terrorist event databases are generally
fetched from newspaper articles, internet blogs,
television broadcasts, memoirs, books,
interviews, etc. With the evolution of technology,
methods of generating event databases have also
evolved. Forecasting terrorist attacks always
remains a dominant question in terrorism
analysis. Figure 3 shows major parameters of a
terrorist attack event [14]. Most of the
applications used for analyzing terrorism data are
based on soft computing techniques, such as
approximate reasoning, metaheuristic
optimization, and machine learning.
Other applications of soft computing in human
sciences include weather forecasting, malware
detection, analysis of human knee joint, human
behavior recognition, speech recognition, pattern
recognition, facial expression recognition,
communications, human-centered interfaces, image
processing, and decision-support systems.
BENEFITS
Soft computing uses imprecise elucidations to
computationally hard tasks for which there is no
established algorithm. In contrast with hard
computing, soft computing is liberal to imprecision,
ambiguity, approximation as well as fractional truths.
Soft computing is receptive to uncertainty,
imprecision as well as partial truth and is applicable
for the real world practical problems where the ideal
model is unavailable [15]. Other benefits of soft
computing include the following [16].
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 873
Its applications are tolerant to imprecision,
approximation and uncertainty.
It incorporates stochastic.
It can generate (evolve) its own programs.
It can deal with ambiguous and noisy data.
It allows parallel computations.
Programs learn by own.
It requires very less time for computation.
Its role model is human brain or human
reasoning.
It is applicable in real-time.
CONCLUSION
Computing is already moving into all fiends,
including education, where it is inspiring young men
and women to consider computing careers. Children
have been taught computing principles using ordinary
materials such as cards, drawing paper, games,
exercises, and magic tricks. This way they can
understand computing concepts without a computer.
Soft computing is one of the most attractive fields
today. Practically no area is left untouched by soft
computing. In most of the applications, soft
computing techniques show strong intelligence,
robustness, and cost-effectiveness. Soft computing
techniques will be indispensable tools for analysis in
the new era. Soft computing techniques still await
their golden age in human sciences. More information
about soft computing in healthcare can be found in
the books [17-26] and the following related journals:
Soft Computing
Applied Soft Computing
Journal of Human Sciences and Extension
Biomedical Soft Computing and Human Sciences
REFERENCES
[1] B. Whitworth and A. Ahmad, “The evolution of
computing,” https://www.interaction-
design.org/literature/book/the-social-design-of-
technical-systems-building-technologies-for-
communities-2nd-edition/the-evolution-of-
computing
[2] P. J. Denning, “Computing is a natural
science,” Communications of the ACM, vol. 50,
no. 7, July 2007, pp. 13-18.
[3] M. N. O. Sadiku, Computational
Electromagnetics with MATLAB. Boca Raton,
FL: CRC Press, 4th ed., 2019.
[4] M. N. O. Sadiku, Y. Wang, S. Cui, S. M. Musa,
“Soft computing: An introduction,”
International Journal of Advanced Research in
Computer Science and Software Engineering,
vol. 8, no. 6, June 2018, pp. 63-65.
[5] F. Hao, D. S. Park, and Z. Pei, “When social
computing meets soft computing: opportunities
and insights,” Human-centric Computing and
Information Sciences, vol. 8, no. 8, 2018.
[6] S. Mahmudova, “Machine learning for
software,”
https://www.researchgate.net/figure/A-list-of-
components-for-Soft-
Computing_fig1_336716965
[7] M. Dahiya, “Applications of soft computing in
various areas,” International Journal of
Engineering Sciences & Research Technology,
vol. 6, no. 5, May 2017, pp. 712-716.
[8] A. Quteishat et al., “Authenticating the Identity
of Computer Users with Typing Biometrics and
the Fuzzy Min-Max Neural Network,”
Biomedical Soft Computing and Human
Sciences, vol.14, no.1, 2009, pp.47-53.
[9] A. Varshney and C. Kumar, “An intellectual
system for human personality identification
using soft-computing,” International Journal of
Science and Research, vol. 6, no. 4, April 2017,
pp. 2008-2012.
[10] M. V. Kharat, K. H. Walse, R. V. Dharaskar,
“Survey on soft computing approaches for
human activity recognition,” International
Journal of Science and Research, vol. 6, no. 2,
February 2017, pp. 1328-1334.
[11] A. Abraham, N. S. Philip, and P.K. Mahanti,
“Soft computing models for weather
forecasting,” Microsoft Word - ajith-ninan-
mahanti-journal.doc (softcomputing.net)
[12] R. Bhardwaj and V. Duhoon, “Weather
forecasting using soft computing techniques,”
Proceedings of International Conference on
Computing, Power and Communication
Technologies, September 2018, 2018.
[13] P. N. Shrestha, “Applying soft computing to
early obesity prediction,” Masters Thesis,
Southern Illinois University Carbondale,
December 2006.
[14] S. R. Srivastava, Y. K. Meena, and G. Singh,
“The landscape of soft computing applications
for terrorism analysis: A review,” Applied Soft
Computing, vol. 113, Part B, December 2021.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 874
[15] S. B. B. Priyadarshini et al., “A comprehensive
review on soft computing framework,”
International Journal of Advanced Mechanical
Engineering, vol. 8, no.1, 2018, pp. 221-228.
[16] U. Kumari, “Soft computing applications: A
perspective view,” Proceedings of the 2nd
International Conference on Communication
and Electronics Systems, 2017, pp. 787-789.
[17] L. Wang, (ed.), Soft Computing in
Communications. Springer, 2013.
[18] S. Roy and U. Chakraborty, Soft computing.
India: Pearson Education, 2013.
[19] L. Rutkowski and Leszek Rutkowski, New Soft
Computing Techniques For System Modeling,
Pattern Classification and Image Processing.
Berlin: Springer-Verlag, 2004.
[20] Intelligent Techniques and Soft Computing in
Nuclear Science and Engineering: Proceedings
of the 4th International FLINS Conference,
Bruges, Belgium, August 2000.
[21] F. Saeed et al. (eds.), Recent Trends in Data
Science and Soft Computing: Proceedings of
the 3rd International Conference of Reliable
Information and Communication Technology.
Springer 2019.
[22] S. Borah and R. Panigrahi (eds.), Applied Soft
Computing: Techniques and Applications.
Apple Academic Press, 2022.
[23] R. Seising and V. S. González (eds.), Soft
Computing in Humanities and Social Sciences.
Springer 2012.
[24] H. L. Teodorescu, A. Kandel, and L. C. Jain
(eds.), Soft Computing in Human-Related
Sciences. Boca Raton, FL: CRC Press, 1999.
[25] Z. Q. Liu and S. Miyamoto (eds.), Computer
Science Workbench: Soft Computing and
Human-Centered Machines. Japan: Springer
2013.
[26] V. A. Niskanen, Soft Computing Methods in
Human Sciences. Berlin Heidelberg: Springer,
2013.
Figure 1 the four stages of computing [1].
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 875
Figure 2 Soft computing approaches [6].
Figure 3 Major parameters of a terrorist attack event [15]

More Related Content

Similar to Soft Computing in Human Sciences

AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
ijtsrd
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
vishal dineshkumar soni
 
PatternLanguageOfData
PatternLanguageOfDataPatternLanguageOfData
PatternLanguageOfData
kimErwin
 

Similar to Soft Computing in Human Sciences (20)

Introduction to soft computing
 Introduction to soft computing Introduction to soft computing
Introduction to soft computing
 
A Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer ScienceA Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer Science
 
Soft Computing in Robotics
Soft Computing in RoboticsSoft Computing in Robotics
Soft Computing in Robotics
 
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptxCOMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
COMPUTER APPLICATIONS Module 1 HPSY - Copy.pptx
 
Society impact over tech.pptx
Society impact over tech.pptxSociety impact over tech.pptx
Society impact over tech.pptx
 
Cognitive technologies
Cognitive technologiesCognitive technologies
Cognitive technologies
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing with
 
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...
 
Quantum Computing – A Tech Story
Quantum Computing – A Tech StoryQuantum Computing – A Tech Story
Quantum Computing – A Tech Story
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate world
 
Soft Computing in Management An Introduction
Soft Computing in Management An IntroductionSoft Computing in Management An Introduction
Soft Computing in Management An Introduction
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AI
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AI
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AI
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
 
PatternLanguageOfData
PatternLanguageOfDataPatternLanguageOfData
PatternLanguageOfData
 
Essence of Soft Computing in Healthcare
Essence of Soft Computing in HealthcareEssence of Soft Computing in Healthcare
Essence of Soft Computing in Healthcare
 
Computation of Neural Network using C# with Respect to Bioinformatics
Computation of Neural Network using C# with Respect to BioinformaticsComputation of Neural Network using C# with Respect to Bioinformatics
Computation of Neural Network using C# with Respect to Bioinformatics
 
trends of information systems and artificial technology
trends of information systems and artificial technologytrends of information systems and artificial technology
trends of information systems and artificial technology
 
A Case Study of Artificial Intelligence is being used to Reshape Business
A Case Study of Artificial Intelligence is being used to Reshape BusinessA Case Study of Artificial Intelligence is being used to Reshape Business
A Case Study of Artificial Intelligence is being used to Reshape Business
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Soft Computing in Human Sciences

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 6 Issue 2, January-February 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 870 Soft Computing in Human Sciences Matthew N. O. Sadiku1 , Uwakwe C. Chukwu2 , Abayomi Ajayi-Majebi3 , Sarhan M. Musa1 1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX, USA 2 Department of Engineering Technology, South Carolina State University, Orangeburg, SC, USA 3 Department of Manufacturing Engineering, Central State University, Wilberforce, OH, USA ABSTRACT There are various problems that cannot be solved by conventional, hard techniques. Soft computing has emerged as a way of solving these problems, the way humans do. It is a new approach to computing. It is an effective technique for solving problems of classification, prediction, optimization, pattern recognition, image processing, etc. Soft computing techniques include fuzzy logic, genetic algorithms, evolution strategies, artificial neural network, expert systems, and machine learning. These techniques have been used in human-related sciences to solve practical problems related to humans: their activities, health, and social needs. This paper provides an introduction to various applications of soft computing techniques in the human sciences. KEYWORDS: soft computing, hard computing, computer science, human sciences, natural sciences How to cite this paper: Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Soft Computing in Human Sciences" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2, February 2022, pp.870-875, URL: www.ijtsrd.com/papers/ijtsrd49305.pdf Copyright © 2022 by author (s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) INTRODUCTION Computing is the study of natural and artificial information processes. It has now become a natural science. Today, computing supports online communities, who work through people, who work through software that works through hardware. New ways to view computing affects how we design and build computing systems. As new principles are discovered, computing is evolving and thriving constantly. Figure 1 shows how computing evolved through the four stages of hardware, software, people, and community [1]. Every day more people use computers to do more things in different ways, so engineering, computer science, health, business, psychology, mathematics, and education compete for the computing crown. Academic institutions that compartmentalize computing research into isolated groups deny its multi-disciplinary future. Computing includes computer science, computer engineering, software engineering, information technology, information science, and information systems. The main functions of computing systems include design, computation, communication, and automation. Computation is the execution of algorithms on a computer. The computer is the tool, computation is the principle [2]. Computation is a process of converting the input of one form to some other desired output form using some actions. Computation was present long before computers were invented, but the remarkable shift to this realization occurred only in the last decade. In the 1940s, computation was seen as a tool for solving problems, cracking codes, analyzing data, managing business processes, and running simulation models. Computation has established itself as a powerful tool that made formerly intractable analyses tractable. It has become a third pillar of science, joining theory and experiment. Computation has become utterly indispensable in many fields leading to computational biology, computational chemistry, computational physics, computational anatomy, computational electromagnetics, computational fluids, computation IJTSRD49305
  • 2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 871 social sciences, etc. [3]. Computation is everywhere and is evolving to higher levels. There is a major paradigm shift in the methods of computing, which is the evolution from hard computing to soft computing. The term “soft computing” was coined by Lofti A. Zadeh in 1991. Since then, the area has experienced rapid development. Soft computing became a discipline within computer science in the early1990s. The terms “machine intelligence” and “computational intelligence” have been used to have close meaning as soft computing. The principal premise of soft computing (SC) is that we live in a world that is imprecise and uncertain. Soft computing refers to the use of “inexact” solutions to computationally hard tasks [4]. Soft computing’s aim is to exploit tolerance for approximation, partial truth, uncertainty, and imprecision, achieving close resemblance with human like decision making. It can be used in human-related sciences to solve practical problems related to humans: their activities, health, and social needs. OVERVIEW OF SOFT COMPUTING There are two types of computing: hard computing and soft computing. Hard computing is traditional computing that requires precisely stated analytical model and very large computation time. It is a process of programming the computer to solve problems using existing mathematical algorithms. It is facing the problem of “living with” some aspects of vagueness. Unlike the conventional hard computing, soft computing is widely used for coping with the tolerant of imprecision, uncertainty, partial truth, and approximation. It differs from the conventional hard computing as it can handle uncertainty, imprecision easily. While conventional hard computing is based on crisp values and binary numbers, SC uses soft values and fuzzy sets. Soft computing is a consortium of techniques which work with real life problems and provides flexible information processing capabilities for handling real- life and complex situations. The techniques strive to provide approximate solutions at low cost, thereby speeding up the process [5]. Soft computing (SC) is a branch of computer science that resembles the processes of the human brain. It may also be regarded as a newly emerging multidisciplinary field. Its main objective is to develop intelligent machines in order to solve real- world problems. Soft computing provides insights into real-world problems and is just not limited to theory. It is the process of solving real-life complex problems using approximate calculations just like the human brain works. It has tolerance for uncertainty and is imprecise in nature due to which it has spread widely into various industries. Soft computing refers to a collection of computational techniques in computer science, artificial intelligence, and machine learning. The techniques aim to exploit the tolerance of imprecision and uncertainty to achieve tractability, robustness, and low solution cost. Its principle components include: Neural networks Expert systems Machine learning Probabilistic reasoning Evolutionary algorithms Artificial neural networks Fuzzy logic Swarm intelligence Interactive computational models These computation methods or technologies provide information processing capabilities to solve complex practical problems. Some of these techniques are illustrated in Figure 2 [6]. Soft computing combines these technologies is to solve real-world problems, which cannot be solved by hard computing. APPLICATIONS OF SC IN HUMAN SCIENCES Soft computing is used for solving real-life problems and can be applied in different fields such as education, healthcare, business, industry, engineering, power systems, transportation, communication systems, wireless communications, data mining, home appliances, robotics, etc. [7]. Although a lot of applications of soft computing have been made in the natural sciences, few applications of soft computing have been made in the human sciences, such as the social and the behavioral sciences. Soft Computing seems to enjoy a wide range of applications in human sciences. Some common applications are presented as follows. Biometrics: Every human has unique physiological and behavioral characteristics. These characteristics are referred to as biometrics. There are generally two types of biometrics: static and dynamic. Static biometrics remain the same throughout the lifespan while dynamic characteristics may change gradually with time. Examples of static biometrics include fingerprints, iris patterns, face proportions, and DNA. Dynamic biometrics includes voice, lips movement, handwriting, and typing biometrics. One of the most important application areas of biometrics is in security. Computerized systems need a robust and accurate security measure to authenticate the identity of users. Typing biometrics and neural network have been used as
  • 3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 872 an additional security layer for conventional password-based or PIN-based protection for computer users [8]. Handwriting Analysis: This is another form of biometric modality. It is a technique for modeling human activities and judging the human as a device. It is also used to determine the types of human mental state. The need of human personality recognition is important in the modern world. The handwritings reveal many things such as a mental problem, hidden talents, morality, health issue, past experience, etc. Handwriting work indicates personality and behavior of humans such as handwriting, speech, hand gestures, American Sign Language, interviewing, recruitment, selection, team-building, counseling, and career-planning. Handwriting tends to expose the true behavior, emotional outlay, fears, and many other traits. It is referring to intelligence or brain writing [9]. Human Activity Recognition (HAR): This apprehends the regard of various computer science communities just because of its potency in real world applications. Human activity recognition is done over the sensor based system. There are two ways to recognize activity: online and offline activity recognition. HAR can be done into three main steps: data collection, features extraction, and classification training and testing. Various HAR tools are used in developing devices for real world process. HAR systems are used in military, healthcare, intelligent homes, security etc. Soft computing is the science of reasoning and deduction that uses the real world phenomena of grouping, memberships, and classification of various quantities. Human activity recognition uses classifier that is support vector machine (SVM), a soft computing approach, which is well known classifier [10]. Rainfall Forecasting: Rain is one of the nature's indispensable gifts and the entire agriculture industry depends on rain in developing nations. Therefore, rainfall prediction is essential in countries thriving on agro-based economy. It is well known that rainfall and climate are highly non-linear and complex phenomena in nature. Due to the complex nature of the parameters involved, there is uncertainty in a rainfall prediction. Soft computing is an innovative approach to construct computationally intelligent systems that possess humanlike expertise. Unlike conventional hard computing techniques the guiding principle of soft computing is to exploit tolerance for imprecision, uncertainty, robustness, partial truth to achieve tractability, and better rapport with reality [11,12]. Obesity Prediction: Since obesity started capturing headlines on all forms of media, researches have spurred in all possible directions. There has been a global interest on combating obesity. Obesity is an abnormal accumulation of body fat. It is associated with an increased risk of illness, disability, and death. Although many researches have been conducted to find the cause of obesity by using statistical approaches, none of them has concluded in any substantial results. Real-world phenomena such as obesity are very complex in nature to model. Soft computing methods have addressed childhood obesity prediction problem [13]. Terrorism Analysis: Terrorism is a globally prevalent crime against humanity in modern society. It is threat to humanity and stable governance in both developing nations and developed nations. Counter-terrorism efforts require precise and reliable techniques to analyze the patterns existing in data of previous terrorist activities. Terrorist event databases are generally fetched from newspaper articles, internet blogs, television broadcasts, memoirs, books, interviews, etc. With the evolution of technology, methods of generating event databases have also evolved. Forecasting terrorist attacks always remains a dominant question in terrorism analysis. Figure 3 shows major parameters of a terrorist attack event [14]. Most of the applications used for analyzing terrorism data are based on soft computing techniques, such as approximate reasoning, metaheuristic optimization, and machine learning. Other applications of soft computing in human sciences include weather forecasting, malware detection, analysis of human knee joint, human behavior recognition, speech recognition, pattern recognition, facial expression recognition, communications, human-centered interfaces, image processing, and decision-support systems. BENEFITS Soft computing uses imprecise elucidations to computationally hard tasks for which there is no established algorithm. In contrast with hard computing, soft computing is liberal to imprecision, ambiguity, approximation as well as fractional truths. Soft computing is receptive to uncertainty, imprecision as well as partial truth and is applicable for the real world practical problems where the ideal model is unavailable [15]. Other benefits of soft computing include the following [16].
  • 4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 873 Its applications are tolerant to imprecision, approximation and uncertainty. It incorporates stochastic. It can generate (evolve) its own programs. It can deal with ambiguous and noisy data. It allows parallel computations. Programs learn by own. It requires very less time for computation. Its role model is human brain or human reasoning. It is applicable in real-time. CONCLUSION Computing is already moving into all fiends, including education, where it is inspiring young men and women to consider computing careers. Children have been taught computing principles using ordinary materials such as cards, drawing paper, games, exercises, and magic tricks. This way they can understand computing concepts without a computer. Soft computing is one of the most attractive fields today. Practically no area is left untouched by soft computing. In most of the applications, soft computing techniques show strong intelligence, robustness, and cost-effectiveness. Soft computing techniques will be indispensable tools for analysis in the new era. Soft computing techniques still await their golden age in human sciences. More information about soft computing in healthcare can be found in the books [17-26] and the following related journals: Soft Computing Applied Soft Computing Journal of Human Sciences and Extension Biomedical Soft Computing and Human Sciences REFERENCES [1] B. Whitworth and A. Ahmad, “The evolution of computing,” https://www.interaction- design.org/literature/book/the-social-design-of- technical-systems-building-technologies-for- communities-2nd-edition/the-evolution-of- computing [2] P. J. Denning, “Computing is a natural science,” Communications of the ACM, vol. 50, no. 7, July 2007, pp. 13-18. [3] M. N. O. Sadiku, Computational Electromagnetics with MATLAB. Boca Raton, FL: CRC Press, 4th ed., 2019. [4] M. N. O. Sadiku, Y. Wang, S. Cui, S. M. Musa, “Soft computing: An introduction,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8, no. 6, June 2018, pp. 63-65. [5] F. Hao, D. S. Park, and Z. Pei, “When social computing meets soft computing: opportunities and insights,” Human-centric Computing and Information Sciences, vol. 8, no. 8, 2018. [6] S. Mahmudova, “Machine learning for software,” https://www.researchgate.net/figure/A-list-of- components-for-Soft- Computing_fig1_336716965 [7] M. Dahiya, “Applications of soft computing in various areas,” International Journal of Engineering Sciences & Research Technology, vol. 6, no. 5, May 2017, pp. 712-716. [8] A. Quteishat et al., “Authenticating the Identity of Computer Users with Typing Biometrics and the Fuzzy Min-Max Neural Network,” Biomedical Soft Computing and Human Sciences, vol.14, no.1, 2009, pp.47-53. [9] A. Varshney and C. Kumar, “An intellectual system for human personality identification using soft-computing,” International Journal of Science and Research, vol. 6, no. 4, April 2017, pp. 2008-2012. [10] M. V. Kharat, K. H. Walse, R. V. Dharaskar, “Survey on soft computing approaches for human activity recognition,” International Journal of Science and Research, vol. 6, no. 2, February 2017, pp. 1328-1334. [11] A. Abraham, N. S. Philip, and P.K. Mahanti, “Soft computing models for weather forecasting,” Microsoft Word - ajith-ninan- mahanti-journal.doc (softcomputing.net) [12] R. Bhardwaj and V. Duhoon, “Weather forecasting using soft computing techniques,” Proceedings of International Conference on Computing, Power and Communication Technologies, September 2018, 2018. [13] P. N. Shrestha, “Applying soft computing to early obesity prediction,” Masters Thesis, Southern Illinois University Carbondale, December 2006. [14] S. R. Srivastava, Y. K. Meena, and G. Singh, “The landscape of soft computing applications for terrorism analysis: A review,” Applied Soft Computing, vol. 113, Part B, December 2021.
  • 5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 874 [15] S. B. B. Priyadarshini et al., “A comprehensive review on soft computing framework,” International Journal of Advanced Mechanical Engineering, vol. 8, no.1, 2018, pp. 221-228. [16] U. Kumari, “Soft computing applications: A perspective view,” Proceedings of the 2nd International Conference on Communication and Electronics Systems, 2017, pp. 787-789. [17] L. Wang, (ed.), Soft Computing in Communications. Springer, 2013. [18] S. Roy and U. Chakraborty, Soft computing. India: Pearson Education, 2013. [19] L. Rutkowski and Leszek Rutkowski, New Soft Computing Techniques For System Modeling, Pattern Classification and Image Processing. Berlin: Springer-Verlag, 2004. [20] Intelligent Techniques and Soft Computing in Nuclear Science and Engineering: Proceedings of the 4th International FLINS Conference, Bruges, Belgium, August 2000. [21] F. Saeed et al. (eds.), Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology. Springer 2019. [22] S. Borah and R. Panigrahi (eds.), Applied Soft Computing: Techniques and Applications. Apple Academic Press, 2022. [23] R. Seising and V. S. González (eds.), Soft Computing in Humanities and Social Sciences. Springer 2012. [24] H. L. Teodorescu, A. Kandel, and L. C. Jain (eds.), Soft Computing in Human-Related Sciences. Boca Raton, FL: CRC Press, 1999. [25] Z. Q. Liu and S. Miyamoto (eds.), Computer Science Workbench: Soft Computing and Human-Centered Machines. Japan: Springer 2013. [26] V. A. Niskanen, Soft Computing Methods in Human Sciences. Berlin Heidelberg: Springer, 2013. Figure 1 the four stages of computing [1].
  • 6. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49305 | Volume – 6 | Issue – 2 | Jan-Feb 2022 Page 875 Figure 2 Soft computing approaches [6]. Figure 3 Major parameters of a terrorist attack event [15]