Extreme deep learning in biosecurity: the case of machine hearing for marine species identification

ABSTRACT Biosafety is defined as a set of preventive measures aimed at reducing the risk of infectious diseases’ spread to crops and animals, by providing quarantine pesticides. Prolonged and sustained overheating of the sea, creates significant habitat losses, resulting in the proliferation and spread of invasive species, which invade foreign areas typically seeking colder climate. This is one of the most important modern threats to marine biosafety. The research effort presented herein, proposes an innovative approach for Marine Species Identification, by employing an advanced intelligent Machine Hearing Framework (MHF). The final target is the identification of invasive alien species (IAS) based on the sounds they produce. This classification attempt, can provide significant aid towards the protection of biodiversity, and can achieve overall regional biosecurity. Hearing recognition is performed by using the Online Sequential Multilayer Graph Regularized Extreme Learning Machine Autoencoder (MIGRATE_ELM). The MIGRATE_ELM uses an innovative Deep Learning algorithm (DELE) that is applied for the first time for the above purpose. The assignment of the corresponding class ‘native’ or ‘invasive’ in its locality, is carried out by an equally innovative approach entitled ‘Geo Location Country Based Service’ that has been proposed by our research team.

[1]  Konstantinos Demertzis,et al.  Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem , 2018, ICETE.

[2]  Tara N. Sainath,et al.  Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.

[3]  Victor C. M. Leung,et al.  Extreme Learning Machines [Trends & Controversies] , 2013, IEEE Intelligent Systems.

[4]  Konstantinos Demertzis,et al.  The Impact of Climate Change on Biodiversity: The Ecological Consequences of Invasive Species in Greece , 2018 .

[5]  Konstantinos Demertzis,et al.  Temporal Modeling of Invasive Species' Migration in Greece from Neighboring Countries Using Fuzzy Cognitive Maps , 2018, AIAI.

[6]  Guang-Bin Huang,et al.  What are Extreme Learning Machines? Filling the Gap Between Frank Rosenblatt’s Dream and John von Neumann’s Puzzle , 2015, Cognitive Computation.

[7]  Konstantinos Demertzis,et al.  Commentary: Aedes albopictus and Aedes japonicas—two invasive mosquito species with different temperature niches in Europe , 2017, Front. Environ. Sci..

[8]  Konstantinos Demertzis,et al.  A Computational Intelligence System Identifying Cyber-Attacks on Smart Energy Grids , 2018 .

[9]  Konstantinos Demertzis,et al.  Hybrid Soft Computing Analytics of Cardiorespiratory Morbidity and Mortality Risk Due to Air Pollution , 2017, ISCRAM-med.

[10]  Tarek M. Taha,et al.  Object recognition using cellular simultaneous recurrent networks and convolutional neural network , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[11]  Theodoros Giannakopoulos pyAudioAnalysis: An Open-Source Python Library for Audio Signal Analysis , 2015, PloS one.

[12]  Konstantinos Demertzis,et al.  Detecting invasive species with a bio-inspired semi-supervised neurocomputing approach: the case of Lagocephalus sceleratus , 2017, Neural Computing and Applications.

[13]  Konstantinos Demertzis,et al.  HISYCOL a hybrid computational intelligence system for combined machine learning: the case of air pollution modeling in Athens , 2015, Neural Computing and Applications.

[14]  Konstantinos Demertzis,et al.  A deep spiking machine-hearing system for the case of invasive fish species , 2017, 2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA).

[15]  Narasimhan Sundararajan,et al.  A Fast and Accurate Online Sequential Learning Algorithm for Feedforward Networks , 2006, IEEE Transactions on Neural Networks.

[16]  Konstantinos Demertzis,et al.  Machine learning use in predicting interior spruce wood density utilizing progeny test information , 2017, Neural Computing and Applications.

[17]  Richard F. Lyon,et al.  Human and Machine Hearing: Extracting Meaning from Sound , 2017 .

[18]  Zhiyong Xu,et al.  Automated bird acoustic event detection and robust species classification , 2017, Ecol. Informatics.

[19]  Konstantinos Demertzis,et al.  Soft computing forecasting of cardiovascular and respiratory incidents based on climate change scenarios , 2018, 2018 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS).

[20]  Narasimhan Sundararajan,et al.  On-Line Sequential Extreme Learning Machine , 2005, Computational Intelligence.

[21]  Konstantinos Demertzis,et al.  Bio-inspired Hybrid Intelligent Method for Detecting Android Malware , 2016, KICSS.

[22]  Konstantinos Demertzis,et al.  Fast and low cost prediction of extreme air pollution values with hybrid unsupervised learning , 2016, Integr. Comput. Aided Eng..

[23]  Konstantinos Demertzis,et al.  Hybrid intelligent modeling of wild fires risk , 2018, Evol. Syst..

[24]  Konstantinos Demertzis,et al.  FuSSFFra, a fuzzy semi-supervised forecasting framework: the case of the air pollution in Athens , 2018, Neural Computing and Applications.

[25]  Konstantinos Demertzis,et al.  Evolving Computational Intelligence System for Malware Detection , 2014, CAiSE Workshops.

[26]  Konstantinos Demertzis,et al.  Artificial Intelligence Applications and Innovations: 18th IFIP WG 12.5 International Conference, AIAI 2022, Hersonissos, Crete, Greece, June 17–20, 2022, Proceedings, Part II , 2022, IFIP Advances in Information and Communication Technology.

[27]  Konstantinos Demertzis,et al.  SAME: An Intelligent Anti-malware Extension for Android ART Virtual Machine , 2015, ICCCI.

[28]  Guang-Bin Huang,et al.  An Insight into Extreme Learning Machines: Random Neurons, Random Features and Kernels , 2014, Cognitive Computation.

[29]  Konstantinos Demertzis,et al.  Comparative analysis of exhaust emissions caused by chainsaws with soft computing and statistical approaches , 2018, International Journal of Environmental Science and Technology.

[30]  Hongming Zhou,et al.  Extreme Learning Machines [Trends & Controversies] , 2013 .

[31]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[32]  Dong Yu,et al.  Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..

[33]  Chunxia Zhang,et al.  Generalized extreme learning machine autoencoder and a new deep neural network , 2017, Neurocomputing.

[34]  Konstantinos Demertzis,et al.  Intelligent Bio-Inspired Detection of Food Borne Pathogen by DNA Barcodes: The Case of Invasive Fish Species Lagocephalus Sceleratus , 2015, EANN.

[35]  Konstantinos Demertzis,et al.  A Hybrid Network Anomaly and Intrusion Detection Approach Based on Evolving Spiking Neural Network Classification , 2013, e-Democracy.

[36]  Konstantinos Demertzis,et al.  Adaptive Elitist Differential Evolution Extreme Learning Machines on Big Data: Intelligent Recognition of Invasive Species , 2016, INNS Conference on Big Data.

[37]  Yan Li,et al.  Robust sound event classification with bilinear multi-column ELM-AE and two-stage ensemble learning , 2017, EURASIP J. Audio Speech Music. Process..

[38]  Konstantinos Demertzis,et al.  Classifying with fuzzy chi-square test: The case of invasive species , 2018 .

[39]  Anil K. Jain,et al.  Statistical Pattern Recognition: A Review , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[40]  Konstantinos Demertzis,et al.  An innovative soft computing system for smart energy grids cybersecurity , 2018 .

[41]  Dah-Jye Lee,et al.  Object recognition algorithm for the automatic identification and removal of invasive fish , 2016 .

[42]  Francisco Herrera,et al.  Big Data: Tutorial and guidelines on information and process fusion for analytics algorithms with MapReduce , 2018, Inf. Fusion.

[43]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[44]  Konstantinos Demertzis,et al.  Evolving Smart URL Filter in a Zone-Based Policy Firewall for Detecting Algorithmically Generated Malicious Domains , 2015, SLDS.