Young-Sik Jeong* and Jong Hyuk Park**Novel Solutions and Approaches to Effective Data Processing1. IntroductionThe Journal of Information Processing Systems (JIPS) is a journal published by the Korean Information Processing Society (KIPS), which publishes papers related to a wide variety of advanced research fields including systems, applications, networks, architecture, algorithms, security, and so forth and has indices such as ESCI, SCOPUS, EI COMPENDEX, DOI, DBLP, EBSCO, Google Scholar, and CrossRef. There are four divisions: Computer system and theory, Multimedia systems and graphics, Communication systems and Security, and Information systems and application. The published theoretical and practical articles contribute to the relevant research area by presenting cutting-edge techniques related to information processing including new theories, approaches, concepts, analysis, functional experience reports, implementations, and applications. Topics covered in this journal include, but are not limited to, computer systems and theory, multimedia systems and graphics, communication systems and security, software systems, and applications. 2. Related WorksFahim et al. [1] propose a novel load balancing model for cloud computing. The proposed model is based on Bat-algorithm, which allocates tasks to the most efficient number of virtual machines (VMs) by ensuring equal load balancing and increasing the total number of allocations possible in serial or parallel mode. This paper compares various meta-heuristic algorithms to select the most appropriate classification model for pre-classifying the entry instructions in VMs. Zhang et al. [2] present a new proposal based on operator extracting image patches for performing image denoising via the Expected Patch Log Likelihood (EPLL) method. They propose a new operator that can retain more information when extracting image patches to solve the poor anti-noise and the loss of structure information. In the experiment, this proposal shows better results in both the value of PSNR and visual effect. Wang et al. [3] Wang propose a low-cost method that can identify legacy devices, especially code wheel instruments. This method can effectively identify the digital numbers from the numeric image acquired from the code wheel instrument. This method needs a small amount of memory for calculation; it can be deployed on a cheap microcontroller unit (MCU) with low read-only memory (ROM). While maintaining the existing instruments, the proposed method will be helpful for building a smart city, because the automatic management of the measurement can be performed using this method. Jang [4] describes an automobile control software program. TMMi is a representative examinationdriven test process model widely used in the test process maturity evaluations of test execution organizations and its usability has been proven in many ways. This paper contributes to a software testing organization that has a plan to improve the software test process. Crowdsourcing software development (CSD) is a new type of emerging software engineering that is performed by open participation in any task of software development. It usually utilizes an open call online format to allow a large number of CSD developers to participate together in different types of software project tasks. Tunio et al. [5] propose a conceptual framework for task assignment modeling on the basis of personality, which provides a fundamental platform for CSD developers to find proper tasks and assign their tasks directly. Kim [6] presents a novel technique for flash memory page management to solve the problem of conventional buffer replacement algorithms. The proposal is based on the idea of dividing pages into groups and considering the reference frequency and time when the target page replacement occurs. According to performance evaluation, it shows the highest buffer hit rate and the lowest number of write operations, compared with existing algorithms. Hua et al. [7] investigate the reason for balance shifting from Europe to Asia in Information Communication Technology (ICT) industry. This paper examines the reasons for the loss of ICT momentum led by European countries in the past and explores why Asian countries have taken the lead in the field of digital power nowadays. According to this study, Asia is a densely populated region over 2.8 billion people with a cheap workforce and ample capital, and great absorption capacity for new R&D technology with ICT industry. All of these factors seem to position Asian countries as emerging economies and shift the regional balance of ICT power to Asia. Pardamean et al. [8] present a design for information technology infrastructure for Indonesian agriculture genotyping. This target infrastructure needs big data management because it demands the management of a large quantity of genome data typing. This study shows a secure, reliable, and scalable IT infrastructure for agriculture genotyping. Wang et al. [9] propose a new fragile watermarking method based on the discrete wavelet transform and the local binary pattern (LBP). The proposed scheme is defined as follows. The LBP pattern of the low-frequency wavelet coefficients is used for a feature watermark, which is inserted into the least significant bit (LSB) of the maximum pixel value in each block of the host image. This watermark scheme is encrypted by applying a logistic map to ensure the safety of the proposed algorithm. The experimental results show that the proposed algorithm has lower watermark payloads and good performance in tamper identification and localization for various malicious attacks, compared with existing methods. Ryu et al. [10] present a novel scenario-based forensic analysis technique for specific third-party social networking service application in the mobile device. This paper analyzes what kinds of valuable forensic artifacts remain when a user performs social activities, which are stored in the internal memory of the mobile device. This proposal will be helpful for a forensic investigator to locate artifacts and valuable meaning of data left according to the specific third-party social application. Zhao et al. [11] propose a new approach for hierarchical partitioning of passenger nodes based on a self-organizing map (SOM) and k-means algorithms. It removes individual impacts and local optimizations compared with existing hierarchical partitioning process models. This study will help the railway authorities to understand the importance of passenger nodes, plan train operations and carry out transportation assignments. Miloudi et al. [12] propose an improved database classification algorithm for multi-database mining. It suggests an efficient approach to the problem of classifying multiple databases as a matter of identifying the connected components based on the non-directional weighted graph. Compared with existing works, the suggested algorithm shows searches for the best classification. Dong et al. [13] present a novel sentiment analysis (SA) model on the Chinese microblog. This proposal is based on spectral clustering in semi-supervised machine learning to improve the accuracy of sentiment classification and solve the problem of SA. The experimental results show that the proposed algorithm can improve identification accuracy without increasing the network complexity of SA. To analyze more than 100,000 security vulnerabilities, it needs to automate the process of identifying a large number of Internet-connected devices. Na et al. [14] propose a practical method and system for automatically generating internet-connected device information in Common Platform Enumeration (CPE) format from banner text to detect potentially vulnerable devices with Common Vulnerabilities Exposure (CVE) vulnerabilities. Malhotra and Sharma [15] present an experiment in which seven web applications analyze the fault prediction using fourteen machine learning techniques, which are conducted on various releases of Apache Click and Apache Rave datasets. This experiment conducted on the input basis set for each release is first optimized using the filter-based correlation feature selection (CFS) method for predictive analysis. It shows that the LCOM3 (lack of cohesion amongst methods), WMC (weighted methods per class), NPM (number of public methods), and DAM (data access metrics) metrics are the most significant predictors. In heterogeneous wireless networks supporting multi-access services, selecting the best network from among the possible heterogeneous connections and providing seamless service during handover for a higher Quality of Services (QoS) is a big challenge. Pandey et al. [16] present an intelligent vertical handover (VHO) to maximize network utilization as more than one target network exists during VHO. This proposal focuses on how to associate a standard VHO framework, such as IEEE 802.21, with network metrics selected for a VHO decision. Based on the simulations in this paper, it was discovered that the proposed IEEE 802.21 schemes using the SINR aware handover decision (SAHD) and the traffic aware handover decision (TAHD) provide high throughput, unwanted handover reduction, and low handover latency as compared with other handover methods. A simplified neutron set (SNS) is a generalization of a fuzzy set where each element is designed for some real-life situations with truth member functions, indefinite member functions, and falsity member functions. Liu [17] presents a novel method to construct similarity measures of single-valued neutrosophic sets (SVNSs) and interval-valued neutrosophic sets (IVNSs) for generalizing the fuzzy set, respectively. Those proposed formulas prove that it can be more effective and reasonable than other methods for satisfying the axiomatic definition of the similarity measure in pattern recognition. 3. ConclusionThis issue featured 17 novel and original papers from around the world. We introduce novel or practical approaches to studies from diverse research areas. This issue includes novel solutions and approaches to load balancing in cloud computing, extracting image patches, improvements for software engineering and testing, big data management for practical area, practical cases for machine learning, automation for security management, real-world ICT issues, and so forth. We would like to thank all authors who submitted their papers for this issue and all reviewers who accepted our review invitations. BiographyYoung-Sik Jeonghttps://orcid.org/0000-0002-7421-1105He is a professor in the Department of Multimedia Engineering at Dongguk University in Korea. His research interests include multimedia cloud computing, information security of cloud computing, mobile computing, IoT (Internet of Things), and wireless sensor network applications. He received his B.S. degree in Mathematics and his M.S. and Ph.D. degrees in Computer Science and Engineering from Korea University in Seoul, Korea in 1987, 1989, and 1993, respectively. He was a professor in the Department of Computer Engineering at Wonkwang University in Korea from 1993 to 2012. He worked and researched to Michigan State University and Wayne State University as visiting professor in 1997 and 2004, respectively. He is also an Executive Editor of Journal of Information Processing Systems, an Associate Editor of Journal of Supercomputing (JoS) and International Journal of Communication Systems (IJCS), and an Editor of Journal of Internet Technology (JIT), finally an Associate Editor of Journal of Human-centric Computing (HCIS). In addition, he has been serving as a Guest Editor for international journals by some publishers: Springer, Elsevier, John Wiley, Oxford University Press, Hindawi, Emerald, Inderscience, and so on. He is also a member of the IEEE. BiographyJames J. (Jong Hyuk) Parkhttps://orcid.org/0000-0003-1831-0309He received Ph.D. degrees in Graduate School of Information Security from Korea University, Korea and Graduate School of Human Sciences from Waseda University, Japan. From December 2002 to July 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co. Ltd., Korea. From September 2007 to August 2009, he had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. He is now a professor at the Department of Computer Science and Engineering and Department of Interdisciplinary Bio IT Materials, Seoul National University of Science and Technology (SeoulTech), Korea. Dr. Park has published about 200 research papers in international journals and conferences. He has been serving as chairs, program committee, or organizing committee chair for many international conferences and workshops. He is a founding steering chair of some international conferences—MUE, FutureTech, CSA, UCAWSN, etc. He is editorin- chief of Human-centric Computing and Information Sciences (HCIS) by Springer, The Journal of Information Processing Systems (JIPS) by KIPS, and Journal of Convergence (JoC) by KIPS CSWRG. He is Associate Editor / Editor of 14 international journals including 8 journals indexed by SCI(E). In addition, he has been serving as a Guest Editor for international journals by some publishers: Springer, Elsevier, Wiley, Oxford University press, Hindawi, Emerald, Inderscience. His research interests include security and digital forensics, human-centric ubiquitous computing, context awareness, multimedia services, etc. He got the best paper awards from ISA-08 and ITCS-11 conferences and the outstanding leadership awards from IEEE HPCC-09, ICA3PP-10, IEE ISPA-11, and PDCAT-11. Furthermore, he got the outstanding research awards from the SeoulTech in 2014. Dr. Park's research interests include human-centric ubiquitous computing, vehicular cloud computing, information security, digital forensics, secure communications, multimedia computing, etc. He is a member of the IEEE, IEEE Computer Society, KIPS, and KMMS. References
|