PDF  PubReader

Park*: Practical Approaches Based on Deep Learning and Social Computing

Jong Hyuk Park*

Practical Approaches Based on Deep Learning and Social Computing

1. Introduction

The Journal of Information Processing Systems (JIPS) publishes a wide range of topics related to a wide variety of advanced information and communication technologies, including systems, networks, architectures, algorithms, applications, and security. As the official international journal published by the Korea Information Processing Society, JIPS is the world's leading academic journal indexed by ESCI, SCOPUS, EI COMPENDEX, DOI, DBLP, EBSCO, Google Scholar, and CrossRef. The purpose of JIPS is to provide an outstanding, influential forum where researchers and experts gather to promote, share, and discuss crucial research issues and developments. The published theoretical and practical articles contribute to the relevant research area by presenting cutting-edge techniques related to information processing including new theories, approaches, concepts, analysis, functional experience reports, implementations, and applications. Topics covered in this journal include, but are not limited to, computer systems and theory, multimedia systems and graphics, communication systems and security, software systems, and applications.

2. Related Works

Zhang et al. [1] review two classical models of copy-move forgery and two frameworks of copy-move forgery detection (CMFD) methods. The authors explain that the massive CMFD methods are separated into two types to recollect the process of CMFD technologies, including block-based and keypointbased. The performance evaluation criteria and the datasets created for evaluating the performance of CMFD methods are also presented in this paper.

Gurjar and Moon [2] deal with the area of music similarity analysis in the music information retrieval (MIR) system. This paper addresses two sectors of MIR: general description of MIR and investigation of methods for music similarity measurement. The authors analyze the efficiency and accuracy through comparative analysis among MIR systems.

Tseng et al. [3] describe the black hole attack and security concerns in MANETs including current issues and future trends. The authors summarize attack detection schemes with systematic comparison tables, such as collaborative black hole, non-cooperative black hole, and other attacks.

Rudrapal et al. [4] provide an overview of the summarization approaches on Twitter. This paper presents them by Tweet summarization approaches including extractive, abstractive, and summaries. It also presents summary evaluation methodologies: human, recall-oriented, information-theoretic, and model-free evaluations.

Nguyen and Kim [5] survey Blockchain-based consensus algorithms, i.e., proof-based consensus and vote-based algorithm. Recently, Blockchain has been popularized as a key technology to solve the problem of low-trust centralization. This paper categorizes algorithms into two kinds: proof-based algorithm and vote-based consensus algorithm. Comparison analysis is also performed between these two types focusing on the highlighted characteristics.

Tunio et al. [6] present AI automated planning by Planning Domain Definition Language (PDDL) to solve the Crowdsourcing Software Development (CSD) task assignment problem. The goal of this study supports the CSD developer in evaluating PDDL planning. The experiment shows that it has many challenging issues in undefined conditions when the developer assigns the tasks. Thus, the authors suggest that AI-based automated planning can provide a reliable solution to the CSD developer.

Park and Peng [7] deal with a Spark-Hadoop-based LDA association system to process user features at high speed from a huge amount of social data. The extraction of meaningful user comments from social data are constrained by various limitations such as unstructured dataset, huge storage space, and long processing time. In order to overcome those obstacles, the authors propose a Spark framework on top of the Hadoop cluster. The experiment in this paper shows that it can reduce the requirement of disk access time and improve the processing speed.

Song and Kim [8] propose a novel approach to the deep neural network model for untrimmed video analysis, especially human activity detection. The suggested model features two steps: feature extraction and human activity detection. The first step of this study extracts the rich features for recognizing human activities in a long untrimmed video. For the next step, the authors use a bi-directional recurrent neural network model (BLSTM) for detecting human activities from the sequence of extracted feature vectors, which is based on convolutional neural networks (CNNs) including C3D and I-ResNet.

Song et al. [9] present a smart meter based on the IoT platform, which provides air conditioning control automatically. The proposed IoT platform with a Deep Belief Network (DBN) algorithm enables remote and automatic air control with low power consumption features based on environmental information such as temperature and humidity.

Zeng et al. [10] present a novel approach to non-rigid 3D model retrieval, which is based on the multi-feature fusion learning model. The suggested model is used for multi-scale shape distributions by heat kernel signature (HKS) and wave kernel signature (WKS) descriptor for the input features of CNNs. This paper proposes the cross-connected layer to unify the low-level features and high-level features. Not only is the fusion layer able to learn the discriminative characteristics of the two kinds of descriptors; correlation analysis between them is also enabled.

Li et al. [11] present an approach to DBN for face recognition under complex illumination conditions. The proposed method is divided into two steps: enhanced local extraction feature and DBN for face recognition. The wavelet decomposition-based image fusion provides the illuminations variation on the feature extraction. Those local texture features are unified with DBN to obtain robust face recognition under severe illumination conditions.

Lee et al. [12] describe the performance analysis between AlexNet and GoogLeNet for Korean character recognition. Comparing their performances will yield data that will serve as a valuable reference in the deep learning area, especially CNNs. The result shows that KCR-AlexNet is faster than KCR-GoogLeNet; otherwise, KCR-GoogLeNet shows faster classification speed. This research used the PHD08 training dataset, a large-scale Korean character database.

Chao et al. [13] propose a new approach to the vocal effort detection method to enhance the performance of the speech recognition system. In this area, detecting the level of vocal effort is one of the crucial issues. Feature extraction is carried out in spectral information entropy, with the proposed fusion method applied to the recognition system based on those extracted features.

Ha and Kim [14] propose a new flow management scheme in the SDN-based network on cloud computing. The proposed scheme enables efficiency management that can speed up the flow entry search speed and maximize the number of flow entries simultaneously.

Zhang and Xiao [15] present a novel approach to the immune intrusion detection model in virtual machines (VMs) in cloud computing, called I-VMIDS (Immune-inspired Intrusion Detection System). The goal of this study is to ensure the security of user-level applications in virtual machine clients. The suggested model extracts the system call of running programs, abstracts them into antigens, unifies related environment information from virtual machine clients to produce suspicious signals, and develops an intrusion detection method based on these results.

Salam et al. [16] describe the future direction for public education with ICT infrastructure. This study found out that new ICT-based education can lead to well-trained teaching staff and upgrading of the curriculum and policy.

Finally, Koo et al. [17] propose multi-purpose PCI Express adapter cards by applying an onboard optical module with the latest optical communications. According to their experiment result, the proposed card can improve transfer distance and utilization on the same bandwidth compared with the existing adapter cards.

3. Conclusion

This issue featured 17 novel and original papers from around the world including 5 survey papers. We introduce novel approaches to studies from diverse research areas. Especially, this issue tackles deep learning and social computing, which are hot topics and key technologies in ICT nowadays, such as DBN-based smart home application and face recognition, 3D modeling using CNN, automation system application using DL, LDA-based topic analysis, speech recognition and so forth. In addition, this issue features 5 outstanding papers awarded in the 2017 JIPS Survey Paper Awards, including forgery detections for image copy & move, analysis for music retrieval systems, text summarizations for Twitter, blockchainbased consensus algorithms, and security countermeasures for MANETs. We would like to thank all authors who submitted their papers for this issue and all reviewers who accepted our review invitations.


James J. (Jong Hyuk) Park

He received Ph.D. degrees in Graduate School of Information Security from Korea University, Korea and Graduate School of Human Sciences from Waseda University, Japan. From December 2002 to July 2007, Dr. Park had been a research scientist of R Institute, Hanwha S Co. Ltd., Korea. From September 2007 to August 2009, he had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. He is now a professor at the Department of Computer Science and Engineering and Department of Interdisciplinary Bio IT Materials, Seoul National University of Science and Technology (SeoulTech), Korea. Dr. Park has published about 200 research papers in international journals and conferences. He has been serving as chairs, program committee, or organizing committee chair for many international conferences and workshops. He is a founding steering chair of some international conferences—MUE, FutureTech, CSA, UCAWSN, etc. He is editor-in-chief of Human-centric Computing and Information Sciences (HCIS) by Springer, The Journal of Information Processing Systems (JIPS) by KIPS, and Journal of Convergence (JoC) by KIPS CSWRG. He is Associate Editor / Editor of 14 international journals including 8 journals indexed by SCI(E). In addition, he has been serving as a Guest Editor for international journals by some publishers: Springer, Elsevier, Wiley, Oxford University press, Hindawi, Emerald, Inderscience. His research interests include security and digital forensics, human-centric ubiquitous computing, context awareness, multimedia services, etc. He got the best paper awards from ISA-08 and ITCS-11 conferences and the outstanding leadership awards from IEEE HPCC-09, ICA3PP-10, IEE ISPA-11, and PDCAT-11. Furthermore, he got the outstanding research awards from the SeoulTech in 2014. Dr. Park's research interests include human-centric ubiquitous computing, vehicular cloud computing, information security, digital forensics, secure communications, multimedia computing, etc. He is a member of the IEEE, IEEE Computer Society, KIPS, and KMMS.


  • 1 Z. Zhang, C. Wang, X. Zhou, "A survey on passive image copy-move forgery detection," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.02.0078, vol. 14, no. 1, pp. 6-31. doi:[[[10.3745/JIPS.02.0078]]]
  • 2 K. Gurjar, Y . Moon, "A comparative analysis of music similarity measures in music information retrieval systems," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/ JIPS.04.0054, vol. 14, no. 1, pp. 32-55. doi:[[[10.3745/JIPS.04.0054]]]
  • 3 F. H. Tseng, H. P. Chiang, H. C. Chao, "Black hole along with other attacks in MANETs: a survey" Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.03.0090, vol. 14, no. 1, pp. 56-78. custom:[[[-]]]
  • 4 D. Rudrapal, A. Das, B. Bhattacharya, "A survey on automatic Twitter event summarization," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.02.0079, vol. 14, no. 1, pp. 79-100. doi:[[[10.3745/JIPS.02.0079]]]
  • 5 G. T. Nguyen, K. Kim, "A survey about consensus algorithms used in Blockchain," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.01.0024, vol. 14, no. 1, pp. 101-128. doi:[[[10.3745/JIPS.01.0024]]]
  • 6 M. Z. Tunio, H. Luo, C. Wang, F. Zhao, W . Shao, Z. H. Pathan, "Crowdsourcing software development: task assignment using PDDL artificial intelligence planning," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.04.0055, vol. 14, no. 1, pp. 129-139. doi:[[[10.3745/JIPS.04.0055]]]
  • 7 K. Park, L. Peng, "A development of LDA topic association systems based on Spark-Hadoop framework," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.04.0057, vol. 14, no. 1, pp. 140-149. doi:[[[10.3745/JIPS.04.0057]]]
  • 8 Y. Song, I. Kim, "DeepAct: a deep neural network model for activity detection in untrimmed videos," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.04.0059, vol. 14, no. 1, pp. 150-161. doi:[[[10.3745/JIPS.04.0059]]]
  • 9 W. Song, N. Feng, Y. Tian, S. Fong, K. Cho, "A Deep Belief Network for electricity utilisation feature analysis of air conditioners using a smart IoT platform," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.04.0056, vol. 14, no. 1, pp. 162-175. doi:[[[10.3745/JIPS.04.0056]]]
  • 10 H. Zeng, Y. Liu, S. Li, J. Che, X. Wang, "Convolutional neural network based multi-feature fusion for non-rigid 3D model retrieval," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.04.0058, vol. 14, no. 1, pp. 176-190. doi:[[[10.3745/JIPS.04.0058]]]
  • 11 C. Li, S. Zhao, K. Xiao, Y . Wang, "Face recognition based on the combination of enhanced local texture feature and DBN under complex illumination conditions," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.04.0060, vol. 14, no. 1, pp. 191-204. doi:[[[10.3745/JIPS.04.0060]]]
  • 12 S. G. Lee, Y. Sung, Y. G. Kim, E. Y. Cha, "Variations of AlexNet and GoogLeNet to improve Korean character recognition performance," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.04.0061, vol. 14, no. 1, pp. 205-217. doi:[[[10.3745/JIPS.04.0061]]]
  • 13 H. Chao, B. Y. Lu, Y. L. Liu, H. L. Zhi, "Vocal effort detection based on spectral information entropy feature and model fusion," Journal of Information Processing Systems, 2018. https://doi.org/ 10.3745/JIPS.04.0063, vol. 14, no. 1, pp. 218-227. doi:[[[10.3745/JIPS.04.0063]]]
  • 14 N. Ha, N. Kim, "Efficient flow table management scheme in SDN-based cloud computing networks," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.01.0023, vol. 14, no. 1, pp. 228-238. doi:[[[10.3745/JIPS.01.0023]]]
  • 15 R. Zhang, X. Xiao, "Study of danger-theory-based intrusion detection technology in virtual machines of cloud computing environment," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.03.0089, vol. 14, no. 1, pp. 239-251. doi:[[[10.3745/JIPS.03.0089]]]
  • 16 S. Salam, J. Zeng, Z. H. Pathan, Z. Latif, A. Shaheen, "Impediments to the integration of ICT in public schools of contemporary societies: a review of literature," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.04.0062, vol. 14, no. 1, pp. 252-269. doi:[[[10.3745/JIPS.04.0062]]]
  • 17 K. Koo, J. Yu, S. Kim, M. Choi, K. Cha, "Implementation of multipurpose PCI Express adapter cards with on-board optical module," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.01.0022, vol. 14, no. 1, pp. 270-279. doi:[[[10.3745/JIPS.01.0022]]]