Young-Sik Jeong* and Jong Hyuk Park**
Algorithms, Processes, and Frameworks for User-Oriented Applications
The Journal of Information Processing Systems (JIPS) is the journal published by the Korean Information Processing Society (KIPS), which has indices such as ESCI, SCOPUS, EI-COMPENDEX, DOI, DBLP, EBSCO, and Google Scholar. The research on computer system and theory, multimedia systems and graphics, communication systems and security, and information systems and application is introduced. Especially, JIPS contains diverse kinds of hot issues related to the research topics of artificial intelligence, network, database, security and so forth.
With more user-oriented applications released recently, related algorithms, processes, and frameworks should be researched in advance for the development of user-oriented applications. This issue deals with novel algorithms, processes, and frameworks in the fields of network, digital forensic, software & system architectures, image processing, and so on. Specifically, this issue includes 17 peer-reviewed papers on speaker verification, lexical semantics, transaction malleability in Bitcoin, motion-blurred shadows, gait recognition algorithm, academic evaluation indicators, clustering algorithm, and so on.
2. Theories, Algorithms, and Frameworks of User-Oriented Applications
In this section, diverse kinds of algorithms, processes, and frameworks for user-oriented applications are introduced and published by JIPS as regular papers.
Kumari and Jayanna [ 1 ] propose an approach that involves utilizing Mel-frequency cepstral coefficients and linear prediction cepstral coefficients from speakers. The Gaussian mixture model and GMM-universal background model are then utilized for modeling the speakers and verified.
Murat et al. [ 2 ] introduce an approach for TE extraction in Uyghur based on three approaches: morphology-based approach, syntax-based approach using Uyghur sentence constituent analyzer, and lexical semantic-based approach using TCBW for Uyghur.
Rajput et al. [ 3 ] present an approach related to bitcoin transactions and various attacks based on transaction malleability, since the latter has caused serious damage to the bitcoin community in terms of loss of money and reputation. Their approach consists of a combination of the hash of transaction script without signature and the hash of final transaction. This combined hash is provided for the purposes of both transaction verification and identification.
Boulnemour and Boucheham [ 4 ] propose an approach that combines SEA and DTW. Our main contribution consists of elevating the DTW power of alignment from the lowest level to the highest level according to the recent classification of time series alignment methods proposed by Boucheham.
Hong and Oh [ 5 ] propose an approach to rendering motion-blurred shadows based on a shadow map of depth-time ranges. Scenes are rendered from the light source to generate shadow maps. Each pixel of the shadow maps stores the corresponding list of depth-time ranges. Each depth-time range has two points and two distances from lights. The two points indicate a period of time when a geometry is visible to the light source.
Huang et al. [ 6 ] present a gait recognition approach based on the feature fusion of gait energy image (GEI) dynamic region and Gabor. The gait contour images are extracted. The features of GEI at different angles and Gabor features with multiple orientations are extracted from the dynamic part of GEI. The averaging method is adopted to fuse the features of the GEI dynamic region with the features of Gabor wavelets on the feature layer, and the feature space dimension is reduced by an improved Kernel Principal Component Analysis (KPCA). The vectors of feature fusion are inputted into the support vector machine based on multi-classification to carry out the classification and recognition of gait.
Ryu [ 7 ] present an approach that predicts the unemployment rate using social media analysis based on natural language processing and statistical modeling. Such approach collects social media contents including news articles, blogs, and tweets written in Korean and extracts data for modeling using partof- speech tagging and sentiment analysis techniques. The models autoregressive integrated moving average with exogenous variables (ARIMAX) and autoregressive with exogenous variables (ARX) for unemployment rate prediction are fit based on the analyzed data.
Zhang et al. [ 8 ] introduce various citation quality-based evaluation indicators and categorize them considering the applied algorithms. The evaluation indicators are compared from four dimensions. The outcomes are useful for further research on distinguishing citation quality.
Yu et al. [ 9 ] propose an approach called CACD (clustering algorithm considering node distribution), which is not only distance-aware but also node density-aware. The number of nodes of CACD clusters is limited by the distance between sink and cluster head.
Liu and Ma [ 10 ] present a de-noising approach based on wavelet transformation and characteristics of spin echo train in NMRL. A 32-point forward model with big porosity is built. The signals of spin echo sequence with adjustable SNR are generated by the forward model.
Muthohar et al. [ 11 ] introduce an adaptive sampling approach for location and motion sensors. Major motion sensors are utilized to facilitate adaptive sampling. Two sampling strategies are introduced in using major motion sensors to realize low-power consumption during continuous sampling. One involves using the sensor only naively, whereas the other involves adding the duty cycle to the naive approach. Both strategies consume low energy, but the one combined with the duty cycle achieves a better result.
Bhatnagar et al. [ 12 ] show an approach to stable marriage problem by computing a weighted score for the users registered at matrimonial websites. The approach has been formulated into profit maximization of matrimonial websites in terms of the ability to provide a suitable match for users. Greedy and genetic algorithm-based approaches are introduced to solve the optimization problem.
Sung et al. [ 13 ] propose an approach that estimates the arm orientations based on the Bayesian probability of the pre-measured hand positions. HTC VIVE is an excellent device for estimating motions but only considers the positions of the hands, not the orientations of the arms. Even if the positions of the hands are the same, the meaning of motions can differ according to the orientations of the arms. Therefore, when the positions of the arms are measured and utilized, their orientations are estimated as well.
Srinivasan et al. [ 14 ] present a framework that builds Hadoop clusters on new single-board computer Mobile Raspberry Pi. The Hadoop clusters offer facilities for storage as well as computing. Regular data centers require large amounts of energy for operation. Therefore, cooling equipment is needed, and prime real estate is occupied. These issues are solved by employing a Mobile Raspberry Pi with Hadoop clusters, which provides a cost-effective, low-power, high-speed solution along with micro-data center support for big data.
Fattah and Chong [ 15 ] propose a semantic modeling approach for manual and semi-automated service composition. A framework is introduced to enable RESTful web services composition using semantic ontology for the creation of elderly living assistance services in WoO-based smart home environments.
Abdurohman et al. [ 16 ] introduce an integrated lighting enabler approach based on standard machine-to-machine (M2M) platforms. The approach provides common services of end-to-end, M2M communication for the smart lighting system, which is divided into two subsystems: end-device system and server system. For the server side, the M2M platform OpenMTC is used to receive data from sensors and send a response for the activation of actuators. At the end-device system, programmable smart lighting devices are connected to the actuators and sensors for communicating their data to the server.
Keum et al. [ 17 ] present an approach that utilizes a portable, dry electroencephalogram sensor device to overcome the limitations of the existing conventional approaches and to advance existing EEG-based research further. The approach uses a portable EEG sensor device with a small, dry, simple sensor using a single channel.
This issue features 17 enhanced peer-reviewed papers from India, China, Korea, Algeria, Taiwan, Indonesia, and so on. We present diverse kinds of algorithms, processes, and frameworks for useroriented applications, which cover diverse kinds of research fields such as speaker verification, lexical semantics, transaction malleability in bitcoin, motion-blurred shadows, gait recognition algorithm, academic evaluation indicators, clustering algorithm, and so on. We would like to thank all authors who submitted their papers for this issue and all reviewers who accepted our review invitations.
He is a professor in the Department of Multimedia Engineering at Dongguk University in Korea. His research interests include multimedia cloud computing, information security of cloud computing, mobile computing, IoT (Internet of Things), and wireless sensor network applications. He received his B.S. degree in Mathematics and his M.S. and Ph.D. degrees in Computer Science and Engineering from Korea University in Seoul, Korea in 1987, 1989, and 1993, respectively. He was a professor in the Department of Computer Engineering at Wonkwang University in Korea from 1993 to 2012. He worked and researched to Michigan State University and Wayne State University as visiting professor in 1997 and 2004, respectively. He is also an Executive Editor of Journal of Information Processing Systems, an Associate Editor of Journal of Supercomputing (JoS) and International Journal of Communication Systems (IJCS), and an Editor of Journal of Internet Technology (JIT), finally an Associate Editor of Journal of Human-centric Computing (HCIS). In addition, he has been serving as a Guest Editor for international journals by some publishers: Springer, Elsevier, John Wiley, Oxford University Press, Hindawi, Emerald, Inderscience, and so on. He is also a member of the IEEE.
James J. (Jong Hyuk) Parkhttps://orcid.org/0000-0003-1831-0309
He received Ph.D. degrees in Graduate School of Information Security from Korea University, Korea and Graduate School of Human Sciences from Waseda University, Japan. From December 2002 to July 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co. Ltd., Korea. From September 2007 to August 2009, he had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. He is now a professor at the Department of Computer Science and Engineering and Department of Interdisciplinary Bio IT Materials, Seoul National University of Science and Technology (SeoulTech), Korea. Dr. Park has published about 200 research papers in international journals and conferences. He has been serving as chairs, program committee, or organizing committee chair for many international conferences and workshops. He is a founding steering chair of some international conferences—MUE, FutureTech, CSA, UCAWSN, etc. He is editorin- chief of Human-centric Computing and Information Sciences (HCIS) by Springer, The Journal of Information Processing Systems (JIPS) by KIPS, and Journal of Convergence (JoC) by KIPS CSWRG. He is Associate Editor / Editor of 14 international journals including 8 journals indexed by SCI(E). In addition, he has been serving as a Guest Editor for international journals by some publishers: Springer, Elsevier, Wiley, Oxford University press, Hindawi, Emerald, Inderscience. His research interests include security and digital forensics, human-centric ubiquitous computing, context awareness, multimedia services, etc. He got the best paper awards from ISA-08 and ITCS-11 conferences and the outstanding leadership awards from IEEE HPCC-09, ICA3PP-10, IEE ISPA-11, and PDCAT-11. Furthermore, he got the outstanding research awards from the SeoulTech in 2014. Dr. Park's research interests include human-centric ubiquitous computing, vehicular cloud computing, information security, digital forensics, secure communications, multimedia computing, etc. He is a member of the IEEE, IEEE Computer Society, KIPS, and KMMS.