Enhanced Integrated Algorithm Software Architecture

Jong Hyuk Park*

1. Introduction

The Journal of Information Processing Systems (JIPS) has such indices as ESCI, SCOPUS, EI COMPENDEX, DOI, DBLP, EBSCO, Google Scholar, and CrossRef, and has are four divisions: Computer systems and theory, Multimedia systems and graphics, Communication systems and security, and Information systems and applications. Published by the Korean Information Processing Society (KIPS), JIPS places special emphasis on hot research topics such as artificial intelligence, network, databases, and security.

2. Related Works

This section introduces various enhanced and novel research papers which have been published by JIPS as regular papers.

The study by Perez et al. [1] explores and compares the features of wireless sensor networks (WSN) and ubiquitous sensor networks (USN). First, the paper classifies the security- and privacy-related challenges of USNs, and then identifies available solutions and discusses the related challenges. The paper ends with a brief discussion of the open challenges for designing further approaches to security and privacy protection in next-generation USNs.

Kim and Lee [2] discuss ongoing approaches to guaranteeing or verifying the safety of software systems and future research challenges. Formalizing the semantics of an existing language or designing a new language with formalized language semantics is very useful for safe and trustworthy software. Examples include the application of proof-carrying code, typed assembly language, dependently typed functional language, separation logic, etc. To enhance trustworthiness, additional annotation is applied to the code of the classic programming language, such as software fault isolation, information flow security, etc. If source codes are not available, it is useful to identify certain defects in the software systems based on fuzzing, sandboxing, information flow security, and so on. Finally, the trusted computing base, theorem prover, and policy specifications are introduced as future areas of research.

Zubedi et al. [3] introduce case studies aimed at examining the nexus for the environment and its relationship with Foreign Direct Investment, transportation, economic growth and energy consumption. First of all, the impacts of investments in the environment, in energy consumption and carbon emissions, in economic growth, and in transportation and carbon emissions are introduced. After describing carbon emissions in Pakistan, five recommendations are suggested Arshad et al. [4] review digital forensic research. Diverse issues related to digital evidence are explained, such as standard data sets, establishment of the error rate, standardization issues, anti-forensic techniques & tools, diversity and quick evolution in digital forensic sub-fields are addressed.

Qiang et al. [5] introduce a logical architecture as the logic basis of trust management, service entity management, and resource reservation, which contains an access control center and a management domain. They suggest various strategies for selecting candidate service resources, such as resource clustering based on user preferences, for selecting candidate resources based on trust value, and for conserving resources, and strategies for selecting candidate service resources, based on an evaluation of users’ trust in the service entity, trust evaluation of users to recommend users, trust evaluation of cloud to service entity.

Kim [6] proposes an itinerary-based R-tree (IR-tree) for more efficient spatial-temporal query processing in wireless sensor networks compared with GR-tree distributed indexing, where the GR-tree constructs a grid-based tree, and the spatial index information is distributed and stored in wireless sensor nodes. For the processes of the proposed IR-tree, the creation of indices, the processing of spatio-temporal queries, and the merging of spatio-temporal qualities are described.

Barigou [7] analyzes the impact of using instance selections as reduction methods on the performance of kNN-based text categorization, which improves the efficiency of kNN-based text categorization without degrading its classification accuracy.

Elmouhtadi et al. [8] propose a new fingerprint identification system based on minutiae-matching using the Delaunay triangulation method. Otsu binarization, Zhang’s skeletonization, and cross number-based are performed for the preprocessing of each image, and then “Similar_DT” is calculated from the triangles obtained from the Delaunay triangulation method.

Ye et al. [9] propose a method of reallocating the number of employed bees and onlooker bees to establish a better balance between global search and local search. The proportion of employed bees within a colony is reduced while that of onlooker bees is increased.

Bagchi [10] proposes an analytical formulation for generating solutions for nonlinear network ODE systems with functional decomposition. Furthermore, the input excitations are analytically resolved in linearized dynamic networks; and the stability condition of dynamic networks is determined. The proposed analytical framework is generalized in nature and does not require any domain or range constraints.

Bougueroua and Boucheham [11] propose an enhanced version of the local binary pattern (LBP) operator for texture extraction in images in the context of image retrieval, which is based on the observation that the LBP exploits only the lowest kind of local information through a global histogram.

Hai and Zhao [12] propose a multi-objective bi-level programming model for a high-speed railway passenger train working plan centered on the interests of both passengers and rail transport enterprises. To address the traditional problems, the paper introduces the train stop strategy, basic assumption, travel cost and time, and Railway Enterprises Profit, and then utilizes a genetic algorithm to solve the established two-layer programming model, before finally attempting to determine an (approximate) optimal solution for the model.

Jang et al. [13] propose an efficient hybrid transactional memory scheme using near-optimal retry computation and sophisticated memory management in order to efficiently process transactions in a multi-core environment, i.e. a near-optimal retry computation algorithm, efficient concurrency control, and a memory management scheme.

Wang et al. [14] review various self-embedding fragile watermarking methods with the focus on selfembedding fragile watermarking for image tamper detection and self-recovery. First, the basic model is described, and then common attacks are introduced. Notably, common attacks are described by dividing them into collage attack, constant average attack, content-only attack, and vector quantization attack.

Lee et al. [15] present experiments conducted to examine the changes in user authentication performance when using feature vectors customized for each user versus using all features. The paper describes the data acquisition scenario, collection of data, and the extraction, normalization and classification of the features. Then, the equal error rate is evaluated and discussed.

Lin [16] propose an effective method of removing mixed noise from images. The suggested method consists of a median filter, wavelet transform, a wavelet threshold de-noising method, and image reconstruction, while receiving noisy images as input and conducting de-noised images as output.

Wang et al. [17] introduce the complementarity of a method of coupling expected patch log likelihood and guided image filtering de-noising. It uses the expected patch log likelihood (EPLL) model to construct a guided image for guided filtering, which can provide better structural information for guided filtering.

3. Conclusion

This issue contains seventeen enhanced peer-reviewed papers from South Korea, China, Malaysia, Algeria, and Morocco among other countries. We introduce efficient novel approaches to subjects in diverse research fields, such as available solutions in WSN and USN, the safety of software systems, the nexus for the environment, digital evidence, a logical architecture, an IR-tree, a fingerprint identification system, a method of reallocating bees, an analytical formulation for generating solutions of nonlinear network ODE systems, a LBP operator, a multi-objective bi-level programming model, a hybrid transactional memory scheme, self-embedding fragile watermarking methods, an method of removing mixed noise from images, and so on. We would like to thank all the authors who submitted their papers to this issue and all the reviewers who accepted our invitation to review these papers.


James J. (Jong Hyuk) Park

He received Ph.D. degrees in Graduate School of Information Security from Korea University, Korea and Graduate School of Human Sciences from Waseda University, Japan. From December 2002 to July 2007, Dr. Park had been a research scientist of R Institute, Hanwha S Co. Ltd., Korea. From September 2007 to August 2009, he had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. He is now a professor at the Department of Computer Science and Engineering and Department of Interdisciplinary Bio IT Materials, Seoul National University of Science and Technology (SeoulTech), Korea. Dr. Park has published about 200 research papers in international journals and conferences. He has been serving as chairs, program committee, or organizing committee chair for many international conferences and workshops. He is a founding steering chair of some international conferences—MUE, FutureTech, CSA, UCAWSN, etc. He is editor-in-chief of Human-centric Computing and Information Sciences (HCIS) by Springer, The Journal of Information Processing Systems (JIPS) by KIPS, and Journal of Convergence (JoC) by KIPS CSWRG. He is Associate Editor / Editor of 14 international journals including 8 journals indexed by SCI(E). In addition, he has been serving as a Guest Editor for international journals by some publishers: Springer, Elsevier, Wiley, Oxford University press, Hindawi, Emerald, Inderscience. His research interests include security and digital forensics, human-centric ubiquitous computing, context awareness, multimedia services, etc. He got the best paper awards from ISA-08 and ITCS-11 conferences and the outstanding leadership awards from IEEE HPCC-09, ICA3PP-10, IEE ISPA-11, and PDCAT-11. Furthermore, he got the outstanding research awards from the SeoulTech in 2014. Dr. Park's research interests include human-centric ubiquitous computing, vehicular cloud computing, information security, digital forensics, secure communications, multimedia computing, etc. He is a member of the IEEE, IEEE Computer Society, KIPS, and KMMS.


  • 1 A. J. Perez, S. Zeadally, N. Jabeur, "Security and privacy in ubiquitous sensor networks," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.03.0094, vol. 14, no. 2, pp. 286-308. doi:[[[10.3745/JIPS.03.0094]]]
  • 2 H. Kim, E. Lee, "Verifying code toward trustworthy software," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.01.0027, vol. 14, no. 2, pp. 309-321. doi:[[[10.3745/JIPS.01.0027]]]
  • 3 A. Zubedi, Z. Jianqiu, Q. A. Arain, I. Memon, S. Khan, M. S. Khan, Y. Zhang, "Sustaining low-carbon emission development: an energy efficient transportation plan for CPEC," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.04.0067, vol. 14, no. 2, pp. 322-345. doi:[[[10.3745/JIPS.04.0067]]]
  • 4 H. Arshad, A. B. Jantan, O. I. Abiodun, "Digital forensics: review of issues in scientific validation of digital evidence," Journal of Information Processing Systems, 2018. https://doi.org/ 10.3745/JIPS.03.0095, vol. 14, no. 2, pp. 346-376. doi:[[[10.3745/JIPS.03.0095]]]
  • 5 J. H. Qiang, D. W. Ning, T. J. Feng, L. W. Ping, "Dynamic cloud resource reservation model based on trust," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/ JIPS.03.0091, vol. 14, no. 2, pp. 377-395. doi:[[[10.3745/JIPS.03.0091]]]
  • 6 J. J. Kim, "Routing techniques for data aggregation in sensor networks," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.04.0065, vol. 14, no. 2, pp. 396-417. doi:[[[10.3745/JIPS.04.0065]]]
  • 7 F. Barigou, "Impact of instance selection on kNN-based text categorization," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.02.0080, vol. 14, no. 2, pp. 418-434. doi:[[[10.3745/JIPS.02.0080]]]
  • 8 M. Elmouhtadi, S. E. Fkihi, D. Aboutajdine, "Fingerprint identification based on hierarchical triangulation," Journal of Information Processing Systems, 2018. https://doi.org/ 10.3745/JIPS.02.0084, vol. 14, no. 2, pp. 435-447. doi:[[[10.3745/JIPS.02.0084]]]
  • 9 Z. Ye, M. Zhu, J. Wang, "On modification and application of the artificial bee colony algorithm," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/ JIPS.01.0025, vol. 14, no. 2, pp. 448-454. doi:[[[10.3745/JIPS.01.0025]]]
  • 10 S. Bagchi, "Formulating analytical solution of network ODE systems based on input excitations," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.03.0092, vol. 14, no. 2, pp. 455-468. doi:[[[10.3745/JIPS.03.0092]]]
  • 11 S. Bougueroua, B. Boucheham, "GLIBP: gradual locality integration of binary patterns for scene images retrieval," Journal of Information Processing Systems, 2018. https:// doi.org/10.3745/JIPS.02.0081, vol. 14, no. 2, pp. 469-486. doi:[[[10.3745/JIPS.02.0081]]]
  • 12 X. Hai, C. Zhao, "Optimization of train working plan based on multiobjective bi-level programming model," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/ JIPS.04.0066, vol. 14, no. 2, pp. 487-498. doi:[[[10.3745/JIPS.04.0066]]]
  • 13 Y. W. Jang, M. H. Kang, J. W. Chang, "Efficient hybrid transactional memory scheme using near-optimal retry computation and sophisticated memory management in multi-core environment," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.01.0026, vol. 14, no. 2, pp. 499-509. doi:[[[10.3745/JIPS.01.0026]]]
  • 14 C. Wang, H. Zhang, X. Zhou, "Review on self-embedding fragile watermarking for image authentication and self-recovery," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.02.0082, vol. 14, no. 2, pp. 510-522. doi:[[[10.3745/JIPS.02.0082]]]
  • 15 S. H. Lee, J. H. Roh, S. Kim, S. H. Jin, "Feature subset for improving accuracy of keystroke dynamics on mobile environment," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.03.0093, vol. 14, no. 2, pp. 523-538. doi:[[[10.3745/JIPS.03.0093]]]
  • 16 L. Lin, "An effective denoising method for images contaminated with mixed noise based on adaptive median filtering and wavelet threshold denoising," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.02.0083, vol. 14, no. 2, pp. 539-551. doi:[[[10.3745/JIPS.02.0083]]]
  • 17 S. Wang, J. Xie, Y. Zheng, J. Wang, T. Jiang, "A method of coupling expected patch log likelihood and guided filtering for image denoising," Journal of Information Processing Systems, 2018. https://doi.org/10.3745/JIPS.02.0085, vol. 14, no. 2, pp. 552-562. doi:[[[10.3745/JIPS.02.0085]]]