According to a recent forecast report, 65% of the world's population is expected to live in cities by 2040, with 90% of this urban population growth to occur in Asia and Africa. The smart city creates new sources of data by deploying smart sensors in city infrastructures to monitor and anticipate urban phenomena. The ability to obtain business value from data consistently is now a characteristic of successful organizations in all sectors such as manufacturing industry, healthcare, financial services, and so on. Big data analysis has the potential to extend and use smart city services to generate value by discovering deep business information as we access more data.
Technology advancement has played a major role in reaping the benefits of streamlined processes and profitable operations. The availability of data from all data sources such as city infrastructure, social media, etc. has changed the game for businesses. These huge volumes of storage and data processing give rise to the need for technology integration such as big data analytics and cloud computing. Many organizations are trying to leverage the power of these technologies to advance their business, but only some of them have succeeded. To improve computing operations, many organizations have embraced cloud computing technology. The integration of cloud computing and big data analytics is delivering benefits for organizations. It provides cost-effective and scalable solutions for future smart cities.
The Journal of Information Processing Systems (JIPS) is the official international journal with indices such as ESCI, SCOPUS, EiCompendex, DOI, DBLP, EBSCO, and Google Scholar and is published by the Korean Information Processing Society (KIPS). There are four divisions: Computer system and theory, Multimedia systems and graphics, Communication systems and security, and Information systems and application. This issue includes 18 peer-reviewed papers following a rigorous review process.
2. Integration of Cloud and Big Data Analytics for Future Smart Cities
Yang et al.  presented a secure deduplication scheme for cloud storage based on Bloom filter, thereby dynamically extending the standard Bloom filter. Data security deduplication in a cloud environment is a very active research direction. A public dynamic Bloom filter array (PDBFA) is utilized in this scheme, which improves efficiency of ownership proof, realizes the fast detection of duplicate data blocks, and reduces the false positive rate of the system. The experimental results show that the computational overhead of file upload is relatively small, and it can effectively control the false positive rate of the system. Moreover, the experimental results suggest that the PDBFA scheme has the characteristics of low computational overhead and low false-positive rate.
In the mass production of garment factories, digital printing is universally introduced with technological improvements. Yuan and Huh  presented a digital printing method in a clothing model to reflect a client's design in real time by matching the area of the diagram where a client designs on a given clothing model and the area where a model standard reflects the actual design information of the customer.
Feng and Hu  proposed an infrared and visible light image fusion method based on variational multiscale decomposition. Guided filtering was used to fuse the structural components. The proposed method was compared with the traditional techniques for infrared and visible image fusion. It not only effectively overcomes the noise interference in the fusion process but also obtains better texture details while maintaining the edge structure and displays certain subjective and objective quality. Note, however, that the proposed method has one demerit, i.e., if guided filtering algorithm is used in the method, then the algorithm will have high complexity. Thus, the next study needs to improve the computational efficiency of the algorithm further.
To reduce data dimensions for faster and better prediction by using sub-modular optimization for selecting the optimal number of features, a correlation-based method was proposed by Attigeri et al. . The proposed model seeks to find the right subset of representative features from which the predictive model can be constructed for a particular task. With optimal subsets, the proposed model achieved considerable accuracy in a significantly shorter execution time.
Yang and Gong  focused on the knowledge of molecular biological information extracted from massive biomedical texts with the aid of machine learning methods whose use was widespread. Biological molecular information has six classes: protein, DNA, RNA, cell line, cell component, and cell. The probability statistics method, CRF (conditional random fields), was utilized to discover these pieces of knowledge. As stored information in any library, computer system, or human mind, knowledge base can help biologists in etiological analysis and pharmacists in drug development. In this work, first, protein, DNA, RNA, cell line, cell type, cell component, and feed were extracted into the CRF++ tool. The six classes of molecular information were then derived from the kinds of literature related to autism. Finally, the knowledge discovery method was used.
Kim and Yun  proposed predicting the total saturation method based on sensing data in the information processing module of crowdsensing for a smart parking system. It implemented a predictive model and performed prediction model learning. Crowdsensing technology is used for improving the efficiency of the smart parking system because it has a low sensor installation price and no restrictions. The comparison of mean squared error between the time-based prediction model and the combined prediction model showed that sensing the data-based prediction model has high prediction accuracy because the sensing data provides insufficient information in the time-based prediction model.
Gong et al.  studied the contact-impact algorithm of the drift ice crashing diversion tunnel, which was based on the symmetric penalty function in the finite element theory. ANSYS/LS-DYNA was adopted as the platform for establishing a tunnel model and a drift ice model. LS-DYNA SOLVER was used as the solver, and LS-PREPOST was used to do post-processing, analyzing the degree of damage of drift ice on the tunnel. The software simulation results and the experiment results show that the tunnel lining surface will have varying degrees of deformation and failure when drift ice crashes with the tunnel lining at different velocities, different plan sizes, and different thicknesses of drift ice. The impact between drift ice and tunnel lining is irregular.
Wu et al.  presented an approach to summarizing the differences between the Chinese and Vietnamese bilingual news using a graph model. They tackled cross-language issues and analyzed the differences between the bilingual Chinese and Vietnamese news. Based on Wikipedia’s multilingual concept description page, they bridge different languages by extracting elements to represent sentences. The experimental result demonstrates promising improvement over the current baselines method by 3 percentage points.
Kim and Lee  presented a general context-based model in an RNN to generate a summary that reflects the overall context of a document. In the experimental results, the proposed model has been shown to outperform the state-of-the-art approaches.
Based on the time series segmentation linear representation method and the k-nearest neighbor local anomaly detection algorithm, an anomaly detection algorithm based on a sliding window was proposed to detect the possible anomalies in the electrolytic cell . It is relatively stable under normal conditions but fluctuates considerably when it has an anomaly. The length, slope, and mean of each line segment pattern are calculated by segmenting the cathode voltage time series and mapping them into a set of spatial objects.
Gookyi and Ryoo  analyzed ten RISC-V processors and determined the ideal processor core for low cost and low power for IoT sensing and actuating devising. Various processors were used, such as Roa Logic RV12, ORCA, SiFive E31, SCR1, Rocket, BOOM, MRISCV, PICORV32, Shakti-E, and Hummingbird. Xilinx Vivado v2018.02 Integrated Software Environment was used to synthesize the processor cores using Zynq-7000 XC7Z020 FPGA devices. PICORV32 yielded better synthesis results compared to other processor cores, and it is implemented in different ISAs such as ARM, LatticeMicro, OpenRISC, and SPARC. It has a vital role because the first step in selecting a processor incurs a low cost.
Wang and Guo  studied an evaluation model of rumor spreading based on social circle chat. The dynamic propagation equation helps depict the rumor spreading’s evaluation, with the evaluation characteristics of the four nodes analyzed. The rumor communication study is based on various indicator terms such as degree, clustering coefficient, distance, and others of the network structure. It has a realistic basis, but platforms for spreading rumors are based on social media such as Facebook, Twitter, and so on. Thus, the rumor injection and the refuting-rumor-information injection evaluation process was simulated by the structure of virtual social network and social chats in this study. Finally, as a result of this study, the spread and evolution of the rumors are related to the node degree on social web chat.
Shinde et al.  presented very effective debugging (VED), a new technique for the detection and correction of a division by zero error in all types of .NET application. It used C# applications because they are distributed through the Internet and used extensively in the form of executable format. The VED technique showed integer division by zero error as well as the location of the error-causing code in assembly language, including error recovery by the user’s preference. It is useful to the developer by reducing the cost and effort of error recovery. The proposed technique is more suitable for small-scale software enterprises.
To solve the technological bottlenecks of the patch representation scheme in traditional learning-based methods, a method of synthesizing face sketches via the regularity terms of local similarity and non-local similarity was presented by Tang et al. . They selected the most relevant patch samples to reconstruct the face sketch versions of the input photos by incorporating a local similarity regularization term into the selection of neighbors.
Choi et al.  proposed a software testing system for transforming a software to provide the runtime monitoring information from the software in real time. They implemented the testing system using a task/function-based lapse-time monitoring module to add modular monitoring targets. The software testing system generates monitorable binary code to reduce the load of runtime software testing.
Wen et al.  presented a case study related to the teleoperation system for interplanetary transportation. The interplanetary transportation mission of the teleoperation system has a vital role in the entire lunar exploration mission. Thus, in this paper, the researchers proposed a net assessment model for China’s CE-3 “Jade Rabbit-1” and CE-4 “Jade Rabbit-2” mission verified for availability and practicability and which acquired the Weapons and Equipment Quality Management System Certification successfully. Finally, the net assessment model was found to be more comprehensive, forward-looking, and pure compared to the traditional evaluation methods for interplanetary transportation.
For business failure prediction, Xu and Yang  presented a new unweighted combination method using the integrated results of each basal classifier without weighting based on the soft set theory. The experimental results show that, regardless of sample size, prediction of business failure is done well compared to other selected benchmark methods.
Yuan et al.  proposed a sentence similarity calculation method for improving the accuracy of long sentence similarity calculation. It was based on a system similarity function that used word2vector as the system element for calculating sentence similarity. The proposed methods have two characteristics: one is the negative effect of penalty item, and the other is that SSF (similar sentence function based on word2vector similar elements) does not satisfy the exchange rule. Finally, the experimental results show that the proposed method has higher accuracy than the WMD (word mover’s distance) and has the shortest query time among the three calculation methods of SSF.