Journal of Information Processing Systems

The Journal of Information Processing Systems (JIPS) is the official international journal of the Korea Information Processing Society. As information processing systems are progressing at a rapid pace, the Korea Information Processing Society is committed to providing researchers and other professionals with the academic information and resources they need to keep abreast with ongoing developments. The JIPS aims to be a premier source that enables researchers and professionals all over the world to promote, share, and discuss all major research issues and developments in the field of information processing systems and other related fields.

ISSN: 1976-913X (Print), ISSN: 2092-805X (Online)

[April 23, 2019] We announced The 2nd JIPS Survey Paper Awards. Please refer to here for details.
[Jan. 23, 2018] Call for papers about JIPS Future Topic Track - Special Section scheduled in 2019 are registered. Please refer to here for details.
[Nov. 16, 2018] JIPS committee has made a decision for the article processing charge (APC), thus the new policy applies to all published papers after January 1, 2019. For more information, click here.

Latest Publications

Journal of Information Processing Systems, Vol. 15, No.2, 2019

IoT and Smart City Technology: Challenges, Opportunities, and Solutions
Young-Sik Jeong and Jong Hyuk Park
Page: 233~238, Vol. 15, No.2, 2019
Keywords: Internet of Things, Smart City
Show / Hide Abstract
Internet of Things (IoT) technology has been recently utilized in diverse fields. Smart city is one of the IoT application domains with a lot of research topics and which is operated by integrated IoT applications. In this paper, diverse kinds of solutions, processes, and frameworks to address the existing challenges in information technology are introduced. Such solutions involve various future track topics including blockchain, security, steganography, optimization, machine learning, smart system, and so on. In the subsequent paragraphs, we describe each topic in a summarized way in terms of the existing challenges and their solutions. Specifically, this paper introduced 18 novel and enhanced research studies from different countries in the world. We present diverse kinds of paradigms to subjects that tackle diverse kinds of research areas such as IoT and Smart City, and so on.

Enhanced Security Framework for E-Health Systems using Blockchain
Mohan Kubendiran, Satyapal Singh and Arun Kumar Sangaiah
Page: 239~250, Vol. 15, No.2, 2019
Keywords: Blockchain, Cloud Computing, Data Integrity, Data Provenance, E-Health System
Show / Hide Abstract
An individual’s health data is very sensitive and private. Such data are usually stored on a private or community owned cloud, where access is not restricted to the owners of that cloud. Anyone within the cloud can access this data. This data may not be read only and multiple parties can make to it. Thus, any unauthorized modification of health-related data will lead to incorrect diagnosis and mistreatment. However, we cannot restrict semipublic access to this data. Existing security mechanisms in e-health systems are competent in dealing with the issues associated with these systems but only up to a certain extent. The indigenous technologies need to be complemented with current and future technologies. We have put forward a method to complement such technologies by incorporating the concept of blockchain to ensure the integrity of data as well as its provenance.

Research on Finite-time Consensus of Multi-agent Systems
Lijun Chen, Yu Zhang, Yuping Li and Linlin Xia
Page: 251~260, Vol. 15, No.2, 2019
Keywords: Finite-Time Consensus, Convergence Speed, Leader-Following, MAS
Show / Hide Abstract
In order to ensure second-order multi-agent systems (MAS) realizing consensus more quickly in a limited time, a new protocol is proposed. In this new protocol, the gradient algorithm of the overall cost function is introduced in the original protocol to enhance the connection between adjacent agents and improve the moving speed of each agent in the MAS. Utilizing Lyapunov stability theory, graph theory and homogeneity theory, sufficient conditions and detailed proof for achieving a finite-time consensus of the MAS are given. Finally, MAS with three following agents and one leading agent is simulated. Moreover, the simulation results indicated that this new protocol could make the system more stable, more robust and convergence faster when compared with other protocols.

A Block-based Adaptive Data Hiding Approach using Pixel value difference and LSB Substitution to Secure E-Governance Documents
Tanmoy Halder, Sunil Karforma and Rupali Mandal
Page: 261~270, Vol. 15, No.2, 2019
Keywords: Block, E-Governance, Pixel Value Difference, Steganography
Show / Hide Abstract
In order to protect secret digital documents against vulnerabilities while communicating, steganography algorithms are applied. It protects a digital file from unauthorized access by hiding the entire content. Pixelvalue- difference being a method from spatial domain steganography utilizes the difference gap between neighbor pixels to fulfill the same. The proposed approach is a block-wise embedding process where blocks of variable size are chosen from the cover image, therefore, a stream of secret digital contents is hidden. Least significant bit (LSB) substitution method is applied as an adaptive mechanism and optimal pixel adjustment process (OPAP) is used to minimize the error rate. The proposed application succeeds to maintain good hiding capacity and better signal-to-noise ratio when compared against other existing methods. Any means of digital communication specially e-Governance applications could be highly benefited from this approach.

A Synchronization Scheme Based on Moving Average for Robust Audio Watermarking
Jinquan Zhang and Bin Han
Page: 271~287, Vol. 15, No.2, 2019
Keywords: Audio Watermarking, Moving Average, Robust Watermarking, Synchronization Code
Show / Hide Abstract
The synchronization scheme based on moving average is robust and suitable for the same rule to be adopted in embedding watermark and synchronization code, but the imperceptibility and search efficiency is seldom reported. The study aims to improve the original scheme for robust audio watermarking. Firstly, the survival of the algorithm from desynchronization attacks is improved. Secondly, the scheme is improved in inaudibility. Objective difference grade (ODG) of the marked audio is significantly changed. Thirdly, the imperceptibility of the scheme is analyzed and the derived result is close to experimental result. Fourthly, the selection of parameters is optimized based on experimental data. Fifthly, the search efficiency of the scheme is compared with those of other synchronization code schemes. The experimental results show that the proposed watermarking scheme allows the high audio quality and is robust to common attacks such as additive white Gaussian noise, requantization, resampling, low-pass filtering, random cropping, MP3 compression, jitter attack, and time scale modification. Moreover, the algorithm has the high search efficiency and low false alarm rate.

Compression and Enhancement of Medical Images using Opposition Based Harmony Search Algorithm
Rekha Haridoss and Samundiswary Punniyakodi
Page: 288~304, Vol. 15, No.2, 2019
Keywords: Entropy, Harmony Search Algorithm, Image Compression, Multi-Thresholding, Optimization
Show / Hide Abstract
The growth of telemedicine-based wireless communication for images—magnetic resonance imaging (MRI) and computed tomography (CT)—leads to the necessity of learning the concept of image compression. Over the years, the transform based and spatial based compression techniques have attracted many types of researches and achieve better results at the cost of high computational complexity. In order to overcome this, the optimization techniques are considered with the existing image compression techniques. However, it fails to preserve the original content of the diagnostic information and cause artifacts at high compression ratio. In this paper, the concept of histogram based multilevel thresholding (HMT) using entropy is appended with the optimization algorithm to compress the medical images effectively. However, the method becomes time consuming during the measurement of the randomness from the image pixel group and not suitable for medical applications. Hence, an attempt has been made in this paper to develop an HMT based image compression by utilizing the opposition based improved harmony search algorithm (OIHSA) as an optimization technique along with the entropy. Further, the enhancement of the significant information present in the medical images are improved by the proper selection of entropy and the number of thresholds chosen to reconstruct the compressed image.

A prediction model of the sum of container based on combined BP neural network and SVM
Min-jie Ding, Shao-zhong Zhang, Hai-dong Zhong, Yao-hui Wu and Liang-bin Zhang
Page: 305~319, Vol. 15, No.2, 2019
Keywords: BP Neural Network, Grey Relational Analysis, Sum of Container Prediction, Support Vector Machine
Show / Hide Abstract
The prediction of the sum of container is very important in the field of container transport. Many influencing factors can affect the prediction results. These factors are usually composed of many variables, whose composition is often very complex. In this paper, we use gray relational analysis to set up a proper forecast index system for the prediction of the sum of containers in foreign trade. To address the issue of the low accuracy of the traditional prediction models and the problem of the difficulty of fully considering all the factors and other issues, this paper puts forward a prediction model which is combined with a back-propagation (BP) neural networks and the support vector machine (SVM). First, it gives the prediction with the data normalized by the BP neural network and generates a preliminary forecast data. Second, it employs SVM for the residual correction calculation for the results based on the preliminary data. The results of practical examples show that the overall relative error of the combined prediction model is no more than 1.5%, which is less than the relative error of the single prediction models. It is hoped that the research can provide a useful reference for the prediction of the sum of container and related studies.

Analysis of the Sociality and Democratic-Citizenship Changes from the Application of the Scratch Remix Function in Cooperative Learning
Oh-Han Kang
Page: 320~330, Vol. 15, No.2, 2019
Keywords: Cooperative Learning, Democratic Citizenship, Remix, Scientifically Gifted Elementary Student, Scratch, Sociality
Show / Hide Abstract
This study analyzed changes in sociality and democratic-citizenship among elementary school students in the information class and the science class at the Science Education Institute for the Gifted, who were divided into an experimental group and a control group. The experimental group engaged in the Learning Together (LT) cooperative form of learning for which the remix function of Scratch, an educational programming language, was applied, while the control group was given general instructor-led lessons. Members in the experimental group were able to modify processes during projects through the usage of the remix function, thereby actively participating in the projects and eventually generating team-based results. The post-class t-tests showed a greater degree of improvements in sociality and democratic citizenship for the experimental group that was offered the remix-function-based cooperative learning than the control group. Statistically significant differences were present between two groups particularly in “cooperative spirit” sub-domain of sociality and the “community” and “responsibility” sub-domains of democratic citizenship.

Uncertainty Analysis of Dynamic Thermal Rating of Overhead Transmission Line
Xing Zhou, Yanling Wang, Xiaofeng Zhou, Weihua Tao, Zhiqiang Niu and Ailing Qu
Page: 331~343, Vol. 15, No.2, 2019
Keywords: Confidence Interval, Dynamic Thermal Rating, Monte Carlo Method, Transmission Line Carrying Capacity
Show / Hide Abstract
Dynamic thermal rating of the overhead transmission lines is affected by many uncertain factors. The ambient temperature, wind speed and wind direction are the main sources of uncertainty. Measurement uncertainty is an important parameter to evaluate the reliability of measurement results. This paper presents the uncertainty analysis based on Monte Carlo. On the basis of establishing the mathematical model and setting the probability density function of the input parameter value, the probability density function of the output value is determined by probability distribution random sampling. Through the calculation and analysis of the transient thermal balance equation and the steady- state thermal balance equation, the steady-state current carrying capacity, the transient current carrying capacity, the standard uncertainty and the probability distribution of the minimum and maximum values of the conductor under 95% confidence interval are obtained. The simulation results indicate that Monte Carlo method can decrease the computational complexity, speed up the calculation, and increase the validity and reliability of the uncertainty evaluation.

Multi-person tracking using SURF and background subtraction for surveillance
Juhee Yu and Kyoung-Mi Lee
Page: 344~358, Vol. 15, No.2, 2019
Keywords: Background Subtraction, Feature Detection, SURF, Tracking, Video Surveillance
Show / Hide Abstract
Surveillance cameras have installed in many places because security and safety is becoming important in modern society. Through surveillance cameras installed, we can deal with troubles and prevent accidents. However, watching surveillance videos and judging the accidental situations is very labor-intensive. So now, the need for research to analyze surveillance videos is growing. This study proposes an algorithm to track multiple persons using SURF and background subtraction. While the SURF algorithm, as a person-tracking algorithm, is robust to scaling, rotating and different viewpoints, SURF makes tracking errors with sudden changes in videos. To resolve such tracking errors, we combined SURF with a background subtraction algorithm and showed that the proposed approach increased the tracking accuracy. In addition, the background subtraction algorithm can detect persons in videos, and SURF can initialize tracking targets with these detected persons, and thus the proposed algorithm can automatically detect the enter/exit of persons.

Incremental fuzzy clustering based on a fuzzy scatter matrix
Yongli Liu, Hengda Wang, Tianyi Duan, Jingli Chen and Hao Chao
Page: 359~373, Vol. 15, No.2, 2019
Keywords: Fuzzy Clustering, Incremental Clustering, Scatter Matrix
Show / Hide Abstract
For clustering large-scale data, which cannot be loaded into memory entirely, incremental clustering algorithms are very popular. Usually, these algorithms only concern the within-cluster compactness and ignore the between-cluster separation. In this paper, we propose two incremental fuzzy compactness and separation (FCS) clustering algorithms, Single-Pass FCS (SPFCS) and Online FCS (OFCS), based on a fuzzy scatter matrix. Firstly, we introduce two incremental clustering methods called single-pass and online fuzzy C-means algorithms. Then, we combine these two methods separately with the weighted fuzzy C-means algorithm, so that they can be applied to the FCS algorithm. Afterwards, we optimize the within-cluster matrix and betweencluster matrix simultaneously to obtain the minimum within-cluster distance and maximum between-cluster distance. Finally, large-scale datasets can be well clustered within limited memory. We implemented experiments on some artificial datasets and real datasets separately. And experimental results show that, compared with SPFCM and OFCM, our SPFCS and OFCS are more robust to the value of fuzzy index m and noise.

Optimization of Pipelined Discrete Wavelet Packet Transform Based on an Efficient Transpose Form and an Advanced Functional Sharing Technique
Hung-Ngoc Nguyen, Cheol-Hong Kim and Jong-Myon Kim
Page: 374~385, Vol. 15, No.2, 2019
Keywords: AFS Technique, CSDBE, Daubechies, DWPT, FIR Filter, FPGA, Pipelined Architecture
Show / Hide Abstract
This paper presents an optimal implementation of a Daubechies-based pipelined discrete wavelet packet transform (DWPT) processor using finite impulse response (FIR) filter banks. The feed-forward pipelined (FFP) architecture is exploited for implementation of the DWPT on the field-programmable gate array (FPGA). The proposed DWPT is based on an efficient transpose form structure, thereby reducing its computational complexity by half of the system. Moreover, the efficiency of the design is further improved by using a canonical-signed digit-based binary expression (CSDBE) and advanced functional sharing (AFS) methods. In this work, the AFS technique is proposed to optimize the convolution of FIR filter banks for DWPT decomposition, which reduces the hardware resource utilization by not requiring any embedded digital signal processing (DSP) blocks. The proposed AFS and CSDBE-based DWPT system is embedded on the Virtex-7 FPGA board for testing. The proposed design is implemented as an intellectual property (IP) logic core that can easily be integrated into DSP systems for sub-band analysis. The achieved results conclude that the proposed method is very efficient in improving hardware resource utilization while maintaining accuracy of the result of DWPT.

Dynamic Thermal Rating of Transmission Line Based on Environmental Parameter Estimation
Zidan Sun, Zhijie Yan, Likai Liang, Ran Wei and Wei Wang
Page: 386~398, Vol. 15, No.2, 2019
Keywords: Dynamic Thermal Rating, Environmental Parameters, Ordinary Kriging Interpolation Method, Transmission Line
Show / Hide Abstract
The transmission capacity of transmission lines is affected by environmental parameters such as ambient temperature, wind speed, wind direction and so on. The environmental parameters can be measured by the installed measuring devices. However, it is impossible to install the environmental measuring devices throughout the line, especially considering economic cost of power grid. Taking into account the limited number of measuring devices and the distribution characteristics of environment parameters and transmission lines, this paper first studies the environmental parameter estimating method of inverse distance weighted interpolation and ordinary Kriging interpolation. Dynamic thermal rating of transmission lines based on IEEE standard and CIGRE standard thermal equivalent equation is researched and the key parameters that affect the load capacity of overhead lines is identified. Finally, the distributed thermal rating of transmission line is realized by using the data obtained from China meteorological data network. The cost of the environmental measurement device is reduced, and the accuracy of dynamic rating is improved.

A Spatial-temporal 3D Human Pose Reconstruction Framework
Xuan Thanh Nguyen, Thi Duyen Ngo and Thanh Ha Le
Page: 399~409, Vol. 15, No.2, 2019
Keywords: 3D Human Pose, Reconstruction, Spatial-Temporal Model
Show / Hide Abstract
Three-dimensional (3D) human pose reconstruction from single-view image is a difficult and challenging topic. Existing approaches mostly process frame-by-frame independently while inter-frames are highly correlated in a sequence. In contrast, we introduce a novel spatial-temporal 3D human pose reconstruction framework that leverages both intra and inter-frame relationships in consecutive 2D pose sequences. Orthogonal matching pursuit (OMP) algorithm, pre-trained pose-angle limits and temporal models have been implemented. Several quantitative comparisons between our proposed framework and recent works have been studied on CMU motion capture dataset and Vietnamese traditional dance sequences. Our framework outperforms others by 10% lower of Euclidean reconstruction error and more robust against Gaussian noise. Additionally, it is also important to mention that our reconstructed 3D pose sequences are more natural and smoother than others.

Block Sparse Signals Recovery Algorithm for Distributed Compressed Sensing Reconstruction
Xingyi Chen, Yujie Zhang and Rui Qi
Page: 410~421, Vol. 15, No.2, 2019
Keywords: Block Sparse Signals, Compressed Sensing, Distributed Compressed Sensing, Iteration Algorithm
Show / Hide Abstract
Distributed compressed sensing (DCS) states that we can recover the sparse signals from very few linear measurements. Various studies about DCS have been carried out recently. In many practical applications, there is no prior information except for standard sparsity on signals. The typical example is the sparse signals have block-sparse structures whose non-zero coefficients occurring in clusters, while the cluster pattern is usually unavailable as the prior information. To discuss this issue, a new algorithm, called backtracking-based adaptive orthogonal matching pursuit for block distributed compressed sensing (DCSBBAOMP), is proposed. In contrast to existing block methods which consider the single-channel signal reconstruction, the DCSBBAOMP resorts to the multi-channel signals reconstruction. Moreover, this algorithm is an iterative approach, which consists of forward selection and backward removal stages in each iteration. An advantage of this method is that perfect reconstruction performance can be achieved without prior information on the block-sparsity structure. Numerical experiments are provided to illustrate the desirable performance of the proposed method.

Power Quality Disturbances Identification Method Based on Novel Hybrid Kernel Function
Liquan Zhao and Meijiao Gai
Page: 422~432, Vol. 15, No.2, 2019
Keywords: Hybrid Kernel Function, Power Quality Disturbance, Support Vector Machine, Wavelet Transform
Show / Hide Abstract
A hybrid kernel function of support vector machine is proposed to improve the classification performance of power quality disturbances. The kernel function mathematical model of support vector machine directly affects the classification performance. Different types of kernel functions have different generalization ability and learning ability. The single kernel function cannot have better ability both in learning and generalization. To overcome this problem, we propose a hybrid kernel function that is composed of two single kernel functions to improve both the ability in generation and learning. In simulations, we respectively used the single and multiple power quality disturbances to test classification performance of support vector machine algorithm with the proposed hybrid kernel function. Compared with other support vector machine algorithms, the improved support vector machine algorithm has better performance for the classification of power quality signals with single and multiple disturbances.

An Improved Artificial Bee Colony Algorithm Based on Special Division and Intellective Search
He Huang, Min Zhu and Jin Wang
Page: 433~439, Vol. 15, No.2, 2019
Keywords: Artificial Bee Colony, Global Search, Intellective Search, Special Division
Show / Hide Abstract
Artificial bee colony algorithm is a strong global search algorithm which exhibits excellent exploration ability. The conventional ABC algorithm adopts employed bees, onlooker bees and scouts to cooperate with each other. However, its one dimension and greedy search strategy causes slow convergence speed. To enhance its performance, in this paper, we abandon the greedy selection method and propose an artificial bee colony algorithm with special division and intellective search (ABCIS). For the purpose of higher food source research efficiency, different search strategies are adopted with different employed bees and onlooker bees. Experimental results on a series of benchmarks algorithms demonstrate its effectiveness.

Scalable Service Placement in the Fog Computing Environment for the IoT-Based Smart City
Jonghwa Choi and Sanghyun Ahn
Page: 440~448, Vol. 15, No.2, 2019
Keywords: Fog Computing, Internet of Things (IoT), Service Management, Service Placement, Service Provisioning
Show / Hide Abstract
The Internet of Things (IoT) is one of the main enablers for situation awareness needed in accomplishing smart cities. IoT devices, especially for monitoring purposes, have stringent timing requirements which may not be met by cloud computing. This deficiency of cloud computing can be overcome by fog computing for which fog nodes are placed close to IoT devices. Because of low capabilities of fog nodes compared to cloud data centers, fog nodes may not be deployed with all the services required by IoT devices. Thus, in this article, we focus on the issue of fog service placement and present the recent research trends in this issue. Most of the literature on fog service placement deals with determining an appropriate fog node satisfying the various requirements like delay from the perspective of one or more service requests. In this article, we aim to effectively place fog services in accordance with the pre-obtained service demands, which may have been collected during the prior time interval, instead of on-demand service placement for one or more service requests. The concept of the logical fog network is newly presented for the sake of the scalability of fog service placement in a large-scale smart city. The logical fog network is formed in a tree topology rooted at the cloud data center. Based on the logical fog network, a service placement approach is proposed so that services can be placed on fog nodes in a resourceeffective way.

S-mote: SMART Home Framework for Common Household Appliances in IoT Network
Dong-Min Park, Seong-Kyu Kim and Yeong-Seok Seo
Page: 449~456, Vol. 15, No.2, 2019
Keywords: Infrared Module, Infrared Signal, IoT (Internet of Things), Radio Frequency Module, Remote Control, SMART Home, S-mote
Show / Hide Abstract
SMART home is one of the most popular applications of Internet-of-Things (IoT) technologies, which is expanding in terms of range of applications. SMART home technology provides convenience at home by connecting household appliances to a single network, control, and management. However, many general home appliances do not support the network functions yet; hence, enjoying such convenient technology could be difficult, and it could be expensive in the beginning to build the framework. In addition, even though products with SMART home technologies are purchased, the control systems could differ from device to device. Thus, in this paper, we propose a SMART home framework, called an S-mote that can operate all the IoT functions in a single application by adding an infrared or radio frequency module to general home appliances. The proposed framework is analyzed using four types of performance tests by five evaluators. The results of the experiment show that the SMART home environment was implemented successfully and that it functions appropriately, without any operational issues, with various home appliances, including the latest IoT devices, and even those equipped with an infrared or radio frequency module.

Featured Papers

A Survey on Asynchronous Quorum-Based Power Saving Protocols in Multi-Hop Networks
Mehdi Imani, Majid Joudaki, Hamid R. Arabnia and Niloofar Mazhari
Pages: 1436~1458, Vol. 13, No.6, 2017
Keywords: Ad Hoc Networks, Asynchronous Sleep Scheduling Protocols, Power Saving Protocols, Quorum Based Systems
Show / Hide Abstract

Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries
Carlos Porcel, Alberto Ching-López, Juan Bernabé-Moreno, Alvaro Tejeda-Lorente and Enrique Herrera-Viedma
Pages: 653~667, Vol. 13, No.4, 2017
Keywords: Digital Libraries, Dissemination of Information, Fuzzy Linguistic Modeling, Recommender Systems
Show / Hide Abstract

Granular Bidirectional and Multidirectional Associative Memories: Towards a Collaborative Buildup of Granular Mappings
Witold Pedrycz
Pages: 435~447, Vol. 13, No.3, 2017
Keywords: Allocation of Information Granularity and Optimization, Bidirectional Associative Memory, Collaborative Clustering, Granular Computing, Multi-directional Associative Memory, Prototypes
Show / Hide Abstract

Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches
Ning Yu, Zeng Yu, Feng Gu, Tianrui Li, Xinmin Tian and Yi Pan
Pages: 204~214, Vol. 13, No.2, 2017
Keywords: Bioinformatics, Deep Learning, Deep Neural Networks, DNA Genome Analysis, Image Data Analysis, Machine Learning, lincRNA
Show / Hide Abstract

A Survey of Multimodal Systems and Techniques for Motor Learning
Ramin Tadayon, Troy McDaniel and Sethuraman Panchanathan
Pages: 8~25, Vol. 13, No.1, 2017
Keywords: Augmented Motor Learning and Training, Multimodal Systems and Feedback, Rehabilitative Technologies
Show / Hide Abstract

Survey on 3D Surface Reconstruction
Alireza Khatamian and Hamid R. Arabnia
Pages: 338~357, Vol. 12, No.3, 2016

Keywords: Explicit Surfaces, Implicit Surfaces, Point Cloud, Surface Reconstruction
Show / Hide Abstract

A Comprehensive Review of Emerging Computational Methods for Gene Identification
Ning Yu, Zeng Yu, Bing Li, Feng Gu and Yi Pan
Pages: 1~34, Vol. 12, No.1, 2016

Keywords: Cloud Computing, Comparative Methods, Deep Learning, Fourier Transform, Gene Identification, Gene Prediction, Hidden Markov Model, Machine Learning, Protein-Coding Region, Support Vector Machine
Show / Hide Abstract

On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications
Vladi Kolici, Albert Herrero and Fatos Xhafa
Pages: 491~502, Vol. 10, No.4, 2014
Keywords: Benchmarking, Cloud Computing, Computing Intensive Applications, Genetic Algorithms, Grid Computing, Oracle Grid Engine, Scheduling, Simulation
Show / Hide Abstract

Training-Free Fuzzy Logic Based Human Activity Recognition
Eunju Kim and Sumi Helal
Pages: 335~354, Vol. 10, No.3, 2014
Keywords: Activity Semantic Knowledge, Fuzzy Logic, Human Activity Recognition, Multi-Layer Neural Network
Show / Hide Abstract

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity
Cyrus Shahabi, Seon Ho Kim, Luciano Nocera, Giorgos Constantinou, Ying Lu, Yinghao Cai, Gérard Medioni, Ramakant Nevatia and Farnoush Banaei-Kashani
Pages: 1~22, Vol. 10, No.1, 2014
Keywords: Multi-source, Multi-modal Event Detection, Law Enforcement, Criminal Activity, Surveillance, Security, Safety
Show / Hide Abstract

The Confinement Problem: 40 Years Later
Alex Crowell, Beng Heng Ng, Earlence Fernandes and Atul Prakash
Pages: 189~204, Vol. 9, No.2, 2013
Keywords: Confinement Problem, Covert Channels, Virtualization, Isolation, Taint Tracking
Show / Hide Abstract

An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators
B. John Oommen, Anis Yazidi and Ole-Christoffer Granmo
Pages: 191~212, Vol. 8, No.2, 2012
Keywords: Weak es timators, User's Profiling, Time Varying Preferences
Show / Hide Abstract

Indoor Link Quality Comparison of IEEE 802.11a Channels in a Multi-radio Mesh Network Testbed
Asitha U Bandaranayake, Vaibhav Pandit and Dharma P. Agrawal
Pages: 1~20, Vol. 8, No.1, 2012
Keywords: IEEE 802.11a, Indoor Test Bed, Link Quality, Wireless Mesh Networks
Show / Hide Abstract

A Survey of RFID Deployment and Security Issues
Amit Grover and Hal Berghel
Pages: 561~580, Vol. 7, No.4, 2011
Keywords: RFID, RFID Standards, RFID Protocols, RFID Security, EPC structure, RFID Applications, RFID Classification
Show / Hide Abstract

The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing
Witold Pedrycz
Pages: 397~412, Vol. 7, No.3, 2011
Keywords: Information Granularity, Principle of Justifiable Granularity, Knowledge Management, Optimal Granularity Allocation
Show / Hide Abstract

CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks
Mohammad S. Obaidat, Sanjay K. Dhurandher and Khushboo Diwakar
Pages: 241~260, Vol. 7, No.2, 2011
Keywords: Routing, Multimedia Networks, Congestion-aware Selection, MANET, CASPER, Performance Evaluation
Show / Hide Abstract

An Efficient Broadcast Technique for Vehicular Networks
Ai Hua Ho, Yao H. Ho, Kien A. Hua, Roy Villafane and Han-Chieh Chao
Pages: 221~240, Vol. 7, No.2, 2011
Keywords: V2V Communication Protocols, Vehicular Network, Ad Hoc Network, Broadcast, Broadcasting Storm, Routing
Show / Hide Abstract

Security Properties of Domain Extenders for Cryptographic Hash Functions
Elena Andreeva, Bart Mennink and Bart Preneel
Pages: 453~480, Vol. 6, No.4, 2010
Keywords: Hash Functions, Domain Extenders, Security Properties
Show / Hide Abstract

Hiding Secret Data in an Image Using Codeword Imitation
Zhi-Hui Wang, Chin-Chen Chang and Pei-Yu Tsai
Pages: 435~452, Vol. 6, No.4, 2010
Keywords: Data Hiding, Steganography, Vector Quantization
Show / Hide Abstract

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments
Mohammad S. Obaidat, Sanjay K. Dhurandher, Deepank Gupta, Nidhi Gupta and Anupriya Asthana
Pages: 269~294, Vol. 6, No.3, 2010
Keywords: Sensor Network, Security, Energy Efficiency, Routing, Dynamic Trust Factor
Show / Hide Abstract

Challenges to Next Generation Services in IP Multimedia Subsystem
Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen and Han-Chieh Chao
Pages: 129~146, Vol. 6, No.2, 2010
Keywords: IP Multimedia Subsystems, Peer-to-Peer, Web Services, SCIM
Show / Hide Abstract

TOSS: Telecom Operations Support Systems for Broadband Services
Yuan-Kai Chen, Chang-Ping Hsu, Chung-Hua Hu, Rong-Syh Lin, Yi-Bing Lin, Jian-Zhi Lyu, Wudy Wu and Heychyi Young
Pages: 1~20, Vol. 6, No.1, 2010
Keywords: Operations Support System (OSS), New Generation Operations Systems and Software (NGOSS), enhanced Telecom Operations Map (eTOM), Internet Protocol Television (IPTV), IP-Virtual Private Network (IP-VPN)
Show / Hide Abstract

Providing Efficient Secured Mobile IPv6 by SAG and Robust Header Compression
Tin-Yu Wu, Han-Chieh Chao and Chi-Hsiang Lo
Pages: 117~130, Vol. 5, No.3, 2009
10.3745/JIPS.2009.5.3. 117
Keywords: SAG, RoHC, MIPv6, Handoff Latency, Early Binding Update
Show / Hide Abstract

A Survey of Face Recognition Techniques
Rabia Jafri and Hamid R Arabnia
Pages: 41~68, Vol. 5, No.2, 2009
Keywords: Face Recognition, Person Identification, Biometrics
Show / Hide Abstract


With regard to ethical standards, the JIPS takes plagiarism very seriously and thoroughly checks all articles. The JIPS defines research ethics as securing objectivity and accuracy in the execution of research and the conclusion of results without any unintentional errors resulting from negligence or incorrect knowledge, etc. and without any intentional misconduct such as falsification, plagiarism, etc. When an author submits a paper to the JIPS online submission and peer-review system, he/she should also upload the separate file "author check list" which contains a statement that all his/her research has been performed in accordance with ethical standards.

Among the JIPS editorial board members, there are four associate manuscript editors who support the JIPS by dealing with any ethical problems associated with the publication process and give advice on how to handle cases of suspected research and publication misconduct. When the JIPS managing editor looks over submitted papers and checks that they are suitable for further processing, the managing editor also routes them to the CrossCheck service provided by iTenticate. Based on the results provided by the CrossCheck service, the JIPS associate manuscript editors inform the JIPS editor-in-chief of any plagiarism that is detected in a paper. Then, the JIPS editor-in-chief communicates such detection to the author(s) while rejecting the paper.


Since 2005, all papers published in the JIPS are subjected to a peer review and upon acceptance are immediately made permanently available free of charge for everyone worldwide to read and download from the journal’s homepage ( without any subscription fee or personal registration. This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License ( which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. The KIPS waives paper processing charges for submissions from international authors as well as society members. This waiver policy supports and encourages the publication of quality papers, making the journal an international forum for the exchange of different ideas and experiences.

Contact Information

JIPS Secretary: Ms. Joo-yeon Lee
Phone: +82-2-2077-1414, Fax: +82-2-2077-1472