Advances in secure communication and information processing systems.
We are pleased to present to readers eight papers addressing some important research issues on secure communication and information processing, selected following a rigorous process with the help of many reviewers. The papers of the special issue are arranged as follows.
D'Auriaet al. presented an interaction system based on spatialized sounds in the paper "A 3D Audio Augmented Reality System for a Cultural Heritage Management and Fruition" . In the second paper entitled "Differential Evolution Enhanced with Composite Population Information Based Mutation Operators" , Liao et al. proposed a DE framework with composite population information based mutation operator (DE-CPI) for global numerical optimization. Little attention has been paid on how to identify the malicious peers in distributed P2P environment. In the third paper "A Malicious Peers Detection Framework for Peer-to-Peer Systems" , Wei et al. presented a general frame work for detecting malicious peers in reputation-based P2P systems.
Due to the recent popularization of IP multicast, the continuous broadcasting of audio or video media data has attracted great attention. A division based broadcasting system for webcast was presented in the paper "Implementation and Evaluation of Division Based Broadcasting System for Webcast"  by Yusuke et al. They evaluate the effectiveness of reducing the waiting time and the interruption time using conventional methods. The fifth paper by Fisher and Hancke entitled "DTLS for Lightweight Secure Data Streaming in the Internet of Things"  shows that datagram transport layer security (DTLS) is a capable alternative to transport layer security when it comes to streaming data across the Internet from connected wireless sensor networks.
In the sixth paper "Providing Mobile Traffic Analysis as-a-Service: design of a service-based infrastructure to offer high-accuracy traffic classifiers based on hardware accelerators" , Mario et al. proposed a two-tier service-based traffic analysis infrastructure which based on the implementation of a decision tree-based traffic analyzer on a Xilinx Zynq7000 architecture and present an overview of the service layer by referring to a cloud infrastructure for its implementation.
One important research issue on wireless-sensor networks is how to design topology structure with high reliable and survivability. In the seventh paper entitled "The Research of Scale-Free Sensor Network Topology Evolution Based on Cloud Computing" , He et al. proposed a topology evolution strategy based on scale-free network with energy efficient. Their simulation shows that network topology form the evolution algorithm have good robustness regardless of deliberate and random attack. In the last paper entitled "The Wavelength Division Multiplexing Passive Optical Network Breakpoint Precision Detection System Based Broadband Chaos Light" , Zouet al. gave a method which can be highly accurate positioning WDM-PON branch breakpoint location, spatial resolution of 7cm and independent of the detection distance. The last three papers deal with innovation management, knowledge management and biomedical informatics.
 D'Auria, Daniela., Di Mauro, Dario., Calandra, Davide Maria., Cutugno, Francesco (2015). A 3D Audio Augmented Reality System for a Cultureal Heritage Management and Fruition, Journal of Digital Management. 13 (4) 203-209.
 Liao, Jingliang., Cai, Yiqiao., Chen, Yong hong., Wang, Tian., Tian, Hui (2015). Differential Evolution Enhanced with Composite Population Information Based Mutation Operators, Journal of Digital Management 13 (4) 210-223.
 Wei, Xiang lin., Fan, Jianhua., Wang, Tongxiang., Wang, Qiping (2015). A Malicious Peers Detection Framework for Peer-to-Peer Systems> Journal of Digital Management 13 (4) 224-233.
 Gotoh, Yusuke., Kimura, Akihiro (2015). Implementation and Evaluation of Division Based Broadcasting System for Webcast, Journal of Digital Management (13 (4) 234-246.
 Fisher, Roy., Hancke, Gerhard (2015). DTLS for Lightweight Secure Data Streaming in the Internet of Things, Journal of Digital Management 13 (4) 247-255.
 Barbareschi, Mario., De Benedictis, Alessandra., Mazzeo., Antonino., Vespoli, Antonino (2015). Providing Mobile Traffic Analysis asa-Service: design of a service-based infrastructure to offer high-accuracy traffic classifiers based on hardware accelerators, Journal of Digital Management 13 (4)256-265.
 He, Yueshun., Zhang, Wei ., Jiang, Nan., Xiaoyan Luo, Nan (2015). The Research of Scale-Free Sensor Network Topology Evolution Based on Cloud Computing, Journal of Digital Management 13 (4) 266-275.
 Dan, Zou., Yuejin, Zhang (2015). The Wavelength Division Multiplexing Passive Optical Network Breakpoint Precision Detection System Based Broadband Chaos Light, Journal of Digital Management 13 (4) 276-285.
 Zhang, Rui., Liu, Shuhan., Meng, Dabin (2015). Study on Function Mechanism and Simulation of "Chain Mode Innovation" Policy in the Optimization and Upgrading, Journal of Digital Management 13 (4) 286-292.
 ZHU, Hong-Miao., ZHANG, Sheng-Tai., ZHANG, Yong-Yun., WANG, Feifei., Kenzhong-LIU (2015). Tacit Knowledge Spreading Based on Knowledge Spreading Model on Networks with Consideration of Intention Mechanism, Journal of Digital Management 13 (4) 293-299.
 WEI, Xiaomei., ZHU, Qin., LYU, Chen., REN, Kai., CHEN, Bo (2015). A Hybrid Method to Extract Triggers in Biomedical Events, Journal of Digital Management 13 (4) 300-304.
Department of Computer Science
Technical University of Catalonia, Spain
School of Computer Science
Guangzhou University, China
|Printer friendly Cite/link Email Feedback|
|Author:||Xhafa, Fatos; Li, Jin|
|Publication:||Journal of Digital Information Management|
|Date:||Aug 1, 2015|
|Previous Article:||Privacy in Social Networks.|
|Next Article:||A 3D audio augmented reality system for a cultural heritage management and fruition.|