With recent expansions of IT convergence equipment, more and more mobile communications—related devices are used in many fields, and mobile communications—based projects are underway in various venues, such as u-cities, u-ports, u-health, and u-traffic. In particular, owing to increasing demand for personal services due to the rapid increase in the elderly population and rapid development of convergence technology, the increased competition among mobile communications institutions, etc., is shifting towards consumer-oriented services, giving priority to the expectations and desires of consumers when delivering ubiquitous services. As a result, the use of mobile communications technology is increasing in convergence-related fields. Mobile communications systems for convergence environments pose many research challenges. Among these is processing overhead in service environments [1318]. Therefore, novel techniques, architectures, algorithms, and experiences regarding multimedia applications and industry services must be considered. Some of these research areas are listed below.

\(\bullet \) :

Ubiquitous Computing for Convergence

\(\bullet \) :

Software Infrastructure, Middleware and Frameworks for Convergence Information

\(\bullet \) :

Mobile and Wearable Computing for Convergence Information

\(\bullet \) :

Agent Technology in Convergence Information Systems

\(\bullet \) :

Convergence Information Applications in u-Commerce, u-Learning, u-Health

\(\bullet \) :

Two-way Authentication Protocols in Wireless Communications

\(\bullet \) :

Innovative Authentication and Authorization of Mobile Users

\(\bullet \) :

Device Identities and Authentication

\(\bullet \) :

Mobility for Convergence

\(\bullet \) :

Mobile Identity Management

\(\bullet \) :

Enhanced Authentication Control Systems for Mobile and Wireless Systems

\(\bullet \) :

Authentication in Mobile Networks

\(\bullet \) :

Convergence Information Indexing, Searching, and Visualization

\(\bullet \) :

Intelligent Information Extraction Algorithms

This special issue is devoted to one of the hottest topics in mobile communication systems, and its articles are expected to be cited widely in the areas of computer virology and hacking techniques.

Lee et al. [1] present Choquet integral—based product satisfaction inference taking into consideration subjective decision-making tendencies. They propose a product satisfaction inference method reflecting users’ preferences based on such variables as price, discount rate, number of buyers, and purchase satisfaction, which are most influential in choosing and purchasing goods. For this purpose, the paper includes product satisfaction evaluation using a fuzzy set theory—based fuzzy-inference system and the fuzzy measure theory—based fuzzy integral. The outcome of the paper indicates that it is possible to recommend products by means of an analytical hierarchy process and fuzzy integrals in reference to objective product data. Sim and Baek [2] introduce a study of a scalable information-matching system based on web service information. This study proposes a decision process in terms of a web service function for users in real-life situations using conventional methods and services. Scalable information is used to subsequently propose a service selection broker so that an optimal web service can be selected when users seek a web service. The service selection process proposed in this thesis simplifies the model by utilizing Web Services Description Language (WSDL) and Universal Description, Discovery and Integration for the existing service search model without dynamically applying the web service level contract or web service policy statement during execution time when clients’ requests for services do not pass beyond the service search model used in the web service search method.

Kim et al. [3] present indoor location tracking based on mobile radio frequency identification (RFID) for a smart exhibition service. They propose the scenario and architecture of an indoor location tracking service for things or space in an exhibition environment based on mobile RFID. The proposed indoor location tracking system helps to find the locations of users, things and spaces to provide effective exhibition services. The RFID tags are identified as locations of points that people pass, and they obtain spatial data from the tags using mobile RFID readers, a web server and a database server. The authors provide an intelligent exhibition service by presenting a new direction using the proposed system. Kim et al. [4] introduce a heuristic estimation of network capacity and spectrum requirements. An efficient estimation method for network capacity and spectrum requirements is proposed based on transform free analysis for waiting time distribution in an M/G/1 priority queue. The mean waiting time of an M/G/1 non-preemptive priority queue is analyzed by the heuristic method mainly composed of the first and second moments of transmission time for each type of packet. The proposed heuristic approach could simplify the estimation process for the required capacity and spectrum requirements. It can also be applied to the analysis of an optional situation in a network, which permits vacation time for maintenance or warm up.

Hong et al. [5] present implementation of a smart pulsimeter. They propose an algorithm to analyze weak pulse wave symptoms and strong pulse wave symptoms. It uses a portable pulsimeter that includes a Hall effect sensor. In this research, it was suggested that a rapid pulse and a weak pulse could be discerned if we would use a portable pulsimeter that is designed on the basis of Hall sensor capabilities to clear problems like those mentioned above. Having analyzed patients with a rapid pulse and those with a weak pulse by statistical methods, the researchers prove that N time (notch point time) and S Amp (rise waveform size) mean values are significantly different, based on a 95 % confidence interval. Lim and Kim [6] introduce modeling discovery and removal of security vulnerabilities in a software system using priority queuing models. This paper aims to model the discovery and removal of software vulnerabilities based on queuing theory. The probabilistic characteristics of the arrival and service processes are the core elements of queuing theory. The proposed method exploits priority queuing models with batch arrivals. Specifically, Mx/G/1 queuing models with batch arrivals and different classes are introduced. To make the model more valuable, other unmodeled phenomenon should also be considered. Variation of discovery rates over time and versions can also be taken into account.

Choi et al. [7] present an adjusting context-aware RFID for a health screening center (HSC). They propose an example that provides information to examinees and the HSC through a health-screening workflow with RFIDs. When the examinee has arrived and has finished the test, the signal notifies the lab’s PC and is then transferred to the server. After receiving a signal, the workflow system launches a simulation by analyzing pre-defined routes, the number of people waiting and average test times. This study applied context-awareness to the HSC’s workflow. After analyzing related technologies and methods, the authors found this a suitable solution for HSC workflow. This research suggests that HSCs should implement a context-aware RFID system. Kim et al. [8] discuss a study on the factors that affect the adoption of a smart water grid, aiming to review previous studies to identify factors that influence adoption of a smart water grid and to analyze the importance and priority of the factors affecting smart water grid adoption, thereby presenting successful adoption measures for smart water grids in Korea. This study established a research model from influencing factors related to the adoption of new IT technologies identified through literature reviews of previous studies based on the technology–organization–environment framework. This study of the factors that affect the adoption of a smart water grid will be the basis for effective adoption and activation of this next generation of water management system.

Ahn et al. [9] present a low complexity image stitching using advanced feature matching in mobile environments. They propose a method that extracts the minutiae in each image and looks for the corresponding matching points in overlapped parts of the image. To find these points, the algorithm matches feature points via bidirectional feature matching to reduce computational complexity, rather than with the conventional single matching method. They also eliminate unnecessary matching points that are not clustered to reduce processing time, and the transformation matrix to merge corresponding images is generated by selected matching points. Jeong [10] present a loop-splitting method for single loops with non-uniform dependences. They propose a generalized and optimal method to make the iteration space of a loop into partitions with variable sizes. They developed an improved loop-splitting method for maximizing parallelism of single loops with non-constant dependence distances. By using the iteration and distance for the source of the first dependence, and with their defined theorems, they present generalized and optimal algorithms for single loops with non-uniform dependences. Their algorithm generalizes how to transform general single loops with flow and anti-dependences into parallel loops. In comparison with some previous splitting methods, the proposed methods provide much better speedup and extract more parallelism than other methods.

Choi and Han [11] introduce a study on the service quality of SME management consulting affecting perceived management performance in mobile communications environments. For the purpose of this study, the service quality of a consulting firm was chosen to be the preceding factor that has an effect on the improvement of performance based on a pilot study. Parameters were set to differentiate this from other studies, including whether it has been supported by the state, what the consulting area is like, and whether a consultant has relevant certification. A theoretical research model was established based on a pilot study, questionnaire items were adjusted and redesigned to reflect the research subject, and actual proofs were analyzed with a view to determine whether service quality of management consulting has an effect on better performance. Kim and Park [12] discuss legal limits of search and seizure for digital forensics in Korea. The purpose of this research was to examine concepts and types of cyber-crime, and to trace trends in the Republic of Korea over recent years. If made accessible, information stored in private computers has the potential to serve as decisive evidence in many criminal prosecutions. However this partial code does not explicitly define the admissibility of digital evidence and acceptable methods of examining it. Hence, one of the goals of this research was to identify problems pertaining to the law and suggest ways to improve it.

This fine collection of papers was accumulated by fruitful collaboration. We gratefully acknowledge and express our heartfelt appreciation to all the authors for their excellent contributions to this special issue. We would also like to thank all the members of the SDPM, ICDPM Program Committee and anonymous reviewers for their help in identifying novel papers and for their careful reading of earlier drafts to select 12 high-quality papers out of 25 papers submitted—a 48 % acceptance rate. Furthermore, we would like to thank Professor Eric Filiol, editor-in-chief of the International Journal of Computer Virology and Hacking Techniques, for his valuable remarks and help throughout the publication process of this special issue.