International Journal of U - and e - Service, Science and Technology (IJUNESST), Vol. 6, No. 1, February, 2013

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

ISSN 2005-4246

IJUNESST
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

SCIENCE & ENGINEERING RESEARCH SUPPORT SOCIETY


International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

Editor-in-Chief of the IJUNESST Journal


Jianhua Ma,

Hosei University, Japan

Byeong-Ho Kang,

University of Tasmania, Australia

General Information of IJUNESST


Bibliographic Information

ISSN: 2005-4246 Publisher: SERSC

Science & Engineering Research Support soCiety

Contact Information
Science & Engineering Research Support soCiety

Head Office: 20 Virginia Court, Sandy Bay, Tasmania, Australia Phone no.: +61-3-9016-9027

Email: ijunesst@sersc.org

Journal Aims
Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of u- and e- Service, Science and Technology.

Journal Topics
IJUNESST aims to facilitate and support research related to u- and e- Service, Science and Technology and the applications. The topics covered by IJUNESST include the following:

Basic Topics
Collaborative Business Systems Case Studies in Industry and Government B2B, B2C and C2C Architectures Adoption of Standards and Protocols for e- or u-Business Applications

International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

Compression Methodology CRM and Business Solutions Data and Knowledge Engineering e- or u-Banking e- or u-Business Systems for Multiple Platforms e- or u-Entertainment e- or u-Government e- or u-Learning e- or u-Marketing and Consumer Behavior e- or u-Negotiation and Auction Mechanisms e- or u-Payment Systems GPS Applications and Location-based Services Grid Computing for e- or u-Business Healthcare and Medical Applications Intellectual Rights Interoperability and Integration m-Business and Ubiquitous Services Mobile Services and Architectures Mobility Management in Next Generation Networks Multi-Agent Systems and Information Integration Open Source Technologies in e- or u-Business Quality of Service (QoS) and Metrics Security and Privacy Semantic Web Applications and Ontology Sharing Service-Oriented Architectures Steganography Technology Supply-chain Management

ii

International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

Systems Development and Evaluation Telematics and Middleware Platforms Trust and Privacy Issues in Social Networks User Interfaces and Usability Virtual Organizations VPN Technology and Services Web Data Visualization Web Personalization and Decision Making Web Services Web Site Monitoring and Optimization Workflow Management Systems XML and Domain Mark-up Languages Others

Advisory/Editorial Board
David Zhang, Hong Kong Polytechnic University, Hong Kong David Taniar, Monash University, Australia Chengcui Zhang, University of Alabama at Birmingham, USA Chao-Tung Yang, Tunghai University, Taiwan Chantana Chantrapornchai, Silpakorn University, Thailand Byungjoo Park, Hannam University, Korea Bok Min Goi, MMU, Malaysia Birgit Hofreiter, University of Vienna, Austria Biplab Kumer Sarker, R & D, Innovatia Inc, Canada Artur R. Lugmayr, Tampere University of Technology, Finland Apple Fok, City University of Hong Kong, Hong Kong Antonio Coronato, ICAR-CNR, Italy Aishy Amer, Concordia University, USA

iii

International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

Debnath Bhattacharyya, Heritage Inst. of Technology, India Deok Gyu Lee, ETRI, Korea Dorin Bocu, University Transilvania of Brasov, Romania Georgios Kambourakis, University of the Aegean, Greece Giovanni Cagalaban, Hannam University, Korea Hai Jin, HUST, China Hakan Duman University of Essex, UK Helmar Burkhart, University of Basel, Switzerland Hongli Luo, Indiana University - Purdue University, USA Hongxiu Li, Turku School of Economics, Finland Igor Kotenko, St. Petersburg Institute for Informatics and Automation, Russia J. H. Abawajy, Deakin University, Australia Jianhua He, University of Essex, UK Kun Chang Lee, Sungkyunkwan University, Korea Lei Ye, University of Wollongong, Australia Ling-Jyh Chen, Academia Sinica, Taiwan Liu Wanquan, Curtin University of Technology, Australia Maricel Balitanas-Salazar, University of San Agustin, Philippines Mei-Ling Shyu, University of Miami, USA Mieso Denko, University of GUELPH, Canada Poulami Das, India, India
Prashant Bansod, Shri Govindram Seksaria Institue of Technology & Science, India

Randy Tolentino, Hannam University, Korea Ranjan Kini, Indiana University Northwest, USA Regis Cabral, FEPRO Pite? Sweden Rosslin John Robles, University of San Agustin, Philippines Sajid Hussain, Acadia University, Canada

iv

International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

Seng W. Loke, La Trobe University, Australia SeongHan Shin, JAIST, Japan Simone Fischer-H?ner Karlstad University, Sweden Tomasz Janowski, United Nations University, Macao Tony Y. T. Chan, The University of Akureyri, Iceland Weijia Jia, City University of Hong Kong, Hong Kong Zhaohao Sun, Hebei Normal University, China

IJUNESST is indexed by:


EI Compendex Cabell OpenJ-Gate DOAJ ULRICH ProQuest EBSCO

Editorial Secretary

mailto:ijunesst@sersc.org

Ronnie D. Caytiles

International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

Foreword and Editorial


International Journal of u- and e- Service, Science and Technology
We are very happy to publish this issue of an International Journal of u- and e- Service, Science and Technology by Science and Engineering Research Support soCiety. This issue contains 7 articles. Achieving such a high quality of papers would have been impossible without the huge work that was undertaken by the Editorial Board members and External Reviewers. We take this opportunity to thank them for their great support and cooperation. In the paper Sealed-bid Auction Schemes using Threshold Cryptosystem, authors proposes a secure sealed-bid auction schemes which adopt threshold cryptosystem without a third party. In the previous proposed sealed-bid auction schemes, an auctioneer is responsible for opening bids. However, malicious auctioneers can conspire with malicious bidders by revealing all bidding prices before the bid opening stage for bidding optimal bidding price to win the auction. To prevent against this, Authors decide to eliminate auctioneer from opening phase and involve plural clerks to choose secret keys, and then clerks distribute public keys to each other. On the bid opening phase, the clerks can cooperate with each other to open the bids without an auctioneer by using Pedersens protocol and Lagrange interpolating polynomial. Hence, an auctioneer is only responsible for verifying users identification and checking whether bids are valid or not. Furthermore, for enhancing security, a hardware framework entitled Untraceable Decryptor to make all bids pass through it when the bids are transferred to clerks is utilized. The Authors of Character Recognition Using Matlabs Neural Network Toolbox focus on recognition of English alphabet in a given scanned text document with the help of Neural Networks. Using Mat labNeural Network toolbox, they tried to recognize handwritten characters by projecting them on different sized grids. The first step is image acquisition which acquires the scanned image followed by noise filtering, smoothing and normalization of scanned image, rendering image suitable for segmentation where image is decomposed into sub images. Feature Extraction improves recognition rate and misclassification. They have used character extraction and edge detection algorithm for training the neural network to classify and recognize the handwritten characters. Paper Context-aware Alert Verification for Network Security using the Extension Method based on Basic-Elements introduces the basic-elements and the extension method into the study on context-aware alert verification. This paper then proposes the use of basic-elements to realize the formal presentation of alert information and context information in a unified manner, and applies the extension method based on basic-elements for context-aware alert verification by utilizing the extension set and the extension analysis. In the paper Visualization Method of 3-D Data Field in the Higher Performance Volumetric-Swept Display System, the visualization method of 3-D data field in volumetricswept display system based on the helix rotation screen and Digital Micro-mirror Devices (DMD) is discussed. It often determines the degree to which the display is capable of

vii
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

accepting the parallel transfer of data and its potential for achieving a high voxel activation capacity. The more complexity the model, the more computing time and more pixels numbers that the generation method of helix slice may obtain on 2-D contour lines images. The superfaces algorithm that is one of the kinds of methods for simplifying polyhedral meshes is used to ensure that the images have good display shape approximation, decrease as far as possible for faces number of the model. In Learning Attitude and Its Effect on Applying Cloud Computing Service to IT Education, Computer Classrooms are always the major place where the education of information technology (IT) is executed in school. However, there exists a major problem that students were unable to practice after school with the same environment and there was no appropriate space to save their files for students, so it was not convenient for students learning attitude of computer. The service of private cloud computing was adopted in this paper to establish the education environment of IT for resolving these problems. The quasiexperimental method was applied to the study of 110 fifth grade students who were selected from Tunglo Elementary School in Miaoli County, Taiwan. The technology acceptance model was adopted as the theoretical basis of research framework in this paper. In the paper Web-Enhanced Project Management Course, Author discuss the design and development of a web-enhanced project management course, a capstone course for graduating engineering students that integrates all the basic knowledge a student has learned in project management. The development and implementation of a web enhanced course in Project Management coupled with the use of classroom multimedia instruction, active and cooperative learning aimed to facilitate the teaching-learning process compared to the traditional whiteboard instruction. The paper An Approach to Test Generation for Web Applications presents a method of test generation for Web applications based on model partition. Compared with the method of test tree for test generation, the approach ensures the effectiveness of test paths generated from the model of Web applications. The Kripke structure is first employed to model the navigation behavior of a Web application. Then the theory for model partition is proposed to solve the problem of inefficiency test paths. Next a frame of test generation based on model partition is designed to support test generation and redundancy reduction of test paths.

February, 2013

Jianhua Ma, Hosei University, Japan Byeong-ho Kang, University of Tasmania, Australia Editors of the February Issue on International Journal of u- and e- Service, Science and Technology

viii
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

Table of Contents

Sealed-bid Auction Schemes using Threshold Cryptosystem

Wei-Chen Wu, Horng-Twu Liaw and Chih-Ta Yen

Character Recognition Using Matlabs Neural Network Toolbox

13

Kauleshwar Prasad, Devvrat C. Nigam, Ashmika Lakhotiya and Dheeren Umre

Context-aware Alert Verification for Network Security using the Extension Method based on Basic-Elements 21 Hui Xu, Chunzhi Wang, Wei Liu and Xinlu Zong

Visualization Method of 3-D Data Field in the Higher Performance Volumetric-Swept Display System

31

Jian Yue, Chunlin Shen, Yuhui Zheng and Jin Wang

Learning Attitude and Its Effect on Applying Cloud Computing Service to IT

Education

39

Chen-Feng Wu

Web-Enhanced Project Management Course

49 Tomas Ucol-Ganiron Jr.

An Approach to Test Generation for Web Applications

61

Pan Liu, Huaikou Miao, Hongwei Zeng and Lizhi Cai

You might also like