International Journal of u- and e- Service, Science and Technology (IJUNESST), Vol. 6, No. 1, February, 2013

Published on August 2016 | Categories: Topics, Books - Fiction | Downloads: 70 | Comments: 0 | Views: 423
of 10
Download PDF   Embed   Report

IJUNESST aims to facilitate and support research related to u- and e- Service, Science and Technology and the applications.

Comments

Content

ISSN 2005-4246

IJUNESST
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

SCIENCE & ENGINEERING RESEARCH SUPPORT SOCIETY
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

Editor-in-Chief of the IJUNESST Journal
Jianhua Ma,

Hosei University, Japan

Byeong-Ho Kang,

University of Tasmania, Australia

General Information of IJUNESST
Bibliographic Information

 

 

ISSN: 2005-4246 Publisher: SERSC

 

Science & Engineering Research Support soCiety 

Contact Information
Science & Engineering Research Support soCiety

 

  

Head Office: 20 Virginia Court, Sandy Bay, Tasmania, Australia Phone no.: +61-3-9016-9027





Email: [email protected]



Journal Aims
Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of u- and e- Service, Science and Technology.

Journal Topics
IJUNESST aims to facilitate and support research related to u- and e- Service, Science and Technology and the applications. The topics covered by IJUNESST include the following:

Basic Topics
       Collaborative Business Systems  Case Studies in Industry and Government  B2B, B2C and C2C Architectures  Adoption of Standards and Protocols for e- or u-Business Applications 

i

International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

                                                    

Compression Methodology  CRM and Business Solutions  Data and Knowledge Engineering  e- or u-Banking  e- or u-Business Systems for Multiple Platforms  e- or u-Entertainment  e- or u-Government  e- or u-Learning  e- or u-Marketing and Consumer Behavior  e- or u-Negotiation and Auction Mechanisms  e- or u-Payment Systems  GPS Applications and Location-based Services  Grid Computing for e- or u-Business  Healthcare and Medical Applications  Intellectual Rights  Interoperability and Integration  m-Business and Ubiquitous Services  Mobile Services and Architectures  Mobility Management in Next Generation Networks  Multi-Agent Systems and Information Integration  Open Source Technologies in e- or u-Business  Quality of Service (QoS) and Metrics  Security and Privacy  Semantic Web Applications and Ontology Sharing  Service-Oriented Architectures  Steganography Technology  Supply-chain Management 

ii

International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

                        

Systems Development and Evaluation  Telematics and Middleware Platforms  Trust and Privacy Issues in Social Networks  User Interfaces and Usability  Virtual Organizations  VPN Technology and Services  Web Data Visualization  Web Personalization and Decision Making  Web Services  Web Site Monitoring and Optimization  Workflow Management Systems  XML and Domain Mark-up Languages  Others 

Advisory/Editorial Board
                         David Zhang, Hong Kong Polytechnic University, Hong Kong  David Taniar, Monash University, Australia  Chengcui Zhang, University of Alabama at Birmingham, USA  Chao-Tung Yang, Tunghai University, Taiwan  Chantana Chantrapornchai, Silpakorn University, Thailand  Byungjoo Park, Hannam University, Korea  Bok Min Goi, MMU, Malaysia  Birgit Hofreiter, University of Vienna, Austria  Biplab Kumer Sarker, R & D, Innovatia Inc, Canada  Artur R. Lugmayr, Tampere University of Technology, Finland  Apple Fok, City University of Hong Kong, Hong Kong  Antonio Coronato, ICAR-CNR, Italy  Aishy Amer, Concordia University, USA 

iii

International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

                                         
 

Debnath Bhattacharyya, Heritage Inst. of Technology, India  Deok Gyu Lee, ETRI, Korea  Dorin Bocu, University Transilvania of Brasov, Romania  Georgios Kambourakis, University of the Aegean, Greece  Giovanni Cagalaban, Hannam University, Korea  Hai Jin, HUST, China  Hakan Duman University of Essex, UK  Helmar Burkhart, University of Basel, Switzerland  Hongli Luo, Indiana University - Purdue University, USA  Hongxiu Li, Turku School of Economics, Finland  Igor Kotenko, St. Petersburg Institute for Informatics and Automation, Russia  J. H. Abawajy, Deakin University, Australia  Jianhua He, University of Essex, UK  Kun Chang Lee, Sungkyunkwan University, Korea  Lei Ye, University of Wollongong, Australia  Ling-Jyh Chen, Academia Sinica, Taiwan  Liu Wanquan, Curtin University of Technology, Australia  Maricel Balitanas-Salazar, University of San Agustin, Philippines  Mei-Ling Shyu, University of Miami, USA  Mieso Denko, University of GUELPH, Canada  Poulami Das, India, India 
Prashant Bansod, Shri Govindram Seksaria Institue of Technology & Science, India 

        

Randy Tolentino, Hannam University, Korea  Ranjan Kini, Indiana University Northwest, USA  Regis Cabral, FEPRO Pite? Sweden  Rosslin John Robles, University of San Agustin, Philippines  Sajid Hussain, Acadia University, Canada 

iv

International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

            

Seng W. Loke, La Trobe University, Australia  SeongHan Shin, JAIST, Japan  Simone Fischer-H?ner Karlstad University, Sweden  Tomasz Janowski, United Nations University, Macao  Tony Y. T. Chan, The University of Akureyri, Iceland  Weijia Jia, City University of Hong Kong, Hong Kong  Zhaohao Sun, Hebei Normal University, China 

IJUNESST is indexed by:
             EI Compendex  Cabell  OpenJ-Gate  DOAJ  ULRICH  ProQuest  EBSCO 

Editorial Secretary

mailto:[email protected]



Ronnie D. Caytiles

International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

Foreword and Editorial
International Journal of u- and e- Service, Science and Technology
We are very happy to publish this issue of an International Journal of u- and e- Service, Science and Technology by Science and Engineering Research Support soCiety. This issue contains 7 articles. Achieving such a high quality of papers would have been impossible without the huge work that was undertaken by the Editorial Board members and External Reviewers. We take this opportunity to thank them for their great support and cooperation. In the paper “Sealed-bid Auction Schemes using Threshold Cryptosystem”, authors proposes a secure sealed-bid auction schemes which adopt threshold cryptosystem without a third party. In the previous proposed sealed-bid auction schemes, an auctioneer is responsible for opening bids. However, malicious auctioneers can conspire with malicious bidders by revealing all bidding prices before the bid opening stage for bidding optimal bidding price to win the auction. To prevent against this, Authors decide to eliminate auctioneer from opening phase and involve plural clerks to choose secret keys, and then clerks distribute public keys to each other. On the bid opening phase, the clerks can cooperate with each other to open the bids without an auctioneer by using Pedersen’s protocol and Lagrange interpolating polynomial. Hence, an auctioneer is only responsible for verifying user’s identification and checking whether bids are valid or not. Furthermore, for enhancing security, a hardware framework entitled “Untraceable Decryptor” to make all bids pass through it when the bids are transferred to clerks is utilized. The Authors of “Character Recognition Using Matlab’s Neural Network Toolbox” focus on recognition of English alphabet in a given scanned text document with the help of Neural Networks. Using Mat labNeural Network toolbox, they tried to recognize handwritten characters by projecting them on different sized grids. The first step is image acquisition which acquires the scanned image followed by noise filtering, smoothing and normalization of scanned image, rendering image suitable for segmentation where image is decomposed into sub images. Feature Extraction improves recognition rate and misclassification. They have used character extraction and edge detection algorithm for training the neural network to classify and recognize the handwritten characters. Paper “Context-aware Alert Verification for Network Security using the Extension Method based on Basic-Elements” introduces the basic-elements and the extension method into the study on context-aware alert verification. This paper then proposes the use of basic-elements to realize the formal presentation of alert information and context information in a unified manner, and applies the extension method based on basic-elements for context-aware alert verification by utilizing the extension set and the extension analysis. In the paper “Visualization Method of 3-D Data Field in the Higher Performance Volumetric-Swept Display System”, the visualization method of 3-D data field in volumetricswept display system based on the helix rotation screen and Digital Micro-mirror Devices (DMD) is discussed. It often determines the degree to which the display is capable of

vii
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

accepting the parallel transfer of data and its potential for achieving a high voxel activation capacity. The more complexity the model, the more computing time and more pixels numbers that the generation method of helix slice may obtain on 2-D contour lines images. The superfaces algorithm that is one of the kinds of methods for simplifying polyhedral meshes is used to ensure that the images have good display shape approximation, decrease as far as possible for faces number of the model. In “Learning Attitude and Its Effect on Applying Cloud Computing Service to IT Education”, Computer Classrooms are always the major place where the education of information technology (IT) is executed in school. However, there exists a major problem that students were unable to practice after school with the same environment and there was no appropriate space to save their files for students, so it was not convenient for students’ learning attitude of computer. The service of private cloud computing was adopted in this paper to establish the education environment of IT for resolving these problems. The quasiexperimental method was applied to the study of 110 fifth grade students who were selected from Tunglo Elementary School in Miaoli County, Taiwan. The technology acceptance model was adopted as the theoretical basis of research framework in this paper. In the paper “Web-Enhanced Project Management Course”, Author discuss the design and development of a web-enhanced project management course, a capstone course for graduating engineering students that integrates all the basic knowledge a student has learned in project management. The development and implementation of a web enhanced course in Project Management coupled with the use of classroom multimedia instruction, active and cooperative learning aimed to facilitate the teaching-learning process compared to the traditional whiteboard instruction. The paper “An Approach to Test Generation for Web Applications” presents a method of test generation for Web applications based on model partition. Compared with the method of test tree for test generation, the approach ensures the effectiveness of test paths generated from the model of Web applications. The Kripke structure is first employed to model the navigation behavior of a Web application. Then the theory for model partition is proposed to solve the problem of inefficiency test paths. Next a frame of test generation based on model partition is designed to support test generation and redundancy reduction of test paths.

February, 2013

Jianhua Ma, Hosei University, Japan Byeong-ho Kang, University of Tasmania, Australia Editors of the February Issue on International Journal of u- and e- Service, Science and Technology

viii
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013

Table of Contents

Sealed-bid Auction Schemes using Threshold Cryptosystem

1

Wei-Chen Wu, Horng-Twu Liaw and Chih-Ta Yen

Character Recognition Using Matlab’s Neural Network Toolbox

13

Kauleshwar Prasad, Devvrat C. Nigam, Ashmika Lakhotiya and Dheeren Umre

Context-aware Alert Verification for Network Security using the Extension Method based on Basic-Elements 21 Hui Xu, Chunzhi Wang, Wei Liu and Xinlu Zong

Visualization Method of 3-D Data Field in the Higher Performance Volumetric-Swept Display System

31

Jian Yue, Chunlin Shen, Yuhui Zheng and Jin Wang

Learning Attitude and Its Effect on Applying Cloud Computing Service to IT

Education

39

Chen-Feng Wu

Web-Enhanced Project Management Course

49 Tomas Ucol-Ganiron Jr.

An Approach to Test Generation for Web Applications

61

Pan Liu, Huaikou Miao, Hongwei Zeng and Lizhi Cai

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close