Professional Documents
Culture Documents
International Journal of U - and e - Service, Science and Technology (IJUNESST), Vol. 6, No. 1, February, 2013
International Journal of U - and e - Service, Science and Technology (IJUNESST), Vol. 6, No. 1, February, 2013
International Journal of U - and e - Service, Science and Technology (IJUNESST), Vol. 6, No. 1, February, 2013
IJUNESST
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013
Byeong-Ho Kang,
Contact Information
Science & Engineering Research Support soCiety
Head Office: 20 Virginia Court, Sandy Bay, Tasmania, Australia Phone no.: +61-3-9016-9027
Email: ijunesst@sersc.org
Journal Aims
Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of u- and e- Service, Science and Technology.
Journal Topics
IJUNESST aims to facilitate and support research related to u- and e- Service, Science and Technology and the applications. The topics covered by IJUNESST include the following:
Basic Topics
Collaborative Business Systems Case Studies in Industry and Government B2B, B2C and C2C Architectures Adoption of Standards and Protocols for e- or u-Business Applications
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013
Compression Methodology CRM and Business Solutions Data and Knowledge Engineering e- or u-Banking e- or u-Business Systems for Multiple Platforms e- or u-Entertainment e- or u-Government e- or u-Learning e- or u-Marketing and Consumer Behavior e- or u-Negotiation and Auction Mechanisms e- or u-Payment Systems GPS Applications and Location-based Services Grid Computing for e- or u-Business Healthcare and Medical Applications Intellectual Rights Interoperability and Integration m-Business and Ubiquitous Services Mobile Services and Architectures Mobility Management in Next Generation Networks Multi-Agent Systems and Information Integration Open Source Technologies in e- or u-Business Quality of Service (QoS) and Metrics Security and Privacy Semantic Web Applications and Ontology Sharing Service-Oriented Architectures Steganography Technology Supply-chain Management
ii
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013
Systems Development and Evaluation Telematics and Middleware Platforms Trust and Privacy Issues in Social Networks User Interfaces and Usability Virtual Organizations VPN Technology and Services Web Data Visualization Web Personalization and Decision Making Web Services Web Site Monitoring and Optimization Workflow Management Systems XML and Domain Mark-up Languages Others
Advisory/Editorial Board
David Zhang, Hong Kong Polytechnic University, Hong Kong David Taniar, Monash University, Australia Chengcui Zhang, University of Alabama at Birmingham, USA Chao-Tung Yang, Tunghai University, Taiwan Chantana Chantrapornchai, Silpakorn University, Thailand Byungjoo Park, Hannam University, Korea Bok Min Goi, MMU, Malaysia Birgit Hofreiter, University of Vienna, Austria Biplab Kumer Sarker, R & D, Innovatia Inc, Canada Artur R. Lugmayr, Tampere University of Technology, Finland Apple Fok, City University of Hong Kong, Hong Kong Antonio Coronato, ICAR-CNR, Italy Aishy Amer, Concordia University, USA
iii
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013
Debnath Bhattacharyya, Heritage Inst. of Technology, India Deok Gyu Lee, ETRI, Korea Dorin Bocu, University Transilvania of Brasov, Romania Georgios Kambourakis, University of the Aegean, Greece Giovanni Cagalaban, Hannam University, Korea Hai Jin, HUST, China Hakan Duman University of Essex, UK Helmar Burkhart, University of Basel, Switzerland Hongli Luo, Indiana University - Purdue University, USA Hongxiu Li, Turku School of Economics, Finland Igor Kotenko, St. Petersburg Institute for Informatics and Automation, Russia J. H. Abawajy, Deakin University, Australia Jianhua He, University of Essex, UK Kun Chang Lee, Sungkyunkwan University, Korea Lei Ye, University of Wollongong, Australia Ling-Jyh Chen, Academia Sinica, Taiwan Liu Wanquan, Curtin University of Technology, Australia Maricel Balitanas-Salazar, University of San Agustin, Philippines Mei-Ling Shyu, University of Miami, USA Mieso Denko, University of GUELPH, Canada Poulami Das, India, India
Prashant Bansod, Shri Govindram Seksaria Institue of Technology & Science, India
Randy Tolentino, Hannam University, Korea Ranjan Kini, Indiana University Northwest, USA Regis Cabral, FEPRO Pite? Sweden Rosslin John Robles, University of San Agustin, Philippines Sajid Hussain, Acadia University, Canada
iv
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013
Seng W. Loke, La Trobe University, Australia SeongHan Shin, JAIST, Japan Simone Fischer-H?ner Karlstad University, Sweden Tomasz Janowski, United Nations University, Macao Tony Y. T. Chan, The University of Akureyri, Iceland Weijia Jia, City University of Hong Kong, Hong Kong Zhaohao Sun, Hebei Normal University, China
Editorial Secretary
mailto:ijunesst@sersc.org
Ronnie D. Caytiles
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013
vii
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013
accepting the parallel transfer of data and its potential for achieving a high voxel activation capacity. The more complexity the model, the more computing time and more pixels numbers that the generation method of helix slice may obtain on 2-D contour lines images. The superfaces algorithm that is one of the kinds of methods for simplifying polyhedral meshes is used to ensure that the images have good display shape approximation, decrease as far as possible for faces number of the model. In Learning Attitude and Its Effect on Applying Cloud Computing Service to IT Education, Computer Classrooms are always the major place where the education of information technology (IT) is executed in school. However, there exists a major problem that students were unable to practice after school with the same environment and there was no appropriate space to save their files for students, so it was not convenient for students learning attitude of computer. The service of private cloud computing was adopted in this paper to establish the education environment of IT for resolving these problems. The quasiexperimental method was applied to the study of 110 fifth grade students who were selected from Tunglo Elementary School in Miaoli County, Taiwan. The technology acceptance model was adopted as the theoretical basis of research framework in this paper. In the paper Web-Enhanced Project Management Course, Author discuss the design and development of a web-enhanced project management course, a capstone course for graduating engineering students that integrates all the basic knowledge a student has learned in project management. The development and implementation of a web enhanced course in Project Management coupled with the use of classroom multimedia instruction, active and cooperative learning aimed to facilitate the teaching-learning process compared to the traditional whiteboard instruction. The paper An Approach to Test Generation for Web Applications presents a method of test generation for Web applications based on model partition. Compared with the method of test tree for test generation, the approach ensures the effectiveness of test paths generated from the model of Web applications. The Kripke structure is first employed to model the navigation behavior of a Web application. Then the theory for model partition is proposed to solve the problem of inefficiency test paths. Next a frame of test generation based on model partition is designed to support test generation and redundancy reduction of test paths.
February, 2013
Jianhua Ma, Hosei University, Japan Byeong-ho Kang, University of Tasmania, Australia Editors of the February Issue on International Journal of u- and e- Service, Science and Technology
viii
International Journal of u- and e- Service, Science and Technology Vol. 6, No. 1, February, 2013
Table of Contents
13
Context-aware Alert Verification for Network Security using the Extension Method based on Basic-Elements 21 Hui Xu, Chunzhi Wang, Wei Liu and Xinlu Zong
Visualization Method of 3-D Data Field in the Higher Performance Volumetric-Swept Display System
31
Education
39
Chen-Feng Wu
61