2014 IEEE Conference on Open Systems (ICOS)最新文献

筛选
英文 中文
CSCL learning approach for students' knowledge construction process in School Based Assessment (SBA) environment: An observation 校本评价环境下CSCL学习方法对学生知识建构过程的影响
2014 IEEE Conference on Open Systems (ICOS) Pub Date : 2014-02-13 DOI: 10.1109/ICOS.2014.7042644
Suhaizal Hashim, Jamalludin Harun
{"title":"CSCL learning approach for students' knowledge construction process in School Based Assessment (SBA) environment: An observation","authors":"Suhaizal Hashim, Jamalludin Harun","doi":"10.1109/ICOS.2014.7042644","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042644","url":null,"abstract":"Literature reports that educational programs tend to favor knowledge conformation rather than knowledge construction; however, Computer Supported Collaborative Learning (CSCL) is a powerful pedagogical strategy that encourages students to focus more on their knowledge construction. In this paper, we will discuss on the purpose of this study which is to observe the characteristics as the CSCL learning approach used in the Collaborative Portfolio Assessment (CPA) prototype system tend to assist students' knowledge construction during the process of learning and teaching. The CPA prototype system is an educational learning system which develops to help the teachers and students in managing School Based Assessment (SBA) in selected secondary school in Malaysia. This research was conducted in four weeks and involves 28 form one students who enrolled in History class using this CPA prototype system during their learning process. The result shows that overall mean for the characteristics from the CSCL learning approach used in the CPA prototype system has assisted students' knowledge construction during the process of teaching and learning was high. We hope that the finding of this study can assist the teacher about the advantages of CSCL approach for students' knowledge construction as an improvement in teaching methods for teachers and also to improve students' learning activities especially in SBA environment at schools.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122687984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Achieving trust in cloud computing using secure data provenance 使用安全的数据来源在云计算中实现信任
2014 IEEE Conference on Open Systems (ICOS) Pub Date : 2014-02-13 DOI: 10.1109/ICOS.2014.7042634
Mohd Izuan Mohd Saad, Kamarularifin Abd Jalil, M. Manaf
{"title":"Achieving trust in cloud computing using secure data provenance","authors":"Mohd Izuan Mohd Saad, Kamarularifin Abd Jalil, M. Manaf","doi":"10.1109/ICOS.2014.7042634","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042634","url":null,"abstract":"Cloud computing is the next generation computer system which extends network architecture into dynamic and large scale capacity by using visualization techniques. Transparent and secure data provenance will enhance the level of trust in the Cloud. Recent literature on securing data provenance focuses only on providing partial part of security elements in their mechanisms, thus they could not provide full protection to the data provenance as a whole. This paper presents the provenance description and challenges in providing security assurances in the Cloud. The paper also proposes a novel trust model for data provenance in cloud computing. The model will be used for securing the transaction process of storing and accessing the data provenance. The paper describes in detail the flow process of the model to achieve a high level of trust in cloud services. The significance of this research is to enhance the level of trust in the cloud services via comprehensive trust model which consists all aspects of security elements in the model.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130137052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Formulation of metric based software project performance monitoring model: A roadmap 基于度量的软件项目性能监控模型的制定:路线图
2014 IEEE Conference on Open Systems (ICOS) Pub Date : 2014-02-13 DOI: 10.1109/ICOS.2014.7042408
Mariayee Doraisamy, Suhaimi bin Ibrahim, M. N. Mahrin
{"title":"Formulation of metric based software project performance monitoring model: A roadmap","authors":"Mariayee Doraisamy, Suhaimi bin Ibrahim, M. N. Mahrin","doi":"10.1109/ICOS.2014.7042408","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042408","url":null,"abstract":"Successful implementation of software projects are completely depending upon successful monitoring and controlling mechanism. The ignorance of monitoring and controlling mechanism by the project managers and the team members in a software projects development, leading to inadequate decision with fruitless outcomes. One of the ways to monitor the software projects is by looking at the performance of the elements that involved in a software project development. Development of metrics for each element in a software project development will lead the software projects to complete its objectives. This paper presents on formulation of Metric based Software Project Performance Monitoring Model which consists of metrics for each software project elements. Generally, this model will be a guideline for project managers to monitor and manage software projects especially in the perspectives of the public sectors.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"504 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127596167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile game size estimation: COSMIC FSM rules, UML mapping model and Unity3D game engine 手游大小估算:COSMIC FSM规则,UML映射模型,Unity3D游戏引擎
2014 IEEE Conference on Open Systems (ICOS) Pub Date : 2014-02-13 DOI: 10.1109/ICOS.2014.7042407
N. Abdullah, Nur Ida Aniza Rusli, Mohd Faisal Ibrahim
{"title":"Mobile game size estimation: COSMIC FSM rules, UML mapping model and Unity3D game engine","authors":"N. Abdullah, Nur Ida Aniza Rusli, Mohd Faisal Ibrahim","doi":"10.1109/ICOS.2014.7042407","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042407","url":null,"abstract":"Mobile game application is a crucial feature in mobile devices. Due to the complexity and parameters like game environment, platform and context performance, it leads to the challenges to estimate accurately the size and effort of mobile game application. Furthermore, the current software effort and parametric estimation models invented before emergence of mobile application. Therefore, there is a possibility gap that existing estimation models cannot estimate accurately the development effort based on the mobile application requirements and characteristics. Hence, this paper attempts to adapt COSMIC Functional Size Measurement (COSMIC FSM) as an alternative to estimate the size of mobile game application and uses Unity3D game engine to represent the mobile game architecture as it is able to control the features and components for mobile game application development. The Unity3D component diagram is created to visualize the requirements of common mobile game and to capture the embedded functional processes. The functional processes are then analyzed and classified into different types of data movement for the further estimation according to the COSMIC FSM rules and UML mapping model. The proposed measurement suggests possibility of software measurement in estimating mobile game application based on functional size measurement method.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126291927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Implementing immersive virtual reality: Lessons learned and experience using open source game engine 实现沉浸式虚拟现实:使用开源游戏引擎的经验教训和经验
2014 IEEE Conference on Open Systems (ICOS) Pub Date : 2014-02-13 DOI: 10.1109/ICOS.2014.7042638
A. Zainudin, Azmi Bin Mohd Yusof, M. Rusli, M. Yusof, Imran Mahalil
{"title":"Implementing immersive virtual reality: Lessons learned and experience using open source game engine","authors":"A. Zainudin, Azmi Bin Mohd Yusof, M. Rusli, M. Yusof, Imran Mahalil","doi":"10.1109/ICOS.2014.7042638","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042638","url":null,"abstract":"This paper share in details the experiences gained during the development of a Virtual Reality application for a stress treatment. Throughout the twelve months development period, authors have faced numerous challenges and difficulties. Those challenges are encountered while setting up an open source game development platform called Cryengine and while integrating this engine with VR gadgets such as Kinect, audio system, Razer hydra, and Head Mount Display (HMD). This paper also discusses the solution for each of this problem. Note that a stress treatment will not be included because it is outside the scope of this paper.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125612076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PUF-based secure checker protocol for Networked RFID Systems 基于puf的网络RFID系统安全检查协议
2014 IEEE Conference on Open Systems (ICOS) Pub Date : 1900-01-01 DOI: 10.1109/ICOS.2014.7042633
B. Ray, M. Chowdhury, Jemal Abawaiy
{"title":"PUF-based secure checker protocol for Networked RFID Systems","authors":"B. Ray, M. Chowdhury, Jemal Abawaiy","doi":"10.1109/ICOS.2014.7042633","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042633","url":null,"abstract":"Radio Frequency Identification (RFID) system is an emerging technology for automating object identification. The Networked RFID System (NRS) is a component of a distributed object identification network which facilitates automated supply chain management. It also makes the Internet of Things (IoT) concept a reality. To increase the business feasibility of NRS implementation, the system should be able to ensure the visibility and traceability of the object throughout the chain using a checker protocol. By doing so, the protocol will check the genuineness of the object and the genuineness of the object's previous travel path on-site. While doing so, the protocol needs to ensure the security requirement of the system. To this end, we propose a secure checker protocol for NRS which will use a PUF (Physically Unclonable Function) and simple cryptographic primitives. The protocol provides security (protect privacy of the partners, injection of fake objects, non-repudiation, and unclonability), visibility and traceability for NRS. It is also suitable for passive tags.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信