{"title":"CSCL learning approach for students' knowledge construction process in School Based Assessment (SBA) environment: An observation","authors":"Suhaizal Hashim, Jamalludin Harun","doi":"10.1109/ICOS.2014.7042644","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042644","url":null,"abstract":"Literature reports that educational programs tend to favor knowledge conformation rather than knowledge construction; however, Computer Supported Collaborative Learning (CSCL) is a powerful pedagogical strategy that encourages students to focus more on their knowledge construction. In this paper, we will discuss on the purpose of this study which is to observe the characteristics as the CSCL learning approach used in the Collaborative Portfolio Assessment (CPA) prototype system tend to assist students' knowledge construction during the process of learning and teaching. The CPA prototype system is an educational learning system which develops to help the teachers and students in managing School Based Assessment (SBA) in selected secondary school in Malaysia. This research was conducted in four weeks and involves 28 form one students who enrolled in History class using this CPA prototype system during their learning process. The result shows that overall mean for the characteristics from the CSCL learning approach used in the CPA prototype system has assisted students' knowledge construction during the process of teaching and learning was high. We hope that the finding of this study can assist the teacher about the advantages of CSCL approach for students' knowledge construction as an improvement in teaching methods for teachers and also to improve students' learning activities especially in SBA environment at schools.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122687984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohd Izuan Mohd Saad, Kamarularifin Abd Jalil, M. Manaf
{"title":"Achieving trust in cloud computing using secure data provenance","authors":"Mohd Izuan Mohd Saad, Kamarularifin Abd Jalil, M. Manaf","doi":"10.1109/ICOS.2014.7042634","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042634","url":null,"abstract":"Cloud computing is the next generation computer system which extends network architecture into dynamic and large scale capacity by using visualization techniques. Transparent and secure data provenance will enhance the level of trust in the Cloud. Recent literature on securing data provenance focuses only on providing partial part of security elements in their mechanisms, thus they could not provide full protection to the data provenance as a whole. This paper presents the provenance description and challenges in providing security assurances in the Cloud. The paper also proposes a novel trust model for data provenance in cloud computing. The model will be used for securing the transaction process of storing and accessing the data provenance. The paper describes in detail the flow process of the model to achieve a high level of trust in cloud services. The significance of this research is to enhance the level of trust in the cloud services via comprehensive trust model which consists all aspects of security elements in the model.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130137052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mariayee Doraisamy, Suhaimi bin Ibrahim, M. N. Mahrin
{"title":"Formulation of metric based software project performance monitoring model: A roadmap","authors":"Mariayee Doraisamy, Suhaimi bin Ibrahim, M. N. Mahrin","doi":"10.1109/ICOS.2014.7042408","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042408","url":null,"abstract":"Successful implementation of software projects are completely depending upon successful monitoring and controlling mechanism. The ignorance of monitoring and controlling mechanism by the project managers and the team members in a software projects development, leading to inadequate decision with fruitless outcomes. One of the ways to monitor the software projects is by looking at the performance of the elements that involved in a software project development. Development of metrics for each element in a software project development will lead the software projects to complete its objectives. This paper presents on formulation of Metric based Software Project Performance Monitoring Model which consists of metrics for each software project elements. Generally, this model will be a guideline for project managers to monitor and manage software projects especially in the perspectives of the public sectors.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"504 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127596167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Abdullah, Nur Ida Aniza Rusli, Mohd Faisal Ibrahim
{"title":"Mobile game size estimation: COSMIC FSM rules, UML mapping model and Unity3D game engine","authors":"N. Abdullah, Nur Ida Aniza Rusli, Mohd Faisal Ibrahim","doi":"10.1109/ICOS.2014.7042407","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042407","url":null,"abstract":"Mobile game application is a crucial feature in mobile devices. Due to the complexity and parameters like game environment, platform and context performance, it leads to the challenges to estimate accurately the size and effort of mobile game application. Furthermore, the current software effort and parametric estimation models invented before emergence of mobile application. Therefore, there is a possibility gap that existing estimation models cannot estimate accurately the development effort based on the mobile application requirements and characteristics. Hence, this paper attempts to adapt COSMIC Functional Size Measurement (COSMIC FSM) as an alternative to estimate the size of mobile game application and uses Unity3D game engine to represent the mobile game architecture as it is able to control the features and components for mobile game application development. The Unity3D component diagram is created to visualize the requirements of common mobile game and to capture the embedded functional processes. The functional processes are then analyzed and classified into different types of data movement for the further estimation according to the COSMIC FSM rules and UML mapping model. The proposed measurement suggests possibility of software measurement in estimating mobile game application based on functional size measurement method.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126291927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Zainudin, Azmi Bin Mohd Yusof, M. Rusli, M. Yusof, Imran Mahalil
{"title":"Implementing immersive virtual reality: Lessons learned and experience using open source game engine","authors":"A. Zainudin, Azmi Bin Mohd Yusof, M. Rusli, M. Yusof, Imran Mahalil","doi":"10.1109/ICOS.2014.7042638","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042638","url":null,"abstract":"This paper share in details the experiences gained during the development of a Virtual Reality application for a stress treatment. Throughout the twelve months development period, authors have faced numerous challenges and difficulties. Those challenges are encountered while setting up an open source game development platform called Cryengine and while integrating this engine with VR gadgets such as Kinect, audio system, Razer hydra, and Head Mount Display (HMD). This paper also discusses the solution for each of this problem. Note that a stress treatment will not be included because it is outside the scope of this paper.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125612076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PUF-based secure checker protocol for Networked RFID Systems","authors":"B. Ray, M. Chowdhury, Jemal Abawaiy","doi":"10.1109/ICOS.2014.7042633","DOIUrl":"https://doi.org/10.1109/ICOS.2014.7042633","url":null,"abstract":"Radio Frequency Identification (RFID) system is an emerging technology for automating object identification. The Networked RFID System (NRS) is a component of a distributed object identification network which facilitates automated supply chain management. It also makes the Internet of Things (IoT) concept a reality. To increase the business feasibility of NRS implementation, the system should be able to ensure the visibility and traceability of the object throughout the chain using a checker protocol. By doing so, the protocol will check the genuineness of the object and the genuineness of the object's previous travel path on-site. While doing so, the protocol needs to ensure the security requirement of the system. To this end, we propose a secure checker protocol for NRS which will use a PUF (Physically Unclonable Function) and simple cryptographic primitives. The protocol provides security (protect privacy of the partners, injection of fake objects, non-repudiation, and unclonability), visibility and traceability for NRS. It is also suitable for passive tags.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}