2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)最新文献

筛选
英文 中文
The effectiveness of semantic web based preschool cognitive skills tutoring system: An empirical study 基于语义网的学前认知技能辅导系统有效性的实证研究
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594063
M. A. Abbas, W. Ahmad, K. Kalid
{"title":"The effectiveness of semantic web based preschool cognitive skills tutoring system: An empirical study","authors":"M. A. Abbas, W. Ahmad, K. Kalid","doi":"10.1109/ISMSC.2015.7594063","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594063","url":null,"abstract":"Two groups had participated in a study on the effectiveness of Semantic Web based mobile application for preschool cognitive skills learning. The first group had the traditional method with textbooks and teacher's teaching. The second group worked with the proposed application at school along with the classroom sessions. A quasi experimental pre and post tests model was conducted to measure the learning gain for classification and relatedness cognitive skills. The results had shown significant gain by the second group over the first one and hence support the use of the proposed application in practice. The conclusion is that proposed application can be used as teaching support along with formal school learning.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A toolkit for the simulation of scheduling policy in desktop grid environment 桌面网格环境下调度策略仿真工具包
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594034
R. Ahmad, Payam Chini Foroushan, Soodeh Peyvandi
{"title":"A toolkit for the simulation of scheduling policy in desktop grid environment","authors":"R. Ahmad, Payam Chini Foroushan, Soodeh Peyvandi","doi":"10.1109/ISMSC.2015.7594034","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594034","url":null,"abstract":"Desktop Grid (DG) systems use a combination of geographically heterogeneous distributed resources to execute jobs from science and engineering projects. Organization of the distributed resources are administrated by scheduling policies. To evaluate and prove the effectiveness of DG scheduling policy, a simulator is necessary since DG is an unpredictable and unrepeatable environment. Hence, the goal of this study is to develop a desktop grid simulator toolkit for evaluating and comparing a scheduling policy efficacy over other policies. The developed toolkit is a trace driven simulator based on discrete event simulation which is implemented by prototyping methodology. The prototype and the final system is developed using JAVA programming language united with MySQL database. Core functionalities of the simulator are job generation, volunteer generation, generation of availability information of volunteers, simulating scheduling policy, generating graphical charts and generating reports.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122211408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social capital modelling in mathematical literacy 数学素养中的社会资本模型
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594078
L. Kor
{"title":"Social capital modelling in mathematical literacy","authors":"L. Kor","doi":"10.1109/ISMSC.2015.7594078","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594078","url":null,"abstract":"This study proposed a social capital (SC) model to examine the relational bonds between SC and the mathematical literacy (ML). A random sample of 1021 15-year old secondary school students responded to the SC Questionnaire measured in Likert scales rated from 1 (strongly disagree) to 10 (strongly agreed) and answered selected released 2006 PISA items on ML. Structural Equation Modeling was employed to test the measurement model and the structural model in a two-stage approach. The factor loadings of the SC items were all above 0.6 with Goodness-of-Fit Index (GFI) = 0.934, Adjusted Goodness-of-Fit Index (AGFI) = 0.904, Comparative Fit Index (CFI) = 0.934, Normed Fit Index (NFI) = 0.903 and Root Mean Square Error Approximation (RMSEA) = 0.070. Results of hypothesis testing indicated that the Internet and home economic capital have positive and significant effect on ML. Teacher exerts a negative significant effect on the ML. This study concluded that the Internet, social economic status and teacher contribute to the development of ML. It strongly supports the inclusion of the Internet as an additional SC factor in view of the global educational excellence in this information age.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132908332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beyond cloud infrastructure services in medium size manufacturing 超越中型制造业的云基础设施服务
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594044
P. S. JosephNg, C. Kang, P. Y. Choo, S. Wong, K. Y. Phan, E. H. Lim
{"title":"Beyond cloud infrastructure services in medium size manufacturing","authors":"P. S. JosephNg, C. Kang, P. Y. Choo, S. Wong, K. Y. Phan, E. H. Lim","doi":"10.1109/ISMSC.2015.7594044","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594044","url":null,"abstract":"The hyper competitiveness of medium size enterprise is not only heavily dependent on its cloud computing infrastructure evolution but also on its adaptation for sustainability for global web interconnection ecosystems. While the bigger multinationals have experienced positive business values due to their economies of scales, the medium size enterprises still face greater challenges. We contest the view on two similar but evolved theoretical perspectives from Harvard University: Commodity of IT infrastructure and Disruptive Technology into a catalyst model for optimum technology skimming. This paper proposes the establishment of a new dynamic barebones yet optimized cloud infrastructure that will integrates the client server into the IaaS to form an extended Exostructure environment. A 3-stage primary data collection procedure used in the study has consistently validated our findings. Our result suggests that enterprise should continue to invest in optimized IT infrastructure despite the economic turbulence for competitive gearing into the future.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130467377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A cluster-based stable routing algorithm for vehicular ad hoc network 基于聚类的车辆自组网稳定路由算法
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594067
A. Mu'azu, L. Tang, H. Hasbullah, Ibrahim A. Lawal
{"title":"A cluster-based stable routing algorithm for vehicular ad hoc network","authors":"A. Mu'azu, L. Tang, H. Hasbullah, Ibrahim A. Lawal","doi":"10.1109/ISMSC.2015.7594067","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594067","url":null,"abstract":"An efficient routing with Quality of Service (QoS) guarantees for any safety traffic communication plays a vital role for the success of vehicle ad hoc networks (VANETs). Due to the connection less nature of such network, establishing stable route between connected nodes in VANETs is extremely important and challenging. This paper, proposes a new algorithm for multi-constrained QoS routing in vehicular network by adopting clustering approach. In the algorithm design, some QoS metrics are used in addition to the stability metrics for finding and establishing a stable route to destination. This is achieved by calculating the corresponding QoS provision values before selecting an optimal, reliable and stable route. NCTUns 6.0 network simulator was used for the experiment of the proposed scheme. Results show a significant improvement of the proposed approach in terms of broken links, routing overhead and end-to-end delay.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125337964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FSAL explicit two-step hybrid method for solving special second-order initial value problems 求解特殊二阶初值问题的显式两步混合方法
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594094
N. A. Yahya, M. Awang
{"title":"FSAL explicit two-step hybrid method for solving special second-order initial value problems","authors":"N. A. Yahya, M. Awang","doi":"10.1109/ISMSC.2015.7594094","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594094","url":null,"abstract":"In this paper, a new FSAL explicit two-step hybrid method for solving second-order differential equation of the form y\" = f (x, y) is proposed. The new method is constructed using the order conditions based on fifth-order of explicit two-step hybrid method developed by Franco (2006). The stability analysis is determined by the interval of periodicity and the interval of absolute stability. The numerical experiments are carried out using a wide range of problems to illustrate and support the efficiency of the suggested method. The numerical results show that the new method has smaller maximum error than the explicit two-step hybrid method of order five and order six.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129332282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors influencing information privacy concern in cloud computing environment 云计算环境下影响信息隐私关注的因素
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594059
A. Asadullah, I. O. Oyefolahan
{"title":"Factors influencing information privacy concern in cloud computing environment","authors":"A. Asadullah, I. O. Oyefolahan","doi":"10.1109/ISMSC.2015.7594059","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594059","url":null,"abstract":"Cloud computing technology is one of the newest technologies widely used by consumers globally due to its advantages. One of the common advantages is that users can get access to applications and their own files and data on demand. However, there are privacy concerns and issues which discourage users from being active in cloud computing. This paper attempts to investigate the factors that influence information privacy concern in cloud computing environment by using a quantitative research approach. A total of 340 cases were gathered from a sampled population of students. Based on SPSS analysis, the study found that perceived privacy risk is influencing information privacy concern in cloud computing environment. Meanwhile, perceived privacy control and perceived effectiveness of privacy policy have no significant impact on information privacy concern in cloud computing environment.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel evaluation model for improving trust level of infrastructure as a service 一种提高基础设施即服务信任水平的评估模型
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594046
Hamzeh Alabool, A. Mahmood
{"title":"A novel evaluation model for improving trust level of infrastructure as a service","authors":"Hamzeh Alabool, A. Mahmood","doi":"10.1109/ISMSC.2015.7594046","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594046","url":null,"abstract":"This study intends to propose an effective evaluation model for Infrastructure as a Service (IaaS) in cloud environment. The main goal of this evaluation model is to help IaaS cloud providers to identify the gaps that have not improved according to particular trust evaluation criteria. To achieve that, an integrated model is proposed combining fuzzy set theory and Important Performance Analysis (IPA) technique for evaluating IaaS cloud based trust. The results show that evaluation model can provide some guidelines and suggestions to IaaS cloud service providers on how to improve overall IaaS trust so that they can guarantee business continuity for minimizing service damage.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116581066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrating playful activities in software engineering teaching 在软件工程教学中整合有趣的活动
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594033
Iliana Mohd Ali
{"title":"Integrating playful activities in software engineering teaching","authors":"Iliana Mohd Ali","doi":"10.1109/ISMSC.2015.7594033","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594033","url":null,"abstract":"Software engineering involves the application of a systematic and disciplined approach to develop software products. Approach includes the development of methods, tools, and concepts in order to support the software development and management processes. Software engineering teaching has been focused on theoretical concepts and technical issues; communication, teamwork, and negotiation skills have been traditionally left aside. Playful activities appear as an alternative for promoting the `learning-by-doing' approach as a way to increase the absorption of concepts by the students. In this paper three playful activities are proposed and have been applied to a group of undergraduate students enrolled in the computer science programs. The feedback from the students who participated in these activities is also described.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132453252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proposed network forensic framework for analyzing IaaS cloud computing environment 提出了用于分析IaaS云计算环境的网络取证框架
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594043
Samsiah Ahmad, Nor Liza Saad, Zalikha Zulkifli, Siti Hajar Nasaruddin
{"title":"Proposed network forensic framework for analyzing IaaS cloud computing environment","authors":"Samsiah Ahmad, Nor Liza Saad, Zalikha Zulkifli, Siti Hajar Nasaruddin","doi":"10.1109/ISMSC.2015.7594043","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594043","url":null,"abstract":"Cloud computing technology offers new way in providing computing resources and applications on demand but it is explicitly prone to the cybercrime. Therefore, it is challenged forensic investigators to conduct investigation in Infrastructure as a Service (IaaS) Cloud using traditional framework. This is exacerbated with the limitations of collecting forensic data from different geographical locations and environment in IaaS Cloud. Thus, in this paper proposes a network forensic framework that can be tailored in forensic analysis in IaaS Cloud Computing environment. The proposed framework is tailored with the existing frameworks with Digital Forensic Model (DFM) in which each phase is elucidated. The proposed framework is then tested and evaluated through experimental using virtualisation environment. The results shows that the proposed framework can be pragmatic implement in IaaS Cloud which contribute in developing of a forensic tool and guidelines for forensic investigator conducting investigation IaaS Cloud as future works.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信