{"title":"The effectiveness of semantic web based preschool cognitive skills tutoring system: An empirical study","authors":"M. A. Abbas, W. Ahmad, K. Kalid","doi":"10.1109/ISMSC.2015.7594063","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594063","url":null,"abstract":"Two groups had participated in a study on the effectiveness of Semantic Web based mobile application for preschool cognitive skills learning. The first group had the traditional method with textbooks and teacher's teaching. The second group worked with the proposed application at school along with the classroom sessions. A quasi experimental pre and post tests model was conducted to measure the learning gain for classification and relatedness cognitive skills. The results had shown significant gain by the second group over the first one and hence support the use of the proposed application in practice. The conclusion is that proposed application can be used as teaching support along with formal school learning.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A toolkit for the simulation of scheduling policy in desktop grid environment","authors":"R. Ahmad, Payam Chini Foroushan, Soodeh Peyvandi","doi":"10.1109/ISMSC.2015.7594034","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594034","url":null,"abstract":"Desktop Grid (DG) systems use a combination of geographically heterogeneous distributed resources to execute jobs from science and engineering projects. Organization of the distributed resources are administrated by scheduling policies. To evaluate and prove the effectiveness of DG scheduling policy, a simulator is necessary since DG is an unpredictable and unrepeatable environment. Hence, the goal of this study is to develop a desktop grid simulator toolkit for evaluating and comparing a scheduling policy efficacy over other policies. The developed toolkit is a trace driven simulator based on discrete event simulation which is implemented by prototyping methodology. The prototype and the final system is developed using JAVA programming language united with MySQL database. Core functionalities of the simulator are job generation, volunteer generation, generation of availability information of volunteers, simulating scheduling policy, generating graphical charts and generating reports.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122211408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social capital modelling in mathematical literacy","authors":"L. Kor","doi":"10.1109/ISMSC.2015.7594078","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594078","url":null,"abstract":"This study proposed a social capital (SC) model to examine the relational bonds between SC and the mathematical literacy (ML). A random sample of 1021 15-year old secondary school students responded to the SC Questionnaire measured in Likert scales rated from 1 (strongly disagree) to 10 (strongly agreed) and answered selected released 2006 PISA items on ML. Structural Equation Modeling was employed to test the measurement model and the structural model in a two-stage approach. The factor loadings of the SC items were all above 0.6 with Goodness-of-Fit Index (GFI) = 0.934, Adjusted Goodness-of-Fit Index (AGFI) = 0.904, Comparative Fit Index (CFI) = 0.934, Normed Fit Index (NFI) = 0.903 and Root Mean Square Error Approximation (RMSEA) = 0.070. Results of hypothesis testing indicated that the Internet and home economic capital have positive and significant effect on ML. Teacher exerts a negative significant effect on the ML. This study concluded that the Internet, social economic status and teacher contribute to the development of ML. It strongly supports the inclusion of the Internet as an additional SC factor in view of the global educational excellence in this information age.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132908332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. S. JosephNg, C. Kang, P. Y. Choo, S. Wong, K. Y. Phan, E. H. Lim
{"title":"Beyond cloud infrastructure services in medium size manufacturing","authors":"P. S. JosephNg, C. Kang, P. Y. Choo, S. Wong, K. Y. Phan, E. H. Lim","doi":"10.1109/ISMSC.2015.7594044","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594044","url":null,"abstract":"The hyper competitiveness of medium size enterprise is not only heavily dependent on its cloud computing infrastructure evolution but also on its adaptation for sustainability for global web interconnection ecosystems. While the bigger multinationals have experienced positive business values due to their economies of scales, the medium size enterprises still face greater challenges. We contest the view on two similar but evolved theoretical perspectives from Harvard University: Commodity of IT infrastructure and Disruptive Technology into a catalyst model for optimum technology skimming. This paper proposes the establishment of a new dynamic barebones yet optimized cloud infrastructure that will integrates the client server into the IaaS to form an extended Exostructure environment. A 3-stage primary data collection procedure used in the study has consistently validated our findings. Our result suggests that enterprise should continue to invest in optimized IT infrastructure despite the economic turbulence for competitive gearing into the future.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130467377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Mu'azu, L. Tang, H. Hasbullah, Ibrahim A. Lawal
{"title":"A cluster-based stable routing algorithm for vehicular ad hoc network","authors":"A. Mu'azu, L. Tang, H. Hasbullah, Ibrahim A. Lawal","doi":"10.1109/ISMSC.2015.7594067","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594067","url":null,"abstract":"An efficient routing with Quality of Service (QoS) guarantees for any safety traffic communication plays a vital role for the success of vehicle ad hoc networks (VANETs). Due to the connection less nature of such network, establishing stable route between connected nodes in VANETs is extremely important and challenging. This paper, proposes a new algorithm for multi-constrained QoS routing in vehicular network by adopting clustering approach. In the algorithm design, some QoS metrics are used in addition to the stability metrics for finding and establishing a stable route to destination. This is achieved by calculating the corresponding QoS provision values before selecting an optimal, reliable and stable route. NCTUns 6.0 network simulator was used for the experiment of the proposed scheme. Results show a significant improvement of the proposed approach in terms of broken links, routing overhead and end-to-end delay.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125337964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FSAL explicit two-step hybrid method for solving special second-order initial value problems","authors":"N. A. Yahya, M. Awang","doi":"10.1109/ISMSC.2015.7594094","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594094","url":null,"abstract":"In this paper, a new FSAL explicit two-step hybrid method for solving second-order differential equation of the form y\" = f (x, y) is proposed. The new method is constructed using the order conditions based on fifth-order of explicit two-step hybrid method developed by Franco (2006). The stability analysis is determined by the interval of periodicity and the interval of absolute stability. The numerical experiments are carried out using a wide range of problems to illustrate and support the efficiency of the suggested method. The numerical results show that the new method has smaller maximum error than the explicit two-step hybrid method of order five and order six.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129332282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors influencing information privacy concern in cloud computing environment","authors":"A. Asadullah, I. O. Oyefolahan","doi":"10.1109/ISMSC.2015.7594059","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594059","url":null,"abstract":"Cloud computing technology is one of the newest technologies widely used by consumers globally due to its advantages. One of the common advantages is that users can get access to applications and their own files and data on demand. However, there are privacy concerns and issues which discourage users from being active in cloud computing. This paper attempts to investigate the factors that influence information privacy concern in cloud computing environment by using a quantitative research approach. A total of 340 cases were gathered from a sampled population of students. Based on SPSS analysis, the study found that perceived privacy risk is influencing information privacy concern in cloud computing environment. Meanwhile, perceived privacy control and perceived effectiveness of privacy policy have no significant impact on information privacy concern in cloud computing environment.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel evaluation model for improving trust level of infrastructure as a service","authors":"Hamzeh Alabool, A. Mahmood","doi":"10.1109/ISMSC.2015.7594046","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594046","url":null,"abstract":"This study intends to propose an effective evaluation model for Infrastructure as a Service (IaaS) in cloud environment. The main goal of this evaluation model is to help IaaS cloud providers to identify the gaps that have not improved according to particular trust evaluation criteria. To achieve that, an integrated model is proposed combining fuzzy set theory and Important Performance Analysis (IPA) technique for evaluating IaaS cloud based trust. The results show that evaluation model can provide some guidelines and suggestions to IaaS cloud service providers on how to improve overall IaaS trust so that they can guarantee business continuity for minimizing service damage.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116581066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating playful activities in software engineering teaching","authors":"Iliana Mohd Ali","doi":"10.1109/ISMSC.2015.7594033","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594033","url":null,"abstract":"Software engineering involves the application of a systematic and disciplined approach to develop software products. Approach includes the development of methods, tools, and concepts in order to support the software development and management processes. Software engineering teaching has been focused on theoretical concepts and technical issues; communication, teamwork, and negotiation skills have been traditionally left aside. Playful activities appear as an alternative for promoting the `learning-by-doing' approach as a way to increase the absorption of concepts by the students. In this paper three playful activities are proposed and have been applied to a group of undergraduate students enrolled in the computer science programs. The feedback from the students who participated in these activities is also described.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132453252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samsiah Ahmad, Nor Liza Saad, Zalikha Zulkifli, Siti Hajar Nasaruddin
{"title":"Proposed network forensic framework for analyzing IaaS cloud computing environment","authors":"Samsiah Ahmad, Nor Liza Saad, Zalikha Zulkifli, Siti Hajar Nasaruddin","doi":"10.1109/ISMSC.2015.7594043","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594043","url":null,"abstract":"Cloud computing technology offers new way in providing computing resources and applications on demand but it is explicitly prone to the cybercrime. Therefore, it is challenged forensic investigators to conduct investigation in Infrastructure as a Service (IaaS) Cloud using traditional framework. This is exacerbated with the limitations of collecting forensic data from different geographical locations and environment in IaaS Cloud. Thus, in this paper proposes a network forensic framework that can be tailored in forensic analysis in IaaS Cloud Computing environment. The proposed framework is tailored with the existing frameworks with Digital Forensic Model (DFM) in which each phase is elucidated. The proposed framework is then tested and evaluated through experimental using virtualisation environment. The results shows that the proposed framework can be pragmatic implement in IaaS Cloud which contribute in developing of a forensic tool and guidelines for forensic investigator conducting investigation IaaS Cloud as future works.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}