T. Ahmad, Muhammad Holil, W. Wibisono, I. R. Muslim
{"title":"An improved Quad and RDE-based medical data hiding method","authors":"T. Ahmad, Muhammad Holil, W. Wibisono, I. R. Muslim","doi":"10.1109/CYBERNETICSCOM.2013.6865798","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865798","url":null,"abstract":"Difference Exapansion is one of popular reversible steganography methods which can be used for authenticating images. By using this method, the reconstructed image is exactly the same as the original one. However, the stego image generated is relatively different from the original. Based on Quad and RDE methods, we propose an algorithm which can improve the quality of the stego image, in terms of PSNR, in particular. The experimental results show that while the capacity of embedded message is slightly higher, the PSNR is significantly better.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A feasibility study as a starting point to build the ocean information system in Bangka Belitung","authors":"Irwan","doi":"10.1109/CYBERNETICSCOM.2013.6865788","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865788","url":null,"abstract":"The province of Bangka Belitung is located on strategic area which is surrounded by the ocean. This province has a BOOST center which equipped with some sensors to get the information related to the ocean. Since the time when it was built, the information that can be accessed is just the ocean tidal, and it can only access by printing the data on the paper. Because of this, this research is supposed to be the beginning to build the whole integrated ocean information system in Bangka Belitung. This research was conducted by constructing the database and the sms gateway, designing and validating, and analyzing the questionnaire. The result shows that 68% respondent says that the system is easy to use and 60% says that they are satisfied of the system. Although all issue in [6] were not included in the analyzing, the level of education of respondent has been analyzed and shown that the level of education plays important role to use the proposed system.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122131261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cybernetics paradigms framework for cyberspace: Key lens to cybersecurity","authors":"T. Vinnakota","doi":"10.1109/CYBERNETICSCOM.2013.6865787","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865787","url":null,"abstract":"There is no denial on the growing importance of cyber-security in today's ever increasing globalized world. Yet nations, enterprises and even small organizations still face difficulties with external and internal threats due to the approaches to cyber-security that are reductionist in nature. Dealing with cyber-security at the international, national and enterprise level needs approaches that works across many disciplines and are holistic. Cybernetics is one such promising approach that will aid cyber-security at all levels due to its multidisciplinary nature. But there have been no significant efforts or studies to use cybernetics for cyber-security. In this paper, we propose a generic cybernetics paradigms framework for cyberspace that will be useful to study various mechanisms of cyberspace from economics, engineering, software and social perspectives. It is argued that holistic understanding of cyberspace is the key for effective diagnosis and design of cyber-security of a nation or enterprise or small organization.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High capacity digital audio reversible watermarking","authors":"Ka-Cheng Choi, Chi-Man Pun","doi":"10.1109/CYBERNETICSCOM.2013.6865784","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865784","url":null,"abstract":"In this paper, a high capacity digital audio reversible watermarking algorithm based on generalized integer transform is proposed. The proposed algorithm is built on top of a recently proposed reversible image watermarking scheme. The main challenges to customize an image watermarking scheme to work for audio domain are the differences between the structures of image and audio, the target of the scheme based on is a two-dimensional 8-bit grayscale image and the target now is a one-dimensional 16-bit quantization audio waveform. The dimension issue can be solved by small modifications, to partition the audio waveform into two portions, so that the image watermarking scheme based on can be applied to the audio. For the proposed algorithm, satisfactory amount of data can be hidden into the audio and the stego audio is perceptible for large payload but not annoying for listening.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125426566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete belief propagation network using population coding and factor graph for kinematic control of a mobile robot","authors":"Indar Sugiarto, J. Conradt","doi":"10.1109/CYBERNETICSCOM.2013.6865797","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865797","url":null,"abstract":"This paper presents a probabilistic graphical model in the form of a factor graph to perform hierarchical probabilistic inference by computing kinematics of an omnidirectional mobile robot. We propose applying population coding principles to encode messages transmitted within the factor graph to update the network's internal belief, as inspired by neuronal information processing. We examine two inference scenarios in this paper: first for single wheel motor control using real data from an omnidirectional mobile robot; and second for the robot's velocity and orientation in real-world coordinates using simulation data. The experimental results for the first scenario show that the factor graph can learn input-output relations almost perfectly and the simulation results for the second scenario demonstrate that the selected model in the factor graph is quite robust against disturbances due to noise during inference. The results of this study can be applied in more complex intelligence tasks, which build on top of this basic kinematics system.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132058206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An agent framework in service oriented environment","authors":"Zhiqi Shen, Hian Siang. Koh","doi":"10.1109/CYBERNETICSCOM.2013.6865792","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865792","url":null,"abstract":"The multi-faceted nature of communication technologies and information management has demanded that supporting systems be highly cohesive and yet loosely coupled. It calls for the systems to be efficiently integrated, interoperable and highly adaptable to the ever-changing operating landscape. Interoperability among systems becomes difficult, though the emergence of service oriented technologies had provided some form of reprieve. In today's rapidly changing environment, applications such as healthcare applications need to be highly adaptable and versatile. Service Oriented Architecture (SOA) becomes more and more important. The goal-oriented nature of agent, coupled with highly configurable agent actions, makes it very suitable for implementing such systems. In this research, an agent framework is designed and implemented to cater for the applications of agents in service oriented environment. J2EE technology is used for its implementation so as to enable the service oriented nature of the agent. This paper first discusses several design considerations. Then the agents are developed and incorporated using the proposed agent framework.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115601041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interpretation of urine dipstick results based on color similarity using linear interpolation curve fitting","authors":"Ratna Nur, Tiara Shanty, Hari Ginardi, R. Sarno","doi":"10.1109/CYBERNETICSCOM.2013.6865777","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865777","url":null,"abstract":"Automation of urine dipstick reagent results interpretation is influenced by color space selection and the method to determine color similarity between a tested color and the target color chart. Color similarity among colors can be evaluated by calculating their Euclidean distance in a color space; however it only calculates the distances between a tested color and a series of target color in a color chart, producing a stepwise quantification. It is not suitable if a value between two target colors should be estimated, producing a smoother quantification. This research enhances the method for urine dipstick color interpretation. A stepwise linear interpolation algorithm in CIELAB color space is used. It produces smoother quantification and a possibility to verify whether the tested reagent is belong to the certain color chart or not. A formula resulted from our algorithm can be easily implemented for interpreting the score of the tested reagent. The result of this automation method is evaluated by comparing the result with a visual interpretation and color interpretation by using Euclidean distance only. The result shows a promising method in an automation process for dipstick urinalysis.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big data approach to a novel nutrition-based vegetable production and distribution system","authors":"A. Ahrary, R. D. A. Ludena","doi":"10.1109/CYBERNETICSCOM.2013.6865796","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865796","url":null,"abstract":"The advent of Big Data analytics is changing some of the current knowledge paradigms in Science as well in Industry. Even though, the term and some of the core methodologies are not new and have been around for many years, the continuous price reduction of hardware and related services (e.g, cloud computing) are making more affordable the application of such methodologies to almost any Research Area in Academic Institutions or Company Research Centers. This growing popularity is also raising concerns regarding some of its core concepts and the way Data is treated through the analysis process. It is the aim of this paper to address these concerns because big Data Methodologies will be extensively used in the new ICT Agriculture project, in order to know how to handle them, and how they could impact normal operations among the project members, or the information flow between the system parts. Creating a common background to be shared among project members and applied to the successful development and deployment of the project.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards building Indonesian viseme: A clustering-based approach","authors":"Arifin, Muljono, S. Sumpeno, M. Hariadi","doi":"10.1109/CYBERNETICSCOM.2013.6865781","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865781","url":null,"abstract":"Lips animation plays an important role in facial animation. A realistic lips animation requires synchronization of viseme (visual phoneme) with the spoken phonemes. This research aims towards building Indonesian viseme by configuring viseme classes based on the clustering process result of visual speech images data. The research used Subspace LDA, which is a combination of Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA), as the extraction feature method. The Subspace LDA method is expected to be able to produce an optimal dimension reduction. The clustering process utilized K-Means algorithms to split data into a number of clusters. The quality of clustering result is measured by using Sum of Squared Error (SSE) and a ratio of Between-Class Variation (BCV) and Within-Class Variation (WCV). From these measurements, we found that the best quality clustering occurs at k=9. The finding of this research is the Indonesian viseme consisting of 10 classes (9 classes of clustering result and one neutral class). For a future work, the result of this research can be used as a reference to the Indonesian viseme structure that is defined based on linguistic knowledge.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward accountable Internet: Multi-level accountability enhancement of HIP for ease of deployment","authors":"Alfan Presekal, K. Iida","doi":"10.1109/CYBERNETICSCOM.2013.6865785","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865785","url":null,"abstract":"Host Identity Protocol (HIP) a protocol initiated by IETF has big potency to replace existing Internet protocol. HIP has potency to solve various existing Internet problem issues such as mobility, multi-homing, interoperability of Internet, and security. Unfortunately, deployment rates of HIP still low. This work tries to propose solution to increase deployment level of HIP by providing multi-level accountability scenarios for the Internet user and incentive scenarios for HIP user. By providing multi-level accountability Internet user can choose privacy level according to their preference. Incentive scenario tries to provide more benefit for HIP user according to user accountability level by providing different contents and services.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"69 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120920687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}