2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)最新文献

筛选
英文 中文
An improved Quad and RDE-based medical data hiding method 改进的基于Quad和rde的医疗数据隐藏方法
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865798
T. Ahmad, Muhammad Holil, W. Wibisono, I. R. Muslim
{"title":"An improved Quad and RDE-based medical data hiding method","authors":"T. Ahmad, Muhammad Holil, W. Wibisono, I. R. Muslim","doi":"10.1109/CYBERNETICSCOM.2013.6865798","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865798","url":null,"abstract":"Difference Exapansion is one of popular reversible steganography methods which can be used for authenticating images. By using this method, the reconstructed image is exactly the same as the original one. However, the stego image generated is relatively different from the original. Based on Quad and RDE methods, we propose an algorithm which can improve the quality of the stego image, in terms of PSNR, in particular. The experimental results show that while the capacity of embedded message is slightly higher, the PSNR is significantly better.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A feasibility study as a starting point to build the ocean information system in Bangka Belitung 以邦加勿里洞海洋信息系统建设为起点的可行性研究
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865788
Irwan
{"title":"A feasibility study as a starting point to build the ocean information system in Bangka Belitung","authors":"Irwan","doi":"10.1109/CYBERNETICSCOM.2013.6865788","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865788","url":null,"abstract":"The province of Bangka Belitung is located on strategic area which is surrounded by the ocean. This province has a BOOST center which equipped with some sensors to get the information related to the ocean. Since the time when it was built, the information that can be accessed is just the ocean tidal, and it can only access by printing the data on the paper. Because of this, this research is supposed to be the beginning to build the whole integrated ocean information system in Bangka Belitung. This research was conducted by constructing the database and the sms gateway, designing and validating, and analyzing the questionnaire. The result shows that 68% respondent says that the system is easy to use and 60% says that they are satisfied of the system. Although all issue in [6] were not included in the analyzing, the level of education of respondent has been analyzed and shown that the level of education plays important role to use the proposed system.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122131261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cybernetics paradigms framework for cyberspace: Key lens to cybersecurity 网络空间的控制论范式框架:网络安全的关键镜头
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865787
T. Vinnakota
{"title":"A cybernetics paradigms framework for cyberspace: Key lens to cybersecurity","authors":"T. Vinnakota","doi":"10.1109/CYBERNETICSCOM.2013.6865787","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865787","url":null,"abstract":"There is no denial on the growing importance of cyber-security in today's ever increasing globalized world. Yet nations, enterprises and even small organizations still face difficulties with external and internal threats due to the approaches to cyber-security that are reductionist in nature. Dealing with cyber-security at the international, national and enterprise level needs approaches that works across many disciplines and are holistic. Cybernetics is one such promising approach that will aid cyber-security at all levels due to its multidisciplinary nature. But there have been no significant efforts or studies to use cybernetics for cyber-security. In this paper, we propose a generic cybernetics paradigms framework for cyberspace that will be useful to study various mechanisms of cyberspace from economics, engineering, software and social perspectives. It is argued that holistic understanding of cyberspace is the key for effective diagnosis and design of cyber-security of a nation or enterprise or small organization.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
High capacity digital audio reversible watermarking 高容量数字音频可逆水印
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865784
Ka-Cheng Choi, Chi-Man Pun
{"title":"High capacity digital audio reversible watermarking","authors":"Ka-Cheng Choi, Chi-Man Pun","doi":"10.1109/CYBERNETICSCOM.2013.6865784","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865784","url":null,"abstract":"In this paper, a high capacity digital audio reversible watermarking algorithm based on generalized integer transform is proposed. The proposed algorithm is built on top of a recently proposed reversible image watermarking scheme. The main challenges to customize an image watermarking scheme to work for audio domain are the differences between the structures of image and audio, the target of the scheme based on is a two-dimensional 8-bit grayscale image and the target now is a one-dimensional 16-bit quantization audio waveform. The dimension issue can be solved by small modifications, to partition the audio waveform into two portions, so that the image watermarking scheme based on can be applied to the audio. For the proposed algorithm, satisfactory amount of data can be hidden into the audio and the stego audio is perceptible for large payload but not annoying for listening.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125426566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Discrete belief propagation network using population coding and factor graph for kinematic control of a mobile robot 基于种群编码和因子图的离散信念传播网络用于移动机器人的运动控制
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865797
Indar Sugiarto, J. Conradt
{"title":"Discrete belief propagation network using population coding and factor graph for kinematic control of a mobile robot","authors":"Indar Sugiarto, J. Conradt","doi":"10.1109/CYBERNETICSCOM.2013.6865797","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865797","url":null,"abstract":"This paper presents a probabilistic graphical model in the form of a factor graph to perform hierarchical probabilistic inference by computing kinematics of an omnidirectional mobile robot. We propose applying population coding principles to encode messages transmitted within the factor graph to update the network's internal belief, as inspired by neuronal information processing. We examine two inference scenarios in this paper: first for single wheel motor control using real data from an omnidirectional mobile robot; and second for the robot's velocity and orientation in real-world coordinates using simulation data. The experimental results for the first scenario show that the factor graph can learn input-output relations almost perfectly and the simulation results for the second scenario demonstrate that the selected model in the factor graph is quite robust against disturbances due to noise during inference. The results of this study can be applied in more complex intelligence tasks, which build on top of this basic kinematics system.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132058206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An agent framework in service oriented environment 面向服务环境中的代理框架
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865792
Zhiqi Shen, Hian Siang. Koh
{"title":"An agent framework in service oriented environment","authors":"Zhiqi Shen, Hian Siang. Koh","doi":"10.1109/CYBERNETICSCOM.2013.6865792","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865792","url":null,"abstract":"The multi-faceted nature of communication technologies and information management has demanded that supporting systems be highly cohesive and yet loosely coupled. It calls for the systems to be efficiently integrated, interoperable and highly adaptable to the ever-changing operating landscape. Interoperability among systems becomes difficult, though the emergence of service oriented technologies had provided some form of reprieve. In today's rapidly changing environment, applications such as healthcare applications need to be highly adaptable and versatile. Service Oriented Architecture (SOA) becomes more and more important. The goal-oriented nature of agent, coupled with highly configurable agent actions, makes it very suitable for implementing such systems. In this research, an agent framework is designed and implemented to cater for the applications of agents in service oriented environment. J2EE technology is used for its implementation so as to enable the service oriented nature of the agent. This paper first discusses several design considerations. Then the agents are developed and incorporated using the proposed agent framework.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115601041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interpretation of urine dipstick results based on color similarity using linear interpolation curve fitting 基于颜色相似性的尿量尺结果的线性插值曲线拟合解释
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865777
Ratna Nur, Tiara Shanty, Hari Ginardi, R. Sarno
{"title":"Interpretation of urine dipstick results based on color similarity using linear interpolation curve fitting","authors":"Ratna Nur, Tiara Shanty, Hari Ginardi, R. Sarno","doi":"10.1109/CYBERNETICSCOM.2013.6865777","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865777","url":null,"abstract":"Automation of urine dipstick reagent results interpretation is influenced by color space selection and the method to determine color similarity between a tested color and the target color chart. Color similarity among colors can be evaluated by calculating their Euclidean distance in a color space; however it only calculates the distances between a tested color and a series of target color in a color chart, producing a stepwise quantification. It is not suitable if a value between two target colors should be estimated, producing a smoother quantification. This research enhances the method for urine dipstick color interpretation. A stepwise linear interpolation algorithm in CIELAB color space is used. It produces smoother quantification and a possibility to verify whether the tested reagent is belong to the certain color chart or not. A formula resulted from our algorithm can be easily implemented for interpreting the score of the tested reagent. The result of this automation method is evaluated by comparing the result with a visual interpretation and color interpretation by using Euclidean distance only. The result shows a promising method in an automation process for dipstick urinalysis.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Big data approach to a novel nutrition-based vegetable production and distribution system 基于大数据的新型营养蔬菜生产和配送系统
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865796
A. Ahrary, R. D. A. Ludena
{"title":"Big data approach to a novel nutrition-based vegetable production and distribution system","authors":"A. Ahrary, R. D. A. Ludena","doi":"10.1109/CYBERNETICSCOM.2013.6865796","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865796","url":null,"abstract":"The advent of Big Data analytics is changing some of the current knowledge paradigms in Science as well in Industry. Even though, the term and some of the core methodologies are not new and have been around for many years, the continuous price reduction of hardware and related services (e.g, cloud computing) are making more affordable the application of such methodologies to almost any Research Area in Academic Institutions or Company Research Centers. This growing popularity is also raising concerns regarding some of its core concepts and the way Data is treated through the analysis process. It is the aim of this paper to address these concerns because big Data Methodologies will be extensively used in the new ICT Agriculture project, in order to know how to handle them, and how they could impact normal operations among the project members, or the information flow between the system parts. Creating a common background to be shared among project members and applied to the successful development and deployment of the project.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards building Indonesian viseme: A clustering-based approach 构建印尼viseme:基于聚类的方法
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865781
Arifin, Muljono, S. Sumpeno, M. Hariadi
{"title":"Towards building Indonesian viseme: A clustering-based approach","authors":"Arifin, Muljono, S. Sumpeno, M. Hariadi","doi":"10.1109/CYBERNETICSCOM.2013.6865781","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865781","url":null,"abstract":"Lips animation plays an important role in facial animation. A realistic lips animation requires synchronization of viseme (visual phoneme) with the spoken phonemes. This research aims towards building Indonesian viseme by configuring viseme classes based on the clustering process result of visual speech images data. The research used Subspace LDA, which is a combination of Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA), as the extraction feature method. The Subspace LDA method is expected to be able to produce an optimal dimension reduction. The clustering process utilized K-Means algorithms to split data into a number of clusters. The quality of clustering result is measured by using Sum of Squared Error (SSE) and a ratio of Between-Class Variation (BCV) and Within-Class Variation (WCV). From these measurements, we found that the best quality clustering occurs at k=9. The finding of this research is the Indonesian viseme consisting of 10 classes (9 classes of clustering result and one neutral class). For a future work, the result of this research can be used as a reference to the Indonesian viseme structure that is defined based on linguistic knowledge.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Toward accountable Internet: Multi-level accountability enhancement of HIP for ease of deployment 迈向可问责的互联网:为了便于部署,HIP的多级问责性增强
2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) Pub Date : 2013-12-01 DOI: 10.1109/CYBERNETICSCOM.2013.6865785
Alfan Presekal, K. Iida
{"title":"Toward accountable Internet: Multi-level accountability enhancement of HIP for ease of deployment","authors":"Alfan Presekal, K. Iida","doi":"10.1109/CYBERNETICSCOM.2013.6865785","DOIUrl":"https://doi.org/10.1109/CYBERNETICSCOM.2013.6865785","url":null,"abstract":"Host Identity Protocol (HIP) a protocol initiated by IETF has big potency to replace existing Internet protocol. HIP has potency to solve various existing Internet problem issues such as mobility, multi-homing, interoperability of Internet, and security. Unfortunately, deployment rates of HIP still low. This work tries to propose solution to increase deployment level of HIP by providing multi-level accountability scenarios for the Internet user and incentive scenarios for HIP user. By providing multi-level accountability Internet user can choose privacy level according to their preference. Incentive scenario tries to provide more benefit for HIP user according to user accountability level by providing different contents and services.","PeriodicalId":351051,"journal":{"name":"2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","volume":"69 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120920687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信