The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automation of visual perception on the machine is the automation of the interpretation of the data generated by the camera sensor like humans. Some automated systems such as the robot and intelligent vehicle relies heavily on an understanding of the environment. The most fundamental understanding of the visual environment is the Machine's ability to identify categories of scenery is still a lot of...
Steganography is a science of hiding information. Steganography hides message in certain media such image, text, audio, and video. One of the media is animated GIF. Animated GIF is an image that has a simple animation. Animated GIF can hides message in its frame. Hiding message in animated GIF needs a specific method to embed the message such multibit assignment. Multibit assignment is method to embed...
Blind steganalysis is a method used to detect whether there is a hidden message in a media without having to know the steganography algorithm behind it. Digital image is converted into features using feature extraction algorithm subtractive pixel adjacency matrix. A model is built based on the resulting features using machine learning method support vector machine. The support vector machine method...
Full-Text Search combined with access control have a wide range of applications, for example in a multi-users system that allows each user to create their own content (e.g. blog or social media). Unfortunately, there are only few (if not zero) researches that combine the two. It is also not supported in DBMS or modern search engines. The implication is that one should make their own implementation...
This article discusses a new method in detecting the road by using corner adjacent features. Corner is a vertices obtained from every part of vehicle moving from one point to the other, which will be the basic for the road boundary calculation process. The adoption of Lukas Kanade and Melkman algorithm [13] proofs to improve system responsiveness towards the motion of moving object. It is proven that...
Automation of visual perception on the machine is the automation of the interpretation of the data generated by the camera sensor like humans. Some automated systems such as the robot and intelligent vehicle relies heavily on an understanding of the environment. The most fundamental understanding of the visual environment is the Machine's ability to identify categories of scenery is still a lot of...
Animated GIF images consist of a number of frames that displayed in succession as a video. Capacity of hiding messages (or payload) in an animated GIF file is much greater than in a single GIF image. A modified EzStego steganography algorithm has been proposed for GIF images. The modified EzStego is a improved version of the original EzStego so that bits of the message can be embedded randomly in...
This paper discusses a new method in detecting moving objects, which is differ from most of the methods used such as Gaussian Mixture Model, and Haar-Like approach. The focus is on utilizing corner detection and line adjacent detection features through thresholding process creating black and white images to detect the corner of each object in each frame. The process divides a frame length into 4 parts,...
Technology is a key of innovation in any aspect of this modern era. In every technology, data becomes the most important asset to be protected. Many encryption algorithms are widely available and used in information security. Encryption can provide secure information across platform. Encryption algorithms are classified into two groups: symmetric-key (also called secret-key) and asymmetric-key (also...
Current fan is not able to display room temperature and humidity. It also cannot run automatically on a specified time or room temperature. Therefore it should consider a system that can overcome these weaknesses. This research will make a room temperature control system that can detect temperature and humidity, and displays the results to the application. Systems made useful to control the fan so...
EzStego is a steganography algorithm to embed the secret message in the GIF images. The message is embedded into indices of sorted color palette of the images. EzStego is a sequential embedding type of stego-algorithm. There is no key required for embedding, so anyone that know the algorithm can extract the message. For improving security, a modified EzStego algorithm is proposed. Bits of the message...
The purpose of this paper is to describe a new approach in road detection. This research uses two detection processes approaches: RGB histogram Filterization and Boundary Classifer, which is different from previous works on road detection. RGB Histogram Filterization processes the reading from the camera in greyscale form and afterward processes them by color segmentation. The last step for this process...
This paper discussed the use of fuzzy inference system in children's skin disease diagnose application. The selected diseases to be diagnosed by the application are measles, German measles and chicken pox. These diseases were selected due to their similarities in pattern of infection and symptoms such as rash and fever. The built fuzzy inference system has input variables that represent the symptoms...
Searching process performance is very important in this modern world that consists of various advanced technology. String matching algorithm is one of the most commonly applied algorithms for searching. String that contains sequences of character is the simplest representation of any complex data in our real life, such as search engine database, finger print minutiae, or DNA sequence. The current...
Energy sustainability is one of the world focuses today. We have built our solution which is called IntelligEnSia (Intelligent Home for Energy Sustainability) that is focused on the prediction analytic using Web and Android technology platforms. In this case, to predict the energy consumption we applied three regression models: simple linear regression, KLM a and KLM b. All models can be applied to...
In this paper, a fragile watermarking method based on chaos map for image authentication is proposed. The watermark is a binary logo of the same size with the host image. Before embedding, the watermark is encrypted by XOR-ing it with a chaotic image. The chaotic image is generated by using Logistic Map. Next, the least significant bits (LSB) of pixels is used for embedding where the LSB's of the...
An interesting of hybrid rotational and revolving simulation of aircraft propellers around a fixed point can be accomplished by the modified version of the shifting centroid method in IFS fractal animation model called the shifting centroid method in double mode. To animate a complex object such as an aircraft with two propellers in fractal model, a simple multi-object of fractal can be used instead...
It is possible to animate each event of two different fractal objects that depend on the event of another fractal object as parts of a single multi-object of fractal. From the multi-object point of view, both the individual events are looked like as a single simultaneous event such as in the rotational simulation of two rotated jet propellers in the double jet engines of aircraft around each local...
Images can be encrypted in spatial domain, frequency domain, or both. Most of the image encryption algorithms operate in spatial domain. Encryption in frequency domain has an advantage of being resistante to many image processing operations. This paper presents an image encryption algorithm in frequency domain using a chaotic permutation. Because of the images represented in JPEG format, then to increase...
Surveillance radar network is the network of some radar station to monitor and keep watch ship/vessel traffic. The communication of these station used tcp/ip over internet and local area network. The security system is an important part that can not be ignored for network communication. This paper proposed a prototype of security system for surveillance radar network, which is handling the security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.