Pub Date : 2016-10-01DOI: 10.1109/ICSITECH.2016.7852648
Youdong Yun, Chanhee Lee, Heuiseok Lim
Due to increased life expectancy and decreased fertility rate, the proportion of elderly population has risen in developed and industrialized countries. This increase in aging population has drawn global interest to aging issues. However, despite active research on this issue, the following problems remain. Firstly, research on ways to familiarize senior citizens with smart devices is lacking. Secondly, research on consumption of digital contents among senior citizens using smart devices is also lacking. For senior citizens to utilize and get the best of smart devices and digital contents, focus must be placed on usability and their familiarity with smart devices. In this paper, we propose a cognitive reaction-based intelligent UI/UX system that provides UI/UX optimized for senior citizens based on the user's cognitive functionality and activity log. With this work, we expect improvements in the usability of smart devices among senior citizens and in their life quality, by personalizing content and experience for the user. Furthermore, improvement in social perception by the general population can also be anticipated, thanks to familiarity with smart devices provided by this system.
{"title":"Designing an intelligent UI/UX system based on the cognitive response for smart senior","authors":"Youdong Yun, Chanhee Lee, Heuiseok Lim","doi":"10.1109/ICSITECH.2016.7852648","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852648","url":null,"abstract":"Due to increased life expectancy and decreased fertility rate, the proportion of elderly population has risen in developed and industrialized countries. This increase in aging population has drawn global interest to aging issues. However, despite active research on this issue, the following problems remain. Firstly, research on ways to familiarize senior citizens with smart devices is lacking. Secondly, research on consumption of digital contents among senior citizens using smart devices is also lacking. For senior citizens to utilize and get the best of smart devices and digital contents, focus must be placed on usability and their familiarity with smart devices. In this paper, we propose a cognitive reaction-based intelligent UI/UX system that provides UI/UX optimized for senior citizens based on the user's cognitive functionality and activity log. With this work, we expect improvements in the usability of smart devices among senior citizens and in their life quality, by personalizing content and experience for the user. Furthermore, improvement in social perception by the general population can also be anticipated, thanks to familiarity with smart devices provided by this system.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICSITECH.2016.7852634
Tuul Triyason, Pisal Setthawong
Plara or Mekong basin styled fermented fish is considered an important ingredient in the cuisine of people living in the Mekong basin region. Though plara is considered as an important ingredient, the production of plara is still done in the community level, where different communities utilize different ingredients and recipes to cater to the local taste palate. With recipe variations due to regional preferences, plara production revolves mainly around communities. As plara production is done in community level, there are a number of issues that have to be addressed in the production of plara. Many issues such as hygiene, the production process, and the fermentation process are considered as important issues that are typically neglected in community production. To help solve those issues, the research proposes an IoT platform in the production of plara. The platform will help add value to the production of plara by helping to raise the hygiene level in the production of plara, provide quality control of the fermentation process, and help provide additional guarantee for plara purchasers about the quality of the plara.
{"title":"PLAKDA - an IoT platform for the production of Mekong basin styled fermented fish (plara)","authors":"Tuul Triyason, Pisal Setthawong","doi":"10.1109/ICSITECH.2016.7852634","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852634","url":null,"abstract":"Plara or Mekong basin styled fermented fish is considered an important ingredient in the cuisine of people living in the Mekong basin region. Though plara is considered as an important ingredient, the production of plara is still done in the community level, where different communities utilize different ingredients and recipes to cater to the local taste palate. With recipe variations due to regional preferences, plara production revolves mainly around communities. As plara production is done in community level, there are a number of issues that have to be addressed in the production of plara. Many issues such as hygiene, the production process, and the fermentation process are considered as important issues that are typically neglected in community production. To help solve those issues, the research proposes an IoT platform in the production of plara. The platform will help add value to the production of plara by helping to raise the hygiene level in the production of plara, provide quality control of the fermentation process, and help provide additional guarantee for plara purchasers about the quality of the plara.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130589381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICSITECH.2016.7852622
H. Y. Irwanto
Anti-Tank Guided Missile (ATGM) is Indonesian Army' main defense equipment, whose availability depends on purchasing from abroad. The dependency to other countries allows many weak points and makes Indonesia merely a user, which cannot do anything against the import of defense equipment. Moreover, as a user having obligation to report the status of the defense equipment to the producer, Indonesia's national security is at stake. Therefore, it is necessary for Indonesia to develop its own kind of ATGM according to the needs of the military. Instrumentation, Control and Navigation (ICON) system is the brain of ATGM. The whole process related to ATGM, starting from condition before it is launched, during the flight and when hitting the target, will be controlled and communicated through ICON. Therefore, ICON on board controller must have a very high processing speed and have the ability to receive various inputs and to send outputs to multiple modules with different characteristics and different communication protocols. Facilitated with Integrated Simulation System (ISS) being developed earlier, the development Hardware in the Loop Simulation (HILS) of ICON becomes easier. Thus, ICON development is more focused on modeling of ATGM for simulation to ensure that the main onboard controller currently using NI MyRIO (field programmable gate array / FPGA base micro controller) is able to do the whole process required by ATGM. As an initial simulation, ICON has been able to simulate the range based on the ignition booster - sustainer and optimization of control systems (roll and pitch). Booster is designed with a thrust of 140 kgf, burning time 0.25 sec and sustainer's average thrust of 140 kgf, burning time 4 sec, with pitch control on the rear moving fin, and at the same time kick-off timing of ignition sustainer; this results in maximum speed of 532.9 km/h, apooge 789.6 m and distance/range as far as 2.31 km. This simulation shows that ICON can function as real Onboard Controller, because the whole process of flying is simulated well through HILS. Further refinement needs to include gain, timing and other key variables that affect the outcome of the flight test.
{"title":"Development of Instrumentation, Control and Navigation (ICON) for Anti Tank Guided Missile (ATGM)","authors":"H. Y. Irwanto","doi":"10.1109/ICSITECH.2016.7852622","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852622","url":null,"abstract":"Anti-Tank Guided Missile (ATGM) is Indonesian Army' main defense equipment, whose availability depends on purchasing from abroad. The dependency to other countries allows many weak points and makes Indonesia merely a user, which cannot do anything against the import of defense equipment. Moreover, as a user having obligation to report the status of the defense equipment to the producer, Indonesia's national security is at stake. Therefore, it is necessary for Indonesia to develop its own kind of ATGM according to the needs of the military. Instrumentation, Control and Navigation (ICON) system is the brain of ATGM. The whole process related to ATGM, starting from condition before it is launched, during the flight and when hitting the target, will be controlled and communicated through ICON. Therefore, ICON on board controller must have a very high processing speed and have the ability to receive various inputs and to send outputs to multiple modules with different characteristics and different communication protocols. Facilitated with Integrated Simulation System (ISS) being developed earlier, the development Hardware in the Loop Simulation (HILS) of ICON becomes easier. Thus, ICON development is more focused on modeling of ATGM for simulation to ensure that the main onboard controller currently using NI MyRIO (field programmable gate array / FPGA base micro controller) is able to do the whole process required by ATGM. As an initial simulation, ICON has been able to simulate the range based on the ignition booster - sustainer and optimization of control systems (roll and pitch). Booster is designed with a thrust of 140 kgf, burning time 0.25 sec and sustainer's average thrust of 140 kgf, burning time 4 sec, with pitch control on the rear moving fin, and at the same time kick-off timing of ignition sustainer; this results in maximum speed of 532.9 km/h, apooge 789.6 m and distance/range as far as 2.31 km. This simulation shows that ICON can function as real Onboard Controller, because the whole process of flying is simulated well through HILS. Further refinement needs to include gain, timing and other key variables that affect the outcome of the flight test.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"29 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132348465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICSITECH.2016.7852605
M. M. Mohamad, M. Kheirabadi
Unique characteristic of underwater environments is challenging for wireless sensor network protocol. Opportunistic routing protocol is the most promising routing method to encounter the challenges. This paper will review three main algorithms; forwarding set selection and forwarding set ranking algorithms to handle FSR problem, void handling algorithm to handle the communication void (CV) problem, and overhear and suppression algorithm to deal with duplicate forwarding suppression (DFS) problem. The importance of the review is that it will direct the study to energy efficient pressure-based opportunistic routing algorithm for underwater wireless sensor network (UWSN).
{"title":"Energy efficient opportunistic routing algorithm for underwater sensor network: A review","authors":"M. M. Mohamad, M. Kheirabadi","doi":"10.1109/ICSITECH.2016.7852605","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852605","url":null,"abstract":"Unique characteristic of underwater environments is challenging for wireless sensor network protocol. Opportunistic routing protocol is the most promising routing method to encounter the challenges. This paper will review three main algorithms; forwarding set selection and forwarding set ranking algorithms to handle FSR problem, void handling algorithm to handle the communication void (CV) problem, and overhear and suppression algorithm to deal with duplicate forwarding suppression (DFS) problem. The importance of the review is that it will direct the study to energy efficient pressure-based opportunistic routing algorithm for underwater wireless sensor network (UWSN).","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115568533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICSITECH.2016.7852636
Rintaspon Bhannarai, Chartchai Doungsaard
Agile methodology is a famous software development methodology. The methodology stresses on adaptation and collaboration between people. Here, software project managers should agree to an idea of putting the right people in the right jobs. This research puts forward an idea of applying Big Five Personality Traits to predict how people suitable for the Agile methodology. A predicting method is driven by using kNearest Neighbour (kNN) classification technique. Results of a pilot study are presented and shown that the selected classification technique can be used for the prediction.
{"title":"Agile person identification through personality test and kNN classification technique","authors":"Rintaspon Bhannarai, Chartchai Doungsaard","doi":"10.1109/ICSITECH.2016.7852636","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852636","url":null,"abstract":"Agile methodology is a famous software development methodology. The methodology stresses on adaptation and collaboration between people. Here, software project managers should agree to an idea of putting the right people in the right jobs. This research puts forward an idea of applying Big Five Personality Traits to predict how people suitable for the Agile methodology. A predicting method is driven by using kNearest Neighbour (kNN) classification technique. Results of a pilot study are presented and shown that the selected classification technique can be used for the prediction.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116444698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICSITech.2016.7852619
Song Nguyen Duc Cong, Quoc Hung Ngo, Rachsuda Jiamthapthaksin
Word segmentation is the first step of any tasks in Vietnamese language processing. This paper reviews state-of-the-art approaches and systems for word segmentation in Vietnamese. To have an overview of all stages from building corpora to developing toolkits, we discuss building the corpus stage, approaches applied to solve the word segmentation and existing toolkits to segment words in Vietnamese sentences. In addition, this study shows clearly the motivations on building corpus and implementing machine learning techniques to improve the accuracy for Vietnamese word segmentation. According to our observation, this study also reports a few of achievements and limitations in existing Vietnamese word segmentation systems.
{"title":"State-of-the-art Vietnamese word segmentation","authors":"Song Nguyen Duc Cong, Quoc Hung Ngo, Rachsuda Jiamthapthaksin","doi":"10.1109/ICSITech.2016.7852619","DOIUrl":"https://doi.org/10.1109/ICSITech.2016.7852619","url":null,"abstract":"Word segmentation is the first step of any tasks in Vietnamese language processing. This paper reviews state-of-the-art approaches and systems for word segmentation in Vietnamese. To have an overview of all stages from building corpora to developing toolkits, we discuss building the corpus stage, approaches applied to solve the word segmentation and existing toolkits to segment words in Vietnamese sentences. In addition, this study shows clearly the motivations on building corpus and implementing machine learning techniques to improve the accuracy for Vietnamese word segmentation. According to our observation, this study also reports a few of achievements and limitations in existing Vietnamese word segmentation systems.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126219364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICSITECH.2016.7852629
E. Nugroho, Rizky Rachman Judhie Putra, Iman Muhamad Ramadhan
Nowadays, it is highly necessary to give precautions aimed to prevent Netizen from creating fake accounts to do criminal offence. One of the means is to use authentication code where it contains activation message. This authentication code is generated through activation message combined with timestamp values which would further be used on One-time Password. Then, it would be encrypted using Advanced Encryption Standard cryptographic algorithm, the generated authentication code can only be used once within a limited time. Unfortunately though, in 2011 three researchers from several universities and Microsoft, Andrey Bogdanov from K.U. Leuven, Dimitri Khovratovich from Microsoft and Christian Reachberger from ENS Paris found a crack on AES encryption, thus requiring modification to enhance AES complexity in order to close the said crack. AES modification can be done on S-Box and ShiftRow, thus enabling their dynamics following the keys given. 256 bits AES is chosen because it contains more key combination and longer time to decrypt compared to other type of AES. After its modification is done, the next step would be tested with Avalanche Effect and Randomness Test, where good cryptographic algorithm would have Avalanche Effect values around 50% and able to pass 5 basic random tests in Randomness Test.
{"title":"SMS authentication code generated by Advance Encryption Standard (AES) 256 bits modification algorithm and One time Password (OTP) to activate new applicant account","authors":"E. Nugroho, Rizky Rachman Judhie Putra, Iman Muhamad Ramadhan","doi":"10.1109/ICSITECH.2016.7852629","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852629","url":null,"abstract":"Nowadays, it is highly necessary to give precautions aimed to prevent Netizen from creating fake accounts to do criminal offence. One of the means is to use authentication code where it contains activation message. This authentication code is generated through activation message combined with timestamp values which would further be used on One-time Password. Then, it would be encrypted using Advanced Encryption Standard cryptographic algorithm, the generated authentication code can only be used once within a limited time. Unfortunately though, in 2011 three researchers from several universities and Microsoft, Andrey Bogdanov from K.U. Leuven, Dimitri Khovratovich from Microsoft and Christian Reachberger from ENS Paris found a crack on AES encryption, thus requiring modification to enhance AES complexity in order to close the said crack. AES modification can be done on S-Box and ShiftRow, thus enabling their dynamics following the keys given. 256 bits AES is chosen because it contains more key combination and longer time to decrypt compared to other type of AES. After its modification is done, the next step would be tested with Avalanche Effect and Randomness Test, where good cryptographic algorithm would have Avalanche Effect values around 50% and able to pass 5 basic random tests in Randomness Test.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122290084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICSITECH.2016.7852625
Audy, M. B. Kristanda, S. Hansun
Bulletin board is a medium for sharing information in Universitas Multimedia Nusantara (UMN). However, the feasibility study showed that bulletin board was not effective to be used as a medium for disseminating information in UMN campus. Apart from the user side, the development of UMN campus building also become an obstacle for using traditional bulletin board. Near Field Communication (NFC) technology is a type of short-range wireless technology, which widely used in developed countries in everyday life, such as ticketing payment, public transport, credit card, e-ticket, advertisement, and Wireless Local Area Network (W-LAN) configuration. One concrete manifestation of NFC technology implementation is Smart Poster. In addition to NFC technology embodied in Smart Poster, an object is needed to represent a range of bulletin information with small size so that it can be implemented into NFC Tag. Based on previous research, that object can be made by Salt Tokenization method. This study aims to design and develop Mobile Bulletin system to implement Smart Poster concept using NFC technology and Salt Tokenization method. The system's usability testing result in this study showed that Mobile Bulletin system makes the acquisition and dissemination of bulletin board information easier, also easier for Student Council to manage bulletin board.
{"title":"Smart poster implementation on Mobile Bulletin system using NFC tags and Salt Tokenization case study: Universitas Multimedia Nusantara","authors":"Audy, M. B. Kristanda, S. Hansun","doi":"10.1109/ICSITECH.2016.7852625","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852625","url":null,"abstract":"Bulletin board is a medium for sharing information in Universitas Multimedia Nusantara (UMN). However, the feasibility study showed that bulletin board was not effective to be used as a medium for disseminating information in UMN campus. Apart from the user side, the development of UMN campus building also become an obstacle for using traditional bulletin board. Near Field Communication (NFC) technology is a type of short-range wireless technology, which widely used in developed countries in everyday life, such as ticketing payment, public transport, credit card, e-ticket, advertisement, and Wireless Local Area Network (W-LAN) configuration. One concrete manifestation of NFC technology implementation is Smart Poster. In addition to NFC technology embodied in Smart Poster, an object is needed to represent a range of bulletin information with small size so that it can be implemented into NFC Tag. Based on previous research, that object can be made by Salt Tokenization method. This study aims to design and develop Mobile Bulletin system to implement Smart Poster concept using NFC technology and Salt Tokenization method. The system's usability testing result in this study showed that Mobile Bulletin system makes the acquisition and dissemination of bulletin board information easier, also easier for Student Council to manage bulletin board.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127124664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICSITECH.2016.7852646
A. Supriyanto, K. Mustofa
Many models were developed to assess E-government (E-gov) readiness, as well as E-gov maturity phase or level models that are becoming 'benchmark' today. Each model has strengths and weaknesses. This paper reviews various E-gov readiness and maturity phase assessment models, conducted by previous researchers. The methodology applied was review to some journals and comparing them with various E-gov readiness and maturity phase assessment models. Furthermore, aspects or domains of readiness assessment were identified and components of every framework aspect were determined. Later, the content limitations of each E-gov maturity phase will be identified. Analysis was conducted by creating a matrix to determine the relationship between every E-gov readiness assessment aspect and E-gov maturity phase. The value of each E-gov maturity phase can be determined by calculating the average of total E-gov maturity value meeting E-gov maturity phase. The results can be used as a benchmark and evaluation for decision-makers to be able to determine the next steps for the improvement of E-gov maturity level or phase.
{"title":"E-gov readiness assessment to determine E-government maturity phase","authors":"A. Supriyanto, K. Mustofa","doi":"10.1109/ICSITECH.2016.7852646","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852646","url":null,"abstract":"Many models were developed to assess E-government (E-gov) readiness, as well as E-gov maturity phase or level models that are becoming 'benchmark' today. Each model has strengths and weaknesses. This paper reviews various E-gov readiness and maturity phase assessment models, conducted by previous researchers. The methodology applied was review to some journals and comparing them with various E-gov readiness and maturity phase assessment models. Furthermore, aspects or domains of readiness assessment were identified and components of every framework aspect were determined. Later, the content limitations of each E-gov maturity phase will be identified. Analysis was conducted by creating a matrix to determine the relationship between every E-gov readiness assessment aspect and E-gov maturity phase. The value of each E-gov maturity phase can be determined by calculating the average of total E-gov maturity value meeting E-gov maturity phase. The results can be used as a benchmark and evaluation for decision-makers to be able to determine the next steps for the improvement of E-gov maturity level or phase.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126762112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICSITECH.2016.7852663
H. A. Nugroho, Ilcham, A. Jalil, I. Ardiyanto
Glaucoma is one of the eye diseases characterised by increasing of fluid pressure in the eye. High fluid pressure can damage optic nerve head. It can lead to blindness if it is not treated properly. Segmentation of optic disc area is a technique to support the glaucoma diagnosis. This research contributes to the segmentation of optic disc. Red channel is extracted from colour images. Furthermore, noise is eliminated by average filter. Subsequently, the transformation of bottom hat is used to remove the vessel area in fundus image. The image quality is enhanced by morphological reconstruction operation. Before performing segmentation, Region of Interest (RoI) is determined based on the highest value of pixel intensity. Segmentation of optic disc is undertaken using active contour. This method has been tested on 50 colour retinal fundus images taken from DRISHTI-GS dataset. The propose scheme successfully achieves average accuracy of 99.55%, sensitivity of 89.92% and specificity of 99.85% in segmenting optic disc.
{"title":"Segmentation of optic disc on retinal fundus images using morphological reconstruction enhancement and active contour","authors":"H. A. Nugroho, Ilcham, A. Jalil, I. Ardiyanto","doi":"10.1109/ICSITECH.2016.7852663","DOIUrl":"https://doi.org/10.1109/ICSITECH.2016.7852663","url":null,"abstract":"Glaucoma is one of the eye diseases characterised by increasing of fluid pressure in the eye. High fluid pressure can damage optic nerve head. It can lead to blindness if it is not treated properly. Segmentation of optic disc area is a technique to support the glaucoma diagnosis. This research contributes to the segmentation of optic disc. Red channel is extracted from colour images. Furthermore, noise is eliminated by average filter. Subsequently, the transformation of bottom hat is used to remove the vessel area in fundus image. The image quality is enhanced by morphological reconstruction operation. Before performing segmentation, Region of Interest (RoI) is determined based on the highest value of pixel intensity. Segmentation of optic disc is undertaken using active contour. This method has been tested on 50 colour retinal fundus images taken from DRISHTI-GS dataset. The propose scheme successfully achieves average accuracy of 99.55%, sensitivity of 89.92% and specificity of 99.85% in segmenting optic disc.","PeriodicalId":447090,"journal":{"name":"2016 2nd International Conference on Science in Information Technology (ICSITech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}