Elankovan Sundararajan

Elankovan Sundararajan
Universiti Kebangsaan Malaysia | ukm · School of Computer Science

About

86
Publications
26,988
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,099
Citations
Citations since 2017
34 Research Items
818 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150

Publications

Publications (86)
Article
Full-text available
In this paper, the novel heuristic search algorithm called Smart Root Search (SRS) was examined for solving a set of different-sized service time–cost optimization in cloud computing service composition (STCOCCSC) problems, and its performance was compared with those of the ICACRO-C, ICACRO-I, ICA, and Niching PSO algorithms. STCOCCSC is an np-hard...
Article
Full-text available
A heterogeneous vehicular network (HetVNET) is a promising network architecture that combines multiple network technologies such as IEEE 802.11p, dedicated short-range communication (DSRC), and third/fourth generation cellular networks (3G/4G). In this network area, vehicle users can use wireless fidelity access points (Wi-Fi APs) to offload 4G lon...
Article
Full-text available
Data stream clustering is not a recent subject in data analysis and statistics. However, with the rapid deployment of the Internet of Things (IoT), this field faces new practical challenges that researchers intend to solve. These challenges can be summarized under four main categories: high-dimensionality, fast speed of data flow, real-time constra...
Article
Vehicular Ad hoc NETworks (VANETs) have become a leading technology receiving great attention from various research communities as a pivotal infrastructure for data dissemination in intelligent transportation systems. Data dissemination in VANET is a challenging task due to high dynamics in topology, mobility, and links connection. Internet model (...
Article
Full-text available
In this paper, a novel high-performance and low-cost operator is proposed for the imperialist competitive algorithm (ICA). The operator, inspired by a sociopolitical movement called the color revolution that has recently arisen in some countries, is referred to as the color revolution operator (CRO). The improved ICA with CRO, denoted as ICACRO, is...
Article
Full-text available
In this paper, a novel heuristic search algorithm called Smart Root Search (SRS) is proposed. SRS employs intelligent foraging behavior of immature, mature and hair roots of plants to explore and exploit the problem search space simultaneously. SRS divides the search space into several subspaces. It thereupon utilizes the branching and drought oper...
Article
Full-text available
The Heterogeneous Network is widely used in the Fifth Generation wireless network to solve the problem of increasing demand on wireless communication. Femtocell or called Home-evolved NodeB (HeNB) is one of the small cells nominated to be used in this generation. HeNB is a low-power, low-cost, and short coverage area base station randomly assigned...
Article
Full-text available
Density-based methods have appeared as a practical approach for the clustering of data streams. While various density-based algorithms have recently been developed for data stream clustering, these algorithms are not without problems. The efficiency of the clustering is considerably reduced when an insufficient distance function is used. In additio...
Article
Full-text available
In recent years, a significant boost in data availability for persistent data streams has been observed. These data streams are continually evolving, with the clusters frequently forming arbitrary shapes instead of regular shapes in the data space. This characteristic leads to an exponential increase in the processing time of traditional clustering...
Conference Paper
Density-based methods have appeared as a valuable category for the clustering of evolving data streams. Although a number of density-based algorithms have recently been developed for the clustering of data streams, these algorithms are not without their issues. The quality of the clustering is dramatically reduced when the distance function is used...
Conference Paper
Full-text available
Density-based methods have appeared as a valuable category for the clustering of evolving data streams. Although a number of density-based algorithms have recently been developed for the clustering of data streams, these algorithms are not without their issues. The quality of the clustering is dramatically reduced when the distance function is used...
Article
Full-text available
In recent years, a significant boost in data availability for persistent data streams has been observed. These data streams are continually evolving, with the clusters frequently forming arbitrary shapes instead of regular shapes in the data space. This characteristic leads to an exponential increase in the processing time of traditional clustering...
Article
Full-text available
Abstract—Object detection is a major area of concern and such method has been extensively used in numerous applications whereas the success of using color information has been continuously reported with less attention given to several issues, such as the lengthy process to calibrate color, color fading, and others. Nonetheless, the need of such app...
Chapter
Full-text available
Wireless ad hoc network is widely used nowadays, in particular the mobile type, known as the mobile ad hoc network (MANET). This type of network consists of sets of mobile nodes that do not require a fixed infrastructure such as an access point or base station. The common use of MANET is to enable nodes contacting in the absence of the typical comm...
Conference Paper
The Named Data Networking (NDN) paradigm is a recent approach of Information-Centric networking (ICN) which has attracted researchers from different domains as it promises an alternative communication paradigm. NDN provides scalable, efficient, and secure data dissemination for various applications. NDN is a data-centric communication based on simp...
Article
Full-text available
The increasing use of smartphones, tablets, and other vehicular network applications with varied capabilities and the associated growth in the use of all types of data-hungry multimedia services pose a significant challenge to cellular infrastructure operators. Vehicular Wi-Fi offloading (VWO) is one of the potential solutions for offloading cellul...
Article
Full-text available
The increasing demand for wireless networks calls for the use of heterogeneous networks in order to fulfil user requirements. Mobility management is considered one of the important entities for such networks. The handover is one of the main features of mobility management in regard to the long term evolution advanced (LTE-A) system, which depends p...
Article
Full-text available
Apriori algorithm is a classical algorithm of association rule mining and widely used for generating frequent item sets. However, the original Apriori algorithm has some limitation such as it needs to scan the dataset many times to discover all frequent itemset and generate huge number of candidate itemset. To overcome these limitations, researcher...
Article
Apriori algorithm is a classical algorithm of association rule mining and widely used for generating frequent item sets. However, the original Apriori algorithm has some limitation such as it needs to scan the dataset many times to discover all frequent itemset and generate huge number of candidate itemset. To overcome these limitations, researcher...
Article
Full-text available
Visual tracking in aerial videos is a challenging task in computer vision and remote sensing technologies due to appearance variation difficulties. Appearance variations are caused by camera and target motion, low resolution noisy images, scale changes, and pose variations. Various approaches have been proposed to deal with appearance variation dif...
Article
The handover is one of the basic elements in the mobility management of Long Term Evolution Advanced (LTE-A) wireless systems. It permits the user equipment (UE) to wander between LTE-A wireless networks. LTE-A purely depends on the hard handover, which may cause disconnection to occur if the handover is not fast enough. In this paper, an advanced...
Article
Full-text available
Vision system implements image processing in its design and development. The process involves a series of static and dynamic images that are received from a real-time environment. The vision system produces an important outcome in term of object features that are meant for observation, for example, object location, identity, orientation, and others...
Article
Full-text available
The increasing demand for mobile communication calls for improvements to network operating services in terms of capacity, coverage, and Quality of Services (QoS). Ensuring QoS is one of the challenges faced by wireless network operators, which include the provision of high mobility speeds, thus the implementation of a seamless and fast handover bet...
Conference Paper
Cloud computing is becoming popular among application developers nowadays. With the advent of cloud, application developers can use computing resources that are cost effective with almost zero hardware maintenance worries. Many Simulators for Cloud platform has been developed to better understand the behavior of this platform and one of the commonl...
Article
The significant increase in computer network usage and the huge amount of sensitive data being stored and transferred through them has escalated the attacks and invasions on these networks. Secure data communication over the internet and any other network is always under threat of intrusions and misuses. The system that monitors the events occurrin...
Article
Computing technology is now moving from ubiquitous computing into advanced ubiquitous computing environment. An advanced ubiquitous environment is an extension of ubiquitous environment that improve connectivity between devices. This computing environment has five major characteristics, namely: large number of heterogeneous devices; new communicati...
Article
Full-text available
It cannot be denied that, the inescapable diffusion of smartphones, tablets and other vehicular network applications with diverse networking and multimedia capabilities, and the associated blooming of all kinds of data-hungry multimedia services that passengers normally used while traveling exert a big challenge to cellular infrastructure operators...
Article
Handover is one of the critical features in mobility management of Long Term Evolution Advanced (LTE-A) wireless systems. It allows the User Equipment (UE) to roam between LTE-A wireless networks. LTE-A is purely on hard handover, which may cause loss data if the handover is not fast. In this paper, an advanced technique proposed which combined bet...
Article
Harmony search is an emerging meta-heuristic optimization algorithm that is inspired by musical improvisation processes, and it can solve various optimization problems. Membrane computing is a distributed and parallel model for solving hard optimization problems. First, we employed some previously proposed approaches to improve standard harmony sea...
Article
Full-text available
Data mining is the extraction of useful, prognostic, interesting, and unknown information from massive transaction databases and other repositories. Data mining tools predict potential trends and actions, allowing various fields to make proactive, knowledge-driven decisions. Recently, with the rapid growth of information technology, the amount of d...
Article
Full-text available
Educational growth is a fundamental infrastructure factor required to achieve sustainable development. Therefore, evaluation and measurement of educational growth is essential for establishing a development road map. Because of this, there are many organizations and databases that work to capture academic trends and provide the general view of inst...
Conference Paper
Data mining is an essential step of knowledge discovery in databases (KDD) process by analyzing the huge amount of data from different perspectives and summarizing it into potentially valuable, valid, novel, interesting, and previously unknown information. Due to the importance of extracting knowledge from the massive data repositories, data mining...
Article
Today, higher education communities are faced with several new challenges such as information explosion and the diversity of their sources, increasing competitive pressure, shorter study life cycles, and shorter technology innovation cycles. Two possible ways to cope with these challenges are the implementation theory of lean system (LS) techniques...
Conference Paper
Full-text available
Today, higher education communities are faced with several new challenges such as information explosion and the diversity of their sources, increasing competitive pressure, shorter study life cycles, and shorter technology innovation cycles. Two possible ways to cope with these challenges are the implementation theory of lean system (LS) techniques...
Conference Paper
Full-text available
In recent years researchers have tried to apply Stochastic Algorithms for solving Optimization problems. Some of these algorithms like Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO) and Artificial Immune Systems (AIS) are more known because of their significant abilities in finding optimal solutions. of the...
Article
Radio frequency identification systems aid in fast identification of tagged objects simultaneously, by means of radio signals. However, when radio frequency signals are emitted simultaneously, there is a probability of collision occurrence because of which the identification process may fail, and thereby resulting in a waste of resources. Therefore...
Conference Paper
This paper presents literature reviews that show variety of techniques to develop parallel feature extractor and finding its correlation with noise reduction approaches for low light intensity images. Low light intensity images are normally displayed as darker images and low contrast. Without proper handling techniques, those images regularly becom...
Article
Full-text available
The current computer vision-based systems (CVS) are becoming computationally demanding due to the improvement of their functionalities that is difficult to be achieved with single-core frameworks. Such deficiencies of the single-core frameworks have led to the introduction multi-core frameworks to meet the required performance of their functionalit...
Conference Paper
Full-text available
One of the fundamental issues facing research universities is to raise productivity of their research community. A thorough study of the literature reveals that there are many articles on productivity, however, there are only a small number of them are relate to productivity issues affecting researchers in universities. In our work, we aim to use c...
Conference Paper
Object tracking plays important roles in various applications such as surveillance, search and rescue, augmented reality and robotics. This paper presents an investigation on multi-threading framework capability for color-based object tracking applications. A multi-threading framework based on Threading Building Blocks (TBB) was implemented on a mu...
Article
Full-text available
The rapid evolution of imaging and communication technologies has transformed images into a widespread data type. Different types of data, such as personal medical information, official correspondence, or governmental and military documents, are saved and transmitted in the form of images over public networks. Hence, a fast and secure cryptosystem...
Article
Full-text available
Object tracking plays important roles in various applications such as surveillance, search and rescue, augmented reality and robotics. This paper presents an investigation on multi-threading framework capability for color-based object tracking applications. A multi-threading framework based on Threading Building Blocks (TBB) was implemented on a mu...
Article
The cubic version of the Lucas cryptosystem is set up based on the cubic recurrence relation of the Lucas function by Said and Loxton [‘A cubic analogue of the RSA cryptosystem’, Bull. Aust. Math. Soc. 68 (2003), 21–38]. To implement this type of cryptosystem in a limited environment, it is necessary to accelerate encryption and decryption procedu...
Article
Full-text available
Satisfaction of customers is one of the ultimate goals of most companies and industries that may lead to increasing the amount of sales and earning revenue. Quality Function Deployment (QFD) as a well-known process for reaching this goal is applied in the literature. To apply QFD, it is necessary to solve QFD Decision-Making Problem (QFDDMP) in wh...
Article
Full-text available
The main objective of Radio Frequency Identification systems is to provide fast identification for tagged objects. However, there is always a chance of collision, when tags transmit their data to the reader simultaneously. Collision is a time-consuming event that reduces the performance of RFID systems. Consequently, several anti-collision algorith...
Article
Full-text available
NP-Complete optimization problems are a well-known and widely used set of problems which surveyed and researched in the field of soft computing. Nowadays, because of the acceptable rate of achieving optimal or near-optimal solutions of the mentioned issues, using of nature-inspired algorithms are increasingly considered. One of the familiar problem...
Article
Full-text available
Breast cancer is one of the most common cancers among women in the world. Early detection of breast cancer is essential in reducing their life losses. Data mining is the process of analyzing massive data and summarizing it into useful knowledge discovery and the role of data mining approaches is growing rapidly especially classification techniques...
Article
Full-text available
Lattice Boltzmann Method (LBM) is a widely used method to simulate the computation of fluid dynamics. Its cost effectiveness and computing speed are some of the important reasons why it has become very popular in solving Computational Fluid Dynamics (CFD) applications. However, this method is not practical to be applied for large CFD problems in a...
Article
Full-text available
In recent years, there has been a vast interest in optimal usage of computing resources so that massive data can be processed with minimal cost. The need to use a pool of shared resources in a wide area network that provide elasticity, high capacity of computation and ability to store information on location-independent storages have led to the adv...
Conference Paper
High Performance Computing (HPC) is usually used to solve problems that cannot be solved on a single machine due to constraints in computing resources such as memory and number of processor in science and technology. The speed of processing can be improved through HPC. However, the use of high-powered supercomputer for this type of problems involve...
Article
Full-text available
Images are an attractive data type that occasionally include secret information, such as faces, logos, signatures, places, or personal private albums. Cryptography is a solution to protect confidential images by encrypting them before transmission over unsecure channels or public networks. This paper's proposed cryptosystem is based on elliptic cur...
Data
Service composition is among the most important challenges that cloud providers have ever faced. Optimization of QoS attributes when composing simple atomic services to obtain a complex service can be considered to be an NP-hard problem, which could be solved properly by using Hybrid optimization algorithms. In this research, the hybridization of a...
Conference Paper
Full-text available
A Radio Frequency Identification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. RFID systems communicate with the tags attached to the objects using radio frequency waves. The major problem with RFID systems is security problem because the communication between RFID components is wireless. In this...
Conference Paper
Service composition is among the most important challenges that cloud providers have ever faced. Optimization of QoS attributes when composing simple atomic services to obtain a complex service can be considered to be an NP-hard problem, which could be solved properly by using Hybrid optimization algorithms. In this research, the hybridization of a...
Article
Full-text available
Radio Frequency Identification (RFID) system is a communication technology used to identify objects using electromagnetic waves. The key advantage of RFID systems stems from their ability to simultaneously identify multiple tagged objects. However, communication of multiple tags with a reader may result in a collision problem, which is both time an...
Article
Radio Frequency Identification (RFID) system is a communication technology used to identify objects using electromagnetic waves. The key advantage of RFID systems stems from their ability to simultaneously identify multiple tagged objects. However, communication of multiple tags with a reader may result in a collision problem, which is both time an...
Conference Paper
Cluster Network technologies have been evolving for the past decades and still gaining a lot of momentum for several reasons. These reasons include the benefits of deploying commodity, off-the-shelf hardware (high-power PCs at low prices), using inexpensive high-speed networking such as fast Ethernet, as well as the resulting benefits of using Linu...
Conference Paper
Full-text available
Radio Frequency Identification (RFID) system is a new communication technology to identify the objects using electromagnetic waves. The main superiority of RFID systems in comparison with other identification systems, such as barcodes, is its ability in simultaneous identification process, but when more than one tag wants to communicate with the re...
Conference Paper
PCs in computing labs at institution of higher learning are often if not always underutilized. These PCs are usually not used at night and early morning (i.e. between 10pm-8am), during semester breaks, weekends and during final examinations. At other times most of the lab PCs are not utilized up to the available capacity. This underutilization scen...