Sumari Putra

Sumari Putra
Universiti Sains Malaysia | USM · School of Computer Science

PhD in Computer Science

About

176
Publications
74,810
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,566
Citations
Introduction
Skills and Expertise
Additional affiliations
June 2002 - present
Universiti Sains Malaysia
Position
  • Professor

Publications

Publications (176)
Chapter
Full-text available
Brain-computer interface (BCI) is an innovative method of integrating technology for healthcare. Utilizing BCI technology allows for direct communication and/or control between the brain and an external device, thereby displacing conventional neuromuscular pathways. The primary goal of BCI in healthcare is to repair or reinstate useful function to...
Article
Full-text available
Particularly in recent years, there has been increased interest in determining the ideal thresholding for picture segmentation. The best thresholding values are found using various techniques, including Otsu and Kapur-based techniques. These techniques work well for bi-level thresholding, but when used to find the appropriate thresholds for multi-l...
Article
Full-text available
The sharing of open-access neuroimaging data has increased significantly during the last few years. Sharing neuroimaging data is crucial to accelerating scientific advancement, particularly in the field of neuroscience. A number of big initiatives that will increase the amount of available neuroimaging data are currently in development. The Big Bra...
Article
Full-text available
Disruption of white matter integrity and its relationship with cognitive function in non-severe traumatic brain injury. Background: Impairment in cognitive function is a recognized outcome of traumatic brain injury (TBI). However, the degree of impairment has variable relationship with TBI severity and time post injury. The underlying pathology is...
Chapter
Salak is one of the fruits plants in Southeast Asia; there are at least 30 cultivars of salak. The size, shape, skin color, sweetness or even flesh color will be different depending on the cultivar. Thus, classification of salak based on their cultivar become a daily job for the fruit farmers. There are many techniques that can be used for fruit cl...
Article
Full-text available
Jackfruit (Artocarpus integer) and Cempedak (Artocarpus heterophyllus) are two different Southeast Asian fruit species from the same genus that are quite similar in their external appearance, therefore, sometimes difficult to be recognized visually by humans, especially in the form of pictures. Convolutional neural networks (CNN) and transfer learn...
Chapter
Cempedak (Artocarpus heterophyllus) and nangka (Artocarpus integer) are highly similar in their external appearance and are difficult to recognize visually by a human. It is also common to name both jackfruits. Computer vision and deep convolutional neural networks (DCNN) can provide an excellent solution to recognize the fruits. Although several s...
Chapter
Mango is one of the well known tropical fruits native to south asia and currently there are over 500 varieties of mangoes known. Depending on the variety, mango fruit can be varied in size, skin color, shape, sweetness, and flesh color which may be pale yellow, gold, or orange. However, sometimes it is difficult for us to differentiate what type of...
Chapter
Image identification is a useful tool for classifying and organizing fruits in agribusiness. This study aims to use deep learning to construct a design for Sapodilla identification and classification. Sapodilla comes in a various of varieties from throughout the world. Sapodilla can come in different sizes, form, and taste depending on species and...
Chapter
Full-text available
Rambutan (Nephelium lappaceum L.) is a widely grown and favored fruit in tropical countries such as Malaysia, Indonesia, Thailand, and the Philippines. This fruit is classified into tens of different cultivars based on fruit, flesh, and tree features. In this project, five different rambutan cultivars classification models using deep learning techn...
Chapter
There are many species of Artocarpus fruits in Malaysia, which have different market potentials. This study classifies 4 species of Artocarpus fruits using deep learning approach, which is Convolutional Neural Network (CNN). A new proposed CNN model is compared with pre-trained models, i.e., VGG-16, ResNet50, and Xception. Effects of variables, i.e...
Chapter
Fruit recognition becomes more and more important in the agricultural industry. Traditionally, we need to manually identify and label all the fruits in the production line, which is labor intensive, error-prone, and ineffective. Therefore, a lot of fruit recognition systems are created to automate the process, but fruit recognition system for Malay...
Article
Full-text available
Urban areas worldwide are in the race to become smarter, and the Kingdom of Saudi Arabia (KSA) is no exception. Many of these have envisaged a chance to establish devoted municipal access networks to assist all kinds of city administration and preserve services needing data connectivity. Organizations unanimously concentrate on sustainability issue...
Article
Full-text available
Background Impairment in cognitive function is a recognized outcome of traumatic brain injury (TBI). However, the degree of impairment has variable relationship with TBI severity and time post injury. The underlying pathology is often due to diffuse axonal injury that has been found even in mild TBI. In this study, we examine the state of white mat...
Article
Full-text available
Jackfruit (Artocarpus integer) and Cempedak (Artocarpus heterophyllus) are two different Southeast Asian fruit species from the same genus that are quite similar in their external appearance, therefore, sometimes difficult to be recognized visually by humans, especially in the form of pictures. Convolutional neural networks (CNN) and transfer learn...
Article
Full-text available
The ability to recognize a grocery on the shelf of a retail store is an ordinary human skill. Automatic detection of grocery on the shelf of retail store provides enhanced value-added to consumer experience, commercial benefits to retailers and efficient monitoring to domestic enforcement ministry. Compared to machine vision-based object recognitio...
Article
Full-text available
Organic waste management (OWM) has always been a fundamental aspect of human populations. Approaches to OWM must be matched to the characteristics of a certain population. In this consideration, the Kingdom of Saudi Arabia (KSA) is no exception. Organizations are being aligned to focus on sustainability matters sharing significant features with uni...
Article
Full-text available
The intrusion detection system is a method for detection against attacks, making it one of the essential defense layers. Researchers are trying to find new algorithms to inspect all inbound and outbound activities and identify suspicious patterns that may show an attempted system attack. The proposed technique for detecting intrusions uses the Grey...
Article
Full-text available
This paper provides an in-depth literature review of the Black Hole Algorithm (BHA) which is considered as a recent metaheuristic. BHA has been proven to be very efficient in different applications. There has been several modifications and variants of this algorithm in the literature, so this work reviews various variants of the BHA. The applicatio...
Article
Full-text available
Real-world engineering design problems are widespread in various research disciplines in both industry and industry. Many optimization algorithms have been employed to address these kinds of problems. However, the algorithm’s performance substantially reduces with the increase in the scale and difficulty of problems. Various versions of the optimiz...
Article
Electroencephalogram (EEG) is a neurotechnology used to measure brain activity via brain impulses. Throughout the years, EEG has contributed tremendously to data-driven research models (e.g., Generalised Linear Models, Bayesian Generative Models, and Latent Space Models) in Neuroscience Technology and Neuroinformatic. Due to versatility, portabilit...
Article
Full-text available
Waste Management System (WMS) is applied in smart cities and is supported by the Internet of Things (IoT). WMS involves several responsibilities, such as collection, disposal, and utilization of waste in relevant facilities. Efficient waste management has a considerable impact on the quality of life of citizens in smart cities. The interaction betw...
Code
Matlab Code Reptile Search Algorithm (RSA) is a novel nature-inspired meta-heuristic optimizer, motivated by the hunting behaviour of Crocodiles. The performance of the proposed RSA is evaluated using twenty-three classical test functions, thirty CEC2017 test functions, ten CEC2019 test functions, and seven real-world engineering problems.
Article
This paper proposes a novel nature-inspired meta-heuristic optimizer, called Reptile Search Algorithm (RSA), motivated by the hunting behaviour of Crocodiles. Two main steps of Crocodile behaviour are implemented, such as encircling, which is performed by high walking or belly walking, and hunting, which is performed by hunting coordination or hunt...
Article
Full-text available
Fruits come in different variants and subspecies. While some subspecies of fruits can be easily differentiated, others may require an expertness to differentiate them. Although farmers rely on the traditional methods to identify and classify fruit types, the methods are prone to so many challenges. Training a machine to identify and classify fruit...
Article
The Internet of Drones (IoD) has become a hot research topic in academia, industry, and management in current years due to its wide potential applications, such as aerial photography, civilian, and military. This paper presents a comprehensive survey of IoD and its applications, deployments, and integration. We focused in this review on two main si...
Article
Full-text available
In this paper, a review on the three most important communication techniques (ground, aerial, and underwater vehicles) has been presented that throws light on trajectory planning, its optimization, and various issues in a summarized way. This kind of extensive research is not often seen in the literature, so an effort has been made for readers inte...
Conference Paper
Full-text available
Covid-19 is a serious public health problem worldwide. To date, it has spanned worldwide with 12.8 million infected and 566,909 confirm death. Covid-19 screening is indeed an important task and has to be done quickly as possible to many people so that early treatment can be done. The current world RT-PCR standard screening for Covid-19 detection no...
Article
Full-text available
Space exploration refers to constructing a map with the aid of sensor data. This exploration is achieved utilizing a group of robots in an obstacle cluttered environment and distributing tasks amongst these robot(s). The robotic configuration is equipped with sensors to acquire data from the surroundings and to ensure collision-free motion. This pa...
Article
Full-text available
Cyberstalking is a growing anti-social problem being transformed on a large scale and in various forms. Cyberstalking detection has become increasingly popular in recent years and has technically been investigated by many researchers. However, cyberstalking victimization, an essential part of cyberstalking, has empirically received less attention f...
Article
Full-text available
One of the most crucial aspects of image segmentation is multilevel thresholding. However, multilevel thresholding becomes increasingly more computationally complex as the number of thresholds grows. In order to address this defect, this paper proposes a new multilevel thresholding approach based on the Evolutionary Arithmetic Optimization Algorith...
Article
Full-text available
Covid-19 is a severe public health problem worldwide. To date, it has spanned worldwide, with 24.6 million infected with 835,843 confirm the death. Covid-19 detection is indeed an important task and has to be done as quickly as possible so that treatment and monitoring can be carried out early. The current world standard RT-PCR screening for Covid-...
Article
Full-text available
Universiti Sains Malaysia has started the Big Brain Data Initiative project since the last two years as brain mapping techniques have proven to be important in understanding the molecular, cellular and functional mechanisms of the brain. This Big Brain Data Initiative can be a platform for neurophysicians and neurosurgeons, psychiatrists, psycholog...
Chapter
Cloudlet is introduced to decrease the distance between Main Cloud and mobile users, which directly helps to decrease the latency during game video transmission from the Cloud to mobile users. In this proposed work, a Pre-Stored Cloudlet is introduced. Pre-stored Cloudlet is where the Cloudlet is pre-stored with encoded game videos in it transmitte...
Chapter
One of the important components of video-on-demand (VOD) systems is the hybrid storage server. This component consists of use hard disk drives (HDDs), solid-state drives (SSDs), and RAM, collectively fulfilling the requirement of simultaneous fast data access and large data distribution to numerous users. However, current hybrid storage systems sti...
Article
Full-text available
Nowadays, with the evolution of digital video broadcasting, as well as, the advent of high speed broadband networks, a new era of TV services has emerged known as IPTV. IPTV is a system that exploits the high speed broadband networks to deliver TV services to the subscribers. From the service provider viewpoint, the challenge in IPTV systems is how...
Article
The storage device is one of the main components of video on demand (VOD) server. The VOD storage system is responsible for storing and streaming large videos. Hence, the VOD server requires a large storage capacity and rapid video retrieval from this storage to quickly stream these videos to users. The hybrid storage system, which combines hard di...
Article
Full-text available
Nowadays, with the evolution of digital video broadcasting, as well as, the advent of high speed broadband networks, a new era of TV services has emerged known as IPTV. IPTV is a system that employs the high speed broadband networks to deliver TV services to the subscribers. From the service provider viewpoint, the challenge in IPTV systems is how...
Chapter
The on-premise point of sale (POS) system has been using by retailers for years. However, this system causes some user pains and problems, i.e. high capital investment, setup and maintenance hassle, lack of flexibility and reliability, and data security and privacy concern. Cloud computing as an emerging technology is used for developing a cloud-ba...
Conference Paper
Most of the video on demand (VOD) servers utilize conventional hard disk drives (HDDs) to keep huge number of video files. Large-scale VOD servers need to provision a large number of concurrent requests with fast response time. However, improving the performance of VOD server has become so obstructive and limited due to high latency of the disk acc...
Chapter
The authors model the content status in an IPTV environment. Cost reduction is an area of concern to service providers; therefore, it should be considered during the designing of IPTV delivery networks. The authors assess request distribution, replica placement and resource allocation. These are the key problems threatening IPTV delivery networks....
Chapter
This chapter explores the challenges that hinder Internet Protocol Television (IPTV) delivery networks and the current research directions that are looking at resolving these challenges in light of content characteristics. To make IPTV a popular and a standard platform worldwide, standardisations are conducted. IPTV standardisation aims to achieve...
Article
Full-text available
Program comprehension is an important process carried out involving much effort in software maintenance process. A key challenge to developers in program comprehension process is to comprehend a source code. Nowadays, software systems have grown in size ca using increase in developers' tasks to explore and understand millions of lines of source cod...
Article
Full-text available
Flash memory based SSDs offer several attractive features and benefits compared to hard disk drive (HDD), such as shock resistance, better performance especially for random data access, etc. Depending on the number of bits in each cell, Flash memory can be designed as single/multi/triple level cell (SLC/MLC/TLC) which have different performance, de...
Conference Paper
Abstract: Execution trace analysis is particularly valuable in the context of object-oriented software comprehension for the maintenance tasks. It involves analyzing dynamic information and behaviors that are stored in the execution trace. However, the execution traces of current object-oriented software systems tend to be very large in terms of co...
Article
Full-text available
This paper presents a new efficient embedding algorithm in the wavelet domain of digital images based on the diamond encoding (DE) scheme. Current discrete wavelet transform (DWT) steganography adds an unacceptable distortion to the images and is considered as an ineffective in terms of security. Applying the DE scheme to the current DWT steganogra...
Article
In the last few years, when two Internet users want to communicate via chatting application, they have to use the same application since each chatting application uses a certain signaling protocol to handle the chatting sessions. As a result, many researchers proposed some mapping architectures when two users want to communicate using different cha...
Article
Full-text available
In the near future, data is expected to double in every two years, which translates to more than one terabyte of data for every person on earth. The difficulty of storing and fetching required data from data centers and servers will consequently increase. As a result, significant attention has been given to the flash memory-based solid state drive...
Article
Full-text available
Due to the enormous improvement in networking and multimedia, IPTV has become recently a popular means to distribute high quality TV services over IP networks. Accordingly, Telecommunication companies started the competition to provide IPTV services to increase their customer base and profit. The key concern of service providers in this hectic comp...
Article
Full-text available
The Academy of Sciences Malaysia and the Malaysian Industry-Government group for High Technology has been working hard to project the future of big data and neurotechnology usage up to the year 2050. On the 19 September 2016, the International Brain Initiative was announced by US Under Secretary of State Thomas Shannon at a meeting that accompanied...
Article
Full-text available
This paper presents a new information embedding algorithm based on the diamond encoding (DE) scheme with different base-digits. The DE scheme conveys a large payload while maintaining image quality. However, it does not support embedding of digits with different bases, which is vital for any embedding method that considers image quality. The propos...
Article
Full-text available
Abstract—As a novel storage technology, SSD provide efficient features and challenges. The physical semiconductor characteristics of SSD result into high performance, power consumption, light size, shock resistance, and low noise. With all the benefits of SSD, replacing the conventional HDD drives with pure SSD may not be an efficient option for la...
Conference Paper
In the last few years, when two Internet users want to communicate via chatting application, they have to use the same application since each chatting application uses a certain signaling protocol to handle the chatting sessions. As a result, many researchers proposed some mapping architectures when two users want to communicate using different cha...
Article
A large-scale VOD system is one of the modern technologies that distribute information from various fields online. It is considered a part of the e-learning system, which helps disseminate teaching and learning materials. This research explores the benefits of storage technology to enhance the performance of a VOD system in term of serving multi-us...
Article
Over the last few years, when two Internet users want to communicate via chatting application, they have to use the same application since each chatting application uses a certain signaling protocol to handle the signaling and media sessions. As a result, many researchers have proposed some mapping architectures when two users want to communicate u...
Article
Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP) applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protoco...
Article
Full-text available
Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP) applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protoco...
Article
Full-text available
Nowadays, Multimedia Communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The interworking module is a very critical issue...
Conference Paper
Diabetes occurs when the pancreas fails to secrete enough insulin, slowly affecting the retina of the human eye, leading to diabetic retinopathy. The blood vessels in the retina get altered and have abnormality. Exudates are secreted, micro-aneurysms and haemorrhages occur in the retina. The appearance of these features represents the degree of sev...
Article
One factor of quality and quantity reduction in crop yields is plant disease. Consultation with plant pathologists to diagnose plant diseases is time consuming, considering that time is an important factor in disease control. Therefore, it is necessary to present a simple, fast, cheap, and precise method for diagnosing plant diseases. In this artic...
Article
Full-text available
Retinopathy of prematurity (ROP) is a disease that leads to blindness if the diagnosis is not made on time. Designing an automatic and intelligent system for early diagnosis can prevent the blindness in infants.However, the blood vessels in the retina of infants is less clear, hence the correct diagnosis of vessels is very difficult. In this study,...
Article
Full-text available
Illumination changes in a sequence of images are considered as a major challenge in tracking targets within a video image. In addition, the targets may overlap in cluttered scenes. In this paper, a real-time and high-precision method was presented for detecting moving targets in cluttered scenes. The Gaussian Mixture Model was used to obtain the mo...
Research
Full-text available
One factor of quality and quantity reduction in crop yields is plant disease. Consultation with plant pathologists to diagnose plant diseases is time consuming, considering that time is an important factor in disease control. Therefore, it is necessary to present a simple, fast, cheap, and precise method for diagnosing plant diseases. In this artic...
Article
Full-text available
Nowadays, Multimedia Communication has been improved rapidly to allow people to communicate via the Internet. However, users cannot communicate with each other unless they use the same chatting applications since each chatting application has its own control protocol to make the call. The mapping between different protocols is a very critical issue...
Article
Full-text available
Broadband capacity has increasingly been adopted by users. Therefore, additional multimedia strategies have been developed for the Internets. Video-on-demand (VOD) systems offer a wide variety of streaming services that significantly aggravate Internet traffic. In fact, VOD traffic will have accounted for more than 76% of all Internet traffic by 20...
Article
Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue...
Article
Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP) applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper studies the behavior of the widely common signaling protocol; InterAsterisk eXchange P...
Article
Full-text available
Modern web services have been broadly deployed on the Internet. Most of these services use multi-tier architecture for flexible scaling and software reusability. However, managing the performance of multi-tier web services under dynamic and unpredictable workload, and different resource demands in each tier is a critical problem for a service provi...
Conference Paper
The excessive consumption of network bandwidth for transmitting unwanted emails has always been a major problem in the web, since, the existing classification approaches are still lacking for a complete solution. This paper presents an enhanced vocabulary-based dictionary algorithm for protecting web user by receiving unwanted spam mails. The propo...
Article
As the number of internet users increases, email has been an efficient and popular communication mechanism. The integral of classification of text and image based email by machine learning approaches were used. Image email is one of the most recent tricks introduced by spammers. The unwanted text embedding into images which are sent as email attach...
Article
Full-text available
Digital image steganography is the practice of concealing secret messages into digital images with the intention transmitting the secret information. Despite that the steganography existence for quite some time now, it has only become significant in today’s digital world where information is frequently and easily exchanged through the Internet, ema...
Article
IPTV gained a significant attention from researchers and Internet service providers due to its ability to benefit from the capabilities of IP based networks to deliver TV related services with high level of QoS. One of the main problems in IPTV Delivery Networks is how to manage the huge amount of multimedia contents efficiently to meet the demands...
Article
Full-text available
This issue (DOI: 10.13140/RG.2.1.2640.1365) includes the following articles; P1151517372, G. Srinivasa Rao and V.Vijaya Kumar and Suresh Penmesta.Suresh varma, "Cellular Automata Clustering Based on Morphological Reconstruction (CACMR)", P1151536403, P.V.L. Suvarchala and S. Srinivas Kumar and B. Chandra Mohan, "Heterogeneous Features using S-Trans...
Data
Full-text available
This issue includes the following articles; P1151517372, G. Srinivasa Rao and V.Vijaya Kumar and Suresh Penmesta.Suresh varma, "Cellular Automata Clustering Based on Morphological Reconstruction (CACMR)", P1151536403, P.V.L. Suvarchala and S. Srinivas Kumar and B. Chandra Mohan, "Heterogeneous Features using S-Transform and Local Binary patterns fo...
Article
In the last few years, multimedia communications has been developed and improved rapidly in order to enable users to communicate between each other over the internet. In general, the multimedia techniques consist of instant messages, audio, and video chatting services. However, users cannot phonetically communicate with each other unless they use t...
Conference Paper
Full-text available
Monarch butterfly optimization (MBO) is a new metaheuristic algorithm mimics the migration of butterflies from northern USA to Mexico. In MBO, there are mainly two processes. In the first process, the algorithm emulates how some of the butterflies move from the current position to the new position by the migration operator. In the latter process, t...
Conference Paper
Video-on-demand (VOD) system allows users to access media any time without the need to leave their home. Hard disk drive (HDD) has become popular for VOD storage to store and deal with a large amount of data. In practical cases, disk storage throughput is limited by a slow HDD and disk operating degrades drastically when the server needs to serve m...
Conference Paper
Full-text available
Flash memory-based Solid State Disk (SSD) is a nonvolatile semiconductor memory which has several advantages over Hard Disk Drives (HDD) such as high energy efficiency, low access latency, less noise, reliability, no moving parts, lighter weight, small size and higher resilience to external shocks. However, the limited number of erase cycles for ea...
Conference Paper
Large-scale video on demand (VOD) services use hard disk drives (HDDs) to store large video files. However, VOD performance is limited by the relatively low bandwidth access and high HDD latency access, which increase dramatically when a VOD server receives a large number of simultaneous requests. By contrast, flash-based solid-state drives (SSDs)...
Article
Full-text available
Data coding and encoding standards require the high-performance error detection and correction algorithms. This paper presents the design error detection and corrects it by Galois Field and binary polynomial and extraction of its root. We start from GF(23) and reach to GF(28). The Galois Field is explained along with its requirement and relationshi...
Article
Full-text available
This paper provides a fast method to recognize a variety of Persian banknotes at different scales. In this technique, the PCA, LDA and sparse representation methods are utilized at feature extraction stage and follows with MLP neural networks, LVQ and SOM in classification. Finally, the application of sparse matrix representation method and combina...
Data
Full-text available
Steganography is the art and science of hiding secret information into digital media with the intention to transmit this information. Most of the steganographic methods either use spatial domain or frequency domain for embedding the secret information. Current hybrid methods require the original cover image to extract the secret information making...
Conference Paper
Full-text available
Brain-computer interface systems are communicative mediums between human brain and external device. One of the applications of these systems is P300 speller. This application provides the ability to spell the characters on the screen for disabled people. In this study, we review the character recognition and its relation to P300 detection. Then, we...
Article
Full-text available
Image-based steganography is the practice of embedding secret information into digital images with the intention to communicate the secret information. Embedding large sizes of secret information into digital images is one of the problems that image-based steganography encounters. The distortion of digital image increases with larger capacity, mean...
Article
Full-text available
At the last few years, multimedia communication has been developed and improved rapidly in order to enable users to communicate between each other over the internet. Generally, multimedia communication consists of audio and video communication. However, this research concentrates on audio conferencing only. The audio translation between protocols i...
Conference Paper
Full-text available
Abstract—Video on Demand (VOD) system is being one of the emerging systems that allow the user to view a video at anytime and anywhere. One of the important elements in this system is the broadcasting technique that is used to disseminate the video to the users. In this paper, a caching scheme was proposed to reduce the service waiting time in Vide...
Conference Paper
Nowadays, Multimedia Communication has been developed and improved rapidly in order to enable users to communicate between each other over the Internet. In general, the multimedia communication consists of audio, video and instant messages communication. This paper surveys the functions and the privileges of different VoIP protocols (i.e. InterAste...
Conference Paper
Nowadays, IPTV services are delivered over physical delivery networks, which suffer from the lack of flexibility in control and management. Virtual delivery networks, as a cost-effective alternative, tend to be the dominant delivery option in the near future due to its advantages for service providers. However, virtual networks provisioning is more...

Network

Cited By