Sumari PutraUniversiti Sains Malaysia | USM · School of Computer Science
Sumari Putra
PhD in Computer Science
About
176
Publications
74,810
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,566
Citations
Introduction
Skills and Expertise
Additional affiliations
June 2002 - present
Publications
Publications (176)
Brain-computer interface (BCI) is an innovative method of integrating technology for healthcare. Utilizing BCI technology allows for direct communication and/or control between the brain and an external device, thereby displacing conventional neuromuscular pathways. The primary goal of BCI in healthcare is to repair or reinstate useful function to...
Particularly in recent years, there has been increased interest in determining the ideal thresholding for picture segmentation. The best thresholding values are found using various techniques, including Otsu and Kapur-based techniques. These techniques work well for bi-level thresholding, but when used to find the appropriate thresholds for multi-l...
The sharing of open-access neuroimaging data has increased significantly during the last few years. Sharing neuroimaging data is crucial to accelerating scientific advancement, particularly in the field of neuroscience. A number of big initiatives that will increase the amount of available neuroimaging data are currently in development. The Big Bra...
Disruption of white matter integrity and its relationship with cognitive function in non-severe traumatic brain injury. Background: Impairment in cognitive function is a recognized outcome of traumatic brain injury (TBI). However, the degree of impairment has variable relationship with TBI severity and time post injury. The underlying pathology is...
Salak is one of the fruits plants in Southeast Asia; there are at least 30 cultivars of salak. The size, shape, skin color, sweetness or even flesh color will be different depending on the cultivar. Thus, classification of salak based on their cultivar become a daily job for the fruit farmers. There are many techniques that can be used for fruit cl...
Jackfruit (Artocarpus integer) and Cempedak (Artocarpus heterophyllus) are two different Southeast Asian fruit species from the same genus that are quite similar in their external appearance, therefore, sometimes difficult to be recognized visually by humans, especially in the form of pictures. Convolutional neural networks (CNN) and transfer learn...
Cempedak (Artocarpus heterophyllus) and nangka (Artocarpus integer) are highly similar in their external appearance and are difficult to recognize visually by a human. It is also common to name both jackfruits. Computer vision and deep convolutional neural networks (DCNN) can provide an excellent solution to recognize the fruits. Although several s...
Mango is one of the well known tropical fruits native to south asia and currently there are over 500 varieties of mangoes known. Depending on the variety, mango fruit can be varied in size, skin color, shape, sweetness, and flesh color which may be pale yellow, gold, or orange. However, sometimes it is difficult for us to differentiate what type of...
Image identification is a useful tool for classifying and organizing fruits in agribusiness. This study aims to use deep learning to construct a design for Sapodilla identification and classification. Sapodilla comes in a various of varieties from throughout the world. Sapodilla can come in different sizes, form, and taste depending on species and...
Rambutan (Nephelium lappaceum L.) is a widely grown and favored fruit in tropical countries such as Malaysia, Indonesia, Thailand, and the Philippines. This fruit is classified into tens of different cultivars based on fruit, flesh, and tree features. In this project, five different rambutan cultivars classification models using deep learning techn...
There are many species of Artocarpus fruits in Malaysia, which have different market potentials. This study classifies 4 species of Artocarpus fruits using deep learning approach, which is Convolutional Neural Network (CNN). A new proposed CNN model is compared with pre-trained models, i.e., VGG-16, ResNet50, and Xception. Effects of variables, i.e...
Fruit recognition becomes more and more important in the agricultural industry. Traditionally, we need to manually identify and label all the fruits in the production line, which is labor intensive, error-prone, and ineffective. Therefore, a lot of fruit recognition systems are created to automate the process, but fruit recognition system for Malay...
Urban areas worldwide are in the race to become smarter, and the Kingdom of Saudi Arabia (KSA) is no exception. Many of these have envisaged a chance to establish devoted municipal access networks to assist all kinds of city administration and preserve services needing data connectivity. Organizations unanimously concentrate on sustainability issue...
Background
Impairment in cognitive function is a recognized outcome of traumatic brain injury (TBI). However, the degree of impairment has variable relationship with TBI severity and time post injury. The underlying pathology is often due to diffuse axonal injury that has been found even in mild TBI. In this study, we examine the state of white mat...
Jackfruit (Artocarpus integer) and Cempedak (Artocarpus heterophyllus) are two different Southeast Asian fruit species from the same genus that are quite similar in their external appearance, therefore, sometimes difficult to be recognized visually by humans, especially in the form of pictures. Convolutional neural networks (CNN) and transfer learn...
The ability to recognize a grocery on the shelf of a retail store is an ordinary human skill. Automatic detection of grocery on the shelf of retail store provides enhanced value-added to consumer experience, commercial benefits to retailers and efficient monitoring to domestic enforcement ministry. Compared to machine vision-based object recognitio...
Organic waste management (OWM) has always been a fundamental aspect of human
populations. Approaches to OWM must be matched to the characteristics of a certain population.
In this consideration, the Kingdom of Saudi Arabia (KSA) is no exception. Organizations are being
aligned to focus on sustainability matters sharing significant features with uni...
The intrusion detection system is a method for detection against attacks, making it one of the essential defense layers. Researchers are trying to find new algorithms to inspect all inbound and outbound activities and identify suspicious patterns that may show an attempted system attack. The proposed technique for detecting intrusions uses the Grey...
This paper provides an in-depth literature review of the Black Hole Algorithm (BHA) which is considered as a recent metaheuristic. BHA has been proven to be very efficient in different applications. There has been several modifications and variants of this algorithm in the literature, so this work reviews various variants of the BHA. The applicatio...
Real-world engineering design problems are widespread in various research disciplines in both industry and industry. Many optimization algorithms have been employed to address these kinds of problems. However, the algorithm’s performance substantially reduces with the increase in the scale and difficulty of problems. Various versions of the optimiz...
Electroencephalogram (EEG) is a neurotechnology used to measure brain activity via brain impulses. Throughout the years, EEG has contributed tremendously to data-driven research models (e.g., Generalised Linear Models, Bayesian Generative Models, and Latent Space Models) in Neuroscience Technology and Neuroinformatic. Due to versatility, portabilit...
Waste Management System (WMS) is applied in smart cities and is supported by the Internet of Things (IoT). WMS involves several responsibilities, such as collection, disposal, and utilization of waste in relevant facilities. Efficient waste management has a considerable impact on the quality of life of citizens in smart cities. The interaction betw...
Matlab Code
Reptile Search Algorithm (RSA) is a novel nature-inspired meta-heuristic optimizer, motivated by the hunting behaviour of Crocodiles. The performance of the proposed RSA is evaluated using twenty-three classical test functions, thirty CEC2017 test functions, ten CEC2019 test functions, and seven real-world engineering problems.
This paper proposes a novel nature-inspired meta-heuristic optimizer, called Reptile Search Algorithm (RSA), motivated by the hunting behaviour of Crocodiles. Two main steps of Crocodile behaviour are implemented, such as encircling, which is performed by high walking or belly walking, and hunting, which is performed by hunting coordination or hunt...
Fruits come in different variants and subspecies. While some subspecies of fruits can be easily differentiated, others may require an expertness to differentiate them. Although farmers rely on the traditional methods to identify and classify fruit types, the methods are prone to so many challenges. Training a machine to identify and classify fruit...
The Internet of Drones (IoD) has become a hot research topic in academia, industry, and management in current years due to its wide potential applications, such as aerial photography, civilian, and military. This paper presents a comprehensive survey of IoD and its applications, deployments, and integration. We focused in this review on two main si...
In this paper, a review on the three most important communication techniques (ground, aerial, and underwater vehicles) has been presented that throws light on trajectory planning, its optimization, and various issues in a summarized way. This kind of extensive research is not often seen in the literature, so an effort has been made for readers inte...
Covid-19 is a serious public health problem worldwide. To date, it has spanned worldwide with 12.8 million infected and 566,909 confirm death. Covid-19 screening is indeed an important task and has to be done quickly as possible to many people so that early treatment can be done. The current world RT-PCR standard screening for Covid-19 detection no...
Space exploration refers to constructing a map with the aid of sensor data. This exploration is achieved utilizing a group of robots in an obstacle cluttered environment and distributing tasks amongst these robot(s). The robotic configuration is equipped with sensors to acquire data from the surroundings and to ensure collision-free motion. This pa...
Cyberstalking is a growing anti-social problem being transformed on a large scale and in various forms. Cyberstalking detection has become increasingly popular in recent years and has technically been investigated by many researchers. However, cyberstalking victimization, an essential part of cyberstalking, has empirically received less attention f...
One of the most crucial aspects of image segmentation is multilevel thresholding. However, multilevel thresholding becomes increasingly more computationally complex as the number of thresholds grows. In order to address this defect, this paper proposes a new multilevel thresholding approach based on the Evolutionary Arithmetic Optimization Algorith...
Covid-19 is a severe public health problem worldwide. To date, it has spanned worldwide, with 24.6 million infected with 835,843 confirm the death. Covid-19 detection is indeed an important task and has to be done as quickly as possible so that treatment and monitoring can be carried out early. The current world standard RT-PCR screening for Covid-...
Universiti Sains Malaysia has started the Big Brain Data Initiative project since the last two years as brain mapping techniques have proven to be important in understanding the molecular, cellular and functional mechanisms of the brain. This Big Brain Data Initiative can be a platform for neurophysicians and neurosurgeons, psychiatrists, psycholog...
Cloudlet is introduced to decrease the distance between Main Cloud and mobile users, which directly helps to decrease the latency during game video transmission from the Cloud to mobile users. In this proposed work, a Pre-Stored Cloudlet is introduced. Pre-stored Cloudlet is where the Cloudlet is pre-stored with encoded game videos in it transmitte...
One of the important components of video-on-demand (VOD) systems is the hybrid storage server. This component consists of use hard disk drives (HDDs), solid-state drives (SSDs), and RAM, collectively fulfilling the requirement of simultaneous fast data access and large data distribution to numerous users. However, current hybrid storage systems sti...
Nowadays, with the evolution of digital video broadcasting, as well as, the advent of high speed broadband networks, a new era of TV services has emerged known as IPTV. IPTV is a system that exploits the high speed broadband networks to deliver TV services to the subscribers. From the service provider viewpoint, the challenge in IPTV systems is how...
The storage device is one of the main components of video on demand (VOD) server. The VOD storage system is responsible for storing and streaming large videos. Hence, the VOD server requires a large storage capacity and rapid video retrieval from this storage to quickly stream these videos to users. The hybrid storage system, which combines hard di...
Nowadays, with the evolution of digital video broadcasting, as well as, the advent of high speed broadband networks, a new era of TV services has emerged known as IPTV. IPTV is a system that employs the high speed broadband networks to deliver TV services to the subscribers. From the service provider viewpoint, the challenge in IPTV systems is how...
The on-premise point of sale (POS) system has been using by retailers for years. However, this system causes some user pains and problems, i.e. high capital investment, setup and maintenance hassle, lack of flexibility and reliability, and data security and privacy concern. Cloud computing as an emerging technology is used for developing a cloud-ba...
Most of the video on demand (VOD) servers utilize conventional hard disk drives (HDDs) to keep huge number of video files. Large-scale VOD servers need to provision a large number of concurrent requests with fast response time. However, improving the performance of VOD server has become so obstructive and limited due to high latency of the disk acc...
The authors model the content status in an IPTV environment. Cost reduction is an area of concern to service providers; therefore, it should be considered during the designing of IPTV delivery networks. The authors assess request distribution, replica placement and resource allocation. These are the key problems threatening IPTV delivery networks....
This chapter explores the challenges that hinder Internet Protocol Television (IPTV) delivery networks and the current research directions that are looking at resolving these challenges in light of content characteristics. To make IPTV a popular and a standard platform worldwide, standardisations are conducted. IPTV standardisation aims to achieve...
Program comprehension is an important process carried out involving much effort in software maintenance process. A key challenge to developers in program comprehension process is to comprehend a source code. Nowadays, software systems have grown in size ca using increase in developers' tasks to explore and understand millions of lines of source cod...
Flash memory based SSDs offer several attractive features and benefits compared to hard disk drive (HDD), such as shock resistance, better performance especially for random data access, etc. Depending on the number of bits in each cell, Flash memory can be designed as single/multi/triple level cell (SLC/MLC/TLC) which have different performance, de...
Abstract:
Execution trace analysis is particularly valuable in the context of object-oriented software comprehension for the maintenance tasks. It involves analyzing dynamic information and behaviors that are stored in the execution trace. However, the execution traces of current object-oriented software systems tend to be very large in terms of co...
This paper presents a new efficient embedding algorithm in the wavelet domain of digital images based on the diamond encoding (DE) scheme. Current discrete wavelet transform (DWT) steganography adds an unacceptable distortion to the images and is considered as an ineffective in terms of security. Applying the DE scheme to the current DWT steganogra...
In the last few years, when two Internet users want to communicate via chatting application, they have to use the same application since each chatting application uses a certain signaling protocol to handle the chatting sessions. As a result, many researchers proposed some mapping architectures when two users want to communicate using different cha...
In the near future, data is expected to double in every two years, which translates to more than one terabyte of data for every person on earth. The difficulty of storing and fetching required data from data centers and servers will consequently increase. As a result, significant attention has been given to the flash memory-based solid state drive...
Due to the enormous improvement in networking and multimedia, IPTV has become recently a popular means to distribute high quality TV services over IP networks. Accordingly, Telecommunication companies started the competition to provide IPTV services to increase their customer base and profit. The key concern of service providers in this hectic comp...
The Academy of Sciences Malaysia and the Malaysian Industry-Government group for High Technology has been working hard to project the future of big data and neurotechnology usage up to the year 2050. On the 19 September 2016, the International Brain Initiative was announced by US Under Secretary of State Thomas Shannon at a meeting that accompanied...
This paper presents a new information embedding algorithm based on the diamond encoding (DE) scheme with different base-digits. The DE scheme conveys a large payload while maintaining image quality. However, it does not support embedding of digits with different bases, which is vital for any embedding method that considers image quality. The propos...
Abstract—As a novel storage technology, SSD provide efficient features and challenges. The physical semiconductor characteristics of SSD result into high performance, power consumption, light size, shock resistance, and low noise. With all the benefits of SSD, replacing the conventional HDD drives with pure SSD may not be an efficient option for la...
In the last few years, when two Internet users want to communicate via chatting application, they have to use the same application since each chatting application uses a certain signaling protocol to handle the chatting sessions. As a result, many researchers proposed some mapping architectures when two users want to communicate using different cha...
A large-scale VOD system is one of the modern technologies that distribute information from various fields online. It is considered a part of the e-learning system, which helps disseminate teaching and learning materials. This research explores the benefits of storage technology to enhance the performance of a VOD system in term of serving multi-us...
Over the last few years, when two Internet users want to communicate via chatting application, they have to use the same application since each chatting application uses a certain signaling protocol to handle the signaling and media sessions. As a result, many researchers have proposed some mapping architectures when two users want to communicate u...
Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP) applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protoco...
Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP) applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protoco...
Nowadays, Multimedia Communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The interworking module is a very critical issue...
Diabetes occurs when the pancreas fails to secrete enough insulin, slowly affecting the retina of the human eye, leading to diabetic retinopathy. The blood vessels in the retina get altered and have abnormality. Exudates are secreted, micro-aneurysms and haemorrhages occur in the retina. The appearance of these features represents the degree of sev...
One factor of quality and quantity reduction in crop yields is plant disease. Consultation with plant pathologists to diagnose plant diseases is time consuming, considering that time is an important factor in disease control. Therefore, it is necessary to present a simple, fast, cheap, and precise method for diagnosing plant diseases. In this artic...
Retinopathy of prematurity (ROP) is a disease that leads to blindness if the diagnosis is not made on time. Designing an automatic and intelligent system for early diagnosis can prevent the blindness in infants.However, the blood vessels in the retina of infants is less clear, hence the correct diagnosis of vessels is very difficult. In this study,...
Illumination changes in a sequence of images are considered as a major challenge in tracking targets within a video image. In addition, the targets may overlap in cluttered scenes. In this paper, a real-time and high-precision method was presented for detecting moving targets in cluttered scenes. The Gaussian Mixture Model was used to obtain the mo...
One factor of quality and quantity reduction in crop yields is plant disease. Consultation with plant pathologists to diagnose plant diseases is time consuming, considering that time is an important factor in disease control. Therefore, it is necessary to present a simple, fast, cheap, and precise method for diagnosing plant diseases. In this artic...
Nowadays, Multimedia Communication has been improved rapidly to allow people to communicate via the Internet. However, users cannot communicate with each other unless they use the same chatting applications since each chatting application has its own control protocol to make the call. The mapping between different protocols is a very critical issue...
Broadband capacity has increasingly been adopted by users. Therefore, additional multimedia
strategies have been developed for the Internets. Video-on-demand (VOD) systems offer a wide variety
of streaming services that significantly aggravate Internet traffic. In fact, VOD traffic will have
accounted for more than 76% of all Internet traffic by 20...
Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue...
Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP) applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper studies the behavior of the widely common signaling protocol; InterAsterisk eXchange P...
Modern web services have been broadly deployed on the Internet. Most of these services use multi-tier architecture for flexible scaling and software reusability. However, managing the performance of multi-tier web services under dynamic and unpredictable workload, and different resource demands in each tier is a critical problem for a service provi...
The excessive consumption of network bandwidth for transmitting unwanted emails has always been a major problem in the web, since, the existing classification approaches are still lacking for a complete solution. This paper presents an enhanced vocabulary-based dictionary algorithm for protecting web user by receiving unwanted spam mails. The propo...
As the number of internet users increases, email has been an efficient and popular communication mechanism. The integral of classification of text and image based email by machine learning approaches were used. Image email is one of the most recent tricks introduced by spammers. The unwanted text embedding into images which are sent as email attach...
Digital image steganography is the practice of concealing secret messages into digital images with the intention transmitting the secret information. Despite that the steganography existence for quite some time now, it has only become significant in today’s digital world where information is frequently and easily exchanged through the Internet, ema...
IPTV gained a significant attention from researchers and Internet service providers due to its ability to benefit from the capabilities of IP based networks to deliver TV related services with high level of QoS. One of the main problems in IPTV Delivery Networks is how to manage the huge amount of multimedia contents efficiently to meet the demands...
This issue (DOI: 10.13140/RG.2.1.2640.1365) includes the following articles; P1151517372, G. Srinivasa Rao and V.Vijaya Kumar and Suresh Penmesta.Suresh varma, "Cellular Automata Clustering Based on Morphological Reconstruction (CACMR)", P1151536403, P.V.L. Suvarchala and S. Srinivas Kumar and B. Chandra Mohan, "Heterogeneous Features using S-Trans...
This issue includes the following articles; P1151517372, G. Srinivasa Rao and V.Vijaya Kumar and Suresh Penmesta.Suresh varma, "Cellular Automata Clustering Based on Morphological Reconstruction (CACMR)", P1151536403, P.V.L. Suvarchala and S. Srinivas Kumar and B. Chandra Mohan, "Heterogeneous Features using S-Transform and Local Binary patterns fo...
In the last few years, multimedia communications has been developed and improved rapidly in order to enable users to communicate between each other over the internet. In general, the multimedia techniques consist of instant messages, audio, and video chatting services. However, users cannot phonetically communicate with each other unless they use t...
Monarch butterfly optimization (MBO) is a new metaheuristic algorithm mimics the migration of butterflies from northern USA to Mexico. In MBO, there are mainly two processes. In the first process, the algorithm emulates how some of the butterflies move from the current position to the new position by the migration operator. In the latter process, t...
Video-on-demand (VOD) system allows users to access media any time without the need to leave their home. Hard disk drive (HDD) has become popular for VOD storage to store and deal with a large amount of data. In practical cases, disk storage throughput is limited by a slow HDD and disk operating degrades drastically when the server needs to serve m...
Flash memory-based Solid State Disk (SSD) is a nonvolatile semiconductor memory which has
several advantages over Hard Disk Drives (HDD) such as high energy efficiency, low access
latency, less noise, reliability, no moving parts, lighter weight, small size and higher resilience
to external shocks. However, the limited number of erase cycles for ea...
Large-scale video on demand (VOD) services use hard disk drives (HDDs) to store large video files. However, VOD performance is limited by the relatively low bandwidth access and high HDD latency access, which increase dramatically when a VOD server receives a large number of simultaneous requests. By contrast, flash-based solid-state drives (SSDs)...
Data coding and encoding standards require the high-performance error detection and correction algorithms. This paper presents the design error detection and corrects it by Galois Field and binary polynomial and extraction of its root. We start from GF(23) and reach to GF(28). The Galois Field is explained along with its requirement and relationshi...
This paper provides a fast method to recognize a variety of Persian banknotes at different scales. In this technique, the PCA, LDA and sparse representation methods are utilized at feature extraction stage and follows with MLP neural networks, LVQ and SOM in classification. Finally, the application of sparse matrix representation method and combina...
Steganography is the art and science of hiding secret information into digital media with the intention to transmit this information. Most of the steganographic methods either use spatial domain or frequency domain for embedding the secret information. Current hybrid methods require the original cover image to extract the secret information making...
Brain-computer interface systems are communicative mediums between human brain and external device. One of the applications of these systems is P300 speller. This application provides the ability to spell the characters on the screen for disabled people. In this study, we review the character recognition and its relation to P300 detection. Then, we...
Image-based steganography is the practice of embedding secret information into digital images with the intention to communicate the secret information. Embedding large sizes of secret information into digital images is one of the problems that image-based steganography encounters. The distortion of digital image increases with larger capacity, mean...
At the last few years, multimedia communication has been developed and improved rapidly in order to enable users to communicate between each other over the internet. Generally, multimedia communication consists of audio and video communication. However, this research concentrates on audio conferencing only. The audio translation between protocols i...
Abstract—Video on Demand (VOD) system is being one of the
emerging systems that allow the user to view a video at anytime and
anywhere. One of the important elements in this system is the
broadcasting technique that is used to disseminate the video to the
users. In this paper, a caching scheme was proposed to reduce the
service waiting time in Vide...
Nowadays, Multimedia Communication has been developed and improved rapidly in order to enable users to communicate between each other over the Internet. In general, the multimedia communication consists of audio, video and instant messages communication. This paper surveys the functions and the privileges of different VoIP protocols (i.e. InterAste...
Nowadays, IPTV services are delivered over physical delivery networks, which suffer from the lack of flexibility in control and management. Virtual delivery networks, as a cost-effective alternative, tend to be the dominant delivery option in the near future due to its advantages for service providers. However, virtual networks provisioning is more...