Putra Sumari
Universiti Sains Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Putra Sumari.
International Journal on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks | 2010
Saleh Ali Alomari; Putra Sumari
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it’s an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time , there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this paper, the more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks
Multimedia Tools and Applications | 2017
Samer Atawneh; Ammar Almomani; Hussein Al Bazar; Putra Sumari; B. B. Gupta
This paper presents a new efficient embedding algorithm in the wavelet domain of digital images based on the diamond encoding (DE) scheme. Current discrete wavelet transform (DWT) steganography adds an unacceptable distortion to the images and is considered as an ineffective in terms of security. Applying the DE scheme to the current DWT steganographic methods solves the problems of these methods, and reduces the distortion added to the images, and thus improves the embedding efficiency. The proposed algorithm first converts the secret image into a sequence of base-5 digits. After that, the cover image is transformed into the DWT domain and segmented into 2 × 1 coefficient pairs. The DE scheme is used then to change at most one coefficient of each coefficient pair to embed the base-5 digits. Experimental results depict that the proposed algorithm is more efficient in embedding compared to other methods in terms of embedding payload and image quality. Moreover, the proposed algorithm is attacked by well-known steganalysis software. Results are showing that the proposed algorithm is secure against the powerful universal steganalyzer “ensemble classifier” and the histogram attack. The results also reveal that the proposed algorithm is robust against different image processing attacks such as compression, added noise, and cropping attacks.
Iete Technical Review | 2013
Samer Atawneh; Ammar Almomani; Putra Sumari
Abstract The art and science of using digital images for secret communication is known as image steganography. This paper presents a background on key concepts behind it. A representation of steganography area is graphically and mathematically shown. The origin and history of this area, its important properties, and major applications are outlined. An introduction to steganalysis is provided. Distinctions between steganography, cryptography, and watermarking in terms of technique and intent are briefly discussed. Details of the way images are represented are outlined. Benefits and drawbacks of steganography domains are highlighted. Common approaches used for embedding messages into images are discussed in some detail. Methods used for embedding messages into images are also explored. Current steganography tools are highlighted. A demonstration of how secret information is embedded into an image through the use of available steganographic tools is shown. Comparisons between different image steganography algorithms are also provided.
ieee region 10 conference | 2009
Sadik A. M. Al-Taweel; Putra Sumari
The digital watermarks have recently been recognized as a solution for protecting the copyright of the digital multimedia. In this paper a novel DWT-based video watermarking algorithm is proposed based on a three-level DWT using Haar filter which is robust against geometric distortions such as Downscaling, Cropping, and Rotation. It is also robust against Image processing attacks such as low pass filtering (LPF), Median filtering, and Weiner filtering. Furthermore, the algorithm is robust against Noise attacks such as Gaussian noise, Salt and Pepper attacks. The embedded data rate is high and robust. The experimental results show that the embedded watermark is robust and invisible. The watermark was successfully extracted from the video after various attacks.
international symposium on information technology | 2008
Amir Rizaan Abdul Rahiman; Putra Sumari
Solid state disk (SSD) is a new storage device that utilizes semiconductor memory chips (e.g. RAM, EEPROM, flash memory) to store data rather than using conventional spinning platters and moving heads found in conventional magnetic disk drive. The term of “solid state” means there are no moving parts involve in accessing, storing and retrieving required data on the drive. Several benefits offered by the SSD drives due to absent of moving mechanical components are high access speed, light weight, ruggedness, low latency, low power consumption, and silent operation. This paper discusses the architecture and the advantage offered by SSD in using the drive as a storage device in video server.
pacific rim conference on multimedia | 2003
Zurida Ishak; Muhammad Rafie Mohd Arshad; Putra Sumari
Adaptive hypermedia system is a result from research on adaptive hypermedia and user modeling. This system is divided into different types. There are educational hypermedia, on-line-help systems, information retrieval hypermedia, institutional hypermedia, and systems for managing personalized views in information spaces. Adaptive hypermedia systems build model of the goals, preferences and knowledge of each individual user, and use this model throughout the interaction with the user, in order to adapt to the needs of that user. The goal of this paper is to present literature review of adaptive educational hypermedia systems including the architecture, approaches and techniques involved in building it.
ieee international conference on control system computing and engineering | 2015
Mohamed Ghetas; Chan Huah Yong; Putra Sumari
Monarch butterfly optimization (MBO) is a new metaheuristic algorithm mimics the migration of butterflies from northern USA to Mexico. In MBO, there are mainly two processes. In the first process, the algorithm emulates how some of the butterflies move from the current position to the new position by the migration operator. In the latter process, the algorithm tunes the position of other butterflies by adjusting operator. In order to enhance the search ability of MBO, an innovation method called MBHS is introduced to tackle the optimization problem. In MBHS, the harmony search (HS) adds mutation operators to the process of adjusting operator to enhance the exploitation, exploration ability, and speed up the convergence rate of MBO. For the purpose to validate the performance of MBHS, 14 benchmark functions are used, and the performance is compared with well-known search algorithms. The experimental results demonstrate that MBHS performs better than the basic MBO and other algorithms.
Multimedia Tools and Applications | 2014
Suliman Mohamed Ahmed Gaber; Putra Sumari
Load balancing is a crucial factor in IPTV delivery networks. Load balancing aims at utilizing the resources efficiently, maximizing the throughput, and minimizing the request rejection rate. The peer-service area is the recent architecture for IPTV delivery networks that overcomes the flaws of the previous architectures. However, it still suffers from the load imbalance problem. This paper investigates the load imbalance problem, and tries to augment the peer-service area architecture to overcome this problem. To achieve the load balancing over the proposed architecture, we suggest a new load-balancing algorithm that considers both the expected and the current load of both contents and servers. The proposed load-balancing algorithm consists of two stages. The first stage is the contents replication according to their expected load, while the second stage is the content-aware request distribution. To test the effectiveness of the proposed algorithm, we have compared it with both the traditional Round Robin algorithm and Cho algorithm. The experimental results depict that the proposed algorithm outperforms the two other algorithms in terms of load balance, throughput, and request rejection rate.
Journal of Communications | 2013
Samer Atawneh; Putra Sumari
Steganography is the art and science of hiding secret information into digital media with the intention to transmit this information. Most of the steganographic methods either use spatial domain or frequency domain for embedding the secret information. Current hybrid methods require the original cover image to extract the secret information making these methods to become not practical. This paper proposes a new blind steganographic method for digital images that combines spatial and frequency domains and does not rely on the cover image in extracting the secret information. The proposed method utilizes a chaotic map to scramble the secret information before the embedding procedure takes place. A coding map is generated during the work on spatial domain, and the original image is transformed into DWT domain, then the generated coding map is embedded in the coefficients of LL and HL sub-bands of the cover image. The drawn experimental results show that the resultant stego-images have high quality and the proposed method provides high embedding capacity compared with other methods and is robust against the visual analysis and other image processing attacks such as lossy compression and added noise.
Archive | 2011
Valliappan Raman; Putra Sumari; Patrick Hang Hui Then
In digital mammograms, accurate segmentation of tumor is very important stage; therefore we have chosen region based segmentation using haralic texture feature for our research. The main objective of this paper is to identify regions of interest and segment the tumors in digital mammograms. The segmented image is then analyzed for estimating tumor and the results are compared against previously known diagnosis of the radiologist. This paper shows the matlab implementation and experimental results of various stages in detecting and segmenting the tumor.