A Historical Perspective on Approaches to Data Compression
Virendra Nikam,
Sheetal Dhande
Issue:
Volume 8, Issue 3, May 2023
Pages:
68-72
Received:
23 July 2022
Accepted:
9 August 2022
Published:
11 July 2023
Abstract: Several data compression algorithms are investigated in this study. Data compression is commonly utilized in the community. Because data compression allows us to conserve storage space, it can also assist to speed up data transport from one point to another. It is vital to have a compression tool on hand when compressing from one person to another. This method can be used to make data smaller. In addition to text data, images and video may be saved. Lossy and non-lossy compressions are the two types of compression techniques. Compression (lossless) and compression (lossy) which is, nevertheless, the most widely used? It is necessary to conduct lossless compression. Huffman, Shannon Fano, and other lossless compression techniques, as well as Tunstall, Lempel, Ziv Welch, and run-length encoding, are all instances of runlength encoding. This article explains how a compression strategy works and which approach is most typically used in data compression. A form of compression is text compression. The consequences of this process may be seen in the compressed file size, which is less than the original file. In this article, many data compression techniques are surveyed, including those developed by Shannon, Fano, and Huffman. Data compression seeks to increase active data density by minimizing redundant information in data that is stored or sent. Storage and distributed systems are two domains where data compression is crucial. Information theory ideas are thoroughly examined in relation to the objectives and assessment of data compression techniques. The algorithms that are presented are subjected to a framework that is created for the evaluation and comparison of approaches.
Abstract: Several data compression algorithms are investigated in this study. Data compression is commonly utilized in the community. Because data compression allows us to conserve storage space, it can also assist to speed up data transport from one point to another. It is vital to have a compression tool on hand when compressing from one person to another....
Show More
Ubiquitous Computing with Radio Frequency IDentification Tags
Shabbir Hassan,
Ahmad Raza Shibli,
Rehan Raza
Issue:
Volume 8, Issue 3, May 2023
Pages:
73-86
Received:
23 July 2023
Accepted:
14 August 2023
Published:
28 August 2023
Abstract: Ubiquitous computing is seen as a promising and revolutionary technological path. The goal of promoting marketable innovations and applications is addressed through intense research and developmental activities and policy strategies. This article discusses the state-of-the-art approach of the use case and the drawbacks of identification tags for radio frequency. Radio Frequency IDentification or RFID technology is a growing trend among separate automated technologies for identification. RFIDs are used in construction, engineering, chemical, manufacturing, retail, logistics, and other public industries. The importance and various advantages of RFID in different industries are therefore sometimes different. In this paper, we have performed an extensive literature survey of its current applications and the security measures that can be taken to improve the system. The paper gives an extended model of possible RFID applications in the field of mass gathering and other related applications such as crowd management and stampede management. To manage or optimize the degree of mortality rate concerning the size of the crowd, the paper proposes algorithmic approaches that can be implemented to minimize the degree of mortality. At the end of the RFID applications, other suggested applications have also been provided. Apart from the current RFID security measures, some proposed security solutions such as Tag Data Security, Maintaining Reader Integrity, Personal Privacy, and Improved Hash Lock have also been provided.
Abstract: Ubiquitous computing is seen as a promising and revolutionary technological path. The goal of promoting marketable innovations and applications is addressed through intense research and developmental activities and policy strategies. This article discusses the state-of-the-art approach of the use case and the drawbacks of identification tags for ra...
Show More