Statistical analysis of compression methods for storing binary image for low-memory systems
|
|
|
- Bertha Farmer
- 9 years ago
- Views:
Transcription
1 DSpace VSB-TUO OpenAIRE AEEE. 2013, vol. 11 Statistical analysis of compression methods for storing binary image for low-memory systems T11:50:11Z Downloaded from DSpace VSB-TUO
2 Statistical Analysis of Compression Methods for Storing Binary Image for Low-Memory Systems Roman SLABY, Jana NOWAKOVA, Radim HERCIK Department of Cybernetics and Biomedical Engineering, Faculty of Electrical Engineering and Computer Science, VSB Technical University of Ostrava, 17. listopadu 15, Ostrava-Poruba, Czech Republic Abstract. The paper is focused on the statistical comparison of the selected compression methods which are used for compression of the binary images. The aim is to asses, which of presented compression method for low-memory system requires less number of bytes of memory. For assessment of the success rates of the input image to binary image the correlation functions are used. Correlation function is one of the methods of OCR algorithm used for the digitization of printed symbols. Using of compression methods is necessary for systems based on low-power micro-controllers. The data stream saving is very important for such systems with limited memory as well as the time required for decoding the compressed data. The success rate of the selected compression algorithms is evaluated using the basic characteristics of the exploratory analysis. The searched samples represent the amount of bytes needed to compress the test images, representing alphanumeric characters. Keywords Data compression, exploratory analysis, image recognition, testing of statistical hypotheses. 1. Introduction Digital image processing is a fast growing discipline, which is caused by the rapidly increasing development of computer technology and using of this discipline in various fields of human activity. Recently, the usage of systems using digital image processing in industrial applications is frequently observed trend. Such systems are often only the single-purpose systems for evaluating a specific industrial process with minimal costs. Minimal costs of the realized systems can be achieved for example by using low-power microcontrollers, where the greatest problem can be in the insufficient size of RAM. The deficiency in many cases can be solved by the addition of Flash memory because the cost of this type of memory is lower than using the external RAM. Recognition systems use correlation functions for digitizing printed alpha-numeric characters using a set of patterns. Individual patterns represented by the binary values are compared by correlation function with the input image. The highest level of agreement expresses the digital printed form of alphanumeric character. For accurate digitization of printed character using the correlation function it is necessary to use a large set of characters, containing all possible characters that may occur in the input image. For this reason it is required corresponding memory space for all patterns. In such systems, the patterns are stored in flash memory; the RAM is reserved for purposes of correlation functions. Image processing speed depends on the effectiveness of the implemented detection algorithm, but also on the speed of the microprocessor itself. Because, the time required for writing or reading data from the flash memory can affect the speed of image processing. Therefore, it is necessary to ensure the amount of accesses to the data that is stored in Flash memory. One of the possible solution is to use a compression algorithm to compress binary patterns representing alphanumeric digits and their subsequent storage on the mini-mum number of pages used Flash memory [1], [2], [3]. 2. Compression Methods Data compression is a special procedure for data storing or data transporting, whose task is to reduce the data stream. All compression methods are based on the fact that commonly used methods of data representation are designed to allow easy manipulation of data, regardless of the fact that some parts of the data are often repeated. The consequence is that data for storing often needs more space than is absolutely necc 2013 ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING 290
3 essary. Lossless compression methods remove the redundant information without losing any data. In the paper two compression methods are presented and it is assessed the difference in amount of bytes which are needed for encoding the images [4], [5] Compression Method 1 The compression method 1 is lossless compression method used for compressing binary patterns. It is based on RLE lossless compression method with the difference that for encoding only one byte is used. The principle of the method is based on encoding information using a single byte, where the upper 7th bit represents the number of repeated occurrences. The principle of the compression method 1 is depicted in Fig. 1 [4], [5]. Fig. 3: The used patterns. Fig. 1: The principle of compression method 1 [1]. Fig. 4: User interface of the test application Compression Method 2 Method number two is based on the same principle as first presented compression method except that the compression method 2 contains the start byte and the sequence of data bytes. The start byte contains information about the value of the initial element of the original pattern and data bytes contain information about the frequency of individual occurrences. (Fig. 2) [4], [5]. Samples represent the number of bytes required to encode each pattern. Digital representation of alphanumeric characters is depicted in Fig. 3. Measurement was realized by specially developed user s application (Fig. 4). This application was developed in C#. Intuitive user interface allows you to set the basic parameters and to display the encoded data stream. The numbers of encoded bytes constituting the sampling, the individual patterns were then recorded in the table shown below. The samples are formed by the numbers of encoded bytes, for every pattern the numbers of bytes are written in Tab. 1. The statistical evaluation was realized using statistic tool SPSS version 18. Basic statistical parameters for both compression methods (Tab. 2) allow us easy comparison, and also the box chart is depicted in Fig. 5. Fig. 2: The principle of compression method 2 [1]. 3. Exploratory Data Analysis The section describes a summary of used methods for exploratory analysis and definition of hypotheses. 4. Hypotheses Testing In the section the testing normality, homoscedasticity and assessment of statistical significance of the observed difference are shown. c 2013 ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING 291
4 Tab. 1: The numbers of encoded bytes for described compression methods for image digits patterns storing. no. comp. method 1 comp. method Fig. 5: Box charts for both compression methods Assessment of Normality For assessment of normality the null (H0) and alternative hypothesis (HA) are defined H0: Data comes from a normal distribution, HA: Data do not come from a normal distribution. χ2 test of goodness could not have been used, because of the low number of observations identified in the samples [7]. For assessment of normality Kolmogorov - Smirnov test [8] was used Fig. 6, and it was found that for the compression method 1 p-value was determined as 0,185 and for the compression method 2 p-value was determined as 0,082. It means that the null hypothesis is not rejected at 0,05 significance level for both compression method, and it therefore can be said that both samples come from normal distribution. Kolmogorov-Smirnov test statistics can be seen on the chart, which compares the actual and theoretical distribution function in Fig Assessment of Homoscedasticity Tab. 2: Basic statistical parameters. comp. method 1 comp. method 2 Count Average 165,2 129,0 Median Variance Standart dev. 31,5 31,1 Minimum Maximum Range Next step is an assessment of equality of standard deviation of samples [7]. First, it is necessary to establish null (H0) and alternative hypothesis (HA) again: H0 : s 1 = s 2, (1) HA : s 1 > s 2. (2) The p-value was determined as 0,468. It means that, the null hypothesis is not rejected at significance level 0,05 and standard deviations of the samples can be considered as equal. c 2013 ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING 292
5 Fig. 6: Kolmogorov-Smirnov test statistics for compression compression method 1 and method Assessment of the Observed Difference - Student s T-test Student s t-test is used in statistics to verify the statistical difference of means of the samples on selected significance level. Student s t-test can be used only for samples which come from a normal distribution and their standard deviation must be considered as equal on selected significance level [7], [8]. Determination of null and alternative hypotheses: H0 : x 1 = x 2, (3) HA : x 1 > x 2. (4) P-value, as the result of the used Student s t-test, is 0,001. And it can be said that null hypothesis is rejected according to the result of Student s t-test on significance level 0,05 in favor of alternative hypothesis. So it means that the mean of sample of compression method 1 can be considered to be bigger than mean of sample of compression method Conclusion For the recognition systems the selection of the appropriate compression algorithm is very important part, because of trend of low-memory system usage. In the paper the suitability of selected compression method was described using statistical analysis. Both presented samples of both used compression methods come from normal distribution and the standard deviation can also be considered as equal. According to it, the difference of means of samples was assessed using Student s t-test. Based on it, the determination of null and alternative hypotheses was defined and it can be said that compression method 2 is more efficient that compression method 1 (the mean of number of bytes is lower for compression method 2 in comparison with method 1) in data stream. So the presented compression method 2 can be preferable for systems with limited memory space. Acknowledgment This work was supported by SGS VSB Technical University of Ostrava Grant No. SP2013/116, Project TACR TA and Grand aided student R. Hercik, Municipality of Ostrava, Czech Republic. References [1] MACHACEK, Z., R. SLABY, R. HERCIK and J. KOZIOREK. Advanced System for Consumption Meters with Recognition of Video Camera Signal. Electronics and electrical engineering. 2012, vol. 18, no. 10, pp ISSN DOI: /J01.EEE [2] LEIMER, J. Design factors in the development of an optical character recognition machine. IEEE Transactions on Information Theory. 1962, vol. 8, iss. 2, pp ISSN DOI: /TIT [3] GASHNIKOV, M., N. GLUMOV and V. SERGEYEV. Compression method for real-time systems of remote sensing. In: Proceedings 15th International Conference on Pattern Recognition. Barcelona: IEEE, 2000, pp DOI: /ICPR c 2013 ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING 293
6 [4] SALOMON, David. A concise introduction to data compression. London: Springer, ISBN [5] SALOMON, David. A guide to data compression methods. New York: Springer, ISBN [6] MYATT, Glenn J. Making sense of data: a practical guide to exploratory data analysis and data mining. Hoboken: Wiley-Interscience, ISBN [7] LEHMANN, E. L. and P. JOSEPH. Testing statistical hypotheses. 3rd ed. New York: Springer, ISBN [8] SHI, Ning-Zhong and J. TAO. Statistical hypothesis testing: theory and methods. Singapore: World Scientific Publishing, ISBN About Authors Roman SLABY was born in Prerov, in 2006 he started his studies at the VSB Technical University of Ostrava, he graduated in 2011 in Measurement and Control Engineering. Nowadays he continues to study in Technical Cybernetics. His areas of interest is image recognition and programming in C#. Jana NOWAKOVA was born in 1987 in Trinec. She received her MSc. in Measurement and Control from VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Science in Nowadays she continues her studies in Technical Cybernetics at the same faculty. She is interested in addition to fuzzy modeling, also in statistical data processing in cooperation with University Hospital Ostrava. Radim HERCIK was born in 1987 in Ostrava. He is a Ph.D. student and studies Technical Cybernetics on VSB Technical University of Ostrava, Faculty of Electrical Engineering and Computer Science. His areas of interest are the image processing and signal analysis with focus on industrial use. c 2013 ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING 294
Storage Optimization in Cloud Environment using Compression Algorithm
Storage Optimization in Cloud Environment using Compression Algorithm K.Govinda 1, Yuvaraj Kumar 2 1 School of Computing Science and Engineering, VIT University, Vellore, India [email protected] 2 School
THE IMPLEMENTATION OF INTERNAL COMMUNICATION SYSTEM AS A WAY TO COMPANY EFFICIENCY
THE IMPLEMENTATION OF INTERNAL COMMUNICATION SYSTEM AS A WAY TO COMPANY EFFICIENCY Jana Holá, Marcel Pikhart Introduction Internal communication as a managerial discipline has become important as a managerial
The enhancement of the operating speed of the algorithm of adaptive compression of binary bitmap images
The enhancement of the operating speed of the algorithm of adaptive compression of binary bitmap images Borusyak A.V. Research Institute of Applied Mathematics and Cybernetics Lobachevsky Nizhni Novgorod
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN [email protected] Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
The Relationship between Total Quality Management (TQM) and Strategic Management
The Relationship between Total Quality Management (TQM) and Strategic Management Marina Kantardjieva Abstract The increasing globalization of companies forces them to create a planned and integrated approach
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Performance analysis and comparison of virtualization protocols, RDP and PCoIP
Performance analysis and comparison of virtualization protocols, RDP and PCoIP Jiri Kouril, Petra Lambertova Department of Telecommunications Brno University of Technology Ustav telekomunikaci, Purkynova
The Bayesian Spam Filter with NCD. The Bayesian Spam Filter with NCD
The Bayesian Spam Filter with NCD The Bayesian Spam Filter with NCD Michal Prílepok 1, Jan Platoš 1, Václav Snášel 1, and Eyas El-Qawasmeh 2 Michal Prílepok 1, Jan Platoš 1, Václav Snášel 1, and Eyas El-Qawasmeh
SIP Registration Stress Test
SIP Registration Stress Test Miroslav Voznak and Jan Rozhon Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15/2172, 708 33 Ostrava Poruba CZECH REPUBLIC [email protected],
An Implementation of a High Capacity 2D Barcode
An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development
Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera
Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be
How to Send Video Images Through Internet
Transmitting Video Images in XML Web Service Francisco Prieto, Antonio J. Sierra, María Carrión García Departamento de Ingeniería de Sistemas y Automática Área de Ingeniería Telemática Escuela Superior
THE UTILISATION OF STATISTICAL METHODS IN THE AREA OF INVENTORY MANAGEMENT. Petr BESTA, Kamila JANOVSKÁ, Šárka VILAMOVÁ, Iveta VOZŇÁKOVÁ, Josef KUTÁČ
THE UTILISATION OF STATISTICAL METHODS IN THE AREA OF INVENTORY MANAGEMENT Petr BESTA, Kamila JANOVSKÁ, Šárka VILAMOVÁ, Iveta VOZŇÁKOVÁ, Josef KUTÁČ VSB Technical University of Ostrava, Ostrava, Czech
Projects Involving Statistics (& SPSS)
Projects Involving Statistics (& SPSS) Academic Skills Advice Starting a project which involves using statistics can feel confusing as there seems to be many different things you can do (charts, graphs,
Data, Measurements, Features
Data, Measurements, Features Middle East Technical University Dep. of Computer Engineering 2009 compiled by V. Atalay What do you think of when someone says Data? We might abstract the idea that data are
Intelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
Parametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2
HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2 1 Tata Consultancy Services, India [email protected] 2 Bangalore University, India ABSTRACT
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
Parallelization of video compressing with FFmpeg and OpenMP in supercomputing environment
Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 231 237 doi: 10.14794/ICAI.9.2014.1.231 Parallelization of video compressing
The Application of Talent Management at Human Resource Management in Organization
2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore The Application of Talent Management at Human Resource Management in Organization
FCE: A Fast Content Expression for Server-based Computing
FCE: A Fast Content Expression for Server-based Computing Qiao Li Mentor Graphics Corporation 11 Ridder Park Drive San Jose, CA 95131, U.S.A. Email: qiao [email protected] Fei Li Department of Computer Science
SIP Infrastructure Performance Testing
SIP Infrastructure Performance Testing MIROSLAV VOZNAK, JAN ROZHON Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15, Ostrava CZECH REPUBLIC [email protected],
Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System
Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System Ashish Jadhav 1, Mahesh Kumbhar 2, Mahesh Walunjkar 3 Lecturer, Dept. of Electronics and Telecommunication,
Independent t- Test (Comparing Two Means)
Independent t- Test (Comparing Two Means) The objectives of this lesson are to learn: the definition/purpose of independent t-test when to use the independent t-test the use of SPSS to complete an independent
Automatic Recognition Algorithm of Quick Response Code Based on Embedded System
Automatic Recognition Algorithm of Quick Response Code Based on Embedded System Yue Liu Department of Information Science and Engineering, Jinan University Jinan, China [email protected] Mingjun Liu
THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS
THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS O.U. Sezerman 1, R. Islamaj 2, E. Alpaydin 2 1 Laborotory of Computational Biology, Sabancı University, Istanbul, Turkey. 2 Computer Engineering
The use of binary codes to represent characters
The use of binary codes to represent characters Teacher s Notes Lesson Plan x Length 60 mins Specification Link 2.1.4/hi Character Learning objective (a) Explain the use of binary codes to represent characters
Cloud Based E-Learning Platform Using Dynamic Chunk Size
Cloud Based E-Learning Platform Using Dynamic Chunk Size Dinoop M.S #1, Durga.S*2 PG Scholar, Karunya University Assistant Professor, Karunya University Abstract: E-learning is a tool which has the potential
Tracking System for GPS Devices and Mining of Spatial Data
Tracking System for GPS Devices and Mining of Spatial Data AIDA ALISPAHIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo Zmaja
HYPOTHESIS TESTING WITH SPSS:
HYPOTHESIS TESTING WITH SPSS: A NON-STATISTICIAN S GUIDE & TUTORIAL by Dr. Jim Mirabella SPSS 14.0 screenshots reprinted with permission from SPSS Inc. Published June 2006 Copyright Dr. Jim Mirabella CHAPTER
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM Iuon Chang Lin Department of Management Information Systems, National Chung Hsing University, Taiwan, Department of Photonics and Communication Engineering,
Identifying Market Price Levels using Differential Evolution
Identifying Market Price Levels using Differential Evolution Michael Mayo University of Waikato, Hamilton, New Zealand [email protected] WWW home page: http://www.cs.waikato.ac.nz/~mmayo/ Abstract. Evolutionary
Barcode Based Automated Parking Management System
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Barcode Based Automated Parking Management System Parth Rajeshbhai Zalawadia 1 Jasmin
SoMA. Automated testing system of camera algorithms. Sofica Ltd
SoMA Automated testing system of camera algorithms Sofica Ltd February 2012 2 Table of Contents Automated Testing for Camera Algorithms 3 Camera Algorithms 3 Automated Test 4 Testing 6 API Testing 6 Functional
Compression techniques
Compression techniques David Bařina February 22, 2013 David Bařina Compression techniques February 22, 2013 1 / 37 Contents 1 Terminology 2 Simple techniques 3 Entropy coding 4 Dictionary methods 5 Conclusion
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
E-LEARNING IN COMPUTER SCIENCE EDUCATION. Rostislav Fojtík and Hashim Habiballa
E-LEARNING IN COMPUTER SCIENCE EDUCATION Rostislav Fojtík and Hashim Habiballa Abstract. The article describes the history and current state of computer science education in distance and e-learning forms
Computer and Set of Robots
Lesson 11:DESIGN PROCESS EXAMPLES Mobile-Phone, Mobile- Computer and Set of Robots 1 Mobile Phone 2 Mobile phone SoC (System-on-Chip) Hardware units Microcontroller or ASIP (Application Specific Instruction
PERFORMANCE ANALYSIS OF VIDEO FORMATS ENCODING IN CLOUD ENVIRONMENT
Suresh Gyan Vihar University Journal of Engineering & Technology (An International Bi Annual Journal) Vol. 1, Issue 1, 2015, pp 1 5 ISSN: 2395 0196 PERFORMANCE ANALYSIS OF VIDEO FORMATS ENCODING IN CLOUD
Dynamic resource management for energy saving in the cloud computing environment
Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan
SCIENCE ROAD JOURNAL
SCIENCE ROAD Journal SCIENCE ROAD JOURNAL Year: 2015 Volume: 03 Issue: 03 Pages: 278-285 Analyzing the impact of knowledge management on the success of customer communications with intermediary role of
Chapter 2 Probability Topics SPSS T tests
Chapter 2 Probability Topics SPSS T tests Data file used: gss.sav In the lecture about chapter 2, only the One-Sample T test has been explained. In this handout, we also give the SPSS methods to perform
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
ELECTRONIC DOCUMENT IMAGING
AIIM: Association for Information and Image Management. Trade association and professional society for the micrographics, optical disk and electronic image management markets. Algorithm: Prescribed set
Module 5: Statistical Analysis
Module 5: Statistical Analysis To answer more complex questions using your data, or in statistical terms, to test your hypothesis, you need to use more advanced statistical tests. This module reviews the
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Two-Sample T-Tests Assuming Equal Variance (Enter Means)
Chapter 4 Two-Sample T-Tests Assuming Equal Variance (Enter Means) Introduction This procedure provides sample size and power calculations for one- or two-sided two-sample t-tests when the variances of
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
Using SPSS, Chapter 2: Descriptive Statistics
1 Using SPSS, Chapter 2: Descriptive Statistics Chapters 2.1 & 2.2 Descriptive Statistics 2 Mean, Standard Deviation, Variance, Range, Minimum, Maximum 2 Mean, Median, Mode, Standard Deviation, Variance,
Two-Sample T-Tests Allowing Unequal Variance (Enter Difference)
Chapter 45 Two-Sample T-Tests Allowing Unequal Variance (Enter Difference) Introduction This procedure provides sample size and power calculations for one- or two-sided two-sample t-tests when no assumption
encoding compression encryption
encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -
Information, Entropy, and Coding
Chapter 8 Information, Entropy, and Coding 8. The Need for Data Compression To motivate the material in this chapter, we first consider various data sources and some estimates for the amount of data associated
Binary Factor Analysis with Help of Formal Concepts
Binary Factor Analysis with Help of Formal Concepts Aleš Keprt, Václav Snášel Aleš Keprt and Václav Snášel Department of computer science, FEI, VŠB Technical University Ostrava Department 17. of listopadu
Analyzing ChromeOS s Boot Performance
Analyzing ChromeOS s Boot Performance Alexis Emperador The University of Texas at Austin [email protected] Alison N. Norman The University of Texas at Austin [email protected] May 10, 2013 1 Abstract
FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA. Year 2015 Issued on December 11, 2015 Part II
1 of 11 FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA Year 2015 Issued on December 11, 2015 Part II 410th Regulation: Cash Register Security Regulation, [RKSV] 410th Regulation by the Federal Minister
Analysis of Compression Algorithms for Program Data
Analysis of Compression Algorithms for Program Data Matthew Simpson, Clemson University with Dr. Rajeev Barua and Surupa Biswas, University of Maryland 12 August 3 Abstract Insufficient available memory
Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system
Analysis of the Relationship between Strategic Management and Human Resources Management in Informatics Services Company of Tehran Province
Modern Applied Science; Vol. 10, No. 6; 2016 ISSN 1913-1844 E-ISSN 1913-1852 Published by Canadian Center of Science and Education Analysis of the Relationship between Strategic Management and Human Resources
Video compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
APPLYING CORRELATION ANALYSIS FOR EVALUATING THE CRM PERFORMANCE. Markéta ZAJAROŠOVÁ, Lenka KAUEROVÁ
APPLYING CORRELATION ANALYSIS FOR EVALUATING THE CRM PERFORMANCE Markéta ZAJAROŠOVÁ, Lenka KAUEROVÁ VSB Technical University of Ostrava, Faculty of Economics, Department of Marketing and Business, Ostrava,
Business Analytics (AQM5201)
Prof. Dr. Thomas Cleff Office hours: Thu, 3.30pm-5pm E-mail: [email protected] Business Analytics (AQM5201) Syllabus Summerterm 2015 Time: Thursday 9.45am-11.15am Room: W2.3.12 Begin: 19 th
Streaming Lossless Data Compression Algorithm (SLDC)
Standard ECMA-321 June 2001 Standardizing Information and Communication Systems Streaming Lossless Data Compression Algorithm (SLDC) Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http://www.ecma.ch
A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan
, pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak
Development and Evaluation of Point Cloud Compression for the Point Cloud Library
Development and Evaluation of Point Cloud Compression for the Institute for Media Technology, TUM, Germany May 12, 2011 Motivation Point Cloud Stream Compression Network Point Cloud Stream Decompression
High-Mix Low-Volume Flow Shop Manufacturing System Scheduling
Proceedings of the 14th IAC Symposium on Information Control Problems in Manufacturing, May 23-25, 2012 High-Mix Low-Volume low Shop Manufacturing System Scheduling Juraj Svancara, Zdenka Kralova Institute
telemetry Rene A.J. Chave, David D. Lemon, Jan Buermans ASL Environmental Sciences Inc. Victoria BC Canada [email protected] I.
Near real-time transmission of reduced data from a moored multi-frequency sonar by low bandwidth telemetry Rene A.J. Chave, David D. Lemon, Jan Buermans ASL Environmental Sciences Inc. Victoria BC Canada
Chapter 2: Basics on computers and digital information coding. A.A. 2012-2013 Information Technology and Arts Organizations
Chapter 2: Basics on computers and digital information coding Information Technology and Arts Organizations 1 Syllabus (1/3) 1. Introduction on Information Technologies (IT) and Cultural Heritage (CH)
Design of a NAND Flash Memory File System to Improve System Boot Time
International Journal of Information Processing Systems, Vol.2, No.3, December 2006 147 Design of a NAND Flash Memory File System to Improve System Boot Time Song-Hwa Park*, Tae-Hoon Lee*, and Ki-Dong
CLASSIFICATION AND CLUSTERING METHODS IN THE DECREASING OF THE INTERNET COGNITIVE LOAD
Acta Electrotechnica et Informatica No. 2, Vol. 6, 2006 1 CLASSIFICATION AND CLUSTERING METHODS IN THE DECREASING OF THE INTERNET COGNITIVE LOAD Kristína MACHOVÁ, Ivan KLIMKO Department of Cybernetics
Forecasting Stock Prices using a Weightless Neural Network. Nontokozo Mpofu
Forecasting Stock Prices using a Weightless Neural Network Nontokozo Mpofu Abstract In this research work, we propose forecasting stock prices in the stock market industry in Zimbabwe using a Weightless
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
Paper-based Document Authentication using Digital Signature and QR Code
2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department
EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko
380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko
IMPLEMENTATION OF QUALITY MANAGEMENT SYSTEM ACCORDING TO ISO 9001 AT VSB TECHNICAL UNIVERSITY OF OSTRAVA.
IMPLEMENTATION OF QUALITY MANAGEMENT SYSTEM ACCORDING TO ISO 9001 AT VSB TECHNICAL UNIVERSITY OF OSTRAVA. Milan Hutyra, quality manager, VSB Technical University of Ostrava, Czech Republic, e-mail: [email protected]
Analysis of the use of measurement systems using computers in a school science laboratory at primary schools in the Czech Republic
Analysis of the use of measurement systems using computers in a school science laboratory at primary schools in the Czech Republic Radek Nemec Abstract This article describes results of the analysis of
A Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
SIMERO Software System Design and Implementation
SIMERO Software System Design and Implementation AG Eingebettete Systeme und Robotik (RESY),, http://resy.informatik.uni-kl.de/ 1. Motivation and Introduction 2. Basic Design Decisions 3. Major System
Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN
ATM Terminal Security Using Fingerprint Reconition. Prof. B.Jolad, Tejshree Salunkhe, Rutuja Patil, Puja Shindgi Padmashree Dr. D. Y. Patil Institute Of Engineering and Technology,Pimpri,Pune - 411018
Alternative Biometric as Method of Information Security of Healthcare Systems
Alternative Biometric as Method of Information Security of Healthcare Systems Ekaterina Andreeva Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia [email protected]
Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
