PERFORMANCE EVALUATION OF DATA COMPRESSION TECHNIQUES VERSUS DIFFERENT TYPES OF DATA

Faculty Computer Science Year: 2013
Type of Publication: ZU Hosted Pages:
Authors:
Journal: International Journal of Digital Content Technology and its Applications (JDCTA) (IJCSIS) International Journal of Computer Science and Information Security Volume:
Keywords : PERFORMANCE EVALUATION , DATA COMPRESSION TECHNIQUES VERSUS    
Abstract:
Data Compression plays an important role in the age of information technology. It is now very important a part of everyday life. Data compression has an important application in the areas of file storage and distributed systems. Because real world files usually are quit redundant, compression can often reduce the file sizes considerably, this in turn reduces the needed storage size and transfer channel capacity. This paper surveys a variety of data compression techniques spanning almost fifty years of research. This work illustrates how the performance of data compression techniques is varied when applying on different types of data. In this work the data compression techniques: Huffman, Adaptive Huffman and arithmetic, LZ77, LZW, LZSS, LZHUF, LZARI and PPM are tested against different types of data with different sizes. A framework for evaluation the performance is constructed and applied to these data compression techniques.
   
     
 
       

Author Related Publications

  • Nabil Ali Mohamed Lashen, "Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators", THE IMAGING SCIENCE JOURNAL, 2018 More
  • Nabil Ali Mohamed Lashen, "Copy-for-duplication forgery detection in colour images using QPCETMs and subimage approach", IET Image processing, 2019 More
  • Nabil Ali Mohamed Lashen, "Copy-move forgery detection of duplicated objects using accurate PCET moments and morphological operators", The Imaging Science Journal, 2018 More
  • Nabil Ali Mohamed Lashen, "A Novel CAD System for Reliable Classification of Microcalcifications in Digital Mammograms", JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 1, OCTOBER 2010, 2010 More
  • Nabil Ali Mohamed Lashen, "A comparison among Features Used in Offline Signature Verification Systems", JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 3, ISSUE 2, OCTOBER 2010, 2010 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet