A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Regularly Lossy Functions and Their Applications
[article]
2018
IACR Cryptology ePrint Archive
In the normal mode, functions are injective and invertible with a trapdoor. In the lossy mode, functions statistically lose information about their inputs. ...
We demonstrate the utility of RLFs and their extensions in the leakage-resilient cryptography. • As a special case of RLFs, lossy functions imply leakage-resilient injective one-way functions with optimal ...
Dual projective hashing and its applications -lossy trapdoor functions and more. In Advances in Cryptology -EUROCRYPT 2012, volume 7237 of LNCS, pages 246-262. Springer, 2012. ...
dblp:journals/iacr/0003QX18
fatcat:7dmow5fr65hhbls2kauybc2dte
Computing Just What You Need: Online Data Analysis and Reduction at Extreme Scales
2017
2017 IEEE 24th International Conference on High Performance Computing (HiPC)
This change in focus complicates application and experiment design and introduces algorithmic, implementation, and programming model challenges that are unfamiliar to many scientists and that have major ...
Instead, applications must analyze and reduce data online so as to output only those results needed to answer target scientific question(s). ...
-Provide the infrastructure needed to create a testing framework (Cheetah) to evaluate reduction and analysis functions for performance on a variety of levels (application and platform) -Provide a reference ...
doi:10.1109/hipc.2017.00042
dblp:conf/hipc/Foster17
fatcat:li6yvnrkqbe6blhn72mqv64sre
Image Compression using Bayesian Fourier
2017
International Journal of Engineering Research and
It will have a user-friendly interface, and it will be web based software where the database of images clicked by the account holders will be stored in their accounts. ...
The software will have options for uploading the original image, compressing the image and downloading and storing the compressed output image in a desired folder of the system. ...
Image compression might be lossy or lossless. Lossless compression is favored for authentic purposes and regularly for medicinal imaging, specialized drawings, clip art, or comics. ...
doi:10.17577/ijertv6is050262
fatcat:enmkiphdsngurkxkfzy6sqtey4
An Adaptive Data Aggregation Algorithm in Wireless Sensor Network with Bursty Source
2009
Wireless Sensor Network
In the second case the sensor data goes under statistical process (average, maximum, minimum) and results are communicated to the base station, this is called lossy aggregation, because we cannot recover ...
Sensor network has severe energy constraints, redundant low data rate, and many-to-one flows. Aggregation is a technique to avoid redundant information to save energy and other resources. ...
In our system we consider both lossy and lossless types of aggregation. To choose between lossy and lossless is completely application dependent. ...
doi:10.4236/wsn.2009.13029
fatcat:2qv4vuxlarf6ncy5o5xbt2xfvq
Network-conscious compressed images over wireless networks
[chapter]
1998
Lecture Notes in Computer Science
We explain why this approach is useful in general and speci cally for wireless heterogeneous environments. ...
Using an Application Level Framing philosophy, an image is compressed into path MTU-size Application Data Units ADUs at the application layer. ...
In Figure 2b , there is better progressive display for two reasons: the transport protocol delivers TPDUs 3 and 4 to the application sooner, and, the application can perform their decompression even though ...
doi:10.1007/bfb0055313
fatcat:lwahcsor5bedxaln4nwcgcvpsi
Name-based Location Service for Mobile Agents in Wireless Sensor Networks
2008
Proceedings of the 1st International ICST Conference on Mobile Wireless Middleware, Operating Systems and Applications
Mobile agent technologies are effective ways of deploying applications in wireless sensor networks (WSN). ...
We show that our approach can enable communication with the nearest target agent and maintains a constant level of communication among mobile agents over the whole WSN. ...
In our method, the names of the agents that together form an application are defined according to their function or type. ...
doi:10.4108/icst.mobilware2008.2802
dblp:conf/mobilware/SuenagaH08
fatcat:c32e74ujlbds5otik6clmedxbq
Medical Data Compression and Transmission in Noisy WLANS: A Review
2019
International Journal of Grid and Distributed Computing
Computer-based modeling applications serve as possible approaches in designing easy-to-evaluate medical data communications. ...
This paper also reviews related research, especially studies on data compression algorithms and data transmission standards on Wi-Fi with past, present, and future directions. ...
ACKNOWLEDGMENTS This research was funded by the Ministry of Higher Education Libya and Elmergib University. ...
doi:10.33832/ijgdc.2019.12.2.01
fatcat:qsycpadysrc5beigzcaobbwvl4
Adaptive Joint Lossy Source-Channel Coding for Multihop IoT Networks
2020
Wireless Communications and Mobile Computing
We consider monitoring applications in multihop wireless sensor networks (WSNs), where nodes rely on limited batteries so that energy efficiency and reliability are of paramount importance. ...
Then, we evaluate the performance of the JLSCC system compared to lossy compression and ECC systems in both end-to-end and multihop communications. ...
error function. ...
doi:10.1155/2020/2127467
fatcat:zbelsecibfdppjatoscl6hi46u
Analysis of Efficiently Lossless Compression of Color Image by using Deferent Algorithms
2015
International Journal of Computer Applications
Digital Color Image required large amount of space to store and large bandwidth to transmit it. ...
Due to limitations in bandwidth and in storage space, it is vital requirement to compresses digital color image. ...
It is by and large utilized for applications that can't permit any contrast between the first and reconstructed information [2] . ...
doi:10.5120/19248-0888
fatcat:7aw4j2sp2rbwtb3uoyogabxw6y
An Intelligent Packet Loss Control Heuristic for Connectionless Real-Time Voice Communication
2010
Mathematical Problems in Engineering
Instead of detecting and resending lost voice packets, this heuristic estimates the packet loss rate adaptively using a modified version of reinforcement learning and resends the most critical packets ...
However, connectionless protocols such as UDP do not provide such packet loss control and suitable for real-time communication such as voice or video communication. ...
For different applications, different aging functions can be used. A general aging function used in this study is shown in 2.5 . ...
doi:10.1155/2010/984923
fatcat:rsx5l2oq7vajjfg37jbjpqvcjq
A STUDY ON THE IMPORTANCE OF IMAGE PROCESSING AND ITS APLLICATIONS
2014
International Journal of Research in Engineering and Technology
A systematic study on importance of image processing and its applications to the field of computer vision is carried out in this paper. ...
Some of the important applications of image processing in the field of science and technology include computer vision, remote sensing, feature extraction, face detection, forecasting, optical character ...
OCR is a meadow of research in intelligence, pattern and computer vision. Early versions required to be automated with images of each character, and functioned on one font at a time. ...
doi:10.15623/ijret.2014.0315029
fatcat:4f3s5q6whbaj7knuylb3bjt6mm
Image data compression using fast Fourier transform (FFT) technique for wireless sensor network
2024
AIP Conference Proceedings
Low-power LoRaWAN networks may regularly transmit compressed images from an agricultural region to a monitoring system up to 15 km away. ...
According to the numbers, the best achievable compression ratio is 49.04, with an MSE of 172.72 and a PSNR of 25.75 at its highest. ...
The authors express their gratitude to the Faculty of Electronic Engineering Technology at University Malaysia Perlis for their valuable guidance and to the Fundamental Research Grant Scheme (FRGS) for ...
doi:10.1063/5.0195298
fatcat:muzt2sr3wrbbri7dwgxrjgwepq
Passive Loss Inference in Wireless Sensor Networks Using EM Algorithm
2010
Wireless Sensor Network
Finally, we validate the algorithm through simulations and it exhibits good performance and scalability. ...
Our algorithm is applicable not only to periodic data collection scenarios but to event detection scenarios. ...
The presented algorithm passively monitors the application traffic between sensor nodes and the sink, and then uses network tomography technology [7, 8] to locate lossy links. ...
doi:10.4236/wsn.201027063
fatcat:wb7y55y3tjaothzjbo3rednlci
A Survey Paper on Context Base Routing Protocol (CBRP) in IoT
2020
International Journal of Engineering Research and
However, records isn't inherently associated with expertise in their context. ...
This information may additionally be available at the conversation end-points (applications) but now not when facts is in transit. ...
function. ...
doi:10.17577/ijertv9is090386
fatcat:6ngicpmnmrfeno4n66fbexm6ue
Compression Challenges in Large Scale Partial Differential Equation Solvers
2019
Algorithms
Often, bandwidth is the limiting factor due to the relatively small arithmetic intensity, and increasingly due to the growing disparity between computing power and bandwidth. ...
We illustrate concepts for particular methods, with examples, and give references to alternatives. ...
Acknowledgments: We thank Florian Wende for implementing mixed-precision preconditioners, Alexander Kammeyer for implementation and testing of checkpoint/restart, and Thomas Steinke for many helpful discussions ...
doi:10.3390/a12090197
fatcat:6ijsicazfbgxfgnma5sb4kow4q
« Previous
Showing results 1 — 15 out of 3,051 results