A Survey on the different text data compression techniques
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Compression is useful because it helps us to reduce the resources usage, such as data storage space or transmission capacity. Compression methods have a long list. In this paper, we shall discuss only the lossless compression techniques and not the lossy techniques as related to our work. In this, reviews of different basic lossless data compression methods are considered. The methods such as Shannon-Fano Coding, Huffman coding, Run Length Encoding and Arithmetic coding are considered. Lempel Ziv scheme is also considered which a dictionary based technique. A conclusion is derived on the basis of these methods.
Authors and Affiliations
Rajinder Kaur , Mrs. Monica Goyal
HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT
Cloud computing is a paradigm in which IT (information technology) application provide as a service. It allows users to utilize on-demand computation over internet, which is helpful for storage of data and servic...
Load Forecasting of Andhra Pradesh Grid using PSO, DE Algorithms
Load forecasting is an important component for power system energy management system. Precise load forecasting helps the electric utility to make unit commitment decisions, reduce spinning reserve capacity and sche...
750kv Transmission Line parameter and line Efficiency calculation and the performance of High Voltage alternating current Transmission system using MATLAB program
This paper presents the electrical system for 750kv transmission line and also that have been built throughout the world to operate above 700kv.This paper is provides information of system planning, design and programmin...
STUDY AND PERFORMANCE ANALYSIS OF CRYPTOGRAPHY ALGORITHMS
Today’s world, for secure data transmission via Internet or any public network, there is no alternative to cryptography. The role of Cryptography is most important in the field of network security. The main goal...
Using Genetic Algorithm for Symmetric key Generation in Image Encryption
Cryptography is essential for protecting information as the importance of security is increasing day by day with the advent of online transaction processing and e commerce. In now a day the security of digital imag...