Efficient Block Truncation Coding
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 6
Abstract
Block Truncation Coding (BTC) is one of the lossy image ompression techniques. The computational complexity involved in this method is very simple. In the proposed method, the feature of inter-pixel correlation is exploited to further reduce the requirement of bits to store a block. The proposed method gives very good performance in terms of bit-rate and PSNR values when compared to the conventional BTC.
Authors and Affiliations
K. Somasundaram , MS. S. Vimala
Mining Best-N Frequent Patterns in a Video Sequence
Video mining is used to discover and describe interesting patterns in video data, which has become one of the core problem areas of the data mining research community. Compared to the mining of other types of data (e.g.,...
An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks
In mobile ad hoc networks (MANETs), every node overhears every data transmission occurring in its vicinity and thus consumes energy unnecessarily. Although lots of research has been done on energy efficiency remains it i...
Service Based Architecture for Manufacturing Sector
SOA has been widely and quickly adopted in different rganizations during recent years. SOA enables to solve integration complexity problem and facilitates broadscale interoperability and unlimited collaboration across t...
Adaptive Background subtraction in Dynamic Environments Using Fuzzy Logic
Abstract— Extracting a background from an image is the enabling step for many high-level vision processing tasks, such as object tracking and activity analysis. Although there are a number of object extraction algorithms...
QoS Analysis of the Integrated UMTS and WLAN Ad Hoc Network in different Security Schemes with Wormhole Attack under large Scalability for CBR Voice Interactive Traffic
The selection of security schemes against Wormhole Attack (WHA) in next generation heterogeneous networks is based on major factors: authentication, confidentiality, and integrity and data availability. The effect of thi...