2019
DOI: 10.11591/ijeecs.v13.i2.pp591-597
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of arithmetic coding data compression for internet of things applications

Abstract: <span style="font-size: 9pt; font-family: 'Times New Roman', serif;">Wireless Sensor Network (WSN) is known for its autonomous sensors, where it has been found to be useful during the development of Internet of Things (IoT) devices. However, WSN is also known for its limited energy supply and memory space, as it carries small-sized batteries and memory space. Hence, a data compression approach has been introduced in this paper with the purpose of solving this particular issue. This paper focused on the p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…One of the main entropy coding types creates and assigns every single symbol of the entry into a unique prefix-free code. There are more than 16 algorithms support entropy algorithms such as Arithmetic Coding [ 71 , 72 , 73 , 74 ], Asymmetric Numeral Systems (ANS) [ 75 , 76 , 77 ], Golomb Coding [ 78 , 79 ], Adaptive Huffman [ 80 , 81 , 82 ], Canonical Huffman [ 83 ], Modified Huffman [ 84 ], Range encoding [ 85 , 86 ], Shannon [ 87 ], Shannon–Fano [ 88 , 89 , 90 ], Shannon–Fano–Elias [ 91 ], Tunstall coding [ 92 , 93 ], Unary coding [ 94 , 95 , 96 ], Universal Exp-Golomb [ 97 , 98 ], Universal Fibonacci Coding [ 99 , 100 , 101 ], Universal Gamma Coding [ 102 , 103 ], Universal Levenshtein Coding [ 104 ].…”
Section: Compressionmentioning
confidence: 99%
“…One of the main entropy coding types creates and assigns every single symbol of the entry into a unique prefix-free code. There are more than 16 algorithms support entropy algorithms such as Arithmetic Coding [ 71 , 72 , 73 , 74 ], Asymmetric Numeral Systems (ANS) [ 75 , 76 , 77 ], Golomb Coding [ 78 , 79 ], Adaptive Huffman [ 80 , 81 , 82 ], Canonical Huffman [ 83 ], Modified Huffman [ 84 ], Range encoding [ 85 , 86 ], Shannon [ 87 ], Shannon–Fano [ 88 , 89 , 90 ], Shannon–Fano–Elias [ 91 ], Tunstall coding [ 92 , 93 ], Unary coding [ 94 , 95 , 96 ], Universal Exp-Golomb [ 97 , 98 ], Universal Fibonacci Coding [ 99 , 100 , 101 ], Universal Gamma Coding [ 102 , 103 ], Universal Levenshtein Coding [ 104 ].…”
Section: Compressionmentioning
confidence: 99%
“…The individual model exhibits its own pros and cons and is best fit for specific types of target complications. A discussion of problems in the Internet of Things (IoT) application [5][6][7][8][9] using regression analysis has been presented in [10]. In addition, each model can be recyclable and is built by a training set of algorithms using classical data.…”
Section: Related Studiesmentioning
confidence: 99%
“…Recently, due to the extremely rapid increase in the amount of information transmitted, computer networksare overloaded due to the low bandwidth of existing communication channels. This problem can be solved in two ways: by replacing existing communication lines with new ones with greater bandwidth, or by introducing new methods of data compression [1][2][3][4][5][6][7]. The first method requires significant financial costs, in addition, it is not always possible to replace communication lines; more often it is more advisable to use existing lines for data transmission than to lay new ones.…”
Section: Introductionmentioning
confidence: 99%