Using pre-determined patterns to analyze the common behavior of compressed data and their compressibility apeal
This paper studies the behavior of compressed/uncompressed data on predetermined binary patterns. These patterns were generated according to specific criteria to ensure that they represent binary files. Each pattern is structurally unique. This study shows that all compressed data behave almost sim...
| Main Authors: | Al-Khayyat, Kamal, Alshaikhli, Imad Fakhri Taha, V, Vijaykumar V |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Science Publishing Corporation
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/64305/ http://irep.iium.edu.my/64305/13/64305%20Using%20Pre-Determined%20Patterns.pdf http://irep.iium.edu.my/64305/14/64305%20Using%20Pre-Determined%20Patterns%20SCOPUS.pdf |
Similar Items
On randomness of compressed data using non-parametric
randomness tests
by: Al-Khayyat, Kamal A., et al.
Published: (2018)
by: Al-Khayyat, Kamal A., et al.
Published: (2018)
Increasing the runs in compressed data using a dedicated move to front algorithm
by: Al-Khayyat, Kamal A., et al.
Published: (2019)
by: Al-Khayyat, Kamal A., et al.
Published: (2019)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
A Pattern-Growth Sentence Compression Technique For Malay Text Summarizer
by: Alias, Suraya
Published: (2018)
by: Alias, Suraya
Published: (2018)
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Designing a smart city in Kuwait: an initial study
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
A lossless parallel data compression method using threads
by: Islam, Md. Rafiqul, et al.
Published: (2005)
by: Islam, Md. Rafiqul, et al.
Published: (2005)
Analysis of string matching compression algorithms
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
An Efficient Image Compression Technique using Tchebichef Bit Allocation
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Video compression techniques: an overview
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
Analysis of confidentiality algorithms in different mobile generations
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
Statistical analysis of the eSTREAM competition winners
by: Mohamed Eljadi, Fardous, et al.
Published: (2016)
by: Mohamed Eljadi, Fardous, et al.
Published: (2016)
Mobile technology generations and cryptographic algorithms: analysis study
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
Evaluation of usability problems of labor portal in Saudi Arabia
by: Alzuabi, Haifa Fahad, et al.
Published: (2013)
by: Alzuabi, Haifa Fahad, et al.
Published: (2013)
A new algorithm for human face detection using skin color tone
by: Zangana, Hewa Majeed, et al.
Published: (2013)
by: Zangana, Hewa Majeed, et al.
Published: (2013)
Compression of chemical signal using wavelet transform
by: S.A.A., Karim, et al.
Published: (2009)
by: S.A.A., Karim, et al.
Published: (2009)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Data recovery and business continuity in cloud computing: a review of the research literature
by: Alshammari, Mohammad M., et al.
Published: (2016)
by: Alshammari, Mohammad M., et al.
Published: (2016)
Low-complexity single-view and multi-view visual compression for visual sensor networks using block-based compressive sensing.
by: Mansoor Ebrahim,
Published: (2016)
by: Mansoor Ebrahim,
Published: (2016)
Development of scalable video compression algorithm
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Measuring the performance of image data by using RLE algorithm in lossless compression technique
by: Nurmarsyita, Mohd Shah
Published: (2015)
by: Nurmarsyita, Mohd Shah
Published: (2015)
Performance evaluation of multichannel audio compression
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Similar Items
-
On randomness of compressed data using non-parametric
randomness tests
by: Al-Khayyat, Kamal A., et al.
Published: (2018) -
Increasing the runs in compressed data using a dedicated move to front algorithm
by: Al-Khayyat, Kamal A., et al.
Published: (2019) -
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014) -
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018) -
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)