[HTML][HTML] A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications

U Jayasankar, V Thirumal, D Ponnurangam - Journal of King Saud …, 2021 - Elsevier
Explosive growth of data in digital world leads to the requirement of efficient technique to
store and transmit data. Due to limited resources, data compression (DC) techniques are …

Applications of machine learning in knowledge management system: a comprehensive review

CGK Simon, NZ Jhanjhi, WW Goh… - Journal of Information & …, 2022 - World Scientific
As new generations of technology appear, legacy knowledge management solutions and
applications become increasingly out of date, necessitating a paradigm shift. Machine …

Logzip: Extracting hidden structures via iterative clustering for log compression

J Liu, J Zhu, S He, P He, Z Zheng… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
System logs record detailed runtime information of software systems and are used as the
main data source for many tasks around software engineering. As modern software systems …

A framework for shopfloor material delivery based on real-time manufacturing big data

S Ren, X Zhao, B Huang, Z Wang, X Song - Journal of Ambient …, 2019 - Springer
Although auto-identification devices such as radio frequency identification and smart
sensors have been widely used in shopfloor management and control, major challenges still …

Compression of Text in Selected Languages—Efficiency, Volume, and Time Comparison

B Stecuła, K Stecuła, A Kapczyński - Sensors, 2022 - mdpi.com
The goal of the research was to study the possibility of using the planned language
Esperanto for text compression, and to compare the results of the text compression in …

Burrows–wheeler transform based lossless text compression using keys and Huffman coding

MA Rahman, M Hamada - Symmetry, 2020 - mdpi.com
Text compression is one of the most significant research fields, and various algorithms for
text compression have already been developed. This is a significant issue, as the use of …

A comprehensive analysis on image encryption and compression techniques with the assessment of performance evaluation metrics

N Mahendiran, C Deepa - SN Computer Science, 2021 - Springer
The explosive generation of data in the digital era directs to the requirements of effective
approaches to transmit and store the data. The necessities of security and limited resources …

Vibration edge computing in maritime IoT

AL Michala, I Vourganas, A Coraddu - ACM Transactions on Internet of …, 2021 - dl.acm.org
IoT and the Cloud are among the most disruptive changes in the way we use data today.
These changes have not significantly influenced practices in condition monitoring for …

Remote sensing and landsat image enhancement using multiobjective PSO based local detail enhancement

R Malik, R Dhir, SK Mittal - Journal of Ambient Intelligence and humanized …, 2019 - Springer
In remote sensing images, the common artifacts caused by existing contrast enhancement
methods, need to be minimized because pieces of important information are widespread …

Detecting counterfeit products by means of frequent pattern mining

MA Benatia, D Baudry, A Louis - Journal of Ambient Intelligence and …, 2022 - Springer
Product traceability is one of the major issues in supply chains management (eg, Food,
cosmetics, pharmaceutical, etc.). Several studies has shown that traceability allows targeted …