Redalyc.A Lossy Method for Compressing Raw CCD Images

Total Page:16

File Type:pdf, Size:1020Kb

Redalyc.A Lossy Method for Compressing Raw CCD Images Revista Mexicana de Astronomía y Astrofísica ISSN: 0185-1101 [email protected] Instituto de Astronomía México Watson, Alan M. A Lossy Method for Compressing Raw CCD Images Revista Mexicana de Astronomía y Astrofísica, vol. 38, núm. 2, octubre, 2002, pp. 233-249 Instituto de Astronomía Distrito Federal, México Available in: http://www.redalyc.org/articulo.oa?id=57138212 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Revista Mexicana de Astronom´ıa y Astrof´ısica, 38, 233{249 (2002) A LOSSY METHOD FOR COMPRESSING RAW CCD IMAGES Alan M. Watson Instituto de Astronom´ıa Universidad Nacional Aut´onoma de M´exico, Campus Morelia, M´exico Received 2002 June 3; accepted 2002 August 7 RESUMEN Se presenta un m´etodo para comprimir las im´agenes en bruto de disposi- tivos como los CCD. El m´etodo es muy sencillo: cuantizaci´on con p´erdida y luego compresi´on sin p´erdida con herramientas de uso general como gzip o bzip2. Se convierten los archivos comprimidos a archivos de FITS descomprimi´endolos con gunzip o bunzip2, lo cual es una ventaja importante en la distribuci´on de datos com- primidos. El grado de cuantizaci´on se elige para eliminar los bits de bajo orden, los cuales sobre-muestrean el ruido, no proporcionan informaci´on, y son dif´ıciles o imposibles de comprimir. El m´etodo es con p´erdida, pero proporciona ciertas garant´ıas sobre la diferencia absoluta m´axima, la diferencia RMS y la diferencia promedio entre la imagen comprimida y la imagen original; tales garant´ıas implican que el m´etodo es adecuado para comprimir im´agenes en bruto. El m´etodo produce im´agenes comprimidas de 1/5 del tamano~ de las im´agenes originales cuando se cuan- tizan im´agenes en las que ningun´ valor cambia m´as de 1/2 de la desviaci´on est´andar del fondo. Esta es una mejora importante con respecto a las razones de compresi´on producidas por m´etodos sin p´erdida, y aparentemente las im´agenes comprimidas con bzip2 no exceden el l´ımite te´orico por m´as de unas decenas de por ciento. ABSTRACT This paper describes a lossy method for compressing raw images produced by CCDs or similar devices. The method is very simple: lossy quantization followed by lossless compression using general-purpose compression tools such as gzip and bzip2. A key feature of the method is that compressed images can be converted to FITS files simply by decompressing with gunzip or bunzip2, and this is a significant advantage for distributing compressed files. The degree of quantization is chosen to eliminate low-order bits that over-sample the noise, contain no information, and are difficult or impossible to compress. The method is lossy but gives guarantees on the maximum absolute difference, the expected mean difference, and the expected RMS difference between the compressed and original images; these guarantees make it suitable for use on raw images. The method consistently compresses images to © Copyright 2002: Instituto de Astronomía, Universidad Nacional Autónoma México roughly 1/5 of their original size with a quantization such that no value changes by more than 1/2 of a standard deviation in the background. This is a dramatic im- provement on lossless compression. It appears that bzip2 compresses the quantized images to within a few tens of percent of the theoretical limit. Key Words: TECHNIQUES: IMAGE PROCESSING 1. INTRODUCTION infrared detector mosaic has 2k 2k pixels (Beck- ett et al. 1998), but makes up for×its smaller size by Optical and infrared instruments now routinely being read more frequently. More than a few nights produce huge amounts of image data. The largest of data from such instruments can easily overwhelm current common-user CCD mosaic has 12k 8k pix- workstation-class computers. Compression is a solu- els (Veillet 1998); a single image from such×a mosaic tion to some of the problems generated by these large is 192 MB in size. The largest current common-user quantities of data. Similarly, compression can im- 233 234 WATSON prove the effective bandwidth to remote observato- ries (in particular space observatories), remote data archives, and even local storage devices. This paper describes in detail a lossy method for compressing raw images and presents a quantitative comparison to other lossy methods. It is organized as follows: 2 reviews the limitation of lossless com- pression andx the motivation for lossy compression; 3 briefly summarizes the most relevant previous wx ork on lossy compression; 4 describes the new method; 5 presents results xon the distribution of differencesx between the original and compressed im- ages; 6 investigates the performance of the method with particularx reference to hcomp; 7 compares the performance of the method to otherx similar meth- ods; 8 discusses the suitability of the method for compressingx raw data and investigates some conse- quences of such use; 9 discusses how the method might be improved; andx 10 presents a brief sum- mary. x Fig. 1. The compression ratio (ratio of compressed size 2. LOSSLESS COMPRESSION to original size) as a function of log2 q for an image con- 2.1. The Shannon Limit sisting of pure Gaussian noise with standard deviation σ written as a 16-bit FITS image with a BSCALE of Compression methods can be classified as lossless qσ and then losslessly compressed. The solid line is the or lossy depending on whether compression changes Shannon limit for optimal compression of the individual the values of the pixels. The difficulties of lossless 16-bit pixels and the other lines show the ratios achieved compression of CCD images have been discussed by by bzip2, gzip, lzop, and hcomp (used losslessly). White (1992), Press (1992), and V´eran & Wright (1994). The noise in images from an ideal CCD con- where pi is the normalized frequency of the input sists of Poisson noise from the signal and uncorre- code unit i. From this we can derive that the optimal lated Gaussian read noise. If the signal is measured input code unit is the longest one for which the bits in electrons, the variance of the Poisson noise is equal are still correlated; since in this case, each pixel is to the signal and the variance of the read noise is typ- independent, the optimal input code unit is simply a ically 10{100. However, CCD images are often quan- 16-bit pixel. The resulting optimal compression ratio tized to sample the read noise, with typical analog- (the ratio of the compressed size to original size) will to-digital converter gains being 1{5 electrons. This be H=16. means that the larger noises associated with larger Figure 1 shows as a function of q the optimal com- signal levels can be hugely over-sampled. If this is pression ratio determined by calculating the Shan- the case, the low-order bits in an image are essen- non entropy explicitly. As can be seen, the optimal tially uniform white noise, contain no information, compression ratio is a constant minus (log2 q)=16. and cannot be compressed. Intuitively, this is expected: the number of incom- © Copyright 2002: Instituto de Astronomía, Universidad Nacional Autónoma México pressible low-order bits grows as log2 q and the To illustrate this, series of 512 512 16-bit FITS − images of pure Gaussian noise were× created.× The im- fraction of the compressed image occupied by these bits grows as (log2 q)=16. This result is not new; ages were written with with a BSCALE of qσ, so the − standard deviation is sampled by a factor of 1=q. Romeo et al. (1999) investigated the Shannon limit Shannon's first theorem (Shannon 1948ab, 1949) al- for compression of a quantized Gaussian distribu- lows us to calculate the optimal compression ratio for tion, and their equation (3.3), in my notation, is these images. The theorem states that if a stream of H log2 p2πe log2 q; (2) bits is divided into fixed-length \input code units", ≈ − then the minimum number of bits required to encode This equation was derived in the limit of small q, each input code unit is just the Shannon entropy, but Gaztanaga~ et al. (2001) have shown that the H p log2 p ; (1) corrections for finite q are small for q at least as ≡ − i i 8 i6=0 large as 1.5. Not surprisingly, the Shannon entropies Xp COMPRESSING RAW IMAGES 235 and compression ratios calculated using this equa- instead can approximate their compression ratios by tion and calculated explicitly for the Gaussian noise the Shannon limit. images are in almost perfect agreement. Hcomp (White 1992) is specialized to compress- Real astronomical images contain information ing 16-bit astronomical images and uses a com- in addition to noise, but nevertheless this exercise plex algorithm based on a wavelet transformation of demonstrates the futility of attempting to achieve the pixel values, optional quantization of the coeffi- good compression ratios for images that contain cients, and quad-tree compression of the coefficients. over-sampled noise. For example, if the noise is Hcomp can be used losslessly by omitting the quan- over-sampled by a factor of 60 (which corresponds tization of the coefficients. to q = 60), it is impossible to compress the image Bzip2 (Seward 1998), gzip (Gailly 1993), and losslessly to better than half its size; too much of lzop (Oberhumer 1998) are methods for compressing the image is occupied by white noise in the low-order general byte streams and use dictionary-based algo- bits.
Recommended publications
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Linux-Cookbook.Pdf
    LINUX COOKBOOK ™ Other Linux resources from O’Reilly Related titles Linux Device Drivers Exploring the JDS Linux Linux in a Nutshell Desktop Running Linux Learning Red Hat Enterprise Building Embedded Linux Linux and Fedora Systems Linux Pocket Guide Linux Security Cookbook Understanding the Linux Kernel Linux Books linux.oreilly.com is a complete catalog of O’Reilly’s books on Resource Center Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web plat- form: Linux, Apache, MySQL, and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in document- ing the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit conferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online refer- ence library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or sim- ply flip to the page you need. Try it today with a free trial. LINUX COOKBOOK ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Cookbook™ by Carla Schroder Copyright © 2005 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Is It Time to Replace Gzip?
    bioRxiv preprint doi: https://doi.org/10.1101/642553; this version posted May 20, 2019. The copyright holder for this preprint (which was not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available under aCC-BY 4.0 International license. Is it time to replace gzip? Comparison of modern compressors for molecular sequence databases Kirill Kryukov*, Mahoko Takahashi Ueda, So Nakagawa, Tadashi Imanishi Department of Molecular Life Science, Tokai University School of Medicine, Isehara, Kanagawa 259-1193, Japan. *Correspondence: [email protected] Abstract Nearly all molecular sequence databases currently use gzip for data compression. Ongoing rapid accumulation of stored data calls for more efficient compression tool. We systematically benchmarked the available compressors on representative DNA, RNA and Protein datasets. We tested specialized sequence compressors 2bit, BLAST, DNA-COMPACT, DELIMINATE, Leon, MFCompress, NAF, UHT and XM, and general-purpose compressors brotli, bzip2, gzip, lz4, lzop, lzturbo, pbzip2, pigz, snzip, xz, zpaq and zstd. Overall, NAF and zstd performed well in terms of transfer/decompression speed. However, checking benchmark results is necessary when choosing compressor for specific data type and application. Benchmark results database is available at: http://kirr.dyndns.org/sequence-compression-benchmark/. Keywords: compression; benchmark; DNA; RNA; protein; genome; sequence; database. Molecular sequence databases store and distribute DNA, RNA and protein sequences as compressed FASTA files. Currently, nearly all databases universally depend on gzip for compression. This incredible longevity of the 26-year-old compressor probably owes to multiple factors, including conservatism of database operators, wide availability of gzip, and its generally acceptable performance.
    [Show full text]
  • Rule Base with Frequent Bit Pattern and Enhanced K-Medoid Algorithm for the Evaluation of Lossless Data Compression
    Volume 3, No. 1, Jan-Feb 2012 ISSN No. 0976-5697 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info Rule Base with Frequent Bit Pattern and Enhanced k-Medoid Algorithm for the Evaluation of Lossless Data Compression. Nishad P.M.* Dr. N. Nalayini Ph.D Scholar, Department Of Computer Science Associate professor, Department of computer science NGM NGM College, Pollachi, India College Pollachi, Coimbatore, India [email protected] [email protected] Abstract: This paper presents a study of various lossless compression algorithms; to test the performance and the ability of compression of each algorithm based on ten different parameters. For evaluation the compression ratios of each algorithm on different parameters are processed. To classify the algorithms based on the compression ratio, rule base is constructed to mine with frequent bit pattern to analyze the variations in various compression algorithms. Also, enhanced K- Medoid clustering is used to cluster the various data compression algorithms based on various parameters. The cluster falls dissentingly high to low after the enhancement. The framed rule base consists of 1,048,576 rules, which is used to evaluate the compression algorithm. Two hundred and eleven Compression algorithms are used for this study. The experimental result shows only few algorithm satisfies the range “High” for more number of parameters. Keywords: Lossless compression, parameters, compression ratio, rule mining, frequent bit pattern, K–Medoid, clustering. I. INTRODUCTION the maximum shows the peek compression ratio of algorithms on various parameters, for example 19.43 is the Data compression is a method of encoding rules that minimum compression ratio and the 76.84 is the maximum allows substantial reduction in the total number of bits to compression ratio for the parameter EXE shown in table-1 store or transmit a file.
    [Show full text]
  • Basic Guide to the Command Line
    Basic guide to the command line Outline Introduction Definitions Special Characters Filenames Pathnames and the Path Variable (Search Path) Wildcards Standard in, standards out, standard error, and redirections Here document (heredoc) Owners, groups, and permissions Commands Regular Expressions Introduction To utilize many of the programs in NMRbox you will need to at least have a rudimentary understanding of how to navigate around the command line. With some practice you may even find that the command line is easier than using a GUI based file browser – it is certainly much more powerful. In addition to navigating from the command line you will also need a rudimentary understanding of how to create and execute a shell script. This Guide may take a little bit to get through, but if you know most of the contents in this document you will be well served. (top) Definitions Terminal Emulator – A terminal emulator is a program that makes your computer act like an old fashion computer terminal. When running inside a graphical environment it is often called a “terminal window”, “terminal”, “term”, or “shell” (although it is actually not a shell – read on). I will refer to a “Terminal Emulator” as “Terminal” in this document. Shell – A shell is a program that acts as a command language interpreter that executes the commands sent to it from the keyboard or a file. It is not part of the operating system kernel, but acts to pass commands to the kernel and receives the output from those commands. When you run a Terminal Emulator from a graphical interface a shell is generally run from within the Terminal so your interaction is with the shell and the Terminal simply presents a place for the shell to run in the graphical interface.
    [Show full text]
  • Comparison and Model of Compression Techniques for Smart Cloud Log File Handling
    Copyright IEEE. The final publication is available at IEEExplore via https://doi.org/10.1109/CCCI49893.2020.9256609. Comparison and Model of Compression Techniques for Smart Cloud Log File Handling Josef Spillner Zurich University of Applied Sciences Winterthur, Switzerland [email protected] Abstract—Compression as data coding technique has seen tight pricing of offered cloud services. Increasing diversity and approximately 70 years of research and practical innovation. progress in generic compression tools and log-specific algo- Nowadays, powerful compression tools with good trade-offs exist rithms [4], [5], [6] leaves many operators without a systematic for a range of file formats from plain text to rich multimedia. Yet in the dilemma of cloud providers to reduce log data sizes as much framework to choose suitable and economic log compression as possible while having to keep as much as possible around for tools and respective configurations. This prevents a systematic regulatory reasons and compliance processes, many companies solution to exploit cost tradeoffs, such as increasing investment are looking for smarter solutions beyond brute compression. into better compression levels while saving long-term storage In this paper, comprehensive applied research setting around cost. In this paper, such a framework is constructed by giving network and system logs is introduced by comparing text com- pression ratios and performance. The benchmark encompasses a comprehensive overview with benchmark results of 30 to- 13 tools and 30 tool-configuration-search combinations. The tool tal combinations of compression tools, decompression/search and algorithm relationships as well as benchmark results are tools and associated configurations. modelled in a graph.
    [Show full text]
  • Vorlage Für Dokumente Bei AI
    OSS Disclosure Document Date: 27-Apr-2018 CM-AI/PJ-CC OSS Licenses used in Suzuki Project Page 1 Table of content 1 Overview ..................................................................................................................... 11 2 OSS Licenses used in the project ................................................................................... 11 3 Package details for OSS Licenses usage ........................................................................ 12 3.1 7 Zip - LZMA SDK ............................................................................................................. 12 3.2 ACL 2.2.51 ...................................................................................................................... 12 3.3 Alsa Libraries 1.0.27.2 ................................................................................................... 12 3.4 AES - Advanced Encryption Standard 1.0 ......................................................................... 12 3.5 Alsa Plugins 1.0.26 ........................................................................................................ 13 3.6 Alsa Utils 1.0.27.2 ......................................................................................................... 13 3.7 APMD 3.2.2 ................................................................................................................... 13 3.8 Atomic_ops .................................................................................................................... 13 3.9 Attr 2.4.46 ...................................................................................................................
    [Show full text]
  • Gnome-Session Gzip Less 1.63424124514 Lzop Lib64gpgme
    lib64boost_serialization1.42.0 lib64boost_regex1.42.0 lib64boost_wave1.42.0 lib64boost_math_tr1f1.42.0 popt-data rpm-helper 2.75282526804 1.05413105413 lib64boost_iostreams1.42.0 1.68067226891 chkconfig lib64boost_math_c99l1.42.0 1.1120615911 dmidecode 1.622718052740. 0.0562113546936 perl-File-FnMatch 0.0570287995438 3.04259634888 1.0152284264 tcb perl-String-ShellQuote 0.869313242538 1.33903133903 0. 0.507614213198 libdrakx-net 1.39720558882 1.0152284264 1.1120615911 0.855431993157 1.62271805274 lib64popt0 0. 0.0570287995438 lib64ldetect0.11 0. 3.64583333333 2.60416666667 1.62271805274 0. 3.125 1.1120615911 0. 0. 0.0570287995438 2.604166666670. lib64boost_wserialization1.42.0 3.64583333333 crda 0.0. 0.0. lib64dbnss4.8 1.39720558882 0. 0. 0. 0. 0.726712177934 lib64boost_program_options1.42.0 0. 1.65169516082 0.0440431622991 0. 0.0. 0.855431993157 1.39720558882 0.0285143997719 2.57896261953 drakxtools-backend 0. 0. 3.7037037037 shadow-utils0.880863245981 2.03045685279 0. 0.0. 0.855431993157 0.940975192472 1.62271805274 0. 0.0570613409415 1.1697574893 0. 0. 0.114122681883 wireless-regdb 0.660647434486 2.60416666667 1.62271805274 0. 0. 0.0570613409415 xz pam_tcb 0.0285143997719 0.0. 1.79658070125 0. 2.53807106599 1.45506419401 4.6875 0. 0.388632499393 0.0. 0. lib64cap2 1.1120615911 perl-Curses 1.62271805274 0.855920114123 lib64acl1 0.684764000978 lib64lzma2 lib64boost_math_tr1l1.42.0 0.0285143997719 1.60757542392 0. 0.940975192472 1.16714380092 2.60416666667 3.04568527919 0.0570287995438 1.05160185865 lib64gamin-1_0 0.171086398631 1.1120615911 1.62271805274 0.040338846309 0. 0.0220215811495 lib64boost_graph1.42.0 0.940975192472 0. 0.811359026369 0. coreutils 0.855188141391 0. 0.0570287995438 0.0570613409415findutils 1.92605711756 0.526955816782 0.
    [Show full text]
  • Model 1.1 User's Guide
    Model 1.1 User’s Guide Second Release – December 2015 TABLE OF CONTENTS Section 1: Introduction .................................................................................................................................. 1 About this User’s Guide .............................................................................................................................. 1 About ImageCue™ ....................................................................................................................................... 1 Connections and Controls ........................................................................................................................... 2 Control Channel Descriptions ..................................................................................................................... 4 Section 2: Setup ............................................................................................................................................. 7 Setting the DMX512 Starting Address ......................................................................................................... 7 Selecting the DMX Personality .................................................................................................................... 8 Setting the LCD Display Backlight Level and Disabling the LEDs ................................................................. 8 Changing the HDMI/DVI Output Resolution ............................................................................................... 9 Selecting
    [Show full text]
  • Performance and Energy Consumption of Lossless Compression/Decompression Utilities on Mobile Computing Platforms
    2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems Performance and Energy Consumption of Lossless Compression/Decompression Utilities on Mobile Computing Platforms Aleksandar Milenkovi, Armen Dzhagaryan Martin Burtscher Department of Electrical and Computer Engineering Department of Computer Science The University of Alabama in Huntsville Texas State University-San Marcos Huntsville, AL, U.S.A. San Marcos, TX, U.S.A. {milenka, aad002}@uah.edu [email protected] Abstract—Data compression and decompression utilities can be are in use, including dictionaries of expected or recently critical in increasing communication throughput, reducing encountered “words,” sliding windows that assume that communication latencies, achieving energy-efficient communi- recently seen data patterns will repeat, which are used in the cation, and making effective use of available storage. This Lempel-Ziv approach [3], as well as reversibly sorting data paper experimentally evaluates several such utilities for mul- to bring similar values close together, which is the approach tiple compression levels on systems that represent current taken by the Burrows and Wheeler transform [4]. The data mobile platforms. We characterize each utility in terms of its compression algorithms used in practice combine different compression ratio, compression and decompression through- models and coders, thereby favoring different types of inputs put, and energy efficiency. We consider different use cases that and representing different tradeoffs between speed and com- are typical for modern mobile environments. We find a wide pression ratio. Moreover, they typically allow the user to variety of energy costs associated with data compression and decompression and provide practical guidelines for selecting select the dictionary, window, or block size through a com- the most energy efficient configurations for each use case.
    [Show full text]
  • 1. Why POCS.Key
    Symptoms of Complexity Prof. George Candea School of Computer & Communication Sciences Building Bridges A RTlClES A COMPUTER SCIENCE PERSPECTIVE OF BRIDGE DESIGN What kinds of lessonsdoes a classical engineering discipline like bridge design have for an emerging engineering discipline like computer systems Observation design?Case-study editors Alfred Spector and David Gifford consider the • insight and experienceof bridge designer Gerard Fox to find out how strong the parallels are. • bridges are normally on-time, on-budget, and don’t fall ALFRED SPECTORand DAVID GIFFORD • software projects rarely ship on-time, are often over- AS Gerry, let’s begin with an overview of THE DESIGN PROCESS bridges. AS What is the procedure for designing and con- GF In the United States, most highway bridges are budget, and rarely work exactly as specified structing a bridge? mandated by a government agency. The great major- GF It breaks down into three phases: the prelimi- ity are small bridges (with spans of less than 150 nay design phase, the main design phase, and the feet) and are part of the public highway system. construction phase. For larger bridges, several alter- There are fewer large bridges, having spans of 600 native designs are usually considered during the Blueprints for bridges must be approved... feet or more, that carry roads over bodies of water, preliminary design phase, whereas simple calcula- • gorges, or other large obstacles. There are also a tions or experience usually suffices in determining small number of superlarge bridges with spans ap- the appropriate design for small bridges. There are a proaching a mile, like the Verrazzano Narrows lot more factors to take into account with a large Bridge in New Yor:k.
    [Show full text]