(12) United States Patent (10) Patent No.: US 7.444,347 B1 Alley Et Al

Total Page:16

File Type:pdf, Size:1020Kb

(12) United States Patent (10) Patent No.: US 7.444,347 B1 Alley Et Al USOO7444347B1 (12) United States Patent (10) Patent No.: US 7.444,347 B1 Alley et al. (45) Date of Patent: Oct. 28, 2008 (54) SYSTEMS, METHODS AND COMPUTER 2005/0261891 A1* 11/2005 Chan et al. ..................... TO4/9 PRODUCTS FOR COMPRESSION OF 2007/004401.0 A1* 2, 2007 Sull et al. .. ... 715,500.1 HERARCHICAL IDENTIFIERS 2007/0128899 A1* 6/2007 Mayer ........................ 439,152 (75) Inventors: Charles L. Alley, Durham, NC (US); FOREIGN PATENT DOCUMENTS Anthony J Bybell, Carrboro, NC (US); WO WOO135216 5, 2001 Jason M. Sullivan, Raleigh, NC (US) Naming Issues in the Design of Transparently Distributed Operating (73) Assignee: International Business Machines Systems, 1987, Robert J. Stroud. (Item 1 from file 35) 1010738 Corporation, Armonk, NY (US) Order No. AADDX-80202)) online; retrieved on Oct. 26, 2007: retrieved from the Internet <URL http://www.dialogweb.com/dgi/ dwclient. (*) Notice: Subject to any disclaimer, the term of this ModelSim EE/PLUS Reference Manual, The ModelSim Elite Edi patent is extended or adjusted under 35 tion for VHDL. Verilog, and Mixed-HDL Simulation, Software Ver U.S.C. 154(b) by 0 days. sion 5.2, (Modern Technology, Inc.) Oct. 1998, online), retrieved on Nov. 2, 2007: Retrieved from the Internet <URL: <http://courses. (21) Appl. No.: 11/941,376 ece3.uiuc.edu/ece4 12/References/modelsimfee manual 52.pdf>. (22) Filed: Nov. 16, 2007 * cited by examiner Primary Examiner Kuen S Lu (51) Int. C. (74) Attorney, Agent, or Firm—Cantor Colburn LLP: Josh G06F 7/30 (2006.01) Cockburn G06F 7/00 (2006.01) (52) U.S. Cl. ........................... 707/101: 707/102; 707/6; (57) ABSTRACT 707/7 (58) Field of Classification Search ................. 707/101, Management of hierarchical identifiers in simulation models 707/102, 6, 7 and netlists is accomplished using a prefix compressor algo See application file for complete search history. rithm running on a general purpose computer processor. Full name compression is accomplished when hierarchy data and (56) References Cited remainder data are split off and prefix compressed. Com U.S. PATENT DOCUMENTS pressing prefixes of names in the hierarchy list is performed by comparing a previous entry to a current entry. Compress 4,843,389 A * 6/1989 Lisle et al. .................. 341 (106 ing prefixes of names in the name list is performed by running 5.325,091 A * 6/1994 Kaplanet al. ................. 341.51 an output of compressing of prefixes of names in the hierar 6,557,054 B2 4/2003 Reisman chy list and running an output of the compressing of prefixes 7,165,023 B2 * 1/2007 Corman et al. ................. TO4/9 7,171,618 B2 * 1/2007 Harrington etal ... 715,229 of names in the name list through a standard compressor 7,178,100 B2 * 2/2007 Call ........................... 71.5/210 Software application package. Decompressing of names uses 2002/0006164 A1 1/2002 Felts ..................... 375,240.19 Sub operations inverse to the prefix compressor algorithm. 2003,019 1719 A1 10, 2003 Ginter et al. The decompressing Sub operations create a string pointed to 2004/011774.0 A1* 6, 2004 Chen et al. ... ... 715,531 by the prefix pointer and concatenated onto the string pointed 2005. O157217 A1* 7, 2005 Hendricks ... ... 348,734 to by the name pointer; and thus a full name is created. 2005/0198070 A1* 9/2005 Lowry ..................... TO7 104.1 2005/0216421 A1* 9/2005 Barry et al. ................... TO5/64 4 Claims, 2 Drawing Sheets COMPRESSION OFHER-ARCICALSyd IDENTIFEERSMETHOD 70 C0MPRESSNAMESBYPERFOR&N8 SUBOPERATIONS - SORTINGNAMESINLEXICAL, OREERSUBERATION - SPLETTING FULLNAMESNTO A FERARCHY STAND 74 SPLITTING FULL NAMES INTO AREMANDERSTsuB Y OPERATIONS - - - CQMRESSINGPREFEXES OF NAMESNERARCYLis8tje PERATION COMPRESSN3PREFXES OF NAMES INNAMELIST RUNNING OUTPUT OF COMPRESSE pREEixes of NAMESN HERARCHYLISTAND RUNNRNG dUTPUT OF COMPRESSED PREFXES OF NAMESNNAMELISTSUBOPERATIONS DECOMPRESSINGNAMESSYPERFORMINGSL3 OpERATION3 RNNDNG COMPRESSEDHERARCELISTANINAMES THROUGHECOMPRESSRSOFTWAREACKAE READINGWAUEATSTART OF AN ENTRY COPYNg QUANY OF Byres FROx1FRECEDG ENTRY APPENING FOLLOWINGSTRING SETTING ONER STEPPING THROUGHNAME ENTRIES CREATINKstriNg PoNTED TO ANDREATING Full NAME - 8s 38 - U.S. Patent Oct. 28, 2008 Sheet 1 of 2 US 7.444,347 B1 COMPRESSION OF HIERARCHICAL IDENTIFIERS METHOD 70 1. 72 COMPRESS NAMES BY PERFORMING SUB OPERATIONS 1. 73 SORTING NAMES IN LEXICAE ORDER SUB OPERATION 1. SPLITTING FULL NAMES INTO A HIERARCHY LIST AND 74 SPLITTING FULL NAMES INTO AREMAINDER LIST SUB 1. OPERATIONS COMPRESSING PREFIXES OF NAMES IN HIERARCHY LIST SUB 1. 75 OPERATION 76 COMPRESSING PREFIXES OF NAMES IN NAME LIST l1 RUNNING OUTPUT OF COMPRESSED PREFIXES OF NAMES IN 77 HIERARCHY LIST AND RUNNING OUTPUT OF COMPRESSED 1. PREFIXES OF NAMES IN NAME LIST SUB OPERATIONS 78 DECOMPRESSING NAMES BY PERFORMING SUB OPERATIONS 1. RUNNING COMPRESSED HIERARCH LIST AND NAME LIST 1. 79 THROUGH DECOMPRESSOR SOFTWARE PACKAGE 80 READING VALUE AT START OF AN ENTRY 1. COPYING OUANTY OF BYTES FROM PRECEDING ENTRY - 81 82 APPENDING FOLLOWING STRING -1 SETTING POINTER - 83 STEPPING THROUGH NAME ENTRIES a-a- 84 CREATING STRING POINTED TO AND CREATING FULL NAME 85 86 U.S. Patent Oct. 28, 2008 Sheet 2 of 2 US 7.444,347 B1 COMPRESSION OF HIERARCHICAL IDENTIFIERS SYSTEM 20 COMPUTER N. WORKSTATION PROCESSOR 22 HERARCHICAL LIST 23 REPOSITORY 26 MEMORY 24 N nth NAME LIST Lin PREFIX LIST LA NAME LIST L3 PROGRAM UNIT 40 REMAINDER LIST 2 PROGRAM 41 HERARCHY LIST LI MEMORY CONTROLLER Algorithm An ALGORTHM UNIT 30 1. 27 NETWORK INTERFACE 28 OUTPUT DEVICE 34 MOUSE 29 KEYBOARD 60 PLURALITY OF NETWORKED COMPUTER DEVICES 51 FIG. 2 US 7,444,347 B1 1. 2 SYSTEMS, METHODS AND COMPUTER string starting at the String beginning at +k bytes. Compress PRODUCTS FOR COMPRESSION OF ing prefixes of names in the name list is performed by running HERARCHICAL IDENTIFIERS an output of compressing of prefixes of names in the hierar chy list and running an output of the compressing of prefixes TRADEMARKS of names in the name list through a standard compressor Software application package, where the standard compressor IBM(R) is a registered trademark of the International Busi Software application package includes bzip2, which produces ness Machines Corporation, Armonk, N.Y., U.S.A. Other a compressed hierarchy list in conjunction with operations names used herein may be trademarks and registered trade compressing prefixes of names in a name list. In the exem marks, or trade or product names of International Business 10 plary embodiment, decompressing of names uses the inverse Machines Corporation or other companies. of the prefix compressor algorithm and is performed by run ning the compressed hierarchy list and the name list through TECHNICAL FIELD a standard decompressor Software application package, and where the standard decompressor Software application pack This invention relates generally to networked computer 15 age includes bzip2, then the Sub operations of reading a value system administration and management, software services, at a start of an entry; copying a quantity of bytes from a application solutions and data replication management preceding entry; and appending a string that follows; then directed to data handling programs. Such as event monitoring setting a pointer at a beginning of the prefix list and setting a in Software management applications, data mining, pattern pointer at a beginning of the name list. This operation is recognition, data analysis, data transcoding and data conver followed by stepping through the name entries one by one sion operating in various operating system environments until no names exist, when the flag emitted when a full name’s including UNIX operating systems, as well as implementa hierarchy changes from the preceding name is encountered, tions in hardware directed to keeping memory Small. More then this flag is used to indicate that the prefix pointer is particularly, this invention relates to storage management of moved forward by one entry for the next element in the hierarchical identifiers in simulation models and netlists, in 25 hierarchy list. These operations create a string pointed to by data compression and decompression applications. This the prefix pointer and concatenated on to the string pointed to invention can be applied to any system running any service by the name pointer, and thus a full name is created. provider application and/or operating system. BRIEF DESCRIPTION OF THE DRAWINGS BACKGROUND 30 The Subject matter that is regarded as the invention is Known general purpose algorithms. Such as ZipfgZip are particularly pointed out and distinctly claimed in the claims at used for reducing large storage requirements for large models the conclusion of the specification. The foregoing and other and netlists. In general, for large models and netlists, the objects, features, and advantages of the invention are apparent storage requirements are concomitantly large and the com 35 from the following detailed description taken in conjunction pression and decompression operations perform very slowly. with the accompanying drawings, which are meant to be Therefore, the need exists for methods and systems that exemplary, and not limiting, wherein: reduce the storage requirements and increase performance FIG. 1 illustrates operations of the method of storage man speeds for large models and netlists compression and decom agement of hierarchical identifiers. pression operations. In addition, the need exists for improving 40 FIG. 2 illustrates the system implementing operations of the compressibility of data. the method illustrated in FIG. 1. SUMMARY OF THE INVENTION DETAILED DESCRIPTION A method of storage management of hierarchical identifi 45 The disclosed exemplary embodiments are intended to be ers in simulation models and netlists is accomplished using a illustrative only, since numerous modifications and variations prefix compressor algorithm running on a general purpose therein will be apparent to those of ordinary skill in the art. In computer processor executing computer executable program reference to the drawings, like numbers will indicate like code that causes the general purpose computer processor to parts continuously throughout the view.
Recommended publications
  • Unix (And Linux)
    AWK....................................................................................................................................4 BC .....................................................................................................................................11 CHGRP .............................................................................................................................16 CHMOD.............................................................................................................................19 CHOWN ............................................................................................................................26 CP .....................................................................................................................................29 CRON................................................................................................................................34 CSH...................................................................................................................................36 CUT...................................................................................................................................71 DATE ................................................................................................................................75 DF .....................................................................................................................................79 DIFF ..................................................................................................................................84
    [Show full text]
  • How to Open Downloaded Zip File
    how to open downloaded zip file What Is a ZIP File? A file with the ZIP file extension is a ZIP Compressed file and is the most widely used archive format you'll run into. A ZIP file, like other archive file formats, is simply a collection of one or more files and/or folders but is compressed into a single file for easy transportation and compression. ZIP File Uses. The most common use for ZIP files is for software downloads. Zipping a software program saves storage space on the server, decreases the time it takes for you to download it to your computer, and keeps the hundreds or thousands of files nicely organized in the single ZIP file. Another example can be seen when downloading or sharing dozens of photos. Instead of sending each image individually over email or saving each image one by one from a website, the sender can put the files in a ZIP archive so that only one file needs to be transferred. How to Open a ZIP File. The easiest way to open a ZIP file is to double-click on it and let your computer show you the folders and files contained inside. In most operating systems, including Windows and macOS, ZIP files are handled internally, without the need for any extra software. Other Tools and Capabilities. However, there are many compression/decompression tools that can be used to open (and create!) ZIP files. There's a reason they're commonly referred to as zip/unzip tools! Including Windows, just about all programs that unzip ZIP files also have the ability to zip them; in other words, they can compress one or more files into the ZIP format.
    [Show full text]
  • Basics of UNIX
    Basics of UNIX August 23, 2012 By UNIX, I mean any UNIX-like operating system, including Linux and Mac OS X. On the Mac you can access a UNIX terminal window with the Terminal application (under Applica- tions/Utilities). Most modern scientific computing is done on UNIX-based machines, often by remotely logging in to a UNIX-based server. 1 Connecting to a UNIX machine from {UNIX, Mac, Windows} See the file on bspace on connecting remotely to SCF. In addition, this SCF help page has infor- mation on logging in to remote machines via ssh without having to type your password every time. This can save a lot of time. 2 Getting help from SCF More generally, the department computing FAQs is the place to go for answers to questions about SCF. For questions not answered there, the SCF requests: “please report any problems regarding equipment or system software to the SCF staff by sending mail to ’trouble’ or by reporting the prob- lem directly to room 498/499. For information/questions on the use of application packages (e.g., R, SAS, Matlab), programming languages and libraries send mail to ’consult’. Questions/problems regarding accounts should be sent to ’manager’.” Note that for the purpose of this class, questions about application packages, languages, li- braries, etc. can be directed to me. 1 3 Files and directories 1. Files are stored in directories (aka folders) that are in a (inverted) directory tree, with “/” as the root of the tree 2. Where am I? > pwd 3. What’s in a directory? > ls > ls -a > ls -al 4.
    [Show full text]
  • Ten Thousand Security Pitfalls: the ZIP File Format
    Ten thousand security pitfalls: The ZIP file format. Gynvael Coldwind @ Technische Hochschule Ingolstadt, 2018 About your presenter (among other things) All opinions expressed during this presentation are mine and mine alone, and not those of my barber, my accountant or my employer. What's on the menu Also featuring: Steganograph 1. What's ZIP used for again? 2. What can be stored in a ZIP? y a. Also, file names 3. ZIP format 101 and format repair 4. Legacy ZIP encryption 5. ZIP format and multiple personalities 6. ZIP encryption and CRC32 7. Miscellaneous, i.e. all the things not mentioned so far. Or actually, hacking a "secure cloud disk" website. EDITORIAL NOTE Everything in this color is a quote from the official ZIP specification by PKWARE Inc. The specification is commonly known as APPNOTE.TXT https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT Cyber Secure CloudDisk Where is ZIP used? .zip files, obviously Default ZIP file icon from Microsoft Windows 10's Explorer And also... Open Packaging Conventions: .3mf, .dwfx, .cddx, .familyx, .fdix, .appv, .semblio, .vsix, .vsdx, .appx, .appxbundle, .cspkg, .xps, .nupkg, .oxps, .jtx, .slx, .smpk, .odt, .odp, .ods, ... .scdoc, (OpenDocument) and Offixe Open XML formats: .docx, .pptx, .xlsx https://en.wikipedia.org/wiki/Open_Packaging_Conventions And also... .war (Web application archive) .rar (not THAT .rar) .jar (resource adapter archive) (Java Archive) .ear (enterprise archive) .sar (service archive) .par (Plan Archive) .kar (Karaf ARchive) https://en.wikipedia.org/wiki/JAR_(file_format)
    [Show full text]
  • OOMMF User's Guide October 2, 2001 This Manual Documents Release
    OOMMF User's Guide October 2, 2001 This manual documents release 1.1b1. Abstract This manual describes OOMMF (Object Oriented Micromagnetic Framework), a public domain micromagnetics program developed at the National Institute of Stan- dards and Technology. The program is designed to be portable, flexible, and extensible, with a user-friendly graphical interface. The code is written in C++ and Tcl/Tk. Tar- get systems include a wide range of Unix platforms, Windows NT, and Windows 95/98. Contents Disclaimer iii 1 Overview of OOMMF 1 2 Installation 3 2.1 Requirements ................................... 3 2.2 Basic Installation ................................. 4 2.2.1 Download ................................. 4 2.2.2 Check Your Platform Configuration ................... 5 2.2.3 Compiling and Linking .......................... 9 2.2.4 Installing ................................. 9 2.2.5 Using OOMMF Software ......................... 10 2.2.6 Reporting Problems ........................... 10 2.3 Advanced Installation ............................... 10 2.3.1 Reducing Disk Space Usage ....................... 10 2.3.2 Local Customizations ........................... 10 2.3.3 Managing OOMMF Platform Names .................. 11 2.3.4 Microsoft Windows Options ....................... 13 3 Quick Start: Example OOMMF Session 16 4 OOMMF Architecture Overview 20 5 Command Line Launching 22 6 OOMMF Launcher/Control Interface: mmLaunch 25 7 Micromagnetic Problem Editor: mmProbEd 27 8 Micromagnetic Problem File Source: FileSource 29 9 The 2D Micromagnetic Solver: mmSolve2D 31 10 Data Table Display: mmDataTable 39 11 Data Graph Display: mmGraph 42 12 Vector Field Display: mmDisp 46 i 13 Data Archive: mmArchive 56 14 Documentation Viewer: mmHelp 58 15 Command Line Utilities 60 15.1 Making Bitmaps from Vector Fields: avf2ppm ................. 60 15.2 Bitmap File Format Conversion: any2ppm ..................
    [Show full text]
  • Zipgenius 6 Help
    Table of contents Introduction ........................................................................................................... 2 Why compression is useful? ................................................................................ 2 Supported archives ............................................................................................ 3 ZipGenius features ............................................................................................. 5 Updates ............................................................................................................ 7 System requirements ......................................................................................... 8 Unattended setup .............................................................................................. 8 User Interface ........................................................................................................ 8 Toolbars ............................................................................................................ 8 Common Tasks Bar ............................................................................................ 9 First Step Assistant .......................................................................................... 10 History ............................................................................................................ 10 Windows integration ........................................................................................ 12 Folder view .....................................................................................................
    [Show full text]
  • Installation and Administration Solidworks 2020
    INSTALLATION AND ADMINISTRATION SOLIDWORKS 2020 / Visualize Contents Legal Notices............................................................................................................6 1 SOLIDWORKS Installation and Administration......................................................9 Individual Installation or Administrative Image.............................................................................10 Check System and Software Requirements.................................................................................11 Installing 3DEXPERIENCE Add-Ins.............................................................................................11 2 Individual Installations..........................................................................................12 Installation on Individual Computers............................................................................................12 Administration of Individual Installations......................................................................................14 Modifying an Installation..........................................................................................................14 Repairing an Installation..........................................................................................................15 Rolling Back an Individual Installation to a Previous Service Pack.........................................15 Removing an Installation.........................................................................................................16 Upgrading
    [Show full text]
  • Efficient Transition Adjacency Relation Computation for Process Model Similarity 3
    IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. X, NO. X, X 2018 1 Efficient Transition Adjacency Relation Computation for Process Model Similarity Jisheng Pei, Lijie Wen, Xiaojun Ye, and Akhil Kumar Abstract—Many activities in business process management, such as process retrieval, process mining and process integration, need to determine the similarity between business processes. Along with many other relational behavior semantics, Transition Adjacency Relation (abbr. TAR) has been proposed as a kind of behavioral gene of process models and a useful perspective for process similarity measurement. In this article we explain why it is still relevant and necessary to improve TAR or pTAR (i.e., projected TAR) computation efficiency and put forward a novel approach for TAR computation based on Petri net unfolding. This approach not only improves the efficiency of TAR computation, but also enables the long-expected combined usage of TAR and Behavior Profiles (abbr. BP) in process model similarity estimation. Index Terms—Transition Adjacency Relation, Petri Net, Unfolding, Process Model Similarity. F 1 INTRODUCTION ing and similarity measurement, researchers have noticed Since its first introduction [1], Transition Adjacency Relation the limitations to its expressive powers [9]. It has been (TAR) has been applied in a wide range of business process discussed in several works that while some process models model analysis scenarios such as similarity measurement [2– may have identical behavior profiles but produce different 6], process model retrieval [7, 8], and process mining [9, 10]. output traces. Different from conformance checking between a process As a result, a comprehensive relational semantics called model and an event log [11], a process similarity algo- 4C Spectrum has been proposed in [13] to make up for the rithm based on TAR (TAR similarity in short) takes two missing expressive power of BP.
    [Show full text]
  • GEOB 373: Image Acquisition and Download Tutorial
    GEOB 373: Image Acquisition and Download Tutorial Prepared for Geob 373 by BK March 7, 2019. 1 Image Analysis with ArcGIS 10 Image Acquisition and Download Tutorial Introduction This “Image Acquisition and Download Tutorial” has been prepared so that you can learn how to search for, order and download Landsat imagery. You will be required to download the imagery for your final projects, so it is important that you become familiar with the process. Procedure File management is crucial for a successful project! Before you start compiling your data, ensure you have become familiar with the file structure and the data used in a project. Create folders on the drive you are allowed to save data on (e.g., temporarily, during the download process, you can use C:\temp\download, but remember you will have to transfer the files to your USB drive). Accessing Landsat Imagery using the USGS Global Visualization Viewer (GloVis) In this tutorial you will be shown how to acquire an image of Vancouver using GloVis. After accessing the image through GloVis, you should confirm that the downloaded files are the correct ones by viewing them using ArcMap. Step 1: Open GloVis (http://glovis.usgs.gov) in a web browser. Launch GloVis, but do not select the ‘full screen’ option as that will hide the login button. Step 2: Log into GloVis (or, if this is your first time entering the system, create an account). If you don’t see the login link, click on the Toggle Full Screen mode button (highlighted in blue in the figure below).
    [Show full text]
  • Archive Utility Download Mac Free Best Zip Program for Mac: 4 Options to Know
    archive utility download mac free Best Zip Program for Mac: 4 Options to Know. Files you may use on your computer will be of different formats and no matter which operating system your computer runs on, you would certainly have come across .zip files. Zipped files or compressed files, as they’re called, are used when you wish to save space on your computer and also when they need to be sent via the internet. Zip files have been in existence for many years now and is helpful when you have to deal with a large number of files that you may need to send to someone via email or reduce the actual size of the files when sharing. Like on Windows, you can also open .zip files on your Mac and create .zip files by compressing other files. In this post, we’ll list the programs you may use to open and compress .ZIP files on a Mac. Mac’s Archive Utility The Unarchiver RAR Extractor Keka. Mac’s Archive Utility. Mac offers a native compressing and decompressing solution in the form of the Archive Utility that’s built right into the macOS system. Not only can you summon the app from the Launchpad or through Spotlight, but the ability to compress a file into archive format is also built right into the Mac’s Finder app. This way, you are not required to open a separate app or preset values for compression. By default, the Archive Utility inside Finder compresses files in ZIP format and leaves the files and archive alone when decompressing or compressing.
    [Show full text]
  • < Direct Input from a File to a Command Eg Wc < Input.Txt > Direct Output From
    UNIX COMMANDS: Commands Description < Direct input from a file to a command e.g. wc < input.txt > Direct output from a command to a file e.g. ls > output.txt >> Append output from a command to a file e.g. date >> output.txt | Redirect (pipe) the standard output of one command to the standard input of another e.g. echo hello world | tr “a-z” “A-Z” - sends the output of the echo command to the tr command for translation to uppercase ; Combine commands e.g. echo hello world ; cal \ Escape the following special character e.g. echo Prompt\> - prints out Prompt> ./ Execute a script in the current directory e.g. ./myscript.sh .. Parent directory e.g. cd .. - change to parent directory ~ Alias for the home directory e.g. cd ~ - change to home directory & Run command line in the background ^C (Ctrl + C) kills a running process ^Z (Ctrl + Z) suspend a running process bunzip2 Uncompress a file from zip format e.g. bunzip2 input.txt.bz2 bzip2 Compress a file to zip format e.g. bzip2 input.txt cat Display the text content of one or more files in consecutive order as one document (can be used to combine files) e.g. cat input1.txt input2.txt cd Change working directory e.g. cd /usr/bin/ chmod Change access permission of a file or director for the User, Group, and Other users. The numerical code for changing permission. # Permission rwx 7 Full 111 6 read and write 110 5 read and execute 101 4 read only 100 3 write and execute 011 2 write only 010 1 execute only 001 0 None 000 e.g.
    [Show full text]
  • A New Lossless DNA Compression Algorithm Based on a Single-Block Encoding Scheme
    algorithms Article A New Lossless DNA Compression Algorithm Based on A Single-Block Encoding Scheme Deloula Mansouri , Xiaohui Yuan * and Abdeldjalil Saidani School of Computer Science and Technology, Wuhan University of Technology, Wuhan 430070, China; [email protected] (D.M.); [email protected] (A.S.) * Correspondence: [email protected] Received: 24 March 2020; Accepted: 17 April 2020; Published: 20 April 2020 Abstract: With the emergent evolution in DNA sequencing technology, a massive amount of genomic data is produced every day, mainly DNA sequences, craving for more storage and bandwidth. Unfortunately, managing, analyzing and specifically storing these large amounts of data become a major scientific challenge for bioinformatics. Therefore, to overcome these challenges, compression has become necessary. In this paper, we describe a new reference-free DNA compressor abbreviated as DNAC-SBE. DNAC-SBE is a lossless hybrid compressor that consists of three phases. First, starting from the largest base (Bi), the positions of each Bi are replaced with ones and the positions of other bases that have smaller frequencies than Bi are replaced with zeros. Second, to encode the generated streams, we propose a new single-block encoding scheme (SEB) based on the exploitation of the position of neighboring bits within the block using two different techniques. Finally, the proposed algorithm dynamically assigns the shorter length code to each block. Results show that DNAC-SBE outperforms state-of-the-art compressors and proves its efficiency in terms of special conditions imposed on compressed data, storage space and data transfer rate regardless of the file format or the size of the data.
    [Show full text]