An Investigation of Storage and Communication Codes for an Electronic Library Mansour Alsulaiman Iowa State University
Total Page:16
File Type:pdf, Size:1020Kb
Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1987 An investigation of storage and communication codes for an electronic library Mansour Alsulaiman Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Electrical and Electronics Commons, and the Library and Information Science Commons Recommended Citation Alsulaiman, Mansour, "An investigation of storage and communication codes for an electronic library " (1987). Retrospective Theses and Dissertations. 8608. https://lib.dr.iastate.edu/rtd/8608 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS The most advanced technology has been used to photo graph and reproduce this manuscript from the microfilm master. UMI films the original text directly from the copy submitted. Thus, some dissertation copies are in typewriter face, while others may be from a computer printer. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyrighted material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are re produced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. Each oversize page is available as one exposure on a standard 35 mm slide or as a 17" x 23" black and white photographic print for an additional charge. Photographs included in the original manuscript have been reproduced xerographically in this copy. 35 mm slides or 6" X 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. Accessing the World'sUMI Information since 1938 300 North Zeeb Road, Ann Arbor, Ml 48106-1346 USA Order Number 8805088 An investigation of storage and communication codes for an electronic library Alsulaiman, Mansour, Ph.D. Iowa State University, 1987 UMI 300 N. ZeebRd. Ann Arbor, MI 48106 PLEASE NOTE: In all cases this material has been filmed in the best possible way from the available copy. Problems encountered with this document have been identified here with a check mark V . 1. Glossy photographs or pages 2. Colored illustrations, paper or print 3. Photographs with dark background i/ 5. Pages with black marks, not original copy \/^ 6. Print shows through as there is text on both sides of page 7. Indistinct, broken or small print on several pages 8. Print exceeds margin requirements 9. Tightly bound copy with print lost in spine 10. Computer printout pages with indistinct print 11. Page(s/ lacking when material received, and not available from school or author. 12. Page(s) seem to be missing in numbering only as text follows. 13. Two pages numbered . Text follows. 14. Curling and wrinkled pages 15. Dissertation contains pages with print at a slant, filmed as received 16. Other UMI An investigation of storage and communication codes for an electronic library by Mansour Alsulaiman A Dissertation Submitted to the Graduate Faculty in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY Department : Electrical Engineering and Computer Engineering Major: Computer Engineering Approved : Signature was redacted for privacy. In Charge of Major Work Signature was redacted for privacy. Signature was redacted for privacy. For tne uraauate College Iowa State University Ames, Iowa 1987 il TABLE OF CONTENTS Page l: INTRODUCTION 1 1.1. Statement of the Problem 1 1.2. Features and Assumptions of the Solution 1 1.3. Thesis Organization 2 2. LITERATURE REVIEW 4 2.1. Review of Facsimile Transmission 4 2.2. Review of the Lempel and Ziv Algorithm 21 3. CREATION OF THE IMAGE DATA BASE 34 3.1. Classification of the Library Informational Material 34 3.2. Device Description 37 3.3. Procedures of the Research 38 3.4. Creation of the Image Data Base 39 3.5. Classification of the Image Data Base 40 3.6. Results to Be Analyzed 41 3.7' Implementation Considerations 41 4. FACSIMILE CODING 43 4.1. Introduction 43 4.2. One Dimensional Compression Technique 43 4.3. Two Dimensional Compression Technique 46 4.4. MREAD Implementation and Results 53 4.5. Entropy Calculation of the One Dimensional Model 68 4.6. Entropy Calculation of the Two Dimensional Model 71 ill Page 4.7. Analysis of the Results 82 4.8. Conclusion 101 5. APPLICATION OF THE LEMPEL-ZIV-WELCH ALGORITHM 103 5.1. Description of the Lempel-Ziv-Welch Algorithm 103 5.2. Method LZWB 104 5.3. Method LZWBl 105 5.4. Method LZIfB2 108 5.5. Results of LZW and the Above Mentioned Modifications 109 5.6. LZW vs. FAX 120 5.7. LZyre and LZWB2 vs. LZW and FAX 120 5.8. LZWBl vs. LZWB 121 5.9. Conclusion 121 6. MODIFICATIONS TO THE LZW ALGORITHM 123 6.1. Method LZWl 125 6.2. Method LZW2 128 6.3. Method LZW3 129 6.4. Results of Compression Using LZWl, LZW2, and LZW3 130 7. METHODS R8, R4, AND BIG 140 7.1. Method R8 140 7.2. Method R4 143 7.3. Method BIG 143 7.4. Results and Analysis of R8 and R4 144 7.5. Results and Analysis of BIG 150 iv Page 8. GENERAL ANALYSES 161 8.1. Building the Screen 161 8.2. Screen Division 161 8.3. The Significance of the Groups Averages 164 8.4. Using the CCITT Documents for Comparison 130 8.5. Results of Group 5 183 8.6. Results of Group 8 183 0 0 The Significance of "Extracalls" 185 8.8. Table Size 186 8.9. Remarks about R8 and R4 187 9. CONCLUSION 189 9.1. Suggestions for Future Work 191 10. REFERENCES 193 11. ACKNOWLEDGMENTS 197 12. APPENDIX A. IMAGES USED IN THE DATA BASE 198 13. APPENDIX B. PROGRAM LIST OF THE CCITT ONE DIMENSIONAL COMPRESSION TECHNIQUE 273 13.1. File Main.c 274 13.2. File Cmprsln.c 277 13.3. File Cupdt.c 280 13.4. File Clast.c 284 13.5. File Dcmprsln.c 286 13.6. File Dupdtc.c 288 V Page 13.7. File Dupdtd.c 296 13.8. File Initscrn.c 301 13.9. File Gttime.c 303 13.10. File Print.c 304 13.11. File Geth.asm 305 13.12. File Puth.asm 313 13.13. File Swap.asm 321 13.14. File Mtchbts.asm 322 14. APPENDIX C. PROGRAM LISTINGS OF THE CODE OF THE CCITT TITO DIMENSIONAL COMPRESSION TECHNIQUE 324 14.1. File Main.c 325 14.2. File Cmprs2d.c 327 14.3. File Cupdt.c 336 14.4. File Dcmprs2d.c 340 14.5. File Dcmprsln.c 352 14.6. File Bitsrng.asm 354 15. APPENDIX D. PROGRAM LIST OF METHOD LZW 356 15.1. File Main.c 357 15.2. File Cmprs.c 359 15.3. File Dcmprs.c 362 15.4. File Tables.c 365 15.5. File Scanw.asm 366 15.6. File Scrinit.c 368 vi Page 15.7. File Print.c 372 15.8. File Fadjst.c 373 15.9. File Fradjst.c 374 16. APPENDIX E. PROGRAM LIST OF METHOD LZWB 377 16.1. File Main.c 378 16.2. File Contsym.c 381 16.3. File Dcmpsym.c 383 16.4. File Mraset.asm 387 16.5. File Swapfar.asm 388 17. APPENDIX F. PROGRAM LIST OF METHOD LZWBl 390 17.1. File Dcmpsym.c 391 17.2. File Contsym.c 394 17.3. File Scan2.asm 398 17.4. File ScanS.asm 399 18. APPENDIX G. PROGRAM LIST OF METHOD LZWB2 4U1 18.1. File Dcmprs.c 402 18.2. File Tables.c 404 19. APPENDIX H. PROGRAM LIST OF METHOD LZWl 406 19.1. File Tables.c 407 19.2. File Cmprs.c 408 19.3. File Dcmprs.c 411 19.4. File Dcorapose.c 412 19.5. File Scanw2.asm 414 19.6. File Scanw3.asm 416 vii Page 20. APPENDIX I. PROGRAM LIST OF METHOD LZW2 418 20.1. File Cmprs.c 419 21. APPENDIX J. PROGRAM LIST OF METHOD LZW3 423 21.1. File Cmprs.c 424 21.2. File Tables.c 426 21.3. File Scanw4.asm 428 22. APPENDIX K. TABLE USED IN METHOD LZWB-2 430 1 1. INTRODUCTION 1.1. Statement of the Problem The library plays an important role in the academic community and the community at large. With advancement in electronic technology, it is desirable to use this technology in order to make the library more accessible to its users. It is desirable to have a library system where the user can dial up the library and access its information. The data sent should be a complete duplicate of the data in the library and not part of it. This research tries to look at one aspect of this system, namely, at the methods of compressing these data for storage and trans mission. 1.2. Features and Assumptions of the Solution The receiver in this electronic library system is assumed to originate his connection from a microcomputer. The microcomputer was chosen, instead of a dump terminal, because it provides the following necessary services to the system: a) The receiver has a processing power which is needed to decompress the received data. b) The receiver has storage facility. This allows the sender to send more than one page to a receiver.