Results 91 to 100 of about 23,892 (198)

Implementasi Algoritma Adaptive Huffman Code Dalam Kompresi File Teks Terenkripsi Algoritma Loki97

open access: yesJournal of Computing and Informatics Research, 2021
Data security and confidentiality is one of the most important aspects in today's information systems. Due to the rapid development of science and technology that allows the emergence of new techniques, which are misused by certain parties that threaten the security of the information system.
openaire   +1 more source

Global Warming Enhances Tropical Cyclone–Induced Extreme Precipitation in the Arabian Sea: Insights From Convection‐Permitting Model Experiments

open access: yesEarth's Future, Volume 14, Issue 2, February 2026.
Abstract The frequency and intensity of extreme weather events have risen with climate change, affecting multiple sectors worldwide. This study examines the influence of anthropogenic warming on intense tropical cyclones (TCs) over the Arabian Sea using convection‐permitting simulations with the Weather Research and Forecasting (WRF) model.
Akash Pathaikara   +7 more
wiley   +1 more source

Mapping Evapotranspiration and Diffuse Recharge via Variational Assimilation of GOES LST and SMAP Soil Moisture

open access: yesWater Resources Research, Volume 62, Issue 2, February 2026.
Abstract Evapotranspiration (ET) and groundwater recharge are fundamental components of the terrestrial water cycle, critical for understanding land–atmosphere interactions, ecosystem dynamics, and climate feedbacks. However, large‐scale mapping of these fluxes is hindered by sparse in situ observations and uncertainties in land surface models.
Asif Mahmood, Leila Farhadi
wiley   +1 more source

Design of Adaptive Compression Algorithm Elias Delta Code and Huffman

open access: yes, 2018
Compression aims to reduce data before storing or moving it into storage media. Huffman and Elias Delta Code are two algorithms used for the compression process in this research. Data compression with both algorithms is used to compress text files. These two algorithms have the same way of working.
openaire   +3 more sources

Grief‐Related Chest Pain: A Review, Conceptual Analysis, and Integrative Model

open access: yesPsychophysiology, Volume 63, Issue 2, February 2026.
ABSTRACT Although the death of a loved one is a ubiquitous experience with chest pain a commonly reported symptom, grief‐related chest pain and particularly its physiological mechanisms remain under‐investigated. To address this gap, we adopted Rodger's approach to concept analysis to explore the psychoneuroimmunological mechanisms potentially linking ...
Sophia R. Evstigneev   +4 more
wiley   +1 more source

Advanced techniques and technology for efficient data storage, access, and transfer [PDF]

open access: yes
Advanced techniques for efficiently representing most forms of data are being implemented in practical hardware and software form through the joint efforts of three NASA centers.
Miller, Warner, Rice, Robert F.
core   +1 more source

Comparative Study And Analysis Of Adaptive Region Based Huffman Compression Techniques

open access: yesInternational Journal of Information Technology Convergence and Services, 2012
In this paper, the comparative studies of Adaptive Region Based Huffman compression techniques are done. All these techniques use a region formation algorithm that is also discussed. This algorithm is used to form regions whose size is adjusted depending on the ASCII value difference of elements in the file.
openaire   +1 more source

A high-speed distortionless predictive image-compression scheme [PDF]

open access: yes
A high-speed distortionless predictive image-compression scheme that is based on differential pulse code modulation output modeling combined with efficient source-code design is introduced.
Cheung, K.-M., Smyth, P., Wang, H.
core   +1 more source

Multi-rate, real time image compression for images dominated by point sources [PDF]

open access: yes
An image compression system recently developed for compression of digital images dominated by point sources is presented. Encoding consists of minimum-mean removal, vector quantization, adaptive threshold truncation, and modified Huffman encoding ...
Budge, Scott E.   +2 more
core   +1 more source

Adaptive invisible steganography for securing medical images leveraging entropy-based image encryption with the mimic octopus adaptive framework (MOAF)

open access: yesDiscover Computing
Since medical images are very sensitive and important for diagnosis and treatment, protecting their security and confidentiality is extremely important. There could be serious privacy and medical care issues if unlicensed personnel access or change such ...
S. Judy, Rashmita Khilar
doaj   +1 more source

Home - About - Disclaimer - Privacy