PENERAPAN ALGORITMA INTERPOLATIVE CODING PADA APLIKASI KOMPRESI FILE GAMBAR

Author(s):  
Agung Dwi Pradana ◽  
Imam Saputra

The large amount of data that has been stored in memory or hard disk will result in increasing the amount of usage capacity on the storage media. Large file sizes can also affect the time of sending or transferring data between storage media. Therefore humans conduct a study in order to have alternative ways to overcome these problems, one of them is by means of compression techniques. In this research, an image file compression application program was built using the interpolative coding method. In building applications using Visual Basic.Net software. The construction of this application is expected to reduce storage media capacity usage. In this testing phase is done with an image file type that is a test file with RGB color type.Keywords: Compression, Image file, Interpolative Coding Algorithm

Author(s):  
Imam Riadi ◽  
Rusydi Umar ◽  
Imam Mahfudl Nasrulloh

The rapid development of computer technology in hardware, is currently developing non-volatile computer storage media Solid State Drive (SSD). SSD technology has a faster data access speed than Hard Disk and is currently starting to replace Hard Disk storage media. Freezing software on computer systems is often carried out by computer technicians, because it can save a computer maintenance costs due to errors, be exposed to computer viruses or malware. This software is used to prevent unwanted changes to the computer system, when the computer is restarted changes that occur in the computer system will not be stored on storage media. When this happens, what should be done by digital forensic investigators. This study discusses experimental forensic investigations on SSD media storage with frozen conditions or in this study said the frozen SSD. Frozen SSD is the condition of the drive that is locked so that there is no change in the computer system. Software used to lock and prevent changes such as Deep Freeze, Shadow Defender, Windows Steady State, and Toolwiz Time Freeze. Forensic research stages using methods NIST. The result shows that from comparative analysis conducted with Deep Freeze the results of the RecoverMyFile gives 76.38% and Autopsy gives 75,27%, while frozen condition with Shadow Defender the results of the RecoverMyFile gives 59.72% and Autopsy gives 74.44%. So the results of this study indicate the drive freezing software has an effect obtained can be an obstacle in the digital forensic process.  


2014 ◽  
Vol 644-650 ◽  
pp. 1620-1624
Author(s):  
Yuan Hua Yang ◽  
Xian Bin Xu ◽  
Shui Bing He ◽  
Yu Hua Wen

Although hard disk drives have been popular over several decades, there still exists the deficiency because of their slow speeds and high power consumptions. By contrast, flash-based solid state disks exhibit good performance and low power consumption. However, the limited lifetimes become a fatal flaw of solid state disks. In order to take full advantage of hard disk drives and solid state disks, we design a hybrid storage system to make them work in a complementary manner. Further, we propose a data placement scheme for this system to determine the data placement on the underlying solid state disks or hard disk drives based on the data access statistics. Experiment results show that the lifetime of solid state disks and the response time of the system can be significantly improved compared with the alone storage media.


Now a day’s quantity of data growing day by day accordingly the size of storage media is also increasing rapidly. In most of the storage devices flash memories are used one of them is Solid State drive. Solid state drives i.e. SSDs are non-volatile data storage devices which store determined data in NAND or NOR i.e. in flash memories, which provides similar functionality like traditional hard disk (HDD). This paper provides comparative study of Solid-state drives over Hard-disk drives. Also, implementation of algorithm to enhance the security of Solid-state drives in terms of user authentication, access control and media recovery from ATA security feature set. This algorithm fulfils security principles like Authentication and Data Integrity.


Author(s):  
Agus Adi Pramadi ◽  
Surya Darma Nasution ◽  
Bister Purba

Some image files are very large in size. So it requires a large memory storage capacity too, this is certainly a lot of costs that must be spent on the storage media. With the existence of a very large image file size in the process of sending image data files can fail because the storage media exceeds the maximum limit. The above problems can be overcome by performing the process of compressing large image files into small sizes or can reduce the bit size contained in each image file thereby saving storage containers and simplifying the process of transferring image files to other storage media. The solution to this problem is how the image file can be compressed in order to speed up the transfer and storage of image files. Image file compression aims to reduce or reduce the size of the file but does not eliminate the information data in it. With the compression technique, the data was initially large so that the size of the data can be reduced so as to save storage allocation space. In this study using the Even-Rodeh Code algorithm, using the method results in very good compression in tramisi data and transfer of image file allocation easier and faster.Keywords: Image File Compression, Event Rode Code Algorithm


Author(s):  
T. E. Mitchell ◽  
M. R. Pascucci ◽  
R. A. Youngman

1. Introduction. Studies of radiation damage in ceramics are of interest not only from a fundamental point of view but also because it is important to understand the behavior of ceramics in various practical radiation enyironments- fission and fusion reactors, nuclear waste storage media, ion-implantation devices, outer space, etc. A great deal of work has been done on the spectroscopy of point defects and small defect clusters in ceramics, but relatively little has been performed on defect agglomeration using transmission electron microscopy (TEM) in the same kind of detail that has been so successful in metals. This article will assess our present understanding of radiation damage in ceramics with illustrations using results obtained from the authors' work.


2019 ◽  
Vol 35 (6) ◽  
pp. 855-867 ◽  
Author(s):  
John T. Kulas ◽  
Rachael Klahr ◽  
Lindsey Knights

Abstract. Many investigators have noted “reverse-coding” method factors when exploring response pattern structure with psychological inventory data. The current article probes for the existence of a confound in these investigations, whereby an item’s level of saturation with socially desirable content tends to covary with the item’s substantive scale keying. We first investigate its existence, demonstrating that 15 of 16 measures that have been previously implicated as exhibiting a reverse-scoring method effect can also be reasonably characterized as exhibiting a scoring key/social desirability confound. A second set of analyses targets the extent to which the confounding variable may confuse interpretation of factor analytic results and documents strong social desirability associations. The results suggest that assessment developers perhaps consider the social desirability scale value of indicators when constructing scale aggregates (and possibly scales when investigating inter-construct associations). Future investigations would ideally disentangle the confound via experimental manipulation.


CCIT Journal ◽  
2019 ◽  
Vol 12 (2) ◽  
pp. 170-176
Author(s):  
Anggit Dwi Hartanto ◽  
Aji Surya Mandala ◽  
Dimas Rio P.L. ◽  
Sidiq Aminudin ◽  
Andika Yudirianto

Pacman is one of the labyrinth-shaped games where this game has used artificial intelligence, artificial intelligence is composed of several algorithms that are inserted in the program and Implementation of the dijkstra algorithm as a method of solving problems that is a minimum route problem on ghost pacman, where ghost plays a role chase player. The dijkstra algorithm uses a principle similar to the greedy algorithm where it starts from the first point and the next point is connected to get to the destination, how to compare numbers starting from the starting point and then see the next node if connected then matches one path with the path). From the results of the testing phase, it was found that the dijkstra algorithm is quite good at solving the minimum route solution to pursue the player, namely by getting a value of 13 according to manual calculations


Sign in / Sign up

Export Citation Format

Share Document