machine, lossy compression schemes my not be suitable. Computers are easily detecting information lost that the human eye may not. The lost of the data after decompression cause the file size difference. Usually photographic images can be compressed to quite high ratio because normally they have large areas containing quite the similar data. Image compression technique, JPEG (Joint Photographic Experts Group), is the lossy compression.
The basic idea in JPEG is to analyse an image in terms of frequency content. To increase the compression ratio, the frequency data is “quantized”(divided by some value in compression and multiplied by the same value in decompression). This will cause small value to become zero (when rounded), consequently increasing the amount of data which can be remained. Another fact is JPEG compression where the original data usually in RGB format is often converted to YUV format. YUV format is express image as monochrome luminance (brightness) value (“Y”) and two “colour difference” signals (“U” and “V”). Therefore, we do not see the colours sharply. Conclusion When choosing a compression technique, we must look at more than the achievable compression ratio. With the compression ratio, we cannot certify the quality of result. In others word, we are better to use a standardized compression technique to prevent from data loss when decompression.
Answer No. 3(c) Emulator in the Operating System called EOS (Emulator Operating System). EOS is the software loaded into the non-volatile/flash RAM on the Emulator so that no disk is require every time the computer / machine is boot-up.
Answer No. 3(d) Introduction An extranet is a private network that uses the technology of internet and public telecommunication system to securely share part of the business information or operations with suppliers, vendors, partners, customers and other businesses. Extranet also can be definite as part of company’s intranet that is extended to use outside the company. The security and privacy is a very important for the extranet. The firewall need to apply on the extranet. The use and issuance of digital certificates or other similar is for user authentication. Message encryption and the use of virtual private network (VPN) that channel through the public network.
Concept Diagram The above diagram shows that Internet Technology is the medium of the network whereas Internet Service Provider (ISP) provides the outside connection to the web. This accomplished because of the Internet’s public infrastructure and Transmission Control Protocol/Internet Protocol (TCP/IP)
standards. Trading partners are request or reply is administered by the certified service provider, which will send the request or data packet to the certified exchange point operator. The Overseer (Bellcore) entity is the server that facilitates and records all transaction on the network. The diagram shows the concept of Three-Tier Client/Server arrangement. This is one of the concepts for extranet application where thousands of manufacturers, suppliers, and
- Fall '16
- Pixel, Liquid crystal display
Other Related Materials
- 4 Next you would have to locate the microprocessor on the motherboard which is
- KCA University
- BIT 2202 - Summer 2016
- Bump and Environment Mapping Bump mapping Texture mapping is good for changing
- Mount Kenya University
- BIT 4102 - Summer 2019
BIT4102 Computer Graphics.pdf
- Data Tier This tier consists of Database Servers Here information is stored and
- Karatina University
- BIT 034 - Summer 2019
INTERNET TECHNOLOGY CLASSNOTES
- taxes both Macintosh and PC processing capabilities special hardware
- Mount Kenya University
- BIT 4203 - Summer 2019
BIT 4203 Distributed Multimedia Systems.pdf