Computers are easily detecting information lost that the human eye may not The

Computers are easily detecting information lost that

This preview shows page 12 - 18 out of 18 pages.

machine, lossy compression schemes my not be suitable. Computers are easily detecting information lost that the human eye may not. The lost of the data after decompression cause the file size difference. Usually photographic images can be compressed to quite high ratio because normally they have large areas containing quite the similar data. Image compression technique, JPEG (Joint Photographic Experts Group), is the lossy compression.
Image of page 12
The basic idea in JPEG is to analyse an image in terms of frequency content. To increase the compression ratio, the frequency data is “quantized”(divided by some value in compression and multiplied by the same value in decompression). This will cause small value to become zero (when rounded), consequently increasing the amount of data which can be remained. Another fact is JPEG compression where the original data usually in RGB format is often converted to YUV format. YUV format is express image as monochrome luminance (brightness) value (“Y”) and two “colour difference” signals (“U” and “V”). Therefore, we do not see the colours sharply. Conclusion When choosing a compression technique, we must look at more than the achievable compression ratio. With the compression ratio, we cannot certify the quality of result. In others word, we are better to use a standardized compression technique to prevent from data loss when decompression.
Image of page 13
Answer No. 3(c) Emulator in the Operating System called EOS (Emulator Operating System). EOS is the software loaded into the non-volatile/flash RAM on the Emulator so that no disk is require every time the computer / machine is boot-up.
Image of page 14
Answer No. 3(d) Introduction An extranet is a private network that uses the technology of internet and public telecommunication system to securely share part of the business information or operations with suppliers, vendors, partners, customers and other businesses. Extranet also can be definite as part of company’s intranet that is extended to use outside the company. The security and privacy is a very important for the extranet. The firewall need to apply on the extranet. The use and issuance of digital certificates or other similar is for user authentication. Message encryption and the use of virtual private network (VPN) that channel through the public network.
Image of page 15
Concept Diagram The above diagram shows that Internet Technology is the medium of the network whereas Internet Service Provider (ISP) provides the outside connection to the web. This accomplished because of the Internet’s public infrastructure and Transmission Control Protocol/Internet Protocol (TCP/IP)
Image of page 16
standards. Trading partners are request or reply is administered by the certified service provider, which will send the request or data packet to the certified exchange point operator. The Overseer (Bellcore) entity is the server that facilitates and records all transaction on the network. The diagram shows the concept of Three-Tier Client/Server arrangement. This is one of the concepts for extranet application where thousands of manufacturers, suppliers, and
Image of page 17
Image of page 18

You've reached the end of your free preview.

Want to read all 18 pages?

  • Fall '16
  • Pixel, Liquid crystal display

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors