To see the other types of publications on this topic, follow the link: Data compression (Telecommunication).

Journal articles on the topic 'Data compression (Telecommunication)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 37 journal articles for your research on the topic 'Data compression (Telecommunication).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shibaikin, Sergei, Andrei Abbakumov, Vladimir Nikulin, and Maria S. Sokolova. "TELECOMMUNICATIONS CONVERTER FOR VISUALIZATION AND NAVIGATION SYSTEM IN LOW-INVASIVE MEDICAL MANIPULATIONS." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2021, no. 2 (April 30, 2021): 66–74. http://dx.doi.org/10.24143/2072-9502-2021-2-66-74.

Full text
Abstract:
The article highlights the progress of information and telecommunication technologies as a basis for studying modern medical diagnostics, where digital technologies are widely used. Digital medical images can be easily analyzed, stored, and transmitted over telecommunica-tions channels. Most manufacturers support the DICOM medical standard which contains complete, but in many cases redundant, information. There is considered the process of developing a cross-platform telecommunications converter of medical images for the system of visualization and navigation in low-invasive medical manipulations. The popular medical image format DICOM is considered in detail. An algorithm for converting data from the DICOM format into standard graphic files has been developed. The results of the converter operation are analyzed in the case of such characteristics as compression, signal-to-noise level and compression rate.
APA, Harvard, Vancouver, ISO, and other styles
2

Riznyk, Volodymyr. "Optimum Vector Information Technologies Based on the Multidimensional Combinatorial Configurations." International Journal of Computational and Applied Mathematics & Computer Science 3 (November 6, 2023): 104–12. http://dx.doi.org/10.37394/232028.2023.3.12.

Full text
Abstract:
Paper devoiced to optimum vector information technologies based on the multi-dimensional combinatorial configurations, such as Ideal Ring Bundles (IRBs). One-dimensional IRBs are ring ordered positive integers that form finite set of integers from 1 to S using both these numbers and all its consecutive terms. Two- and multi-dimensional IRBs make available to configure intelligent information and telecommunication systems providing generate the maximum number of distinct vector sums of consecutive terms in the combinatorial configuration. Applications profiting from optimum vector information technologies based on the multi-dimensional combinatorial theory provide for example data mining technologies and big vector data processing, data analysis and system security, signal compression and reconstruction, vector computing and telecommunications, and other branches of sciences and advanced information technologies.
APA, Harvard, Vancouver, ISO, and other styles
3

Korchynskyj, V. M., and I. O. Kozar. "APPLICATION OF SIGNAL COMPRESSION TO CONTROL DATA RATES IN ADDITIVE NOISE TELECOMMUNICATION CHANNELS." Scientific notes of Taurida National V.I. Vernadsky University. Series: Technical Sciences, no. 4 (2023): 1–4. http://dx.doi.org/10.32782/2663-5941/2023.4/01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zebin, Tahmina, Ekramul Farook, Syeda Zinath Aman, and Shahida Rafique. "LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications." Dhaka University Journal of Science 60, no. 1 (April 14, 2012): 31–36. http://dx.doi.org/10.3329/dujs.v60i1.10332.

Full text
Abstract:
Medical image analysis and data compression are rapidly evolving fields with growing applications in healthcare services e.g. teleradiology, teleconsultation, e-health, telemedicine and statistical analysis of medical data. In this paper, a Layered Set Partitioning in Hierarchical Trees (LSPIHT) algorithm for medical data compression and transmission is presented. In the LSPIHT, the encoded bit streams are divided into a number of layers for transmission and reconstruction. Starting from the base layer, by accumulating bit streams up to different enhancement layers, medical data can be reconstructed with various signal-to-noise ratios (SNRs) and resolutions. Receivers with distinct specifications can then share the same source encoder to reduce the complexity of telecommunication networks for telemedicine applications. The algorithm is compared with other algorithms for encoding ECG data, and analysis shows that the LSPIHT attains better rate-distortion performance and low network complexity than other encoding techniques.DOI: http://dx.doi.org/10.3329/dujs.v60i1.10332 Dhaka Univ. J. Sci. 60(1): 31-36, 2012 (January)
APA, Harvard, Vancouver, ISO, and other styles
5

Rahman, Md Atiqur, and Mohamed Hamada. "Lossless text compression using GPT-2 language model and Huffman coding." SHS Web of Conferences 102 (2021): 04013. http://dx.doi.org/10.1051/shsconf/202110204013.

Full text
Abstract:
Modern daily life activities produced lots of information for the advancement of telecommunication. It is a challenging issue to store them on a digital device or transmit it over the Internet, leading to the necessity for data compression. Thus, research on data compression to solve the issue has become a topic of great interest to researchers. Moreover, the size of compressed data is generally smaller than its original. As a result, data compression saves storage and increases transmission speed. In this article, we propose a text compression technique using GPT-2 language model and Huffman coding. In this proposed method, Burrows-Wheeler transform and a list of keys are used to reduce the original text file’s length. Finally, we apply GPT-2 language mode and then Huffman coding for encoding. This proposed method is compared with the state-of-the-art techniques used for text compression. Finally, we show that the proposed method demonstrates a gain in compression ratio compared to the other state-of-the-art methods.
APA, Harvard, Vancouver, ISO, and other styles
6

Cahya Dewi, Dewa Ayu Indah, and I. Made Oka Widyantara. "Usage analysis of SVD, DWT and JPEG compression methods for image compression." Jurnal Ilmu Komputer 14, no. 2 (September 30, 2021): 99. http://dx.doi.org/10.24843/jik.2021.v14.i02.p04.

Full text
Abstract:
Through image compression, can save bandwidth usage on telecommunication networks, accelerate image file sending time and can save memory in image file storage. Technique to reduce image size through compression techniques is needed. Image compression is one of the image processing techniques performed on digital images with the aim of reducing the redundancy of the data contained in the image so that it can be stored or transmitted efficiently. This research analyzed the results of image compression and measure the error level of the image compression results. The analysis to be carried out is in the form of an analysis of JPEG compression techniques with various types of images. The method of measuring the compression results uses the MSE and PSNR methods. Meanwhile, to determine the percentage level of compression using the compression ratio calculation. The average ratio for JPEG compression was 0.08605, the compression rate was 91.39%. The average compression ratio for the DWT method was 0.133090833, the compression rate was 86.69%. The average compression ratio of the SVD method was 0.101938833 and the compression rate was 89.80%.
APA, Harvard, Vancouver, ISO, and other styles
7

Rahman, Md Atiqur, Mohamed Hamada, and Jungpil Shin. "The Impact of State-of-the-Art Techniques for Lossless Still Image Compression." Electronics 10, no. 3 (February 2, 2021): 360. http://dx.doi.org/10.3390/electronics10030360.

Full text
Abstract:
A great deal of information is produced daily, due to advances in telecommunication, and the issue of storing it on digital devices or transmitting it over the Internet is challenging. Data compression is essential in managing this information well. Therefore, research on data compression has become a topic of great interest to researchers, and the number of applications in this area is increasing. Over the last few decades, international organisations have developed many strategies for data compression, and there is no specific algorithm that works well on all types of data. The compression ratio, as well as encoding and decoding times, are mainly used to evaluate an algorithm for lossless image compression. However, although the compression ratio is more significant for some applications, others may require higher encoding or decoding speeds or both; alternatively, all three parameters may be equally important. The main aim of this article is to analyse the most advanced lossless image compression algorithms from each point of view, and evaluate the strength of each algorithm for each kind of image. We develop a technique regarding how to evaluate an image compression algorithm that is based on more than one parameter. The findings that are presented in this paper may be helpful to new researchers and to users in this area.
APA, Harvard, Vancouver, ISO, and other styles
8

Gertsiy, O. "COMPARATIVE ANALYSIS OF COMPACT METHODS REPRESENTATIONS OF GRAPHIC INFORMATION." Collection of scientific works of the State University of Infrastructure and Technologies series "Transport Systems and Technologies" 1, no. 37 (June 29, 2021): 130–43. http://dx.doi.org/10.32703/2617-9040-2021-37-13.

Full text
Abstract:
The main characteristics of graphic information compression methods with losses and without losses (RLE, LZW, Huffman's method, DEFLATE, JBIG, JPEG, JPEG 2000, Lossless JPEG, fractal and Wawelet) are analyzed in the article. Effective transmission and storage of images in railway communication systems is an important task now. Because large images require large storage resources. This task has become very important in recent years, as the problems of information transmission by telecommunication channels of the transport infrastructure have become urgent. There is also a great need for video conferencing, where the task is to effectively compress video data - because the greater the amount of data, the greater the cost of transmitting information, respectively. Therefore, the use of image compression methods that reduce the file size is the solution to this task. The study highlights the advantages and disadvantages of compression methods. The comparative analysis the basic possibilities of compression methods of graphic information is carried out. The relevance lies in the efficient transfer and storage of graphical information, as big data requires large resources for storage. The practical significance lies in solving the problem of effectively reducing the data size by applying known compression methods.
APA, Harvard, Vancouver, ISO, and other styles
9

Graschew, Georgi, Stefan Rakowsky, Panagiota Balanou, and Peter M. Schlag. "Interactive telemedicine in the operating theatre of the future." Journal of Telemedicine and Telecare 6, no. 2_suppl (August 2000): 20–24. http://dx.doi.org/10.1258/1357633001935824.

Full text
Abstract:
An experimental stereoscopic system has been established in the Robert-Rössle-Klinik, including four operating theatres and the surgical research unit OP 2000. The system allows local three-dimensional image acquisition, local stereoscopic video display, in-house stereoscopic video transmission and stereoscopic links to external partners. The goal is to make high-quality patient data available in a medical centre or over a collaborative network of medical experts. In future the requirements of teleconsultation in terms of image quality and bandwidth will be heterogeneous. A sophisticated medical telecommunication system for second opinions is needed that can take advantage of intelligent compression approaches (e.g. wavelet compression) to archive, to search for image content and to transmit medical data such as images.
APA, Harvard, Vancouver, ISO, and other styles
10

Png, M. A., G. J. L. Kaw, K. P. Tan, B. H. Koh, L. Ang, and J. Filut. "Remote consultation for computerized tomography and magnetic resonance studies by means of teleradiology—experience at the Singapore General Hospital." Journal of Telemedicine and Telecare 3, no. 1_suppl (June 1997): 54–55. http://dx.doi.org/10.1258/1357633971930373.

Full text
Abstract:
A teleradiology link was established between Singapore General Hospital in Singapore and Stanford University in California, USA. Over eight months, a total of 28 cases (involving 27 magnetic resonance investigations and three computerized tomography scans) were transmitted by ISDN to California. Our initial experience with teleradiology for remote consultation was encouraging, although the data transmission cost was higher than we anticipated. However, costs could be reduced by using data compression. Long-distance telecommunication charges continue to fall, so intercontinental teleradiology of this type may be financially viable in future.
APA, Harvard, Vancouver, ISO, and other styles
11

Juozapavičius, A. "Research Information Systems." Nonlinear Analysis: Modelling and Control 1 (September 2, 1997): 29–37. http://dx.doi.org/10.15388/na.1997.1.0.15267.

Full text
Abstract:
This survey presents an overview and study of features and capabilities of information systems, which are suitable to support research work in all stages of it: developing of ideas, design, simulation, calculation, searching and exchanging of information, etc. It discusses a wide-spread attempts, purposes (and objectives) to integrate such systems, relying on capabilities of Internet. The role of methods like multimedia, algorithms of spatial data, data compression, telecommunication, in design and developing research information systems, are discussed too. This servey reflects main points in integration of information search and retrieval procedures with other research activities.
APA, Harvard, Vancouver, ISO, and other styles
12

Shah, Fadia, Jianping Li, and Raheel Ahmed Memon. "SDN Low Latency for Medical Big Data Using Wavelets." Sukkur IBA Journal of Computing and Mathematical Sciences 1, no. 1 (June 30, 2017): 28. http://dx.doi.org/10.30537/sjcms.v1i1.4.

Full text
Abstract:
New era is the age of 5G. The network has moved from the simple internet connection towards advanced LTE connections and transmission. The information and communication technology has reshaped telecommunication. For this, among many types of big data, Medical Big Data is one of the most sensitive forms of data. Wavelet is a technical tool to reduce the size of this data to make it available for the user for more time. It is also responsible for low latency and high speed data transmission over the network. The key concern is the Medical Big Data should be accurate and reliable enough so that the recommended treatment should be the concerned one. This paper proposed the scheme to support the concept of data availability without losing crucial information, via Wavelet the Medical Data compression and through SDN supportive architecture by making data availability over the wireless network. Such scheme is in favor of the efficient use of technology for the benefit of human beings in the support of medical treatments.
APA, Harvard, Vancouver, ISO, and other styles
13

VASYLKIVSKYI, MYKOLA, OLHA BOLDYREVA, GANNA VARGATYUK, and BUDASH MYHAILO. "OPTIMAL SIGNAL-CODE CONSTRUCTIONS FOR INCREASE EFFICIENCY OF 5G AND 6G MOBILE INFOCOMMUNICATION RADIO SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 319, no. 2 (April 27, 2023): 48–55. http://dx.doi.org/10.31891/2307-5732-2023-319-1-48-55.

Full text
Abstract:
The article discusses methods of increasing the efficiency of information communication radio systems of mobile communication, which includes increasing spectral efficiency and energy efficiency when used for telecommunication radio equipment. A comparison of block error coefficient values for f-OFDM, W-OFDM and OFDM methods with mixed numerology of uplink and downlink subscriber channels of access to information resources of the telecommunications network was made. As a result of the study of compression methods using several carriers, the dominant compression method for mobile communication systems, in particular, the CP-OFDM method due to its high efficiency of spectrum use, scalability and flexibility due to the introduction of a cyclic prefix, has been determined. It is proved that the CP-OFDM compression method is free from the Doppler range shift problem, thus the range and Doppler shift estimations can be considered as independent tasks in CP-OFDM. In addition, CP-OFDM parameters such as carrier distance, guard interval size, frame length, and pilot shape can be tailored to optimize the performance and robustness of detection and data transmission. However, such advantages are based on perfect synchronization (time and frequency) between the transmitter and receiver – although perfect synchronization may not be possible, especially for bistatic scanning, where the transmitter and receiver of the scan signal are not adjacent. In this case, the cyclic prefix may not provide any advantage for quality scanning, and multiple unprefixed waveforms may be considered. The main disadvantage of rejecting the prefix is the difficulty of data detection (due to intersymbol interference), which must be eliminated. Another important challenge for scanning, where energy efficiency is extremely important, is the large PAPR of multi-carrier (prefixed or unprefixed) signals. Single-carrier compression methods, which are based on the expansion of the code area of common radar signals and communication, in which the radar characteristics are affected by sequence autocorrelation, have been studied. However, the long spreading code, which leads to good autocorrelation, reduces the spectrum utilization efficiency for communication systems. In this case, the estimation of the Doppler effect is not trivial and requires more complex algorithms. The justification of the choice of the signal modulation scheme in 5/6G radio systems has been made.
APA, Harvard, Vancouver, ISO, and other styles
14

Venkatesh, G. K., S. Bhargavi, Basavaraj V. Hiremath, and C. Anil Kumar. "Design and Performance Analysis of Low Power and High Throughput of Analog Data Compression and Decompression using ANN in 32nm FinFET Technology." International Journal of Circuits, Systems and Signal Processing 15 (July 28, 2021): 730–44. http://dx.doi.org/10.46300/9106.2021.15.81.

Full text
Abstract:
The development and fabrication of integrated circuits for the applicational areas of VLSI such as processing of the signal, medicine tomography, telecommunication turn out to be a novel technology for the upcoming innovations. The fabrication of IC’s is attributable to the methodology in the technology of VLSI and when compared to artificial Neural Network, the genetic performance of these productions is approximately the same and are typically employed for diagnosing the syndrome, compression as well as the decompression of signal used in the medical domain. Techniques such as HMM, DCT, as well as PCA are employed for compression and decompression of signals but these approaches still possess some disadvantages. Therefore, to overcome these issues, a chip-level design for Artificial Neural Network is proposed that makes use of FinFET 32 nm technology and includes sigmoid activation function (SAF), Gilbert cell number, as well as bias circuits to prolong the compressed magnitude relation and accuracy. As a result, with the help of the Cadence Virtuoso analog tool, the Artificial Neural Network has been designed using FinFET 32nm technology along with all the details of sub-units such as Layout vs Schematic (LVS), Design rule check (DRC), RC extraction as well as chip level (GDS-II). Feed Forward Artificial Neural Network (FWANN) is considered as one of the most basic types of ANN and it is implemented using the concept of Back Propagation (BP). The simulation results of the suggested 16-bit 6TRAM cell were found to have 8%, 21%, and 0.9% improvement in consuming power, delay, and compressed data losses respectively.
APA, Harvard, Vancouver, ISO, and other styles
15

Tsimura, Yu, A. Kostromytskyi, O. Suhanov, and S. Dumych. "METHOD OF ENCODING VIDEO DATA IN SPECTRAL-PARAMETRIC SPACE." Information and communication technologies, electronic engineering 4, no. 1 (May 12, 2024): 61–69. http://dx.doi.org/10.23939/ictee2024.01.061.

Full text
Abstract:
It is shown that the development of modern infocommunication systems is followed by the trend of widespread use of wireless technologies. The level of intellectualization of the protocols of their functioning is increasing. Accordingly, the characteristics of wireless infocommunication technologies for data transmission are increasing. This contributes to their use for data transmission from remote robotic platforms in the process of information support for the functioning of critical infrastructure. It is substantiated that the transmission of video data with the required level of bit intensity on the basis of existing on-board telecommunication technologies is organized under conditions of significant time delays. Consequently, the level of efficiency of information delivery is lost. On the other hand, there are losses in the reliability of video information. It is argued that the option for solving the problem lies in the further development of technologies for encoding video information streams. The most common platform is the JPEG format. However, the city has disadvantages. They refer to the loss of compression levels in the event of a reduction in the potential for detecting psychovisual addictions. The article substantiates an approach for improvement, which consists in the use of an adapted coding technology in the spectral-parametric space. This approach consists in detecting subbands in spectral arrays and their subsequent parameterization with the formation of structural components at a significant level and length. Further processing is proposed to be carried out taking into account the informativeness of segments and reducing the amount of structural redundancy. An approach for constructing a technology for compression of spectral arrays with the detection of spectral sub-bands is substantiated. A model has been created to find the amount of information for transformed segments in the spectral-parametric space. This takes into account the available amount of redundancy, which is established by determining the constraints on the values of structural components. A method for encoding segments in spectral-parametric description has been developed. The main basic components of the method relate to the processing of sets of two-component structural-parametric components, taking into account the peculiarities of their content depending on the presence of quantization processes.
APA, Harvard, Vancouver, ISO, and other styles
16

Barannik, Vladimir, Andrii Krasnorutsky, Sergii Shulgin, Valerii Yeroshenko, Yevhenii Sidchenko, and Andrii Hordiienko. "Image compression based on classification coding of constant-pitched functions transformers." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 3 (October 5, 2021): 48–62. http://dx.doi.org/10.32620/reks.2021.3.05.

Full text
Abstract:
The subject of research in the article are the processes of video image processing using an orthogonal transformation for data transmission in information and telecommunication networks. The aim is to build a method of compression of video images while maintaining the efficiency of its delivery at a given informative probability. That will allow to provide a gain in the time of delivery of compressed video images, a necessary level of availability and authenticity at transfer of video data with preservation of strictly statistical regulations and the controlled loss of quality. Task: to study the known algorithms for selective processing of static video at the stage of approximation and statistical coding of the data based on JPEG-platform. The methods used are algorithm based on JPEG-platform, methods of approximation by orthogonal transformation of information blocks, arithmetic coding. It is a solution of scientific task-developed methods for reducing the computational complexity of transformations (compression and decompression) of static video images in the equipment for processing visual information signals, which will increase the efficiency of information delivery.The following results were obtained. The method of video image compression with preservation of the efficiency of its delivery at the set informative probability is developed. That will allow to fulfill the set requirements at the preservation of structural-statistical economy, providing a gain in time to bring compressed images based on the developed method, relative to known methods, on average up to 2 times. This gain is because with a slight difference in the compression ratio of highly saturated images compared to the JPEG-2000 method, for the developed method, the processing time will be less by at least 34%.Moreover, with the increase in the volume of transmitted images and the data transmission speed in the communication channel - the gain in the time of delivery for the developed method will increase. Here, the loss of quality of the compressed/restored image does not exceed 2% by RMS, or not worse than 45 dB by PSNR. What is unnoticeable to the human eye.Conclusions. The scientific novelty of the obtained results is as follows: for the first time the method of classification (separate) coding (compression) of high-frequency and low-frequency components of Walsh transformants of video images is offered and investigated, which allows to consider their different dynamic range and statistical redundancy reduced using arithmetic coding. This method will allow to ensure the necessary level of availability and authenticity when transmitting video data, while maintaining strict statistical statistics.Note that the proposed method fulfills the set tasks to increase the efficiency of information delivery. Simultaneously, the method for reducing the time complexity of the conversion of highly saturated video images using their representation by the transformants of the discrete Walsh transformation was further developed. It is substantiated that the perspective direction of improvement of methods of image compression is the application of orthogonal transformations on the basis of integer piecewise-constant functions, and methods of integer arithmetic coding of values of transformant transformations.It is substantiated that the joint use of Walsh transformation and arithmetic coding, which reduces the time of compression and recovery of images; reduces additional statistical redundancy. To further increase the degree of compression, a classification coding of low-frequency and high-frequency components of Walsh transformants is developed. It is shown that an additional reduction in statistical redundancy in the arrays of low-frequency components of Walsh transformants is achieved due to their difference in representation. Recommendations for the parameters of the compression method for which the lowest value of the total time of information delivery is provided are substantiated.
APA, Harvard, Vancouver, ISO, and other styles
17

Corera, Iñigo, Enrique Piñeiro, Javier Navallas, Mikel Sagues, and Alayn Loayssa. "Long-Range Traffic Monitoring Based on Pulse-Compression Distributed Acoustic Sensing and Advanced Vehicle Tracking and Classification Algorithm." Sensors 23, no. 6 (March 15, 2023): 3127. http://dx.doi.org/10.3390/s23063127.

Full text
Abstract:
We introduce a novel long-range traffic monitoring system for vehicle detection, tracking, and classification based on fiber-optic distributed acoustic sensing (DAS). High resolution and long range are provided by the use of an optimized setup incorporating pulse compression, which, to our knowledge, is the first time that is applied to a traffic-monitoring DAS system. The raw data acquired with this sensor feeds an automatic vehicle detection and tracking algorithm based on a novel transformed domain that can be regarded as an evolution of the Hough Transform operating with non-binary valued signals. The detection of vehicles is performed by calculating the local maxima in the transformed domain for a given time-distance processing block of the detected signal. Then, an automatic tracking algorithm, which relies on a moving window paradigm, identifies the trajectory of the vehicle. Hence, the output of the tracking stage is a set of trajectories, each of which can be regarded as a vehicle passing event from which a vehicle signature can be extracted. This signature is unique for each vehicle, allowing us to implement a machine-learning algorithm for vehicle classification purposes. The system has been experimentally tested by performing measurements using dark fiber in a telecommunication fiber cable running in a buried conduit along 40 km of a road open to traffic. Excellent results were obtained, with a general classification rate of 97.7% for detecting vehicle passing events and 99.6% and 85.7% for specific car and truck passing events, respectively.
APA, Harvard, Vancouver, ISO, and other styles
18

Murugesan, G., and Rosario Gilmary. "Compression of text files using genomic code compression algorithm." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 69. http://dx.doi.org/10.14419/ijet.v7i2.31.13399.

Full text
Abstract:
Text files utilize substantial amount of memory or disk space. Transmission of these files across a network depends upon a considerable amount of bandwidth. Compression procedures are explicitly advantageous in telecommunications and information technology because it facilitate devices to disseminate or reserve the equivalent amount of data in fewer bits. Text compression techniques section, the English passage by observing the patters and provide alternative symbols for larger patters of text. To diminish the depository of copious information and data storage expenditure, compression algorithms were used. Compression of significant and massive cluster of information can head to the improvement in retrieval time. Novel lossless compression algorithms have been introduced for better compression ratio. In this work, the various existing compression mechanisms that are particular for compressing the text files and Deoxyribonucleic acid (DNA) sequence files are analyzed. The performance is correlated in terms of compression ratio, time taken to compress/decompress the sequence and file size. In this proposed work, the input file is converted to DNA format and then DNA compression procedure is applied.
APA, Harvard, Vancouver, ISO, and other styles
19

Shirsat, T. G., and V. K. Bairagi. "Lossless Medical Image Compression by Integer Wavelet and Predictive Coding." ISRN Biomedical Engineering 2013 (June 4, 2013): 1–6. http://dx.doi.org/10.1155/2013/832527.

Full text
Abstract:
The future of healthcare delivery systems and telemedical applications will undergo a radical change due to the developments in wearable technologies, medical sensors, mobile computing, and communication techniques. When dealing with applications of collecting, sorting and transferring medical data from distant locations for performing remote medical collaborations and diagnosis we required to considered many parameters for telemedical application. E-health was born with the integration of networks and telecommunications. In recent years, healthcare systems rely on images acquired in two-dimensional domains in the case of still images or three-dimensional domains for volumetric video sequences and images. Images are acquired by many modalities including X-ray, magnetic resonance imaging, ultrasound, positron emission tomography, and computed axial tomography (Sapkal and Bairagi, 2011). Medical information is either in multidimensional or multiresolution form, which creates enormous amount of data. Retrieval, efficient storage, management, and transmission of these voluminous data are highly complex. One of the solutions to reduce this complex problem is to compress the medical data without any loss (i.e., lossless). Since the diagnostics capabilities are not compromised, this technique combines integer transforms and predictive coding to enhance the performance of lossless compression. The proposed techniques can be evaluated for performance using compression quality measures.
APA, Harvard, Vancouver, ISO, and other styles
20

Armand, Atiampo Kodjo, Gokou Hervé Fabrice Diédié, and N’Takpé Tchimou Euloge. "Super-tokens Auto-encoders for image compression and reconstruction in IoT applications." International Journal of Advances in Scientific Research and Engineering 10, no. 01 (2024): 29–46. http://dx.doi.org/10.31695/ijasre.2024.1.4.

Full text
Abstract:
New telecommunications networks are enabling powerful AI applications for smart cities and transport. These applications require real-time processing of large amounts of media data. Sending data to the cloud for processing is very difficult due to latency and energy constraints. Lossy compression can help, but traditional codecs may not provide enough quality or be efficient enough for resource-constrained devices. This paper proposes a new image compression and processing approach based on variational auto-encoders (VAEs). This VAE-based method aims to efficiently compress images while still allowing for high-quality reconstruction and object detection tasks. The encoder is designed to be lightweight and suitable for devices with limited computing power. The decoder is more complex and uses multi-level vector quantization to reconstruct high-resolution images. This approach allows for a simple encoder on edge devices and a powerful decoder on cloud servers. Key contributions include a low-complexity encoder, a new VAE model based on vector quantization, and a framework for using VAEs in IoT. The first experiments on reconstructed images on CelebA and ImageNet100 datasets show promising results in terms of MS-SSIM, PSNR, MSE and rFID compared to the literature and the ability of our approach to be used in IoT applications. Our approach presents results similar to complex algorithms like compression algorithms BPG in term of trade-off rate-distortion, and hierarchical auto-encoder (HQA) in terms of image reconstruction quality
APA, Harvard, Vancouver, ISO, and other styles
21

Sai Subramanyam Thoota, Dolores Garcia Marti, �zlem Tugfe Demir, Rakesh Mundlamuri, Joan Palacios, Cenk M. Yetis, Christo Kurisummoottil Thomas, et al. "Site-specific millimeter-wave compressive channel estimation algorithms with hybrid MIMO architectures." ITU Journal on Future and Evolving Technologies 2, no. 4 (July 14, 2021): 9–26. http://dx.doi.org/10.52953/oeeg5719.

Full text
Abstract:
In this paper, we present and compare three novel model-cum-data-driven channel estimation procedures in a millimeter-wave Multi-Input Multi-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) wireless communication system. The transceivers employ a hybrid analog-digital architecture. We adapt techniques from a wide range of signal processing methods, such as detection and estimation theories, compressed sensing, and Bayesian inference, to learn the unknown virtual beamspace domain dictionary, as well as the delay-and-beamspace sparse channel. We train the model-based algorithms with a site-specific training dataset generated using a realistic ray tracing-based wireless channel simulation tool. We assess the performance of the proposed channel estimation algorithms with the same site's test data. We benchmark the performance of our novel procedures in terms of normalized mean squared error against an existing fast greedy method and empirically show that model-based approaches combined with data-driven customization unanimously outperform the state-of-the-art techniques by a large margin. The proposed algorithms were selected as the top three solutions in the "ML5G-PHY Channel Estimation Global Challenge 2020" organized by the International Telecommunication Union.
APA, Harvard, Vancouver, ISO, and other styles
22

Yevseiev, Serhii, Ahmed Abdalla, Serhii Osiievskyi, Volodymyr Larin, and Mykhailo Lytvynenko. "DEVELOPMENT OF AN ADVANCED METHOD OF VIDEO INFORMATION RESOURCE COMPRESSION IN NAVIGATION AND TRAFFIC CONTROL SYSTEMS." EUREKA: Physics and Engineering 5 (September 30, 2020): 31–42. http://dx.doi.org/10.21303/2461-4262.2020.001405.

Full text
Abstract:
The Earth's aerospace monitoring (ASM) systems use state-of-the-art integrated information technologies that include radio-based detection and surveillance systems using telecommunications. One of the main tasks of ASM systems is to increase the efficiency of decision-making necessary for the timely prevention, detection, localization and elimination of crisis situations and their probable consequences. Modern conditions impose stricter requirements for efficiency, reliability and quality of the provided video data. To ensure compliance with the requirements, it is necessary to provide the appropriate capabilities of the onboard equipment. On the basis of the existing information and communication systems it is necessary to carry out: continuous or periodic assessment of a condition of objects of supervision and control; continuous (operational) collection, reception, transmission, processing, analysis and display of information resources. It is proposed to use UAVs (unmanned aerial vehicles) as a means to perform ASM tasks. The time of organizing communication sessions and delivery of information should vary from a few seconds to 2.5 hours. Untimely processing and delivery of a specific information resource in the management process leads to its obsolescence or loss of relevance, which contributes to erroneous decisions. One way to reduce time is to encode the data. To do this, it is proposed to use video compression algorithms. However, based on the analysis of the possibility of modern methods of video information compression, taking into account the specifics of the onboard equipment of the UAV, the coding problem is not completely solved. The research results show the expediency of using an improved method of video information compression to reduce the computing resources of the software and hardware complex of the onboard UAV equipment and to ensure the requirements for efficiency and reliability of data in modern threats to ASM systems as a whole.
APA, Harvard, Vancouver, ISO, and other styles
23

Wilson, Eugene M., and Khaled Ksaibati. "New Partnership Between Universities and State Departments of Transportation in the Rocky Mountain Area: The TEL8 System." Transportation Research Record: Journal of the Transportation Research Board 1580, no. 1 (January 1997): 11–15. http://dx.doi.org/10.3141/1580-02.

Full text
Abstract:
In 1995, the Mountain-Plains Consortium in the Rocky Mountain area initiated TEL8. TEL8 is a satellite-based telecommunications system serving 10 sites in FHWA’s Region 8. Each site consists of in-room audio and video equipment that receives and transmits live sound and picture, coding/decoding compression equipment, and a satellite transmission system. Each site is capable of sending and receiving signals from other sites in several modes of conferencing ranging from broadcast to multipoint two-way conferencing. The goals of TEL8, its development, and lessons learned are presented along with cost data for this cutting-edge technology. The many applications, including formal graduate course work, informally scheduled learning opportunities, and open communication forums, are also discussed. The system provides a network for interaction among the six departments of transportation and four regional universities. A user assessment of this form of distance learning is compared with more traditional forms using results of several client-based surveys.
APA, Harvard, Vancouver, ISO, and other styles
24

Siergiejczyk, Mirosław, and Adam Rosiński. "Analysis of the Vehicle Exploitation Process with Regard to Profiling." Journal of KONES 26, no. 4 (December 1, 2019): 219–25. http://dx.doi.org/10.2478/kones-2019-0111.

Full text
Abstract:
AbstractTransport telematics systems integrate information technology with telecommunications for their use in various transport systems. Thanks to the use of advanced technical solutions and modern telecommunications and IT systems, it is possible to implement additional innovative services. They can be used to rationalize the process of using and maintaining means of transport. Modern vehicles are equipped with telematic on-board systems. Such solutions combine various electronic devices used in the vehicle. For this purpose, bus solutions are used, thanks to which it is possible to control individual systems and devices. It is also possible to use the transmitted data to detect negative exploitation phenomena during vehicle use (e.g. glazing phenomenon, work in the upper engine rev range with too low coolant temperature, intensive work compressor of the high air pressure system being a symptom of inability of pneumatic systems). This is possible because the data being sent has a specific information resource. Thanks to this, to can be concluded about the loss of the exploitation potential of the vehicle. This approach will be used to rationalize the technical service of the vehicle fleet, with regard to profiling. Using exploitation data, received via a telematic interface from vehicles, it is possible to profile the rolling stock. It consists in distinguishing individual sets of vehicles due to certain reliability and exploitation properties. This approach allows for the specification of the rolling stock exploitation, giving the opportunity to rationalize the use and exploitation. The publication presents the author’s graph of the exploitation process taking into account the profiling of the vehicle fleet. The application of the presented approach will contribute to the improvement of the value of certain vehicle reliability and exploitation indicators.
APA, Harvard, Vancouver, ISO, and other styles
25

Aronov, Alexander M., Vladimir L. Pastushenko, Dmitry O. Ivanov, Yaroslav V. Rudin, and Alexey N. Drygin. "Contemporary aspects of innovative visualization digital medical technologies’ introduction into clinical practice and education." Pediatrician (St. Petersburg) 9, no. 4 (December 15, 2018): 5–11. http://dx.doi.org/10.17816/ped945-11.

Full text
Abstract:
The paper portrays the elaboration and characters of digital hardware and software complex targeted at automatic forming, registration and processing of biomedical object images for non-invasive diagnostics based upon digital microscopy and endoscopia. Digital hardware and software complex is collecting, preliminary analyzing and compressing video-information for transmission along telecommunication channels. Complexes of this kind may serve as a basis for elaboration and introduction of new prospective medical technologies like visual and digital databases for education programs and atlases for discrimination of pathological cells and states. For a starter an aggregation of clinical and laboratory diagnostics systems has been chosen utilizing images from the outputs of digital microvisual and endoscopical systems for elaboration of optical digital diagnostics complexes. Microvisional digital multispectral analysis system ensures forming and visualization of biological tissues’ and medical slides’ microimages. The videoendoscopic system is intended for endoscopic examination of gastrointestinal tract with forming and visualization of endoscopic images, documenting and archiving of data. This system is networked according to TCP/IP protocol. The microvisional and vi deoendoscopic systems grant distant access to images and control functions for remote users from local networks or through WEB-interface.
APA, Harvard, Vancouver, ISO, and other styles
26

Khatib, Ohoud, and Khaled Alshawabkeh. "Digital Transformation and Its Impact on Strategic Supremacy Mediating Role of Digital HRM: an Evidence From Palestine." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 19 (January 14, 2022): 197–221. http://dx.doi.org/10.37394/23207.2022.19.20.

Full text
Abstract:
This study aims to identify the impact of digital transformation in achieving strategic sovereignty in a world that is intensely competitive and in a digitalized era. In the study, the human resource management variable serves as an intermediary variable in the relationship between digital transformation and strategic leadership. The study population consists of (420 top and middle) managers in two mobile telecommunications companies in Palestine, namely: Jawwal and Ooredoo. The study is based on the quantitative approach using a proportional stratified sample, as a 201- item questionnaire is developed using the Seven-Point Likert Scale to study the three variables. The independent variable is digital transformation and its dimensions (Business Model, Customer Experience, Digital Processes, and Impact on People), while the dependent variable is Strategic Supremacy including its three dimensions (Scope of Influence, Competitive Configuration, and Competitive Compression), while digital human resources management serves as an intermediate variable. The data contained herein is analyzed by the Smart PLS Program - structural equation modelling (Second Order). The study shows a positive and good impact of digital transformation on strategic supremacy. The same applies to the impact of digital human resources management thereon. The study concludes that even though digital transformation has a very good impact on human resource management, digital human resources management is a mediating variable in the relationship between digital transformation and strategic supremacy, or even a partial mediator.
APA, Harvard, Vancouver, ISO, and other styles
27

"Development of High Quality Color Image Compression using Block Transformation." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (August 10, 2019): 2566–72. http://dx.doi.org/10.35940/ijitee.j9187.0881019.

Full text
Abstract:
The upcoming era of social media will be highly equipped with the images and the videos. Images or multimedia content sharing and storing services are still costly for common man which is need to be resolved to cover all the users either middle class or high society users. Various online platforms have filled the gaps for freedom of expression for everyone. The huge demand of the multimedia data sharing through the telecommunication networks has increased. The compression of images has changed the requirements for effective transmission and storage media. With the convenience of accessibility of press tools and digital image web exchange, there has been a dramatic increase. Image is the least component of multimedia information and includes a important portion of the velocity of communication for multimedia data communication n Developments in image compression techniques have therefore developed potential requirement. For all pictures, a fundamental concept of image formation is that the pixels are linked and comprise extremely useless data afterwards. The primary objective of this job is to discover in the image reduced associated pixel intensities. In this work an adaptive frequency domain block processing for color image compression has developed and simulated
APA, Harvard, Vancouver, ISO, and other styles
28

Kardaras, Konstantinos, George I. Lambrou, and Dimitrios Koutsouris. "Telematics Healthcare Through Digital Terrestrial Television Networks: Applications and Perspectives." International Journal of Sensors, Wireless Communications and Control 10 (June 20, 2020). http://dx.doi.org/10.2174/1573398x16999200620231518.

Full text
Abstract:
Background: The trend nowadays is the interconnection of rural health centers with a specialized monitoring medical center. Aim: The paper investigates the qualitative and quantitative characteristics that degrade the perceived video picture quality for a variety of short MPEG-4 video clips. Methods: In the present work our approach was considered in three branches; first the customization of video quality in terms of video and data compression, so maximum quality is achieved, second the use of the optimized video data transfer for emergency situations and third the subsequent creation of a “virtual doctor”. Results: Further on, novel architectures will be suggested in order to achieve the creation of a broadcasting network for healthcare telematics. Remote medical supervision and healthcare treatment will be provided to remote patients in rural health centers and understaffed areas that lack telemetry infrastructures and medical expertise personnel. Conclusions: The proposed architecture, along with the optimized data transmission, demonstrates the integration of present and forthcoming telecommunication network technologies enabling remote interactivity for fixed, portable and mobile users.
APA, Harvard, Vancouver, ISO, and other styles
29

Cho, Yun-Hang, Gianni Heung, Yakov Bobrov, Joseph Middleton, Josh Brownlow, Gary Verth, and Viktor Fedun. "SunbYte: an autonomous pointing framework for low-cost robotic solar telescopes on high altitude balloons." Experimental Astronomy 57, no. 3 (June 2024). http://dx.doi.org/10.1007/s10686-024-09944-w.

Full text
Abstract:
AbstractThe design and usability of a fully autonomous robotic control system (SunbYte - Sheffield University Balloon “lYfted” TElescope) for solar tracking and observational applications onboard high-altitude balloons are addressed here. The design is based on a six-step development plan balancing scientific objectives and practical engineering requirements. The high-altitude solar observational system includes low-cost components such as a Cassegrain-type telescope, stepper motors, harmonic drives, USB cameras and microprocessors. OpenCV installed from ROS (Robotic Operating System), python and C facilitated the collection, compression, and processing of housekeeping and scientific data. This processed data was then transmitted to the ground station through the launch vehicle’s telecommunication link. The SunbYte system allows the brightest spot in the sky, the sun, to be identified, and a telescope pointed towards it with high enough accuracy that a scientific camera can capture images. This paper gathers and presents the results from primarily two missions with the High-Altitude Student Platform (HASP, NASA Balloon Program office and LaSpace). Additionally, a discussion will be made comparing these with an earlier iteration flown with the German-Swedish “REXUS/BEXUS” programme coordinated by the European Space Agency. By capturing and analysing a series of tracking images with the location of the Sun at the calibrated centre, the system demonstrated the tracking capabilities on an unstable balloon during ascent. Housekeeping sensor data was collected to further analyse the thermal and mechanical performance. The low temperature increased friction in the drive train and reduced the responsiveness of the harmonic drive actuation system. This caused some issues which require further work in future missions, for example, with SunbYte 4 and its work when flying with the HEMERA ZPB (Zero Pressure Balloon) program.
APA, Harvard, Vancouver, ISO, and other styles
30

"Integrated HNAS Network Model Based Lossless Compression with Data Hiding using Parity Check in Medical Images." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (February 10, 2020): 2656–62. http://dx.doi.org/10.35940/ijitee.d1756.029420.

Full text
Abstract:
A massive volume of medical data is generating through advanced medical image modalities. With advancements in telecommunications, Telemedicine, and Teleradiologyy have become the most common and viable methods for effective health care delivery around the globe. For sufficient storage, medical images should be compressed using lossless compression techniques. In this paper, we aim at developing a lossless compression technique to achieve a better compression ratio with reversible data hiding. The proposed work segments foreground and background area in medical images using semantic segmentation with the Hierarchical Neural Architecture Search (HNAS) Network model. After segmenting the medical image, confidential patient data is hidden in the foreground area using the parity check method. Following data hiding, lossless compression of foreground and background is done using Huffman and Lempel-Ziv-Welch methods. The performance of our proposed method has been compared with those obtained from standard lossless compression algorithms and existing reversible data hiding methods. This proposed method achieves better compression ratio and a hundred percent reversible when data extraction.
APA, Harvard, Vancouver, ISO, and other styles
31

Astakhov, N. V., A. V. Bashkirov, O. Yu Makarov, A. S. Demikhova, and M. Yu Chepelev. "Application of the method of equivalent message encoding structures to simplify coding complexity." Radioengineering 8 (August 1, 2023). http://dx.doi.org/10.18127/j00338486-202308-03.

Full text
Abstract:
Formulation of the problem. Modern telecommunication technologies make it possible to transmit data over long distances with limitations in the form of low power consumption and low error rate using error correction codes. The use of such codes plays an important role and is necessary to detect and correct errors caused by signal distortion and noise in the communication channel. According to Shannon's channel coding theorem, the probability of error can be arbitrarily small or close to zero if the encoding rate of transmission R is less than or equal to the bandwidth of channel C. Assuming that the bandwidth C is achievable, we can calculate the minimum signal-to-noise power ratio (SNR) to achieve zero error, or an arbitrarily small error called the Shannon limit, while maintaining R ≤ C. This article discusses a method of applying equivalent message encoding structures to construct low-density parity-checking (LDPC) codes. Low-density parity-checking (LDPC) codes are a class of linear block codes in which the complexity of iterative decoding increases linearly with increasing block length. Standard LDPC codes without modifications are considered to demonstrate the effectiveness of the proposed method, which is expected to provide high encoding speed when transmitting messages with a short block length. The method of obtaining equivalent structures allows: to reduce the computational complexity of encoding and decoding; to provide the possibility of finding a new encoding scheme and evaluating its effectiveness. The validity of the method for obtaining equivalent message encoding structures is evaluated by modeling the bit error rate (BER) of LDPC codes. Purpose. to show the effectiveness of the use of equivalent structures for various methods of compression of transmitted information, to minimize the complexity of encoding, while maintaining energy efficiency, correcting ability and data transfer rate. Results. A method is considered for obtaining equivalent message element encoding structures that can be used to create more LDPC codes for data transmission applications with a short block length. The cascade principle of constructing an equivalent generator and a parity check matrix was analyzed, which also leads to minimizing the computational complexity of the encoder and decoder. An equivalent structure G can be obtained from cascading two (or more) matrices by modifying the second matrix so that it has a unit matrix with the size of the parity check length and a shift to the right by k bits. On the other hand, the equivalent structure H can be obtained by simply cascading directly the second matrix and shifting to the right by k bits. According to the simulation results, the proposed method is adequate, since LDPC codes have the same BER characteristics as codes based on the low density generator matrix (LDGM). During the simulation, it was concluded that the SPC codes (single parity check (single parity check (SPC)) are the most efficient codes (for a given block length), since SPC codes have the smallest interval up to the Shannon limit. Practical significance. The results presented in this article will give a new insight into the development of simple channel coding of LDPC codes of short block length with high encoding speed for future applications with lower power consumption.
APA, Harvard, Vancouver, ISO, and other styles
32

Kronemeyer, Kara, Kameron Shee, Vatsal Chikani, Normandy Villa, Lesley Osborn, Micah Panczyk, and Bentley Bobrow. "Abstract 239: 911 Caller Description of Seizure-Like Symptoms and Delays to Starting Telecommunicator CPR." Circulation 140, Suppl_2 (November 19, 2019). http://dx.doi.org/10.1161/circ.140.suppl_2.239.

Full text
Abstract:
Background: Bystander cardiopulmonary resuscitation (BCPR) improves survival after out-of-hospital cardiac arrest (OHCA). Identifying delays to starting Telecommunicator CPR (TCPR) may improve outcomes. Identifying terms callers use to describe seizure-like symptoms may improve accuracy and expedite TCPR. Methods: A total of 586 confirmed OHCA calls from 3 regional 911 centers in Arizona were reviewed between 2013 to 2016. Frequency of terms callers use to describe seizure-like symptoms were assessed. Demographics and TCPR process measures were compared between the seizure and non-seizure cohorts using Chi-square analysis for categorical variables and Kruskal-Wallis test for continuous variables. Other data points were time to start of seizure description, time to end of description, and time to start of seizure intervention. Results: There were 545 calls after exclusions. Twenty-six (.05%) had seizure-like symptoms described. Of these, “seizure” or “seizing” were used in 22 (84.6%) calls, “shaking” in 6 (23.1%), “cramping up” in 2 (7.7%) and convulsing in 2 (7.7%). Descriptions were more common in witnessed arrests [65.4% (17/26) vs. 34.6% (9/26); p=0.045] and in younger patients [median age=57 (QI=45, Q3=68) vs. 66 (Q1=51, Q3=77); p=0.036.] In calls with descriptions, telecommunicators were less likely to recognize OHCA [56.0% (14/25) vs. 74.5% (382/513), .031% (17/545) missing; (p=0.041] but bystanders were not less likely to start compressions [42.3% (11/26) vs. 57.6% (289/501), .033% (18/545) missing; p=0.122]. Median time to recognition in calls with descriptions was delayed vs. calls without descriptions [142 s (Q1=74 s, Q3=194 s), n=13, vs. 63 s (Q1=40 s, Q3=112 s), n=336; p=0.005], as was time to first chest compression [262 s (Q1=182 s, Q3=291 s), n=6 vs. 154 s (Q1=110 s, Q3=206 s), n=155; p=0.011]. Median times to start of description, end of description, and start of intervention were respectively: 33 s (Q1=20 s, Q3=40 s; 54 s (Q1=37 s, Q3=138 s; and 50 s (Q1=38 s, Q3=162 s). Conclusion: Description of seizure-like symptoms were uncommon and were associated with reduced and delayed OHCA recognition and delayed start of compressions.
APA, Harvard, Vancouver, ISO, and other styles
33

Laurentinus, Laurentinus. "IMPLEMENTASI KRIPTOGRAFI DAN KOMPRESI SMS MENGGUNAKAN ALGORITMA RC6 DAN ALGORITMA HUFFMAN BERBASIS ANDROID." Jurnal Ilmiah Informatika Global 8, no. 1 (July 28, 2017). http://dx.doi.org/10.36982/jiig.v8i1.237.

Full text
Abstract:
The development of telecommunications technology in the era of globalization happens very rapidly to help people to communication and one of the communication technology is using telephone device. However, the absence of security in securing data/information of delivery Short Message Service (SMS) that is confidential causes the message easily stolen by unauthorized parties. SMS sent via the BTS will be accepted Message Service Center (SMSC) been causing a crack misuse of the information. One way to secure the data from the data communication process is by cryptography. This research using descriptive statistical research methods. This research was conducted by analyzing the security by implementing the RC6 algorithm in cryptography and compression applications based on android SMS. The RC6 algorithm is an symmetric cryptographic algorithm that use the same key in encryption and decryption of SMS message. The encryption process that changes the number bits of data affects the number of SMSs that need to be sent, so text compression is required. The Huffman algorithm is a lossless data compression algorithm in which data compression does not eliminate one byte and is stored as originally. So the result of decompress is same with original ciphertext. Testing is done using Blackbox Method.This research was conducted to solve the security problem of sending SMS with cryptography and send data can be compressed to save SMS cost.Keywords : Cryptography, Encryption, Decryption, SMS, Mobile, RC6, Huffman,android
APA, Harvard, Vancouver, ISO, and other styles
34

Masykuroh, Kholidiyah. "Literature Study of Learning-Based Video Compression." JURNAL INFOTEL 15, no. 3 (August 25, 2023). http://dx.doi.org/10.20895/infotel.v15i3.943.

Full text
Abstract:
Developments in telecommunications technology today, such as cellular with the fifth generation (5G), the development of IoT prototypes, and the migration of analog TV to digital TV starting in 2022. The development of various research using machine learning. The problem with video format information is that the video file size is quite large, so the transmission process requires a large bandwidth. In addition, sharing services such as Video on Demand (VoD) and Video Broadcasting are sensitive to delay. In comparison, the transmission media has limited capacity, such as terrestrial TV, Ethernet/Fast Ethernet, and wireless cellular data such as 2G, 3G HSPA, 4G, etc. Based on reports from Cisco, the development of internet users has increased by 10% per year, with 80% of total traffic using video. Developments in various video compression standards, such as the most recent H.264 and H.265, produce high-quality, low-bitrate video. Much research has been carried out with various proposed compression methods based on machine learning. Either uses singular block learning based or end-to-end. This research focuses on the literature study of video compression with machine learning.
APA, Harvard, Vancouver, ISO, and other styles
35

Ahmed, Fareed, Uzma Rahim Khan, Salman Muhammad Soomar, Ahmed Raheem, Rubaba Naeem, Abid Naveed, Junaid Abdul Razzak, and Nadeem Ullah Khan. "Acceptability of telephone-cardiopulmonary resuscitation (T-CPR) practice in a resource-limited country- a cross-sectional study." BMC Emergency Medicine 22, no. 1 (August 2, 2022). http://dx.doi.org/10.1186/s12873-022-00690-w.

Full text
Abstract:
Abstract Background T-CPR has been shown to increase bystander CPR rates dramatically and is associated with improved patient survival. Objective To evaluate the acceptability of T-CPR by the bystanders and identify baseline quality measures of T-CPR in Karachi, Pakistan. Methods A cross-sectional study was conducted from January to December 2018 at the Aman foundation command and control center. Data was collected from audiotaped phone calls of patients who required assistance from the Aman ambulance and on whom the EMS telecommunicator recognized the need for CPR and provided instructions. Information was recorded using a structured questionnaire on demographics, the status of the patient, and different time variables involved in CPR performance. A One-way ANOVA was used to compare different time variables with recommended AHA guidelines. P-value ≤ 0.05 was considered significant. Results There were 481 audiotaped calls in which CPR instruction was given, listened to, and recorded data. Out of which in 459(95.4%) of cases CPR was attempted Majority of the patients were males (n = 278; 57.8%) and most had witnessed cardiac arrest (n = 470; 97.7%) at home (n = 430; 89.3%). The mean time to recognize the need for CPR by an EMS telecommunicator was 4:59 ± 1:59(min), while the mean time to start CPR instruction by a bystander was 5:28 ± 2:24(min). The mean time to start chest compression was 6:04 ± 1:52(min.). Conclusion Our results show the high acceptability of T-CPR by bystanders. We also found considerable delays in recognizing cardiac arrest and initiation of CPR by telecommunicators. Further training of telecommunicators could reduce these delays.
APA, Harvard, Vancouver, ISO, and other styles
36

Goggin, Gerard. "‘mobile text’." M/C Journal 7, no. 1 (January 1, 2004). http://dx.doi.org/10.5204/mcj.2312.

Full text
Abstract:
Mobile In many countries, more people have mobile phones than they do fixed-line phones. Mobile phones are one of the fastest growing technologies ever, outstripping even the internet in many respects. With the advent and widespread deployment of digital systems, mobile phones were used by an estimated 1, 158, 254, 300 people worldwide in 2002 (up from approximately 91 million in 1995), 51. 4% of total telephone subscribers (ITU). One of the reasons for this is mobility itself: the ability for people to talk on the phone wherever they are. The communicative possibilities opened up by mobile phones have produced new uses and new discourses (see Katz and Aakhus; Brown, Green, and Harper; and Plant). Contemporary soundscapes now feature not only voice calls in previously quiet public spaces such as buses or restaurants but also the aural irruptions of customised polyphonic ringtones identifying whose phone is ringing by the tune downloaded. The mobile phone plays an important role in contemporary visual and material culture as fashion item and status symbol. Most tragically one might point to the tableau of people in the twin towers of the World Trade Centre, or aboard a plane about to crash, calling their loved ones to say good-bye (Galvin). By contrast, one can look on at the bathos of Australian cricketer Shane Warne’s predilection for pressing his mobile phone into service to arrange wanted and unwanted assignations while on tour. In this article, I wish to consider another important and so far also under-theorised aspect of mobile phones: text. Of contemporary textual and semiotic systems, mobile text is only a recent addition. Yet it is already produces millions of inscriptions each day, and promises to be of far-reaching significance. Txt Txt msg ws an acidnt. no 1 expcted it. Whn the 1st txt msg ws sent, in 1993 by Nokia eng stdnt Riku Pihkonen, the telcom cpnies thought it ws nt important. SMS – Short Message Service – ws nt considrd a majr pt of GSM. Like mny teks, the *pwr* of txt — indeed, the *pwr* of the fon — wz discvrd by users. In the case of txt mssng, the usrs were the yng or poor in the W and E. (Agar 105) As Jon Agar suggests in Constant Touch, textual communication through mobile phone was an after-thought. Mobile phones use radio waves, operating on a cellular system. The first such mobile service went live in Chicago in December 1978, in Sweden in 1981, in January 1985 in the United Kingdom (Agar), and in the mid-1980s in Australia. Mobile cellular systems allowed efficient sharing of scarce spectrum, improvements in handsets and quality, drawing on advances in science and engineering. In the first instance, technology designers, manufacturers, and mobile phone companies had been preoccupied with transferring telephone capabilities and culture to the mobile phone platform. With the growth in data communications from the 1960s onwards, consideration had been given to data capabilities of mobile phone. One difficulty, however, had been the poor quality and slow transfer rates of data communications over mobile networks, especially with first-generation analogue and early second-generation digital mobile phones. As the internet was widely and wildly adopted in the early to mid-1990s, mobile phone proponents looked at mimicking internet and online data services possibilities on their hand-held devices. What could work on a computer screen, it was thought, could be reinvented in miniature for the mobile phone — and hence much money was invested into the wireless access protocol (or WAP), which spectacularly flopped. The future of mobiles as a material support for text culture was not to lie, at first at least, in aping the world-wide web for the phone. It came from an unexpected direction: cheap, simple letters, spelling out short messages with strange new ellipses. SMS was built into the European Global System for Mobile (GSM) standard as an insignificant, additional capability. A number of telecommunications manufacturers thought so little of the SMS as not to not design or even offer the equipment needed (the servers, for instance) for the distribution of the messages. The character sets were limited, the keyboards small, the typeface displays rudimentary, and there was no acknowledgement that messages were actually received by the recipient. Yet SMS was cheap, and it offered one-to-one, or one-to-many, text communications that could be read at leisure, or more often, immediately. SMS was avidly taken up by young people, forming a new culture of media use. Sending a text message offered a relatively cheap and affordable alternative to the still expensive timed calls of voice mobile. In its early beginnings, mobile text can be seen as a subcultural activity. The text culture featured compressed, cryptic messages, with users devising their own abbreviations and grammar. One of the reasons young people took to texting was a tactic of consolidating and shaping their own shared culture, in distinction from the general culture dominated by their parents and other adults. Mobile texting become involved in a wider reworking of youth culture, involving other new media forms and technologies, and cultural developments (Butcher and Thomas). Another subculture that also was in the vanguard of SMS was the Deaf ‘community’. Though the Alexander Graham Bell, celebrated as the inventor of the telephone, very much had his hearing-impaired wife in mind in devising a new form of communication, Deaf people have been systematically left off the telecommunications network since this time. Deaf people pioneered an earlier form of text communications based on the Baudot standard, used for telex communications. Known as teletypewriter (TTY), or telecommunications device for the Deaf (TDD) in the US, this technology allowed Deaf people to communicate with each other by connecting such devices to the phone network. The addition of a relay service (established in Australia in the mid-1990s after much government resistance) allows Deaf people to communicate with hearing people without TTYs (Goggin & Newell). Connecting TTYs to mobile phones have been a vexed issue, however, because the digital phone network in Australia does not allow compatibility. For this reason, and because of other features, Deaf people have become avid users of SMS (Harper). An especially favoured device in Europe has been the Nokia Communicator, with its hinged keyboard. The move from a ‘restricted’, ‘subcultural’ economy to a ‘general’ economy sees mobile texting become incorporated in the semiotic texture and prosaic practices of everyday life. Many users were already familiar with the new conventions already developed around electronic mail, with shorter, crisper messages sent and received — more conversation-like than other correspondence. Unlike phone calls, email is asynchronous. The sender can respond immediately, and the reply will be received with seconds. However, they can also choose to reply at their leisure. Similarly, for the adept user, SMS offers considerable advantages over voice communications, because it makes textual production mobile. Writing and reading can take place wherever a mobile phone can be turned on: in the street, on the train, in the club, in the lecture theatre, in bed. The body writes differently too. Writing with a pen takes a finger and thumb. Typing on a keyboard requires between two and ten fingers. The mobile phone uses the ‘fifth finger’ — the thumb. Always too early, and too late, to speculate on contemporary culture (Morris), it is worth analyzing the textuality of mobile text. Theorists of media, especially television, have insisted on understanding the specific textual modes of different cultural forms. We are familiar with this imperative, and other methods of making visible and decentring structures of text, and the institutions which animate and frame them (whether author or producer; reader or audience; the cultural expectations encoded in genre; the inscriptions in technology). In formal terms, mobile text can be described as involving elision, great compression, and open-endedness. Its channels of communication physically constrain the composition of a very long single text message. Imagine sending James Joyce’s Finnegan’s Wake in one text message. How long would it take to key in this exemplar of the disintegration of the cultural form of the novel? How long would it take to read? How would one navigate the text? Imagine sending the Courier-Mail or Financial Review newspaper over a series of text messages? The concept of the ‘news’, with all its cultural baggage, is being reconfigured by mobile text — more along the lines of the older technology of the telegraph, perhaps: a few words suffices to signify what is important. Mobile textuality, then, involves a radical fragmentation and unpredictable seriality of text lexia (Barthes). Sometimes a mobile text looks singular: saying ‘yes’ or ‘no’, or sending your name and ID number to obtain your high school or university results. Yet, like a telephone conversation, or any text perhaps, its structure is always predicated upon, and haunted by, the other. Its imagined reader always has a mobile phone too, little time, no fixed address (except that hailed by the network’s radio transmitter), and a finger poised to respond. Mobile text has structure and channels. Yet, like all text, our reading and writing of it reworks those fixities and makes destabilizes our ‘clear’ communication. After all, mobile textuality has a set of new pre-conditions and fragilities. It introduces new sorts of ‘noise’ to signal problems to annoy those theorists cleaving to the Shannon and Weaver linear model of communication; signals often drop out; there is a network confirmation (and message displayed) that text messages have been sent, but no system guarantee that they have been received. Our friend or service provider might text us back, but how do we know that they got our text message? Commodity We are familiar now with the pleasures of mobile text, the smile of alerting a friend to our arrival, celebrating good news, jilting a lover, making a threat, firing a worker, flirting and picking-up. Text culture has a new vector of mobility, invented by its users, but now coveted and commodified by businesses who did not see it coming in the first place. Nimble in its keystrokes, rich in expressivity and cultural invention, but relatively rudimentary in its technical characteristics, mobile text culture has finally registered in the boardrooms of communications companies. Not only is SMS the preferred medium of mobile phone users to keep in touch with each other, SMS has insinuated itself into previously separate communication industries arenas. In 2002-2003 SMS became firmly established in television broadcasting. Finally, interactive television had arrived after many years of prototyping and being heralded. The keenly awaited back-channel for television arrives courtesy not of cable or satellite television, nor an extra fixed-phone line. It’s the mobile phone, stupid! Big Brother was not only a watershed in reality television, but also in convergent media. Less obvious perhaps than supplementary viewing, or biographies, or chat on Big Brother websites around the world was the use of SMS for voting. SMS is now routinely used by mainstream television channels for viewer feedback, contest entry, and program information. As well as its widespread deployment in broadcasting, mobile text culture has been the language of prosaic, everyday transactions. Slipping into a café at Bronte Beach in Sydney, why not pay your parking meter via SMS? You’ll even receive a warning when your time is up. The mobile is becoming the ‘electronic purse’, with SMS providing its syntax and sentences. The belated ingenuity of those fascinated by the economics of mobile text has also coincided with a technological reworking of its possibilities, with new implications for its semiotic possibilities. Multimedia messaging (MMS) has now been deployed, on capable digital phones (an instance of what has been called 2.5 generation [G] digital phones) and third-generation networks. MMS allows images, video, and audio to be communicated. At one level, this sort of capability can be user-generated, as in the popularity of mobiles that take pictures and send these to other users. Television broadcasters are also interested in the capability to send video clips of favourite programs to viewers. Not content with the revenues raised from millions of standard-priced SMS, and now MMS transactions, commercial participants along the value chain are keenly awaiting the deployment of what is called ‘premium rate’ SMS and MMS services. These services will involve the delivery of desirable content via SMS and MMS, and be priced at a premium. Products and services are likely to include: one-to-one textchat; subscription services (content delivered on handset); multi-party text chat (such as chat rooms); adult entertainment services; multi-part messages (such as text communications plus downloads); download of video or ringtones. In August 2003, one text-chat service charged $4.40 for a pair of SMS. Pwr At the end of 2003, we have scarcely registered the textual practices and systems in mobile text, a culture that sprang up in the interstices of telecommunications. It may be urgent that we do think about the stakes here, as SMS is being extended and commodified. There are obvious and serious policy issues in premium rate SMS and MMS services, and questions concerning the political economy in which these are embedded. Yet there are cultural questions too, with intricate ramifications. How do we understand the effects of mobile textuality, rewriting the telephone book for this new cultural form (Ronell). What are the new genres emerging? And what are the implications for cultural practice and policy? Does it matter, for instance, that new MMS and 3rd generation mobile platforms are not being designed or offered with any-to-any capabilities in mind: allowing any user to upload and send multimedia communications to other any. True, as the example of SMS shows, the inventiveness of users is difficult to foresee and predict, and so new forms of mobile text may have all sorts of relationships with content and communication. However, there are worrying signs of these developing mobile circuits being programmed for narrow channels of retail purchase of cultural products rather than open-source, open-architecture, publicly usable nodes of connection. Works Cited Agar, Jon. Constant Touch: A Global History of the Mobile Phone. Cambridge: Icon, 2003. Barthes, Roland. S/Z. Trans. Richard Miller. New York: Hill & Wang, 1974. Brown, Barry, Green, Nicola, and Harper, Richard, eds. Wireless World: Social, Cultural, and Interactional Aspects of the Mobile Age. London: Springer Verlag, 2001. Butcher, Melissa, and Thomas, Mandy, eds. Ingenious: Emerging youth cultures in urban Australia. Melbourne: Pluto, 2003. Galvin, Michael. ‘September 11 and the Logistics of Communication.’ Continuum: Journal of Media and Cultural Studies 17.3 (2003): 303-13. Goggin, Gerard, and Newell, Christopher. Digital Disability: The Social Construction of Digital in New Media. Lanham, MA: Rowman & Littlefield, 2003. Harper, Phil. ‘Networking the Deaf Nation.’ Australian Journal of Communication 30. 3 (2003), in press. International Telecommunications Union (ITU). ‘Mobile Cellular, subscribers per 100 people.’ World Telecommunication Indicators <http://www.itu.int/ITU-D/ict/statistics/> accessed 13 October 2003. Katz, James E., and Aakhus, Mark, eds. Perpetual Contact: Mobile Communication, Private Talk, Public Performance. Cambridge: Cambridge U P, 2002. Morris, Meaghan. Too Soon, Too Late: History in Popular Culture. Bloomington and Indianapolis: U of Indiana P, 1998. Plant, Sadie. On the Mobile: The Effects of Mobile Telephones on Social and Individual Life. < http://www.motorola.com/mot/documents/0,1028,296,00.pdf> accessed 5 October 2003. Ronell, Avital. The Telephone Book: Technology—schizophrenia—electric speech. Lincoln: U of Nebraska P, 1989. Citation reference for this article MLA Style Goggin, Gerard. "‘mobile text’" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0401/03-goggin.php>. APA Style Goggin, G. (2004, Jan 12). ‘mobile text’. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0401/03-goggin.php>
APA, Harvard, Vancouver, ISO, and other styles
37

Mesch, Claudia. "Racing Berlin." M/C Journal 3, no. 3 (June 1, 2000). http://dx.doi.org/10.5204/mcj.1845.

Full text
Abstract:
Bracketed by a quotation from famed 1950s West German soccer coach S. Herberger and the word "Ende", the running length of the 1998 film Run Lola Run, directed by Tom Tykwer, is 9 minutes short of the official duration of a soccer match. Berlin has often been represented, in visual art and in cinematic imagery, as the modern metropolis: the Expressionist and Dadaist painters, Walter Ruttmann, Fritz Lang and Rainer Werner Fassbinder all depicted it as the modernising city. Since the '60s artists have staged artworks and performances in the public space of the city which critiqued the cold war order of that space, its institutions, and the hysterical attempt by the German government to erase a divided past after 1990. Run Lola Run depicts its setting, Berlin, as a cyberspace obstacle course or environment usually associated with interactive video and computer games. The eerie emptiness of the Berlin of Run Lola Run -- a fantasy projected onto a city which has been called the single biggest construction site in Europe -- is necessary to keep the protagonist Lola moving at high speed from the West to the East part of town and back again -- another fantasy which is only possible when the city is recast as a virtual environment. In Run Lola Run Berlin is represented as an idealised space of bodily and psychic mobility where the instantaneous technology of cyberspace is physically realised as a utopia of speed. The setting of Run Lola Run is not a playing field but a playing level, to use the parlance of video game technology. Underscored by other filmic devices and technologies, Run Lola Run emulates the kinetics and structures of a virtual, quasi-interactive environment: the Berlin setting of the film is paradoxically rendered as an indeterminate, but also site specific, entertainment complex which hinges upon the high-speed functioning of multiple networks of auto-mobility. Urban mobility as circuitry is performed by the film's super-athletic Lola. Lola is a cyber character; she recalls the 'cyberbabe' Lara Croft, heroine of the Sega Tomb Raider video game series. In Tomb Raider the Croft figure is controlled and manipulated by the interactive player to go through as many levels of play, or virtual environments, as possible. In order for the cyber figure to get to the next level of play she must successfully negotiate as many trap and puzzle mechanisms as possible. Speed in this interactive virtual game results from the skill of an experienced player who has practiced coordinating keyboard commands with figure movements and who is familiar with the obstacles the various environments can present. As is the case with Lara Croft, the figure of Lola in Run Lola Run reverses the traditional gender relations of the action/adventure game and of 'damsel in distress' narratives. Run Lola Run focusses on Lola's race to save her boyfriend from a certain death by obtaining DM 100,000 and delivering it across town in twenty minutes. The film adds the element of the race to the game, a variable not included in Tomb Raider. Tykwer repeats Lola's trajectory from home to the location of her boyfriend Manni thrice in the film, each time ending her quest with a different outcome. As in a video game, Lola can therefore be killed as the game unwinds during one turn of play, and on the next attempt she, and also we as viewers or would-be interactive players, would have learned from her previous 'mistakes' and adjust her actions accordingly. The soundtrack of Run Lola Run underscores the speed and mobility of Berlin by means of the fast/slow/fast rhythm of the film, which proceeds primarily at the pace of techno music. This quick rhythm is syncopated with pauses in the forward-moving action brought on by Lola's superhuman screams or by the death of a protagonist. These events mark the end of one turn of 'play' and the restart of Lola's route. Tykwer visually contrasts Lola's linear mobility and her physical and mental capacity for speed with her boyfriend Manni's centripetal fixity, a marker of his helplessness, throughout the film. Manni, a bagman-in-training for a local mafioso, has to make his desperate phone calls from a single phone booth in the borough of Charlottenburg after he bungles a hand-off of payment money by forgetting it on the U-Bahn (the subway). In a black and white flashback sequence, viewers learn about Manni's ill-fated trip to the Polish border with a shipment of stolen cars. In contrast to his earlier mobility, Manni becomes entrapped in the phone booth as a result of his ineptitude. A spiral store sign close to the phone booth symbolizes Manni's entrapment. Tykwer contrasts this circular form with the lines and grids Lola transverses throughout the film. Where at first Lola is also immobilised after her moped is stolen by an 'unbelieveably fast' thief, her quasi-cybernetic thought process soon restores her movement. Tykwer visualizes Lola's frantic thinking in a series of photographic portraits which indicates her consideration of who she can contact to supply a large sum of money. Lola not only moves but thinks with the fast, even pace of a computer working through a database. Tykwer then repeats overhead shots of gridded pavement which Lola follows as she runs through the filmic frame. The grid, emblem of modernity and structure of the metropolis, the semiconductor, and the puzzles of a virtual environment, is necessary for mobility and speed, and is performed by the figure of Lola. The grid is also apparent in the trajectories of traffic of speeding bikes, subway trains,and airplanes passing overhead, which all parallel Lola's movements in the film. The city/virtual environment is thus an idealised nexus of local, national and global lines of mobility and communication.: -- OR -- Tykwer emphasised the arbitrariness of the setting of Run Lola Run, insisting it could easily have been set in any other urban centre such as New York City or Beijing. At no point does the film make explicit that the space of action is Berlin; in fact the setting of the film is far less significant than the filmic self-reflexivity Tykwer explores in Run Lola Run. Berlin becomes a postmodernist filmic text in which earlier films by Lang, Schlöndorff, von Sternberg and Wenders are cited in intertextual fashion. It is not by chance that the protagonist of Run Lola Run shares the name of Marlene Dietrich's legendary character in von Sternberg's The Blue Angel. The running, late-20th-century Lola reconnects with and gains power from the originary Lola Lola as ur-Star of German cinema. The high overhead shots of Run Lola Run technologically exceed those used by Lang in M in 1931 but still quote his filmic text; the spiral form, placed in a shop window in M, becomes a central image of Run Lola Run in marking the immobile spot that Manni occupies. Repeated several times in the film, Lola's scream bends events, characters and chance to her will and slows the relentless pace of the narrative. This vocal punctuation recalls the equally willful vocalisations of Oskar Matzerath in Schlöndorff's Tin Drum (1979). Tykwer's radical expansions and compressions of time in Run Lola Run rely on the temporal exploitation of the filmic medium. The film stretches 20 minutes of 'real time' in the lives of its two protagonists into the 84 minutes of the film. Tykwer also distills the lives of the film's incidental or secondary characters into a few still images and a few seconds of filmic time in the 'und dann...' [and then...] sequences of all three episodes. For example, Lola's momentary encounter with an employee of her father's bank spins off into two completely different life stories for this woman, both of which are told through four or five staged 'snapshots' which are edited together into a rapid sequence. The higher-speed photography of the snapshot keeps up the frenetic pace of Run Lola Run and causes the narrative to move forward even faster, if only for a few seconds. Tykwer also celebrates the technology of 35 mm film in juxtaposing it to the fuzzy imprecision of video in Run Lola Run. The viewer not only notes how scenes shot on video are less visually beautiful than the 35 mm scenes which feature Lola or Manni, but also that they seem to move at a snail's pace. For example, the video-shot scene in Lola's banker-father's office also represents the boredom of his well-paid but stagnant life; another video sequence visually parallels the slow, shuffling movement of the homeless man Norbert as he discovers Manni's forgotten moneybag on the U-Bahn. Comically, he breaks into a run when he realises what he's found. Where Wim Wenders's Wings of Desire made beautiful cinematographic use of Berlin landmarks like the Siegessäule in black and white 35 mm, Tykwer relegates black and white to flashback sequences within the narrative and rejects the relatively meandering contemplation of Wenders's film in favour of the linear dynamism of urban space in Run Lola Run. -- OR -- Tykwer emphasised the arbitrariness of the setting of Run Lola Run, insisting it could easily have been set in any other urban centre such as New York City or Beijing. Nevertheless he establishes the united Berlin as the specific setting of the film. While Run Lola Run does not explicitly indicate that the space of action is Berlin, viewers are clear of the setting: a repeated establishing shot of the Friedrichstrasse U-Bahn stop, a central commuting street near the Brandenburg Gate in the former East Berlin which has undergone extensive reconstruction since 1990, begins each episode of the film. The play between the locality of Berlin and its role as the universal modernist metropolis is a trope of German cinema famously deployed by Fritz Lang in M, where the setting is also never explicitly revealed but implied by means of the use of the Berlin dialect in the dialogue of the film1. The soundtrack of Run Lola Run underscores the speed and mobility of Berlin by means of the fast/slow/fast rhythm of the film which proceeds primarily at the pace of techno music. Techno is also closely identified with the city of Berlin through its annual Techno Festival, which seems to grow larger with each passing year. Quick techno rhythm is syncopated with pauses in the forward-moving action brought on by Lola's superhuman screams or by the death of a protagonist. Berlin is also made explicit as Tykwer often stages scenes at clearly-marked street intersections which identify particular locations or boroughs thoughout east and west Berlin. The viewer notes that Lola escapes her father's bank during one episode and faces Unter den Linden; several scenes unfold on the banks of the river Spree; Lola sprints between the Altes Museum and the Berlin Cathedral. Manni's participation in a car-theft ring points to the Berlin-focussed activity of actual Eastern European and Russian crime syndicates; the film features an interlude at the Polish border where Manni delivers a shipment of stolen Mercedes to underworld buyers, which has to do with the actual geographic proximity of Berlin to Eastern European countries. Tykwer emphasised the arbitrariness of the setting of Run Lola Run, insisting it could easily have been set in any other urban centre such as New York City or Beijing. Nevertheless he establishes the united Berlin as the specific setting of the film. While Run Lola Run does not explicitly indicate that the space of action is Berlin, viewers are clear of the setting: a repeated establishing shot of the Friedrichstrasse U-Bahn stop, a central commuting street near the Brandenburg Gate in the former East Berlin which has undergone extensive reconstruction since 1990, begins each episode of the film. The play between the locality of Berlin and its role as the universal modernist metropolis is a trope of German cinema famously deployed by Fritz Lang in M, where the setting is also never explicitly revealed but implied by means of the use of the Berlin dialect in the dialogue of the film1. The soundtrack of Run Lola Run underscores the speed and mobility of Berlin by means of the fast/slow/fast rhythm of the film which proceeds primarily at the pace of techno music. Techno is also closely identified with the city of Berlin through its annual Techno Festival, which seems to grow larger with each passing year. Quick techno rhythm is syncopated with pauses in the forward-moving action brought on by Lola's superhuman screams or by the death of a protagonist. Berlin is also made explicit as Tykwer often stages scenes at clearly-marked street intersections which identify particular locations or boroughs thoughout east and west Berlin. The viewer notes that Lola escapes her father's bank during one episode and faces Unter den Linden; several scenes unfold on the banks of the river Spree; Lola sprints between the Altes Museum and the Berlin Cathedral. Manni's participation in a car-theft ring points to the Berlin-focussed activity of actual Eastern European and Russian crime syndicates; the film features an interlude at the Polish border where Manni delivers a shipment of stolen Mercedes to underworld buyers, which has to do with the actual geographic proximity of Berlin to Eastern European countries. Yet the speed of purposeful mobility is demanded in the contemporary united and globalised Berlin; lines of action or direction must be chosen and followed and chance encounters become traps or interruptions. Chance must therefore be minimised in the pursuit of urban speed, mobility, and commications access. In the globalised Berlin, Tykwer compresses chance encounters into individual snapshots of visual data which are viewed in quick succession by the viewer. Where artists such Christo and Sophie Calle had investigated the initial chaos of German reunification in Berlin, Run Lola Run rejects the hyper-contemplative and past-obsessed mood demanded by Christo's wrapping of the Reichstag, or Calle's documentation of the artistic destructions of unification3. Run Lola Run recasts Berlin as a network of fast connections, lines of uninterrupted movement, and productive output. It is therefore perhaps not surprising that Tykwer's idealised and embodied representation of Berlin as Lola has been politically appropriated as a convenient icon by the city's status quo: an icon of the successful reconstruction and rewiring of a united Berlin into a fast global broadband digital telecommunications network4. Footnotes See Edward Dimendberg's excellent discussion of filmic representations of the metropolis in "From Berlin to Bunker Hill: Urban Space, Late Modernity, and Film Noir in Fritz Lang's and Joseph Losey's M." Wide Angle 19.4 (1997): 62-93. This is despite the fact that the temporal parameters of the plot of Run Lola Run forbid the aimlessness central to spazieren (strolling). See Walter Benjamin, "A Berlin Chronicle", in Reflections. Ed. Peter Demetz. Trans. Edmund Jephcott. New York: Schocken, 1986. 3-60. See Sophie Calle, The Detachment. London: G+B Arts International and Arndt & Partner Gallery, n.d. The huge success of Tykwer's film in Germany spawned many red-hair-coiffed Lola imitators in the Berlin populace. The mayor of Berlin sported Lola-esque red hair in a poster which imitated the one for the film, but legal intercession put an end to this trendy political statement. Brian Pendreigh. "The Lolaness of the Long-Distance Runner." The Guardian 15 Oct. 1999. I've relied on William J. Mitchell's cultural history of the late 20th century 'rebuilding' of major cities into connection points in the global telecommunications network, City of Bits: Space, Place, and the Infobahn. Cambridge: MIT P, 1995. Citation reference for this article MLA style: Claudia Mesch. "Racing Berlin: The Games of Run Lola Run." M/C: A Journal of Media and Culture 3.3 (2000). [your date of access] <http://www.api-network.com/mc/0006/speed.php>. Chicago style: Claudia Mesch, "Racing Berlin: The Games of Run Lola Run," M/C: A Journal of Media and Culture 3, no. 3 (2000), <http://www.api-network.com/mc/0006/speed.php> ([your date of access]). APA style: Claudia Mesch. (2000) Racing Berlin: the games of Run Lola run. M/C: A Journal of Media and Culture 3(3). <http://www.api-network.com/mc/0006/speed.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography