Page 281 - Anatomy of a Robot
P. 281

09_200256_CH09/Bergren   4/17/03  11:24 AM  Page 266
                             266 CHAPTER NINE
                             are compressed again using run-length compression (described later). Compression
                             ratios of 50:1 can be achieved. It is not simple to write (from scratch) a program to per-
                             form this type of compression. Here are some web sites and a PDF discussing image
                             compression:
                                 http://it.wce.wwu.edu/jongejan/461/Video.html
                                 http://arachnid.pepperdine.edu/grosenkrans/compression.htm
                                 http://poseidon.csd.auth.gr/LAB_PUBLICATIONS/Books/dip_material/
                                 chapter_4/main.htm


                             Run-Length Compression
                             One of the oldest, and most intuitive, techniques of compression is simple run-length
                             compression. Instead of sending, for example, a series of 2,415 zero byes, we can sim-
                             ply send a block of data that is about 4 bytes long, explaining it represents 2,415 zero
                             bytes. The protocol is simple and can be written from scratch if need be. The following
                             URLs explain a few different types of run-length encoding:
                                 www.rasip.fer.hr/research/compress/algorithms/fund/rl/
                                 http://datacompression.info/RLE.shtml


                             Huffman Compression

                             Huffman compression can be used if the data can be broken up into symbols (like text
                             bytes). Then all the symbols are reassigned a different code before transmission. The
                             most often transmitted symbols are assigned short codes. Symbols that are rarely trans-
                             mitted are assigned longer codes. Run-length coding is also applied. The following web
                             pages are interesting lectures on data compression in general:
                                 www.eee.bham.ac.uk/WoolleySI/All7/body0.htm
                                 www.cc.gatech.edu/ kingd/comp_links.html
                                 www.eee.bham.ac.uk/WoolleySI/All7/links.htm




                             Encryption and Security


                             Instances occur when data must be encrypted before it is transmitted. The physical links
                             of most communication channels move through areas that are in public. Certainly, all
                             radio frequency (RF) communications that move through free space can be intercepted,
                             and phone communications move through common wiring and facilities. We’ve all
   276   277   278   279   280   281   282   283   284   285   286