SlideShare a Scribd company logo
1 of 24
An Introduction and Evaluation of a Fuzzy Binary AND/OR CompressorAn MScThesis By: Philip Baback Alipour and Muhammad Ali  BTH University, Ronneby Campus, Sweden May 27, 2010
What is data lossless compression? The schematic algorithm for a compressor looks like this: Why not lossy compression instead of lossless (LDC)? The algorithms and LDC packages we know of:  The ranked ones for LDC: WinZip, GZip, WinRK; the list goes on… For more information, visit:  www.maximumcompression.com  Introduction and Background Input Data Output Data Encoder (compression) Decoder (decompression) Storage or  networks
What is their logic? Quite probabilistic (repeated symbols) i.e. frequent symbols or characters in Information Theory:  e.g.,  aaaaaaaaaaaaaaabc  in the original text  15[a]bc in the compressed version.  Thus, Length(original string) =  17 bytes  and                 Length (compressed string) = 7 bytes , we thus say   (7 100)/17= 100 – 41.17 =  58.82% compression has occurred.  What is their entropy?  Shannon entropy  What about the FBAR algorithm? Is there a difference between FBAR and other LDCs? The answers is Yes: in Logic, Design and Performance   Introduction and Background
What is FBAR?      A Combinatorial Logic Synthesis solution  in uniting Fuzzy  + Binary  via AND/OR operations What’s the catch?     Uniting highly probable states of logic in information theory to reach predictable states i.e. Uniting Quantum Binary + Binary via Fuzzy   What is Binary?  Imagine data as a sequence of 1’s and 0’s ON Switch or Heads,           OFF Switch or Tails What is Fuzzy? Imagine data as a sequence of in-between 1’s and 0’s including their discrete representations FBAR Logic for Maximum LDCs
What is Quantum Binary? Imagine a flipping coin that never lands and                    continues to flip forever!   The analogy is, it is either 1 or 0, or both                       (highly dual/probabilistic):      having {00, 11, 01, 10} states simultaneously  Why FBAR? To achieve double-efficient data as great as possible during data transmission.  This is called superdense coding; e.g.,  2 bits via 1 qubit. In our model, is: 16 bits via 8 bits or a minimum of 2 chars via 1 char contained, or, a 50% LDC.    For the moment, very hard and complex to implement. Why? FBAR Logic for Maximum LDCs 
The key is in applying impure (i), pure (p) and fuzzy transitive closures to bit pairs (pairwising FBAR logic): Really simple: p  is either 11 or 00;  the closure of this is simple to predict: it is 1 for 11 since AND/OR of 11 is 1, and 0 for 00 is similar .  i    is either 01 or 10;   this is the major problem since it closes  with either 1 for 01, or 0 for 10, which coincides with p conditions of 11 and 00 in bit product. Solution: we first consider a pure sequence of bits and manipulate it with ip, then its result by zn combinations.  z for zero or ignore e.g., z(01) = 01, z(10) = 10 n for negate e.g. n(01) = 10, n(11) = 00, and etc.     FBAR Logic for Maximum LDCs
1. This is a pure sequence for the input chars. We set this always as default in the FBAR program 11111111  2. Suppose the original input char is   @ 3. In binary according to ASCII is 01000000 4. So the combination in terms of znip relative to pure sequence closures on each pair from MSB to LSB, is i p pp     (11 11 11 11)01 11 11 11  then  z n nn   (01 11 11 11) 01 00 00 00  @ FBAR Logic for Maximum LDCs
We put all of our emerging 1-bit znip flags in unique combinations for double efficiency. Solution: We intersect them with another znip’srepresenting a second char input:   C(2chars) = 2 znip= (4 bits OR 4 bits)  x  (4 bits OR 4 bits)      8 bits   (Dynamic approach)   C(2chars )= 2 znip=(4 bits x 4 bits) x (4 bits x 4 bits) = 8 bits  in 1x1x1x1 to 16x16x16x16  address (Static approach) The latter approach literary creates 4 dimensions in the given address range.   The 4D bit-flag Model
The 4D bit-flag Model  reso Now, we use znipto reconstruct data. But each occupies a single bit: z as 0, n as 1,ias 1 and p as 0,  So, we raise them in a static object (in a grid/portable memory) to occupy 1 static byteper combination only.  This is our model presenting 2(44) = 216 =65,536 = 64K unique bit-flag combinations (or ASCII 256256): Compress  As reso a b Decompress  As The Program uses the Translation Table to return the originals The Program stores ‘a’ and ‘b’ to a row # according to the translation table Org Char column
For highest doubled-efficiencies, we extend the number  of znipcolumnarcombinations.  This is called FQAR: (A strongly quantum oriented algorithm):       Table 1           Table 2          Table 3         Table 4           1x1x1x1            1x1x1x11x1x1x11x1x1x1           …                    …                   …                   … 16x16x16x16   16x16x16x1616x16x16x1616x16x16x16 It delivers double doubled-efficiencies, and thereby quadrupled efficiencies as well!   Commencing with 75%, thereby 87.5% compression, or,  satisfying 65,5362= 4,294,967,296 = 4.1 GB and 65,5364=  1.8  1019= 15.61 EB combinations, respectively.     The 4D bit-flag Model
The following is our circular process on LDC and LDD Process, LDC Dictionary and LDD
The FBAR prototype should cover all aspects of implementation  satisfying algorithm’s structure  The Prototype Load document Compressed document Reconstruct original document
Process, LDC Dictionary and LDD The column for a successful LDD Chars that represent Original chars stored in a specific row of the G file Here is the sample illustrating an LDC to LDD for 50% fixed compressions. Double efficient LDD,  accomplished The program interprets these two columns in an if-statement returning Original chars.
The following is the actual translation table, static in size  8MB for the 1st version of double efficiency. Process, LDC Dictionary and LDD
We tested our algorithm using nonparametric test.   We tried 12 samples and compressed them by 4 algorithms.  Reason:  The number of samples were < 20;  The data type was knows as char-based, hence the number of data types was limited (no extra assumptions like parametric methods) Not subject to normality measurements, unlike parametric and t-test cases.  The Statistical Test and Performance
Results LDC ratio comparisons between FBAR/FQAR and other algorithms
One must not get fooled by having 50% ratios as 4th rank.  Because this 50% differs from percentages generated by other algorithms.  This 50% proves double efficiency. Others can not. FQAR is based on FBAR translation table ranking 1st. Results Current test case LDCs with ranks
Results kBps Bitrate comparisons between FBAR and WinRK
Results MB Memory usage comparisons between FBAR and WinRK
Contribution  Uniformity of relatedness of logic states i.e. FBAR /FQAR. Incorporating fuzzy to unite binary with quantum; Eq. (1)   The 4D bit-flag Model. It is extendable based on,  2, 1, 0 bit/byte entropies, certainly denoting,  50% , 75% , 87.5% .  These percentages come from the FBAR entropy relation Eq.(6) of our paper. In fact, it’s quite novel and it works! Next reports, negentropy  relation elicited form Eq. (6) for a universal predictability. Our model could solve probabilistic conditions due to its self-embedded, containment nature of bits in IT and QIT.
Is FBAR significant for its future usability? What is the rate of its confidence? Quite high, because its values are predictable and the confidence is rated based on predictability of spatial and temporal rates;  Thus, least likely to fail at all. We have done this with the new model and algorithmic representation.   Why? To perform maximal and thus ultimate LDCs. Risks:It only fails if program functions are not implemented according to the model.  In other words, debugging and validation issues, is always the case during implementation.  The EB barrier by the 64-bit microprocessor for Cr > 87.5%.  Discussion  The EB barrier
We outlined and discussed the algorithm’s structure, process and logic.  It gave use a new field to study, as a new solution to  computer information models, encryption, fuzzy, binary and quantum applications.   The algorithm, in its model, demonstrates double-efficiency,  Using regular probability methods is almost impossible for scientists to implement due to its overly complex logic. The FBAR/FQAR model is a solution to complex problems in negentropy and non-Gaussianprobabilityin statistics and other fields of mathematics.   Conclusions
D. Joiner (Ed.), ‘Coding Theory and Cryptography’, Springer, pp. 151-228, 2000. English text, 1995 CIA World Fact Book, Lossless data compression software benchmarks/comparisons, Maximum Compression, at: http://www.maximumcompression.com/data/text.php IBM (2008). A brief history of virtual storage and 64-bit addressability. http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zconcepts/zconcepts_102.htm . Retrieved on  May 24, 2010. P. B. Alipour and M. Ali 2010. An Introduction and Evaluation of a Fuzzy Binary AND/OR Compressor, Thesis Report,  School of Computing, Ronneby, BTH, Sweden.                                       Thanks for your attention! References
Questions

More Related Content

What's hot

COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4Krishna Nanda
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...ijwmn
 
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...Journal For Research
 
Huffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisHuffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisRamakant Soni
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codesidescitation
 
Report on c and c++
Report on c and c++Report on c and c++
Report on c and c++oggyrao
 
A critical reassessment of
A critical reassessment ofA critical reassessment of
A critical reassessment ofijcisjournal
 
Supplementary material for my following paper: Infinite Latent Process Decomp...
Supplementary material for my following paper: Infinite Latent Process Decomp...Supplementary material for my following paper: Infinite Latent Process Decomp...
Supplementary material for my following paper: Infinite Latent Process Decomp...Tomonari Masada
 
Module 4 Arithmetic Coding
Module 4 Arithmetic CodingModule 4 Arithmetic Coding
Module 4 Arithmetic Codinganithabalaprabhu
 
System design using HDL - Module 5
System design using HDL - Module 5System design using HDL - Module 5
System design using HDL - Module 5Aravinda Koithyar
 
Interpolation wikipedia
Interpolation   wikipediaInterpolation   wikipedia
Interpolation wikipediahort34
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd Iaetsd
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Registration 3
Registration 3Registration 3
Registration 3ngaybuonte
 
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeCombating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeIJMER
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic coding09lavee
 

What's hot (17)

COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4COMPUTER COMMUNICATION NETWORKS -IPv4
COMPUTER COMMUNICATION NETWORKS -IPv4
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
 
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
 
IJETAE_1013_119
IJETAE_1013_119IJETAE_1013_119
IJETAE_1013_119
 
Huffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisHuffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysis
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
 
Report on c and c++
Report on c and c++Report on c and c++
Report on c and c++
 
A critical reassessment of
A critical reassessment ofA critical reassessment of
A critical reassessment of
 
Supplementary material for my following paper: Infinite Latent Process Decomp...
Supplementary material for my following paper: Infinite Latent Process Decomp...Supplementary material for my following paper: Infinite Latent Process Decomp...
Supplementary material for my following paper: Infinite Latent Process Decomp...
 
Module 4 Arithmetic Coding
Module 4 Arithmetic CodingModule 4 Arithmetic Coding
Module 4 Arithmetic Coding
 
System design using HDL - Module 5
System design using HDL - Module 5System design using HDL - Module 5
System design using HDL - Module 5
 
Interpolation wikipedia
Interpolation   wikipediaInterpolation   wikipedia
Interpolation wikipedia
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Registration 3
Registration 3Registration 3
Registration 3
 
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeCombating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic coding
 

Viewers also liked

Chapter 5 - Fuzzy Logic
Chapter 5 - Fuzzy LogicChapter 5 - Fuzzy Logic
Chapter 5 - Fuzzy LogicAshique Rasool
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSSRachel Andrew
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsShelly Sanchez Terrell
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaChris Lema
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back KidEthos3
 

Viewers also liked (8)

Flc ppt
Flc pptFlc ppt
Flc ppt
 
Fuzzy logic control system
Fuzzy logic control systemFuzzy logic control system
Fuzzy logic control system
 
Chapter 5 - Fuzzy Logic
Chapter 5 - Fuzzy LogicChapter 5 - Fuzzy Logic
Chapter 5 - Fuzzy Logic
 
Fuzzy logic ppt
Fuzzy logic pptFuzzy logic ppt
Fuzzy logic ppt
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSS
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and Adolescents
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris Lema
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back Kid
 

Similar to A Lossless FBAR Compressor

2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...Helan4
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Design & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLDesign & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLijsrd.com
 
AI optimizing HPC simulations (presentation from 6th EULAG Workshop)
AI optimizing HPC simulations (presentation from  6th EULAG Workshop)AI optimizing HPC simulations (presentation from  6th EULAG Workshop)
AI optimizing HPC simulations (presentation from 6th EULAG Workshop)byteLAKE
 
Fann tool users_guide
Fann tool users_guideFann tool users_guide
Fann tool users_guideBirol Kuyumcu
 
Presentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and EmbeddedPresentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and Embeddedlthanuja01
 
Chapter 4 Lossless Compression Algorithims.pptx
Chapter 4 Lossless Compression Algorithims.pptxChapter 4 Lossless Compression Algorithims.pptx
Chapter 4 Lossless Compression Algorithims.pptxMedinaBedru
 
Data compression using python draft
Data compression using python draftData compression using python draft
Data compression using python draftAshok Govindarajan
 
My review on low density parity check codes
My review on low density parity check codesMy review on low density parity check codes
My review on low density parity check codespulugurtha venkatesh
 
A machine-learning view on heterogeneous catalyst design and discovery
A machine-learning view on heterogeneous catalyst design and discoveryA machine-learning view on heterogeneous catalyst design and discovery
A machine-learning view on heterogeneous catalyst design and discoveryIchigaku Takigawa
 
The performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemsThe performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemschakravarthy Gopi
 
Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Kshitij Singh
 

Similar to A Lossless FBAR Compressor (20)

Unit6 Part3.ppt
Unit6 Part3.pptUnit6 Part3.ppt
Unit6 Part3.ppt
 
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...
2.3 unit-ii-text-compression-a-outline-compression-techniques-run-length-codi...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
 
Design & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLDesign & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDL
 
Matopt
MatoptMatopt
Matopt
 
AI optimizing HPC simulations (presentation from 6th EULAG Workshop)
AI optimizing HPC simulations (presentation from  6th EULAG Workshop)AI optimizing HPC simulations (presentation from  6th EULAG Workshop)
AI optimizing HPC simulations (presentation from 6th EULAG Workshop)
 
Fann tool users_guide
Fann tool users_guideFann tool users_guide
Fann tool users_guide
 
Presentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and EmbeddedPresentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and Embedded
 
Chapter 4 Lossless Compression Algorithims.pptx
Chapter 4 Lossless Compression Algorithims.pptxChapter 4 Lossless Compression Algorithims.pptx
Chapter 4 Lossless Compression Algorithims.pptx
 
Data compression using python draft
Data compression using python draftData compression using python draft
Data compression using python draft
 
My review on low density parity check codes
My review on low density parity check codesMy review on low density parity check codes
My review on low density parity check codes
 
Group Project
Group ProjectGroup Project
Group Project
 
Turbo Code
Turbo Code Turbo Code
Turbo Code
 
10
1010
10
 
Chapt 06
Chapt 06Chapt 06
Chapt 06
 
Chapt 06
Chapt 06Chapt 06
Chapt 06
 
A machine-learning view on heterogeneous catalyst design and discovery
A machine-learning view on heterogeneous catalyst design and discoveryA machine-learning view on heterogeneous catalyst design and discovery
A machine-learning view on heterogeneous catalyst design and discovery
 
The performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemsThe performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systems
 
Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

A Lossless FBAR Compressor

  • 1. An Introduction and Evaluation of a Fuzzy Binary AND/OR CompressorAn MScThesis By: Philip Baback Alipour and Muhammad Ali BTH University, Ronneby Campus, Sweden May 27, 2010
  • 2. What is data lossless compression? The schematic algorithm for a compressor looks like this: Why not lossy compression instead of lossless (LDC)? The algorithms and LDC packages we know of: The ranked ones for LDC: WinZip, GZip, WinRK; the list goes on… For more information, visit: www.maximumcompression.com Introduction and Background Input Data Output Data Encoder (compression) Decoder (decompression) Storage or networks
  • 3. What is their logic? Quite probabilistic (repeated symbols) i.e. frequent symbols or characters in Information Theory: e.g., aaaaaaaaaaaaaaabc in the original text  15[a]bc in the compressed version. Thus, Length(original string) = 17 bytes and Length (compressed string) = 7 bytes , we thus say (7 100)/17= 100 – 41.17 = 58.82% compression has occurred. What is their entropy? Shannon entropy What about the FBAR algorithm? Is there a difference between FBAR and other LDCs? The answers is Yes: in Logic, Design and Performance Introduction and Background
  • 4. What is FBAR? A Combinatorial Logic Synthesis solution in uniting Fuzzy + Binary via AND/OR operations What’s the catch? Uniting highly probable states of logic in information theory to reach predictable states i.e. Uniting Quantum Binary + Binary via Fuzzy What is Binary? Imagine data as a sequence of 1’s and 0’s ON Switch or Heads, OFF Switch or Tails What is Fuzzy? Imagine data as a sequence of in-between 1’s and 0’s including their discrete representations FBAR Logic for Maximum LDCs
  • 5. What is Quantum Binary? Imagine a flipping coin that never lands and continues to flip forever! The analogy is, it is either 1 or 0, or both (highly dual/probabilistic): having {00, 11, 01, 10} states simultaneously Why FBAR? To achieve double-efficient data as great as possible during data transmission. This is called superdense coding; e.g., 2 bits via 1 qubit. In our model, is: 16 bits via 8 bits or a minimum of 2 chars via 1 char contained, or, a 50% LDC. For the moment, very hard and complex to implement. Why? FBAR Logic for Maximum LDCs 
  • 6. The key is in applying impure (i), pure (p) and fuzzy transitive closures to bit pairs (pairwising FBAR logic): Really simple: p is either 11 or 00; the closure of this is simple to predict: it is 1 for 11 since AND/OR of 11 is 1, and 0 for 00 is similar . i is either 01 or 10; this is the major problem since it closes with either 1 for 01, or 0 for 10, which coincides with p conditions of 11 and 00 in bit product. Solution: we first consider a pure sequence of bits and manipulate it with ip, then its result by zn combinations. z for zero or ignore e.g., z(01) = 01, z(10) = 10 n for negate e.g. n(01) = 10, n(11) = 00, and etc. FBAR Logic for Maximum LDCs
  • 7. 1. This is a pure sequence for the input chars. We set this always as default in the FBAR program 11111111 2. Suppose the original input char is @ 3. In binary according to ASCII is 01000000 4. So the combination in terms of znip relative to pure sequence closures on each pair from MSB to LSB, is i p pp (11 11 11 11)01 11 11 11  then z n nn (01 11 11 11) 01 00 00 00  @ FBAR Logic for Maximum LDCs
  • 8. We put all of our emerging 1-bit znip flags in unique combinations for double efficiency. Solution: We intersect them with another znip’srepresenting a second char input: C(2chars) = 2 znip= (4 bits OR 4 bits) x (4 bits OR 4 bits)  8 bits (Dynamic approach) C(2chars )= 2 znip=(4 bits x 4 bits) x (4 bits x 4 bits) = 8 bits in 1x1x1x1 to 16x16x16x16 address (Static approach) The latter approach literary creates 4 dimensions in the given address range. The 4D bit-flag Model
  • 9. The 4D bit-flag Model reso Now, we use znipto reconstruct data. But each occupies a single bit: z as 0, n as 1,ias 1 and p as 0, So, we raise them in a static object (in a grid/portable memory) to occupy 1 static byteper combination only. This is our model presenting 2(44) = 216 =65,536 = 64K unique bit-flag combinations (or ASCII 256256): Compress As reso a b Decompress As The Program uses the Translation Table to return the originals The Program stores ‘a’ and ‘b’ to a row # according to the translation table Org Char column
  • 10. For highest doubled-efficiencies, we extend the number of znipcolumnarcombinations. This is called FQAR: (A strongly quantum oriented algorithm): Table 1 Table 2 Table 3 Table 4 1x1x1x1 1x1x1x11x1x1x11x1x1x1 … … … … 16x16x16x16 16x16x16x1616x16x16x1616x16x16x16 It delivers double doubled-efficiencies, and thereby quadrupled efficiencies as well! Commencing with 75%, thereby 87.5% compression, or, satisfying 65,5362= 4,294,967,296 = 4.1 GB and 65,5364= 1.8  1019= 15.61 EB combinations, respectively. The 4D bit-flag Model
  • 11. The following is our circular process on LDC and LDD Process, LDC Dictionary and LDD
  • 12. The FBAR prototype should cover all aspects of implementation satisfying algorithm’s structure The Prototype Load document Compressed document Reconstruct original document
  • 13. Process, LDC Dictionary and LDD The column for a successful LDD Chars that represent Original chars stored in a specific row of the G file Here is the sample illustrating an LDC to LDD for 50% fixed compressions. Double efficient LDD, accomplished The program interprets these two columns in an if-statement returning Original chars.
  • 14. The following is the actual translation table, static in size  8MB for the 1st version of double efficiency. Process, LDC Dictionary and LDD
  • 15. We tested our algorithm using nonparametric test. We tried 12 samples and compressed them by 4 algorithms. Reason: The number of samples were < 20; The data type was knows as char-based, hence the number of data types was limited (no extra assumptions like parametric methods) Not subject to normality measurements, unlike parametric and t-test cases. The Statistical Test and Performance
  • 16. Results LDC ratio comparisons between FBAR/FQAR and other algorithms
  • 17. One must not get fooled by having 50% ratios as 4th rank. Because this 50% differs from percentages generated by other algorithms. This 50% proves double efficiency. Others can not. FQAR is based on FBAR translation table ranking 1st. Results Current test case LDCs with ranks
  • 18. Results kBps Bitrate comparisons between FBAR and WinRK
  • 19. Results MB Memory usage comparisons between FBAR and WinRK
  • 20. Contribution Uniformity of relatedness of logic states i.e. FBAR /FQAR. Incorporating fuzzy to unite binary with quantum; Eq. (1) The 4D bit-flag Model. It is extendable based on, 2, 1, 0 bit/byte entropies, certainly denoting, 50% , 75% , 87.5% . These percentages come from the FBAR entropy relation Eq.(6) of our paper. In fact, it’s quite novel and it works! Next reports, negentropy relation elicited form Eq. (6) for a universal predictability. Our model could solve probabilistic conditions due to its self-embedded, containment nature of bits in IT and QIT.
  • 21. Is FBAR significant for its future usability? What is the rate of its confidence? Quite high, because its values are predictable and the confidence is rated based on predictability of spatial and temporal rates; Thus, least likely to fail at all. We have done this with the new model and algorithmic representation. Why? To perform maximal and thus ultimate LDCs. Risks:It only fails if program functions are not implemented according to the model. In other words, debugging and validation issues, is always the case during implementation. The EB barrier by the 64-bit microprocessor for Cr > 87.5%. Discussion The EB barrier
  • 22. We outlined and discussed the algorithm’s structure, process and logic. It gave use a new field to study, as a new solution to computer information models, encryption, fuzzy, binary and quantum applications. The algorithm, in its model, demonstrates double-efficiency, Using regular probability methods is almost impossible for scientists to implement due to its overly complex logic. The FBAR/FQAR model is a solution to complex problems in negentropy and non-Gaussianprobabilityin statistics and other fields of mathematics. Conclusions
  • 23. D. Joiner (Ed.), ‘Coding Theory and Cryptography’, Springer, pp. 151-228, 2000. English text, 1995 CIA World Fact Book, Lossless data compression software benchmarks/comparisons, Maximum Compression, at: http://www.maximumcompression.com/data/text.php IBM (2008). A brief history of virtual storage and 64-bit addressability. http://publib.boulder.ibm.com/infocenter/zos/basics/topic/com.ibm.zos.zconcepts/zconcepts_102.htm . Retrieved on May 24, 2010. P. B. Alipour and M. Ali 2010. An Introduction and Evaluation of a Fuzzy Binary AND/OR Compressor, Thesis Report, School of Computing, Ronneby, BTH, Sweden. Thanks for your attention! References