{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:15Z","timestamp":1750309515720,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,15]]},"DOI":"10.1145\/3705374.3705380","type":"proceedings-article","created":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T10:23:07Z","timestamp":1738405387000},"page":"40-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparison between Different Programs of Data Compression"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9343-8058","authenticated-orcid":false,"given":"Babacar I.","family":"Diop","sequence":"first","affiliation":[{"name":"Department of Information and communication technologies, Alioune Diop University, Bambey, DL, Senegal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0568-729X","authenticated-orcid":false,"given":"Amadou D.","family":"Gueye","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Informatics and Modeling, Amadou Mahtar Mbow University, Dakar, DK, Senegal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7025-7536","authenticated-orcid":false,"given":"Alassane","family":"Diop","sequence":"additional","affiliation":[{"name":"Department of Information and communication technologies, Cheikh Hamidou Kane University, Dakar, DK, Senegal"}]}],"member":"320","published-online":{"date-parts":[[2025,2]]},"reference":[{"key":"e_1_3_3_1_1_2","first-page":"80","volume-title":"12th International Conference on Advanced Infocomm Technology 2020","author":"Diop B. I.","year":"2020","unstructured":"B. I. Diop., A. D. Gueye., A. Diop, Contribution to data compression and transmission techniques: application in the field of computer science and distance education, 12th International Conference on Advanced Infocomm Technology 2020, IEEE, 2020, pp. 80-84."},{"key":"e_1_3_3_1_2_2","volume-title":"Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences. Algorithms for Intelligent Systems","author":"Diop B. I.","year":"2023","unstructured":"B. I. Diop, A. D. Gueye, A. Diop, Comparative Study Between Different Algorithms of Data Compression and Decompression Techniques, Yadav, R.P., Nanda, S.J., Rana, P.S., Lim, MH. (eds) Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences. Algorithms for Intelligent Systems. Springer, Singapore, 2023."},{"key":"e_1_3_3_1_3_2","first-page":"301192","article-title":"Malware family classification via efficient Huffman features, Forensic Science International Digital Investigation","volume":"37","year":"2021","unstructured":"O'Shaughnessy, Breitinger, Malware family classification via efficient Huffman features, Forensic Science International Digital Investigation, Elsevier, vol 37, 2021, pp. 301192.","journal-title":"Elsevier"},{"volume-title":"Iraqi Journal of Science, eijs","key":"e_1_3_3_1_4_2","unstructured":"Ali, Kadhim, Text-based steganography using huffman compression and aes encryption algorithm, Iraqi Journal of Science, eijs, Vol. 62, no. 11, 2021, pp. 4110-4120."},{"key":"e_1_3_3_1_5_2","first-page":"18","volume-title":"Journal of Discrete Algorithms","year":"2018","unstructured":"Ohno, Sakai, Takabatake, Tomohiro, Sakamoto, A faster implementation of online RLBWT and its application to LZ77 parsing, Journal of Discrete Algorithms, Elsevier, vol. 52\u201353, 2018, pp. 18-28."},{"issue":"11","key":"e_1_3_3_1_6_2","first-page":"1267","article-title":"A huffman-based joint compression and encryption scheme for secure data storage using physical unclonable functions, Electronics","volume":"10","year":"2021","unstructured":"Liu, Li, Zhang, Zhao, A huffman-based joint compression and encryption scheme for secure data storage using physical unclonable functions, Electronics, MDPI, vol 10, no. 11, 2021, pp. 1267.","journal-title":"MDPI"},{"issue":"1","key":"e_1_3_3_1_7_2","first-page":"689","article-title":"A lossless compression method for logging data while drilling, Systems Science & Control Engineering","volume":"9","year":"2021","unstructured":"Song, Lian, Liu, Zhang, Luo, Wu, A lossless compression method for logging data while drilling, Systems Science & Control Engineering, Taylor and Francis, vol 9, issue 1, 2021, pp. 689- 703.","journal-title":"Taylor and Francis"},{"issue":"4","key":"e_1_3_3_1_8_2","first-page":"41","article-title":"A comparative analysis of huffman and lzw methods of color image compression-decompression, International Journal of Engineering Science Invention (IJESI)","volume":"8","year":"2019","unstructured":"Zoghoul, Hatamleh, Alqadi, Mesleh, Ayyoub, Al-azzeh, A comparative analysis of huffman and lzw methods of color image compression-decompression, International Journal of Engineering Science Invention (IJESI), IJESI, vol 8, issue 4, 2019, pp. 41-48.","journal-title":"IJESI"},{"key":"e_1_3_3_1_9_2","first-page":"101","volume-title":"2016 International Conference on Information & Communication Technology and Systems (ICTS), IEEE","year":"2016","unstructured":"Djusdek, Studiawan, Ahmad, Adaptive image compression using adaptive huffman and lzw, 2016 International Conference on Information & Communication Technology and Systems (ICTS), IEEE, 2016, pp.101-106."},{"key":"e_1_3_3_1_10_2","first-page":"11","volume-title":"Journal of Healthcare Engineering","volume":"2019","year":"2019","unstructured":"Rahmat, Andreas, Fahmi, Pasha, Alzahrani, Budiarto, Analysis of dicom image compression alternative using huffman coding, Journal of Healthcare Engineering, Hindawi, vol. 2019, 2019, pp. 11."},{"issue":"359","key":"e_1_3_3_1_11_2","first-page":"1","article-title":"Lempel-ziv parsing for sequences of blocks, Algorithms 2021","volume":"14","year":"2021","unstructured":"Kosolobov, Valenzuela, Lempel-ziv parsing for sequences of blocks, Algorithms 2021, MDPI, vol 14, no. 359, 2021, pp. 1-10.","journal-title":"MDPI"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2693443"},{"key":"e_1_3_3_1_13_2","first-page":"1","volume-title":"compression of connectivity in any dimension, hal-01533192","author":"Baskurt A.","year":"2020","unstructured":"A. Baskurt, F. Blum, M. Daoudi, J.L. Dugelay, F. Dupont, A. Dutartre, T. Filali Ansary, F. Fratani, E. Garcia, G.Lavou\u00e9, D. Lichau, F. Preteux, J. Ricard, B. Savage, J.P. Vandeborre, T. Zaharia, compression of connectivity in any dimension, hal-01533192, 2020, pp 1-4."},{"key":"e_1_3_3_1_14_2","volume-title":"space treatments in a context of massive data streams, corpus.ulaval.ca\/jspui\/bitstream\/20.500.11794\/30956\/1\/34215.pdf","author":"Hotte S.","year":"2018","unstructured":"S. Hotte, space treatments in a context of massive data streams, corpus.ulaval.ca\/jspui\/bitstream\/20.500.11794\/30956\/1\/34215.pdf, 2018."},{"key":"e_1_3_3_1_15_2","volume-title":"Place of standards in the context of the compression of medical data, hal.inserm.fr\/inserm-00139974","author":"B.","year":"2019","unstructured":"B. GIBAUD and J. CHABRIAIS, Place of standards in the context of the compression of medical data, hal.inserm.fr\/inserm-00139974, 2019."},{"key":"e_1_3_3_1_16_2","volume-title":"Claude Shannon et la compression des donn\u00e9es, hal 01343890v3","author":"Peyr\u00e9 G.","year":"2016","unstructured":"G. Peyr\u00e9, Claude Shannon et la compression des donn\u00e9es, hal 01343890v3, 2016, pp1-13."},{"key":"e_1_3_3_1_17_2","volume-title":"Compression sans perte de maillages triangulaires adapt\u00e9e aux applications m\u00e9trologiques, hdl.handle.net\/20.500.11794\/27639","author":"Fr\u00e9chit S.","year":"2017","unstructured":"S. Fr\u00e9chit, Compression sans perte de maillages triangulaires adapt\u00e9e aux applications m\u00e9trologiques, hdl.handle.net\/20.500.11794\/27639, 2017."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.12.001"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0086-3"},{"volume-title":"Attacking and Repairing the WinZip Encryption Scheme","key":"e_1_3_3_1_20_2","unstructured":"Kohno. Tadayoshi, Attacking and Repairing the WinZip Encryption Scheme, Association for Computing Machinery, isbn 1581139616."},{"key":"e_1_3_3_1_21_2","first-page":"13","volume-title":"Title of a proceedings paper","year":"2016","unstructured":"F., S, Title of a proceedings paper. F., S. (eds.) CONFERENCE 2016, LNCS, vol. 9999, Springer, Heidelberg, 2016, pp. 1\u201313."}],"event":{"name":"ICCDA 2024: 2024 The 8th International Conference on Computing and Data Analysis","acronym":"ICCDA 2024","location":"Wenzhou Jiang Su China"},"container-title":["Proceedings of the 2024 8th International Conference on Computing and Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3705374.3705380","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3705374.3705380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:02Z","timestamp":1750295882000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3705374.3705380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,15]]},"references-count":21,"alternative-id":["10.1145\/3705374.3705380","10.1145\/3705374"],"URL":"https:\/\/doi.org\/10.1145\/3705374.3705380","relation":{},"subject":[],"published":{"date-parts":[[2024,11,15]]},"assertion":[{"value":"2025-02-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}