Wireless Communications and Mobile Computing

Wireless Communications and Mobile Computing / 2020 / Article

Research Article | Open Access

Volume 2020 |Article ID 8824954 | https://doi.org/10.1155/2020/8824954

Abdeldjalil Saidani, Xiang Jianwen, Deloula Mansouri, "A Lossless Compression Approach Based on Delta Encoding and T-RLE in WSNs", Wireless Communications and Mobile Computing, vol. 2020, Article ID 8824954, 10 pages, 2020. https://doi.org/10.1155/2020/8824954

A Lossless Compression Approach Based on Delta Encoding and T-RLE in WSNs

Academic Editor: Tony T. Luo
Received13 Mar 2020
Revised25 Jun 2020
Accepted28 Aug 2020
Published21 Sep 2020

Abstract

The sending/receiving of data (data communication) is the most power consuming in wireless sensor networks (WSN) since the sensor nodes are depending on batteries not generally rechargeable characterized by limited capacity. Data compression is among the techniques that can help to reduce the amount of the exchanged data between wireless sensor nodes resulting in power saving. Nevertheless, there is a lack of effective methods to improve the efficiency of data compression algorithms and to increase nodes’ energy efficiency. In this paper, we proposed a novel lossless compression approach based on delta encoding and two occurrences character solving (T-RLE) algorithms. T-RLE is an optimization of the RLE algorithm, which aims to improve the compression ratio. This method will lead to less storage cost and less bandwidth to transmit the data, which positively affects the sensor nodes’ lifetime and the network lifetime in general. We used real deployment data (temperature and humidity) from the sensor scope project to evaluate the performance of our approach. The results showed a significant improvement compared with some traditional algorithms.

1. Introduction

Wireless technologies offer new perspectives in the field of telecommunications and computer networks. As a result of the progress made, a new type of ad hoc network has emerged, which is called wireless sensor networks [1]. These are networks without fixed infrastructure; they can be deployed quickly in sensitive areas and/or difficult to access. Their mission is most often to monitor a space, to take regular measurements, and to raise alarms to specific nodes of the network, known as collecting nodes (sink), capable of relaying information on a large scale to the remote control center [2]. The intrinsic characteristics of this new generation of microsensors (tiny, processing capacity, wireless communication, low cost, diversity of sensors (optical, thermal, multimedia, etc.)) have opened up new and varied application perspectives for sensor networks in many fields (military, home automation, environmental, etc.) [3]. However, they raise in the same proportions, many research problems as much by the potential applications that they suggest by the various constraints that they impose. It is widely accepted that the techniques and approaches developed in both wired and wireless networks are not directly “transferable” in the field of sensor networks [4]. Ultimately, WSNs remain an open domain for the scientific community, and it is almost at all levels: autoconfiguration, localization, coverage, deployment, communication, dynamic topology, collection, and dissemination of data, queries, and processing. Most of the works on sensor networks are aimed at reducing or at least rationalizing energy consumption [5]. Indeed, the networks of sensors are intended, in most cases to record information in a hostile environment or challenging to access without any human intervention. Therefore, it is difficult to find another source of energy than batteries [6]. It is for this reason they are considered as autonomous devices. Their lifetime is equal to the life of their battery, which indicates that energy consumption is a critical constraint in sensor networks since energy is considered a valuable resource [7]. The creation of several methods in energy conservation was an outgrowth of controlling the energy consumption of sensor node components, which include data compression [8].

The sensor nodes in the WSNs consume energy during the acquisition, processing, and transmission phases. However, the power spent by a node in the communication module for transmitting and receiving data is higher than that required for processing. An important approach to conserving energy and maximizing network lifetime is the use of efficient data compression systems. Data compression methods reduce the size of the data before transmitting it over the wireless channel, which result in a reduction in total power consumption. These energy savings due to compression translate directly by extending the lifetime of nodes and the network in general. Saving a byte of data through data compression has been shown to provide between four thousand (using Chipcon CC2420 transceiver) and two million (using MaxStream XTend transceiver) cycles of computation [9].

In general, the WSNs are used to monitor natural phenomena, which constitutes the correlation between each consecutive observation of the sensor nodes, especially the weather measurements (temperature and humidity). In this work, we will present an optimized lossless compression approach based on delta encoding and modified RLE algorithms (T-RLE). The main idea about this method is to increase the similarity of the data by applying delta encoding and compress it by using the T-RLE algorithm. We organized the rest of the paper as follows: we present some related works in Section 2. For Section 3, it discusses the proposed method; concerning Section 4, we analyze the result. Lastly, we conclude the paper in Section 5.

This section aims at presenting a state art of the works dealing with the conservation of energy using compression algorithms in this particular type of network. Lossless compression is divided into three techniques, firstly, dictionary-based like Lempel–Ziv–Welch (LZ77) and Lempel–Ziv 77 (LZW). The LZ77 algorithm uses a horizon to find the matches that will help with compression. However, this method has been improved with the arrival of the LZ78 algorithm, which uses an auxiliary data structure to store the repetitive sequence; this structure calls a dictionary. This time to represent a repeated sequence, we use the index of this sequence in the dictionary not the positions. Then, we will have tuples in the form <index, &> where & represents the character that follows the repeated sequence [10]. LZW is another improvement of the LZ78 algorithm; it has eliminated the use of tuples; it only uses the indexes of sequences in the dictionary <index> [11]. On the other hand, LZW has some problems that affect the performance efficiency. It should introduce additional elements in the dictionary that can be used. In this situation, the dictionary can be in the full state, and the research within the dictionary consumes time, secondly, entropy-based such as Huffman encoding [12]. Huffman’s method briefly is to find the number of occurrences of each sequence, then assign a shorter code to the most frequent sequences and a longer code for the less frequent sequences. Thirdly, the probabilistic-based, which is the combination of the two earlier techniques as GZIP and Lempel–Ziv–Markov chain Algorithm (LZMA) [13]. Due to limited processing and storage resources of sensor nodes, only a few research papers have discussed the possibility of embedding lossless compression algorithms into WSNs [14]. The direct implementation of these algorithms was not applicable, and they must be adjusted to fit the requirements of WSNs [15]. For example, the adaptation of LZW for sensor networks, called S-LZW (LZW for sensor nodes), allowed the evaluation of a data compression algorithm based on a dictionary for WSNs. However, the construction of a data dictionary is a memory-intensive process, which is an obstacle to the use of such techniques on sensors with limited memory. Therefore, to adapt LZW to the sensors, a new morphology of this algorithm is articulated around three main correlated points which are the size limitation of the dictionary, the limitation of the size of the data to be compressed, and the procedures to follow when the dictionary is filled [16]. Marcelloni and Vecchio proposed an efficient lossless entropy compression (LEC) algorithm [17] in which exploits the high temporal correlation that exists between the consecutive readings gathered by the sensors. LEC is one of the earliest algorithms that deal with multiple data types. The application of the algorithm on real datasets showed good results, which reached over 70% in terms of the compression ratio. Still, it is matched by the imperfection of the energy saving. On the other hand, the algorithm has a shortcoming that can not adapt to the changing in the correlation of the sensor reading. It needs prior knowledge of the statistical characteristics of the data like entropy. These shortcomings were the motivation for the emergence of an adaptive lossless data compression (ALDC), which presented by Kolo et al. [18]. It gives several code options to achieve the optimal performance. But regarding the compression efficiency, it has a low performance comparing to LEC. They also introduced a lightweight algorithm called FELACS (fast and efficient lossless adaptive compression scheme) [9]. It bases on RICE coding to compress the block of data, and the adaptivity is added by giving the two-block size option and variable compression ratio. FELACS has high robustness against loss of data in addition to low memory usage. It also does a single sensing attribute which results in reduce collision and retransmissions. A lossless neighborhood indexing sequence (NIS) algorithm has been proposed for the data compression in WSN in [19]. NIS uses a traversing method based on 0’s and 1’s. This method gives two codewords for each character, then chooses the shortest one to present each character. The authors claim that it is highly robust to packet losses since every individual packet is decompressed independently.

The main common point between these related works that they used is the same real-world datasets to test their algorithms against, as we used it from our side too. Before applying their compression algorithms, they converted the physical measures of humidity and temperature into raw_h and raw_t by using the inverted versions of the conversion functions in the sensor scope project web site [20]. The only difference is that we have not converted the data to the raw data. We used it directly as it published the sensor scope project web site, as we did in our previous work [21]. This later was built based on several datasets taken from real-world datasets from the sensor scope project. All the datasets are a float-point dataset. The main idea of this work is to compress the float part and the integer part separately, using RLE and Bzip2 for the integer part and Bzip2 only for the float part. The result performance shows a significant improvement compared with other algorithms.

Compared to the conventional compression approaches, we find the unique characters of temperature and humidity that the repetition of integer parts appears more frequently in the used datasets. The new approach aims at dealing with this kind of real datasets based on a modified RLE (T-RLE). T-RLE has the ability to deal with one and two character occurrences, which have no reduction in the size of the data when applying RLE. In this situation, the data compression becomes an overloaded problem which consumes more energy of the network nodes without benefits. The results show the benefits of the new approach which represented by the compression ratio compared with other algorithms, which means less space storage, less transmission time, less bandwidth, and less energy consumption.

3. Proposed Method

The proposed method is an optimization of our recent work. In this work, we kept the same main idea of the previous work which is splitting the integer and the float parts and compressed them with different methods. The improvement we have made in this work is summarized in the following points:

First, we used the delta encoding algorithm in the preprocessing step to make the data more convergent, resulting in increasing the similarity rate of the data that will be proved later.

Second, we will apply a proposed modified RLE (T-RLE) in the integer part that overcomes the variables that have two occurrences, which we have noticed in abundance in the previous work. Figure 1 is a flowchart of the proposed method, followed by the description of the innovative phase.

3.1. Delta Encoding

Delta encoding, also known as relative encoding, is one of the lossless compression algorithms, which has a simple concept that works on counting the difference between the successive samples [22], as shown in

We used this algorithm to process the new data (the difference between the successive samples) instead of the original data. This step showed a significant impact on the similarity ratio in the datasets because the range of the new datasets became smaller than the original dataset.

3.2. Modified RLE (T-RLE)

The RLE algorithm has a simple strategy that replaces sequences of repeated characters with the number of occurrences [23]. At first glance, it seems to save a lot of space, especially for characters that have more than three occurrences, which gives a positive reduction. On the other hand, a negative reduction will be given for a character that has one occurrence (adding more characters to represent the original character). Instead of having one character, applying RLE will give (character: 1, Repetition: 1) which is two characters to represent the original character. This case has been mentioned in [24].

Among the applications of RLE algorithm is to separate the runs from the variables for further compression and in case of dealing with numbers like temperature and humidity. Let consider a set of 26 characters (1 1 1 3 5 5 7 9 9 11 13 13) after applying RLE:

Variables (1 3 5 7 9 11 13).

Repetition (3 1 2 1 2 1 2).

Total: 28 characters.

RLE 1 has been applied for text data (contains letters). As we see in the example below, it is not suitable for numerical data. Most of the time the readings will be wrong like the first variable can be interpreted as eleven one time or two times one’s which requires access to the repetition. We proposed a solution to solve this problem by adding a (,) after the variables that have one occurrence for the modified RLE 1:

Applying RLE 1 will give the following:

Variables (11 3 55 7 99 11 1313)

Repetition (3 2 2 2)

Total: 27

Modified RLE 1:

Variables (1 3,5 7,9 11,13)

Repetition (3 2 2 2)

Total: 22

A no reduction will be given for the characters that have two occurrences (the number of the represent characters and the original characters are equal); the application of RLE will give (character: 1, Repetition: 2). We are going to treat this case in our proposed T-RLE. Algorithm 1 presents the pseudocode of the T-RLE algorithm.

T-RLE pseudocode.
While is not EOF do
    repetition =0
    Repeat
       get input Character;
       repetition = repetition + 1
    Until Character unequal to next Character
    If repetition < 2 do
       output1 << character,
    If repetition =2 do
       output1 << character&
    If repetition > 2 do
       output1 << character⌴
       output2 << repetition
End while

T-RLE is applied for the same example:

Variables (1 3,5&7,9&11,13&)

Repetition (3)

Total: 17

Regarding the characters that have more than 2 occurrences, the T-RLE functions similarly to the RLE algorithm. In the variable output, we put a space (⌴) after the character, which indicates that this character has more than 2 occurrences. The character repetition will be saved in the repetition output. Run-length encoding can be expressed in multiple ways to accommodate data properties like weather measurement data (temperature and humidity). We proposed a T-RLE algorithm that fits with this kind of data, especially in regards to numbers that have 1 or 2 occurrences.

3.3. Bzip2

Bzip2 compression is an alternative to GZIP that works almost the same way. Bzip2 uses the Burrows-Wheeler transform with Huffman coding. The advantage of Bzip2 is the greater compression capability compared to LZ77/LZ78 [25].

4. Results and Discussion

4.1. Dataset Description

To evaluate our proposed approach, we used some real deployment datasets from the sensor scope project described in Table 1. Sensor scope is an environmental monitoring system of several projects; these are made publicly available for research purposes. These datasets are weather measurement, which have many parameters (wind speed, wind direction, etc.). In our case, we only process the temperature and humidity measurements. We compared the performance of our approach to the previous method and with some traditional algorithms like GZIP, Bzip2, LZMA, LZ77, LZW, and RLE-Bzip2.


Deployment nameNode IDSymbolic nameNo. of samplesTime interval
From dayTo day

LUCE84LU_846491323/11/200617/12/2006
HES-SO FishNet101FN_1011265209/08/200731/08/2007
Le Gènèpi20LG_202152304/09/200703/10/2007
Grand-St-Bernard10GSB_102381315/09/200718/10/2007

4.2. Dispersion Measures

To show the interest of applying delta encoding, we plot below the frequency distribution of the original data and after applying delta encoding in Figures 2 and 3, respectively. Besides, we calculate some dispersion measures, which are numerical measures that used to measure the degree of homogeneity (convergence) or dispersion (divergence) of samples. They are used to describe the dataset, as well as to compare different datasets [26]. However, we have calculated the mean (2) and the variance (3), and the standard deviation (4). To have a quick idea of how dispersed the data are and the convergence of the samples in the original datasets and after applying delta encoding as Table 2 shows.


DatasetOriginal dataDelta encoding
MeanVarianceStandard deviationMeanVarianceStandard deviation

LU_84 Temp7.2144510.008943.163690.000090.003810.06174
FN_101 Temp14.9218215.020113.875580.001080.075980.27564
LG_20 Temp4.0906316.374254.046510.000240.111800.33437
GSB_10 Temp4.3426515.627503.95316-0.000190.045470.21323
LU_84 Hum87.040364.63898.03980.001150.368200.60680
FN_101 Hum83.9410795.869229.791280.005922.284351.51141
LG_20 Hum69.71255377.7190219.434990.004198.081122.84273
GSB_10 Hum68.16569330.4236718.177560.003313.123831.76744

The analysis of the results shows an evident magnitude of the effect of applying delta encoding through the dispersion measurement of all the datasets. The mean indicates the center of the datasets which equal to 0 in all the datasets approximately, together with the variance and the standard deviation which is smaller in all the datasets that we applied delta encoding. Note that the smaller the variance and the standard deviation, the smaller the dispersion rate which expresses the high convergence the samples are. Besides, we have plotted the frequency distribution to observe the data distribution before and after applying delta encoding. All the plots show a high affinity for all the samples from 0. The high similarity of the data will be detected, which is the main aim of applying the delta encoding.

5. Compression Performance

5.1. Packet Compression Ratio

The compression ratio is the most crucial metric to begin with evaluating the parameters of any compression algorithms. To prevent the repeating of the same results in the compression ratio and the packet compression ratio (PCR), we only calculate the CR which defined in where CD and UCD represent the size of the compressed and the original data, respectively, and each packet can contain at most 29 bytes of payload [13]. From here, we can count the number of packets required to transmit the compressed and uncompressed data. Table 3 presents the results obtained of the proposed method against several datasets in terms of the compression ratio. Table 4 and Figure 4 present the results obtained and the comparison with other algorithms. The results show a significant improvement in the compression ratio compared with our previous work (RLE-Bzip2) and other compression algorithms, resulting in the reduction of compressed packets that require less bandwidth hence less transmission time.


DatasetOriginal size (bytes)Compressed size (bytes)Number-UnComp-packetNumber-Comp-packetCR (%)

LU_84 Temp403,41032,58013,911112391.92
FN_101 Temp87,0788,6153,00329790.11
LG_20 Temp134,17820,0754,62769285.04
GSB_10 Temp148,11819,6325,10867786.75
LU_84 Hum454,39190,38115,6693,11780.11
FN_101 Hum88,55717,5753,05460680.15
LG_20 Hum150,66136,6605,195126475.67
GSB_10 Hum166,10738,1355,728131577.04


DatasetData size (bytes)
GZIPBzip2LZMALZ77LZWRLE-Bzip2Proposed

LU_84 Temp81.1789.9388.0973.4871.8490.5891.92
FN_101 Temp76.4286.0385.6167.9165.4888.5490.11
LG_20 Temp73.0683.3780.8465.1864.8184.2485.04
GSB_10 Temp74.3684.5482.6366.2865.2785.3686.75
LU_84 Hum65.4273.7475.8654.9059.1879.1680.11
FN_101 Hum64.6572.4374.8553.7453.4878.3680.15
LG_20 Hum60.9569.7470.5649.7253.3775.3875.67
GSB_10 Hum61.7669.8371.9850.3254.1376.2777.04

5.2. Compression Rate

In addition to CR, another parameter to evaluate any compression algorithm is the compression rate (CRate), as shown in (6). It is known as the number of output bytes per character which defined as [27]

The ratio represents the number of the bytes per character in which the compressed data will be represented. Table 5 describes the compression rate of the proposed method compared to some compression algorithms. However, the proposed method gave good results under the same datasets in terms of compression rate; this latter will be better whenever it is small. Unlike the compression ratio, the lower the compression rate, the better the compression performance of the algorithm [9].


DatasetData size (bytes)
GZIPBzip2LZMALZ77LZWRLE-Bzip2Proposed

LU_84 Temp0.18830.10070.11910.26520.28160.09420.0808
FN_101 Temp0.23580.13970.14390.32090.34520.11460.0989
LG_20 Temp0.26940.16630.19160.34820.35190.15760.1496
GSB_10 Temp0.25640.15460.17370.33720.34730.14640.1325
LU_84 Hum0.34580.26260.24140.45100.40820.20840.1989
FN_101 Hum0.35350.27570.25150.46260.46520.21640.1985
LG_20 Hum0.39050.30260.29440.50280.46630.24620.2433
GSB_10 Hum0.38240.30170.28020.49680.45870.23730.2296

5.3. Percentage Improvement of Compression Rate (PICR)

The percentage improvement of compression rate [28] is the amelioration percentage of the proposed method compared concerning other algorithms which defined in where CRate_P and CRate_C are the compression rate of the proposed algorithm and the compression rate of the compared algorithm, respectively. The proposed method is an optimization of our previous work (RLE-Bzip2), where the gain percentage has the utmost importance. The gain varied between different datasets, where it reaches the highest value of 14.23% under the LU_84 Temp datasets. It also achieved the lowest value of 1.18% under the LG_20 Hum dataset. Thus, it corresponds precisely to the results we obtained in terms of the compression ratio. Those results are not significant, but they are considered significant results compared to the other traditional algorithms, as Table 6 shows.


DatasetPICR of the proposed method concerning to
GZIPBzip2LZMALZ77LZWRLE-Bzip2

LU_84 Temp57.0919.7632.1669.5371.3114.23
FN_101 Temp58.0629.2131.2769.1871.3513.70
LG_20 Temp44.4710.0421.9257.0457.495.08
GSB_10 Temp48.3214.2923.7260.7161.859.49
LU_84 Hum42.4824.2617.6155.9051.274.56
FN_101 Hum43.8528.0021.0757.0957.338.27
LG_20 Hum37.7019.6017.3651.6147.821.18
GSB_10 Hum39.9623.9018.0653.7849.953.24

6. Conclusions

Energy consumption was and still the utmost important constraint in wireless sensor networks. It considers as a hot topic for the researchers to find new methods to reduce or at least rationalize energy consumption. Data compression showed efficacy in reducing the data size to be transmitted, therefore consuming less energy to transfer the same data by the communication unit. In this paper, we proposed an optimized lossless compression approach of our previous work, which based on delta encoding and a proposed T-RLE algorithm. Our approach showed a slight improvement compared to our previous work. On the other side, it performed good results comparing with the other traditional algorithms. In the future, we are going to deploy this method in a real WSNs, by considering the output data from the Analog to Digital Converter (ADC).

Data Availability

The datasets have been used by several works, and it is publicly available on sensor scope project: https://lcav.epfl.ch/page-145180-en.html. It was last accessed on 9/18/2018.

Conflicts of Interest

The authors declare no conflict of interest.

Acknowledgments

This work was partially supported by the Defense Industrial Technology Development Program (Grant No. JCKY2018110C165) and the Hubei Provincial Natural Science Foundation of China (Grant No. 2017CFA012).

References

  1. L. Catarinucci, D. de Donno, L. Mainetti et al., “An IoT-Aware architecture for smart healthcare systems,” Ieee Internet of Things Journal, vol. 2, no. 6, pp. 515–526, 2015. View at: Publisher Site | Google Scholar
  2. V. C. Gungor and G. P. Hancke, “Industrial wireless sensor networks: challenges, design principles, and technical approaches,” Ieee Transactions on Industrial Electronics, vol. 56, no. 10, pp. 4258–4265, 2009. View at: Publisher Site | Google Scholar
  3. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. View at: Publisher Site | Google Scholar
  4. Y. Sankarasubramaniam, I. F. Akyildiz, and S. W. McLaughlin, Energy Efficiency Based Packet Size Optimization in Wireless Sensor Networks, Ieee, New York, 2003.
  5. M. A. Razzaque and S. Dobson, “Energy-efficient sensing in wireless sensor networks using compressed sensing,” Sensors, vol. 14, no. 2, pp. 2822–2859, 2014. View at: Publisher Site | Google Scholar
  6. W. K. Seah, Z. A. Eu, and H.-P. Tan, “Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP)-Survey and challenges,” in 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 1–5, Aalborg, Denmark, May 2009. View at: Publisher Site | Google Scholar
  7. A. S. K. Mammu, A. Sharma, U. Hernandez-Jayo, and N. Sainz, “A novel cluster-based energy efficient routing in wireless sensor networks,” in 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp. 41–47, Barcelona, Spain, March 2013. View at: Publisher Site | Google Scholar
  8. F. Engmann, F. A. Katsriku, J.-D. Abdulai, K. S. Adu-Manu, and F. K. Banaseka, “Prolonging the lifetime of wireless sensor networks: a review of current techniques,” Wireless Communications and Mobile Computing, vol. 2018, Article ID 8035065, 23 pages, 2018. View at: Publisher Site | Google Scholar
  9. J. G. Kolo, S. A. Shanmugam, D. W. G. Lim, and L.-M. Ang, “Fast and efficient lossless adaptive compression scheme for wireless sensor networks,” Computers & Electrical Engineering, vol. 41, pp. 275–287, 2015. View at: Publisher Site | Google Scholar
  10. Y. Park and J.-S. Kim, “zFTL: power-efficient data compression support for NAND flash-based consumer electronics devices,” IEEE Transactions on Consumer Electronics, vol. 57, no. 3, pp. 1148–1156, 2011. View at: Publisher Site | Google Scholar
  11. W. Cui, “New LZW data compression algorithm and its FPGA implementation,” in Proc. 26th Picture Coding Symposium (PCS 2007), Lisboa, Portugal, 2007. View at: Google Scholar
  12. D. L. Duttweiler and C. Chamzas, “Probability estimation in arithmetic and adaptive-Huffman entropy coders,” IEEE Transactions on Image Processing, vol. 4, no. 3, pp. 237–246, 1995. View at: Publisher Site | Google Scholar
  13. A. Y. Tuama, M. A. Mohamed, A. Muhammed, and Z. M. Hanapi, “A new compression algorithm for small data communication in wireless sensor network,” International Journal of Sensor Networks, vol. 25, no. 3, pp. 163–175, 2017. View at: Publisher Site | Google Scholar
  14. R. Xuejun and R. Zhongyuan, “A sensor node lossless compression algorithm based on linear fitting residuals coding,” in Proceedings of the 10th International Conference on Computer Modeling and Simulation, pp. 62–66, Sydney, Australia, January 2018. View at: Publisher Site | Google Scholar
  15. U. Tiwari and S. Mehfuz, “Retracted: an adaptive entropy based lossless data compression algorithm for wireless sensor network,” Journal of Fundamental and Applied Sciences, vol. 10, pp. 706–715, 2018. View at: Google Scholar
  16. C. M. Sadler and M. Martonosi, Data compression algorithms for energy-constrained devices in delay tolerant networks, SenSys 2006, Boulder, Colorado, USA, 2006.
  17. F. Marcelloni and M. Vecchio, “An efficient lossless compression algorithm for tiny nodes of monitoring wireless sensor networks,” The Computer Journal, vol. 52, no. 8, pp. 969–987, 2009. View at: Publisher Site | Google Scholar
  18. J. G. Kolo, S. A. Shanmugam, D. W. G. Lim, L.-M. Ang, and K. P. Seng, “An adaptive lossless data compression scheme for wireless sensor networks,” Journal of Sensors, vol. 2012, Article ID 539638, 20 pages, 2012. View at: Publisher Site | Google Scholar
  19. U. J, V. T, and D. P, “A new lossless neighborhood indexing sequence (NIS) algorithm for data compression in wireless sensor networks,” Ad Hoc Networks, vol. 83, pp. 149–157, 2019. View at: Publisher Site | Google Scholar
  20. “Sensor Scope Project,” https://figshare.com/articles/Sensorscope_Data/8081813. View at: Google Scholar
  21. A. Saidani, J. Xiang, and D. Mansouri, “A new lossless compression scheme for WSNs using RLE Aalgorithm,” in 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–6, Matsue, Japan, Japan, Sept. 2019. View at: Publisher Site | Google Scholar
  22. W. Xia, H. Jiang, D. Feng, L. Tian, M. Fu, and Y. K. Zhou, “Ddelta: a deduplication-inspired fast delta compression approach,” Performance Evaluation, vol. 79, pp. 258–272, 2014. View at: Publisher Site | Google Scholar
  23. D. Salomon, Data Compression: The Complete Reference, Springer Science & Business Media, 2004.
  24. M. A. Aziz, M. S. Sahana, and M. P. Thapliyal, “Implementation of H. 264/MPEG-4 AVC for compound image compression using histogram based block classification scheme,” International Journal of Computer Science and Information Technologies, vol. 6, no. 4, pp. 3479–3488, 2015. View at: Google Scholar
  25. J. Gilchrist, “Parallel data compression with bzip2,” in Proceedings of the 16th IASTED international conference on parallel and distributed computing and systems, pp. 559–564, Ottawa, Canada, 2004. View at: Google Scholar
  26. T. Srisooksai, K. Keamarungsi, P. Lamsrichan, and K. Araki, “Practical data compression in wireless sensor networks: a survey,” Journal of Network and Computer Applications, vol. 35, no. 1, pp. 37–59, 2012. View at: Publisher Site | Google Scholar
  27. J. S. Vitter and P. Krishnan, “Optimal prefetching via data compression,” Journal of the ACM (JACM), vol. 43, no. 5, pp. 771–793, 1996. View at: Publisher Site | Google Scholar
  28. T. Bose, M. H. Mohammed, A. Dutta, and S. S. Mande, “BIND–an algorithm for loss-less compression of nucleotide sequence data,” Journal of Biosciences, vol. 37, no. 4, pp. 785–789, 2012. View at: Publisher Site | Google Scholar

Copyright © 2020 Abdeldjalil Saidani et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views845
Downloads312
Citations

Related articles

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.