Committed to connecting the world

Girls in ICT

Articles

Volume 3, Special issue 1
no image available2020  New!  

The JPEG-1 standard of the Joint Photographic Experts Group (JPEG) whose specification was submitted to and approved by the Consultative Committee for International Telephony and Telegraphy (CCITT; now ITU-T) in 1992 and by ISO/IEC JTC1 in 1994 is still the most successful still-picture compression standard on the market. Much has been written about the standard itself, how the image compression functions, but less about the unique policies and processes of the JPEG, the origins of the requirements of the JPEG-1 format, the common components principle, the fate of the targeted CCITT/ITU applications and the nature of those applications that made JPEG one of the world's most successful standards. It is also not widely known that JPEG is one of the first standards to be followed and supported by an open source software (OSS) project and code - developed and distributed by the Independent JPEG Group (IJG) - that has provided a substantial drive towards market penetration and contributed to the wide acceptance of the JPEG standard. This paper also presents an analysis of the JPEG-IJG co-operation and draws some conclusions about its nature. Finally, the lessons learned are discussed.
Available inelectronic file
Other editions:   2020   2020   2020   2020   2020   2020   2020   2020   2020   2020   2020   2020  
 
Volume 2, Special issue 1
2019  

This study provides explicit mathematical formulations for the bi-static scattering coefficient from a randomly rough surface with a complex relative permittivity based on the following analytic models: Small perturbation model (SPM), Physical optics model (PO), and Kirchhoff approximation model (KA). Then it addresses the two shortcomings associated with each of the three models: i) limited applicability domain, and ii) null predicted values for the cross-polarized bi-static scattering coefficients within plane of incidence. The plane of incidence contains both backscattering direction and forward (specular reflection) direction which are of interest to the spectrum community.
Available inelectronic file
Other editions:   2019   2019   2019   2019   2019   2019  
 
Volume 1, Special issue 2
2018  

This paper discusses the possibility of applying the key principles and tools of current artificial intelligence (AI) to design future human systems in ways that could make them more efficient, fair, responsive, and inclusive.
Available inelectronic file
Other editions:   2018   2018   2018   2018   2018   2018   2018   2018   2018   2018   2018   2018   2018   2018  
 
Volume 1, Special Issue 1
2018  

In this paper, a methodology for the enhancement of computer networks' cyber-defense is presented. Using a time-series dataset, drawn for a 60-day period and for 12 hours per day and depicting the occurrences of cyberthreat alerts at hourly intervals, the correlation and dependency coefficients that occur in an organization's network between different types of cyberthreat alerts are determined. Certain mathematical methods like the Spearman correlation coefficient and the Poisson regression stochastic model are used. For certain types of cyberthreat alerts, results show a significant positive correlation and dependence between them. The analysis methodology presented could help the administrative and IT managers of an organization to implement organizational policies for cybersecurity.
Available inelectronic file
Other editions:   2018   2018   2018   2018   2018   2018   2018   2017   2017   2017   2017   2017   2017   2017