scispace - formally typeset
Search or ask a question
Topic

Image file formats

About: Image file formats is a research topic. Over the lifetime, 10349 publications have been published within this topic receiving 102407 citations.


Papers
More filters
Patent
31 Oct 2012
TL;DR: In this article, an image layout apparatus consisting of a cropping unit, displaying unit, a checking unit, first and second computing units, a noticing unit, and a preventing unit is described.
Abstract: An image layout apparatus includes a cropping unit, a displaying unit, a checking unit, first and second computing units, a noticing unit, and a preventing unit. The cropping unit crops an image file image. The displaying unit displays and arranges cropped images on a page. The checking unit checks whether first and second image files are same. The first computing unit computes, in response to the first image file and the second image file being the same, an overlapping area between a first displayed image and a second displayed image. The second computing unit computes overlapping size ratio of the computed overlapping area. The noticing unit notices, in response to the first image file and the second image file being the same, information regarding duplication of image files. The preventing unit prevents, in response to the computed overlapping size ratio being smaller than a predetermined value, noticing the information.

77 citations

Patent
20 Aug 1998
TL;DR: In this article, a conflict checking system is proposed to check for potential conflicts in one or more configuration image files, such as file conflicts, registry conflicts, and folder conflicts, where two registry values have the same name and belong to the same registry key, but have different data.
Abstract: A configuration image file is a single file containing all the information needed to troubleshoot, distribute or delete software from one or multiple computers. Information contained in configuration image files can comprise files, folders, shortcuts, and registry settings. The individual items in a configuration image file are entries. A conflict checking system includes conflict checking functions to check for potential conflicts in one or more configuration image files. A conflict exists when one or more configuration image files includes entries that are inconsistent. One version of the system identifies folder conflicts. A folder conflict exists when the same entry exists in more than one folder location in one or more configuration image files. Another version of the system identifies version conflicts. A version conflict exists when different versions of the same file exist in the same location within two configuration image files. Another version of the system identifies registry conflicts. A registry conflict exists when two registry values have the same name and belong to the same registry key, but have different data.

77 citations

Patent
28 Feb 2003
TL;DR: In this article, the authors present a method for remotely imaging a computer, which includes establishing a connection between two or more computers, extracting information from a storage device, and executing commands to create and format partitions on the storage device.
Abstract: Method for remotely imaging a computer. In one embodiment the method includes establishing a connection between two or more computers, extracting information from a storage device, and executing commands to create and format partitions on the storage device. The method may also include changing a bootsector of a partition, transferring data including utility data and an image file to a partition, and activating a boot indicator associated with the partition so as to re-image the storage device upon rebooting. Embodiments of the invention also include methods for removing a computer name from an associated network or domain, and augmenting security and identity parameters to allow the computer to be re-associated with a network or domain. Embodiments of the invention may be implemented using an imaging tool that, in one embodiment, includes an initialization module having one or more interfaces with input fields, a format module, and a naming module.

77 citations

Journal ArticleDOI
01 Nov 1999-Burns
TL;DR: Compression, by means of the JPEG algorithm, of up to 50 times the original size of 38 digital images of burns suffered by 22 consecutive patients did not lessen its great usefulness in determining the depth of burn injuries, according to a group of experts in burn care.

76 citations

Patent
16 Oct 2000
TL;DR: In this article, a file purging procedure is used to identify the oldest transaction table from among the transaction tables in the last image trail file accessed for each of the image trails, and for each image trail, the file purge procedure accesses the image trial files in a predefined chronological order.
Abstract: A primary computer system has a database, application programs that modify the local database, and a transaction manager that stores audit records in a local image trail reflecting those application program modifications to the local database. In a remote backup system, a Receiver process receives audit records from the primary system. The audit records include audit update and audit backout records indicating database updates and database backouts generated by transactions executing on the primary system. The Receiver stores the audit update and audit backout records in one or more image trails. For each image trail there is an Updater process that applies to a backup database volume the database updates and backouts indicated by the audit update and audit backout records in the image trail. The remote backup system periodically executes a file purge procedure, which identifies the oldest transaction table from among the transaction tables in the last image trail file accessed for each of the image trails. Then, for each image trail, the file purge procedure accesses the image trial files in a predefined chronological order and for each accessed image trail file it compares a first set of newest transaction identifiers in the file's transaction table with a second set of oldest transaction identifiers in the identified oldest transaction table. The procedure purges the accessed image trail file only when all of the transaction identifiers in the first set are older than corresponding transaction identifiers in the second set.

76 citations


Network Information
Related Topics (5)
Image processing
229.9K papers, 3.5M citations
81% related
Software
130.5K papers, 2M citations
80% related
Feature extraction
111.8K papers, 2.1M citations
78% related
Deep learning
79.8K papers, 2.1M citations
78% related
The Internet
213.2K papers, 3.8M citations
77% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20238
202222
2021124
2020269
2019373
2018382