نتایج جستجو برای: ascii
تعداد نتایج: 1634 فیلتر نتایج به سال:
The SuperBook TM1 browser (Remde, Gomez, Landauer, Eberhardt, and Lochbaum, 1987) was developed to provide users with improved online access to structured textual materials. It employs hypertext-like features in a graphical windowing environment to allow users to carry out search and browsing tasks. The MaxiBook project was carried out in order to make the features of the SuperBook browser avai...
CDISC standards have traditionally been based on XML technology, developed by teams of volunteers includung XML experts. Examples include the CDISC Operational Data Model (ODM) standard, the Case Report Tabulation Data Definition Specification Standard (CRT-DDS), better known as define.xml, and the CDISC Lab standard, which has an ASCII implementation, a SAS implementation and an XML implementa...
Existing text based CAPTCHAs can only transcribe words in an image that contains ASCII characters. In this paper, we are describing a system called UCAPTCHA, which is intended to transcribe words in an image that contains Unicode characters to text. Such a system will be useful in transcribing scanned documents from many European languages like Spanish, German, French etc.
This document explores issues with Internationalized Domain Names (IDNs) that result from the use of various encoding schemes such as UTF-8 and the ASCII-Compatible Encoding produced by the Punycode algorithm. It focuses on the importance of agreeing on a single encoding and how complicated the state of affairs ends up being as a result of using different encodings today.
در دنیای رقابتی امروز، خوشه<span style="font-size: 10.0pt; line-height: 120%; font-f...
The objective of this study was to provide a new method for creating quantum-proof encryption algorithms. I accomplished by designing symmetric 2-key cryptosystem that exploits the superposition principle encrypt data in multi-dimensional value spaces.
 proposed substitutes characters frequencies, as determined two private keys: component wave order key (CWOK) and character transmission (C...
Internet has embarked comforting impact on people’s lives across the globe as personal tasks such as cash transactions, mails, fax, data storage or retrieval etc. are now preferably being done electronically using personal computers/cell phones/TABs etc. This, however, has also elevated issues vis-à-vis availability, legitimacy, and renunciation of information causing discomfort in information ...
This paper is the result of an investigation into applying statistical tools and methodologies to the discovery of digital evidence. Multiple statistical methods were reviewed; the two most useful are presented here. It is important to note that this paper represents an inquiry into the value of applied mathematical analysis to digital forensics investigations. Readers are encouraged to explore...
Status of this Memo This RFC specifies an IAB standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes an extension to the message format ...
Hill Cipher is a one of the symmetric key cryptography algorithm that using an invertible matrix with order n×n as to encrypt and decrypt plaintext. Meanwhile, ElGamal other asymmetric use complexity discrete logarithms in encryption decryption process. In this study, authors are interest combine algorithms secure text messages. The author converts plaintext table ASCII 256. Then which results ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید