نتایج جستجو برای: ascii

تعداد نتایج: 1634  

2007
Michael L. Littman Joel Remde

The SuperBook TM1 browser (Remde, Gomez, Landauer, Eberhardt, and Lochbaum, 1987) was developed to provide users with improved online access to structured textual materials. It employs hypertext-like features in a graphical windowing environment to allow users to carry out search and browsing tasks. The MaxiBook project was carried out in order to make the features of the SuperBook browser avai...

2008
Jozef Aerts

CDISC standards have traditionally been based on XML technology, developed by teams of volunteers includung XML experts. Examples include the CDISC Operational Data Model (ODM) standard, the Case Report Tabulation Data Definition Specification Standard (CRT-DDS), better known as define.xml, and the CDISC Lab standard, which has an ASCII implementation, a SAS implementation and an XML implementa...

2011
Ravishankar Chityala Sridevi Pudipeddi

Existing text based CAPTCHAs can only transcribe words in an image that contains ASCII characters. In this paper, we are describing a system called UCAPTCHA, which is intended to transcribe words in an image that contains Unicode characters to text. Such a system will be useful in transcribing scanned documents from many European languages like Spanish, German, French etc.

Journal: :RFC 2011
David Thaler John C. Klensin Stuart Cheshire

This document explores issues with Internationalized Domain Names (IDNs) that result from the use of various encoding schemes such as UTF-8 and the ASCII-Compatible Encoding produced by the Punycode algorithm. It focuses on the importance of agreeing on a single encoding and how complicated the state of affairs ends up being as a result of using different encodings today.

Journal: :Proceedings of the West Virginia Academy of Science 2023

The objective of this study was to provide a new method for creating quantum-proof encryption algorithms. I accomplished by designing symmetric 2-key cryptosystem that exploits the superposition principle encrypt data in multi-dimensional value spaces.
 proposed substitutes characters frequencies, as determined two private keys: component wave order key (CWOK) and character transmission (C...

2013
Khan Farhan Rafat

Internet has embarked comforting impact on people’s lives across the globe as personal tasks such as cash transactions, mails, fax, data storage or retrieval etc. are now preferably being done electronically using personal computers/cell phones/TABs etc. This, however, has also elevated issues vis-à-vis availability, legitimacy, and renunciation of information causing discomfort in information ...

Journal: :IJDE 2004
Matthew M. Shannon

This paper is the result of an investigation into applying statistical tools and methodologies to the discovery of digital evidence. Multiple statistical methods were reviewed; the two most useful are presented here. It is important to note that this paper represents an inquiry into the value of applied mathematical analysis to digital forensics investigations. Readers are encouraged to explore...

Journal: :RFC 1992
Keith Moore

Status of this Memo This RFC specifies an IAB standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes an extension to the message format ...

Journal: :Jurnal Riset Mahasiswa Matematika 2022

Hill Cipher is a one of the symmetric key cryptography algorithm that using an invertible matrix with order n×n as to encrypt and decrypt plaintext. Meanwhile, ElGamal other asymmetric use complexity discrete logarithms in encryption decryption process. In this study, authors are interest combine algorithms secure text messages. The author converts plaintext table ASCII 256. Then which results ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید