نتایج جستجو برای: ascii

تعداد نتایج: 1634  

2000
Carl Heiles

We present an agglomeration of stellar polarization catalogs with results for 9286 stars. We have endeavored to eliminate errors, provide accurate (∼arcsecond) positions, sensibly weight multiple observations of the same star, and provide reasonable distances. This catalog is available by anonymous FTP as ascii file /pub/polcat/p14.out at vermi.berkeley.edu. This manuscript is also available at...

2001
Tin Kam Ho George Nagy

We present strategies and results for identifying the symbol type of every character in a text document. Assuming reasonable word and character segmentation for shape clustering, we designed several type recognition methods that depend on cluster n-grams, characteristics of neighbors, and within-word context. On an ASCII test corpus of 925 articles, these methods represent a substantial improve...

1998
AttacksAlex Biryukov Eyal Kushilevitz

We present a method for eecient conversion of diierential (chosen-plaintext) attacks into the more practical known-plaintext and ciphertext-only attacks. Our observation may save up to a factor of 2 20 in data over the known methods, assuming that plaintext is ASCII encoded English (or some other types of highly redundant data). We demonstrate the eeectiveness of our method by practical attacks...

1996
J. R. Parker Pavol Federl

Here we describe a project that deals with license plate location in raster images. The algorithm takes a raster image as input, and yields the position of a plate in the image. After the position is determined, the algorithm can determine the locations of the license plate characters, which could be easily combined with an OCR algorithm to convert the license plate number into an ASCII string.

2016
Aleknaitė Aistė Andrijauskaitė Monika Latauskienė Justė Andrejevaitė Viktorija

2 Vilniaus universiteto Medicinos fakulteto Vidaus ligų, šeimos medicinos ir onkologijos klinika Nuo 2010 m. tarp suaugusiųjų ir paauglių išaugo elektroninių cigarečių vartojimas. Dauguma el. cigarečių vartotojų anksčiau yra rūkę tradicinius tabako gaminius. Didžioji dalis žmonių el. cigaretes suvokia kaip priemonę, padėsiančią mesti rūkyti ar sumažinti surūkomų įprastinių cigarečių kiekį. Elek...

2011
Matthew D. Trujillo Elizabeth Levy Paluck

Can a soap opera influence political attitudes and engagement among U.S. Latinos, particularly those perceiving a threat from immigration legislation? The extended contact hypothesis predicts that ingroup fictional characters can encourage positive affect and attitudes toward real-world groups and issues with which they are associated. We tested the impact of a Telemundo soap opera, Más Sabe El...

2016
Kamaljit Lakhtaria

Steganography has been practiced since ancient times. Many Linguistic Steganography (popularly known as Text based Steganography) algorithms have been proposed like Word Spacing, Substitution, Adjectives, Text Rotation, Mixed Case Font etc.. Information Hiding effectively means that the method/technique should be Robust, Secure and have good Embedding capacity. Measure of Similarity between cov...

Journal: :Asian Journal of Education and e-Learning 2023

The possibility of teaching programming in the form blocks represents a great benefit and is becoming very widespread nowadays. Whether we are talking about children's languages, Lego MINDSTORMS or even Arduino programming. It connection with Arduino, especially for beginners who do not have sufficient knowledge, that it appropriate to learn directly on real hardware, but e.g. using application...

1997
Richard M. Timoney

Рассматривается некоторые принципы построения системы Euromath, которые связаны с особенностями работы системы с алфавитами и фонтами и которые непосредственно не видны при демонстрации системы. В частности, описыается, что есть SGML DTD и как выглядит документ SGML. Описываются SGML-кодирование символов и букв, не являющихся ASCII-символами, а также метод, с помощью которого Type I фонты, необ...

2001
Serge E. Hallyn Phil Kearns

Domain and Type Enforcement (DTE) is a mechanism that can be effective in providing extremely fine-grained mandatory access control in complex networked systems. Unfortunately, this level of control comes at a price: the configuration of a DTE policy is usually in the form of a dense ASCII file which does not lend itself to an understanding or administration of the policy itself. We describe a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید