咨询与建议

限定检索结果

文献类型

  • 28 册 图书
  • 12 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 46 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 8 篇 电气工程
    • 8 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
  • 3 篇 理学
    • 2 篇 物理学
    • 1 篇 生物学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 46 篇 ascii code
  • 19 篇 program
  • 13 篇 print
  • 12 篇 data
  • 11 篇 computer
  • 10 篇 goto
  • 8 篇 code
  • 7 篇 basic
  • 7 篇 input
  • 6 篇 file
  • 6 篇 command
  • 5 篇 programming
  • 5 篇 ascii
  • 5 篇 model
  • 5 篇 string
  • 5 篇 terminal
  • 5 篇 character
  • 4 篇 basic (computer ...
  • 4 篇 statement
  • 4 篇 random number

机构

  • 1 篇 nanchang hangkon...
  • 1 篇 natl inst inform...
  • 1 篇 northumbria univ...
  • 1 篇 univ sci & techn...
  • 1 篇 qingdao univ sci...
  • 1 篇 northumbria univ...
  • 1 篇 department of cs...
  • 1 篇 harbin inst tech...
  • 1 篇 universite paris...
  • 1 篇 shahjalal univ s...
  • 1 篇 bb coll dept phy...
  • 1 篇 univ sci & techn...
  • 1 篇 univ petr & ener...
  • 1 篇 univ tasmania co...
  • 1 篇 dewade res & sci...
  • 1 篇 baraja pvt ltd b...
  • 1 篇 fac arab languag...
  • 1 篇 department of el...
  • 1 篇 univ sfax enis c...
  • 1 篇 zhengzhou univ l...

作者

  • 3 篇 david a. lien
  • 1 篇 barua linkon
  • 1 篇 yokar vaigai nay...
  • 1 篇 sun sheng-he
  • 1 篇 cheikhrouhou oma...
  • 1 篇 cameron rd
  • 1 篇 larry joel golds...
  • 1 篇 linkon barua
  • 1 篇 dhar pranab kuma...
  • 1 篇 tomar ravi
  • 1 篇 maalouf aline i
  • 1 篇 sheng-he sun
  • 1 篇 ibrahim dina m.
  • 1 篇 inc weber system...
  • 1 篇 li chun-xia
  • 1 篇 hossain md mamun
  • 1 篇 michael p zabins...
  • 1 篇 jain kshitij aja...
  • 1 篇 woo wai lok
  • 1 篇 mahmoud soua

语言

  • 43 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=ASCII code"
46 条 记 录,以下是1-10 订阅
排序:
Improved Duplicate Record Detection Using ascii code Q-gram Indexing Technique
收藏 引用
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2018年 第12期43卷 7409-7420页
作者: Elziky, Mayada A. Ibrahim, Dina M. Sarhan, Amany M. Tanta Univ Fac Engn Dept Comp & Control Engn Tanta Egypt
With the aim of reducing duplicate records in databases, duplicate record detection (DRD) ensures the integrity of data. Its role is to identify records signifying same entities either in the same or in different comp... 详细信息
来源: 评论
HRJ_Encryption: An ascii code Based Encryption Algorithm and its Implementation  2
HRJ_Encryption: An ASCII Code Based Encryption Algorithm and...
收藏 引用
2nd International Conference on Computing for Sustainable Global Development (INDIACom)
作者: Sharma, Hitesh Kumar Tomar, Ravi Patni, J. C. Univ Petr & Energy Studies Ctr Informat Technol Dehra Dun India
The transmission of data over a common transmission media revolute the world of information sharing from personal desktop to cloud computing. But the risk of the information theft has increased in the same ratio by th... 详细信息
来源: 评论
An Encoding Table Corresponding to ascii codes for DNA Data Storage and a New Error Correction Method HMSA
IEEE TRANSACTIONS ON NANOBIOSCIENCE
收藏 引用
IEEE TRANSACTIONS ON NANOBIOSCIENCE 2024年 第2期23卷 344-354页
作者: Zhang, Xuncai Zhou, Fuzhen Zhengzhou Univ Light Ind Coll Elect & Informat Engn Zhengzhou 450002 Peoples R China
DNA storage stands out from other storage media due to its high capacity, eco-friendliness, long lifespan, high stability, low energy consumption, and low data maintenance costs. To standardize the DNA encoding system... 详细信息
来源: 评论
COMBINED BINARY code TRANSLATION AND PARALLEL-TO-SERIAL CONVERSION USING STORED LOGIC-ARRAYS
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1978年 第9期27卷 833-841页
作者: ITO, MR CAMERON, RD Department of Electrical Engineering University of British Columbia
Two general classes of machines for performing code translation and serialization are considered;namely Translate-Table and State machines. The Translate-Table machine is a conventional two-stage machine comprising a ... 详细信息
来源: 评论
Text information hiding method based on chaotic map and BCH code in DWT domain of a carrier image
Text information hiding method based on chaotic map and BCH ...
收藏 引用
5th International Conference on Wavelet Analysis and Pattern Recognition
作者: Yang, Shu-Guo Li, Chun-Xia Sun, Sheng-He Qingdao Univ Sci & Technol Qingdao 266061 ShanDong Peoples R China Harbin Inst Technol Harbin Peoples R China
The issue of Information security in the transmitting process becomes more and more urgent with the development of the network technology and the information technology. A novel scheme for text information hiding is p... 详细信息
来源: 评论
Malicious Http Request Detection Using code-Level Convolutional Neural Network  15th
Malicious Http Request Detection Using Code-Level Convolutio...
收藏 引用
15th International Conference on Risks and Security of Internet and Systems (CRiSIS)
作者: Jemal, Ines Haddar, Mohamed Amine Cheikhrouhou, Omar Mahfoudhi, Adel Univ Sfax ENIS CES LR11ES49 Sfax 3038 Tunisia Univ Sfax ReDCAD Lab Sfax Tunisia Taif Univ Coll Comp & Informat Technol Taif Saudi Arabia
Http requests represent the main component of a web navigation system. These requests, once received by the server, need to be analyzed to guarantee that they are attack-free. Attacks carried by Http requests can have... 详细信息
来源: 评论
Relating the technique of code presentation to the k-map method in the design of code converters
Relating the technique of code presentation to the k-map met...
收藏 引用
3rd International Conference on Computing, Communications and Control Technologies
作者: Oluwade, Dele Dewade Res & Sci Clin Ibadan Oyo State Nigeria
The k-map method is a powerful tool in digital electronics for the simplification or minimization of Boolean expressions. The expressions in themselves arise as a result of Boolean algebra - a simple but important mat... 详细信息
来源: 评论
A bio-inspired algorithm for enhancing DNA cryptography
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 2023年 第3-4期21卷 436-456页
作者: Lakel, Kheira Bendella, Fatima Fac Arab Language & Literature Higher Normal Sch Bouzareah Dept Language & Literature Bouzareah Algeria Univ Sci & Technol Oran USTO SIMPA Lab Oran Algeria Univ Sci & Technol Oran USTO Fac Math & Informat Dept Comp Sci Oran Algeria
In this era, information security plays a crucial and sensitive task as this data is potentially vulnerable such that different types of attacks may happen and affects the data. This paper presents a new hybrid crypto... 详细信息
来源: 评论
All optical read only memory with frequency encoded addressing technique
收藏 引用
OPTIK 2011年 第16期122卷 1437-1440页
作者: Mukherjee, Kousik BB Coll Dept Phys Asansol 713303 W Bengal India
A semiconductor amplifier (SOA) based all optical read only memory (ROM) is proposed and discussed using non linear polarization rotation. The ROM based on 2-4 line decoder is based on frequency encoded addressing tec... 详细信息
来源: 评论
A Novel Blur Reduction Technique For QR And ascii Coding In Smartphone Visible Light Communications  13
A Novel Blur Reduction Technique For QR And ASCII Coding In ...
收藏 引用
13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)
作者: Yokar, Vaigai Nayaki Hoa-le-minh Ghassemlooy, Fary Woo, Wai Lok Northumbria Univ Math Phys & Elect Engn Newcastle Upon Tyne Tyne & Wear England Northumbria Univ Comp & Informat Sci Newcastle Upon Tyne Tyne & Wear England
In this paper we present a new scheme to enhance the quick response (QR) code and American Standard code for information interchange (ascii) in Smartphone-to-Smartphone Visible Light Communications (S2SVLC). The key t... 详细信息
来源: 评论