Auswahl der wissenschaftlichen Literatur zum Thema „Hexadecimalt“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Hexadecimalt" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Hexadecimalt"

1

Geofandy, Karlo, Erlando Aubrey Nathaniel und Halim Agung. „KOMPRESI FILE MENGGUNAKAN KONVERSI BINER HEXADECIMAL DAN ALGORITMA HUFFMAN ENCODING“. Jurnal Ilmiah Teknologi Infomasi Terapan 5, Nr. 3 (29.11.2019): 36–46. http://dx.doi.org/10.33197/jitter.vol5.iss3.2019.295.

Der volle Inhalt der Quelle
Annotation:
Seiring dengan perkembangannya, teknologi data dalam bentuk file terus berkembang dan mengalami peningkatan ukuran dari waktu ke waktu. Perkembangan teknologi yang semakin maju dengan penambahan jumlah pengguna komputer yang semakin banyak menyebabkan ledakan jumlah data serta tingkat perpindahan data dari satu perangkat ke perangkat lain. Data - data tersebut umumnya dikompresi terlebih dahulu agar proses pertukaran data tidak memakan waktu yang terlalu lama. Metode yang akan digunakan pada penelitian ini adalah algoritma Huffman Encoding dan konversi Biner Hexadecimal. algoritma Huffman Encoding adalah salah satu algoritma kompresi dengan cara melakukan pengkodean dalam bentuk bit untuk mewakili data karakter, sedangkan konversi Biner Hexadecimal adalah teknik untuk mengubah rangkaian bit yang akan dikonversi menjadi bilangan hexadecimal. Hasil dari penelitian ini adalah algoritma Huffman Encoding dan konversi Biner Hexadecimal dapat diimplementasikan untuk kompresi file. Simpulan dari aplikasi ini yaitu metode Huffman Encoding dan konversi Biner Hexadecimal dapat melakukan mengkompresi dengan baik pada 26 macam ekstensi file akan tetapi, metode ini tidak lebih baik dibandingkan program kompresi WinRAR dan WinZIP. Ini telah dibuktikan dengan pengujian keterbatasan dan peforma program terhadap 50 jenis file yang berbeda.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Howse, S., und R. J. Nowakowski. „Periodicity and arithmetic-periodicity in hexadecimal games“. Theoretical Computer Science 313, Nr. 3 (Februar 2004): 463–72. http://dx.doi.org/10.1016/j.tcs.2003.08.013.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Niemenmaa, Markku. „A check digit system for hexadecimal numbers“. Applicable Algebra in Engineering, Communication and Computing 22, Nr. 2 (März 2011): 109–12. http://dx.doi.org/10.1007/s00200-011-0139-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Cox, Nicholas J. „Stata Tip 33: Sweet Sixteen: Hexadecimal Formats and Precision Problems“. Stata Journal: Promoting communications on statistics and Stata 6, Nr. 2 (Juni 2006): 282–83. http://dx.doi.org/10.1177/1536867x0600600211.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Kuang, Xing Hong, Zhe Yi Yao, Zhi Yu Wang, Jia Min Zhou, Jing Li, Juan Hu und Shi Ming Wang. „PC Transceiver Programming in GPRS Wireless Transmission Module“. Advanced Materials Research 945-949 (Juni 2014): 2217–20. http://dx.doi.org/10.4028/www.scientific.net/amr.945-949.2217.

Der volle Inhalt der Quelle
Annotation:
Based on UDP protocol in Visual Basic Winsock control, this paper designed third-party software to send and receive data. Wireless data transmission module used CM3160EP module. In order to decrease wireless data loss rate, four kinds of packets format is designed. The results show the stable data transmission and verify the send-receive and display of hexadecimal data on server-side.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Singh, Balkar. „Image Steganography Using DWT and Semi Hexadecimal Code Based on PSNR“. International Journal of Emerging Research in Management and Technology 6, Nr. 8 (25.06.2018): 230. http://dx.doi.org/10.23956/ijermt.v6i8.144.

Der volle Inhalt der Quelle
Annotation:
In this paper, a novel image steganography approach is proposed to enhance the visual quality of stego image. The cover image is decomposed using Discrete Wavelet Transform (DWT) to produce wavelet subbands and threshold value is calculated for each higher frequency wavelet subbands. Wavelet coefficients having magnitude larger than the threshold of its subband are selected to embed the secret data. Semi Hexadecimal Code (SHC) is proposed to convert pixel value of secret image into smaller equivalent value so that it distorts stego image as less as possible. Experimental results shows that maximum PSNR between cover image and stego image is more than 75 dB .Proposed approach is also compared with the existing approaches and this comparison shows that the proposed approach is better than the existing approaches.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Xiao, Zhen Jiu, Zheng Tao Jiang, Yong Bin Wang und Hong Chen. „Improved RSA Algorithm and Application in Digital Signature“. Applied Mechanics and Materials 713-715 (Januar 2015): 1741–45. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.1741.

Der volle Inhalt der Quelle
Annotation:
In order to enhance the operation efficiency of RSA algorithm, a new improved algorithm was suggested in this paper which made some improvements in structure and operation, and it was applied to digital signature. The experiment made comparison between a combinatorial optimization algorithm which combined SMM with index of 2k hexadecimal algorithm and the new algorithm. It shows that the new algorithm reaches a high level in operation speed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

He, Juan, und Shuai Kang. „Design of Vehicle Taillight Circuit with Mechanical Properties in Mechanical Engineering“. Advanced Materials Research 648 (Januar 2013): 315–18. http://dx.doi.org/10.4028/www.scientific.net/amr.648.315.

Der volle Inhalt der Quelle
Annotation:
The vehicle taillights control circuit with mechanical properties is composed of a clock pulse circuit, a switch control circuit, three hexadecimal circuit, decoding and display drive circuit, taillight display. The circuit is simulated with Multisim. The simulation results show that vehicle taillight display can make pedestrians and other vehicles understand clearly the occurrence of the vehicle’s dynamic change, thus which can prevent the occurrence of traffic accidents effectively.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Al-Omoush, Ashraf, Norita Md Norwawi und Ahmad Akmalludin Mazlan. „Handling Words Duplication and Memory Management for Digital Quran Based on Hexadecimal Representation and Sparse Matrix“. International Journal of Engineering & Technology 7, Nr. 4.15 (07.10.2018): 481. http://dx.doi.org/10.14419/ijet.v7i4.15.25760.

Der volle Inhalt der Quelle
Annotation:
Al-Quran is the holy book of the Muslims and the most important scripture containing knowledge on many domains. The recent advent of smart technologies like smart phones, digital devices and tablets has connected the daily life routines under a single touch adopted by many, these new tools with an exponential growth. This paper presented a Digital Quran Model (DQM) using hexadecimal representation using Unicode Hexadecimal and UTF-8 for character encoding, which is backward compatible with ASCII code. DQM target to handle all duplicated words or verses in Al-Quran using sparse matrix with double offset indexing to handle memory optimization. Three approaches were discussed: indexing and representation of the digital Quran to optimize storage, organize verses structure using sparse matrix to handle repetition with double offset indexing to efficiently use the space. The algorithms were implemented using Visual studio and Java server and the solution quality was measured by the size of a file before and after applying DQM model. For surah Al-Baqarah, the longest chapter in the Al-Quran, the reduction of the storage size was 25.00% whereas surah Al-Fatihah was 47.89%. The proposed DQM model is able to optimize the memory space and can be extended to other non-Roman characters used for information retrieval such as Hindi, Chinese and Japanese that are categorized in unicode standards.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Wang, Jian, Jeng-Yuan Yang, Xiaoxia Wu und Alan E. Willner. „Optical Hexadecimal Coding/Decoding Using 16-QAM Signal and FWM in HNLFs“. Journal of Lightwave Technology 30, Nr. 17 (September 2012): 2890–900. http://dx.doi.org/10.1109/jlt.2012.2202371.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Hexadecimalt"

1

Olguin, Alvarez Zakaria, und Lotti Furutorp. „Ett RFID-kort kommer lastat med ett virus : RFID En attackanalys“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45130.

Der volle Inhalt der Quelle
Annotation:
RFID-kort har ett utbrett användningsområde i dagens samhälle för bland annat passage, resekort och pass. RFID-kort av märket MIFARE Classic har i tidigare arbeten visats innehålla säkerhetsbrister. Detta undersöks för att se hur situationen ser ut idag med fokus på RFID-kort som attackvektor och i jämförelse med tidigare arbeten. Användandet av RFID-kort som attackvektor har i utförandet av experimenten visats fortfarande vara möjligt och även betydligt mindre begränsat. Där lagringskapacitet och användningsområde tidigare begränsat skadan man kan åstadkomma med RFID-kort, har nu standarden ökat och med det även lagringskapaciteten att skapa elak-artad kod. Med hjälp av en Arduino och en mobiltelefon är det möjligt att kopiera information från RFID-kort som till exempel lokaltrafikens resekort till ett mycket mindre säkert RFID-kort i ont syfte. Diskussionen tar upp möjligheterna att genom korsreferensering identifiera specifik information från varje kort, samt huruvida mer avancerade attacker som ransomware är applicerbara eller ej. Vidare utforskas även hur möjligheterna ser ut att lägga till egen kod och ser även där farhågor i användandet av RFID-kort utan ytterligare säkerhets-lager.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Tarnoff, David. „Episode 2.3 – Hexadecimal or Sixteen ways to nibble at binary“. Digital Commons @ East Tennessee State University, 2020. https://dc.etsu.edu/computer-organization-design-oer/9.

Der volle Inhalt der Quelle
Annotation:
Binary can be challenging. The values tend to have a lot of digits, long sequences of ones or zeros can be difficult to distinguish, and the relative magnitudes of multiple binary values can be difficult to resolve. In this episode, we discuss a couple of the popular methods to quickly represent binary in a more human readable form.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Catanzaro, Bryan Christopher. „Higher Radix Floating-Point Representations for FPGA-Based Arithmetic“. BYU ScholarsArchive, 2005. https://scholarsarchive.byu.edu/etd/311.

Der volle Inhalt der Quelle
Annotation:
Field Programmable Gate Arrays (FPGAs) are increasingly being used for high-throughput floating-point computation. It is forecasted that by 2009, FPGAs will provide an order of magnitude greater sustained floating-point throughput than conventional processors. FPGA implementations of floating-point operators have historically been designed to use binary floating-point representations, as do general purpose processors. Binary representations were chosen as the standard over three decades ago because they provide maximal numerical accuracy per bit of floating-point data. However, the unique nature of FPGA-based computation makes numerical accuracy per unit of FPGA resources a more important measure of the usefulness of a given floating-point representation. From this viewpoint, higher radix floating-point representations are well suited to FPGA-based computations, especially high precision calculations which require the support of denormalized numbers. This work shows that higher radix representations lead to more efficient use of FPGA resources. For example, a hexadecimal floating-point adder provides a 30% lower Area-Time product than its binary counterpart, and a hexadecimal floating-point multiplier has a 13% lower Area-Time product than its binary counterpart. This savings occurs while still delivering equal worst-case and better average-case numerical accuracy. This work presents a family of higher radix floating-point representations that are designed specifically to interoperate with standard IEEE floating-point, allowing the creation of floating-point datapaths which operate on standard binary floating-point data, yet use higher radix representations internally. Such datapaths provide higher performance by any measure: they are more accurate numerically, consume less FPGA resources and have shorter latencies. When taking into consideration the unique nature of FPGA-based computing systems, this work shows that binary floating-point representations are not optimal for most FPGA-based arithmetic computations. Higher radix representations can therefore be a useful tool for building efficient custom floating-point datapaths on FPGAs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Hexadecimalt"

1

A succinct naming convention for lengthy hexadecimal numbers. Hampton, Va: National Aeronautics and Space Administration, Langley Research Center, 1997.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Center, Langley Research, Hrsg. A succinct naming convention for lengthy hexadecimal numbers. Hampton, Va: National Aeronautics and Space Administration, Langley Research Center, 1997.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Metcalf, Michael, John Reid und Malcolm Cohen. Fortran 2018 conformance with ISO/IEC/IEEE 60559:2011. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198811893.003.0022.

Der volle Inhalt der Quelle
Annotation:
A large number of changes to the intrinsic modules ieee_arithmetic, ieee_exceptions, and ieee_features have been made for conformance with the new IEEE standard for floating-point arithmetic (ISO/IEC/IEEE 60559:2011), including hexadecimal-significand I/O.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Hexadecimalt"

1

Weik, Martin H. „hexadecimal“. In Computer Science and Communications Dictionary, 721. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8335.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Weik, Martin H. „hexadecimal numeral“. In Computer Science and Communications Dictionary, 722. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8336.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Weik, Martin H. „hexadecimal numeration system“. In Computer Science and Communications Dictionary, 722. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8337.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Walsh, Vincent. „Memory Maps and Hexadecimal Codes“. In Computer Literacy, 46–50. London: Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-07674-1_8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Bird, John. „Binary, octal and hexadecimal number“. In Basic Engineering Mathematics, 412–22. 7th ed. | Abingdon, Oxon ; New York, NY : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.4324/9781315561776-58.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Bird, John. „Binary, octal and hexadecimal numbers“. In Engineering Mathematics, 27–36. 8th edition. | Abingdon, Oxon ; New York, NY : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.4324/9781315561851-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Van Hoey, Jo. „Binary Numbers, Hexadecimal Numbers, and Registers“. In Beginning x64 Assembly Programming, 13–19. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5076-1_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Fossati, Gina, Anmol Agarwal und Ebru Celikel Cankaya. „Digital Image Forensics Using Hexadecimal Image Analysis“. In Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 176–83. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79997-7_22.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sourabh, Shshank, und Monika Chauhan. „Computer File Signature Analysis Through Hexadecimal Editor Software“. In Lecture Notes in Networks and Systems, 89–100. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9712-1_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Inamoto, Naota. „Hexadecimal-Tree: A Time-Continuous 4D Interference Check Method“. In Modeling in Computer Graphics, 143–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-78114-8_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Hexadecimalt"

1

Biali, Clauderson. „Arquivos de áudio: exames via análise hexadecimal“. In The Tenth International Conference on Forensic Computer Science and Cyber Law. HTCIA Brazil Chapter, 2018. http://dx.doi.org/10.5769/c2018010.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Koka, S., K. Anada, K. Nomaki und T. Yaku. „Tabular form editing with a hexadecimal grid graph model“. In 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011). IEEE, 2011. http://dx.doi.org/10.1109/vlhcc.2011.6070418.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Werner, Daniel. „Fluently Reading, Writing and Speaking Hexadecimal with Gepetto's Help“. In 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST). IEEE, 2015. http://dx.doi.org/10.1109/icst.2015.7102621.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Paragas, Jessie R., Ariel M. Sison und Ruji P. Medina. „An Improved Hill Cipher Algorithm using CBC and Hexadecimal S-Box“. In 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE). IEEE, 2019. http://dx.doi.org/10.1109/ecice47484.2019.8942717.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Zhang, Renyuan, und Mineo Kaneko. „A feasibility study of master-slave flipflop design for hexadecimal logic“. In 2016 IEEE Industrial Electronics and Applications Conference (IEACon). IEEE, 2016. http://dx.doi.org/10.1109/ieacon.2016.8067384.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Dahai Zhang, Yanqiu Bi, Lin Jiang und Jianguo Zhao. „Influence of hexadecimal character and decimal character for power waveform data compression“. In 2009 International Conference on Sustainable Power Generation and Supply. SUPERGEN 2009. IEEE, 2009. http://dx.doi.org/10.1109/supergen.2009.5347885.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Aranta, Arik, IGede Aris Gunadi und Gede Indrawan. „Utilization Of Hexadecimal Numbers In Optimization Of Balinese Transliteration String Replacement Method“. In 2018 International Conference on Computer Engineering, Network and Intelligent Multimedia (CENIM). IEEE, 2018. http://dx.doi.org/10.1109/cenim.2018.8711118.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Vincy, J., S. Krithika und K. Gowtham. „Design of cryptosystem based on ECC algorithm using hexadecimal values of character“. In 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE). IEEE, 2014. http://dx.doi.org/10.1109/icgccee.2014.6922205.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Aranta, Arik, Deden Witarsyah, Santi Ika Murpratiwi und Jemal Abawajy. „Accuracy Analysis Transliteration Balinese Script-to-Latin Text Using Hexadecimal Labeling Method“. In 2020 International Conference on Advancement in Data Science, E-learning and Information Systems (ICADEIS). IEEE, 2020. http://dx.doi.org/10.1109/icadeis49811.2020.9276811.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Zhang, Renyuan, und Mineo Kaneko. „A random access analog memory with master-slave structure for implementing hexadecimal logic“. In 2017 30th IEEE International System-on-Chip Conference (SOCC). IEEE, 2017. http://dx.doi.org/10.1109/socc.2017.8225995.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie