Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Hexadecimalt.

Zeitschriftenartikel zum Thema „Hexadecimalt“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Hexadecimalt" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Geofandy, Karlo, Erlando Aubrey Nathaniel und Halim Agung. „KOMPRESI FILE MENGGUNAKAN KONVERSI BINER HEXADECIMAL DAN ALGORITMA HUFFMAN ENCODING“. Jurnal Ilmiah Teknologi Infomasi Terapan 5, Nr. 3 (29.11.2019): 36–46. http://dx.doi.org/10.33197/jitter.vol5.iss3.2019.295.

Der volle Inhalt der Quelle
Annotation:
Seiring dengan perkembangannya, teknologi data dalam bentuk file terus berkembang dan mengalami peningkatan ukuran dari waktu ke waktu. Perkembangan teknologi yang semakin maju dengan penambahan jumlah pengguna komputer yang semakin banyak menyebabkan ledakan jumlah data serta tingkat perpindahan data dari satu perangkat ke perangkat lain. Data - data tersebut umumnya dikompresi terlebih dahulu agar proses pertukaran data tidak memakan waktu yang terlalu lama. Metode yang akan digunakan pada penelitian ini adalah algoritma Huffman Encoding dan konversi Biner Hexadecimal. algoritma Huffman Encoding adalah salah satu algoritma kompresi dengan cara melakukan pengkodean dalam bentuk bit untuk mewakili data karakter, sedangkan konversi Biner Hexadecimal adalah teknik untuk mengubah rangkaian bit yang akan dikonversi menjadi bilangan hexadecimal. Hasil dari penelitian ini adalah algoritma Huffman Encoding dan konversi Biner Hexadecimal dapat diimplementasikan untuk kompresi file. Simpulan dari aplikasi ini yaitu metode Huffman Encoding dan konversi Biner Hexadecimal dapat melakukan mengkompresi dengan baik pada 26 macam ekstensi file akan tetapi, metode ini tidak lebih baik dibandingkan program kompresi WinRAR dan WinZIP. Ini telah dibuktikan dengan pengujian keterbatasan dan peforma program terhadap 50 jenis file yang berbeda.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Howse, S., und R. J. Nowakowski. „Periodicity and arithmetic-periodicity in hexadecimal games“. Theoretical Computer Science 313, Nr. 3 (Februar 2004): 463–72. http://dx.doi.org/10.1016/j.tcs.2003.08.013.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Niemenmaa, Markku. „A check digit system for hexadecimal numbers“. Applicable Algebra in Engineering, Communication and Computing 22, Nr. 2 (März 2011): 109–12. http://dx.doi.org/10.1007/s00200-011-0139-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Cox, Nicholas J. „Stata Tip 33: Sweet Sixteen: Hexadecimal Formats and Precision Problems“. Stata Journal: Promoting communications on statistics and Stata 6, Nr. 2 (Juni 2006): 282–83. http://dx.doi.org/10.1177/1536867x0600600211.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Kuang, Xing Hong, Zhe Yi Yao, Zhi Yu Wang, Jia Min Zhou, Jing Li, Juan Hu und Shi Ming Wang. „PC Transceiver Programming in GPRS Wireless Transmission Module“. Advanced Materials Research 945-949 (Juni 2014): 2217–20. http://dx.doi.org/10.4028/www.scientific.net/amr.945-949.2217.

Der volle Inhalt der Quelle
Annotation:
Based on UDP protocol in Visual Basic Winsock control, this paper designed third-party software to send and receive data. Wireless data transmission module used CM3160EP module. In order to decrease wireless data loss rate, four kinds of packets format is designed. The results show the stable data transmission and verify the send-receive and display of hexadecimal data on server-side.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Singh, Balkar. „Image Steganography Using DWT and Semi Hexadecimal Code Based on PSNR“. International Journal of Emerging Research in Management and Technology 6, Nr. 8 (25.06.2018): 230. http://dx.doi.org/10.23956/ijermt.v6i8.144.

Der volle Inhalt der Quelle
Annotation:
In this paper, a novel image steganography approach is proposed to enhance the visual quality of stego image. The cover image is decomposed using Discrete Wavelet Transform (DWT) to produce wavelet subbands and threshold value is calculated for each higher frequency wavelet subbands. Wavelet coefficients having magnitude larger than the threshold of its subband are selected to embed the secret data. Semi Hexadecimal Code (SHC) is proposed to convert pixel value of secret image into smaller equivalent value so that it distorts stego image as less as possible. Experimental results shows that maximum PSNR between cover image and stego image is more than 75 dB .Proposed approach is also compared with the existing approaches and this comparison shows that the proposed approach is better than the existing approaches.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Xiao, Zhen Jiu, Zheng Tao Jiang, Yong Bin Wang und Hong Chen. „Improved RSA Algorithm and Application in Digital Signature“. Applied Mechanics and Materials 713-715 (Januar 2015): 1741–45. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.1741.

Der volle Inhalt der Quelle
Annotation:
In order to enhance the operation efficiency of RSA algorithm, a new improved algorithm was suggested in this paper which made some improvements in structure and operation, and it was applied to digital signature. The experiment made comparison between a combinatorial optimization algorithm which combined SMM with index of 2k hexadecimal algorithm and the new algorithm. It shows that the new algorithm reaches a high level in operation speed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

He, Juan, und Shuai Kang. „Design of Vehicle Taillight Circuit with Mechanical Properties in Mechanical Engineering“. Advanced Materials Research 648 (Januar 2013): 315–18. http://dx.doi.org/10.4028/www.scientific.net/amr.648.315.

Der volle Inhalt der Quelle
Annotation:
The vehicle taillights control circuit with mechanical properties is composed of a clock pulse circuit, a switch control circuit, three hexadecimal circuit, decoding and display drive circuit, taillight display. The circuit is simulated with Multisim. The simulation results show that vehicle taillight display can make pedestrians and other vehicles understand clearly the occurrence of the vehicle’s dynamic change, thus which can prevent the occurrence of traffic accidents effectively.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Al-Omoush, Ashraf, Norita Md Norwawi und Ahmad Akmalludin Mazlan. „Handling Words Duplication and Memory Management for Digital Quran Based on Hexadecimal Representation and Sparse Matrix“. International Journal of Engineering & Technology 7, Nr. 4.15 (07.10.2018): 481. http://dx.doi.org/10.14419/ijet.v7i4.15.25760.

Der volle Inhalt der Quelle
Annotation:
Al-Quran is the holy book of the Muslims and the most important scripture containing knowledge on many domains. The recent advent of smart technologies like smart phones, digital devices and tablets has connected the daily life routines under a single touch adopted by many, these new tools with an exponential growth. This paper presented a Digital Quran Model (DQM) using hexadecimal representation using Unicode Hexadecimal and UTF-8 for character encoding, which is backward compatible with ASCII code. DQM target to handle all duplicated words or verses in Al-Quran using sparse matrix with double offset indexing to handle memory optimization. Three approaches were discussed: indexing and representation of the digital Quran to optimize storage, organize verses structure using sparse matrix to handle repetition with double offset indexing to efficiently use the space. The algorithms were implemented using Visual studio and Java server and the solution quality was measured by the size of a file before and after applying DQM model. For surah Al-Baqarah, the longest chapter in the Al-Quran, the reduction of the storage size was 25.00% whereas surah Al-Fatihah was 47.89%. The proposed DQM model is able to optimize the memory space and can be extended to other non-Roman characters used for information retrieval such as Hindi, Chinese and Japanese that are categorized in unicode standards.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Wang, Jian, Jeng-Yuan Yang, Xiaoxia Wu und Alan E. Willner. „Optical Hexadecimal Coding/Decoding Using 16-QAM Signal and FWM in HNLFs“. Journal of Lightwave Technology 30, Nr. 17 (September 2012): 2890–900. http://dx.doi.org/10.1109/jlt.2012.2202371.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Silalahi, Lisnayani, und Anita Sindar. „Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1“. Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 3, Nr. 2 (21.10.2020): 182–86. http://dx.doi.org/10.32672/jnkti.v3i2.2413.

Der volle Inhalt der Quelle
Annotation:
Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Tuncer, Turker, Sengul Dogan, Paweł Pławiak und U. Rajendra Acharya. „Automated arrhythmia detection using novel hexadecimal local pattern and multilevel wavelet transform with ECG signals“. Knowledge-Based Systems 186 (Dezember 2019): 104923. http://dx.doi.org/10.1016/j.knosys.2019.104923.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Abd Elrahim, Noaman Abd Elnour. „Microcontroller based kit design for Octal to Hexadecimal system Conversion without returning to another system“. IOSR Journal of Engineering 04, Nr. 12 (Dezember 2014): 52–057. http://dx.doi.org/10.9790/3021-04124052057.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Jeyabharathi, D., und Dejey. „New feature descriptor: Extended Symmetrical-Diagonal Hexadecimal Pattern for efficient background subtraction and object tracking“. Computers & Electrical Engineering 66 (Februar 2018): 454–73. http://dx.doi.org/10.1016/j.compeleceng.2017.11.001.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Jeyabharathi, D., und Dr D. Dejey. „Vehicle Tracking and Speed Measurement system (VTSM) based on novel feature descriptor: Diagonal Hexadecimal Pattern (DHP)“. Journal of Visual Communication and Image Representation 40 (Oktober 2016): 816–30. http://dx.doi.org/10.1016/j.jvcir.2016.08.011.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Garg, Hinam, und Mohit Garg. „Analysing The Quality Attributes of AOP using CYVIS Tool“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, Nr. 2 (30.11.2005): 648–53. http://dx.doi.org/10.24297/ijct.v4i2c2.4195.

Der volle Inhalt der Quelle
Annotation:
The aim of thesis is to provide the difference between AOP and OOP in AspectJ by using CYVIS tool. It gives a way to separate the code from essential crosscutting concerns, such as logging and security, from Java programs core application logic cleanly by making code more readable, less error-prone, and easier to maintain. It also solves the problem of code scattering and code tangling by providing the aspect to crosscutting concerns (concerns which are repeated again and again). In this paper, aspect oriented programming is shown better than OOP by considering cyclomatic complexity  and overcoming all those problems which were occurring in OOP. Two examples such as banking system and conversion of int and float values to hexadecimal are illustrated and shows the difference of quality attributes in AOP than OOP.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Huang, Wan Fu. „Designing a Four-by-Four Keypad Arbitrary-Key-Entry Detector“. Applied Mechanics and Materials 433-435 (Oktober 2013): 887–94. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.887.

Der volle Inhalt der Quelle
Annotation:
This paper presents a field programmable gate array (FPGA) prototype of a four-by-four keypad arbitrary-key-entry detector design for entering any arbitrary set of the 4x4 keypad keys. The number of the valid keys was defined by a multiple-bit mask input. The character code of the prohibited key would not be generated after a key stroke. A valid-key stroke caused the detector circuit to generate a 4-bit hexadecimal character code and a sampling tick for the next-stage device to capture the pressed key information. The detector design and the testing circuitry were implemented on an Atlys Spartan-6 FPGA Development Board. The design itself can be incorporated into a wide variety of key-entry tools on electronic instruments, mechanical devices, medical apparatus, and more, to improve the key-stroke filtering and ease the interface connection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Takahashi, Daisuke. „Computation of the 100 quadrillionth hexadecimal digit of π on a cluster of Intel Xeon Phi processors“. Parallel Computing 75 (Juli 2018): 1–10. http://dx.doi.org/10.1016/j.parco.2018.02.002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Kim, Hyunki, Juhong Han, Chanil Park und Okyeon Yi. „Analysis of Vulnerabilities That Can Occur When Generating One-Time Password“. Applied Sciences 10, Nr. 8 (24.04.2020): 2961. http://dx.doi.org/10.3390/app10082961.

Der volle Inhalt der Quelle
Annotation:
A one-time password (OTP) is a password that is valid for only one login session or transaction, in IT systems or digital devices. This is one of the human-centered security services and is commonly used for multi-factor authentication. This is very similar to generating pseudo-random bit streams in cryptography. However, it is only part of what is used as OTP in the bit stream. Therefore, the OTP mechanism requires an algorithm to extract portions. It is also necessary to convert hexadecimal to decimal so that the values of the bit strings are familiar to human. In this paper, we classify three algorithms for extracting the final data from the pseudo random bit sequence. We also analyze the fact that a vulnerability occurs during the extraction process, resulting in a high frequency of certain numbers; even if cryptographically secure generation algorithms are used.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

H. Sulaiman, A., I. F.T. Al-Shaikhli, M. R. Wahiddin, S. Houri, N. Jamil und A. F. Ismail. „A novel secret key generation based on image link“. International Journal of Engineering & Technology 7, Nr. 2.5 (10.03.2018): 23. http://dx.doi.org/10.14419/ijet.v7i2.5.10048.

Der volle Inhalt der Quelle
Annotation:
One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generatean identical secret key. While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. The image from website must be a static image and used as the input of random bits to produce string of hexadecimal values. In a case where image link is compromised, the adversary has to guess other layers of parameters in starting pattern and string length. The generated secret keys were identical at two different locations. In other observation, different secret keys were generated even with the same image link and pattern length but different starting pattern.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Puškár, Michal, Peter Bigoš, Michal Kelemen, Roman Tonhajzer und Martin Šima. „Measuring method for feedback provision during development of fuel map in hexadecimal format for high-speed racing engines“. Measurement 50 (April 2014): 203–12. http://dx.doi.org/10.1016/j.measurement.2014.01.005.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

‘Afizi Bin Mohd Shukran, Mohd. „Pixel Value Graphical Password Scheme: Fake <i>Passpix</i> Attempt on Hexadecimal Password Style“. International Journal of Information and Communication Sciences 3, Nr. 3 (2018): 104. http://dx.doi.org/10.11648/j.ijics.20180303.14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Dogan, Sengul, Erhan Akbal und Turker Tuncer. „A novel ternary and signum kernelled linear hexadecimal pattern and hybrid feature selection based environmental sound classification method“. Measurement 166 (Dezember 2020): 108151. http://dx.doi.org/10.1016/j.measurement.2020.108151.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Puškár, Michal, Melichar Kopas und Dušan Puškár. „Development of Fuel Maps in Hexadecimal Format for Reduction of NOX Emissions and Application in Real HCCI Engine“. Acta Mechanica Slovaca 22, Nr. 2 (15.06.2018): 38–47. http://dx.doi.org/10.21496/ams.2018.016.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Kumar, Vivek, Sangram Ray, Mou Dasgupta und Muhammad Khurram Khan. „A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography“. Wireless Personal Communications 118, Nr. 4 (15.02.2021): 3045–61. http://dx.doi.org/10.1007/s11277-021-08168-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Sowmya, G., G. Divya Jyothi, N. Shirisha, K. Navya und B. Padmaja. „Iot Based Smart Door Lock System“. International Journal of Engineering & Technology 7, Nr. 3.6 (04.07.2018): 223. http://dx.doi.org/10.14419/ijet.v7i3.6.14975.

Der volle Inhalt der Quelle
Annotation:
These days’ people are sky rocketing in technological advancements. This ushered to a lifestyle that’s become a child’s play. We are in pursuit of emerged advanced technologies and software with every single passing day. In the huge efforts of making our lives simpler and better we are contributing a fraction of a part through our project – SMART DOORS. Smart doors are a simple project that assists people in gaining the control to access the doors. Smart doors project prevents the entry of unauthorized personnel. This uses a simple Arduino board with a few lines of code dumped in it, a hexadecimal keypad and some jumper wires. The predominant attribute of this project is the Arduino board that facilitates the usage of this project. With this it is ready to be set up anywhere and everywhere with utmost expedite efforts. This prevents security breaches and helps establish a secure environment in and around.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Čelikovský, Sergej, und Volodymyr Lynnyk. „Message Embedded Chaotic Masking Synchronization Scheme Based on the Generalized Lorenz System and Its Security Analysis“. International Journal of Bifurcation and Chaos 26, Nr. 08 (Juli 2016): 1650140. http://dx.doi.org/10.1142/s0218127416501406.

Der volle Inhalt der Quelle
Annotation:
This paper focuses on the design of the novel chaotic masking scheme via message embedded synchronization. A general class of the systems allowing the message embedded synchronization is presented here, moreover, it is shown that the generalized Lorenz system belongs to this class. Furthermore, the secure encryption scheme based on the message embedded synchronization is proposed. This scheme injects the embedded message into the dynamics of the transmitter as well, ensuring thereby synchronization with theoretically zero synchronization error. To ensure the security, the embedded message is a sum of the message and arbitrary bounded function of the internal transmitter states that is independent of the scalar synchronization signal. The hexadecimal alphabet will be used to form a ciphertext making chaotic dynamics of the transmitter even more complicated in comparison with the transmitter influenced just by the binary step-like function. All mentioned results and their security are tested and demonstrated by numerical experiments.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Rahardja, Untung, Achmad Nizar Hidayanto, Ninda Lutfiani, Dyah Ayu Febiani und Qurotul Aini. „Immutability of Distributed Hash Model on Blockchain Node Storage“. Scientific Journal of Informatics 8, Nr. 1 (10.05.2021): 137–43. http://dx.doi.org/10.15294/sji.v8i1.29444.

Der volle Inhalt der Quelle
Annotation:
The blockchain system uses hash functions. Hash is used in the blockchain to mark each block of data. Hash function algorithms map a string that is usually hexadecimal of any size to a sequence of fixed-size bits. This journal will discuss the distributed hash model for immutable blockchain node storageThe methodology used in the preparation of this research is mind mapping and literature review, namely the collection of scientific journals, articles and ebooks. Storage of nodes on the blockchain using a distributed hash model. The distributed hash model only stores a portion of the block data at each node, and the block data is taken as a resource. A hash connects each block with the previous on the blockchain, so the entire blockchain transaction cannot be changed or deleted. For further research will expand the research topic regarding storage immutability on the blockchain so that it becomes more complete and detailed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Méndez-Naranjo, Pablo, und Andrés Cisneros-Barahona. „Evaluación de la propuesta algorítmica criptográfica con la incorporación de la esteganografía en imágenes. // Evaluation of the cryptographic algorithmic proposal with the incorporation of steganography into images“. Ciencia Unemi 10, Nr. 25 (26.02.2018): 134. http://dx.doi.org/10.29076/issn.2528-7737vol10iss25.2017pp134-147p.

Der volle Inhalt der Quelle
Annotation:
El presente trabajo de tipo aplicativo, cuasi experimental, integró dos campos de la seguridad: la criptografía que cifra el mensaje y la esteganografía que oculta el mensaje tras un medio multimedia, lo cual fortalece el nivel de seguridad. El software utilizado para la investigación fue: Netbeans como ambiente de desarrollo, Beyond Compare, para comparar el código hexadecimal de las imágenes, Ion Forge Image Diff para comparar las diferencias entre imágenes pixel a pixel y Cyptool para las pruebas de criptoanálisis. El algoritmo criptográfico utilizado como base fue el AES (Advanced Encryption Standard) y para la técnica esteganográfica en imágenes se seleccionó LSB (Least Significant Bit). Se implementó y evaluó nuevas funciones que fueron incluidas en el Prototipo II, y se compararon los resultados obtenidos ejecutando criptoanálisis a los mensajes cifrados entre el Prototipo II que utiliza el nuevo algoritmo criptográfico denominado NAES y el Prototipo I que utiliza el algoritmo AES base, a los cuales se les incorporó la técnica esteganográfica en imágenes LSB. Se concluyó, que el nuevo algoritmo criptográfico NAES con la incorporación de la técnica LSB mejoró la seguridad, en comparación con el algoritmo criptográfico AES base, ya que el mensaje es más difuso. AbstractThe present study was quasi experimental, applicative and integrated two fields of security: the cryptography that encrypts the message and the steganography that hides the message behind a multimedia medium, which strengthens the level of security. Netbeans was the software used for the research as a development environment, Beyond Compare to compare the hexadecimal code of the images, Ion Forge Image Diff to compare the differences between pixel to pixel images and Cyptool for the cryptanalysis tests. The AES (Advanced Encryption Standard) cryptographic algorithm was used as the basis and LSB (Least Significant Bit) was selected for the steganographic technique in images. New functions that were included in Prototype II were implemented and evaluated, and results obtained by running cryptanalysis were compared to the encrypted messages between Prototype II, that uses the new cryptographic algorithm named NAES, and Prototype I, that uses the AES base algorithm, to which incorporated the steganographic technique into LSB images. It was concluded that the new cryptographic algorithm NAES with the incorporation of the LSB technique improved the security, in comparison with the AES cryptographic algorithm, since the message is more diffuse.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Victor, Andy, und Taufan Maulana Putra. „PENERAPAN V.S.N HARDWARE KEY SCHEME DENGAN RSA CRYPTOSYSTEM UNTUK PENGAMANAN PERANGKAT LUNAK“. Jurnal Rekayasa Sistem & Industri (JRSI) 2, Nr. 04 (19.10.2015): 27. http://dx.doi.org/10.25124/jrsi.v2i04.48.

Der volle Inhalt der Quelle
Annotation:
Jumlah pencurian data perusahaan meningkat dari tahun ke tahun. Hal ini dikarenakan kurangnya kesadaran pihak perusahaan akan pentingnya suatu sistem keamanan yang efisien dan unik. Pihak perusahaan mengira bahwa hanya dengan password, data tersebut sudah sangat aman. Pada penelitian ini, dibuat suatu skema keamanan data, yakni V.S.N Hardware Key dengan algoritma kriptografi RSA. Volume Serial Number yang terdapat di dalam suatu hardware yang berbentuk bilangan hexadecimal diambil dengan fungsi API GetVolumeInformation dan diubah menjadi bilangan decimal yang kemudian digunakan sebagai otentifikasi dalam pengaksesan sebuah aplikasi. RSA merupakan salah satu algoritma kriptografi asimetris yang menggunakan sepasang kunci, yaitu kunci publik dan kunci privat. Panjang kunci dapat diatur, dimana semakin panjang bit pembentukan kunci maka semakin sukar untuk dipecahkan karena sulitnya memfaktorkan dua bilangan yang sangat besar. Aplikasi yang dirancang dalam mendukung V.S.N Hardware Key dengan algoritma kriptografi RSA telah diuji dengan melibatkan data-data confidential perusahaan, dan terbukti ampuh dalam membuat para intruder gagal melakukan pencurian data penting perusahaan termasuk penggandaan ilegal. Secara umum V.S.N Hardware Key dengan algoritma kriptografi RSA digunakan sebagai skema penyempurna pengamanan data perusahaan yang secara umum berbentuk aplikasi sistem informasi.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Butt, Khushbu Khalid, Guohui Li, Sajid Khan und Sohaib Manzoor. „Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD“. Entropy 22, Nr. 1 (16.01.2020): 112. http://dx.doi.org/10.3390/e22010112.

Der volle Inhalt der Quelle
Annotation:
Bit-level and pixel-level methods are two classifications for image encryption, which describe the smallest processing elements manipulated in diffusion and permutation respectively. Most pixel-level permutation methods merely alter the positions of pixels, resulting in similar histograms for the original and permuted images. Bit-level permutation methods, however, have the ability to change the histogram of the image, but are usually not preferred due to their time-consuming nature, which is owed to bit-level computation, unlike that of other permutation techniques. In this paper, we introduce a new image encryption algorithm which uses binary bit-plane scrambling and an SPD diffusion technique for the bit-planes of a plain image, based on a card game trick. Integer values of the hexadecimal key SHA-512 are also used, along with the adaptive block-based modular addition of pixels to encrypt the images. To prove the first-rate encryption performance of our proposed algorithm, security analyses are provided in this paper. Simulations and other results confirmed the robustness of the proposed image encryption algorithm against many well-known attacks; in particular, brute-force attacks, known/chosen plain text attacks, occlusion attacks, differential attacks, and gray value difference attacks, among others.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Aranta, Arik, Fitri Bimantoro und I. Putu Teguh Putrawan. „Penerapan Algoritma Rule Base dengan Pendekatan Hexadesimal pada Transliterasi Aksara Bima Menjadi Huruf Latin“. Jurnal Teknologi Informasi, Komputer, dan Aplikasinya (JTIKA ) 2, Nr. 1 (31.03.2020): 130–41. http://dx.doi.org/10.29303/jtika.v2i1.96.

Der volle Inhalt der Quelle
Annotation:
Aksara Bima is a text-based information exchange media that has never been lost. At this time the Bima script began to be studied again indicated, with researchers who began to explore the history and stages of the process of digitizing the characters including the Bima script. Thus providing hope for the use of characters in community activities. One problem faced when wanting to learn the characters felt by the community is the different forms of characters in Latin letters and there are fixed rules when writing characters that make the process of writing characters feel difficult. So the writing of characters in daily activities in community activities still cannot be said to be massive due to these problems. In this study, the writer will develop an algorithm that can facilitate the learning activities of characters, which is specialized in the process of reading the Bima Script. The method adopts the concept of machine learning that is applied to the process of transliteration of Bima, into Latin letters. With a string replacement algorithm that is optimized by using hexadecimal numbers. The results obtained from this transliteration process in the form of system accuracy that reaches 90.64% of 171 implemented rule base.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Jebril, Akram, Aduwati Sali, Alyani Ismail und Mohd Rasid. „Overcoming Limitations of LoRa Physical Layer in Image Transmission“. Sensors 18, Nr. 10 (27.09.2018): 3257. http://dx.doi.org/10.3390/s18103257.

Der volle Inhalt der Quelle
Annotation:
As a possible implementation of a low-power wide-area network (LPWAN), Long Range (LoRa) technology is considered to be the future wireless communication standard for the Internet of Things (IoT) as it offers competitive features, such as a long communication range, low cost, and reduced power consumption, which make it an optimum alternative to the current wireless sensor networks and conventional cellular technologies. However, the limited bandwidth available for physical layer modulation in LoRa makes it unsuitable for high bit rate data transfer from devices like image sensors. In this paper, we propose a new method for mangrove forest monitoring in Malaysia, wherein we transfer image sensor data over the LoRa physical layer (PHY) in a node-to-node network model. In implementing this method, we produce a novel scheme for overcoming the bandwidth limitation of LoRa. With this scheme the images, which requires high data rate to transfer, collected by the sensor are encrypted as hexadecimal data and then split into packets for transfer via the LoRa physical layer (PHY). To assess the quality of images transferred using this scheme, we measured the packet loss rate, peak signal-to-noise ratio (PSNR), and structural similarity (SSIM) index of each image. These measurements verify the proposed scheme for image transmission, and support the industrial and academic trend which promotes LoRa as the future solution for IoT infrastructure.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Dermaku, Kastriot, Ardian Emini, Ilir Gashi und Xhemshit Shala. „Financial and Legal Obligations that appear from Internet Traffic - Technology of Information and Communication Kosovo Case“. International Journal of Management Excellence 12, Nr. 3 (30.04.2019): 1841–44. http://dx.doi.org/10.17722/ijme.v12i3.1074.

Der volle Inhalt der Quelle
Annotation:
In this case study we have presented the comparison of the calls made by the clients to the telephone operator Y and the calls which have been transferred to the company responsible for the quiz through telephone calls. During this analysis we gathered calls from the Composite Call Data Record (CDR), the CDR partition is divided in two part, the CDR Originating part and the part of the CDR transit part.The part of the CDR Originating are as the showed following: Calling Party Number, Called Party Number, Date Fort Start Of Charge, Time For Start Of Charge, Time For Stop Of Charge and Chargeable Duration. The part of the CDR Transit part contains completely the same data that must be identical because it is the same call that additionally contains other information such as the name of the incoming route from which the call and outbound route or where the call came from is addressed by identifying its name. The data has been decoded by the hexadecimal system in the decade system to compare the numbers of calls, duration calls and time of calls. From the analysis that is done in this case study has come out there is a difference from the number of calls as well the duration of the calls that have been on the part of the customers to the operator Y and the calls directed by the operator Y in the contracting company X
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Rizal, Randi, Ruuhwan Ruuhwan und Septian Chandra. „Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts“. Jurnal Informatika Universitas Pamulang 5, Nr. 3 (30.09.2020): 364. http://dx.doi.org/10.32493/informatika.v5i3.6073.

Der volle Inhalt der Quelle
Annotation:
The number of crimes committed by utilizing advances in information technology such as information leakage, embezzlement of money in banks, credit card fraud, pornography, terrorism, drug trafficking and many more are definitely related to the name digital data. File signatures or magic numbers are one of the forensic science techniques that assist in processing this digital data. The method used in this research is the National Institute Standards Technology method to analyze the authenticity of digital data and the method of proof to obtain valid evidence during the identification process of data or file content. This research is presented in the form of an analysis of the use of signature files in investigations to determine the type of file in the case of leaking company information xyz, the research stage uses evidence handling procedures in the laboratory. Contributions made after conducting a series of case investigations using signature files have been successfully carried out using the Access Data FTK Imager application version 4.2.0 and WinHex version 18.6. Signature files can be used for case investigations in identifying and verifying file types so that files that have been modified can be restored and can be read by the operating system by checking file types through hexadecimal values in the header file (file prefix) that show the characteristics of each type file so that the file type can be found and the file can be read by the operating system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Joy, Jibin, und Dr S. Devaraju. „Secure Deduplication For Cloud Storage Using Memory Mapping Technique For Improving Performance And Security“. Journal of University of Shanghai for Science and Technology 23, Nr. 09 (01.09.2021): 1–13. http://dx.doi.org/10.51201/jusst/21/08498.

Der volle Inhalt der Quelle
Annotation:
Data deduplication is a crucial technique for packing data and reducing duplication when transferring data. It is widely used in the cloud to restrict the usage of capacity memory and aids in transmission capacity sparing. Before redistributing data, an encryption mechanism is used to ensure the integrity of sensitive data during the deduplication process. The SHA algorithm is being used to save data in text format. To generate the security bits, padding is appended to the text. In de-duplication, it calculates the hash, i.e. hexadecimal number, string, and integer data. Hash-based de-duplication is the implementation of whole file hashing to the entire file. Text data’s hash values are considered to as feature properties. In contrast to traditional deduplication solutions, clients that transfer data to the cloud certify duplication inside the cloud data. In virtualization, both limiting primary memory size and memory blockage are considered important bottlenecks. Memory deduplication identifies pages with the same content and merges them into a single data file, reducing memory usage, memory parceling, and improving execution. In cloud storage, the MPT is used to deduplication so that it is used in single copies of the same data for different data owners. If any data users try to replicate the same data, it will be mapped and related to the archive data, implying that the data can’t be stored away. To ensure cloud data security, encryption techniques are used to encrypt data throughout deduplication procedures and prior to outsourcing cloud data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Sajati, Haruno, Dwi Nugrahenny und Eko Cahyo Nugroho. „PERANCANGAN DAN ANALISA PERBANDINGAN ANTARA DELAY DAN THROUGHPUT PADA VIDEO STREAMING MENGGUNAKAN IPv4 DAN IPv6 TUNNELING“. Conference SENATIK STT Adisutjipto Yogyakarta 1 (03.12.2013): 55. http://dx.doi.org/10.28989/senatik.v1i0.50.

Der volle Inhalt der Quelle
Annotation:
Along with the rapid growth of the Internet, causing problem in the allocation of IPv4 addressing. Therefore, IPv4 only have less than 4 billion addresses and will soon be exhausted. Therefore, IPv6 has been created and used hexadecimal system on it addressing and has very large address allocation that is 3,4 x 1038 addresses. But now many network infrastructures in terms of hardware and software that have not fully support IPv6. So, the devices that still using IPv4 can through IPv6-based network infrastructures, they can use tunneling technique. This makes the emergence of the idea to test the delay and throughput in streaming video system which has a heavy workload on the network. Video streaming system on Vision 1.0 application takes advantage motor stepper webcam in order to support the visibility of the image that can be captured. Then the client who connected to the server can control remotely the motor stepper webcam. On the implementation phase, Vision 1.0 is running on IPv4 and IPv6 network. Next on the testing phase, carried out delay and throughput data collections from those both network systems. From the obtained results in testing, showed no significant difference. So, in general, the performance difference is not too pronounced when the video streaming system is running on both network systems. However, from a comparison based on mean value of delay and throughput, IPv4 is still superior due to the header of the data packet does not as big asIPv6 header which of course affects the packet data frame size, then the traffic network more crowded.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Moncaleano Ospina, Ariel Ricardo, José De Jesús Paternina Anaya und Elvis Eduardo Gaona García. „DISEÑO E IMPLEMENTACIÓN DE UN ANALIZADOR PARA EL PROTOCOLO AX.25“. Redes de Ingeniería 4, Nr. 2 (30.12.2013): 70. http://dx.doi.org/10.14483/2248762x.5925.

Der volle Inhalt der Quelle
Annotation:
Actualmente la Universidad Distrital Francisco José de Caldas, a través grupo de investigación GITEM, se encuentra desarrollando el proyecto Cubesat Colombia I, con la misión de enviar señales electrocardiográficas desde una estación terrena hacia un pico satélite, el envío de estos datos se hace a través del protocolo estándar denominado AX.25, ampliamente utilizado en las redes de radio aficionado y en satélites pequeños. Es prioridad en el desarrollo de cualquier proyecto tecnológico el uso de herramientas que permitan un desarrollo ágil y seguro, en este artículo la implementación de AX.25 en el proyecto antes mencionado se logró implementar un analizador de protocolo AX.25 para lacaptura de los paquetes que se están intercambiando las estaciones de radio aficionados para posteriormente analizarlos, evaluarlos y almacenarlos. Esto permite observar a través de la decodificación de las tramas, su empaquetamiento: campo de dirección destino y fuente, campo de control, la información que viaja en formato hexadecimal ASCII, el CRC y así indicar si la trama se recibe con error o no. El analizador de protocolo desarrollado tiene la posibilidad de capturar señales NRZI moduladas en banda base con el estándar BELL 202 sobre una portadora de radio en la banda radioaficionado VHF/ UHF. La demodulación de señales VHF / UHF se logran a través de radios Yaesu VX-3R, y la implementación del estándar BELL 202 con los circuitos integrados MX 614 para cada enlace (recepción y transmisión), que permite tomar la información en AFSK, demodularla y entregarla a la tarjeta de adquisición, y enviar la información al software analizador de protocolo para la respectiva evaluación por parte del usuario.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

YAMAGUCHI, Tomomi, Masahiro HIGUCHI und Akishige YANO. „Development of Monitoring System of Machining Process by Using Frequency of Cutting/Machinery Sounds. 1st Report. Construction of the System to Cutting Tool Conditions by Expression of Hexadecimal Spectrum Pattern (HSP).“ Transactions of the Japan Society of Mechanical Engineers Series C 68, Nr. 668 (2002): 1251–56. http://dx.doi.org/10.1299/kikaic.68.1251.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Shamsutdinova, T. M. „Application of the blockchain technology for digital diplomas: problems and prospects“. Open Education 22, Nr. 6 (14.01.2019): 51–58. http://dx.doi.org/10.21686/1818-4243-2018-6-51-58.

Der volle Inhalt der Quelle
Annotation:
The purpose of this studyis to analyze possible problems in issuing digital diplomas, using the blockchain technology, and to promote solving these problems as well as to show the possibility of practical implementation of the blockchain technology, using a test example. Materials and methods.The study included a review of bibliographic sources on the use of blockchain technologies in the education system, as well as computer modeling of the task of registering and verifying a digital diploma in the blockchain.Results.In the course of the work, a model of the process of issuing and verifying digital diplomas was built, and a number of problems related to the practical implementation of this model were also considered.At the same time, the following groups of problems that restrain the spread of blockchain in the education sector of the Russian Federation were identified: technical and technological problems (lack of a national blockchain platform); legal issues (lack of legal force of digital diplomas); organizational problems (lack of a centralized management structure that coordinates the “educational” blockchain as a single digital information space).An example was also realized, showing the hardware and technological capabilities of the implementation of the task under consideration using the currently open (freely available) platforms. To implement the proposed test case, the Ethereum blockchain network was used, in particular, its RinkeBy test network.The project implementation consisted of the following stages: creating a digital diploma file and placing it in the open file-sharing network in order to obtain the corresponding document hash; obtaining blockchain address (an electronic wallet was created using the MetaMask browser plugin, which allows for the transfer of data on a digital diploma to the blockchain); preparing data to be sent to the blockchain, where the data was a hexadecimal code, containing brief information about a digital diploma, including its hash; transferring data to the Ethereum blockchain (making a transaction); verification of transaction results in Etherscan.Conclusion.The blockchain technology provides great opportunities in improving the concept of e-learning, taking into account the current requirements of the digital economy. This technology can conceptually change the data archiving system, increase the reliability of information protection against falsification, and significantly speed up the execution of requests for information and data processing. The problems that arise can be successfully resolved, as long as that the blockchain becomes one of the principles of the unified information educational space.At the same time, the blockchain gives the following new opportunities: transparency and verifiability of the system of certification of graduates of educational institutions; the possibility of liquidation of intermediary organizations that implement a variety of support monitoring and certifying functions, associated with the “paper” requests for confirmation of diplomas; the overall reduction in paper workflow, the transfer of the classic “paper” business-processes into the information space, and as a result of all this – the practical implementation and example of the realization of the concept of digitalization of the knowledge economy.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Polotai, O., O. Belej und N. Maltseva. „PHYSICAL CONTENT OF COMPUTER STEGANOGRAPHY“. Bulletin of Lviv State University of Life Safety 23 (30.06.2021): 27–32. http://dx.doi.org/10.32447/20784643.23.2021.04.

Der volle Inhalt der Quelle
Annotation:
Introduction. The development of computer technology has given a new impetus to the use of computer steganography. However, it is important to understand the physical content of this type of steganography.Purpose. The work aims to describe the practical use and physical content of the phenomenon of computer steganography, the results of the study on the hiding of files in the stegocontainer.Results. Describes the main ns currently computer steganography methods are actively used to solve the following tasks: Protection of confidential information from unauthorized access, overcoming monitoring and management of net-work resources, software camouflage, copyright protection, which is manifested in the use of digital watermarks, is one of the most promising areas of computer steganography. Among the methods of hiding information in images, the most common is the category of algorithms using the lower bits of the image data. They are considered in this paper. These algorithms are based on the fact that in some file formats, the lower bits of the values, although present in the file, but do not affect a person's perception of sound or image. The steganographic software S-Tools was chosen for the study. We created two test monotonous images with the size of 50 × 50 pixels in 24-bit bmp format to analyze the peculiarities of the placement of stego-data in container files. We chose black and white images for the study. A text file was hidden in each of the images, after which the reverse action was performed - extracting the file. As a result of hiding, two stego files were obtained. The paper compared the binary content of the original images and files containing private data. For comparison, the binary content of the black square image and the contents of the stegocontainer with a latent text file are given. Note that the contents of the container and the stego file are only partially listed, but the addresses of the memory cells have selected accordingly. The right column shows the contents of the memory cells in hexadecimal format. The bytes that display the colour of the square are set to "00" because the original image contains only black. We noted that the contents of the cells responsible for the image changed after hiding additional data (this reflected by cells with values of "01"). The paper also describes the procedure for hiding a group of different types of files. During the study, we found that the image file (1920 × 1080 pixels) with a volume of 6,220,854 bytes can hide 777,584 bytes of information.Conclusion. When using steganography, the program uses some algorithms that hide confidential data among the contents of the container: bits of the hidden file replace the bits of the original file at random positions. Thus, the size of the source file and the container file (containing the attached information) is the same, even if you hide a different number of files or different amounts of data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Dawahdeh, Ziad E., Shahrul N. Yaakob und Ali Makki Sagheer. „Modified ElGamal Elliptic Curve Cryptosystem using Hexadecimal Representation“. Indian Journal of Science and Technology 8, Nr. 15 (07.07.2015). http://dx.doi.org/10.17485/ijst/2015/v8i15/64749.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Karlova, A. V. „Some features of study of image files in hexadecimal format“. Politechnical student journal, Nr. 36 (Juli 2019). http://dx.doi.org/10.18698/2541-8009-2019-7-501.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Subasi, Abdulhamit, Sengul Dogan und Turker Tuncer. „A novel automated tower graph based ECG signal classification method with hexadecimal local adaptive binary pattern and deep learning“. Journal of Ambient Intelligence and Humanized Computing, 17.06.2021. http://dx.doi.org/10.1007/s12652-021-03324-4.

Der volle Inhalt der Quelle
Annotation:
AbstractElectrocardiography (ECG) signal recognition is one of the popular research topics for machine learning. In this paper, a novel transformation called tower graph transformation is proposed to classify ECG signals with high accuracy rates. It employs a tower graph, which uses minimum, maximum and average pooling methods altogether to generate novel signals for the feature extraction. In order to extract meaningful features, we presented a novel one-dimensional hexadecimal pattern. To select distinctive and informative features, an iterative ReliefF and Neighborhood Component Analysis (NCA) based feature selection is utilized. By using these methods, a novel ECG signal classification approach is presented. In the preprocessing phase, tower graph-based pooling transformation is applied to each signal. The proposed one-dimensional hexadecimal adaptive pattern extracts 1536 features from each node of the tower graph. The extracted features are fused and 15,360 features are obtained and the most discriminative 142 features are selected by the ReliefF and iterative NCA (RFINCA) feature selection approach. These selected features are used as an input to the artificial neural network and deep neural network and 95.70% and 97.10% classification accuracy was obtained respectively. These results demonstrated the success of the proposed tower graph-based method.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Mamani Ordoñez, Pedro Nicoyani, und Jenny Maribel Hancco Zaga. „Diseño e implementación de termohigrómetro basado en tecnología de Internet de las cosas para el almacenamiento y transporte de alimentos“. Revista Cientifica I+D Aswan Science, 22.12.2020. http://dx.doi.org/10.51392/rcidas.v1i1.4.

Der volle Inhalt der Quelle
Annotation:
El presente trabajo tiene por objeto diseñar e implementar un termohigrómetro con la plataforma IOT aplicado a la cadena de suministros alimentaria en las etapas de almacenamiento y transporte. La conexión se realizó mediante bus I2C, el cual permite conectar varios dispositivos en paralelo en los mismos pines SCL y SDA del microcontrolador ESP8266, inicialmente se configuró el software Arduino IDE, para poder realizar la programación de dicho microcontrolador, seguidamente se obtuvo las direcciones en hexadecimal asignadas para el sensor SHT31 y el display OLED, la programación se realizó a partir de las especificaciones de los fabricantes, así como del código proporcionado por los desarrolladores de las librerías requeridas, así como también las direcciones en hexadecimal obtenidas previamente. Los datos obtenidos con el sensor de temperatura y humedad relativa SHT31 además de mostrarlos alternadamente en el display OLED, se enviaron al servidor especializado IOT (https://belniksys.com/SensorsIOT) a intervalos de 20 segundos, dichos datos pueden ser exportados en una hoja de cálculo compatible con Ms Excel®, a partir de los datos exportados se construyó las curvas temperatura y humedad relativa, con las cuales es posible determinar la conservación o ruptura de los límites establecidos para temperatura y humedad en las etapas de almacenamiento y transporte de alimentos.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Trevisan, Maria do Carmo Barbosa, Gilse Morgental Falkembach und Vanilde Bisognin. „UMA APLICAÇÂO MULTIMIDIA PARA O ENSINO E APRENDIZAGEM DE SISTEMAS DE NUMERAÇÃO“. RENOTE 6, Nr. 2 (06.12.2008). http://dx.doi.org/10.22456/1679-1916.14587.

Der volle Inhalt der Quelle
Annotation:
Neste trabalho tem-se como objetivo apresentar uma aplicação hipermídia educacional desenvolvida para o estudo de diferentes Sistemas de Numeração e das operações matemáticas, usando-se a simbologia de cada sistema. Além disso, a aplicação envolve a visualização de todo o processo de transformação das bases decimal, binária, octal e hexadecimal. A proposta metodológica foi centralizada no desenvolvimento de aplicações hipermídia, em que a aplicação foi projetada a partir dos recursos do Sistema de Autoria TOOLBOOK, versão 7.1.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Sourabh, Shshank, Diwakar Chauhan, Vinay Singh und Monika Chauhan. „Analysis of digital data by file signature method on Android version 9“. Recent Advances in Computer Science and Communications 13 (16.12.2020). http://dx.doi.org/10.2174/2666255813666201216114643.

Der volle Inhalt der Quelle
Annotation:
Objective: The use of smartphones has exponentially increased over the past decade. Nowadays the use of a cellphone has not just been restricted to make calls, but it's also actively used to connect people throughout the globe through social media and sharing multimedia files over the internet. Smartphones have made these things possible and easily available with just a single touch. But along with this development and digitalization, an increase in the rate of cybercrime has also surfaced, which includes crime like illicit possession, distribution, and modification of multimedia files. Hence, smartphones are seen as a rich source of evidence-based on the crimes discussed. This process is carried out to analyze smartphone‟s multimedia files to determine their origin and to verify if the multimedia files originated from the same device or transferred through any process. Methods: An examiner must analyze, recover, and authenticate the files stored in a smartphone device. Android version 9 was used for analysis since it is the most common and abundant platform generally found in most people‟s phones. Examination of computer file is achieved by analyzing the file in hexadecimal editor software, the software used in this analysis is HxD. Results: File signature and metadata analysis of smartphones‟ multimedia files was performed to render the source of the files. Conclusion: The conducted file signature and metadata analysis clearly stated that by using hexadecimal editor softwareHxD origin and source of smartphones‟ multimedia file can be rendered.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Gui, Chengcheng, und Jian Wang. „Silicon-organic hybrid slot waveguide based three-input multicasted optical hexadecimal addition/subtraction“. Scientific Reports 4, Nr. 1 (15.12.2014). http://dx.doi.org/10.1038/srep07491.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Duke, SO, und NJ Obidunnu. „The Inverted-Triangle Technique Of Converting The Computer Number Systems (Binary, Octal And Hexadecimal) To Decimal“. Global Journal of Pure and Applied Sciences 15, Nr. 2 (26.08.2009). http://dx.doi.org/10.4314/gjpas.v15i2.45392.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Pella, Stephanie Imelda, und Hendro FJ L. „DISAIN SISTEM OTOMASI SUHU RUANGAN PERTEMUAN DENGAN PENERAPAN TEKNIK MACHINE LEARNING“. Jurnal Media Elektro, 30.10.2019, 117–20. http://dx.doi.org/10.35508/jme.v0i0.1781.

Der volle Inhalt der Quelle
Annotation:
This research presents an automation process of controlling room temperature based on the number of people detected in a room. The system consists of a single board raspberry pi computer, esp8266 micro controller, pi camera, and an infrared module. This research is divided into two parts, namely object detection using Raspbery Pi and Tensorflow and Open CV libraries and controlling air cooling system (ACS) using esp8266 and infrared modules by transmitting hexadecimal AC control codes. The ACS temperature is divided into four levels with a minimum value at 18o C and a maximum at 24o C. System testings were carried out in an empty room and a room with a capacity of 50 people that is fully occupied. The results show that the system is able to detect the number of people in the room and control the ACS, but under certain conditions some objects are not detected because the position and camera tilt is not optimal.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie