Journal articles on the topic 'Hexadecimalt'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hexadecimalt.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Geofandy, Karlo, Erlando Aubrey Nathaniel, and Halim Agung. "KOMPRESI FILE MENGGUNAKAN KONVERSI BINER HEXADECIMAL DAN ALGORITMA HUFFMAN ENCODING." Jurnal Ilmiah Teknologi Infomasi Terapan 5, no. 3 (November 29, 2019): 36–46. http://dx.doi.org/10.33197/jitter.vol5.iss3.2019.295.
Full textHowse, S., and R. J. Nowakowski. "Periodicity and arithmetic-periodicity in hexadecimal games." Theoretical Computer Science 313, no. 3 (February 2004): 463–72. http://dx.doi.org/10.1016/j.tcs.2003.08.013.
Full textNiemenmaa, Markku. "A check digit system for hexadecimal numbers." Applicable Algebra in Engineering, Communication and Computing 22, no. 2 (March 2011): 109–12. http://dx.doi.org/10.1007/s00200-011-0139-3.
Full textCox, Nicholas J. "Stata Tip 33: Sweet Sixteen: Hexadecimal Formats and Precision Problems." Stata Journal: Promoting communications on statistics and Stata 6, no. 2 (June 2006): 282–83. http://dx.doi.org/10.1177/1536867x0600600211.
Full textKuang, Xing Hong, Zhe Yi Yao, Zhi Yu Wang, Jia Min Zhou, Jing Li, Juan Hu, and Shi Ming Wang. "PC Transceiver Programming in GPRS Wireless Transmission Module." Advanced Materials Research 945-949 (June 2014): 2217–20. http://dx.doi.org/10.4028/www.scientific.net/amr.945-949.2217.
Full textSingh, Balkar. "Image Steganography Using DWT and Semi Hexadecimal Code Based on PSNR." International Journal of Emerging Research in Management and Technology 6, no. 8 (June 25, 2018): 230. http://dx.doi.org/10.23956/ijermt.v6i8.144.
Full textXiao, Zhen Jiu, Zheng Tao Jiang, Yong Bin Wang, and Hong Chen. "Improved RSA Algorithm and Application in Digital Signature." Applied Mechanics and Materials 713-715 (January 2015): 1741–45. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.1741.
Full textHe, Juan, and Shuai Kang. "Design of Vehicle Taillight Circuit with Mechanical Properties in Mechanical Engineering." Advanced Materials Research 648 (January 2013): 315–18. http://dx.doi.org/10.4028/www.scientific.net/amr.648.315.
Full textAl-Omoush, Ashraf, Norita Md Norwawi, and Ahmad Akmalludin Mazlan. "Handling Words Duplication and Memory Management for Digital Quran Based on Hexadecimal Representation and Sparse Matrix." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 481. http://dx.doi.org/10.14419/ijet.v7i4.15.25760.
Full textWang, Jian, Jeng-Yuan Yang, Xiaoxia Wu, and Alan E. Willner. "Optical Hexadecimal Coding/Decoding Using 16-QAM Signal and FWM in HNLFs." Journal of Lightwave Technology 30, no. 17 (September 2012): 2890–900. http://dx.doi.org/10.1109/jlt.2012.2202371.
Full textSilalahi, Lisnayani, and Anita Sindar. "Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 3, no. 2 (October 21, 2020): 182–86. http://dx.doi.org/10.32672/jnkti.v3i2.2413.
Full textTuncer, Turker, Sengul Dogan, Paweł Pławiak, and U. Rajendra Acharya. "Automated arrhythmia detection using novel hexadecimal local pattern and multilevel wavelet transform with ECG signals." Knowledge-Based Systems 186 (December 2019): 104923. http://dx.doi.org/10.1016/j.knosys.2019.104923.
Full textAbd Elrahim, Noaman Abd Elnour. "Microcontroller based kit design for Octal to Hexadecimal system Conversion without returning to another system." IOSR Journal of Engineering 04, no. 12 (December 2014): 52–057. http://dx.doi.org/10.9790/3021-04124052057.
Full textJeyabharathi, D., and Dejey. "New feature descriptor: Extended Symmetrical-Diagonal Hexadecimal Pattern for efficient background subtraction and object tracking." Computers & Electrical Engineering 66 (February 2018): 454–73. http://dx.doi.org/10.1016/j.compeleceng.2017.11.001.
Full textJeyabharathi, D., and Dr D. Dejey. "Vehicle Tracking and Speed Measurement system (VTSM) based on novel feature descriptor: Diagonal Hexadecimal Pattern (DHP)." Journal of Visual Communication and Image Representation 40 (October 2016): 816–30. http://dx.doi.org/10.1016/j.jvcir.2016.08.011.
Full textGarg, Hinam, and Mohit Garg. "Analysing The Quality Attributes of AOP using CYVIS Tool." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (November 30, 2005): 648–53. http://dx.doi.org/10.24297/ijct.v4i2c2.4195.
Full textHuang, Wan Fu. "Designing a Four-by-Four Keypad Arbitrary-Key-Entry Detector." Applied Mechanics and Materials 433-435 (October 2013): 887–94. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.887.
Full textTakahashi, Daisuke. "Computation of the 100 quadrillionth hexadecimal digit of π on a cluster of Intel Xeon Phi processors." Parallel Computing 75 (July 2018): 1–10. http://dx.doi.org/10.1016/j.parco.2018.02.002.
Full textKim, Hyunki, Juhong Han, Chanil Park, and Okyeon Yi. "Analysis of Vulnerabilities That Can Occur When Generating One-Time Password." Applied Sciences 10, no. 8 (April 24, 2020): 2961. http://dx.doi.org/10.3390/app10082961.
Full textH. Sulaiman, A., I. F.T. Al-Shaikhli, M. R. Wahiddin, S. Houri, N. Jamil, and A. F. Ismail. "A novel secret key generation based on image link." International Journal of Engineering & Technology 7, no. 2.5 (March 10, 2018): 23. http://dx.doi.org/10.14419/ijet.v7i2.5.10048.
Full textPuškár, Michal, Peter Bigoš, Michal Kelemen, Roman Tonhajzer, and Martin Šima. "Measuring method for feedback provision during development of fuel map in hexadecimal format for high-speed racing engines." Measurement 50 (April 2014): 203–12. http://dx.doi.org/10.1016/j.measurement.2014.01.005.
Full text‘Afizi Bin Mohd Shukran, Mohd. "Pixel Value Graphical Password Scheme: Fake <i>Passpix</i> Attempt on Hexadecimal Password Style." International Journal of Information and Communication Sciences 3, no. 3 (2018): 104. http://dx.doi.org/10.11648/j.ijics.20180303.14.
Full textDogan, Sengul, Erhan Akbal, and Turker Tuncer. "A novel ternary and signum kernelled linear hexadecimal pattern and hybrid feature selection based environmental sound classification method." Measurement 166 (December 2020): 108151. http://dx.doi.org/10.1016/j.measurement.2020.108151.
Full textPuškár, Michal, Melichar Kopas, and Dušan Puškár. "Development of Fuel Maps in Hexadecimal Format for Reduction of NOX Emissions and Application in Real HCCI Engine." Acta Mechanica Slovaca 22, no. 2 (June 15, 2018): 38–47. http://dx.doi.org/10.21496/ams.2018.016.
Full textKumar, Vivek, Sangram Ray, Mou Dasgupta, and Muhammad Khurram Khan. "A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography." Wireless Personal Communications 118, no. 4 (February 15, 2021): 3045–61. http://dx.doi.org/10.1007/s11277-021-08168-x.
Full textSowmya, G., G. Divya Jyothi, N. Shirisha, K. Navya, and B. Padmaja. "Iot Based Smart Door Lock System." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 223. http://dx.doi.org/10.14419/ijet.v7i3.6.14975.
Full textČelikovský, Sergej, and Volodymyr Lynnyk. "Message Embedded Chaotic Masking Synchronization Scheme Based on the Generalized Lorenz System and Its Security Analysis." International Journal of Bifurcation and Chaos 26, no. 08 (July 2016): 1650140. http://dx.doi.org/10.1142/s0218127416501406.
Full textRahardja, Untung, Achmad Nizar Hidayanto, Ninda Lutfiani, Dyah Ayu Febiani, and Qurotul Aini. "Immutability of Distributed Hash Model on Blockchain Node Storage." Scientific Journal of Informatics 8, no. 1 (May 10, 2021): 137–43. http://dx.doi.org/10.15294/sji.v8i1.29444.
Full textMéndez-Naranjo, Pablo, and Andrés Cisneros-Barahona. "Evaluación de la propuesta algorítmica criptográfica con la incorporación de la esteganografía en imágenes. // Evaluation of the cryptographic algorithmic proposal with the incorporation of steganography into images." Ciencia Unemi 10, no. 25 (February 26, 2018): 134. http://dx.doi.org/10.29076/issn.2528-7737vol10iss25.2017pp134-147p.
Full textVictor, Andy, and Taufan Maulana Putra. "PENERAPAN V.S.N HARDWARE KEY SCHEME DENGAN RSA CRYPTOSYSTEM UNTUK PENGAMANAN PERANGKAT LUNAK." Jurnal Rekayasa Sistem & Industri (JRSI) 2, no. 04 (October 19, 2015): 27. http://dx.doi.org/10.25124/jrsi.v2i04.48.
Full textButt, Khushbu Khalid, Guohui Li, Sajid Khan, and Sohaib Manzoor. "Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD." Entropy 22, no. 1 (January 16, 2020): 112. http://dx.doi.org/10.3390/e22010112.
Full textAranta, Arik, Fitri Bimantoro, and I. Putu Teguh Putrawan. "Penerapan Algoritma Rule Base dengan Pendekatan Hexadesimal pada Transliterasi Aksara Bima Menjadi Huruf Latin." Jurnal Teknologi Informasi, Komputer, dan Aplikasinya (JTIKA ) 2, no. 1 (March 31, 2020): 130–41. http://dx.doi.org/10.29303/jtika.v2i1.96.
Full textJebril, Akram, Aduwati Sali, Alyani Ismail, and Mohd Rasid. "Overcoming Limitations of LoRa Physical Layer in Image Transmission." Sensors 18, no. 10 (September 27, 2018): 3257. http://dx.doi.org/10.3390/s18103257.
Full textDermaku, Kastriot, Ardian Emini, Ilir Gashi, and Xhemshit Shala. "Financial and Legal Obligations that appear from Internet Traffic - Technology of Information and Communication Kosovo Case." International Journal of Management Excellence 12, no. 3 (April 30, 2019): 1841–44. http://dx.doi.org/10.17722/ijme.v12i3.1074.
Full textRizal, Randi, Ruuhwan Ruuhwan, and Septian Chandra. "Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts." Jurnal Informatika Universitas Pamulang 5, no. 3 (September 30, 2020): 364. http://dx.doi.org/10.32493/informatika.v5i3.6073.
Full textJoy, Jibin, and Dr S. Devaraju. "Secure Deduplication For Cloud Storage Using Memory Mapping Technique For Improving Performance And Security." Journal of University of Shanghai for Science and Technology 23, no. 09 (September 1, 2021): 1–13. http://dx.doi.org/10.51201/jusst/21/08498.
Full textSajati, Haruno, Dwi Nugrahenny, and Eko Cahyo Nugroho. "PERANCANGAN DAN ANALISA PERBANDINGAN ANTARA DELAY DAN THROUGHPUT PADA VIDEO STREAMING MENGGUNAKAN IPv4 DAN IPv6 TUNNELING." Conference SENATIK STT Adisutjipto Yogyakarta 1 (December 3, 2013): 55. http://dx.doi.org/10.28989/senatik.v1i0.50.
Full textMoncaleano Ospina, Ariel Ricardo, José De Jesús Paternina Anaya, and Elvis Eduardo Gaona García. "DISEÑO E IMPLEMENTACIÓN DE UN ANALIZADOR PARA EL PROTOCOLO AX.25." Redes de Ingeniería 4, no. 2 (December 30, 2013): 70. http://dx.doi.org/10.14483/2248762x.5925.
Full textYAMAGUCHI, Tomomi, Masahiro HIGUCHI, and Akishige YANO. "Development of Monitoring System of Machining Process by Using Frequency of Cutting/Machinery Sounds. 1st Report. Construction of the System to Cutting Tool Conditions by Expression of Hexadecimal Spectrum Pattern (HSP)." Transactions of the Japan Society of Mechanical Engineers Series C 68, no. 668 (2002): 1251–56. http://dx.doi.org/10.1299/kikaic.68.1251.
Full textShamsutdinova, T. M. "Application of the blockchain technology for digital diplomas: problems and prospects." Open Education 22, no. 6 (January 14, 2019): 51–58. http://dx.doi.org/10.21686/1818-4243-2018-6-51-58.
Full textPolotai, O., O. Belej, and N. Maltseva. "PHYSICAL CONTENT OF COMPUTER STEGANOGRAPHY." Bulletin of Lviv State University of Life Safety 23 (June 30, 2021): 27–32. http://dx.doi.org/10.32447/20784643.23.2021.04.
Full textDawahdeh, Ziad E., Shahrul N. Yaakob, and Ali Makki Sagheer. "Modified ElGamal Elliptic Curve Cryptosystem using Hexadecimal Representation." Indian Journal of Science and Technology 8, no. 15 (July 7, 2015). http://dx.doi.org/10.17485/ijst/2015/v8i15/64749.
Full textKarlova, A. V. "Some features of study of image files in hexadecimal format." Politechnical student journal, no. 36 (July 2019). http://dx.doi.org/10.18698/2541-8009-2019-7-501.
Full textSubasi, Abdulhamit, Sengul Dogan, and Turker Tuncer. "A novel automated tower graph based ECG signal classification method with hexadecimal local adaptive binary pattern and deep learning." Journal of Ambient Intelligence and Humanized Computing, June 17, 2021. http://dx.doi.org/10.1007/s12652-021-03324-4.
Full textMamani Ordoñez, Pedro Nicoyani, and Jenny Maribel Hancco Zaga. "Diseño e implementación de termohigrómetro basado en tecnología de Internet de las cosas para el almacenamiento y transporte de alimentos." Revista Cientifica I+D Aswan Science, December 22, 2020. http://dx.doi.org/10.51392/rcidas.v1i1.4.
Full textTrevisan, Maria do Carmo Barbosa, Gilse Morgental Falkembach, and Vanilde Bisognin. "UMA APLICAÇÂO MULTIMIDIA PARA O ENSINO E APRENDIZAGEM DE SISTEMAS DE NUMERAÇÃO." RENOTE 6, no. 2 (December 6, 2008). http://dx.doi.org/10.22456/1679-1916.14587.
Full textSourabh, Shshank, Diwakar Chauhan, Vinay Singh, and Monika Chauhan. "Analysis of digital data by file signature method on Android version 9." Recent Advances in Computer Science and Communications 13 (December 16, 2020). http://dx.doi.org/10.2174/2666255813666201216114643.
Full textGui, Chengcheng, and Jian Wang. "Silicon-organic hybrid slot waveguide based three-input multicasted optical hexadecimal addition/subtraction." Scientific Reports 4, no. 1 (December 15, 2014). http://dx.doi.org/10.1038/srep07491.
Full textDuke, SO, and NJ Obidunnu. "The Inverted-Triangle Technique Of Converting The Computer Number Systems (Binary, Octal And Hexadecimal) To Decimal." Global Journal of Pure and Applied Sciences 15, no. 2 (August 26, 2009). http://dx.doi.org/10.4314/gjpas.v15i2.45392.
Full textPella, Stephanie Imelda, and Hendro FJ L. "DISAIN SISTEM OTOMASI SUHU RUANGAN PERTEMUAN DENGAN PENERAPAN TEKNIK MACHINE LEARNING." Jurnal Media Elektro, October 30, 2019, 117–20. http://dx.doi.org/10.35508/jme.v0i0.1781.
Full text