Search

Your search keyword '"ASCII"' showing total 2,095 results

Search Constraints

Start Over You searched for: Descriptor "ASCII" Remove constraint Descriptor: "ASCII"
2,095 results on '"ASCII"'

Search Results

1. Pengamanan Data Berbasis Hill Cipher dengan Operasi Modulo pada Karakter ASCII.

2. Creating and Developing a High-Throughput Covert Channel via Program Execution

4. Novel secure data protection scheme using Martino homomorphic encryption

5. Secure Optical Image Encryption and Data Hiding Technique in Compression Domain Using Dual Key-Based Bit Swapping

6. Validation Technique for Zero-Knowledge-Based Transactions of Blockchain Digital Assets Using ASCII Computation Technique

7. Novel secure data protection scheme using Martino homomorphic encryption.

8. Pattern Matching Compression Algorithm for DNA Sequences

9. Employment of Cryptographic Modus Operandi Based on Trigonometric Algorithm and Resistor Color Code

12. Block cipher construction using minimum spanning tree from graph theory and its application with image encryption.

15. Effective and Efficient Digital Advertisement Algorithms

16. Experiencias del Hash en la vida informática

18. An ASCII based effective and multi-operation image encryption method.

19. Implementation Drilling with Casing ROP Optimization with Multi Regression Mathematical Model in KHALDA co. Fields in the Western Desert, Egypt.

21. Text hiding in an image using least significant bit and ant colony optimization

23. A symmetric-based framework for securing cloud data at rest.

24. A novel quantum steganography scheme based on ASCII.

25. Using mono chrome image in secure data transfer based on book cipher

26. A Novel Intelligent AI-based Security to Enhance the Data Communication

27. E-ART: A New Encryption Algorithm Based on the Reflection of Binary Search Tree

28. A new high capacity and secure image realization steganography based on ASCII code matching

29. TECHNICAL METHODS AND ALGORITHMS FOR DEVELOPING EFFICIENT OPTICAL CHARACTER RECOGNITION SYSTEM:: AN OVERVIEW.

30. Use of GPS at research of roads & a vehicle

31. Playfair with Multi Strata Encryption

32. Steganography Technique and Modification of Substitution Cipher Using ASCII Code and Fibonacci Sequences

33. Text Encryption Method Using multi Hyper-chaotic systems

34. Hexagonal Grid Numbering

35. Desenvolupament d'una aplicació basada en Arduino per a la monitorització i registre de les dades de producció energètica d'una instal·lació solar fotovoltaica

36. A New Proposed Coding Method for Steganography Purpose

37. Steganographic Methods Resistant to JPEG Compression

38. Desenvolupament d'una aplicació basada en Arduino per a la monitorització i registre de les dades de producció energètica d'una instal·lació solar fotovoltaica

39. The Use of ASCII Graphics in Roguelikes.

40. A corpus-based approach in archaeolinguistics

41. Deep Learning-Based Automated Lip-Reading: A Survey

42. Increasing data storage of coloured QR code using compress, multiplexing and multilayered technique

43. DEVELOPMENT OF A POSTPROCESSOR FOR TURNING CENTER AND MULTI-TASK MACHINE WITH MULTI-CHANNEL CNC SYSTEMS

44. A Novel Block Cipher Based on Randomly Shuffled Key Strings

45. Implementation of CAESAR CIPHER Cryptography Techniques for Android Based Information Data Security

46. Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers

47. Optical character recognition based on local invariant features

48. Ancient text recognition: a review

49. QR-Code Generator Based on FPGA

Catalog

Books, media, physical & digital resources