• No results found

Text Files

A New Scheme for Storage and Retrieval of Shared Text Files

A New Scheme for Storage and Retrieval of Shared Text Files

... storing files can slow down this ...replicated text files that have been changed by different users, ...document text, storing them instead of the whole document could decreases the whole ...

9

INVISIBLE WATERMARKING for TEXT FILES

INVISIBLE WATERMARKING for TEXT FILES

... Digital watermarking is a process of inserting copyright data in the main files. The data inserted is the watermark. This watermarking doesn’t give any mark on the original content and it has no effect on their ...

5

A Complexity Analysis and Entropy for Different Data Compression Algorithms on Text Files

A Complexity Analysis and Entropy for Different Data Compression Algorithms on Text Files

... different files of different sizes and then conclude that: LZW is the best one in all compression scales that we tested especially on the large files, then Huff- man, HFLC, and FLC, ...

15

Implementing Data Hiding Approach by Neural Network and Retrieval of Audio , Video and Text Files

Implementing Data Hiding Approach by Neural Network and Retrieval of Audio , Video and Text Files

... To calculate the simulation results, the four groups’ of Multimedia containers are prepared. Each group of suspect data with varying file format is combined to form a common set of Text, Audio, Video and Image ...

7

A novice approach for Transfering text files

A novice approach for Transfering text files

... In this hectic schedule people wants everything on time whether to reach somewhere or communication, for communication they use internet or mobile. Best source in internet to transfer data or text file is e-mail ...

6

Customizable Web Log Mining from Web Server Log

Customizable Web Log Mining from Web Server Log

... log files are text files that can range in size from 1KB to 100MB, depending on the traffic at a given a website ...log files are counting and ...

5

Is Knowledge Management Same as Information Resource Management?

Is Knowledge Management Same as Information Resource Management?

... Most important activity is effectively communicating the captured "knowledge." "Knowledge" here actually means information that is more easily transformed into knowledge by the recipient. Technologies ...

7

12864_2017_article_3573.pdf

12864_2017_article_3573.pdf

... The files of summary statistics generated by the four soft- ware packages have different ...one text file to provide score statistics, gene-based covariance matrices, and genotype information, includ- ing ...

8

690 11858 001 ACS8600 Utility Program Supplement Jul82 pdf

690 11858 001 ACS8600 Utility Program Supplement Jul82 pdf

... INTRODUCTION The file transfer programs described in this documentation are used to transfer ASCII text files or binary da ta files from an A1tos-8000 MP/M system to an A1tos-8600 XENIX [r] ...

7

PC to PC TRANSFER OF TEXT, IMAGES USING VLC

PC to PC TRANSFER OF TEXT, IMAGES USING VLC

... as text files from one PC to other ...and files as serial data using serial ...of text file from one PC to other PC is carried out with the Li-Fi technology using LEDs and photodiodes, with ...

7

SPIHT Based Compression Image Steganography Using LSB Encoding Method

SPIHT Based Compression Image Steganography Using LSB Encoding Method

... 1.Text steganography: It consists of hiding information inside the text files. In this method, the secret data is hidden behind every nth letter of every words of text message. Numbers of ...

7

Text Recognition from PDF Files using BPNN and SVM

Text Recognition from PDF Files using BPNN and SVM

... printed text into machine-encoded ...PDF files consist of text, images and ...segregates text and non-text region from the PDF files and the text part alone is ...

5

C NIX Version 1 56 Users Manual Jan85 pdf

C NIX Version 1 56 Users Manual Jan85 pdf

... Leave the C/NIX shell exit Concatenate text files OUtput text in parens Change to top-level directory Change to a new directory Change "lOOde" of files Symnym for chdir Copy a file Copy [r] ...

56

61017 RMS Quick Reference Guide 1982 pdf

61017 RMS Quick Reference Guide 1982 pdf

... The REFORMAT command allows the user to alter the format of RMS text files and to modify the structure of records within a text file.. is the output file to be created by REFORMAT..[r] ...

42

A Novel Data Embedding Technique for Hiding Text in Video File using Steganography

A Novel Data Embedding Technique for Hiding Text in Video File using Steganography

... that text should not be perceptible to the human eye which is a fundamental requirement for this ...secret text is written covered with ...But text gets revealed when heated files are not only ...

6

SM 030 0012 Point 4 IRIS R8 Business Basic Manual Feb84 pdf

SM 030 0012 Point 4 IRIS R8 Business Basic Manual Feb84 pdf

... DEFINITION OF TERMS ASSOCIATED WITH FILES INTRODUCTION TO IRIS DATA FILES DATA FILE ACCESS Overview of the File Handling Statements Records and Items for Contiguous and Text Files 2.3.3 [r] ...

218

Compressed Chatting Over Internet

Compressed Chatting Over Internet

... In all smart phones there are various applications (apps) which can be used for chatting, sharing images, audios, videos and communicate with each other. But the main disadvantage of these applications is they cannot be ...

5

IS WHATSAPP MESSAGING SUBSUMING CONVENTIONAL SMS?

IS WHATSAPP MESSAGING SUBSUMING CONVENTIONAL SMS?

... Furthermore, Haddon (2001) states that domestication deals with how ICTs have become integrated into peoples‟ daily lives or how ICT finds a place in people‟s life. Berkers cited in Ahad& Lim (2014) posit that ...

5

Plagiarism Detection using Sequential Pattern Mining

Plagiarism Detection using Sequential Pattern Mining

... plagiarized text set ...plagiarized text in CC of length i that exist in plagiarized text of length i + ...plagiarized text of length ...

6

Secure Data Sharing With Efficient Cloud Storage

Secure Data Sharing With Efficient Cloud Storage

... data files in the cloud by using CP-ABE under certain access ...data files, choose not to handle the complex process of decryption locally due to limited ...

6

Show all 10000 documents...

Related subjects