Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,812,140 papers from all fields of science
Search
Sign In
Create Free Account
Base64
Known as:
Radix64
, Modified Base64
, Radix-64
Expand
Base64 is a group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
8-bit clean
ASP.NET
Acid2
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Text encoding for deep learning neural networks: A reversible base 64 (Tetrasexagesimal) Integer Transformation (RIT64) alternative to one hot encoding with applications to Arabic morphology
Mohammed A El Affendi
,
K. H. S. A. Rajhi
2018
Corpus ID: 86855019
One Hot Encoding (OHE) is currently the norm in text encoding for deep learning neural models. The main problem with OHE is that…
Expand
2017
2017
Perbandingan Kriptografi RSA dengan Base64
Natalia Florida Ginting
,
Misalina Ginting
2017
Corpus ID: 198356597
Kriptografi mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi, seperti kerahasiaan data…
Expand
2016
2016
Multi Spatial Resolution for Image Spam Filtering
N. A. M. Ariff
,
A. Abdullah
,
M. F. Nasrudin
2016
Corpus ID: 64308726
Image spam filtering is a challenging task because spammers are constantly creating new tricks and making anti-spam filters…
Expand
2014
2014
Secure Wireless Sensor Network Updates Using OTAP And Performance of Symmetric Encryption Algorithms on Power Consumption
Mr. Charan R. Pote
,
Mr. Punesh U. Tembhare
,
Manoj G. Lade
2014
Corpus ID: 17695906
Wireless Sensor Networks (WSNs) face many challenges including reliability, flexibility and security. When WSNs deployed in…
Expand
2014
2014
The GeoHashTree: a multi-resolution data structure for the management of point clouds
N. Sabo
,
A. Beaulieu
,
D. Belanger
,
Y. Belzile
,
B. Piche
2014
Corpus ID: 21116042
Over a number of years, lidar has become one of the major elevation-data acquisition technologies. However, the management of…
Expand
2012
2012
Performance Evaluation of Cryptographic Algorithms
Mohit Mittal
2012
Corpus ID: 61569384
In this paper, we compare the various cryptographic algorithms. On the basis of parameter taken as time various cryptographic…
Expand
2010
2010
SMTP E-Mail Access Method: Hints, Tips, and Tricks
C. Hunley
2010
Corpus ID: 62019249
How do I specify multiple SMTP servers? What about authentication? Isn’t this message important? How do I play a trick on a…
Expand
2009
2009
RSA encryption and decryption using the redundant number system on the FPGA
K. Nakano
,
Kensuke Kawakami
,
K. Shigemoto
IEEE International Symposium on Parallel…
2009
Corpus ID: 18356638
The main contribution of this paper is to present efficient hardware algorithms for the modulo exponentiation PE mod M used in…
Expand
2008
2008
PID controller design using double helix structured DNA algorithms with a recovery function
Jeong-Jung Kim
,
Jujang Lee
Artificial Life and Robotics
2008
Corpus ID: 19902849
PID controllers have been widely used in industrial fields. Since the PID parameters have a great influence on the stability and…
Expand
2002
2002
A Compact Radix-64 54 54 CMOS Redundant Binary Parallel Multiplier
Sanghoon Lee
,
Seung-Jun Bae
,
Hong-June Park
2002
Corpus ID: 106517032
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE