Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,733,938 papers from all fields of science
Search
Sign In
Create Free Account
Scancode
Known as:
Keycode lookup
, Scan codes
, Scancodes
Expand
A scancode (or scan code) is the data that most computer keyboards send to a computer to report which keys have been pressed. A number, or sequence…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Backward compatibility
Byte
Computer
Computer hardware
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Enhanced Biometric Based Attendance Module Interfaced with POS for an Academic Institution
O. Shoewu
,
L. Akinyemi
IEEE AFRICON
2019
Corpus ID: 220465683
This paper presents developed attendance register module for a smart campus. A convenient test on four courses was carried out on…
Expand
2017
2017
PLC CONTROL SYSTEM FOR VACUUM AND 20 kW RF AMPLIFER
H. Kim
,
Jongchul Lee
,
M. Ghergherehchi
,
Sangchul Mun
,
H. Namgoong
,
J. Chai
2017
Corpus ID: 44186139
Since 2015, the Sungkyunkwan University has been upgrade 10 MeV cyclotron (SKKUCY-10) prototype for producing radio isotopes. For…
Expand
2016
2016
The 'E' in QWERTY: Musical Expression with Old Computer Interfaces
C. Nash
New Interfaces for Musical Expression
2016
Corpus ID: 16887072
This paper presents a development of the ubiquitous computer keyboard to capture velocity and other continuous musical properties…
Expand
2015
2015
Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network
Y. Patil
2015
Corpus ID: 43026605
Steganography is method of data hiding behind multimedia file such as text, image, audio and video. For enhancing the security of…
Expand
2015
2015
JIID: Java input injection detector for pre-deployment vulnerability detection
Manoj K. Jawalkar
,
Parag S. Gokhale
,
A. Dixit
IEEE International Conference on Research in…
2015
Corpus ID: 13841571
Most common approach to detect security vulnerabilities is to scan code using vulnerability scanning software. This is either…
Expand
2015
2015
한국 표준 컴퓨터자판의 왼빗금 문제와 개선
Kuk-Tae Kim
2015
Corpus ID: 75008678
Objective: The arrangement of characters on Korean computer keyboard has a problem of the reverse solidus. The keyboard assigned…
Expand
2014
2014
Scan code to provide a method and apparatus result information
刘抒炎
2014
Corpus ID: 145928362
The present application discloses a method and means for providing code scan result information, a plurality of scan code…
Expand
2013
2013
Analysis on Status of Two-Dimensional Code Development & Prospects Prediction
X. Lu
,
M. Yu
,
Bin Huang
2013
Corpus ID: 61409040
With the rapid development of mobile Internet and rapid popularization of the smart phones, consumers attach increasing…
Expand
2012
2012
Dual laser scan code symbol reading system for automatically selecting laser light source present in the automatic object detector
W·H·黑文斯
,
S·科拉维托
,
C·艾伦
,
R·布莱克
2012
Corpus ID: 67300174
Method and system for reading coded symbols, dual laser scanning bar code symbol reading system having a presence detection…
Expand
2006
2006
Mobile Robot Path Planning by Circular Scan Code and Circular Distance Transform Method
Gyusang Cho
,
J. Ryeu
2006
Corpus ID: 59916740
The circular scan code method that is used for a local planner is suggested to avoid obstacles on the unknown environment…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE