Explore chapters and articles related to this topic
Semantic Technologies as Enabler
Published in Sarika Jain, Understanding Semantics-Based Decision Support, 2021
The foundations of the semantic technologies stack are web technologies. We rely on all the technologies of the World Wide Web. Everything on the web (whether abstract or physical), from living through non-living to web pages, is uniquely identified by a string of characters called the Uniform Resource Identifier (URI). Unicode and URI sit on the very bottom of Figure 2.1 and form the base of semantic technologies. Unicode gives a computer number to every existing character of every written language. URI, the naming convention, has two specializations: Uniform Resource Locator (URL; a means of locating the resource on the network) and Uniform Resource Name (URN; a persistent, location-independent identifier of a resource). Every URL and every URN is a URI. A URI is sufficient to retrieve a complete description of the resource on the web. A machine can unambiguously fetch RDF data (which is machine understandable), and a human can get the HTML version (which is human understandable when displayed by a browser). The International Resource Identifier (IRI) is the international variant of the URI. As compared to URIs that use only the ASCII character set, IRIs use the ISO/Unicode universal character set [Berners-Lee et al. 2001, Shadbolt et al. 2006]. IRIs thus allow non-Latin characters like Arabic and Japanese.
Text in Multimedia
Published in Sreeparna Banerjee, Elements of Multimedia, 2019
Unicode provides a unique number for every character regardless of platform, program, or language. Significant cost savings over the use of a legacy character set can be achieved by incorporating Unicode into client-server or multi-tier platforms. Thus, a single software product can be targeted across multiple platforms, languages, and countries without re-engineering or corruption.
Data Types and Data Storage
Published in Julio Sanchez, Maria P. Canton, Microcontroller Programming, 2018
Julio Sanchez, Maria P. Canton
Unicode attempts to provide a consistent way of encoding multilingual text and thus make it possible to exchange text files internationally. The design of Unicode is based on the ASCII code, but goes beyond the Latin alphabet to which ASCII is limited. The Unicode Standard provides the capacity to encode all of the characters used for the written languages of the world. Like ASCII, Unicode assigns each character a unique numeric value and name. Unicode uses three encoding forms that use a common repertoire of characters. These forms allow encoding as many as a million characters.
Design of a novel chaotic neural network based encryption system for security applications
Published in Journal of the Chinese Institute of Engineers, 2021
All the input characters are encoded with UTF-8 to prevent loss or potential corruption of the input strings. The unicode input is converted by representing its codepoint in hexadecimal format. The decryption algorithm decodes the hexadecimal back to the unicode string. The network depicted in this paper achieves faster convergence within fewer epochs having a linear relationship with performance. The CNN defined in this paper is 8.4 times higher in throughput compared to results discussed in (Prasad, Tumu, and Bevi 2017). Higher throughput observed in our method is primarily due to the two-level architecture’s design. The cryptographic preprocessor works in parallel with the first level data processing. This results in preemptive CNN initialization which improves the time performance of the algorithm. The key initialization used in this paper is 73 times faster than the average of the initialization time caused by RCA, RC2, ECC, and BLOWFISH (Sethi et al. 2018). The key generation method described in (Sethi et al. 2018) involves the transmission and acknowledgment of global public elements needed for ECC whereas the key generation phase in this paper generates keys in less time as it is dependent only on parameters such as and . The architecture present in this paper implements parallel processing considering its superior time performance, unlike the other designs.