共查询到20条相似文献,搜索用时 121 毫秒
1.
介绍了中文编码同Java的关系。根据Java程序的运行原理,分析了Java单机程序、在服务器上运行的JSP、Servelets或EJB等与分布式Java程序产生中文乱码的原因,提出了相应的解决方案。 相似文献
2.
3.
4.
JSP和Servlet网络编程设计中汉字编码的研究 总被引:1,自引:0,他引:1
JSP和Servlet是基于Java语言的跨平台Web开发工具,在进行网络编程设计中,人们常碰见中文字符编码处理等问题。本文通过介绍字符集编码相关理论。并分析JSP和Servlet运行各阶段字符的编码形式,提出解决中文字符编码转换问题的方法。 相似文献
5.
JSP程序在运行过程中经常会出现中文乱码现象。解决这个问题涉及到字符编码知识、Java语言中字符编码转换、JSP程序处理过程等。本文详细探讨了这些技术问题,并提出了JSP中文乱码的解决方法,以及JSP页面的中文编码和传输策略。 相似文献
6.
一种基于词编码的中文文档格式 总被引:1,自引:0,他引:1
分析了汉语自动分词问题产生的根源和面临的困难,针对性地提出了一种基于词的中文编码方法和中文文档新格式,实现了以词作为中文文本的最小信息载体,使中文文本分析可以在词平台上实现,避免了自动分词对中文信息处理带来的障碍.基于中文词的编码方法,以每个词作为一个单位,对词进行编码.此方法避开了中文的自动分词问题,特别是解决了歧义切分的难题,并提出了一种利用文档格式解决未登录词问题的新思路.采用统计分析方法对词平台基础上的关键词自动抽取进行了实验研究,取得良好效果. 相似文献
7.
JSP中文问题分析及解决方案 总被引:6,自引:0,他引:6
JSP是以Java为主的跨平台Web语言开发工具。Java的中文问题的中文问题的产生与Web服务器、浏览器、运行环境和开发工具有关。本文从汉字的字符集编码入手,分析了引起JSP中文问题的原因,并提出了解决问题的方案。 相似文献
8.
9.
Java网络传输中字符编码问题的研究 总被引:4,自引:0,他引:4
针对Java客户端与服务器端通信,客户端浏览器显示等中文字符编码常常出现编解码错误、显示乱码的问题,从操作系统内部,Java虚拟机和网络传输过程进行研究,分析各种字符编码的表现形式,服务器端Servlet缺省字符集等,找出了问题的根源;提出在Java网络传输中中文字符编码问题的解决方法,并有效地应用于农业专家系统开发平台(DET6.0)的网络发布和知识推理中。 相似文献
10.
11.
Shan He Min Wu 《Information Forensics and Security, IEEE Transactions on》2006,1(2):231-247
Digital fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. The collusion attack is a powerful attack where several different fingerprinted copies of the same content are combined together to attenuate or even remove the fingerprints. One major category of collusion-resistant fingerprinting employs an explicit step of coding. Most existing works on coded fingerprinting mainly focus on the code-level issues and treat the embedding issues through abstract assumptions without examining the overall performance. In this paper, we jointly consider the coding and embedding issues for coded fingerprinting systems and examine their performance in terms of collusion resistance, detection computational complexity, and distribution efficiency. Our studies show that coded fingerprinting has efficient detection but rather low collusion resistance. Taking advantage of joint coding and embedding, we propose a permuted subsegment embedding technique and a group-based joint coding and embedding technique to improve the collusion resistance of coded fingerprinting while maintaining its efficient detection. Experimental results show that the number of colluders that the proposed methods can resist is more than three times as many as that of the conventional coded fingerprinting approaches. 相似文献
12.
自适应算术编码是一种高效的熵编码方法。本文较为详细地介绍了自适应算术编码的工作原理和实现方法,以及在JPEG2000的应用情况,分析了自适应算术编码应用于图像压缩编码的实现过程,并讨论了实现过程中应该解决的若干技术问题。 相似文献
13.
现有基于深度学习的哈希图像检索方法通常使用全连接作为哈希编码层,并行输出每一位哈希编码,这种方法将哈希编码都视为图像的信息编码,忽略了编码过程中哈希码各个比特位之间的关联性与整段编码的冗余性,导致网络编码性能受限.因此,本文基于编码校验的原理,提出了串行哈希编码的深度哈希方法——串行哈希编码网络(serial hashing network, SHNet).与传统的哈希编码方法不同, SHNet将哈希编码网络层结构设计为串行方式,在生成哈希码过程中对串行生成的前部分哈希编码进行校验,从而充分利用编码的关联性与冗余性生成信息量更为丰富、更加紧凑、判别力更强的哈希码.采用mAP作为检索性能评价标准,将本文所提方法与目前主流哈希方法进行比较,实验结果表明本文在不同哈希编码长度下的m AP值在3个数据集CIFAR-10、Image Net、NUS-WIDE上都优于目前主流深度哈希算法,证明了其有效性. 相似文献
14.
通过对MPEG-4的特点和VOP编码原理及其关键算法的研究,提出了实现形状信息编码、运动信息编码、纹理信息编码的方法,针对运动信息编码、纹理信息编码这两种编码方式给出了流程图并进行详细说明,提出了MPEG-4编码技术中两种新的编码——可伸缩编码和Sprite对象编码。 相似文献
15.
缩短分形块编码时间是进行分形图象压缩的关键问题之一。该文从邻域匹配、对比度因子的选取、预处理等方面提出了一些降低编码时间的方法。文章重点阐述了这些方法的原理和有关实现算法。实验结果表明,该文所提出的方法在提高编码速度上具有较好的效果。 相似文献
16.
With the rapid growth of Internet services, virtual world has witnessed an increasingly large number of online users who have a variety of needs such as accessing various websites to gather information, easing business transactions, and sharing updates. As a result, information security has become a major concern among online users, and the verification of access codes is now the main practice used to keep information systems safe. However, some issues arise as the result of coding and managing behavior, and this research seeks to address these issues. After following the Focus Group method and interviewing 13 college students, this research finds that forgetting the access code is one of the biggest challenges to most online users simply because of the longer duration and the time when the users have a need to access the websites again, their memory will eclipse. In addition, online users usually develop self-constructed rules to cope with elusive code. These rules include: creating some sets of code that may not be meaningful to outsiders; taking different degrees of complex measures to register authentication codes, dependent upon the importance of the websites to the online users; writing the authentication codes on a scratchpad and sticking it on the computer screen; and keeping the codes in a notebook or computer file. The above practices nevertheless run the risk of being usurped by hackers, and it is found that hacking frequently takes place among closest friends, as they are quite familiar with the coding behavior of the victims. While assisting coding management does not help in this regard, as it is generally too expensive, online users troubled by the forgetting of access codes often end up with re-applying for a new set of authentication codes after unsuccessfully trying to login. All these self-constructed rules, nevertheless, constitute threat to information security. The research, in conclusion, calls for an education campaign to promote healthy coding behavior and effective coding management. The obtained findings provide valuable references for both academicians and practitioners to understand the online users’ coding behaviors and to effectively manage them accordingly to improve the resulting information security. 相似文献
17.
18.
19.
20.
The problems of efficient data storage and data retrieval are important issues in the design of image database systems. A data structure called a 2-D string, which represents symbolic pictures preserving spatial knowledge, was proposed by Chang et al. It allows a natural way to construct iconic indexes for pictures. We proposed a data structure 2-D B-string to characterize the spatial knowledge embedded in images. It is powerful enough to describe images with partly overlapping or completely overlapping objects without the need of partitioning objects. When there exist a large volume of complex images in the image database, the processing time for image retrieval is tremendous. It is essential to develop efficient access methods for retrieval. In this paper, access methods, to different extents of precision, for retrieval of desired images encoded in 2-D B-strings are proposed. The signature file acting as a spatial filter of image database is based on disjoint coding and superimposed coding techniques. It provides an efficient way to retrieve images in image databases. 相似文献