نتایج جستجو برای: qr code

تعداد نتایج: 170760  

Journal: :SIAM J. Scientific Computing 2016
Zlatko Drmac Serkan Gugercin

This paper introduces a new framework for constructing the Discrete Empirical Interpolation Method (DEIM) projection operator. The interpolation node selection procedure is formulated using the QR factorization with column pivoting, and it enjoys a sharper error bound for the DEIM projection error. Furthermore, for a subspace U given as the range of an orthonormal U, the DEIM projection does no...

Journal: :IET Communications 2011
Yan-Haw Chen Trieu-Kien Truong

A general algorithm for decoding the binary systematic quadratic residue (QR) codes with lookup tables is presented in this study. The algorithm can be applied in decoding the QR codes with either reducible or irreducible generator polynomials. If the generator polynomial of the QR codes is reducible, the number of elements in the Galois field is less than the sum of all correctable error patte...

1992
G. W. Stewart

abstract Exponential windowing is a widely used technique for suppressing the eeects of old data as new data is added to a matrix. Speciically,

2014
André Haase Andreas Ueberschaer

Das Smartphone für die berufliche Ausbildung zu nutzen und dadurch die verschiedenen Lernorte zu vernetzen, war Ziel eines Comenius-Regio

2012
Yen-Ting Lin Ali Parlaktürk

W e consider a manufacturer serving two competing retailers that sell their products over a single selling season. The retailers place their regular orders before the season starts. In addition to this initial order, quick response (QR) provides a retailer with an additional replenishment opportunity after demand uncertainty is resolved. The manufacturer determines the unit price for QR repleni...

2004
George Nikandros

Railways, like a lot of industries are becoming increasingly reliant on programmable technology for safety. The development of railway technology is however largely driven through market forces and, given the complexity and cost of developing and certifying safety-related systems, rail industry suppliers tend to accede to the needs of their bigger customers. Consequently the in-built functional...

2016
Sandha M. Ganaga Durga

Data protection in outsourced data is challenging task in cloud computing. In cloud environment the critical data should be masked or encrypted. This paper suggests QR code , a two dimensional code with RSA based homomorphic Algorithm can be used for secure authentication between client and server at the time of storage and auditing .Which is authenticate the client with encrypted split file co...

2013
Shintaro Okazaki

This study examines the effectiveness of Quick Response (QR) code loyalty campaigns in two phases. In Study 1, qualitative perceptions of QR code are examined through key informant focus groups. Participants express their positive as well as negative opinions about the use of QR code. In Study 2, we examine the effectiveness of QR code loyalty campaigns in “winning back” inactive customers in t...

Journal: :CoRR 2017
Yu Qin Wanjiaman Li

The widespread use of mobile electronic devices increases the complexities of mobile security. This paper aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to desi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید