نتایج جستجو برای: تجزیهی qr
تعداد نتایج: 4608 فیلتر نتایج به سال:
We investigated the relative contribution of the queen and workers to colony nestmate recognition cues and on colony insularity in the Carpenter ant Camponotus fellah. Workers were either individually isolated, preventing contact with both queen and workers (colonial deprived, CD), kept in queenless groups, allowing only worker-worker interactions (queen deprived, QD) or in queenright (QR) grou...
A general algorithm for decoding the binary systematic quadratic residue (QR) codes with lookup tables is presented in this study. The algorithm can be applied in decoding the QR codes with either reducible or irreducible generator polynomials. If the generator polynomial of the QR codes is reducible, the number of elements in the Galois field is less than the sum of all correctable error patte...
Distributed software transactional memory (D-STM) promises to alleviate difficulties with lock-based (distributed) synchronization and object performance bottlenecks in distributed systems. Past single copy data-flow (SC) D-STM proposals keeps only one writable copy of each object in the system and are not fault-tolerant in the presence of network node/link failures in large-scale distributed s...
In this paper the author present a new technique of using QR Codes (commonly known as ‘Quick Respond Codes’) in the field of Cryptography. QR Codes are mainly used to convey or store messages because they have higher or large storage capacity than any other normal conventional ‘barcodes’. In this paper the primary focus will be on storing messages in encrypted format with a password and send it...
Introduction Conclusions References Tables Figures Back Close Full Screen / Esc Abstract Introduction Conclusions References Tables Figures Back Close Full Screen / Esc Abstract This study further develops the method of quantile regression (QR) to predict exceedance probabilities of flood stages by post-processing forecasts. Using data from the 82 river gages, for which the National Weather Ser...
The security analysis of existing QR (Quick Response) code scanners on Android was conducted recently and the result shows that most of those QR code scanners were not able to detect attacks exploiting malicious URLs embedded in QR codes, especially phishing and malware attacks. In our previous study, we proposed a QR code scanner solution called SafeQR that utilized two well-known security API...
Using the continuum model, we investigate electronic properties of two types bilayer graphene (BLG) quantum ring (QR) geometries: (i) An isolated BLG QR and (ii) a monolayer (MLG) with put on top an infinite sheet (hybrid QR). Solving Dirac-Weyl equation in presence perpendicular magnetic field applying mass boundary condition at boundaries, obtain analytical results for energy levels correspon...
The leverage scores of a full-column rank matrix A are the squared row norms of any orthonormal basis for range (A). We show that corresponding leverage scores of two matrices A and A + ΔA are close in the relative sense if they have large magnitude and if all principal angles between the column spaces of A and A+ΔA are small. We also show three classes of bounds that are based on perturbation ...
This paper introduces a new framework for constructing the Discrete Empirical Interpolation Method (DEIM) projection operator. The interpolation node selection procedure is formulated using the QR factorization with column pivoting, and it enjoys a sharper error bound for the DEIM projection error. Furthermore, for a subspace U given as the range of an orthonormal U, the DEIM projection does no...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید