Academic literature on the topic 'Metoda QR'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Metoda QR.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Metoda QR"

1

Cyburt, Agnieszka, and Agnieszka Gałecka. "Metoda wskaźnikowa w ocenie płynności finansowej jednostek samorządu terytorialnego na przykładzie gmin województwa lubelskiego." Zeszyty Naukowe SGGW, Polityki Europejskie, Finanse i Marketing, no. 21(70) (June 28, 2019): 33–41. http://dx.doi.org/10.22630/pefim.2019.21.70.3.

Full text
Abstract:
Celem opracowania było zwrócenie uwagi na zastosowanie metody wskaźnikowej w ocenie płynności finansowej jednostek samorządu terytorialnego na przykładzie gmin województwa lubelskiego. W artykule podkreślono potrzebę i metody dokonywania analizy płynności finansowej w jednostkach samorządu terytorialnego. Do oceny poziomu płynności finansowej JST wykorzystano wskaźniki płynności podstawowej (CR), szybkiej (QR), w ujęciu kasowym i w ujęciu memoriałowym. Badaniami objęto gminy województwa lubelskiego. Okres badań obejmował lata 2012-2016. Na podstawie przeprowadzonych analiz stwierdzono, iż gminy województwa lubelskiego w badanym okresie posiadały wystarczające środki na pokrycie niezbędnych wydatków i rozchodów zarówno na koniec, jak i trakcie roku budżetowego.
APA, Harvard, Vancouver, ISO, and other styles
2

Panjaitan, Indrafani J., and Tony Tony. "PERANCANGAN APLIKASI PENYISIPAN CITRA BERWARNA PADA QR CODE DENGAN METODE HALFTONE." Jurnal Ilmu Komputer dan Sistem Informasi 5, no. 1 (August 25, 2017): 35. http://dx.doi.org/10.24912/jiksi.v5i1.771.

Full text
Abstract:
The project is made in the form of a software application that accepts input color image to be processed into Halftone QR-Code. Halftone QR-Code is a composite image of the QR-Code and halftone image that can be recognized by QR-Code Scanner. QR-Code image generated using the Library Massagingtoolkit-QRCode with alphanumeric text input degan various versions QR-Code in accordance with a lot of character input. The input image is processed into a halftone image with methods Ordered Dithering variation dither matrix 4 x 4 and 8 x 8. The image of the QR-Code and halftone images will be processed into QR-Code Halftone Pattern Assignment method. Output generated by the application Halftone QR-Code tested with QR-Code ZXing Library and QRAFTER application on Iphone 6s Plus and QR. The average rate of overall success with the test scenario ZXing QR-Code Library by 94%. The average rate of overall success with the test scenario QRAFTER application on Iphone 6s Plus from the laptop screen and hardcopy respectively by 100%.
APA, Harvard, Vancouver, ISO, and other styles
3

Riansah, Wahyu. "Aplikasi QR Code Generator Dan QR Code Reader Menggunakan Metode Stroke Histogram." J-SISKO TECH (Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD) 4, no. 1 (February 4, 2021): 38. http://dx.doi.org/10.53513/jsk.v4i1.2610.

Full text
Abstract:
Quick Response Code (QR Code) is a two-dimensional image that has the ability to store data. QR Code is commonly used to store data in the form of text, be it numeric, alphanumeric, or binary code. QR Code is widely used for commercial purposes, especially in Japan, usually contains a url link to a specific address or simply text containing advertisements, promotions, and others. One of the things that is not commonly used in QR codes is inserting images into the information it stores. This can increase readers' appeal, especially for advertising, posters, and other commercial matters.This research conducted a study on the possibility of making a QR Code from text input data. Therefore an analysis is carried out on how to make the image the content of the information contained in the QR Code. The solution offered is to convert the text into another representation that can be understood by the QR Code generator and QR Code reader. Previously, the text file was converted into binary.This research also generates QR Code Generator and QR Code Reader, where the input data is in the form of text, then tested to be applied in the real world. The software implementation is done using PHP with MySQL database.
APA, Harvard, Vancouver, ISO, and other styles
4

Nugroho, Satria Adi, Arip Solehudin, and Didi Juardi. "Asset Management Menggunakan QR Code dengan Metode QR Code Generator (Studi Kasus : Badan Narkotika Nasional Karawang)." Jurnal Ilmiah Informatika 6, no. 1 (June 30, 2021): 20–32. http://dx.doi.org/10.35316/jimi.v6i1.1239.

Full text
Abstract:
The problem that occurs at the Karawang National Narcotics Agency (BNNK) is that there is no information regarding existing asset data, both from the name of the item, year of acquisition, item code, and item serial number. Therefore, the author will create a QR code that contains information about the items in BNNK so that it can be easily accessed and information about these items can be known and can make it easier for employees there when the Ministry of Finance will audit the items related to assets at the BNNK office. Therefore, this study proposes a research related to asset management using a QR code for items at BNNK. The method used in making this QR code is using the QR generator method to simplify the process of making QR codes and making designs for QR codes that will made. For testing the QR code we use beta testing so that we can know in advance the performance and output generated by the QR code. This study produces a QR code that is in accordance with the request of related parties and makes it easier for employees in the goods section to find out data about assets owned by BNNK and help BNNK to carry out asset management on items in the office.
APA, Harvard, Vancouver, ISO, and other styles
5

Ray, Danry, Dodick Zulaimi Sudirman, and Yunita Riris Widawaty. "Rancang Bangun Aplikasi Berbagi Berbasis Lokasi Menggunakan Quick Response Code dan Metode Geolocation." Jurnal ULTIMATICS 6, no. 2 (December 1, 2014): 57–62. http://dx.doi.org/10.31937/ti.v6i2.337.

Full text
Abstract:
As more sophisticated the technology, it will give a harder challenge for the libraries to fulfill their patrons requirement. For the sake of a great technology experience, library of Universitas Multimedia Nusantara is trying to adopt QR Code technology and geolocation method into it’s system. User who has a QR Code to be scanned will share their activities, such as read and borrow. Users can also do a check-in if they do not want to scan a QR Code. After dealing with QR Code, the application will provide users with the location where a QR Code was scanned. A variety of a scan distance will impact to the variety of the point or reward those users can achieve. There are also several things to be done that could enhanced the accuracy of the location finder, like comparing the result between GPS provider and Network provider based on certain variable (time and accuracy) and displaying both the results to the user so they can choose their own preference because of some factors that could cause an inconsistency while finding location is executed like mobile signal, amount of cell tower, and location of user. Index Terms - QR Code, geolocation, sharing system, library of Universitas Multimedia Nusantara
APA, Harvard, Vancouver, ISO, and other styles
6

Manurung, Evelyn Angelita pinondang, and Eka Ayu Purnama Lestari. "KAJIAN PERLINDUNGAN E-PAYMENT BERBASIS QR-CODE DALAM E-COMMERCE." Jurnal Penelitian dan Pengembangan Sains dan Humaniora 4, no. 1 (April 21, 2020): 28. http://dx.doi.org/10.23887/jppsh.v4i1.24323.

Full text
Abstract:
Pesatnya perkembangan industri digital saat ini memberikan pengaruh besar pada kemajuan terhadap industri global di Indonesia. Tentu banyak pihak yang terlibat dalam industri digital tersebut. Manfaat internet saat ini dirasakan hampir di setiap segmen aktifitas manusia. Salah satu aktifitas bisnis masyarakat yang berkembang saat ini adalah perdagangan online, atau populer disebut dengan Electronic Commerce.Untuk mendukung aktifitas e-commerce diperlukan adanya suatu sistem pembayaran berbasis internet (internet payment system). Saat ini yang berkembang di beberapa Marketplace telah menggunakan metode/sistem QR-Code (Quick Response Code) sebagai metode pembayarannya. Metode tersebut terbukti efisien dalam efektifitas transaksi e-commerce. Namun muncul juga polemik dalam masyarakat mengenai metode QR-Code. Untuk melakukan pembayaran dengan metode QR-Code masyarakat harus melek teknologi dan mengerti tentang penerapan dan fungsinya. Saat ini masyarakat terlena dengan kemudahan yang ditawarkan perusahaan e-commerce dengan metode pembayaran QR-Code tanpa mengerti dan memahami keamanan/perlindungan hukum tentang metode QR-Code yang jelas.Dengan adanya suatu kajian tentang perlindungan terhadap sistem pembayaran elektronik berbasis QR-Code diharapkan konsumen e-commerce dan masyarakat Indonesia pada umumnya mengerti bagaimana penerapan metode pembayaran tersebut dan keamanan metode pembayaran tersebut dalam memberi perlindungan bagi konsumen e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
7

Ferdiansyah, Ferdiansyah, Asep Id Hadiana, and Fajri Rakhmat Umbara. "Penggunaan QR Code Berbasis Kriptografi Algoritma AES (Advanced Encryption Standard) Untuk Administrasi Rekam Medis." Journal of Information Technology 3, no. 2 (August 30, 2021): 20–27. http://dx.doi.org/10.47292/joint.v3i2.64.

Full text
Abstract:
Data Administrasi dalam kesehatan dapat mengandung beberapa informasi penting, seperti identitas pasien, dokter, bahkan fasilitas kesehatan. Kemanan data diperlukan untuk menjaga kerahasiaan dan mencegah pihak yang tidak berwenang menyalahgunakan data tersebut. Tujuan dari penelitian ini adalah untuk menjawab gap yang ada dengan Penggunaan QR Code mengamankan Kemudian QR Code tersebut dibagian Dokumen untuk Manajemen Administrasi. Pada penelitian ini, pesan data Informasi rahasia disematkan ke QR code berbasis Kriptografi dengan menggunakan Metode AES Advanced Encyrption Standard. QR code akan memperbaiki kesalahan yang dihasilkan prosedur penyematan rahasia ke dalam dokumen, kemudian QR code dapat memvalidasi untuk menampilkan data. Penulis melakukan pengujian dengan menggunakan metode brute force dan Pengujian AES untuk memastikan keamanan Aplikasi ini berjalan sebagaimana mestinya dalam mengamankan data tersebut. Hasil dari penelitian ini adalah QR code dapat mengamankan dokumen data Administrasi Rekam Medis dengan menggunakan metode AES. Dengan ini diharapkan dapat mengurangi potensi kebocoran data Administrasi Rekam Medis secara signifikan. Kesimpulan dari Penulis telah menyajikan pendekatan untuk mengamankan data menggunakan teknologi menyimpan yang digunakan untuk otentikasi saat melakukan request data administrasi. Penggunaan metode keamanan AES Advanced Encyrption Standard ini memberikan keuntungan dalam penggunaan yang mudah dan penggunaan sumber daya yang efisien
APA, Harvard, Vancouver, ISO, and other styles
8

Ferdiansyah, Ferdiansyah. "Penggunaan Qr Code Berbasis Kriptografi Advanced Encryption Standard (AES) untuk Administrasi Rekam Medis." Jurnal Health Sains 2, no. 10 (October 21, 2021): 1870–84. http://dx.doi.org/10.46799/jsa.v2i10.325.

Full text
Abstract:
Data Administrasi dalam kesehatan dapat mengandung beberapa informasi penting, seperti identitas pasien, dokter, bahkan fasilitas kesehatan. Kemanan data diperlukan untuk menjaga kerahasiaan dan mencegah pihak yang tidak berwenang menyalahgunakan data tersebut. Tujuan dari penelitian ini adalah untuk menjawab gap yang ada dengan Penggunaan QR Code mengamankan Kemudian QR Code tersebut dibagian Dokumen untuk Manajemen Administrasi. Pada penelitian ini, pesan data Informasi rahasia disematkan ke QR Code berbasis Kriptografi dengan menggunakan Metode Advanced Encyrption Standard. QR Code akan memperbaiki kesalahan yang dihasilkan prosedur penyematan rahasia ke dalam dokumen, kemudian QR Code dapat memvalidasi untuk menampilkan data. Penulis melakukan pengujian dengan menggunakan metode brute force dan Pengujian AES untuk memastikan keamanan Aplikasi ini berjalan sebagaimana mestinya dalam mengamankan data tersebut. Hasil dari penelitian ini adalah QR Code dapat mengamankan dokumen data Administrasi Rekam Medis dengan menggunakan metode AES. Dengan ini diharapkan dapat mengurangi potensi kebocoran data Administrasi Rekam Medis secara signifikan. Kesimpulan dari Penulis telah menyajikan pendekatan untuk mengamankan data menggunakan teknologi menyimpan yang digunakan untuk otentikasi saat melakukan request data administrasi. Penggunaan metode keamanan AES Advanced Encyrption Standard ini memberikan keuntungan dalam penggunaan yang mudah dan penggunaan sumber daya yang efisien
APA, Harvard, Vancouver, ISO, and other styles
9

Martawireja, Abdur Rahman Harits, Ridwan Ridwan, Angga Putra Hafidzin, and Muhammad Taufik. "Proteksi Keamanan Data pada Quick Response (QR) Code." Jurnal Teknologi dan Rekayasa Manufaktur 3, no. 2 (December 15, 2021): 99–110. http://dx.doi.org/10.48182/jtrm.v3i2.58.

Full text
Abstract:
Penggunaan Quick Response (QR) Code untuk berbagi ataupun menyimpan data semakin marak digunakan. Kode QR dapat dengan cepat memberikan informasi baik kontak, plain text, URL ataupun data lainnya hanya dengan memindai QR menggunakan kamera smartphone. Meningkatnya penggunaan kode QR harus diiringi juga dengan tingkat keamanan dalam proteksi data. Jurnal ini membahas beberapa metode yang dapat digunakan untuk meningkatkan keamanan data pada kode QR. Dalam ilmu komputer dan matematika dikenal beberapa istilah terkait proteksi pesan/data yaitu Kriptografi dan Steganografi. Kriptografi akan mengubah pesan menjadi sebuah ciphertext menggunakan algoritma enkripsi dan secret key. Sedangkan pada Steganografi, pesan akan disembunyikan pada sebuah objek. Dengan kedua proses tersebut baik kriptografi dan steganografi ataupun kombinasi dari keduanya maka pesan/data yang disematkan pada kode QR tidak akan mudah untuk diterjemahkan. Metode yang akan dibahas yaitu enkripsi Algoritma Speck dan Advance Encryption Standard (AES) dengan kombinasi Steganografi. Kedua metode tersebut berhasil mengubah informasi rahasia menjadi data yang tidak mudah dikenali. Informasi rahasia yang mengalami proses steganografi menjadi sulit dideteksi dan memberikan pesan yang salah kepada peretas.
APA, Harvard, Vancouver, ISO, and other styles
10

FAISAL, FAISAL, and MUHAMMAD AZMI FAUZAN ANAS. "PEMANFAATAN KODE QR PADA PENINGKATAN PELAYANAN DAN KEPUASAN PELANGGAN PADA RESTORAN." Jurnal INSTEK (Informatika Sains dan Teknologi) 5, no. 1 (March 24, 2020): 111. http://dx.doi.org/10.24252/instek.v5i1.14504.

Full text
Abstract:
Kode QR merupakan sebuah system yang menggunkan kode gambar dua deimensi yang juga berasal dari evolusi Barcode. Penggunaan kode QR sudah sangat lazim di berbagai negara. Hal ini dikarenakan kemampuannya menyimpan data yang lebih besat daripada barcode sehingga mampu mengkodekan informasi dalam berbagai macam Bahasa. Kode QR menggunakan suatu jenis kode matriks atau kode dalam bentuk dua dimensi yang dikembangkan oleh Denso Wave. Dalam penelitian ini, jenis penelitian yang digunakan adalah penelitian deskriptif kualitatif adapun metode kualitatif. Adapun metode perancangannya menggunakan unified modelling languange (UML). Analisis yang dilakukan mencakup analisis sistem yang berjalan dan analisis sistem yang diusulkan, Hasil penelitian ini berupa aplikasi berbasis android yang dapat memudahkan system pemesanan dan pelayanan pada restoran dengan menggunkan bantuan teknologi kode QR. Kata Kunci : QR code, Android, Reservasi
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Metoda QR"

1

Dorini, Fábio Antonio. "Método QR :." Florianópolis, SC, 2000. http://repositorio.ufsc.br/xmlui/handle/123456789/78519.

Full text
Abstract:
Dissertação (Mestrado) - Universidade Federal de Santa Catarina, Centro de Ciências Físicas e Matemáticas.
Made available in DSpace on 2012-10-17T15:28:58Z (GMT). No. of bitstreams: 0Bitstream added on 2014-09-25T19:17:26Z : No. of bitstreams: 1 170074.pdf: 1661870 bytes, checksum: 1fbfe9c10fdab7889a1cabd91a6a8d2b (MD5)
Estuda os fluxos de Toda generalizados caracterizados pela equação diferencial
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, David McCulloch. "Regression using QR decomposition methods." Thesis, University of Kent, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McDonald, Edward James. "An analysis of QR methods for computing Lyapunov exponents." Thesis, University of Strathclyde, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.248328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ren, Minzhen. "Cordic-based Givens QR decomposition for MIMO detectors." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50256.

Full text
Abstract:
The object of the thesis research is to realize a complex-valued QR decomposition (QRD) algorithm on FPGAs for MIMO communication systems. The challenge is to implement a QRD processor that efficiently utilizes hardware resources to meet throughput requirements in MIMO systems. By studying the basic QRD algorithm using Givens rotations and the CORDIC algorithm, the thesis develops a master-slave structure to more efficiently implement CORDIC-based Givens rotations compared to traditional methods. Based on the master-slave structure, an processing-element array architecture is proposed to further improve result precision and to achieve near-theoretical latency with parallelized normalization and rotations. The proposed architecture also demonstrates flexible scalability through implementations for different sizes of QRDs. The QRD implementations can process 7.41, 1.90 and 0.209 million matrices per second for two by two, four by four and eight by eight QRDs respectively. This study has built the foundation to develop QRD processors that can fulfill high throughput requirements for MIMO systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Hassanein, Mohamed Sameh. "Secure digital documents using Steganography and QR Code." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/10619.

Full text
Abstract:
With the increasing use of the Internet several problems have arisen regarding the processing of electronic documents. These include content filtering, content retrieval/search. Moreover, document security has taken a centre stage including copyright protection, broadcast monitoring etc. There is an acute need of an effective tool which can find the identity, location and the time when the document was created so that it can be determined whether or not the contents of the document were tampered with after creation. Owing the sensitivity of the large amounts of data which is processed on a daily basis, verifying the authenticity and integrity of a document is more important now than it ever was. Unsurprisingly document authenticity verification has become the centre of attention in the world of research. Consequently, this research is concerned with creating a tool which deals with the above problem. This research proposes the use of a Quick Response Code as a message carrier for Text Key-print. The Text Key-print is a novel method which employs the basic element of the language (i.e. Characters of the alphabet) in order to achieve authenticity of electronic documents through the transformation of its physical structure into a logical structured relationship. The resultant dimensional matrix is then converted into a binary stream and encapsulated with a serial number or URL inside a Quick response Code (QR code) to form a digital fingerprint mark. For hiding a QR code, two image steganography techniques were developed based upon the spatial and the transform domains. In the spatial domain, three methods were proposed and implemented based on the least significant bit insertion technique and the use of pseudorandom number generator to scatter the message into a set of arbitrary pixels. These methods utilise the three colour channels in the images based on the RGB model based in order to embed one, two or three bits per the eight bit channel which results in three different hiding capacities. The second technique is an adaptive approach in transforming domain where a threshold value is calculated under a predefined location for embedding in order to identify the embedding strength of the embedding technique. The quality of the generated stego images was evaluated using both objective (PSNR) and Subjective (DSCQS) methods to ensure the reliability of our proposed methods. The experimental results revealed that PSNR is not a strong indicator of the perceived stego image quality, but not a bad interpreter also of the actual quality of stego images. Since the visual difference between the cover and the stego image must be absolutely imperceptible to the human visual system, it was logically convenient to ask human observers with different qualifications and experience in the field of image processing to evaluate the perceived quality of the cover and the stego image. Thus, the subjective responses were analysed using statistical measurements to describe the distribution of the scores given by the assessors. Thus, the proposed scheme presents an alternative approach to protect digital documents rather than the traditional techniques of digital signature and watermarking.
APA, Harvard, Vancouver, ISO, and other styles
6

Owen, Anne M. "Widescale analysis of transcriptomics data using cloud computing methods." Thesis, University of Essex, 2016. http://repository.essex.ac.uk/16125/.

Full text
Abstract:
This study explores the handling and analyzing of big data in the field of bioinformatics. The focus has been on improving the analysis of public domain data for Affymetrix GeneChips which are a widely used technology for measuring gene expression. Methods to determine the bias in gene expression due to G-stacks associated with runs of guanine in probes have been explored via the use of a grid and various types of cloud computing. An attempt has been made to find the best way of storing and analyzing big data used in bioinformatics. A grid and various types of cloud computing have been employed. The experience gained in using a grid and different clouds has been reported. In the case of Windows Azure, a public cloud has been employed in a new way to demonstrate the use of the R statistical language for research in bioinformatics. This work has studied the G-stack bias in a broad range of GeneChip data from public repositories. A wide scale survey has been carried out to determine the extent of the Gstack bias in four different chips across three different species. The study commenced with the human GeneChip HG U133A. A second human GeneChip HG U133 Plus2 was then examined, followed by a plant chip, Arabidopsis thaliana, and then a bacterium chip, Pseudomonas aeruginosa. Comparisons have also been made between the use of widely recognised algorithms RMA and PLIER for the normalization stage of extracting gene expression from GeneChip data.
APA, Harvard, Vancouver, ISO, and other styles
7

Krämer, Julia. "Development of novel methods for periplasmic release of biotherapeutic products." Thesis, University of Birmingham, 2017. http://etheses.bham.ac.uk//id/eprint/7603/.

Full text
Abstract:
The production of biotherapeutics including antibodies and antibody fragments is a rapidly expanding market with an increasing number of products being approved for use. One of the major platforms used for production of such therapeutics is Escherichia coli, which offers a rapid production at low production costs. The favoured location for targeting these biotherapeutic is the periplasm of E. coli as this environment supports the formation of disulphide bonds and simplifies the purification process. There are a number of periplasmic release procedures currently practised in industry including osmotic shock. However their limitations call for the development of an improved generic periplasmic release method. This project demonstrates how the polymer poly(styrene-co-maleic acid) (SMA) can be applied as a novel and alternative periplasmic release agent. The amphipathic polymer self-assembles into discs encapsulating membrane proteins and thereby destabilises the outer membrane consequently releasing the periplasm. Data presented here show that SMA releases the model target proteins with a higher yield at equal or higher target purity than the conventional methods. Furthermore the developed methods was analysed and refined to be compatible with existing downstream and first steps for its adaptation on industrial scale were made.
APA, Harvard, Vancouver, ISO, and other styles
8

Jia, Tianye. "Strategies and statistical methods for linkage disequilibrium-based mapping of complex traits." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3292/.

Full text
Abstract:
Nowadays, there are many statistical methods available for genetic association analyses with data various designs. However, it is usually ignored in these analyses that an analytical method must be appropriate for an experimental design from which data is collected. In addition, association study is a population-based analysis and, thus its inference is highly vulnerable to many population-oriented confounding factors. This thesis starts with a comprehensive survey and comparison of those methods commonly used in the literature of genetic association study in order to obtain insights into the statistical aspects and problem of the methods. On the basis of these reviews, we managed to calculate the optimal trend set for the Armitage’s trend test for different penetrance models with a high level of genetic heterogeneity. We introduced two new strategies to adjust for the population stratification in association analyses. We proposed a maximum likelihood estimation method to adjust for biases in statistical inference of linkage disequilibrium (LD) between pairs of polymorphic loci by using non-random samples. In the process of the analysis, we derived a more sophisticated but robust likelihood-based statistical framework, accounting properly for the non-random nature of case and control samples. Finally, we developed a multi-point likelihood-based statistical approach for a genome-wide search for the genetic variants that contribute to phenotypic variation of complex quantitative traits. We tested these methods through intensive simulation studies and demonstrated their application in analyses with large case and control SNP datasets of the Parkinson’s disease. Despite that we have mainly focused on SNP data scored from microarray techniques, the theory and methodology presented here paved a useful stepping stone approach to the modeling and analysis of data depicting genome structure and function from the new generation sequencing techniques.
APA, Harvard, Vancouver, ISO, and other styles
9

Tancjurová, Jana. "Metody indikace chaosu v nelineárních dynamických systémech." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2019. http://www.nusl.cz/ntk/nusl-400451.

Full text
Abstract:
The master's thesis deals mainly with continuous nonlinear dynamical systems that exhibit chaotic behavior. The main goal is to create algorithms for chaos detection and their subsequent testing on known models. Most of the thesis is devoted to the estimation of the Lyapunov exponents, further it deals with the estimation of the fractal dimension of an attractor and summarizes the 0--1 test. The thesis includes three algorithms created in MATLAB -- an algorithm for estimating the largest Lyapunov exponent and two algorithms for estimating the entire Lyapunov spectra. These algorithms are then tested on five continuous dynamical systems. Especially the error of estimation, speed of these algorithms and properties of Lyapunov exponents in different areas of system behavior are investigated.
APA, Harvard, Vancouver, ISO, and other styles
10

Lopez, Florent. "Task-based multifrontal QR solver for heterogeneous architectures." Thesis, Toulouse 3, 2015. http://www.theses.fr/2015TOU30303/document.

Full text
Abstract:
Afin de s'adapter aux architectures multicoeurs et aux machines de plus en plus complexes, les modèles de programmations basés sur un parallélisme de tâche ont gagné en popularité dans la communauté du calcul scientifique haute performance. Les moteurs d'exécution fournissent une interface de programmation qui correspond à ce paradigme ainsi que des outils pour l'ordonnancement des tâches qui définissent l'application. Dans cette étude, nous explorons la conception de solveurs directes creux à base de tâches, qui représentent une charge de travail extrêmement irrégulière, avec des tâches de granularités et de caractéristiques différentes ainsi qu'une consommation mémoire variable, au-dessus d'un moteur d'exécution. Dans le cadre du solveur qr mumps, nous montrons dans un premier temps la viabilité et l'efficacité de notre approche avec l'implémentation d'une méthode multifrontale pour la factorisation de matrices creuses, en se basant sur le modèle de programmation parallèle appelé "flux de tâches séquentielles" (Sequential Task Flow). Cette approche, nous a ensuite permis de développer des fonctionnalités telles que l'intégration de noyaux dense de factorisation de type "minimisation de cAfin de s'adapter aux architectures multicoeurs et aux machines de plus en plus complexes, les modèles de programmations basés sur un parallélisme de tâche ont gagné en popularité dans la communauté du calcul scientifique haute performance. Les moteurs d'exécution fournissent une interface de programmation qui correspond à ce paradigme ainsi que des outils pour l'ordonnancement des tâches qui définissent l'application. Dans cette étude, nous explorons la conception de solveurs directes creux à base de tâches, qui représentent une charge de travail extrêmement irrégulière, avec des tâches de granularités et de caractéristiques différentes ainsi qu'une consommation mémoire variable, au-dessus d'un moteur d'exécution. Dans le cadre du solveur qr mumps, nous montrons dans un premier temps la viabilité et l'efficacité de notre approche avec l'implémentation d'une méthode multifrontale pour la factorisation de matrices creuses, en se basant sur le modèle de programmation parallèle appelé "flux de tâches séquentielles" (Sequential Task Flow). Cette approche, nous a ensuite permis de développer des fonctionnalités telles que l'intégration de noyaux dense de factorisation de type "minimisation de cAfin de s'adapter aux architectures multicoeurs et aux machines de plus en plus complexes, les modèles de programmations basés sur un parallélisme de tâche ont gagné en popularité dans la communauté du calcul scientifique haute performance. Les moteurs d'exécution fournissent une interface de programmation qui correspond à ce paradigme ainsi que des outils pour l'ordonnancement des tâches qui définissent l'application
To face the advent of multicore processors and the ever increasing complexity of hardware architectures, programming models based on DAG parallelism regained popularity in the high performance, scientific computing community. Modern runtime systems offer a programming interface that complies with this paradigm and powerful engines for scheduling the tasks into which the application is decomposed. These tools have already proved their effectiveness on a number of dense linear algebra applications. In this study we investigate the design of task-based sparse direct solvers which constitute extremely irregular workloads, with tasks of different granularities and characteristics with variable memory consumption on top of runtime systems. In the context of the qr mumps solver, we prove the usability and effectiveness of our approach with the implementation of a sparse matrix multifrontal factorization based on a Sequential Task Flow parallel programming model. Using this programming model, we developed features such as the integration of dense 2D Communication Avoiding algorithms in the multifrontal method allowing for better scalability compared to the original approach used in qr mumps. In addition we introduced a memory-aware algorithm to control the memory behaviour of our solver and show, in the context of multicore architectures, an important reduction of the memory footprint for the multifrontal QR factorization with a small impact on performance. Following this approach, we move to heterogeneous architectures where task granularity and scheduling strategies are critical to achieve performance. We present, for the multifrontal method, a hierarchical strategy for data partitioning and a scheduling algorithm capable of handling the heterogeneity of resources. Finally we present a study on the reproducibility of executions and the use of alternative programming models for the implementation of the multifrontal method. All the experimental results presented in this study are evaluated with a detailed performance analysis measuring the impact of several identified effects on the performance and scalability. Thanks to this original analysis, presented in the first part of this study, we are capable of fully understanding the results obtained with our solver
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Metoda QR"

1

Soman, S. A., S. A. Khaparde, and Shubha Pandit. "Sparse QR Decomposition." In Computational Methods for Large Sparse Power Systems Analysis, 79–102. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0823-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eidelman, Yuli, Israel Gohberg, and Iulian Haimovici. "The QR-Factorization Based Method." In Separable Type Representations of Matrices and Fast Algorithms, 373–91. Basel: Springer Basel, 2013. http://dx.doi.org/10.1007/978-3-0348-0606-0_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Eidelman, Yuli, Israel Gohberg, and Iulian Haimovici. "The QR Iteration Method for Eigenvalues." In Separable Type Representations of Matrices and Fast Algorithms, 135–62. Basel: Springer Basel, 2013. http://dx.doi.org/10.1007/978-3-0348-0612-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wan, Song, Yuliang Lu, Xuehu Yan, Wanmeng Ding, and Hanlin Liu. "High Capacity Embedding Methods of QR Code Error Correction." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 70–79. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72998-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gupta Banik, Barnali, and Samir Kumar Bandyopadhyay. "Image Steganography Using BitPlane Complexity Segmentation and Hessenberg QR Method." In Advances in Intelligent Systems and Computing, 623–33. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2035-3_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nakata, Susumu, Takashi Kitagawa, and Yohsuke Hosoda. "Regularization Method by Rank Revealing QR Factorization and Its Optimization." In Lecture Notes in Computer Science, 608–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45262-1_72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Haisheng, Li, Huang Huafeng, and Xue Fan. "QR Code Style Transfer Method Based on Conditional Instance Regularization." In Advances in Visual Computing, 15–26. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90439-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bin, Yu, Zhang Yi, Ye Chao, and Xing Bin. "Research on AGV Correction Control Method Using QR Code Positioning." In Smart Communications, Intelligent Algorithms and Interactive Methods, 37–43. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5164-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xinhua, You, Long wenjia, and Dai Yu. "Analysis of QR Reordering Algorithm Based on Feedback Technology Optimization." In Smart Communications, Intelligent Algorithms and Interactive Methods, 215–21. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5164-9_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eidelman, Yuli, Israel Gohberg, and Iulian Haimovici. "The Implicit QR Iteration Method for Eigenvalues of Upper Hessenberg Matrices." In Separable Type Representations of Matrices and Fast Algorithms, 207–55. Basel: Springer Basel, 2013. http://dx.doi.org/10.1007/978-3-0348-0612-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Metoda QR"

1

Gupta, Krishna C., and Puckpol Chutakanonta. "Accurate Determination of Object Position From Imprecise Data." In ASME 1998 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/detc98/mech-5898.

Full text
Abstract:
Abstract The problem of accurate determination of object position from imprecise and excess measurement data arises in kinematics, biomechanics, robotics, CAD/CAM and flight/vehicle simulator design. Several methods described in the literature are reviewed. Two new methods which take advantage of the modern matrix oriented software (e.g. MATLAB, IMSL, EISPACK) are presented and compared with a “basics” method. It is found that both of the proposed decomposition methods (I: SVD/QR and II: SVD/QS) give better absolute results than a “basic” method available from the text books. On a relative basis, the second method (SVD/QS Decomposition) gives slightly better results than the first method (SVD/QR Decomposition). Examples are presented for the cases when the points chosen are nearly dependent and when the independent points have small random errors in their coordinates.
APA, Harvard, Vancouver, ISO, and other styles
2

Finta, Béla, George Maroulis, and Theodore E. Simos. "The QR Factorization for Infinite Matrices." In COMPUTATIONAL METHODS IN SCIENCE AND ENGINEERING: Advances in Computational Science: Lectures presented at the International Conference on Computational Methods in Sciences and Engineering 2008 (ICCMSE 2008). AIP, 2009. http://dx.doi.org/10.1063/1.3225427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brambilla, Angelo, Giambattista Gruosso, Giancarlo Storti Gajani, and Massimo Redaelli. "QR factorisation in the shooting method." In 2008 4th European Conference on Circuits and Systems for Communications (ECCSC. IEEE, 2008. http://dx.doi.org/10.1109/eccsc.2008.4611670.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Безруких, Анна. "ПЛЮСИ І МІНУСИ ВИКОРИСТОВУВАННЯ QR-КОДУ В СУЧАСНОМУ СВІТІ." In RICERCHE SCIENTIFICHE E METODI DELLA LORO REALIZZAZIONE: ESPERIENZA MONDIALE E REALTÀ DOMESTICHE, chair Ірина Вакулик. European Scientific Platform, 2021. http://dx.doi.org/10.36074/logos-14.05.2021.v2.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Heewook, and Noboru Kikuchi. "Real Asymmetric Matrix Eigenvalue Analysis for Dynamic Instability Problems." In ASME 2000 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/imece2000-2179.

Full text
Abstract:
Abstract Complex eigenvalue analysis is widely used when the dynamic instability of the structure is in doubt due to friction forces, aerodynamic forces, control systems, or other effects. MSC/NASTRAN upper Hessenberg method and MATLAB eigenvalue solver produce fictitious nonzero real parts for real asymmetric matrix eigenvalue problems. For dynamic instability problems, since nonzero real parts of complex eigenvalues determine the unstable eigenvalues, the accuracy of real parts becomes crucial. The appropriate double shift QR or the QZ algorithms are applied to eliminate fictitious nonzero real parts and produce only authentic complex eigenvalues for real asymmetric matrix eigenvalue problems. Numerical examples are solved using the double shift QR and the QZ algorithms, and the results are compared with the results of MSC/NASTRAN upper Hessenberg method and MATLAB solvers.
APA, Harvard, Vancouver, ISO, and other styles
6

Jagtap, Shilpa, and J. L. Mudegaonkar. "Steganographic Data Hiding in QR Codes." In National Conference on Relevance of Engineering and Science for Environment and Society. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.118.38.

Full text
Abstract:
In the era of technological development, data transfer over internet is playing vital role in communication. Now a days use of internet became common and it is necessary to secure the transmission of data in the form of protecting information systems from unauthorized access, use, disruption, modification, recording or destruction. There various methods available for data security, like cryptography and steganography. Steganography is the technique in which data gets hide behind any other information and it becomes difficult for unauthorized user to detect it. QR code is the trademark for a type of matrix barcode consisting of the black square modules arranged in a square grid on a white background. Any imaging devices such as camera, scanner are used for reading the code. In this article we are discussing different technologies that can be used for steganography along with steganography using QR codes.
APA, Harvard, Vancouver, ISO, and other styles
7

Liao, Zhao-lai, Tin Huang, Rui Wang, and Xiao-yan Zhou. "A method of image analysis for QR code recognition." In 2010 International Conference on Intelligent Computing and Integrated Systems (ICISS). IEEE, 2010. http://dx.doi.org/10.1109/iciss.2010.5657187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang yanli and Zhang zhenxing. "A novel local threshold binarization method for QR image." In International Conference on Automatic Control and Artificial Intelligence (ACAI 2012). Institution of Engineering and Technology, 2012. http://dx.doi.org/10.1049/cp.2012.0959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yuan, Ye. "A Method for QR Code Decryption Based on SMS4." In 2015-1st International Symposium on Social Science. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/isss-15.2015.83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Muthahhari, Morteza, Yus Sholva, and Hengky Anra. "Sistem Verifikasi Sertifikat Seminar dengan Qr Code Sebagai Identitas Unik Terenkripsi." In Seminar Nasional Penerapan Ilmu Pengetahuan dan Teknologi : kampus merdeka meningkatkan kecerdasan sumberdaya manusia melalui interdispliner ilmu pengetahuan dan teknologi : Pontianak, 24 Agustus 2021. Untan Press, 2021. http://dx.doi.org/10.26418/pipt.2021.34.

Full text
Abstract:
Sertifikat seminar yang diperoleh seorang dosen umumnya digunakan sebagai bukti penilaian BKD (Beban Kerja Dosen) atauPAK (Penilaian Angka Kredit). Bukti sertifikat tersebut dinilai oleh asesor dengan melihat fisik sertifikat dan/atau file hasil pemindaian sertifikat. Masalah akan muncul jika asesor meragukan bukti sertifikat yang dinilainya, dan terlebih saat ini bukti sertifikat hanya berupa file PDF atau JPG yang mudah diubah (edit). Pertanyaannya adalah cara asesor memastikan bahwa benar telah diselenggarakan seminar dan metode memastikan nama yang tertera pada sertifikat adalah benar mengikuti kegiatan tersebut. Untuk itu, diperlukan suatu sistem yang bisa memberikan layanan verifikasi sertifikat. Dalam penelitian ini diusulkan pemberian identitas unik pada sertifikat berupa QR Code yang bereferensi ke alamat website (URL link) untuk proses verifikasi. Tiap sertifikat memiliki QR Code berbeda dan nama penerima sertifikat akan ditampilkan oleh sistem. Suatu string identitas atau signature khusus ditambahkan untuk membuat URL link menjadi unik. Hal ini dapat memastikan bahwa URL link tidak dimodifikasi sejak URL link tersebut dibuat. Penambahan identitas atau signature khusus ini menambah unsur keamanan yakni untuk mencegah manipulasi URL (URL manipulation). Oleh karena itu fungsi validasi diterapkan pada sistem untuk memastikan bahwa identitas atau signature pada URL link yang diterima dari QR Code valid. Setelah identitas URL link dipastikan valid oleh sistem, asesor sebagai verifikator akan diarahkan (redirect) ke verification page yang menampilkan informasi kegiatan seminar, nama penyelenggara, waktu pelaksanaan, dan nama penerima sertifikat. Dari data peserta dan informasi kegiatan seminar tersebut, asesor dapat melakukan verifikasi dan memastikan bahwa sertifikat yang dinilainya valid atau tidak.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography