information. In this millennium era, Facebook and Twitter came to rule the online world with hundreds of millions of subscribers logged into their accounts almost every day. However, in Malaysia the used of QuickResponse codes are increasing but with slow pace. This is due to the low expose about the QuickResponsecode as a marketing medium.
Abstract- Patent safety and verification have become increasingly more important in regular life. The digital watermark is one of the methods invented to handle this problem. In this paper, a digitally invisible watermark is inserted in a quickresponsecode image by means of wavelet transform. In the embedding process, a binary image, logo, is converted into a corresponding watermark and then inserted into a selected sub band. The experimental results explained that, for all the cases considered in this paper is stronger to attacks and as such it can serve as a viable patent safety and verification tool.
In this modern-day era, every dimension has implemented technology as one of the fastest ways to make the work done, anywhere and anytime. One of the tools is Quick Responses (QR) Code which the user will have to scan the pattern of the QR Code to access the link. In education, the QR code can be implemented in higher learning institutions as an alternative for students to learn about their courses. This study was conducted at Faculty Hotel and Tourism Management, Selangor branch, Puncak Alam campus, Universiti Teknologi MARA, Malaysia. The objectives of this study are to investigate the usage of the QR code as one of the learning tools in terms of interactive learning alternatives and the intention to use that leads to student’s positive behaviour towards QR code. Respondents were first to third year undergraduate students who enrolled in Housekeeping course. A survey through questionnaire was conducted to 154 respondents and it was found that QR code is significant as one of the learning tool, interactive and encourage positive intention among students to use it. This study highlights that education in higher learning institutions are flexible in teaching and learning innovation to enhance the student learning experience.
is the time, for which a process requires the CPU for execution. The time at which the process arrives is called the arrival time (a t ).Time quantum (t q ) or time slice is the period of time given to each process to have CPU. Average waiting time (a wt ) is the time gap between the arrival of a process and its response by the CPU. Average Turnaround time (a tat ) is the time gap between the instant of process arrival and the instant of its completion. Average Response time (a rt ) is the time taken to start responding a
So in order to provide highly accurate information regarding the channel availability the cells need to learn the statistics of all the LUs .So there is a need for cells to cooperate wit[r]
One of operating systems which used by mobile device is Android. Android is a linux-based operating system for mobile device. The superiority of Android over other mobile device operating syatem is that Android has the characteristic of open source code so people can customize the features which has not existed in the Android operating system in accordance with their demands and desire.
Using medical applications will be major applications that bring more attention and momentum into such a research in the upcoming years. According to Research2Guidance survey [2] it assumed that approximately 500 million users will use the healthcare applications on smart phones by 2015. The survey conducted demonstrated that 30% of the doctors use the smart phone for running the medical apps. These applications have an enormous potential for improving our examination by providing a quick, comprehensive, and updated overview of current clinical guidelines.
results Of Rf-Based Texture Classification The test outcomes of three distinct textural features extraction techniques based on the Outex surface texture database have revealed that, the[r]
Weaver “An Empirical Performance Evaluation of Relational Keyword Search Systems” Department of Computer Science, University of Virginia Charlottesville, VA, USA [16] Vanitha Muthusamy,K[r]
In the study, it was demonstrated that of all these methods, in this particular case the method of Holt-Winters is most suitable, because it gives a relatively accurate prediction for a [r]
In relational data set of attributes are used to associate data from multiple tables where as in a social network graph, subgraphs and neighborhood are used to identify individuals which[r]
In papers [13, 17] a probabilistic models, statistical model for writer verification, likelihood ratio, error rates percent misclassification, macro and micro features, experimental resu[r]
Based on the justifications mentioned regarding the gene selection and the significance in the analysis of microarray data, it is apparent that using the full group of genes in the proce[r]
Moreover, when the values of sensors related to the number of vehicles for example in roads A,A’ is more the same values in roads B,B’, the time dedicated to the green light is divided b[r]
Perhaps the earliest known software metric is size oriented Kilo Lines of Code (KLOC), which has been used as an input to derive measurements such as effort, error rate and documentation. Application of KLOC is straight forward where LOC are an available and can be easily counted. Metrics derived from KLOC are biased in some aspects since LOC measures are programming language dependent. Also, for reuse-based approach source codes are precompiled and may be completely unavailable.
complementary control procedures, to the success of ERP implementation must consider the critical success factors in ERP implementation is a strategic initiative, commitment executive, h[r]
For the performance evaluation, we have implemented proposed sequential access pattern mining algorithm and CSB-mine algorithm using Java NetBeans 6.9 M1. The results are then compared with the results obtained by executing the PrefixSpan algorithm. We have used the standard code of PrefixSpan algorithm available under GPL2 license. The PrefixSpan algorithm is proposed by Jian Pei et.al. [11]. For the experimentation, we used the machine with Pentium Dual Core processor running at 2.00 GHz, 3GB RAM and Windows 7 operating system. The data set T25i10D10K used for performance evaluation is a synthetic data set, which is publicly available by IBM Quest data mining project. It is found that the number of sequential access patterns generated by all three algorithms is same. This shows the correctness of our implementations. Table 1 shows the results of CSB-mine algorithm and table 2 shows results of proposed mining algorithm. The results show 45 to 50 percent improvement in average memory consumption and 10 to 15 percent improvement in the execution time.
Responsecode is a two dimensional barcode which is readable by QR code scanners, smart phones with a camera. QR code which is widely used in automatic identification field and this will increases the speed of recognition by the decoder so as to integrate this algorithm into mobile terminals. In this paper, discussed mainly about how securely information can be hidden and how fast it can be recognized the information which has been hidden under the QR code. QR codes are mainly used to hiding the information and it can be used to link to any URL (Uniform Resource Locator). As mobile technologies become increasingly prominent in our daily routine, mobile tagging with QR codes in the business field is prevalently in many parts of the world. QR code can be able to store more information or data than existing Barcode technology and QR code can be able to read or scan from any direction. As the creator intended the code to allow its contents to be decoded at high speed. This paper demonstrates how system mainly follows phases i.e., generating the QR code and scanning (decode) the RQ code. QR code provides has some features are high capacity to encoding the data, small printout (output) size, dirt and resistant to the damages, scan from any direction.
Data Matrix is a very efficient, two- dimensional (2D) barcode representation that uses a small area of square modules with a unique perimeter pattern, which helps the barcode scanner determine cell locations and decode the symbol [19]. Data Matrix code allows the encoding of characters, numbers, text and actual bytes, including Unicode characters and photos. Data Matrix can encode data up to 800 characters confidently; this means that most camera based imagers and hand-held scanners will be able to read the code smoothly. The amount of data encoded within Data Matrix varies depending on the type of data. Data Matrix barcodes are made up of black and white rectangular cells arranged in rectangular or square patterns. Data bits that are encoded and mapped to a region of black and white cells are called a data region. The data region is surrounded by a finder pattern; the bottom and left hand side only contain black cells, while the top and right hand side contains only white cells.
GRASP approach which is a meta-heuristic algorithm that combines two techniques widely used in combinatorial optimization starting with the Wolverine Greedy algorithm which allows to bui[r]