Results 231 to 240 of about 4,621,200 (286)
Secure authentication using a multidimensional retinal biometric encryption method. [PDF]
Banu Y, Rath BK, Gountia D.
europepmc +1 more source
Switching Coordinator: An SDN Application for Flexible QKD Networks. [PDF]
Méndez RB +10 more
europepmc +1 more source
Advances in multiple myeloma: key updates from the ASH 2025 meeting. [PDF]
Naing PT, Baljevic M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The Journal of the Acoustical Society of America, 1979
A key code generator for electronic musical instruments which has a switch matrix circuit having a plurality of switches disposed at the intersections of two sets of buses, means for simultaneously applying signals to the switch matrix circuit from one of the two sets of buses to derive outputs from a plurality of blocks into which the buses of the ...
Noriji Sakashita, Hiroshi Kitagawa
openaire +1 more source
A key code generator for electronic musical instruments which has a switch matrix circuit having a plurality of switches disposed at the intersections of two sets of buses, means for simultaneously applying signals to the switch matrix circuit from one of the two sets of buses to derive outputs from a plurality of blocks into which the buses of the ...
Noriji Sakashita, Hiroshi Kitagawa
openaire +1 more source
2021
This part is entirely devoted to the identification key of insect traces based on the galleries and frass of woodworm larvae observed in the wood. The reader is guided step by step through the observation of his sample, using the key and the associated drawings or photographs to best identify his traces.
Magali Toriti +2 more
openaire +1 more source
This part is entirely devoted to the identification key of insect traces based on the galleries and frass of woodworm larvae observed in the wood. The reader is guided step by step through the observation of his sample, using the key and the associated drawings or photographs to best identify his traces.
Magali Toriti +2 more
openaire +1 more source
Nature, 1970
KEYS for the identification of specimens have been used by biologists for several centuries. A method is described here for generating such keys automatically by computer, instead of composing them by hand, which until recently was the only way to produce them.
openaire +2 more sources
KEYS for the identification of specimens have been used by biologists for several centuries. A method is described here for generating such keys automatically by computer, instead of composing them by hand, which until recently was the only way to produce them.
openaire +2 more sources
ACM Transactions on Cyber-Physical Systems, 2018
Modern automotive Cyber-Physical Systems (CPS) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V), and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance, traffic control, and environmental hazards.
Jiang Wan +2 more
openaire +1 more source
Modern automotive Cyber-Physical Systems (CPS) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V), and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance, traffic control, and environmental hazards.
Jiang Wan +2 more
openaire +1 more source

