Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Mantri D"'
Publikováno v:
Micromachines, 14(2)
Micro-devices that use electric fields to trap, analyze and inactivate micro-organisms vary in concept, design and application. The application of electric fields to manipulate and inactivate bacteria and single-celled organisms has been described ex
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::56735b44de45821d9b3bf4d6b30f4262
http://resolver.tudelft.nl/uuid:6af6ec5d-bf1c-431a-9ec8-c87125d3358d
http://resolver.tudelft.nl/uuid:6af6ec5d-bf1c-431a-9ec8-c87125d3358d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
32 BIT×32 BIT MULTI PRECISION RAZOR-BASED DYNAMIC VOLTAGE SCALING MULTIPLIER WITH OPERANDS SCHEDULER
In this paper, a 32×32-bit multi-precision multiplier is described. The multiprecision (MP) multiplier that incorporates the variable precision, parallel processing (PP), razor-based dynamic voltage scaling (DVS), and MP operands scheduling are u
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d48df7e5c3925f64bac896eca63f9312
There are many digital multimedia transmissions on the network. Therefore to protect the secret messages during transmission is an important issue. For assurance of communication efficiency and save network bandwidth compression techniques can be imp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6f98cef8225afb586d6d4cf440da4625
There are many digital multimedia transmissions on the network. Therefore to protect the secret messages during transmission is an important issue. For assurance of communication efficiency and save network bandwidth compression techniques can be imp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fc8172b7def7d941ec3a6eb0d60f5876
The internet and multimedia are the fastest development technology, the problem of protecting transmitted information become an important issue. To save the network bandwidth and to reduce redundancy and to improve the decompressed quality compressio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3e9c029b48a5259fe3f1fc8a1045cbdd
Biometric refers to the authentication technique which depends on the measurement and statistical analysis of people’s physical and behavioral characteristics. Among all the biometric technique fingerprint identification is consider as most re
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c1d857607d3f737e1d1f301255fdbfcb
Autor:
PROF. MANTRI D., B.
Here a novel system is shown for protecting fingerprints by combining two different fingerprints to a new identity. The enrollment process is executed here in which two different fingerprints are captured. Then extract the minutiae position from one
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::42337768e444045ab7a8ab92f0cc9458
Autor:
PROF. MANTRI D. B.
Here a novel system is shown for protecting fingerprints by combining two different fingerprints to a new identity. The enrollment process is executed here in which two different fingerprints are captured. Then extract the minutiae position from one
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c24f6311431bad68b22d532a730ef703
Biometrics is the measurement and statistical analysis of people’s physical and behavioural characteristics. Using biometrics to verify identity means using a physical characteristic such as face, voice or fingerprints to authenticate an indiv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3e5889a547cabd9847aca8674883ff33