Buscas alternativas:
algorithm binary » algorithms library (Expandir a busca)
system control » systems control (Expandir a busca)
adding system » coding system (Expandir a busca), banking system (Expandir a busca), trading system (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
system control » systems control (Expandir a busca)
adding system » coding system (Expandir a busca), banking system (Expandir a busca), trading system (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
1
Assuntos:
“...Controle de acesso...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese
2
Assuntos:
“...Controle de acesso...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese