Buscas alternativas:
controller algorithm » control algorithms (Expandir a busca), controle algoritmo (Expandir a busca), control algoritmo (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using code » using cone (Expandir a busca), using model (Expandir a busca), using cold (Expandir a busca)
controller algorithm » control algorithms (Expandir a busca), controle algoritmo (Expandir a busca), control algoritmo (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using code » using cone (Expandir a busca), using model (Expandir a busca), using cold (Expandir a busca)
1
Assuntos:
“...Controle de acesso...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese
2
Assuntos:
“...Controle de acesso...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese