Showing 181 - 200 results of 1,988 for search '(invasive OR version) of the (band OR (base OR (ceased OR chased)))', query time: 0.16s Refine Results
  1. 181
  2. 182

    Differences in pulse manifestations at Cunkou based on simplified modeling of tactile sensing by Shi, Yubing, Yang, Hongyi, Yeo, Joon Hock

    Published 2024
    “…The arterial pressures measured invasively with equipment from 14 patients with aorta coarctation were processed to simulate different pulse manifestations at Cun, Guan, and Chi positions of Cunkou when different compression levels were applied. …”
    Get full text
    Journal Article
  3. 183
  4. 184
  5. 185
  6. 186
  7. 187
  8. 188
  9. 189

    Wavelet-based compression of medical images: Filter-bank selection and evaluation by Saffor, A., Bin Ramli, A.R., Ng, K.H.

    Published 2003
    “…Wavelet-based image coding algorithms (lossy and lossless) use a fixed perfect reconstruction filter-bank built into the algorithm for coding and decoding of images. …”
    Article
  10. 190
  11. 191
  12. 192
  13. 193
  14. 194
  15. 195
  16. 196
  17. 197
  18. 198

    Application of smartphone-based biophotonic instrumentation for glucose sensing using photometric method by Aziz, Nur Anis Huda

    Published 2024
    “…This study aimed to apply smartphone-based biophotonic instrumentation for measuring glucose concentrations using the photometric method. …”
    Get full text
    Monograph
  19. 199

    Physical unclonable function based solutions to unification of user, device and data authentication by Zheng, Yue

    Published 2020
    “…These solutions are typically realized using conventional techniques that require the safekeeping of a secret binary key in the non-volatile memory, or battery-backed SRAM of some device, or a token owned by the user, which have been proven to be vulnerable to various kinds of invasive, semi-invasive and side channel attacks. The non-repudiation assumption of these conventional techniques is being challenged by emerging artificial-intelligent assisted and malware-based attacks on independently chained weak links (factors), and their limited extension to IoT scenarios, where the sheer number of inexpensive and often insufficiently protected endpoints prevent application of standard, secret-key based techniques. …”
    Get full text
    Thesis-Doctor of Philosophy
  20. 200