Skip to main content
. 2020 Apr 11;20(8):2159. doi: 10.3390/s20082159

Figure 5.

Figure 5

Software stack of DHRD for the cases of redundant memory copy and direct byte read.