Results 1 to 10 of about 594,656 (344)

Entropy driven key-lock assembly [PDF]

open access: yesThe Journal of Chemical Physics, 2008
The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations. As a result, a two-dimensional map of the key-lock effective interaction potential is constructed, which leads to the proposal of a self-assembling mechanism ...
Odriozola, Gerardo   +2 more
openaire   +4 more sources

Two-piece obturator using “lock-and-key” mechanism

open access: diamondThe Journal of Indian Prosthodontic Society, 2017
This paper describes a method used for the fabrication of a two-piece denture obturator for a patient who had surgical removal of the premaxilla due to squamous cell carcinoma. The patient had been wearing a two-piece obturator but encountered difficulty
Prema Sukumaran, Michael R Fenlon
doaj   +2 more sources

A Fuel‐Driven Lock‐and‐Key System [PDF]

open access: yesChemistryOpen
This study introduces a fuel‐driven lock‐and‐key system based on the interaction between crown ether and ammonium ion. In this simple model system, a key‐like molecule with an amino group functions as the key, while 15‐crown‐5 serves as the lock.
Shilin Zhang   +4 more
doaj   +2 more sources

Management of grossly destroyed endodontically treated teeth with lock and key custom modified cast post and core design: A case series

open access: goldContemporary Clinical Dentistry, 2015
The purpose of this paper is to demonstrate a more retentive custom modified lock and key design of metal cast post and core for the restoration of grossly destroyed endodontically treated molar tooth.
E Deenadayalan   +4 more
doaj   +2 more sources

Molecular Docking: From Lock and Key to Combination Lock

open access: diamondJournal of Molecular Medicine and Clinical Applications, 2018
Accurate modeling of protein ligand binding is an important step in structure-based drug design, is a useful starting point for finding new lead compounds or drug candidates. The 'Lock and Key' concept of protein-ligand binding has dominated descriptions of these interactions, and has been effectively translated to computational molecular docking ...
Ashutosh, Tripathi, Vytas A, Bankaitis
openaire   +3 more sources

A DNA dual lock-and-key strategy for cell-subtype-specific siRNA delivery

open access: yesNature Communications, 2016
Delivery of siRNA to target cells is essential for in vivogene therapy. Here the authors demonstrate an oligonucleotide aptamer that targets therapeutic siRNA to a specific cell type.
Kewei Ren   +6 more
doaj   +2 more sources

Implementation of Suitcase Lock Security System Using Near Field Communication (NFC) and Global Positioning System (GPS)

open access: yesJurnal Jaringan Telekomunikasi, 2023
A key is a tool made of metal to open or fasten a door or object that has a lock by inserting it into the hole in the main key. The lock itself is usually used on doors, suitcases, or other objects that require security.
Hudiono Hudiono   +2 more
doaj   +1 more source

A Secure Scan Architecture Protecting Scan Test and Scan Dump Using Skew-Based Lock and Key

open access: yesIEEE Access, 2021
Scan-based Design for Testability (DFT) is widely used in industry as it consistently provides high fault coverage. However, scan-based DFT is prone to security vulnerabilities where attackers use the scan design to obtain secret information from the ...
Hyungil Woo, Seokjun Jang, Sungho Kang
doaj   +1 more source

Acoustically levitated lock and key grains

open access: yesPhysical Review Research, 2023
We present a scheme for generating shape-dependent, specific bonds between millimeter scale particles, using acoustic levitation. We levitate particles in an ultrasonic standing wave, allowing for substrate-free assembly.
Melody X. Lim, Heinrich M. Jaeger
doaj   +1 more source

Loki: A Physical Security Key Compatible IoT Based Lock for Protecting Physical Assets

open access: yesIEEE Access, 2022
The twenty first century has witnessed an enormous rise in data produced per person and it has also witnessed newer and advanced forms of digital attacks and instinctively, witnessed a rise in the need for data protection.
Sibi Chakkaravarthy Sethuraman   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy