Results 111 to 120 of about 6,742,422 (376)

A Welcome Abuse : Notes on Finding Community Through the Battered Book [PDF]

open access: yes, 2006
The book-body and the flesh-body live in tangent. Or such should be the case, if we allow the book to live with us and not under glass, in plastic sleeves, in a safe, under lock and key in a climate-controlled, neutrally lit niche.
Belcham, Andrea
core  

Fabrication‐Directed Entanglement for Designing Chiral and Anisotropic Metamaterial Foams

open access: yesAdvanced Engineering Materials, EarlyView.
This work introduces fabrication‐directed entanglement (FDE), combining viscous thread printing and topology optimization to program entangled foams with spatially patterned stiffness. By tuning coil density, FDE enables anisotropy, programmable Poisson's ratio, and chirality in foams.
Daniel Revier   +3 more
wiley   +1 more source

SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL

open access: yesCommIT Journal, 2008
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time.
Indri Neforawati, Hoga Saragih
doaj   +1 more source

Micropleated Nanofibrous Filters for High‐Efficiency Submicron Aerosol Filtration: A Comparative Study with Chemical, Biological, Radiological, and Nuclear Gas Mask Filters

open access: yesAdvanced Engineering Materials, EarlyView.
This study presents micropleated filters manufactured by needleless electrospinning. Nanofibers are deposited onto uniaxially pre‐stretched substrates that contract upon release, forming densely packed micropleats. This architecture increases effective surface area without enlarging the filter size, achieving quality factors comparable to those of ...
Aleksandr Fadeev   +6 more
wiley   +1 more source

Exploring Topsnut-Graphical Passwords by Twin Odd-elegant Trees

open access: yesMATEC Web of Conferences, 2017
Graphical passwords are facing a good opportunity as 2-dimension codes are accepted by many people, since it has been applied in mobile devices, electronic equipments with touch screen, and so on.
Wang Hong-yu, Xu Jin, Yao Bing
doaj   +1 more source

Design of an Open-Source Decoder for Educational Escape Rooms

open access: yesIEEE Access, 2019
Escape rooms are a popular recreational activity which involves solving a series of puzzles within a time limit to `escape' the fictional setting they are in. As a fun, collaborative learning activity, escape rooms are increasingly finding their way into
Robert Ross
doaj   +1 more source

Estimating the herd immunity threshold by accounting for the hidden asymptomatics using a COVID-19 specific model.

open access: yesPLoS ONE, 2020
A quantitative COVID-19 model that incorporates hidden asymptomatic patients is developed, and an analytic solution in parametric form is given.
Shaurya Kaushal   +6 more
doaj   +1 more source

Enabling Digital Continuity in Virtual Manufacturing for Eco‐Efficiency Assessment of Lightweight Structures by Means of a Domain‐Specific Structural Mechanics Language: Requirements, Idea and Proof of Concept

open access: yesAdvanced Engineering Materials, EarlyView.
This article presents a solver‐agnostic domain‐specific language (DSL) for computational structural mechanics that strengthens interoperability in virtual product development. Using a hierarchical data model, the DSL enables seamless exchange between diverse simulation tools and numerical methods.
Martin Rädel   +3 more
wiley   +1 more source

Solvent fluctuations induce non-Markovian kinetics in hydrophobic pocket-ligand binding

open access: yes, 2016
We investigate the impact of water fluctuations on the key-lock association kinetics of a hydrophobic ligand (key) binding to a hydrophobic pocket (lock) by means of a minimalistic stochastic model system.
Dzubiella, Joachim   +2 more
core   +1 more source

Design of intelligent locks based on the triple KeeLoq algorithm

open access: yesAdvances in Mechanical Engineering, 2016
KeeLoq algorithm with high security was usually used in wireless codec. Its security lack is indicated in this article according to the detailed rationale and the introduction of previous attack researches.
Huibin Chen, Jing Liu, Cheng-Fu Yang
doaj   +1 more source

Home - About - Disclaimer - Privacy