Entropy driven key-lock assembly [PDF]
The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations. As a result, a two-dimensional map of the key-lock effective interaction potential is constructed, which leads to the proposal of a self-assembling mechanism ...
Gerardo Odriozola+2 more
openaire +5 more sources
Design on Novel Door Lock Using Minimizing Physical Exposure and Fingerprint Recognition Technology
Digital door locks are widely used not only in general homes such as houses and apartments, but also in spaces where external intrusion must be prevented based on high security and convenience. Recently, smart door locks with additional technologies such
Seungdo Jeong
doaj +1 more source
Biometric authentication using fingerprint and keypad for door lock securtiy system [PDF]
Biometric lock is a lock that uses fingerprint to grant genuine user an access to a building, offices, and laboratory. The purpose of this project is to solve the major problems faced by the conventional lock or electronic combination lock, by adding
Al-Azam, Sharaf Ahmed+2 more
core +1 more source
Improvement on the Key Element of Flexible U-Shaped Steel Support and Its Field Applications
In China, there are a significant numbers of soft rocks roadways in underground coal mines. The roofs of these roadways are generally highly fractured, and traditional bolt installation does not provide sufficient supporting capacity.
Zhili Su+4 more
doaj +1 more source
Algorithms for the quantitative Lock/Key model of cytoplasmic incompatibility
Cytoplasmic incompatibility (CI) relates to the manipulation by the parasite Wolbachia of its host reproduction. Despite its widespread occurrence, the molecular basis of CI remains unclear and theoretical models have been proposed to understand the ...
Tiziana Calamoneri+4 more
doaj +1 more source
A new model and method for understanding Wolbachia-induced cytoplasmic incompatibility. [PDF]
Wolbachia are intracellular bacteria transmitted almost exclusively vertically through eggs. In response to this mode of transmission, Wolbachia strategically manipulate their insect hosts' reproduction.
Benjamin Bossan+2 more
doaj +1 more source
The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module.
Shengyong Li+5 more
doaj +1 more source
Investigating Information Dynamics in Living Systems through the Structure and Function of Enzymes. [PDF]
Enzymes are proteins that accelerate intracellular chemical reactions often by factors of 105-1012s-1. We propose the structure and function of enzymes represent the thermodynamic expression of heritable information encoded in DNA with post-translational
Robert Gatenby, B Roy Frieden
doaj +1 more source
CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme
Logic locking has recently been proposed as a solution for protecting gatelevel semiconductor intellectual property (IP). However, numerous attacks have been mounted on this technique, which either compromise the locking key or restore the original ...
Bicky Shakya+3 more
doaj +1 more source
Key-lock pair mechanism for access control using tribes of Farey fractions [PDF]
We propose a new single key-lock mechanism based on the concept of an access control matrix. In this system, each file is given a lock and each user is given a key and through simple operations on keys and locks the user access privilege can be revealed.
H. Chandrashekhar, M. Nagaraj
openalex +3 more sources