Results 11 to 20 of about 550,568 (326)

Entropy driven key-lock assembly [PDF]

open access: yesThe Journal of Chemical Physics, 2008
The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations. As a result, a two-dimensional map of the key-lock effective interaction potential is constructed, which leads to the proposal of a self-assembling mechanism ...
Gerardo Odriozola   +2 more
openaire   +5 more sources

Design on Novel Door Lock Using Minimizing Physical Exposure and Fingerprint Recognition Technology

open access: yesJOIV: International Journal on Informatics Visualization, 2022
Digital door locks are widely used not only in general homes such as houses and apartments, but also in spaces where external intrusion must be prevented based on high security and convenience. Recently, smart door locks with additional technologies such
Seungdo Jeong
doaj   +1 more source

Biometric authentication using fingerprint and keypad for door lock securtiy system [PDF]

open access: yes, 2021
Biometric lock is a lock that uses fingerprint to grant genuine user an access to a building, offices, and laboratory. The purpose of this project is to solve the major problems faced by the conventional lock or electronic combination lock, by adding
Al-Azam, Sharaf Ahmed   +2 more
core   +1 more source

Improvement on the Key Element of Flexible U-Shaped Steel Support and Its Field Applications

open access: yesAdvances in Civil Engineering, 2022
In China, there are a significant numbers of soft rocks roadways in underground coal mines. The roofs of these roadways are generally highly fractured, and traditional bolt installation does not provide sufficient supporting capacity.
Zhili Su   +4 more
doaj   +1 more source

Algorithms for the quantitative Lock/Key model of cytoplasmic incompatibility

open access: yesAlgorithms for Molecular Biology, 2020
Cytoplasmic incompatibility (CI) relates to the manipulation by the parasite Wolbachia of its host reproduction. Despite its widespread occurrence, the molecular basis of CI remains unclear and theoretical models have been proposed to understand the ...
Tiziana Calamoneri   +4 more
doaj   +1 more source

A new model and method for understanding Wolbachia-induced cytoplasmic incompatibility. [PDF]

open access: yesPLoS ONE, 2011
Wolbachia are intracellular bacteria transmitted almost exclusively vertically through eggs. In response to this mode of transmission, Wolbachia strategically manipulate their insect hosts' reproduction.
Benjamin Bossan   +2 more
doaj   +1 more source

The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock

open access: yesSensors, 2009
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module.
Shengyong Li   +5 more
doaj   +1 more source

Investigating Information Dynamics in Living Systems through the Structure and Function of Enzymes. [PDF]

open access: yesPLoS ONE, 2016
Enzymes are proteins that accelerate intracellular chemical reactions often by factors of 105-1012s-1. We propose the structure and function of enzymes represent the thermodynamic expression of heritable information encoded in DNA with post-translational
Robert Gatenby, B Roy Frieden
doaj   +1 more source

CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Logic locking has recently been proposed as a solution for protecting gatelevel semiconductor intellectual property (IP). However, numerous attacks have been mounted on this technique, which either compromise the locking key or restore the original ...
Bicky Shakya   +3 more
doaj   +1 more source

Key-lock pair mechanism for access control using tribes of Farey fractions [PDF]

open access: green, 2000
We propose a new single key-lock mechanism based on the concept of an access control matrix. In this system, each file is given a lock and each user is given a key and through simple operations on keys and locks the user access privilege can be revealed.
H. Chandrashekhar, M. Nagaraj
openalex   +3 more sources

Home - About - Disclaimer - Privacy