DeepKey: Towards End-to-End Physical Key Replication From a Single Photograph [PDF]
This paper describes DeepKey, an end-to-end deep neural architecture capable of taking a digital RGB image of an 'everyday' scene containing a pin tumbler key (e.g.
Alex Krizhevsky +4 more
core +3 more sources
OLIA: An open-source digital lock-in amplifier
The Open Lock-In Amplifier (OLIA) is a microcontroller-based digital lock-in amplifier built from a small number of inexpensive and easily sourced electronic components.
Andrew J. Harvie +2 more
doaj +1 more source
Background Springtails have the ability to jump using morphological structures consisting of a catapult, the furca, and a latching system constructed with interaction of the retinaculum and the dens lock.
Birk Rillich, Fábio G. L. Oliveira
doaj +1 more source
Biometric authentication using fingerprint and keypad for door lock securtiy system [PDF]
Biometric lock is a lock that uses fingerprint to grant genuine user an access to a building, offices, and laboratory. The purpose of this project is to solve the major problems faced by the conventional lock or electronic combination lock, by adding
Al-Azam, Sharaf Ahmed +2 more
core +1 more source
Design and Implementation of Intelligent Entrance Guard Lock Based on NB-IoT
The key of conventional mechanical lock is easy to be lost and duplicated; the password entrance guard lock shares similar problems, like the high possibility of leaking and forgetting the password; the entrance guard lock based on Wi-Fi is limited by ...
ZHANG Tianqi;WANG Jin;LI Yuehua
doaj +1 more source
Design, Detection and Management of Mechanical Security Code Manhole Cover
In this paper, the researches and the application of manhole over as well as the existing problems have been described. The mechanical security code manhole cover with the built-in locking mechanism has been designed.
Su Zhonghua +4 more
doaj +1 more source
Sterically stabilized lock and key colloids: A self-consistent field theory study
A self-consistent field theory study of lock and key type interactions between sterically stabilized colloids in polymer solution is performed. Both the key particle and the lock cavity are assumed to have cylindrical shape, and their surfaces are ...
Fleer G. J., S. A. Egorov
core +1 more source
Non-destructive lock-picking of a historical treasure chest by means of X-ray computed tomography.
An innovative approach to a non-destructive lock mechanism examination by means of X-ray computed tomography (CT) was involved in a careful opening of a locked 19th century chest missing the key, as an interdisciplinary cooperation with the restorers. In
Eva Zikmundová +3 more
doaj +1 more source
Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the
Gottesman +6 more
core +1 more source
Heterogeneous and rate-dependent streptavidin-biotin unbinding revealed by high-speed force spectroscopy and atomistic simulations [PDF]
Receptor-ligand interactions are essential for biological function and their binding strength is commonly explained in terms of static lock-and-key models based on molecular complementarity.
Gonzalez, Laura +4 more
core +4 more sources

