Results 321 to 330 of about 6,402,619 (361)
Some of the next articles are maybe not open access.
The Mathematical Gazette, 1988
A simple lock contains a bolt and one or more levers which are lifted the correct amount by the appropriate key, thus allowing the bolt to be moved in and out. In addition there are often circular obstructions or “wards” to stop some keys being turned in the lock.
openaire +2 more sources
A simple lock contains a bolt and one or more levers which are lifted the correct amount by the appropriate key, thus allowing the bolt to be moved in and out. In addition there are often circular obstructions or “wards” to stop some keys being turned in the lock.
openaire +2 more sources
, 2013
A rare case in the design of a V-shaped polycarboxylate Ni(II)-based chiral coordination polymer from achiral ligands is described. Four metal–organic coordination networks, namely [Ni2(hfdpa)(bpypip)2(H2O)2](bpypip)·2.5H2O (1), [Ni3(Hodpa)2(bpypip)3(H2O)
Jian-Wen Lin+5 more
semanticscholar +1 more source
A rare case in the design of a V-shaped polycarboxylate Ni(II)-based chiral coordination polymer from achiral ligands is described. Four metal–organic coordination networks, namely [Ni2(hfdpa)(bpypip)2(H2O)2](bpypip)·2.5H2O (1), [Ni3(Hodpa)2(bpypip)3(H2O)
Jian-Wen Lin+5 more
semanticscholar +1 more source
The Key–Lock Theory and the Induced Fit Theory
, 1995It is a great pleasure for me to contribute to this symposium honoring the great scientist Emil Fischer. My graduate thesis required me to synthesize [1-14C]glucose, which introduced me to the famous Fischer-Kiliani synthesis of glucose and mannose from ...
D. Koshland
semanticscholar +1 more source
SecEd, 2005
When exam papers are stolen or there are accusations of cheating, the security of Britain's exam system comes under scrutiny. Gary Ward explains how exam board Edexcel keeps its examination process secure
openaire +2 more sources
When exam papers are stolen or there are accusations of cheating, the security of Britain's exam system comes under scrutiny. Gary Ward explains how exam board Edexcel keeps its examination process secure
openaire +2 more sources
Lock and key model system [PDF]
The lock and key concept is important for various biological and colloidal self-assembly processes. We study the basic and common underlying mechanisms within a model system which consists of a biaxial elliptical key immersed in a hard-sphere solvent and a smooth lock substrate into which the key can fit geometrically.
Roland Roth+3 more
openaire +1 more source
Keys for Locks in Administrative Argument
Administration & Society, 1994Developments in public administration are better understood as rhetorical rather than scientific in Herbert Simon's meaning. Administrative arguments succeed by using the six keys to acceptance of classical rhetoric: symmetry, metaphor, ambiguity, private interest presented as public good, selective use of information, and suspension of disbelief To ...
Michael Jackson, Christopher Hood
openaire +2 more sources
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial
IEEE Trans. Software Eng., 1989A single-key-lock (SKL) mechanism used for implementing the access matrix of a computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively using the Newton interpolating polynomial.
C. Laih, L. Harn, Jau-Yien Lee
semanticscholar +1 more source
, 2016
The present work demonstrates a new fully regenerative, molecular machine-like “ON-OFF-ON” chemosensor based on a β-carboline molecule “OFF-ON-OFF” cycle.
Suvendu Paul+5 more
semanticscholar +1 more source
The present work demonstrates a new fully regenerative, molecular machine-like “ON-OFF-ON” chemosensor based on a β-carboline molecule “OFF-ON-OFF” cycle.
Suvendu Paul+5 more
semanticscholar +1 more source
A Binary Single-Key-Lock System for Access Control
IEEE Trans. Computers, 1989A binary coding method was invented and has been applied to the single-key-lock (SKL) system which achieves access control by associating with each accesser only one key and with each resource only one lock. The new system is called the binary single-key-
Carl K. Chang, T. Jiang
semanticscholar +1 more source
Journal of Computer Science and Technology, 1987
Access control is one of the sezious problems in modern information system. In this paper we suggest a key-lock strategy to represent the privilege relationship involving linear transformations and nonlinear conetraints. The implementation shows that this strategy has got the properties of security, and information hidden, and satisfies the least ...
Jian Liu, Guoxiang Huang
openaire +2 more sources
Access control is one of the sezious problems in modern information system. In this paper we suggest a key-lock strategy to represent the privilege relationship involving linear transformations and nonlinear conetraints. The implementation shows that this strategy has got the properties of security, and information hidden, and satisfies the least ...
Jian Liu, Guoxiang Huang
openaire +2 more sources