Results 31 to 40 of about 6,742,422 (376)

The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock

open access: yesSensors, 2009
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module.
Shengyong Li   +5 more
doaj   +1 more source

A new model and method for understanding Wolbachia-induced cytoplasmic incompatibility. [PDF]

open access: yesPLoS ONE, 2011
Wolbachia are intracellular bacteria transmitted almost exclusively vertically through eggs. In response to this mode of transmission, Wolbachia strategically manipulate their insect hosts' reproduction.
Benjamin Bossan   +2 more
doaj   +1 more source

Investigating Information Dynamics in Living Systems through the Structure and Function of Enzymes. [PDF]

open access: yesPLoS ONE, 2016
Enzymes are proteins that accelerate intracellular chemical reactions often by factors of 105-1012s-1. We propose the structure and function of enzymes represent the thermodynamic expression of heritable information encoded in DNA with post-translational
Robert Gatenby, B Roy Frieden
doaj   +1 more source

ISGylation – a key to lock the cell gates for preventing the spread of threats [PDF]

open access: bronzeJournal of Cell Science, 2017
Carolina Villarroya‐Beltri   +2 more
openalex   +2 more sources

CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Logic locking has recently been proposed as a solution for protecting gatelevel semiconductor intellectual property (IP). However, numerous attacks have been mounted on this technique, which either compromise the locking key or restore the original ...
Bicky Shakya   +3 more
doaj   +1 more source

Biometric authentication using fingerprint and keypad for door lock securtiy system [PDF]

open access: yes, 2021
Biometric lock is a lock that uses fingerprint to grant genuine user an access to a building, offices, and laboratory. The purpose of this project is to solve the major problems faced by the conventional lock or electronic combination lock, by adding
Al-Azam, Sharaf Ahmed   +2 more
core   +1 more source

OLIA: An open-source digital lock-in amplifier

open access: yesFrontiers in Sensors, 2023
The Open Lock-In Amplifier (OLIA) is a microcontroller-based digital lock-in amplifier built from a small number of inexpensive and easily sourced electronic components.
Andrew J. Harvie   +2 more
doaj   +1 more source

Evolving the lock to fit the key to create a family of G protein-coupled receptors potently activated by an inert ligand

open access: greenProceedings of the National Academy of Sciences of the United States of America, 2007
Blaine N. Armbruster   +4 more
openalex   +2 more sources

DeepKey: Towards End-to-End Physical Key Replication From a Single Photograph [PDF]

open access: yes, 2018
This paper describes DeepKey, an end-to-end deep neural architecture capable of taking a digital RGB image of an 'everyday' scene containing a pin tumbler key (e.g.
Alex Krizhevsky   +4 more
core   +3 more sources

Design and Implementation of Intelligent Entrance Guard Lock Based on NB-IoT

open access: yesNantong Daxue xuebao. Ziran kexue ban, 2020
The key of conventional mechanical lock is easy to be lost and duplicated; the password entrance guard lock shares similar problems, like the high possibility of leaking and forgetting the password; the entrance guard lock based on Wi-Fi is limited by ...
ZHANG Tianqi;WANG Jin;LI Yuehua
doaj   +1 more source

Home - About - Disclaimer - Privacy