Results 31 to 40 of about 6,638,555 (335)
A new model and method for understanding Wolbachia-induced cytoplasmic incompatibility. [PDF]
Wolbachia are intracellular bacteria transmitted almost exclusively vertically through eggs. In response to this mode of transmission, Wolbachia strategically manipulate their insect hosts' reproduction.
Benjamin Bossan +2 more
doaj +1 more source
Investigating Information Dynamics in Living Systems through the Structure and Function of Enzymes. [PDF]
Enzymes are proteins that accelerate intracellular chemical reactions often by factors of 105-1012s-1. We propose the structure and function of enzymes represent the thermodynamic expression of heritable information encoded in DNA with post-translational
Robert Gatenby, B Roy Frieden
doaj +1 more source
CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme
Logic locking has recently been proposed as a solution for protecting gatelevel semiconductor intellectual property (IP). However, numerous attacks have been mounted on this technique, which either compromise the locking key or restore the original ...
Bicky Shakya +3 more
doaj +1 more source
Biometric authentication using fingerprint and keypad for door lock securtiy system [PDF]
Biometric lock is a lock that uses fingerprint to grant genuine user an access to a building, offices, and laboratory. The purpose of this project is to solve the major problems faced by the conventional lock or electronic combination lock, by adding
Al-Azam, Sharaf Ahmed +2 more
core +1 more source
DeepKey: Towards End-to-End Physical Key Replication From a Single Photograph [PDF]
This paper describes DeepKey, an end-to-end deep neural architecture capable of taking a digital RGB image of an 'everyday' scene containing a pin tumbler key (e.g.
Alex Krizhevsky +4 more
core +2 more sources
OLIA: An open-source digital lock-in amplifier
The Open Lock-In Amplifier (OLIA) is a microcontroller-based digital lock-in amplifier built from a small number of inexpensive and easily sourced electronic components.
Andrew J. Harvie +2 more
doaj +1 more source
Design and Implementation of Intelligent Entrance Guard Lock Based on NB-IoT
The key of conventional mechanical lock is easy to be lost and duplicated; the password entrance guard lock shares similar problems, like the high possibility of leaking and forgetting the password; the entrance guard lock based on Wi-Fi is limited by ...
ZHANG Tianqi;WANG Jin;LI Yuehua
doaj +1 more source
Background Springtails have the ability to jump using morphological structures consisting of a catapult, the furca, and a latching system constructed with interaction of the retinaculum and the dens lock.
Birk Rillich, Fábio G. L. Oliveira
doaj +1 more source
Design, Detection and Management of Mechanical Security Code Manhole Cover
In this paper, the researches and the application of manhole over as well as the existing problems have been described. The mechanical security code manhole cover with the built-in locking mechanism has been designed.
Su Zhonghua +4 more
doaj +1 more source
Binding affinity is a fundamental parameter in drug design, describing the strength of the interaction between a molecule and its target protein. Accurately predicting binding affinity is crucial for the rapid development of novel therapeutics, the ...
D. Spassov
semanticscholar +1 more source

