Results 51 to 60 of about 6,262,520 (375)

Biometric authentication using fingerprint and keypad for door lock securtiy system [PDF]

open access: yes, 2021
Biometric lock is a lock that uses fingerprint to grant genuine user an access to a building, offices, and laboratory. The purpose of this project is to solve the major problems faced by the conventional lock or electronic combination lock, by adding
Al-Azam, Sharaf Ahmed   +2 more
core   +1 more source

Flexural Behavior of Bidirectionally Graded Lattice

open access: yesAdvanced Engineering Materials, EarlyView., 2023
An experimental study of the bending behavior of bidirectional body‐centered cubic lattice beams is conducted in comparison to uniform and unidirectional counterparts of electron beam melted SS 316 L. Experimental results are used to develop and validate a finite element model which is subsequently used to conduct parametric studies to assess the ...
Chamini Rodrigo   +4 more
wiley   +1 more source

Development of “dual-key-and-lock” responsive probes for biosensing and imaging

open access: yesNew Journal of Chemistry, 2020
Recent advances in the development of “dual-key-and-lock” responsive probes for accurate detection of various biomolecules are reviewed.
Huan Feng   +3 more
semanticscholar   +1 more source

Architected Lattices with a Topological Transition

open access: yesAdvanced Engineering Materials, EarlyView., 2023
This article develops topological metamaterials showing multidirectional two‐step deformation under compression by embedding contact‐enabled topological mechanisms into lattice structures. Experiments on 3D‐printed 2D and 3D lattices and finite element simulations are conducted to demonstrate the working principle of the topological metamaterials.
Shivam Agarwal, Lihua Jin
wiley   +1 more source

On latches in biological systems: a comparative morphological and functional study of the retinaculum and the dens lock in Collembola

open access: yesFrontiers in Zoology, 2023
Background Springtails have the ability to jump using morphological structures consisting of a catapult, the furca, and a latching system constructed with interaction of the retinaculum and the dens lock.
Birk Rillich, Fábio G. L. Oliveira
doaj   +1 more source

OLIA: An open-source digital lock-in amplifier

open access: yesFrontiers in Sensors, 2023
The Open Lock-In Amplifier (OLIA) is a microcontroller-based digital lock-in amplifier built from a small number of inexpensive and easily sourced electronic components.
Andrew J. Harvie   +2 more
doaj   +1 more source

Design, Detection and Management of Mechanical Security Code Manhole Cover

open access: yesMATEC Web of Conferences, 2018
In this paper, the researches and the application of manhole over as well as the existing problems have been described. The mechanical security code manhole cover with the built-in locking mechanism has been designed.
Su Zhonghua   +4 more
doaj   +1 more source

Non-destructive lock-picking of a historical treasure chest by means of X-ray computed tomography.

open access: yesPLoS ONE, 2020
An innovative approach to a non-destructive lock mechanism examination by means of X-ray computed tomography (CT) was involved in a careful opening of a locked 19th century chest missing the key, as an interdisciplinary cooperation with the restorers. In
Eva Zikmundová   +3 more
doaj   +1 more source

Lock-Free Locks Revisited [PDF]

open access: yesarXiv, 2022
This paper presents a new and practical approach to lock-free locks based on helping, which allows the user to write code using fine-grained locks, but run it in a lock-free manner. Although lock-free locks have been suggested in the past, they are widely viewed as impractical, have some key limitations, and, as far as we know, have never been ...
arxiv  

Robust quantum data locking from phase modulation [PDF]

open access: yesPhysical Review A vol. 90, no. 2, page 022326, August 2014, 2013
Quantum data locking is a unique quantum phenomenon that allows a relatively short key to (un)lock an arbitrarily long message encoded in a quantum state, in such a way that an eavesdropper who measures the state but does not know the key has essentially no information about the encrypted message. The application of quantum data locking in cryptography
arxiv   +1 more source

Home - About - Disclaimer - Privacy