Results 51 to 60 of about 593,784 (199)
Most of Safes lock system is still using conventional methods nowadays. The conventional method leads to the safes’ burglary. Some of the causes are the safes’ code that can be tracked easily and the key can be duplicated.
Muhammad Rofiq, Bambang Tri Wahjo Utomo
doaj +1 more source
Experimentally realizable quantum comparison of coherent states and its applications [PDF]
When comparing quantum states to each other, it is possible to obtain an unambiguous answer, indicating that the states are definitely different, already after a single measurement. In this paper we investigate comparison of coherent states, which is the
B. Schneier +11 more
core +2 more sources
Research on Draft Control Optimization of Ship Passing a Lock Based on CFD Method
Waterborne transportation serves as a critical pillar of trunk-line freight systems, offering unparalleled advantages in transport capacity, energy efficiency, and cost-effectiveness. As cargo throughput demands escalate, optimizing lock capacity becomes
Yuan Zhuang +3 more
doaj +1 more source
Uncovering noisy social signals: Using optimization methods from experimental physics to study social phenomena. [PDF]
Due to the ubiquitous presence of treatment heterogeneity, measurement error, and contextual confounders, numerous social phenomena are hard to study. Precise control of treatment variables and possible confounders is often key to the success of studies ...
Maurits Kaptein +2 more
doaj +1 more source
The Extravagance of Imprisonment Revisited [PDF]
This report analyzes prison and jail populations in the US as a whole and in four key states -- California, Florida, New York, and Texas -- to determine 1) how many prisoners are nonserious offenders and what it costs to lock them up, 2) what proven ...
Barry A. Krisberg +3 more
core
Key Generation for Hardware Obfuscation Using Strong PUFs
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir +1 more
doaj +1 more source
Safe and smooth through a shallow fairway [PDF]
Since the ever growing dimensions of all vessel types coming to the Flemish harbours which started in the mid 80’s of last century, the research at Flanders Hydraulics Research, a laboratory belonging to the Flemish Government, concerning harbour ...
Eloot, Katrien, Lataire, Evert
core +1 more source
Two-beam nonlinear Kerr effect to stabilize laser frequency with sub-Doppler resolution
Avoiding laser frequency drifts is a key issue in many atomic physics experiments. Several techniques have been developed to lock the laser frequency using sub-Doppler dispersive atomic lineshapes as error signals in a feedback loop.
Ackemann +9 more
core +1 more source
Lessons from Love-Locks: The archaeology of a contemporary assemblage [PDF]
This document is the Accepted Manuscript version. The final, definitive version of this paper has been published in Journal of Material Culture, November 2017, published by SAGE Publishing, All rights reserved.Loss of context is a challenge, if not the ...
Bord J +31 more
core +2 more sources
Molecular Docking: From Lock and Key to Combination Lock
Accurate modeling of protein ligand binding is an important step in structure-based drug design, is a useful starting point for finding new lead compounds or drug candidates. The 'Lock and Key' concept of protein-ligand binding has dominated descriptions of these interactions, and has been effectively translated to computational molecular docking ...
Ashutosh, Tripathi, Vytas A, Bankaitis
openaire +2 more sources

