Results 51 to 60 of about 593,784 (199)

IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID

open access: yesJurnal Ilmiah Informatika, 2016
Most of Safes lock system is still using conventional methods nowadays. The conventional method leads to the safes’ burglary. Some of the causes are the safes’ code that can be tracked easily and the key can be duplicated.
Muhammad Rofiq, Bambang Tri Wahjo Utomo
doaj   +1 more source

Experimentally realizable quantum comparison of coherent states and its applications [PDF]

open access: yes, 2006
When comparing quantum states to each other, it is possible to obtain an unambiguous answer, indicating that the states are definitely different, already after a single measurement. In this paper we investigate comparison of coherent states, which is the
B. Schneier   +11 more
core   +2 more sources

Research on Draft Control Optimization of Ship Passing a Lock Based on CFD Method

open access: yesJournal of Marine Science and Engineering
Waterborne transportation serves as a critical pillar of trunk-line freight systems, offering unparalleled advantages in transport capacity, energy efficiency, and cost-effectiveness. As cargo throughput demands escalate, optimizing lock capacity becomes
Yuan Zhuang   +3 more
doaj   +1 more source

Uncovering noisy social signals: Using optimization methods from experimental physics to study social phenomena. [PDF]

open access: yesPLoS ONE, 2017
Due to the ubiquitous presence of treatment heterogeneity, measurement error, and contextual confounders, numerous social phenomena are hard to study. Precise control of treatment variables and possible confounders is often key to the success of studies ...
Maurits Kaptein   +2 more
doaj   +1 more source

The Extravagance of Imprisonment Revisited [PDF]

open access: yes, 2010
This report analyzes prison and jail populations in the US as a whole and in four key states -- California, Florida, New York, and Texas -- to determine 1) how many prisoners are nonserious offenders and what it costs to lock them up, 2) what proven ...
Barry A. Krisberg   +3 more
core  

Key Generation for Hardware Obfuscation Using Strong PUFs

open access: yesCryptography, 2019
As a result of the increased use of contract foundries, intellectual property (IP) theft, excess production and reverse engineering are major concerns for the electronics and defense industries.
Md Shahed Enamul Quadir   +1 more
doaj   +1 more source

Safe and smooth through a shallow fairway [PDF]

open access: yes, 2010
Since the ever growing dimensions of all vessel types coming to the Flemish harbours which started in the mid 80’s of last century, the research at Flanders Hydraulics Research, a laboratory belonging to the Flemish Government, concerning harbour ...
Eloot, Katrien, Lataire, Evert
core   +1 more source

Two-beam nonlinear Kerr effect to stabilize laser frequency with sub-Doppler resolution

open access: yes, 2012
Avoiding laser frequency drifts is a key issue in many atomic physics experiments. Several techniques have been developed to lock the laser frequency using sub-Doppler dispersive atomic lineshapes as error signals in a feedback loop.
Ackemann   +9 more
core   +1 more source

Lessons from Love-Locks: The archaeology of a contemporary assemblage [PDF]

open access: yes, 2017
This document is the Accepted Manuscript version. The final, definitive version of this paper has been published in Journal of Material Culture, November 2017, published by SAGE Publishing, All rights reserved.Loss of context is a challenge, if not the ...
Bord J   +31 more
core   +2 more sources

Molecular Docking: From Lock and Key to Combination Lock

open access: yesJournal of Molecular Medicine and Clinical Applications, 2018
Accurate modeling of protein ligand binding is an important step in structure-based drug design, is a useful starting point for finding new lead compounds or drug candidates. The 'Lock and Key' concept of protein-ligand binding has dominated descriptions of these interactions, and has been effectively translated to computational molecular docking ...
Ashutosh, Tripathi, Vytas A, Bankaitis
openaire   +2 more sources

Home - About - Disclaimer - Privacy