Results 71 to 80 of about 593,784 (199)

Exploring Topsnut-Graphical Passwords by Twin Odd-elegant Trees

open access: yesMATEC Web of Conferences, 2017
Graphical passwords are facing a good opportunity as 2-dimension codes are accepted by many people, since it has been applied in mobile devices, electronic equipments with touch screen, and so on.
Wang Hong-yu, Xu Jin, Yao Bing
doaj   +1 more source

Design of an Open-Source Decoder for Educational Escape Rooms

open access: yesIEEE Access, 2019
Escape rooms are a popular recreational activity which involves solving a series of puzzles within a time limit to `escape' the fictional setting they are in. As a fun, collaborative learning activity, escape rooms are increasingly finding their way into
Robert Ross
doaj   +1 more source

The final step of 40S ribosomal subunit maturation is controlled by a dual key lock. [PDF]

open access: yesElife, 2021
Plassart L   +12 more
europepmc   +1 more source

SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL

open access: yesCommIT Journal, 2008
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time.
Indri Neforawati, Hoga Saragih
doaj   +1 more source

A hydrogen beam to characterize the ASACUSA antihydrogen hyperfine spectrometer

open access: yes, 2018
The antihydrogen programme of the ASACUSA collaboration at the antiproton decelerator of CERN focuses on Rabi-type measurements of the ground-state hyperfine splitting of antihydrogen for a test of the combined Charge-Parity-Time symmetry.
Amsler, C.   +21 more
core   +1 more source

Design of intelligent locks based on the triple KeeLoq algorithm

open access: yesAdvances in Mechanical Engineering, 2016
KeeLoq algorithm with high security was usually used in wireless codec. Its security lack is indicated in this article according to the detailed rationale and the introduction of previous attack researches.
Huibin Chen, Jing Liu, Cheng-Fu Yang
doaj   +1 more source

Estimating the herd immunity threshold by accounting for the hidden asymptomatics using a COVID-19 specific model.

open access: yesPLoS ONE, 2020
A quantitative COVID-19 model that incorporates hidden asymptomatic patients is developed, and an analytic solution in parametric form is given.
Shaurya Kaushal   +6 more
doaj   +1 more source

A Welcome Abuse : Notes on Finding Community Through the Battered Book [PDF]

open access: yes, 2006
The book-body and the flesh-body live in tangent. Or such should be the case, if we allow the book to live with us and not under glass, in plastic sleeves, in a safe, under lock and key in a climate-controlled, neutrally lit niche.
Belcham, Andrea
core  

Effect of spin-lock frequency on quantitative myocardial T1ρ mapping

open access: yesInsights into Imaging
Objectives To use T1ρ mapping to assess myocardial fibrosis and to provide a reference for future clinical application, it is necessary to understand the factors influencing T1ρ values.
Caiyun Han   +13 more
doaj   +1 more source

Carbon Lock-In Mechanisms in Transport Infrastructure and Temporal Spatial Dynamics

open access: yesBuildings
The persistent carbon lock-in in transport infrastructure hinders low-carbon transition and sustainable urban development. This study, situated within the context of building energy and systems environments, examines the spatial and temporal dynamics of ...
Yinghui Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy