Results 71 to 80 of about 6,293,788 (277)
Silences in the boom: coal seam gas, neoliberalizing discourse, and the future of regional Australia
In high-stakes resource use struggles currently playing out across the world, different beliefs about economics and "growth-first" regional development underpin decisions and dynamics that have far-reaching consequences.
Alexandra Mercer+2 more
doaj +1 more source
Carbon Lock-In and Contradictions—Applied Guide to Academic Teaching of Mexico’s Energy Transition
The energy sector plays an important role in Mexico’s development trajectory. Mexico makes an interesting case study because it shows how difficult it is to reduce fossil energy dependence despite geographic and climatic conditions that favour renewable ...
Ariel Macaspac Hernandez+2 more
doaj +1 more source
A New PUF Based Lock and Key Solution for Secure In-Field Testing of Cryptographic Chips
Scan-based side-channel attacks have become a new threat to cryptographic chips. Existing countermeasures require a secret test key to unlock the scan chain before in-field testing is allowed.
Aijiao Cui+3 more
semanticscholar +1 more source
Monolithically integrated circuits for Optical injection locking of ring lasers with QKD and QPSK applications [PDF]
Optical injection locking of integrated ring lasers promises to be a key technology of the future, but it is still lacking experimental verification. In this paper we present two monolithically integrated photonic circuits that experimentally realize Optically injection locking of ring lasers.
arxiv
Secure electronic lock using pic 16f628a microcontroller [PDF]
The proposed system implements the electronic embedded lock, its provides a great benefit over traditional lock, which use the manual key, so if the key lost or theft then anybody could open the lock, while thieving or losing the long and complex password is harder compare to traditional key, furthermore combining both manual key with computerized ...
arxiv +1 more source
Colloids with key-lock interactions: non-exponential relaxation, aging and anomalous diffusion
The dynamics of particles interacting by key-lock binding of attached biomolecules are studied theoretically. Experimental realizations of such systems include colloids grafted with complementary single-stranded DNA (ssDNA), and particles grafted with ...
Alexei V. Tkachenko+3 more
core +1 more source
Theoretical Aspects of Molecular Recognition [PDF]
Molecular recognition is a key process in non-covalent interactions, which determines, among others, host-guest complexation, drug action and protein-protein interaction. A simple and attractive formulation is the lock-and-key analogy defining the host
Harmat, Veronika, Náray-Szabó, Gábor
core +1 more source
Most of Safes lock system is still using conventional methods nowadays. The conventional method leads to the safes’ burglary. Some of the causes are the safes’ code that can be tracked easily and the key can be duplicated.
Muhammad Rofiq, Bambang Tri Wahjo Utomo
doaj +1 more source
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators [PDF]
Logic locking has been proposed to safeguard intellectual property (IP) during chip fabrication. Logic locking techniques protect hardware IP by making a subset of combinational modules in a design dependent on a secret key that is withheld from untrusted parties.
arxiv