Lock (firearm)
View article
Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing Open
The newly emergent human virus SARS-CoV-2 is resulting in high fatality rates and incapacitated health systems. Preventing further transmission is a priority. We analysed key parameters of epidemic spread to estimate the contribution of di…
View article
Practical lock-freedom Open
Mutual-exclusion locks are currently the most popular mechanism for interprocess synchronisation, largely due to their apparent simplicity and ease of implementation. In the parallel-computing environments that are increasingly commonplace…
View article
A modelling framework to assess the likely effectiveness of facemasks in combination with ‘lock-down’ in managing the COVID-19 pandemic Open
COVID-19 is characterized by an infectious pre-symptomatic period, when newly infected individuals can unwittingly infect others. We are interested in what benefits facemasks could offer as a non-pharmaceutical intervention, especially in …
View article
A brief study of Wannacry Threat: Ransomware Attack 2017 Open
Recently Ransomware virus software spread like a cyclone winds. A cyclone wind creates atmospheric instability; likewise ransomware creates computer data instability. Every user is moving towards digitization. User keep data secure in his …
View article
Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective Open
Vendor lock-in is a major barrier to the adoption of cloud computing, due to the lack of standardization. Current solutions and efforts tackling the vendor lock-in problem are predominantly technology-oriented. Limited studies exist to ana…
View article
A Simple Planning Problem for COVID-19 Lock-down, Testing, and Tracing Open
We study the optimal lock-down for a planner who controls the fatalities of COVID-19 while minimizing the output costs of the lock-down. The policy prescribes a severe lock-down beginning a few weeks after the outbreak, covering almost 50 …
View article
Experimental Twin-Field Quantum Key Distribution through Sending or Not Sending Open
Channel loss seems to be the most severe limitation on the practical application of long distance quantum key distribution. The idea of twin-field quantum key distribution can improve the key rate from the linear scale of channel loss in t…
View article
Block-And-Lock Strategies to Cure HIV Infection Open
Today HIV infection cannot be cured due to the presence of a reservoir of latently infected cells inducing a viral rebound upon treatment interruption. Hence, the latent reservoir is considered as the major barrier for an HIV cure. So far,…
View article
The overlooked role of discourse in breaking carbon lock‐in: The case of the German energy transition Open
Over the last 15 years, research on carbon lock‐in has investigated why decarbonization evolves so slowly in Western industrialized countries. In this paper, we argue that the role of discourses has been overlooked in the literature on car…
View article
Revisiting carbon lock-in in energy systems: Explaining the perpetuation of coal power in Japan Open
Carbon lock-in hampers the realisation of sustainable energy systems. It occurs when carbon-intensive technologies, markets and institutions co-evolve and become wedded to historical trajectories despite environmentally superior technologi…
View article
Pineapple Peel-Derived Carbon Dots: Applications as Sensor, Molecular Keypad Lock, and Memory Device Open
Herein, the fluorescent carbon dots (CDs) with blue emission were prepared by hydrothermal treatment using pineapple peel as a source of carbon. The as-prepared CDs exhibited turn-Off fluorescence behavior toward Hg2+ and subsequent turn-O…
View article
Reverse Curriculum Generation for Reinforcement Learning Open
Many relevant tasks require an agent to reach a certain state, or to manipulate objects into a desired configuration. For example, we might want a robot to align and assemble a gear onto an axle or insert and turn a key in a lock. These go…
View article
Multiregional single-cell dissection of tumor and immune cells reveals stable lock-and-key features in liver cancer Open
Intratumor heterogeneity may result from the evolution of tumor cells and their continuous interactions with the tumor microenvironment which collectively drives tumorigenesis. However, an appearance of cellular and molecular heterogeneity…
View article
Loneliness and Problematic Internet Use during COVID-19 Lock-Down Open
(1) Background: During the COVID-19 pandemic, strict lock-down and quarantine were widely imposed by most governments to minimize the spread of the virus. Previous studies have investigated the consequences of the quarantine and social iso…
View article
The plurality of values in sustainable agriculture models: diverse lock-in and coevolution patterns Open
In Western economies, several agriculture models coexist. For instance, intensive agriculture organization, which has increased yields while causing major pollution and resource depletion, competes with alternative models, which tackle the…
View article
Psychological impact of mass quarantine on population during pandemics—The COVID-19 Lock-Down (COLD) study Open
Our results suggest a progressively detrimental impact of lockdown on various aspects of psychological health. We noticed around eight to ten fold increase in the prevalence of depression (30.5%) and anxiety (22.4%) during lockdown, as com…
View article
Rational design of a “dual lock-and-key” supramolecular photosensitizer based on aromatic nucleophilic substitution for specific and enhanced photodynamic therapy Open
The “dual lock-and-key” supramolecular photosensitizers enable specific and enhanced photodynamic therapy (PDT).
View article
Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless Entry Systems Open
While most automotive immobilizer systems have been shown to be insecure in the last few years, the security of remote keyless entry systems (to lock and unlock a car) based on rolling codes has received less attention. In this paper, we c…
View article
Ransomware early detection by the analysis of file sharing traffic Open
Crypto ransomware is a type of malware that locks access to user files by encrypting them and demands a ransom in order to obtain the decryption key. This type of malware has become a serious threat for most enterprises. In those cases whe…
View article
Unlocking “lock-in” and path dependency: A review across disciplines and socio-environmental contexts Open
Introduced in the early 2000s, the concept of carbon "lock-in" has been widely adopted by think tanks, academics, and civil society trying to break away from the consequences of fossil-fuel induced carbon emissions and climate change. The …
View article
Time-Lock Puzzles from Randomized Encodings Open
Time-lock puzzles are a mechanism for sending messages "to the future". A sender can quickly generate a puzzle with a solution s that remains hidden until a moderately large amount of time t has elapsed. The solution s should be hidden fro…
View article
Re-examining path dependence in the digital age: The evolution of connected car business models Open
Proliferating digitalization affects the evolution of business models across contexts and challenges firms’ established innovation trajectories. Prior work on organizational path dependence suggests that firms experience decreasing option …
View article
Picking the lock of coordination cage catalysis Open
We provide an overview of coordination cage catalysis, highlighting how mechanistic understanding can help address the challenges in this area leading to new opportunities in non-covalent reactivity.
View article
Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution Open
Fanchao Qi, Yuan Yao, Sophia Xu, Zhiyuan Liu, Maosong Sun. Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: Long P…
View article
COVID-19 epidemic in Malaysia: Impact of lockdown on infection dynamics Open
COVID-19 epidemic in Malaysia started as a small wave of 22 cases in January 2020 through imported cases. It was followed by a bigger wave mainly from local transmissions resulting in 651 cases. The following wave saw unexpectedly three di…
View article
Exploring cysteine regulation in cancer cell survival with a highly specific “Lock and Key” fluorescent probe for cysteine Open
Using a highly specific “lock and key” fluorescent Cys probe, we confirmed that targeting Cys metabolism to deplete intracellular Cys is a more potent strategy to sensitize cancer cells to chemotherapies.
View article
Adiabatically prepared spin‐lock approach for T1ρ‐based dynamic glucose enhanced MRI at ultrahigh fields Open
Purpose Chemical exchange sensitive spin‐lock and related techniques allow to observe the uptake of administered D‐glucose in vivo. The exchange‐weighting increases with the magnetic field strength, but inhomogeneities in the radiofrequenc…
View article
Seizure Prediction and Detection via Phase and Amplitude Lock Values Open
A robust seizure prediction methodology would enable a "closed-loop" system that would only activate as impending seizure activity is detected. Such a system would eliminate ongoing stimulation to the brain, thereby eliminating such side e…
View article
How to build time-lock encryption Open
Time-lock encryption is a method to encrypt a message such that it can only be decrypted after a certain deadline has passed. We propose a novel time-lock encryption scheme, whose main advantage over prior constructions is that even receiv…
View article
Design, synthesis and applications of responsive macrocycles Open
Inspired by the lock and key principle, the development of supramolecular macrocyclic chemistry has promoted the prosperous growth of host-guest chemistry. The updated induced-fit and conformation selection model spurred the emerging resea…