Search

Your search keyword '"Record locking"' showing total 6,520 results

Search Constraints

Start Over You searched for: Descriptor "Record locking" Remove constraint Descriptor: "Record locking"
6,520 results on '"Record locking"'

Search Results

1. An intelligent sensing and detection system for accident preventions in four wheeler vehicles

2. 'Dual-Lock-Dual-Key' Controlled Second Near-Infrared Molecular Probe for Specific Discrimination of Orthotopic Colon Cancer and Imaging-Guided Tumor Excision

3. Research progress of space non-pyrotechnic low-shock connection and separation technology (SNLT): A review

4. Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices

5. Duplicacy: A New Generation of Cloud Backup Tool Based on Lock-Free Deduplication

6. Digitally Assisted Mixed-Signal Circuit Security

7. Bifurcation analysis of dual-sidestay landing gear locking performance considering joint clearance

8. RAPID: A real time commit protocol

9. Locking Down Gender Roles? A Time-Use Perspective on Gender Division of Household Labour during the COVID-19 Pandemic Lockdown in Belgium

10. When to Lock the Volatile Input Price? Procurement of Commodity Components Under Different Pricing Schemes

11. Ensuring Consistent Transactions in a Web Service Environment With Prediction-Based Performance Metrics

12. Three-Dimensional Cell Printed Lock-Key Structure for Oral Soft and Hard Tissue Regeneration

13. Application of factor analysis in the determination of vapor lock tendency in aviation gasolines/motor gasoline/blends and the compatibility as alternatives in naturally aspirated aviation engines

14. A Human-Like Dual-Forklift Collaborative Mechanism for Container Handling

15. A high dynamics algorithm based on steepest ascent method for GNSS receiver

16. BANDHA (Inner Lock)-MUDRA (Hand Gesture): Essences of Optimizing Health

18. 2D Fingerprinting-Based Localization for mmWave Cell-Free Massive MIMO Systems

19. Mathematical modelling of COVID-19: A case study of Italy

20. A start-up journey in bionic prosthetics and virtual therapy

21. The DESIGN AND DEVELOPMENT OF EFFECTIVE DISTANCE MEASUREMENT ON BOLAWRAP EQUIPMENT PERSONNEL IN PERFORMING TASKS

23. Sistem Pintu Otomatis Menggunakan E-KTP Berbasis Internet of Things (IoT) pada Kamar Hotel

24. QuickSilver: modeling and parameterized verification for distributed agreement-based systems

25. COVID-19 Lockdown and work life balance

26. Fusing GNSS/INS/Vision With A Priori Feature Map for High-Precision and Continuous Navigation

27. Impact of Sleepy Stack MOSFETs in CS-VCO on Phase Noise and Lock Performance of PLL

28. IoT Based Secure Lock/Unlock System Using Google Assistant Based English And French Languages

29. Managing ship lock congestion in an inland waterway: A bottleneck model with a service time window

30. Maximum feasibility estimation

31. 2-Nitro- and 4-fluorocinnamaldehyde based receptors as naked-eye chemosensors to potential molecular keypad lock

33. Optimization and numerical investigation of an excavator carrier

35. Light Trapping Reveals Multiple Bigheaded Carp Spawns Upstream of Lock and Dam 19 in the Upper Mississippi River

36. Solution of a pollution sensitive EOQ model under fuzzy lock leadership game approach

37. Radio Frequency Identification System and IoT based Tech Genix Lock

38. Deep spatio-temporal emotion analysis of geo-tagged tweets for predicting location based communal emotion during COVID-19 Lock-down

39. The lock pickers, the gatekeepers, and the non-grievables: a case study of youth workers’ roles in preventing violent extremism

40. 'Maids Turn’d Bottels' in the Rape of the Lock: A Reconsideration

41. Integration Design of Micro-Electro-Mechanical Encryption System

42. Quantum Computing

44. IPO lock-up: a review and assessment

45. A Simple Planning Problem for COVID-19 Lock-down, Testing, and Tracing

46. On the implementation of memory reclamation methods in a lock-free hash trie design

47. Rancang Bangun Sistem Smart Locker Menggunakan Voice Access Berbasis Arduino Mega

48. Negative Home Equity and Household Labor Supply

49. LEVER: Secure Deduplicated Cloud Storage With Encrypted Two-Party Interactions in Cyber--Physical Systems

50. SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking

Catalog

Books, media, physical & digital resources