Showing 61 - 80 results of 747 for search 'security root', query time: 0.07s Refine Results
  1. 61

    Effect of partial-extreme root restriction and nutrient solution concentration on the performance of hydroponically grown tomato by Alex Williams Ayarna, Satoru Tsukagoshi, Henry Ofosuhene Sintim, Jacob Ulzen, J. Naalamle Amissah, Musa Bukari, Samuel Aduse Poku, Michiko Takagaki, Na Lu, Samuel Adjei-Nsiah, George Oduro Nkansah

    Published 2025-08-01
    “…The study evaluated the impact of partial-extreme root restriction and no root restriction on the performance of Jaguar tomato cultivar in two different nutrient solution concentrations: standard (2.4 dS m-1) and half concentration (1.2 dS m-1). …”
    Get full text
    Article
  2. 62

    An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks by Fahad Alotaibi, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan, Abhishek Rangi

    Published 2024-09-01
    “…We investigate common cybersecurity vulnerabilities and find that the bare machine computing (BMC) paradigm is a possible solution to address and eliminate their root causes at many levels. We study 22 common cyberattacks, identify their root causes, and investigate preventive mechanisms currently used to address them. …”
    Get full text
    Article
  3. 63

    Evaluating the network security by the Read<sub>W</sub>rite transition model by LU Zhi-yong1, 2, FENG Chao1, YU Hui2

    Published 2010-01-01
    “…Based on the transition model,the network security state transition machine and the network security evaluation model were designed. …”
    Get full text
    Article
  4. 64

    BankNet: Real-Time Big Data Analytics for Secure Internet Banking by Kaushik Sathupadi, Sandesh Achar, Shinoy Vengaramkode Bhaskaran, Nuruzzaman Faruqui, Jia Uddin

    Published 2025-01-01
    “…Its scalability and precision make it a transformative tool for enhancing security and trust in financial services.…”
    Get full text
    Article
  5. 65

    Challenges of Urban Water Security and Drivers of Water Scarcity in Kathmandu Valley, Nepal by Namita Poudel, Rajib Shaw

    Published 2025-02-01
    “…Water security and quality are among the six focal areas of the Eighth Phase of the International Hydrological Program. …”
    Get full text
    Article
  6. 66
  7. 67

    Cuba y seguridad sanitaria mundial: Cuba’s role in global health security by Clare Wenham, Sonja K Kittelsen

    Published 2020-05-01
    “…We argue that Cuba demonstrates a strong health security capacity, both in terms of its health systems support and crisis response activities internationally, and its domestic disease control activities rooted in an integrated health system with a focus on universal healthcare. …”
    Get full text
    Article
  8. 68

    Combined application of vermicompost and mineral K fertilizer improves root yield of sweet potato [Ipomoea batatas (L.) Lam] in Southern Ethiopia by Alemu Degwale, Geletaw Kebede, Ashenafi Woldeselassie, Fanuel Laekemariam

    Published 2025-02-01
    “…Farmers apply little or no fertilizer to sweet potatoes leading to lower root yield (8 t ha−1) compared with 60 t ha−1 in research fields. …”
    Get full text
    Article
  9. 69
  10. 70
  11. 71
  12. 72

    Exploring dentists’ experiences of endodontic file fracture during root canal treatment: a phenomenological study by Mohammad Rastegar Khosravi, Zhina Banafshi, Rayan Ebrahimi, Rostam Jalali

    Published 2025-07-01
    “…Abstract Objectives File fracture represents a common and occasionally unavoidable occurrence during root canal procedures, carrying substantial negative implications for dental practitioners. …”
    Get full text
    Article
  13. 73

    Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems by Qihong Yu

    Published 2025-07-01
    “…Although ADS-B has adopted many security measures, it also faces some security risks such as eavesdropping, message deletion, message injection, and denial of service. …”
    Get full text
    Article
  14. 74

    Crimes in the Age of Artificial Intelligence: a Hybrid Approach to Liability and Security in the Digital Era by N. Bhatt

    Published 2025-03-01
    “…The author hypothesizes that the hybrid application of these legal mechanisms can become the basis for an effective regulatory system under the rapid technological development.Methods: the research includes a comprehensive approach based on the PESTEL analysis (political, economic, social, technological, environmental and legal factors), the “five whys” root cause analysis, and cases from various countries. …”
    Get full text
    Article
  15. 75

    Exploring the Root Causes of Low Household Income among Smallholder Farmers in Kamuli District, Busoga Region, Uganda. by Lubaale, Ronald Gideon, Ocan, Johnson, Adyanga, Francis Akena

    Published 2024
    “…Collaboration among stakeholders was essential to implement effective solutions and promote sustainable development in agricultural communities. By addressing the root causes of low household income, this study sought to contribute to poverty reduction and food security in Kamuli District and beyond.…”
    Get full text
    Article
  16. 76
  17. 77

    Leveraging social media for eco-education: home gardening for climate resilience and food security by Frank Yeboah Adusei, Yaw Asamoah Akowuah, Frank Kwekucher Ackah, Loy Van Crowder, Edmond Yeboah Nyamah, Mary Michael Lipford Zahed

    Published 2025-03-01
    “…The focus is on leveraging social media platforms like Facebook, specifically the Home Gardening, Ghana (HGG) initiative, to address challenges related to food security, urbanization, and climate resilience. HGG has deep cultural and environmental roots, providing significant contributions to food security and biodiversity conservation. …”
    Get full text
    Article
  18. 78

    Piracy in the Gulf of Guinea and the Role of African Regional Organisations in Ensuring Security of Maritime Shipping by ZHAMBIKOV Alexander Мunirovich

    Published 2023-12-01
    “…Nevertheless, if control over waters of the Gulf of Guinea is weakened, piracy may resurge, because its social and economic roots still exist.…”
    Get full text
    Article
  19. 79

    Optimal Planting Density of Taraxacum kok-saghyz Bred for Large Root Size: Seed, Latex, and Rubber Yields by Nathaniel P. King-Smith, Valerie M. Anderson, Aswathy Sasidharan Pillai, Judit E. Puskas, Katrina Cornish

    Published 2025-03-01
    “…The rubber dandelion, Taraxacum kok-saghyz (TK), produces similar quality natural rubber (NR) to Hevea but can be grown in temperate regions and could supplement the global supply chain, providing NR security to countries relying on imports. This study examines the effect of planting density on yield parameters uniquely using an advanced rubber dandelion accession bred for large root size in the field for eight generations. …”
    Get full text
    Article
  20. 80

    Comparison of antioxidant, β-carotene, and phenolic levels between roots and leaves across three popular sweet potato (Ipomoea batatas L.) varieties by Kaitlyn Laura Hapke, Muhammad Abul Kalam Azad, Tasbida Sultana, Shahidul Islam

    Published 2025-02-01
    “…The total antioxidant activity was more significant in the leaves than in the roots, with the leaf activity nearly doubling the roots. …”
    Get full text
    Article