Showing 81 - 100 results of 747 for search 'security root', query time: 0.08s Refine Results
  1. 81

    Decentralized storage technology of network information security level secret key of distribution automation terminal by Jin Yi, Weijie Huang, Lianghao Huang, Guozheng Huang, Guangyong Zheng, Yongle Li

    Published 2025-05-01
    “…This technology utilizes a linear geometric hierarchical management scheme, manages keys through a key derivation tree structure, and encompasses the construction of key derivation trees, secure storage of root keys, and key exchange protocols to achieve effective distribution of keys in the network. …”
    Get full text
    Article
  2. 82

    Understanding food security determinants and coping strategies among smallholder farming households in Northern Ethiopia by Misgina Gebrehiwot, Biadgilgn Demisse, Hailemariam Meaza, Tafesse W. Gezahegn, Aradom Gebrekidan Abbay, Sisay Beyene

    Published 2024-12-01
    “…The findings suggest the need for more sustainable solutions to address the root causes of food insecurity, such as improving agricultural productivity through high-quality crop varieties and agricultural technologies, enhanced access to education, financial and market services and strengthening social safety nets to improve food security among smallholder farmers in northern Ethiopia.…”
    Get full text
    Article
  3. 83
  4. 84

    Assessing the moderating role of technological innovation on food security in poverty reduction within the Visegrad region by Kwabena Nsiah Takyi, Beata Gavurova, Martin Mikeska

    Published 2025-07-01
    “…Various preliminary assessment of cross-sectional dependence, unit root, and cointegration was evaluated to ensure data reliability and validity. …”
    Get full text
    Article
  5. 85

    Oral Health Status and Anxiety Level Amongst the Borderline Security Force Personnel and Their Family Members by Deepali Agarwal, Bharathi Purohit, Upendra Singh Bhadauria, Sneha Malhotra, Manali Deb Barma, Harsh Priya

    Published 2025-02-01
    “…The primary role of border security personnel is to safeguard borders against illegal trans-border activities during peacetime and provide military support during wartime. …”
    Get full text
    Article
  6. 86

    Nutritional Vulnerability of Displaced Persons: A Study of Food Security and Access in Kumba Municipality, Cameroon by Kevin N. Metuge, Betrand A. Tambe, Fabrice Tonfack Djikeng, Aduni Ufuan Achidi, Given Chipili, Xikombiso G. Mbhenyane

    Published 2025-01-01
    “…This study aimed to assess the determinants of food security among internally displaced persons (IDPs)—people who have been forced to flee their homes due to conflict, natural disasters, or other crises—and their children under five, as well as the influence on their nutritional status. …”
    Get full text
    Article
  7. 87

    Genetic dissection of root traits in a rice ‘global MAGIC’ population for candidate traits to breed for reduced methane emission by Ripon Kumar Roy, Ripon Kumar Roy, Ripon Kumar Roy, Gopal Misra, Shaina Sharma, Shaina Sharma, Bandana Pahi, Bandana Pahi, Seyed Mahdi Hosseiniyan Khatibi, Kurniawan Rudi Trijatmiko, Sung Ryul Kim, Jose E. Hernandez, Amelia Henry, Nese Sreenivasulu, Maria Genaleen Q. Diaz, Eureka Teresa M. Ocampo, Pallavi Sinha, Pallavi Sinha, Ajay Kohli

    Published 2025-07-01
    “…Protein-protein interaction networks linked these genes to flavonoid biosynthesis (KEGG map00941) and N-glycan pathways, earlier identified as critical for root architecture. Haplotype-phenotype analysis revealed 8 superior haplotypes across 7 genes for average root porosity, base root porosity, root diameter, and tip root porosity. …”
    Get full text
    Article
  8. 88

    Chemical composition, nutritional, functional and pasting properties of yellow root cassava grits and african yam bean flour blends by Victoria Funmilayo Abioye, Ololade Abosede Olodude, Bolanle Aishat Akinwande

    Published 2022-04-01
    “…Bulk density, water absorption capacity, swelling capacity and swelling index ranged from 0.67-0.81 g/ml, 151.05-503.29 g/ml, 1.67-5.68 g/g and 2.86-13.32%, respectively. The blends of yellow root cassava grits and African yam bean flour could provide nutritious food formulations and offer good potential for food security.…”
    Get full text
    Article
  9. 89

    Russia's foreign and security policy in Syria: historical relations, Cold War paradigms, and contemporary geopolitics by Raquel Jorge Trujillo

    Published 2025-02-01
    “…The article also critically evaluates how the Kremlin has framed its engagement in Syria as a counterterrorism measure, arguing that this narrative helps to justify its actions both at home and abroad.Results and discussionBy highlighting the connections between historical background, security strategy, and current geopolitical dynamics, the study's findings show that the intervention in Syria is anchored in a deeply rooted policy in Russia, elaborated on a Cold War heritage towards the U.S. and on new concepts of multi-polarity. …”
    Get full text
    Article
  10. 90
  11. 91
  12. 92
  13. 93

    COMPARATIVE ANALYSIS OF COUNTER-VIOLENT EXTREMISM STRATEGIES IN SOUTH ASIA AND AFRICA: LESSONS AND PATHWAYS FOR SUSTAINABLE SECURITY by Abraham Ename Minko

    Published 2025-06-01
    “…By fostering collaboration between South Asia and Africa, the research seeks to develop comprehensive strategies to address the root causes of violent extremism and promote long-term peace and stability.   …”
    Get full text
    Article
  14. 94

    ICT and food security nexus in the GCC region: exploring corruption control, FDI, and environmental sustainability dynamics by Sk Habibur Rahaman, Md. Saiful Islam

    Published 2025-05-01
    “…Abstract Climate change and food imports threaten the “Gulf Cooperation Council (GCC)” nation’s food security (FS). ICT can assist the GCC nations in addressing these difficulties and increasing food security. …”
    Get full text
    Article
  15. 95

    A hybrid steganography framework using DCT and GAN for secure data communication in the big data era by Kaleem Razzaq Malik, Muhammad Sajid, Ahmad Almogren, Tauqeer Safdar Malik, Ali Haider Khan, Ayman Altameem, Ateeq Ur Rehman, Seada Hussen

    Published 2025-06-01
    “…In today’s digital era, ensuring the security of data transmission is paramount. Advancements in digital technology have facilitated the proliferation of high-resolution graphics over the Internet, raising security concerns and enabling unauthorized access to sensitive data. …”
    Get full text
    Article
  16. 96

    Aerenchyma, gas exchange, growth, leaf and root anatomical traits of drought and flooding-tolerant rice genotypes under water stress by Alessander Lopes Caetano, Maxwell Pereira de Pádua, Carlos Henrique Goulart dos Reis, Vinícius Politi Duarte, Gabriela Costa Rodrigues, Melina Karla Arantes, Evaristo Mauro de Castro, Fabricio José Pereira

    Published 2025-06-01
    “…Pampa showed increased root cortical aerenchyma, root dry mass, and photosynthesis that seem to help in drought tolerance while A502 showed increased aerenchyma and root dry mass, other genotypes have different responses to these variables. …”
    Get full text
    Article
  17. 97

    Arthroscopic Transtibial Pullout Repair for Medial Meniscus Posterior Root Tear using HitPat’s Modified All-Suture Technique by Hitendra G Patil, Milind V Pimprikar, Chinar K Patil

    Published 2025-03-01
    “…The suture threads are then tied over anteromedial surface of tibia with the help of various fixation devices to secure the root at its footprint. Surgical Technique: A sleeve of no 5 ethibond is used to fix the pull-out threads to anteromedial surface of tibia achieving secure and stable fixation of the posterior root to anatomical footprint with option of adjusting the tension. …”
    Get full text
    Article
  18. 98

    Military interventions in the unipolarity: Lessons for security dynamics of US-China relations amid Trump's second term by Stekić Nenad

    Published 2025-01-01
    “…Humanitarian interventionism, a hallmark of the unipolar era following the Cold War, has been widely debated as a mechanism for addressing alleged human rights violations and safeguarding global security. Rooted in principles such as the Responsibility to Protect (R2P), these interventions have often intersected with the strategic interests of dominant powers, particularly the United States. …”
    Get full text
    Article
  19. 99

    A Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things Communication by Tzung-Her Chen

    Published 2025-06-01
    “…The rapid integration of the Internet of Medical Things (IoMT) into healthcare systems raises urgent demands for secure communication mechanisms capable of protecting sensitive patient data. …”
    Get full text
    Article
  20. 100

    Phytochemical characterization and anti-arthritic potential of green-synthesized CuO nanoparticles derived from the Bistorta amplexicaulis root extract by Mahrukh Babar, Bilal Aslam, Muhammad Naeem Faisal, Abdul Malik, Suhail Akhtar, Sabiha Fatima, Wafa Majeed, Asher Umer, Muhammad Akmal Farooq

    Published 2024-12-01
    “…C-reactive protein (CRP), rheumatoid factor (RF), liver and kidney function biomarkers, tumor necrosis factor-α (TNF-α), and interleukin-6 (IL-6) levels showed a significant decrease at both low and high doses of green-synthesized CuO nanoparticles from the Bistorta amplexicaulis root extract. The final data were analyzed by one way and two-way analysis of variance (ANOVA) and Tukey’s multi-comparison test.ConclusionSo, from this study, it was concluded that both the plant root extract and green-synthesized CuO nanoparticles have anti-arthritic potential, but CuO NPs showed remarkable results.…”
    Get full text
    Article