Showing 1,001 - 1,020 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 1001
  2. 1002
  3. 1003
  4. 1004
  5. 1005
  6. 1006

    Deciphering the potential of plant metabolites as insecticides against melon fly (Zeugodacus cucurbitae): Exposing control alternatives to assure food security by Zinat Jahan Chowdhury, Anik Banik, Tanjin Barketullah Robin, Mohammed Rashed Chowdhury

    Published 2025-01-01
    “…In the absence of effective biological or chemical controls, the melon fly poses a significant threat to food security, particularly impacting cucurbit crops in tropical and subtropical regions. …”
    Get full text
    Article
  7. 1007

    Does welfare technology contribute to security, activity, participation and independence within municipal elder care? A qualitative study protocol by Ingrid Hellström, Johannes Österholm, Åsa Larsson Ranada, Katarina Baudin, Vedrana B Baric

    Published 2025-02-01
    “…However, the perspectives of older persons, significant others, staff and decision-makers’ on the aspects of security, activity, independence and participation that WT aims to influence needs further investigation. …”
    Get full text
    Article
  8. 1008
  9. 1009
  10. 1010
  11. 1011

    Global challenges facing plant pathology: multidisciplinary approaches to meet the food security and environmental challenges in the mid-twenty-first century by Michael Jeger, Robert Beresford, Clive Bock, Nathan Brown, Adrian Fox, Adrian Newton, Antonio Vicent, Xiangming Xu, Jonathan Yuen

    Published 2021-05-01
    “…This review discussed recent developments in plant pathology research and identifies some key issues that, we anticipate, must be faced to meet the food security and environmental challenges that will arise over coming decades. …”
    Get full text
    Article
  12. 1012
  13. 1013

    Technologies of psychological rehabilitation of a personality after traumatic events (on the example of the rehabilitation programme for psychologists of the security and defence sector of Ukraine) by N. E. Miloradova, V. V. Dotsenko

    Published 2024-12-01
    “…Today, psychologists in the security and defence sector of Ukraine work in extremely difficult conditions, providing psychological support to the military, who face various stressful situations. …”
    Get full text
    Article
  14. 1014

    Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature by Juniar Hutagalung, Puji Sari Ramadhan, Sarah Juliana Sihombing

    Published 2023-12-01
    “… Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web. …”
    Get full text
    Article
  15. 1015
  16. 1016

    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method by Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri, Muhammad Ramzan Saeed

    Published 2022-01-01
    “…However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. …”
    Get full text
    Article
  17. 1017

    A Collaborative Data Network for the Asia Oceania Region Enabled by Emerging Technologies to Foster Innovation in a Secure and Open Environment by Alison Specht, Kim Bryceson, Shoufeng Cao, Margaret O’Brien, S. M. Guru, Pedro Pizzigatti Correa, Michelle Waycott

    Published 2025-01-01
    “…To ensure ownership is always clear, and subsequent use of data is tracked, we harness blockchain technology alongside smart contracts and decentralised identifiers to allow secure discovery and sharing. The use of blockchain will ensure the information about each dataset (metadata, provenance, and access rights) is immutably connected to each dataset. …”
    Get full text
    Article
  18. 1018
  19. 1019
  20. 1020