|
|
|
Kanti Meena, Dharmendra K. Meena, Jinu Jacob, Chandrasekhar Aruna and Kurella Bala Rama Saraswati Visarada
This study investigates the antioxidant potential of over 20 sorghum genotypes, spanning popular lines, inter-specific hybrids, and inter-generic crosses. Parameters such as free radical scavenging, flavonoid and phenolic content, and nitrous oxide (NO) ...
ver más
|
|
|
|
|
|
|
J. Dhakshayani and B. Surendiran
Amaranth, a pseudocereal crop which is rich in nutrients and climate resistant, can provide an opportunity to increase food security and nutritional content for the growing population. Farmers rely mainly on synthetic fertilizers to improve the quality a...
ver más
|
|
|
|
|
|
|
Meijuan Li, Xiangyu Hu, Rui Hu, Kaiming Liang, Xuhua Zhong, Junfeng Pan, Youqiang Fu, Yanzhuo Liu, Xinyu Wang, Qunhuan Ye and Yuanhong Yin
Rice?fish co-cultures have been practiced for over 2000 years, and they have tremendous potential in terms of increasing food security and economic benefits. However, little research has been conducted into achieving stable yields and high lodging resist...
ver más
|
|
|
|
|
|
|
David W. Kim
Current scientific developments have reached the stage where human aspirations of space exploration are not science fiction but a reality involving travelling to the Earth?s orbit, the Moon and Mars. In the second half of the twentieth century, internati...
ver más
|
|
|
|
|
|
|
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex...
ver más
|
|
|
|
|
|
|
Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad, Ahmad B. Al-Khalil, Penatiyana W. C. Prasad, Sabih Ur Rehman and Rafiqul Islam
Blockchain technology has been widely advocated for security and privacy in IoT systems. However, a major impediment to its successful implementation is the lack of privacy protection regarding user access policy while accessing personal data in the IoT ...
ver más
|
|
|
|
|
|
|
Au?rius Juozapavicius, Agne Brilingaite, Linas Bukauskas and Ricardo Gregorio Lugo
Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour...
ver más
|
|
|
|
|
|
|
Anish Saini, Athanasios Tsokanos and Raimund Kirner
Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic alg...
ver más
|
|
|
|
|
|
|
Nursulu Kapalova, Kairat Sakan, Kunbolat Algazy and Dilmukhanbet Dyusenbayev
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides five-round encryption of 128-bit blocks, while the data size at the input and output of the S-box is 8 bits. The main transformation is the F transformat...
ver más
|
|
|
|
|
|
|
Qingbin Zhang, Zongxian Zhang, Congshi Wu, Junsheng Yang and Zhenyu Wang
The effect of a blasting vibration from an excavating tunnel on an adjacent excavated tunnel is of great importance for the stability and security of twin tunnels. Due to the relatively small distance between the tunnel face of the excavating tunnel and ...
ver más
|
|
|
|