Results 121 to 130 of about 967,964 (329)
The study provides an extreme example of insect adaptation to highly toxic defenses of host plants, and investigates the complex strategies to resist carcinogenic aristolochic acids, including physical isolation, metabolic detoxification, and DNA repair.
Yang Luan +20 more
wiley +1 more source
IMPLEMENTATION AND ENHANCEMENT AFFINE CIPHER OF DATABASE
The first of this paper, Caeser cipher is used to encrypt the fields in data base. The keys have been used from different lengths of fields, then applying affine algorithm. This is given a layer of security for data base.
Dalal A. Hammood, Maitham A. Naji
doaj
Deductive Database Security [PDF]
An approach is described for protecting the information in deductive databases from unauthorized retrieval and update requests. The approach we propose combines meta-programming and partial evaluation techniques, has a number of attractive technical results associated with it, and can be used as a basis for efficient implementations of protected forms ...
openaire +1 more source
Bioenergy Cropping Reduces the Spatiotemporal Scaling of Soil Bacterial Biodiversity
Consistent with patterns observed in plant and animal communities, soil bacterial communities exhibit significant species–time–area and phylogenetic–time–area relationships independent of nested structure. Bioenergy cropping significantly reduces the spatiotemporal scaling rates, particularly in sandy loam soils.
Zhencheng Ye +19 more
wiley +1 more source
Analytical Approach for Security of Sensitive Business Database
Anusha Gupta, Sanjay Kumar Dubey
openalex +1 more source
Grancalcin (GCA), a myeloid‐derived protein, is enriched in gingival tissues of periodontitis patients and mouse models. Through interactions with CD44 and activation of MYH9, GCA promotes NF‐κB signaling and exacerbates periodontal inflammation and bone loss.
Min Zhou +6 more
wiley +1 more source
Security vulnerability was the core of network security.Vulnerability database was designed to collect,assess and publish vulnerability information.However,there was redundant and heterogeneous data in vulnerability database which leads to sharing ...
Tao WEN +3 more
doaj +2 more sources
Data attribute security and privacy in distributed database system
Iosr Journals, Ms. Pragati J. Mokadam
openalex +1 more source

