Results 21 to 30 of about 2,871,486 (201)

American hegemony or global governance? Competing visions of international security [PDF]

open access: yes, 2005
An overview is given of two competing visions of contemporary international security: United States hegemony and security governance. According to these perspectives, the current generation is either witnessing the return to classical balance-of-power ...
Krahmann, E
core   +1 more source

Late Ming Dynasty weak monsoon induced a harmonized megadrought across north-to-south China

open access: yesCommunications Earth & Environment
Historians and paleoclimatologists have long studied the connection between ecoclimatic changes and empire growth, transformation, and decline, but striking cases remain rare.
Weipeng Yue   +10 more
doaj   +1 more source

Tree‐Ring Insights Into Past and Future Streamflow Variations in Beijing, Northern China

open access: yesWater Resources Research
As the largest city in northern China and the capital of China, the rapid increases in Beijing’s water consumption in recent years have made water resources provision an increasing problem.
Honghua Cao   +6 more
doaj   +1 more source

International Security [PDF]

open access: yes, 2009
Security is a natural place to start with this third and final part of the book as it is a unifying component in each of the global issues we face, and for that reason a central theme in International Relations. It is also a contested concept that has occupied minds for thousands\ud of years.
openaire   +1 more source

United Nations Association [PDF]

open access: yes, 2003
The University Archives has determined that this item is of continuing value to OSU's history.The Mershon Center was the primary sponsor of the Columbus chapter of the United Nations Association’s two-day intercollegiate forum, which asked students to ...
Mershon Center for International Security Studies
core  

Human security and the rise of the social [PDF]

open access: yes, 2011
As the concept of human security has become part of the mainstream discourse of international politics it should be no surprise that both realist and critical approaches to international theory have found the agenda wanting.
Aisenberg   +94 more
core   +1 more source

A Survey of RFID Authentication Protocols Based on Hash-Chain Method [PDF]

open access: yes, 2008
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication ...
Chang, Elizabeth   +3 more
core   +2 more sources

A novel LC-MS/MS multi-group method for simultaneous determination of antimicrobial residues in legume-based alternative proteins

open access: yesnpj Science of Food
A novel liquid chromatography-tandem mass spectrometry (LC-MS/MS) method was developed and validated for the simultaneous analysis of three different classes of veterinary drugs—antibiotics, antifungals, and antiparasitics—in legume-based alternative ...
Chanita Boonkanon   +9 more
doaj   +1 more source

Attribution and Risk Projections of Hydrological Drought Over Water‐Scarce Central Asia

open access: yesEarth's Future
Central Asia (CA), a typical arid and semiarid region, has experienced worsening droughts, adversely impacting agricultural production and socioeconomic development. However, the evolution of hydrological droughts in CA remains unclear.
Xinfeng Wu   +6 more
doaj   +1 more source

A Geodetic-Data-Calibrated Ice Flow Model to Simulate Historical and Future Response of Glaciers in Southeastern Tibetan Plateau

open access: yesRemote Sensing
Glaciers play a vital role in the Asian mountain water towers and have significant downstream impacts on domestic, agricultural, and industrial water usage.
Letian Xiao   +10 more
doaj   +1 more source

Home - About - Disclaimer - Privacy