Results 21 to 30 of about 2,871,486 (201)
American hegemony or global governance? Competing visions of international security [PDF]
An overview is given of two competing visions of contemporary international security: United States hegemony and security governance. According to these perspectives, the current generation is either witnessing the return to classical balance-of-power ...
Krahmann, E
core +1 more source
Late Ming Dynasty weak monsoon induced a harmonized megadrought across north-to-south China
Historians and paleoclimatologists have long studied the connection between ecoclimatic changes and empire growth, transformation, and decline, but striking cases remain rare.
Weipeng Yue +10 more
doaj +1 more source
Tree‐Ring Insights Into Past and Future Streamflow Variations in Beijing, Northern China
As the largest city in northern China and the capital of China, the rapid increases in Beijing’s water consumption in recent years have made water resources provision an increasing problem.
Honghua Cao +6 more
doaj +1 more source
Security is a natural place to start with this third and final part of the book as it is a unifying component in each of the global issues we face, and for that reason a central theme in International Relations. It is also a contested concept that has occupied minds for thousands\ud of years.
openaire +1 more source
United Nations Association [PDF]
The University Archives has determined that this item is of continuing value to OSU's history.The Mershon Center was the primary sponsor of the Columbus chapter of the United Nations Association’s two-day intercollegiate forum, which asked students to ...
Mershon Center for International Security Studies
core
Human security and the rise of the social [PDF]
As the concept of human security has become part of the mainstream discourse of international politics it should be no surprise that both realist and critical approaches to international theory have found the agenda wanting.
Aisenberg +94 more
core +1 more source
A Survey of RFID Authentication Protocols Based on Hash-Chain Method [PDF]
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication ...
Chang, Elizabeth +3 more
core +2 more sources
A novel liquid chromatography-tandem mass spectrometry (LC-MS/MS) method was developed and validated for the simultaneous analysis of three different classes of veterinary drugs—antibiotics, antifungals, and antiparasitics—in legume-based alternative ...
Chanita Boonkanon +9 more
doaj +1 more source
Attribution and Risk Projections of Hydrological Drought Over Water‐Scarce Central Asia
Central Asia (CA), a typical arid and semiarid region, has experienced worsening droughts, adversely impacting agricultural production and socioeconomic development. However, the evolution of hydrological droughts in CA remains unclear.
Xinfeng Wu +6 more
doaj +1 more source
Glaciers play a vital role in the Asian mountain water towers and have significant downstream impacts on domestic, agricultural, and industrial water usage.
Letian Xiao +10 more
doaj +1 more source

