Keyword "PROTECTION" found in the following publications:
- The author briefly summarizes and analyzes a 5-year experience of monitoring the level and quality of life of the elderly ...
In the development of information technology, software and data protection on web services are of great importance. To ...
Relevance: Cardiovascular diseases continue to be the leading cause of premature adult death.
Lipid profile and atherogenesis: Dislipidaemia leads to subsequent lipid ...
The article discusses various means of protection that can ensure the security of information systems (IS) of government agencies. ...
TREATMENT OF HEPATITIS INDUCED BY ANTI-TUBERCULOSIS DRUGS (EXPERIMENTAL RESEARCH)
 Introduction: Tuberculosis is a widely spread infection. While treating patients for it, they are given simultaneously and for a long ...
METHODS OF EMBEDDING CONTROL INFORMATION IN IMAGES
The paper discusses various methods of steganography used to embed control information in digital images. The main focus ...
DESIGN OF AUTOMATIC DIFFERENTIATORS USING BUTTERWORTH POLYNOMIALS
The article considers a method for constructing of automatic differentiators using Butterworth polynomials. The synthesis of differentiators is reduced ...
Background: The ideal dose of drugs varies widely among patients, mainly due to genetic factors. Introduction to clinical practice ...
The article analyzes the activities of Orthodox socially oriented FBOs and aid groups in the region using the example of ...
NATIONAL LANGUAGES IN THE MODERN WORLD: STRUGGLE FOR “PURITY”
Language regulation is a continuous process that comprises any changes to a natural language. The information revolution at the turn ...DIGITAL SECURITY IN TODAY'S WORLD
For several decades, the engine of modern society has been technological progress. Its innovations, new and constantly improving means ...
Background: One of the most common neurodegenerative diseases is Parkinson's disease, which is based on the degeneration of dopaminergic ...
The article discusses the task of developing a behavioral analytics subsystem for a system of protection against targeted ...
In the modern world, the use of artificial intelligence (AI) is increasingly facing the risk of adversarial attacks ...
MODERN PRINCIPLES OF THE SOCIAL PROTECTION OF POPULATION
The paper summarizes the principles of the social protection of the population, viewed from different perspectives; the main principles, reflecting ...
AUTOMATIC DETECTION OF JAVASCRIPT SNIFFERS
The method of automatic detection of javascript sniffers in the code of online stores is considered. As well ...
RISKS OF INCREASING PROTECTIONISM IN THE GLOBAL ECONOMY
After more than two centuries in which economists have pointed out the advantages of free trade over the costs ...
Background: Pneumococcal meningitis is a severe infectious disease, which is characterized by high mortality and frequent development of ...
Introduction: At present, the problem of pharmacological correction of free radical processess emerges full-blown. The aim of the study is ...
The purpose of this article is to consider the information activities of information security systems of information infrastructures ...
SELANK AND SEMAX AS POTENTIAL HEPATOPROTECTORS IN MEDICAL TREATMENT OF TUBERCULOSIS
Introduction: Drug-induced hepatitis is common in clinical practice. This problem is particularly relevant in the treatment of tuberculous infection, because ...
ANALYSIS OF THE MAIN MOBILE THREATS AND WAYS TO PROTECT AGAINST VIRUSES
In the age of the heyday of information technology and the development of the functionality of ...
ANALYZING THE POSSIBLE USE OF VOICE IDENTIFICATION IN THE SYSTEMS OF ACCESS TO INFORMATION
Taking into account the problem of increasing the reliability of access control, the authors propose a new method for the ...
- For the purpose of definition of an adequate marker of a power exchange condition at the experimental ischemia of the ...
Background: Nigella damascena L. is a plant, extracts from which are characterized by a multicomponent composition of biologically active substances, ...
RESEARCH OF THE SECURITY OF MODERN DIGITAL CASH SYSTEMS
With the development of information technology, digital (electronic) cash systems are becoming increasingly popular. Digital cash has a number ...
VALUE TRANSFORMATION OF THE SOCIAL ENTREPRENEUR IN ENVIRONMENTAL ACTIVITY
Values define social behavior and can serve different directions in the development of society, its involution or evolution. Depending ...
This paper presents an algorithm for compressing data that has been encrypted or hidden, as well as capturing ...