Keyword "PROTECTION" found in the following publications:
DESIGN OF AUTOMATIC DIFFERENTIATORS USING BUTTERWORTH POLYNOMIALS
The article considers a method for constructing of automatic differentiators using Butterworth polynomials. The synthesis of differentiators is reduced ...
- For the purpose of definition of an adequate marker of a power exchange condition at the experimental ischemia of the ...
NATIONAL LANGUAGES IN THE MODERN WORLD: STRUGGLE FOR “PURITY”
Language regulation is a continuous process that comprises any changes to a natural language. The information revolution at the turn ...The article analyzes the activities of Orthodox socially oriented FBOs and aid groups in the region using the example of ...
MODERN PRINCIPLES OF THE SOCIAL PROTECTION OF POPULATION
The paper summarizes the principles of the social protection of the population, viewed from different perspectives; the main principles, reflecting ...
AUTOMATIC DETECTION OF JAVASCRIPT SNIFFERS
The method of automatic detection of javascript sniffers in the code of online stores is considered. As well ...
DIGITAL SECURITY IN TODAY'S WORLD
For several decades, the engine of modern society has been technological progress. Its innovations, new and constantly improving means ...
Background: Pneumococcal meningitis is a severe infectious disease, which is characterized by high mortality and frequent development of ...
RESEARCH OF THE SECURITY OF MODERN DIGITAL CASH SYSTEMS
With the development of information technology, digital (electronic) cash systems are becoming increasingly popular. Digital cash has a number ...
SELANK AND SEMAX AS POTENTIAL HEPATOPROTECTORS IN MEDICAL TREATMENT OF TUBERCULOSIS
Introduction: Drug-induced hepatitis is common in clinical practice. This problem is particularly relevant in the treatment of tuberculous infection, because ...
VALUE TRANSFORMATION OF THE SOCIAL ENTREPRENEUR IN ENVIRONMENTAL ACTIVITY
Values define social behavior and can serve different directions in the development of society, its involution or evolution. Depending ...
TREATMENT OF HEPATITIS INDUCED BY ANTI-TUBERCULOSIS DRUGS (EXPERIMENTAL RESEARCH)
 Introduction: Tuberculosis is a widely spread infection. While treating patients for it, they are given simultaneously and for a long ...
- The author briefly summarizes and analyzes a 5-year experience of monitoring the level and quality of life of the elderly ...
ANALYSIS OF THE MAIN MOBILE THREATS AND WAYS TO PROTECT AGAINST VIRUSES
In the age of the heyday of information technology and the development of the functionality of ...
METHODS OF EMBEDDING CONTROL INFORMATION IN IMAGES
The paper discusses various methods of steganography used to embed control information in digital images. The main focus ...
Background: The ideal dose of drugs varies widely among patients, mainly due to genetic factors. Introduction to clinical practice ...
In the development of information technology, software and data protection on web services are of great importance. To ...
Background: One of the most common neurodegenerative diseases is Parkinson's disease, which is based on the degeneration of dopaminergic ...
Relevance: Cardiovascular diseases continue to be the leading cause of premature adult death.
Lipid profile and atherogenesis: Dislipidaemia leads to subsequent lipid ...
Introduction: At present, the problem of pharmacological correction of free radical processess emerges full-blown. The aim of the study is ...
In the modern world, the use of artificial intelligence (AI) is increasingly facing the risk of adversarial attacks ...
ANALYZING THE POSSIBLE USE OF VOICE IDENTIFICATION IN THE SYSTEMS OF ACCESS TO INFORMATION
Taking into account the problem of increasing the reliability of access control, the authors propose a new method for the ...
Background: Nigella damascena L. is a plant, extracts from which are characterized by a multicomponent composition of biologically active substances, ...
The article discusses various means of protection that can ensure the security of information systems (IS) of government agencies. ...
This paper presents an algorithm for compressing data that has been encrypted or hidden, as well as capturing ...
RISKS OF INCREASING PROTECTIONISM IN THE GLOBAL ECONOMY
After more than two centuries in which economists have pointed out the advantages of free trade over the costs ...