Keyword "PROTECTION" found in the following publications:
- For the purpose of definition of an adequate marker of a power exchange condition at the experimental ischemia of the ...
RESEARCH OF THE SECURITY OF MODERN DIGITAL CASH SYSTEMS
With the development of information technology, digital (electronic) cash systems are becoming increasingly popular. Digital cash has a number ...
The article discusses the task of developing a behavioral analytics subsystem for a system of protection against targeted ...
In the modern world, the use of artificial intelligence (AI) is increasingly facing the risk of adversarial attacks ...
AUTOMATIC DETECTION OF JAVASCRIPT SNIFFERS
The method of automatic detection of javascript sniffers in the code of online stores is considered. As well ...
ANALYSIS OF THE MAIN MOBILE THREATS AND WAYS TO PROTECT AGAINST VIRUSES
In the age of the heyday of information technology and the development of the functionality of ...
In the development of information technology, software and data protection on web services are of great importance. To ...
Relevance: Cardiovascular diseases continue to be the leading cause of premature adult death.
Lipid profile and atherogenesis: Dislipidaemia leads to subsequent lipid ...
RISKS OF INCREASING PROTECTIONISM IN THE GLOBAL ECONOMY
After more than two centuries in which economists have pointed out the advantages of free trade over the costs ...
NATIONAL LANGUAGES IN THE MODERN WORLD: STRUGGLE FOR “PURITY”
Language regulation is a continuous process that comprises any changes to a natural language. The information revolution at the turn ...Background: Nigella damascena L. is a plant, extracts from which are characterized by a multicomponent composition of biologically active substances, ...
This paper presents an algorithm for compressing data that has been encrypted or hidden, as well as capturing ...
VALUE TRANSFORMATION OF THE SOCIAL ENTREPRENEUR IN ENVIRONMENTAL ACTIVITY
Values define social behavior and can serve different directions in the development of society, its involution or evolution. Depending ...
ANALYZING THE POSSIBLE USE OF VOICE IDENTIFICATION IN THE SYSTEMS OF ACCESS TO INFORMATION
Taking into account the problem of increasing the reliability of access control, the authors propose a new method for the ...
DIGITAL SECURITY IN TODAY'S WORLD
For several decades, the engine of modern society has been technological progress. Its innovations, new and constantly improving means ...
The article analyzes the activities of Orthodox socially oriented FBOs and aid groups in the region using the example of ...
Background: One of the most common neurodegenerative diseases is Parkinson's disease, which is based on the degeneration of dopaminergic ...
TREATMENT OF HEPATITIS INDUCED BY ANTI-TUBERCULOSIS DRUGS (EXPERIMENTAL RESEARCH)
 Introduction: Tuberculosis is a widely spread infection. While treating patients for it, they are given simultaneously and for a long ...
The article discusses various means of protection that can ensure the security of information systems (IS) of government agencies. ...
SELANK AND SEMAX AS POTENTIAL HEPATOPROTECTORS IN MEDICAL TREATMENT OF TUBERCULOSIS
Introduction: Drug-induced hepatitis is common in clinical practice. This problem is particularly relevant in the treatment of tuberculous infection, because ...
- The author briefly summarizes and analyzes a 5-year experience of monitoring the level and quality of life of the elderly ...
METHODS OF EMBEDDING CONTROL INFORMATION IN IMAGES
The paper discusses various methods of steganography used to embed control information in digital images. The main focus ...
Introduction: At present, the problem of pharmacological correction of free radical processess emerges full-blown. The aim of the study is ...
Background: The ideal dose of drugs varies widely among patients, mainly due to genetic factors. Introduction to clinical practice ...
The purpose of this article is to consider the information activities of information security systems of information infrastructures ...
Background: Pneumococcal meningitis is a severe infectious disease, which is characterized by high mortality and frequent development of ...
MODERN PRINCIPLES OF THE SOCIAL PROTECTION OF POPULATION
The paper summarizes the principles of the social protection of the population, viewed from different perspectives; the main principles, reflecting ...
DESIGN OF AUTOMATIC DIFFERENTIATORS USING BUTTERWORTH POLYNOMIALS
The article considers a method for constructing of automatic differentiators using Butterworth polynomials. The synthesis of differentiators is reduced ...