Keyword "PROTECTION" found in the following publications:
Background: The ideal dose of drugs varies widely among patients, mainly due to genetic factors. Introduction to clinical practice ...
This article addresses the current problem of hash table security in the context of DoS attacks caused by ...
Background: Osteoporosis is one of the major metabolic, age-related skeletal diseases and a serious medical and socioeconomic problem ...
The article analyzes the activities of Orthodox socially oriented FBOs and aid groups in the region using the example of ...
AUTOMATIC DETECTION OF JAVASCRIPT SNIFFERS
The method of automatic detection of javascript sniffers in the code of online stores is considered. As well ...
Background: One of the most common neurodegenerative diseases is Parkinson's disease, which is based on the degeneration of dopaminergic ...
Relevance: Cardiovascular diseases continue to be the leading cause of premature adult death.
Lipid profile and atherogenesis: Dislipidaemia leads to subsequent lipid ...
METHODS OF EMBEDDING CONTROL INFORMATION IN IMAGES
The paper discusses various methods of steganography used to embed control information in digital images. The main focus ...
ANALYSIS OF THE MAIN MOBILE THREATS AND WAYS TO PROTECT AGAINST VIRUSES
In the age of the heyday of information technology and the development of the functionality of ...
In the modern world, the use of artificial intelligence (AI) is increasingly facing the risk of adversarial attacks ...
In the development of information technology, software and data protection on web services are of great importance. To ...
- For the purpose of definition of an adequate marker of a power exchange condition at the experimental ischemia of the ...
NATIONAL LANGUAGES IN THE MODERN WORLD: STRUGGLE FOR “PURITY”
Language regulation is a continuous process that comprises any changes to a natural language. The information revolution at the turn ...The purpose of this article is to consider the information activities of information security systems of information infrastructures ...
The article discusses various means of protection that can ensure the security of information systems (IS) of government agencies. ...
DESIGN OF AUTOMATIC DIFFERENTIATORS USING BUTTERWORTH POLYNOMIALS
The article considers a method for constructing of automatic differentiators using Butterworth polynomials. The synthesis of differentiators is reduced ...
DIGITAL SECURITY IN TODAY'S WORLD
For several decades, the engine of modern society has been technological progress. Its innovations, new and constantly improving means ...
VALUE TRANSFORMATION OF THE SOCIAL ENTREPRENEUR IN ENVIRONMENTAL ACTIVITY
Values define social behavior and can serve different directions in the development of society, its involution or evolution. Depending ...
SELANK AND SEMAX AS POTENTIAL HEPATOPROTECTORS IN MEDICAL TREATMENT OF TUBERCULOSIS
Introduction: Drug-induced hepatitis is common in clinical practice. This problem is particularly relevant in the treatment of tuberculous infection, because ...
Introduction: At present, the problem of pharmacological correction of free radical processess emerges full-blown. The aim of the study is ...
This paper presents an algorithm for compressing data that has been encrypted or hidden, as well as capturing ...
Background: Pneumococcal meningitis is a severe infectious disease, which is characterized by high mortality and frequent development of ...
Background: Nigella damascena L. is a plant, extracts from which are characterized by a multicomponent composition of biologically active substances, ...
- The author briefly summarizes and analyzes a 5-year experience of monitoring the level and quality of life of the elderly ...
The article discusses the task of developing a behavioral analytics subsystem for a system of protection against targeted ...
RESEARCH OF THE SECURITY OF MODERN DIGITAL CASH SYSTEMS
With the development of information technology, digital (electronic) cash systems are becoming increasingly popular. Digital cash has a number ...
RISKS OF INCREASING PROTECTIONISM IN THE GLOBAL ECONOMY
After more than two centuries in which economists have pointed out the advantages of free trade over the costs ...
MODERN PRINCIPLES OF THE SOCIAL PROTECTION OF POPULATION
The paper summarizes the principles of the social protection of the population, viewed from different perspectives; the main principles, reflecting ...
TREATMENT OF HEPATITIS INDUCED BY ANTI-TUBERCULOSIS DRUGS (EXPERIMENTAL RESEARCH)
 Introduction: Tuberculosis is a widely spread infection. While treating patients for it, they are given simultaneously and for a long ...
ANALYZING THE POSSIBLE USE OF VOICE IDENTIFICATION IN THE SYSTEMS OF ACCESS TO INFORMATION
Taking into account the problem of increasing the reliability of access control, the authors propose a new method for the ...















