Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 3850

Страница 21 из 385

RELATIONAL DESCRIPTION OF ELECTROWEAK INTERACTIONSThe binary pregeometry was used as a mathematical basis for the relational approach

Measurement of the Orbital Period of the X-ray Burster GS 1826-238 Based on Observations of Its Optical Brightness VariationsThe variability of the optical and X-ray fluxes from the binary GS 1826-238 is investigated

Thermodynamic functions of solvation of benzene in various binary aqueous-organic solvents of binary solvent upon insertion of solute molecules and diminishment of the hydrophobic effect.

Hyperbranched polyester polyacids and their binary systems with surfactants for doxorubicin encapsulation derivatives and their binary systems in the presence of a surfactant (Brij-35, Triton X-100) was investigated

Analysis of Properties of Quantum Hashing of binary quantum hashing that allows one to represent binary sets as quantum states. We show

Система сбора, анализа и визуализации данных об устройствах в сети Интернетvulnerability

PSYCHOMETRIC PROPERTIES OF THE RUSSIAN THREE-FACTOR INTERPERSONAL SENSITIVITY MEASURE [ПСИХОМЕТРИЧЕСКИЕ СВОЙСТВА РУССКОЯЗЫЧНОЙ ТРЕХФАКТОРНОЙ ВЕРСИИ ОПРОСНИКА МЕЖЛИЧНОСТНОЙ ЧУВСТВИТЕЛЬНОСТИ]Interpersonal vulnerability

Developing models of IoT infrastructures to identify vulnerabilities and analyse threats are designed to identify vulnerabilities and analyse potential threats. Scenarios of attacks typical

Исследование уровня информационной безопасности сетевых систем видеонаблюденияvulnerability

Vulnerabilities of deep learning biometric voice applications in banking and financial services review of the most popular voice assistants used in banks. The main vulnerabilities and threats

Страница 21 из 385