RELATIONAL DESCRIPTION OF ELECTROWEAK INTERACTIONSThe
binary pregeometry was used as a mathematical basis for the relational approach
Thermodynamic functions of solvation of benzene in various binary aqueous-organic solvents of
binary solvent upon insertion of solute molecules and diminishment of the hydrophobic effect.
Hyperbranched polyester polyacids and their binary systems with surfactants for doxorubicin encapsulation derivatives and their
binary systems in the presence of a surfactant (Brij-35, Triton X-100) was investigated
Analysis of Properties of Quantum Hashing of
binary quantum hashing that allows one to represent
binary sets as quantum states. We show
Developing models of IoT infrastructures to identify vulnerabilities and analyse threats are designed to identify
vulnerabilities and analyse potential threats. Scenarios of attacks typical
Vulnerabilities of deep learning biometric voice applications in banking and financial services review of the most popular voice assistants used in banks. The main
vulnerabilities and threats