Results 141 to 149 of about 12,642 (149)
Some of the next articles are maybe not open access.
2017
ÐÑполнен анализ ÑекÑÑего ÑоÑÑоÑÐ½Ð¸Ñ Ñ Ð¾Ð·ÑйÑÑвенной деÑÑелÑноÑÑи пÑедпÑиÑÑиÑ, Ñ ÑÑеÑом его ÑпеÑиÑиÑеÑÐºÐ¸Ñ Ð¾ÑобенноÑÑей и напÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´ÐµÑÑелÑноÑÑи. ÐÑÑледовано ÑинанÑовое ÑоÑÑоÑние пÑедпÑиÑÑиÑ
openaire +1 more source
ÐÑполнен анализ ÑекÑÑего ÑоÑÑоÑÐ½Ð¸Ñ Ñ Ð¾Ð·ÑйÑÑвенной деÑÑелÑноÑÑи пÑедпÑиÑÑиÑ, Ñ ÑÑеÑом его ÑпеÑиÑиÑеÑÐºÐ¸Ñ Ð¾ÑобенноÑÑей и напÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´ÐµÑÑелÑноÑÑи. ÐÑÑледовано ÑинанÑовое ÑоÑÑоÑние пÑедпÑиÑÑиÑ
openaire +1 more source
2019
In this paper, two problems of fracture mechanics are considered: structural transitions and the initiation of the destruction of bodies with defects. Crystal bodies are considered. For the first problem, results were obtained and compared using different stability criteria (analytical and using molecular dynamics). The methods showed a good match.
openaire +1 more source
In this paper, two problems of fracture mechanics are considered: structural transitions and the initiation of the destruction of bodies with defects. Crystal bodies are considered. For the first problem, results were obtained and compared using different stability criteria (analytical and using molecular dynamics). The methods showed a good match.
openaire +1 more source
2016
Ð ÑабоÑе ÑаÑÑмаÑÑиваÑÑÑÑ ÑеоÑÐ¸Ñ Ð¸ меÑÐ¾Ð´Ñ ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÑинанÑовÑми ÑеÑÑÑÑами оÑганизаÑии, иÑÑоÑники Ð¸Ñ ÑоÑмиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ оÑновнÑе напÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÑаÑÑ Ð¾Ð´Ð¾Ð²Ð°Ð½Ð¸Ñ.
openaire +1 more source
Ð ÑабоÑе ÑаÑÑмаÑÑиваÑÑÑÑ ÑеоÑÐ¸Ñ Ð¸ меÑÐ¾Ð´Ñ ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÑинанÑовÑми ÑеÑÑÑÑами оÑганизаÑии, иÑÑоÑники Ð¸Ñ ÑоÑмиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ оÑновнÑе напÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÑаÑÑ Ð¾Ð´Ð¾Ð²Ð°Ð½Ð¸Ñ.
openaire +1 more source
2019
This paper describes a method for providing verification of signature rights in group signatures on lattices. The given model of multi-user interaction is analyzed to identify threats to information security. Selected method of protection from the most dangerous.
openaire +1 more source
This paper describes a method for providing verification of signature rights in group signatures on lattices. The given model of multi-user interaction is analyzed to identify threats to information security. Selected method of protection from the most dangerous.
openaire +1 more source
ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð²ÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ ÑвлÑеÑÑÑ Ð´ÐµÑÑелÑноÑÑÑ Ð¾Ð¿ÐµÑаÑивников в ÑÑеÑе пÑоÑиводейÑÑÐ²Ð¸Ñ ÑкономиÑеÑким пÑеÑÑÑплениÑм. Ð¦ÐµÐ»Ñ ÑабоÑÑ â ÑазÑабоÑка пÑедложений по Ñ
openaire +1 more source
openaire +1 more source
2018
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена ÑазÑабоÑке алгоÑиÑма ÑÐ¾Ð·Ð´Ð°Ð½Ð¸Ñ Ð¸ подгоÑовки к анимаÑии ÑеÑвеÑоногого пеÑÑонажа (лоÑади). ÐодобнÑй алгоÑиÑм Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸Ñ ÑазÑабоÑÑикам компÑÑÑеÑнÑÑ Ð¸Ð³Ñ ÑпÑавиÑÑÑÑ Ñ Ð·Ð°Ð´Ð°Ñ ...
openaire +1 more source
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена ÑазÑабоÑке алгоÑиÑма ÑÐ¾Ð·Ð´Ð°Ð½Ð¸Ñ Ð¸ подгоÑовки к анимаÑии ÑеÑвеÑоногого пеÑÑонажа (лоÑади). ÐодобнÑй алгоÑиÑм Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸Ñ ÑазÑабоÑÑикам компÑÑÑеÑнÑÑ Ð¸Ð³Ñ ÑпÑавиÑÑÑÑ Ñ Ð·Ð°Ð´Ð°Ñ ...
openaire +1 more source
ЦелÑÑ Ð¸ÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвилаÑÑ ÑазÑабоÑка ÑÑÑекÑивной ÑÑÑаÑегии ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÑеловеÑеÑкими ÑеÑÑÑÑами оÑганизаÑии. ÐÑÑледование вÑполнÑлоÑÑ Ð½Ð° базе ÐР«ÐеÑÑекÑ».
openaire +1 more source
openaire +1 more source
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¸Ð·ÑÑение и ÑÑвоение ÑеоÑеÑиÑеÑкиÑ
аÑпекÑов ÑÑÑекÑивноÑÑи иÑполÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ ÑÑÑдовÑÑ
ÑеÑÑÑÑов, а Ñакже ÑазÑабоÑка меÑопÑиÑÑий по ÑовеÑÑенÑÑÐ²Ð¾Ð²Ð°Ð½Ð¸Ñ Ð½Ð° пÑедпÑиÑÑии. РабоÑа вÑ
openaire +1 more source
openaire +1 more source
Cystic fibrosis (CF) is one of the most common hereditary diseases caused by pathogenic variants (mutations) in the CFTR (Cystic Fibrosis Transmembrane Conduction Regulator) gene. The aim of this study is to develop an improved test system for searching for rare variants in the CFTR gene, which will provide high specificity in determining pathogenic ...
openaire +1 more source
openaire +1 more source

