Results 161 to 170 of about 8,394 (181)
Some of the next articles are maybe not open access.
2017
Рданной ÑабоÑе пÑедÑÑавлено пÑоекÑиÑование подÑÑанÑии «ÐолгинÑкаÑ» 110/10 ÐºÐ Ñ ÑÑÑановкой нового обоÑÑÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸ Ñелейной заÑиÑÑ Ð½Ð° микÑопÑоÑеÑÑоÑной оÑнове.
openaire +1 more source
Рданной ÑабоÑе пÑедÑÑавлено пÑоекÑиÑование подÑÑанÑии «ÐолгинÑкаÑ» 110/10 ÐºÐ Ñ ÑÑÑановкой нового обоÑÑÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸ Ñелейной заÑиÑÑ Ð½Ð° микÑопÑоÑеÑÑоÑной оÑнове.
openaire +1 more source
2019
Ð ÑабоÑе бÑла ÑаÑÑмоÑÑена ÑлекÑÑоÑнеÑгеÑиÑеÑÐºÐ°Ñ ÑиÑÑема 220/110 кÐ, вÑполнение коÑоÑой ÑоÑÑÐ¾Ð¸Ñ Ð¸Ð· ÑеÑÑÑÐµÑ ÑÑапов. Ðа пеÑвом ÑÑапе пÑоводиÑÑÑ Ð²ÑÐ±Ð¾Ñ Ð¾Ð±Ð¾ÑÑдованиÑ, ÑаÑÑмаÑÑиваемой ÑлекÑÑоÑнеÑгеÑиÑ
openaire +1 more source
Ð ÑабоÑе бÑла ÑаÑÑмоÑÑена ÑлекÑÑоÑнеÑгеÑиÑеÑÐºÐ°Ñ ÑиÑÑема 220/110 кÐ, вÑполнение коÑоÑой ÑоÑÑÐ¾Ð¸Ñ Ð¸Ð· ÑеÑÑÑÐµÑ ÑÑапов. Ðа пеÑвом ÑÑапе пÑоводиÑÑÑ Ð²ÑÐ±Ð¾Ñ Ð¾Ð±Ð¾ÑÑдованиÑ, ÑаÑÑмаÑÑиваемой ÑлекÑÑоÑнеÑгеÑиÑ
openaire +1 more source
2020
Ðанное ÑÑебно-меÑодиÑеÑкое поÑобие пÑедназнаÑено Ð´Ð»Ñ ÑÑÑденÑов, обÑÑаÑÑÐ¸Ñ ÑÑ Ð½Ð° ÑÐµÑ Ð½Ð¸ÑеÑÐºÐ¸Ñ Ð¸ ÑизиÑеÑÐºÐ¸Ñ Ð½Ð°Ð¿ÑавлениÑÑ , изÑÑаÑÑÐ¸Ñ Ð¾Ð±Ñий и ÑпеÑиалÑнÑе кÑÑÑÑ Ð²ÑÑÑей маÑемаÑики.
openaire +1 more source
Ðанное ÑÑебно-меÑодиÑеÑкое поÑобие пÑедназнаÑено Ð´Ð»Ñ ÑÑÑденÑов, обÑÑаÑÑÐ¸Ñ ÑÑ Ð½Ð° ÑÐµÑ Ð½Ð¸ÑеÑÐºÐ¸Ñ Ð¸ ÑизиÑеÑÐºÐ¸Ñ Ð½Ð°Ð¿ÑавлениÑÑ , изÑÑаÑÑÐ¸Ñ Ð¾Ð±Ñий и ÑпеÑиалÑнÑе кÑÑÑÑ Ð²ÑÑÑей маÑемаÑики.
openaire +1 more source
2016
РбакалавÑÑкой ÑабоÑе ÑаÑÑмоÑÑÐµÐ½Ñ ÑазлиÑнÑе понÑÑÐ¸Ñ ÑвÑзаннÑе Ñ ÑинанÑиÑованием обоÑоÑнÑÑ Ð°ÐºÑивов пÑедпÑиÑÑÐ¸Ñ Ð·Ð° ÑÑÐµÑ ÑакÑоÑинга, пÑоанализиÑована ÑабоÑа Ñ Ð´Ð°Ð½Ð½Ñм видом ÑÑлÑг на пÑимеÑе ÑиР...
openaire +1 more source
РбакалавÑÑкой ÑабоÑе ÑаÑÑмоÑÑÐµÐ½Ñ ÑазлиÑнÑе понÑÑÐ¸Ñ ÑвÑзаннÑе Ñ ÑинанÑиÑованием обоÑоÑнÑÑ Ð°ÐºÑивов пÑедпÑиÑÑÐ¸Ñ Ð·Ð° ÑÑÐµÑ ÑакÑоÑинга, пÑоанализиÑована ÑабоÑа Ñ Ð´Ð°Ð½Ð½Ñм видом ÑÑлÑг на пÑимеÑе ÑиР...
openaire +1 more source
The final qualifying work is devoted to the study of the 330/110 kV power supply system. Tasks that were solved during the research: 1. Selection of the main equipment used in the studied electric power system 2. Drawing up a replacement scheme and calculating the steady-state regime 3.
openaire +1 more source
openaire +1 more source
2018
РдиÑÑеÑÑаÑионной ÑабоÑе пÑоанализиÑÐ¾Ð²Ð°Ð½Ñ ÑÑÐ»Ð¾Ð²Ð¸Ñ Ð¸ возможноÑÑи пÑÐ¸Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² аÑдиÑе ÑÑаÑиÑÑиÑеÑÐºÐ¸Ñ Ð²ÑбоÑоÑнÑÑ Ð¿ÑоÑедÑÑ, ÑиÑÑемаÑизиÑÐ¾Ð²Ð°Ð½Ñ ÑеоÑеÑиÑеÑкие ÑаÑпÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ ÑлÑÑайнÑÑ Ð²ÐµÐ»Ð¸Ñин и Ñ ...
openaire +1 more source
РдиÑÑеÑÑаÑионной ÑабоÑе пÑоанализиÑÐ¾Ð²Ð°Ð½Ñ ÑÑÐ»Ð¾Ð²Ð¸Ñ Ð¸ возможноÑÑи пÑÐ¸Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² аÑдиÑе ÑÑаÑиÑÑиÑеÑÐºÐ¸Ñ Ð²ÑбоÑоÑнÑÑ Ð¿ÑоÑедÑÑ, ÑиÑÑемаÑизиÑÐ¾Ð²Ð°Ð½Ñ ÑеоÑеÑиÑеÑкие ÑаÑпÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ ÑлÑÑайнÑÑ Ð²ÐµÐ»Ð¸Ñин и Ñ ...
openaire +1 more source
The purpose of the study is to protect binary executable files in Windows OS based on the self-modified code. The subject of the research is modern methods of protecting against exploitation of binary files and executable files in Windows OS. Problems solved during the study: 1.
openaire +1 more source
openaire +1 more source
2019
Ð Ñ Ð¾Ð´Ðµ ÑабоÑÑ Ð±Ñло пÑоведено иÑÑледование и адапÑаÑÐ¸Ñ Ð°Ð»Ð³Ð¾ÑиÑма еÑÑеÑÑвенного гÑадиенÑного ÑпÑÑка к задаÑе Q-обÑÑениÑ. ÐÑла вÑбÑана и Ñеализована аÑÑ Ð¸ÑекÑÑÑа агенÑа Q-обÑÑениÑ, ÑÐ¾Ð·Ð´Ð°Ð½Ñ Ð¸ пÑÐ¾Ñ ...
openaire +1 more source
Ð Ñ Ð¾Ð´Ðµ ÑабоÑÑ Ð±Ñло пÑоведено иÑÑледование и адапÑаÑÐ¸Ñ Ð°Ð»Ð³Ð¾ÑиÑма еÑÑеÑÑвенного гÑадиенÑного ÑпÑÑка к задаÑе Q-обÑÑениÑ. ÐÑла вÑбÑана и Ñеализована аÑÑ Ð¸ÑекÑÑÑа агенÑа Q-обÑÑениÑ, ÑÐ¾Ð·Ð´Ð°Ð½Ñ Ð¸ пÑÐ¾Ñ ...
openaire +1 more source
2019
In the given work an approach to protecting applications from exploitation of vulnerabilities outlined. Considered various vulnerabilities and principals of their operation. Existing solution were analyzed. Method of protection was developed. A specific software implementation of this method done.
openaire +1 more source
In the given work an approach to protecting applications from exploitation of vulnerabilities outlined. Considered various vulnerabilities and principals of their operation. Existing solution were analyzed. Method of protection was developed. A specific software implementation of this method done.
openaire +1 more source
2016
This diploma thesis is devoted to the analysis of security of IBM-PC compatible computer systems based on x86 and x86-64 architectures. During this thesis, all features of hardware attacks, their main goals, the effects, the conditions for their successful outcome and methods of protection against these attacks were researched.
openaire +1 more source
This diploma thesis is devoted to the analysis of security of IBM-PC compatible computer systems based on x86 and x86-64 architectures. During this thesis, all features of hardware attacks, their main goals, the effects, the conditions for their successful outcome and methods of protection against these attacks were researched.
openaire +1 more source

