Results 1 to 10 of about 157,938 (303)

Countering AI-powered disinformation through national regulation: learning from the case of Ukraine [PDF]

open access: yesFrontiers in Artificial Intelligence
Advances in the use of AI have led to the emergence of a greater variety of forms disinformation can take and channels for its proliferation. In this context, the future of legal mechanisms to address AI-powered disinformation remains to be determined ...
Anatolii Marushchak   +2 more
doaj   +2 more sources

INFORMATION SECURITY OF UKRAINE: MODERN CHALLENGES

open access: yesВісник Харківського національного університету імені В. Н. Каразіна Серія: «Право», 2017
O. V. Pletnov
doaj   +1 more source

Methods of Current Knowledge Teaching on the Cybersecurity Example

open access: yesEducation Sciences, 2022
Teaching of modern cybersecurity specialists should be up to date and use the newest methods and methodologies in universities as the IT industry is rapidly growing and constantly changing.
Elena Nyemkova   +3 more
doaj   +1 more source

Broadband transfer of binary images via optically long wire media

open access: yesNanophotonics, 2023
In the paper the binary mechanism of the long-distance image transfer in a wire-medium (WM) endoscope is suggested and studied. We have shown that a discrete image formed by a set of point sources TM-polarized with respect to the WM can be transferred ...
Vovchuk Dmytro   +4 more
doaj   +1 more source

Modified Transceiver Antenna for NQR Detection of Explosive Objects in Demining Conditions

open access: yesEnergies, 2022
This paper presents the conceptual stages of the simulation and development of a modified transceiver antenna for a high-power pulsed nuclear quadrupole resonance (NQR) detector of explosives containing the 14N isotope.
Andrii Samila   +4 more
doaj   +1 more source

Modified Fast Inverse Square Root and Square Root Approximation Algorithms: The Method of Switching Magic Constants

open access: yesComputation, 2021
Many low-cost platforms that support floating-point arithmetic, such as microcontrollers and field-programmable gate arrays, do not include fast hardware or software methods for calculating the square root and/or reciprocal square root.
Leonid V. Moroz   +2 more
doaj   +1 more source

INFORMATION SECURITY AS AN OBJECT OF REGULATION IN THE LAW OF UKRAINE [PDF]

open access: yesJournal of International Legal Communication, 2021
The study gives definitions of information security and related terms, such as cybersecurity, national security, and others, indicates the goals, objects, subjects of the concepts under consideration.
Iryna M. Sopilko
doaj   +1 more source

FREQUENCY MODULATION APPROACH BASED ON SPLIT-RING RESONATOR LOADED BY VARACTOR DIODE

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2020
In the paper, an approach to frequency modulation is presented using a split-ring resonator (SRR) loaded by a varactor diode. The modulation occurs due to the continuous time variation of capacitance of the varactor diode via changing of its bias voltage
Dmytro Vovchuk   +3 more
doaj   +1 more source

Legal regulation of information security in Ukraine

open access: yesAnalytical and Comparative Jurisprudence, 2023
The article is devoted to the study of the system of legal regulation of information security in Ukraine. It has been established that the Constitution is the foundation of the system of legal acts, which is the basis of legal regulation of information security in Ukraine.
openaire   +3 more sources

Net structure of subject-to-subject relations in the management of the system of administrative services provision [PDF]

open access: yes, 2017
The purpose of the work is to form the net structure of management of the system of administrative services provision on the basis of implementation of subject-to-subject interactions between state sector and civil society. Methodology.
Britchenko, Igor, Danshina, Yulya
core   +5 more sources

Home - About - Disclaimer - Privacy