-
1
Control and diagnostics of faults in hardware-software complex
Published 2018-04-01Get full text
Article -
2
Alternative casting technologies at the gas-tuibine complex “Zorja” -“Mashinproject”
Published 2003-08-01Get full text
Article -
3
The Visual Complexity of Coronal Mass Ejections Follows the Solar Cycle
Published 2020-10-01Get full text
Article -
4
An ingredient co-occurrence network gives insight into e-liquid flavor complexity
Published 2024-01-01Get full text
Article -
5
Complex resistance of spring and winter bread wheat lines to biotic and abiotic stresses
Published 2021-12-01Get full text
Article -
6
-
7
-
8
-
9
Protein-DNA interactions: statistical analysis of interatomic contacts in major and minor grooves
Published 2018-01-01Get full text
Article -
10
Mother-fetus immunogenetic dialogue as a factor of progeny immune system development
Published 2019-01-01Get full text
Article -
11
-
12
DNA Cleavage, Cytotoxic Activities, and Antimicrobial Studies of Ternary Copper(II) Complexes of Isoxazole Schiff Base and Heterocyclic Compounds
Published 2014-01-01“…Novel mixed ligand bivalent copper complexes [Cu. L. A. ClO4] and [Cu. L. A] where “L” is Schiff bases, namely 2-((3,4-dimethylisoxazol-5-ylimino)methyl)-4-bromophenol (DMIIMBP)/2-((3,4-dimethylisoxazol-5-ylimino)methyl)-4-chlorophenol (DMIIMCP), and “A” is heterocyclic compound, such as 1,10-phenanthroline (phen)/2,21-bipyridyl (bipy)/8-hydroxyquinoline (oxine)/5-chloro-8-hydroxyquinoline (5-Cl-oxine), have been synthesized. …”
Get full text
Article -
13
-
14
The enigmatic diploid Chenopodium ucrainicum (Chenopodiaceae / Amaranthaceae s. l.): geographical, ecological, and phytosociological patterns as clues to its origin
Published 2024-12-01“…Chenopodium ucrainicum Mosyakin & Mandák (Chenopodiaceae / Amaranthaceae s. l.), a newly described diploid species currently known only from Ukraine, is a distinctive yet still enigmatic element of the Ukrainian flora. …”
Get full text
Article -
15
Trojan message attack on the concatenated hash functions
Published 2016-08-01“…The Trojan message attack was proposed by Andreeva,et al.aiming at the hash functions with MD structure.First it was applied on the hash function beyond MD structure,that was,concatenated hash.Utilizing the property of the concatenated hash,and combining the Joux's multicollision and the “diamond” structure with the depth of n−l,a Trojan message of the length n 2<sup>k</sup>· blocks for the 2n-bit concatenated hash was constructed,based on which a chosen-prefix Trojan message attack was first proposed.And the memory complexity of proposed attack is about 2l+2<sup>n−l+1</sup>+n·2<sup>k+1</sup>blocks and the time complexity is about O (n·2<sup>n+k</sup>+l·2<sup>l</sup>)computations of the compression function,much less than the ideal value O(n·2<sup>2n+k</sup>).…”
Get full text
Article -
16
-
17
PATRONAZH SERVICE OF AGED PEOPLE AS A CURRENT OBJECT OF STATISTICAL RESEARCH
Published 2019-10-01Get full text
Article -
18
The national project “Labor Productivity” in the Rostov Region: impact on economy of the region
Published 2024-08-01Get full text
Article -
19
Social Well-Being of Higher School Teachers: Social Context and Measurement Criteria
Published 2023-05-01Get full text
Article -
20
From Volmar to Omsk by roads of service: to the biography of State Councilor G. Ya. Galkin (1861–1919)
Published 2019-12-01Get full text
Article