Articole din publicaţii internaţionale: Recent submissions

  • BALANUȚĂ, Anatol; SCLIFOS, Aliona; ZGARDAN, Dan; BORȘI, Igor (Universitatea Agrară de Stat din Moldova, 2018)
    În lucrarea dată a fost elaborată și implementată tehnologia de producere a vinului spumant din soiuri de interselecție autohtone оn condiții de microvinificație.
  • BALANUȚĂ, Anatol; SCLIFOS, Aliona; LEȘANU, Alexandra (Universitatea Agrară de Stat din Moldova, 2018)
    În această lucrare au fost elaborate schemele tehnologice ale vinurilor roșii obținute din soiul Cabernet – Sauvignon prin trei procedee diferite: criomacerare, metoda tradițională și termomacerare și s-a efectuat profilul ...
  • ARHIP, Vasile; STRATAN, Alexandra (Universitatea Agrară de Stat din Moldova, 2018)
    Lucrarea prezintă rezultatele evaluări potențialului tegnologic a soiului de struguri Feteasca neagră pentru aceasta sau cercetat doua vinuri din acest soi fabricate prin două procedeie tehnologice diferite, prin metoda ...
  • Unknown author (Moldavian Society of Biomedical Engineering, 2020)
    Doamna Rodica STURZA s-a născut în comuna Caracuşenii Vechi, raionul Briceni, Republica Moldova, la 6 ianuarie 1960 şi a urmat studiile gimnaziale şi liceale la şcoala din localitate. Anii de şcoală i-au marcat profund ...
  • GHENDOV-MOŞANU, Aliona; CRISTEA, Elena; PATRAȘ, Antoanela; STURZA, Rodica; PĂDUREANU, Silvica; DESEATNICOVA, Olga; TURCULEȚ, Nadejda; BOEŞTEAN, Olga; NICULAUA, Marius (MDPI, 2020)
    Sea buckthorn (Hippophae rhamnoides) berries are well known for their content in bioactive compounds, high acidity, bright yellow color, pleasant taste and odor, thus their addition in a basic food such as bread could ...
  • BALANUŢĂ, A.; PALAMARCIUC, Liudmila; SCLIFOS, Aliona; ARHIP, V.; CRUCERESCU, Veronica (Universitatea Agrară de Stat din Moldova, 2013)
    It has been investigated the absorption spectres by spectrophotometric method of hydro-alcoholic extracts from plums and apricots.
  • STURZA, R.; NEJINSKII, A.; LOZACOVICI, D.; MARCOCI, L. (Universitatea Agrară de Stat din Moldova, 2013)
    The study has been focused on the comparative analysis of various analytical techniques for the injection of samples applied to detect the additives with flavouring potential that are used to obtain illicitly the "Muscat" ...
  • BALANUŢĂ, A.; ARHIP, V.; COHANOVSCAIA, Stella (Universitatea Agrară de Stat din Moldova, 2013)
    This article presents teh results of experiments on mineral substances contain in white raw material for distilates from autohtone sortes of grapes. These experiments can be used to characterize the place of origin of ...
  • BULAI, Rodica; CUCU, Eugeniu; DAVID, Eugeniu (Academia de Studii Economice din Moldova, 2018)
    This talk is about a new system that is about to be implemented by us. It will be a new approach on vulnerability monitoring that will permit to reduce the amount of work for IT professionals and will be a easy to use tool ...
  • BULAI, Rodica; STUPINA, Daria (Academia de Studii Economice din Moldova, 2018)
    This article informs about the concept and purpose of an information asset inventory as a part of an information security management system. It also gives a representation of an implemented application; which purpose is ...
  • BULAI, Rodica (Academia de Studii Economice din Moldova, 2013)
    This paper briefly describes the quantitative and qualitative risk assessment methods with attention on its advantages and disadvantages when applied in information security.
  • BULAI, Rodica; ŢURCANU, Dinu; CIORBĂ, Dumitru (Facultas Verlags- und Buchhandels, 2019)
    The article addresses education as the smartest investment in cybersecurity. One of the most intriguing findings is that 95% of security incidents involve human errors. Most security attacks are concerned with human weakness ...
  • BULAI, Rodica; FANARI, Victor (Facultas Verlags- und Buchhandels, 2018)
    The development of information society, which has led to an impressive increase in the volume of information, mainly economic, circulated in computer networks, accelerated the development and mostly the use of modern ...
  • IVANOV, Sergiu (Institutul de Matematică şi Informatică al AŞM, 2011)
    The process of design and study of P system often consists in creating a basic model to which a series of further modifications is applied. These modifications are often generic and do not depend on the details of a certain ...
  • BEŞLIU, Victor; CIORBĂ, Dumitru; CIUMAC, Sergiu; ANDRONACHI, Vadim (Institutul de Matematică şi Informatică al AŞM, 2011)
    Currently, modern applications cannot be imagined without intelligent entities, which imply high performance requirements. This can be achieved using concurrent techniques. Even though, all parallel activities present ...
  • BULAI, Rodica; BESLIU, Victor (Consiliul Naţional pentru Acreditare şi Atestare, 2012)
    This paper is about preparing of the specialists in information security of license and master degree levels at Technical University of Moldova.
  • BALABANOV, Anatolii; AGAFONOV, A.; IZVOREANU, Bartolomeu; FIODOROV, Ion; COJUHARI, Irina; MORARU, Dumitru (Consiliul Naţional pentru Acreditare şi Atestare, 2012)
    In this paper the authors propose an advanced algorithm of RSA (modernized "kriptolock"). This algorithm is proposed to use for encoding the information with a short term of secrecy, when the attack are encrypted blocks ...
  • BOGATENCOV, Peter; POCOTILENCO, Valentin (Consiliul Naţional pentru Acreditare şi Atestare, 2012)
    Contemporary level of scientific and technical development is due to sharing relevant information and in this case it is very important to organize access to various informational systems with protected informational ...
  • BULAI, Rodica; BEŞLIU, Victor (Consiliul Naţional pentru Acreditare şi Atestare, 2012)
    Information security deals with providing protection for digital information and information systems, ensuring confidentiality, integrity and availability of data. The complexity of information security does not resume to ...
  • DANILESCU, Marcel; BEŞLIU, Victor (Consiliul Naţional pentru Acreditare şi Atestare, 2012)
    The privacy of data and data security is one of the current requirements in organizations. In this paper we present the implementation method, using trust policies. This article complements previous studies concerning the ...

Search DSpace


Browse

My Account