Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Базы данных


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
в найденном
 Найдено в других БД:Eлектронний каталог (124)Зведений електронний каталог «Правова освіта. Правова культура» (7)
Формат представлення знайдених документів :
полныйинформационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

(<.>K=EAST$<.>)

Загальна кількість знайденихдокументів : 47
Показані документи с 1 по 10
 1-10    11-20   21-30   31-40   41-47 
1.
Zabuha, Y. Y.
    Overview and analysis of occupational risks in healthcare of eastern europe countries [Текст] / Y. Y. Zabuha, T. О. Mykhailichenko, O. V. Morochkovska // Wiadomosci lekarskie. - 2019. - Vol. 72, Iss. 12, cz. 2. - p. 2510-2517
   Перевод заглавия: Обзор и анализ профессиональных рисков в здравоохранении стран Восточной Европы
ББК Х916.7
РУБ DOI: 10.36740/WLek201912219

Аннотация: OBJECTIVE: Introduction: Occupational risks affecting each healthcare professional are diverse and significantly affect their physical and psychological condition. They can conditionally be divided into risks resulting from: 1) the impact of the work process and pose a risk to the life and health of healthcare professionals; 2) the activities of healthcare professionals and pose a potential risk to the patients lives and health. The latter group poses a threat of criminal liability for the healthcare professional. It is the task of each state to ensure safe working conditions for the effective performance of their duties by healthcare specialists. However, according to the study, the analyzed Eastern European countries lack accurate statistics on occupational diseases of healthcare professionals, while the latter often do not seek specialized care and are treated on their own. The aim: to identify the types and causes of occupational risks for healthcare professionals working in the countries of Eastern Europe; to investigate the legislation of these countries under which medical professionals may be prosecuted/held guilty and, thus, criminally liable for causing harm to their patients. PATIENTS AND METHODS: Materials and methods: Legislation of the Republic of Belarus, Republic of Moldova, Russian Federation and Ukraine, international declarations and conventions, research papers, case law of the European Court of Human Rights, national court decisions of some East European countries. CONCLUSION: Conclusions: Occupational risks to the healthcare professionals are risks to his or her life and health and risks of criminal liability for causing harm to the patient. The causes of the first type risk are: a significant prevalence proportion of infectious diseases; the use of faulty medical equipment; unregulated working day and low salaries; medical attendance of patients prone to aggression, etc. The healthcare professional shall be criminally responsible only if he/she is found guilty for infliction of harm to the life and health of the patient and the presence of the obligatory signs of a specific crime in his/her actions.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
сервер - 0 байт
сервер

Найти похожие

2.
Yevtieieva, D. P.
    East slavic surrogate motherhood: state of legal regulation and risk of human rights violation [Текст] / D. P. Yevtieieva, A. V. Lapkin, V. V. Karelin // Wiadomosci lekarskie. - 2020. - Vol. 73, Iss. 12, cz. 2. - P. 2882-2889
   Перевод заглавия: Східнославянське сурогатне материнство: стан правового регулювання та ризик порушення прав людини
УДК
РУБ DOI: 10.36740/WLek202012230

Аннотация: OBJECTIVE: The aim: The aim of the study is to determine the state of legal regulation of surrogacy in Ukraine, Russian Federation and Belarus, to identify risks of human rights violations, to identify legal and medical mechanisms to combat the exploitation of women, and to outline a portrait of a surrogate mother. PATIENTS AND METHODS: Materials and methods: The empirical basis is the legislation of Ukraine, Russian Federation and Belarus, which regulates the service of surrogacy, information from the websites of agencies and clinics in this area, as well as personal stories of 41 surrogate mothers, set out in open sources. The following methods were used: dialectical, comparative, statistical, induction and deduction, questionnaire, analysis and synthesis, content analysis. CONCLUSION: Conclusions: The results of the study clarify both the common features of the legal regulation of surrogacy in the East Slavic countries, and the specifics of each of them; the main problems in the field of its application are outlined; the risks of violation of the rights of genetic parents, children and surrogate mothers are characterized. Legal and medical mechanisms for counteracting the exploitation of surrogate mothers have been identified.

Текст - 0 байт
Текст, Работа с электронной копией документа возможна только в читальном зале библиотеки


Найти похожие

3.
Yevseiev, S. .
    Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model [Text] / S. Yevseiev, S. Pohasii, S. Milevskyi, O. Milov, Y. Melenti, I. Grod, D. Berestov, R. Fedorenko, O. Kurchenko // Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 5, No. 9 (113). - P. 30-47
   Перевод заглавия: Разработка метода оценки безопасности киберфизических систем на основе модели Лотки–Вольтерры
УДК
РУБ DOI: 10.15587/1729-4061.2021.241638

Аннотация: The paper presents the results of the development of a method for assessing the security of cyber-physical systems based on the Lotka-Volterra model. Security models of cyber-physical systems are proposed: “predator-prey” taking into account the computing capabilities and focus of targeted cyberattacks, “predator-prey” taking into account the possible competition of attackers in relation to the “prey”, “predato-prey” taking into account the relationships between “prey species” and “predator species”, “predator-prey” taking into account the relationship between “prey species” and “predator species”. Based on the proposed approach, the coefficients of the Lotka-Volterra model α=0.39, β=0.32, γ=0.29, φ=0.27 were obtained, which take into account the synergy and hybridity of modern threats, funding for the formation and improvement of the protection system, and also allow determining the financial and computing capabilities of the attacker based on the identified threats. The proposed method for assessing the security of cyber-physical systems is based on the developed threat classifier, allows assessing the current security level and provides recommendations regarding the allocation of limited protection resources based on an expert assessment of known threats. This approach allows offline dynamic simulation, which makes it possible to timely determine attackers' capabilities and form preventive protection measures based on threat analysis. In the simulation, actual bases for assessing real threats and incidents in cyberphysical systems can be used, which allows an expert assessment of their impact on both individual security services and security components (cyber security, information security and security of information). The presented simulation results do not contradict the graphical results of the classical Lotka-Volterra model, which indicates the adequacy of the proposed approach for assessing the security of cyber-physical systems.

Текст - 0 байт
Текст

Найти похожие

4.
Yevseiev, S. .
    Development of a method for assessing forecast of social impact in regional communities [Текст] / S. Yevseiev, Y. Ryabukha, O. Milov, S. Milevskyi, S. Pohasii, Y. Ivanchenko, I. Ivanchenko, Y. Melenti, I. Opirskyy, I. Pasko // Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 6, Iss. 2 (114). - P. 30-43
   Перевод заглавия: Розробка методики оцінки прогнозу соціального впливу в регіональних громадах
УДК
РУБ DOI: 10.15587/1729-4061.2021.249313

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст

Найти похожие

5.
Yevseiev, S. .
    Development of a Concept for Building a Critical Infrastructure Facilities Security System [Text] / S. Yevseiev, Y. Melenti, O. Voitko, V. Hrebeniuk, A. Korchenko, S. Mykus, O. Milov, O. Prokopenko, O. Sievierinov, D. Chopenko // Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 3. - P. 63-83
   Перевод заглавия: Розробка концепції побудови системи безпеки об'єктів критичної інфраструктури
ББК Х621.162
РУБ DOI 10.15587/1729-4061.2021.233533

Аннотация: To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)

Текст - 0 байт
Текст

Найти похожие

6.
Yevseiev, S.
    Development and analysis of gametheoretical models of security systems agents interaction [Текст] / S. Yevseiev, O. Milov, S. Milevskyi, O. Voitko, M. Kasianenko, Y. Melenti, S. Pohasii, H. Stepanov, O. Turinskyi, S. Turinskyi // Eastern-European Journal of Enterprise Technologies. - 2020. - Vol. 2. Issue 4. - P. 15-29
   Перевод заглавия: Разработка и анализ теоретико-игровых моделей взаимодействия агентов систем безопасности
УДК
ББК З81
РУБ DOI: https://doi.org/10.15587/1729-4061.2020.201418

Аннотация: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope

Текст - 0 байт
Текст,
Текст - 0 байт
Текст

Найти похожие

7.
Yermolaieva, T. .
    Some aspects of environmental rights protection [Text] / T. Yermolaieva, А. Plyokhova // Access to Justice in Eastern Europe. - 2021. - Vol. 4, Iss. 3. - p. 198-204
   Перевод заглавия: Деякі аспекти захисту екологічних прав
ББК Х625.80
РУБ DOI: 10.33327/AJEE-18-4.3-n000079

Аннотация: This note addresses some aspects of the basic principles of environmental rights protection and ECtHR practice. In particular, it analyses the new directions for environmental rights protection that the ECtHR gave us in Tătar v Romania. Some inconsistency of the ECtHR is highlighted since the case-law of environmental principles varies. Significant and important steps towards recognising the importance of procedural rights associated with public participation as this principle are indicated in international environmental law more generally. On the other hand, the Court’s more recent forays into the territory of other environmental principles – particularly that of the precautionary principle – suggests that the Court is less eager to develop its extensive environmental case-law considering the principle of precaution.

Текст - 0 байт
Текст

Найти похожие

8.
Yagup, V.
    Analysis and optimization of the reactive power compensation modes in a power supply system [Text] / V. Yagup, K. Yagup, Y. Kovalova, V. Valeriy Yagup, Katerina Yagup, Yuliia Kovalova, Viktor Kharchenko, Tetiana Besarab, Oleksii Krasnov, Illya Domanskii, Vasilii Domanskii, Hennadii Kostin, Haidar Gafar AbuGoukh // Eastern-European Journal of Enterprise Technologies. - 2019. - Vol. 3, Issue: 8-99. - P. 13-22
   Перевод заглавия: Анализ и оптимизация режимов компенсации реактивной мощности в системе электроснабжения
ББК З2

Аннотация: Представлено дослiдження режимiв в однофазнiй узагальненiй системi електропостачання в аспектi пiдвищення енергетичних показникiв в системi шляхом компенсацiї реактивної потужностi. Розглянутi три тестових варiанта системи електропостачання з рiзними спiввiдношеннями комплексних опорiв навантаження та лiнiї електропередачi. Показанi недолiки традицiйного методу розрахунку параметрiв компенсуючого пристрою, якi забезпечують часткову компенсацiю реактивної потужностi, що споживається лише навантаженням. Аналiз режиму часткової компенсацiї свiдчить про те, що зi збiльшенням реактивностi лiнiї електропередачi погiршуються енергетичнi показники, якi вдається отримати в результатi компенсацiї реактивної потужностi. З застосуванням пошукової оптимiзацiї показано, що для повної компенсацiї потрiбне збiльшення ємностi компенсатора. Метод пошукової оптимiзацiї реалiзований в пакетi програм комп'ютерної математики MathCAD за допомогою вирiшального блоку givenfind. Для цього використовуються рiвняння математичної моделi системи електропостачання на основi компонентних i топологiчних рiвнянь. В якостi додаткових умов використанi спiввiдношення, що визначають повну компенсацiю реактивної потужностi живильного джерела, а також умови фiзичної можливостi бути реалiзованим структури компенсуючого пристрою. Перемiнними оптимiзацiї є параметри дослiджуваного режиму i параметри компенсуючого пристрою. Представленi фрагменти текстiв програм з числовими результатами розв’язань, а також порiвняльнi таблицi результатiв аналiзу i оптимiзацiї режимiв компенсацiї реактивної потужностi в дослiджуваних системах електропостачання для всiх варiантiв їх параметрiв. Данi кiлькiснi оцiнки величини додаткової ємностi, яка обчислюється виходячи з умови компенсацiї нею реактивної потужностi в лiнiї електропередачi. Дослiдження, що проведенi в роботi, показали, що при збiльшеннi реактивного опору лiнiї електропередачi повна компенсацiя не може бути досягнута iз застосуванням поперечної компенсацiї i цьому явищу дана фiзична трактовка. Вона полягає в тому, що напруга на компенсуючому поперечному конденсаторi зменшується швидше, нiж зростає компенсована ним реактивна потужнiсть лiнiї електропередач. Показано, що в останньому випадку повна компенсацiя реактивної потужностi все ж може бути досягнута застосуванням комбiнованої поздовжньо-поперечної компенсацiї.

Текст - 0 байт
Текст, Работа с электронной копией документа возможна только в читальном зале библиотеки


Найти похожие

9.
Urazova, G. .
    Who is the Owner? Newly Discovered Circumstances and the Principle of Legal Certainty in a Single Case Study [Текст] / G. Urazova, V. Yanyshen, L. Baranova // Access to Justice in Eastern Europe. - 2022. - Vol. 5 [не зазначено у Web of Science], Iss. 1 (13). - P. 193-202
   Перевод заглавия: Хто власник? Нововиявлені обставини і принцип правової визначеності на одному прикладі
УДК
РУБ DOI10.33327/AJEE-18-5.1-n000105

Аннотация: Background: The protection of property rights is one of the cornerstones of legal order. If we were uncertain whether ownership would be protected from claims or whether contract obligations would be executed properly, we could not regulate relations effectively. Courts play a crucial role in this mechanism of protecting the owner's rights, giving parties possibilities for defence. This note is related to one of the last judgments of the European Court of Human Rights (ECtHR), the focus of which is on newly discovered circumstances and the principle of legal certainty. The facts of this case arose from a property sale contract with a condition, the validity of which led to the consideration of multiple cases by different Ukrainian courts. Methods: In light of the above, an analysis of this ECtHR judgment, as well as the final and interim decisions of Ukrainian courts, with regard to Ukrainian legislation and case law was prepared. The main challenge was the absence of the oldest decisions of national courts in the state register of court decisions, which contains only decisions from 2011. Even so, the facts of this case were described in detail in the latest courts decisions. Results and Conclusions: The following analysis provides an argument against reopening procedure without proper grounds, which lead to the violation of the right to a fair trial in civil procedure in Ukraine.

Текст - 0 байт
Текст,
Текст - 0 байт
Текст

Найти похожие

10.
Tsuvina, T. .
    Law of Ukraine ‘On mediation’: main achievements and further steps of developing mediation in Ukraine [Текст] / T. Tsuvina, T. Vakhonieva // Access to Justice in Eastern Europe. - 2022. - Vol. 5 [не зазначено у Web of Science], Iss. 1 (13). - P. 142-153
   Перевод заглавия: Закон України «Про медіацію»: основні досягнення та подальші кроки розвитку медіації в Україні
УДК
РУБ DOI: 10.33327/AJEE-18-5.1-n000104

Аннотация: Background: Although mediation is considered one of the most popular ways of consensual dispute resolution, for many years, mediation in Ukraine had no legislative regulation. This was one of the obstacles that restrained alternative dispute resolution (ADR) development in Ukraine, even though the mediation community had been growing. Eventually, the Law of Ukraine ‘On mediation’ was adopted on 16 November 2021. Methods: The article is devoted to distinctive features of the new Ukrainian legislative mediation regulation that are decisive for the national mediation model, such as the definition and principle of mediation, its principles and scope, requirements for mediators, etc. Special attention is paid to the perspective and challenges for the mandatory mediation in terms of the provisions of Art. 124 of the Constitution of Ukraine and European standards for access to court (para. 1 Art. 6 of the ECHR). The article addresses organisational and procedural aspects of integrating mediation into judicial proceedings. Different models of integrating mediation into the Ukrainian court system piloted in Ukraine are analysed. The authors define current trends in the development of mediation in Ukraine. Results and Conclusions: The authors conclude that the adoption of the Law ‘On mediation’ contributes to the ADR movement in Ukraine but needs some further steps, such as developing a national model of court mediation, the amendment of procedural legislation introducing a special procedure that would lead to the enforcement of agreements resulting from international mediation in commercial disputes, and the adoption of special regulation for integrating mediation into other jurisdictional activities (notariat, system of legal aid).

Текст - 0 байт
Текст,
Текст - 0 байт
Текст

Найти похожие

 1-10    11-20   21-30   31-40   41-47 
 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Пушкінська, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава