Íàö³îíàëüíèé àåðîêîñì³÷íèé óí³âåðñèòåò ³ì. Ì.ª. Æóêîâñüêîãî “Õàðê³âñüêèé àâ³àö³éíèé ³íñòèòóò”

 

ISSN 1814-4225. ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ’ÞÒÅÐͲ ÑÈÑÒÅÌÈ. – Õàðê³â, ÍÀÓ ÕÀ², 2012. - ¹ 5(57). – 246 ñ.

ISSN 1814-4225. ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÅ È ÊÎÌÏÜÞÒÅÐÍÛÅ ÑÈÑÒÅÌÛ. – Õàðüêîâ, ÍÀÓ ÕÀÈ, 2012. - ¹ 5(57). – 246 ñ.

ISSN 1814-4225. RADIOELECTRONIC AND COMPUTER SYSTEMS. – Kharkiv, NAU KhAI, 2012. – ¹ 5(57). – 246 p.

 

ÑÒÀÒÒ² (articleS)

 

Àâòîðè
(ìîâà
îðèã³íàëó)

Íàçâà ñòàòò³  (article title)

Ñòî­ð³íêè

(pages)

English

Óêðà¿íñüêà ìîâà

Ðóññêèé ÿçûê

Ãàðàíòîçäàòí³còü òà ñèñòåìè ³ êîìóí³êàö³¿ âèñîêî¿ ãîòîâíîñò³

Òþðèí Ñ.Ô.,
Ãðîìîâ Î.À.

LUT FPGA SYNTHESIS BASED ON FUNCTIONALLY COMPLETE TOLERANT ELEMENTS

ÑÈÍÒÅÇ LUT ÏË²Ñ Ó ÔÓÍÊÖ²ÎÍÀËÜÍÎ ÏÎÂÍÎÌÓ ÒÎËÅÐÀÍÒÍÎÌÓ ÁÀÇÈѲ

ÑÈÍÒÅÇ LUT ÏËÈÑ Â ÔÓÍÊÖÈÎÍÀËÜÍÎ ÏÎËÍÎÌ ÒÎËÅÐÀÍÒÍÎÌ ÁÀÇÈÑÅ

11–16
(6)

Ïîëÿêîâ Ã.À.,
Òîëñòîëóæñêàÿ Å.Ã.,
Òîëñòîëóæñêàÿ Â.Â.

 

ASSESSMENTS OF COMPUTING SYNTHESIS COMPLEXITY OF PARALLEL TIME-PARAMETERIZED MODELS OF TASKS

ÎÖ²ÍÊÈ ÎÁ×ÈÑËÞÂÀËÜÍί ÑÊËÀÄÍÎÑÒ² ÑÈÍÒÅÇÓ ÏÀÐÀËÅËÜÍÈÕ ×ÀÑÎÏÀÐÀÌÅÒÐÈÇÎÂÀÍÈÕ ÌÎÄÅËÅÉ ÇÀÄÀ×

ÎÖÅÍÊÈ ÂÛ×ÈÑËÈÒÅËÜÍÎÉ ÑËÎÆÍÎÑÒÈ ÑÈÍÒÅÇÀ ÏÀÐÀËËÅËÜÍÛÕ ÂÐÅÌßÏÀÐÀÌÅÒÐÈÇÎÂÀÍÍÛÕ ÌÎÄÅËÅÉ ÇÀÄÀ×

17–22
(6)

Skarga-Bandurova I.S.,
Nesterov M.V.

 

IMPLEMENTATION OF HIGH AVAILABILITY HEALTHCARE INFORMATION SYSTEM ARCHITECTURE

ÐÅÀ˲ÇÀÖ²ß ÀÐÕ²ÒÅÊÒÓÐÈ ÂÈÑÎÊί ÃÎÒÎÂÍÎÑÒ² ÄËß ÌÅÄÈ×Íί ²ÍÔÎÐÌÀÖ²ÉÍί ÑÈÑÒÅÌÈ 

ÐÅÀËÈÇÀÖÈß ÀÐÕÈÒÅÊÒÓÐÛ ÂÛÑÎÊÎÉ ÃÎÒÎÂÍÎÑÒÈ ÄËß ÌÅÄÈÖÈÍÑÊÎÉ ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÑÈÑÒÅÌÛ

23–27
(5)

Ñò³éê³ Grid-, Web- ³ Cloud-ñèñòåìè

Êðèâöîâ À.Þ.,
Ãîíòîâèé Ñ.Â.

 

analysys of reliable web-SERVICE’S application for the dependably economic expert system’s implementation

ÀÍÀË²Ç ÇÀÑÒÎÑÓÂÀÍÍß ÍÀIJÉÍÈÕ WEB-ÑÅвѲ ÄËß ÐÅÀ˲ÇÀÖ²¯ ÃÀÐÀÍÒÎÇÄÀÒÍÈÕ ÅÊÎÍÎ̲×ÍÈÕ ÅÊÑÏÅÐÒÍÈÕ ÑÈÑÒÅÌ

Àíàëèç ïðèìåíåíèÿ íàäåæíûõ web-ñåðâèñîâ äëÿ ðåàëèçàöèè ãàðàíòîñïîñîáíûõ ýêîíîìè÷åñêèõ ýêñïåðòíûõ ñèñòåì

28–32
(5)

Davies J.N.,
Comerford P.,
Grout V.,
Rvachova N.,
Korkh O.

AN INVESTIGATION INTO THE EFFECT OF RULE COMPLEXITY IN ACCESS CONTROL LIST

ÄÎÑ˲ÄÆÅÍÍß ÂÏËÈÂÓ ÑÊËÀÄÍÎÑÒ² ÏÐÀÂÈË Â ACCESS CONTROL LIST

ÈÑÑËÅÄÎÂÀÍÈÅ ÂËÈßÍÈß ÑËÎÆÍÎÑÒÈ ÏÐÀÂÈË Â ACCESS CONTROL LIST

33–38
(6)

Àïðàêñèí Þ.Ê.,
Òóðåãà È.Î.

TOPOLOGICAL SYNTHESIS OF GEOGRAPHICALLY DISTRIBUTED NETWORKS BASED ON MULTIAGENT METHODS

ÒÎÏÎËÎò×ÍÈÉ ÑÈÍÒÅÇ ÒÅÐÅÒÎвÀËÜÍÎ-ÐÎÇÏÎIJËÅÍÈÕ ÌÅÐÅÆ ÍÀ ÎÑÍβ ÌÓËÜÒÈÀÃÅÍÒÍÈÕ ÌÅÒÎIJÂ

ÒÎÏÎËÎÃÈ×ÅÑÊÈÉ ÑÈÍÒÅÇ ÒÅÐÐÈÒÎÐÈÀËÜÍÎ-ÐÀÑÏÐÅÄÅËÅÍÍÛÕ ÑÅÒÅÉ ÍÀ ÎÑÍÎÂÅ ÌÓËÜÒÈÀÃÅÍÒÍÛÕ ÌÅÒÎÄÎÂ

39–41
(3)

²íôîðìàö³éíà áåçïåêà òà áåçïå÷íèé êîìï’þòèíã

Oliynykov R.V.,
Kiyanchuk R.I.

PERSPECTIVE SYMMETRIC BLOCK CIPHER OPTIMIZED FOR HARDWARE IMPLEMENTATION

ÏÅÐÑÏÅÊÒÈÂÍÈÉ ÁËÎÊÎÂÈÉ ÑÈÌÅÒÐÈ×ÍÈÉ ØÈÔÐ, ÎÏÒÈ̲ÇÎÂÀÍÈÉ ÄËß ÀÏÀÐÀÒÍί ÐÅÀ˲ÇÀÖ²¯

ÏÅÐÑÏÅÊÒÈÂÍÛÉ ÁËÎ×ÍÛÉ ÑÈÌÌÅÒÐÈ×ÍÛÉ ØÈÔÐ, ÎÏÒÈÌÈÇÈÐÎÂÀÍÍÛÉ ÄËß ÀÏÏÀÐÀÒÍÎÉ ÐÅÀËÈÇÀÖÈÈ

42–47
(6)

Chevardin V.E.

A PSEUDORANDOM BIT GENERATOR BASED ON ELLIPTIC CURVE TRANSFORMATIONS

ÃÅÍÅÐÀÒÎÐ ÏÑÅÂÄÎÂÈÏÀÄÊÎÂÈÕ Á²Ò ÍÀ ÎÑÍβ ÒÐÀÍÑÔÎÐÌÀÖ²É Å˲ÏÒÈ×Íί ÊÐÈÂί

ÃÅÍÅÐÀÒÎÐ ÏÑÅÂÄÎÑËÓ×ÀÉÍÛÕ ÁÈÒ ÍÀ ÎÑÍÎÂÅ ÒÐÀÍÑÔÎÐÌÀÖÈÉ ÝËËÈÏÒÈ×ÅÑÊÎÉ ÊÐÈÂÎÉ

48–50
(3)

Ðóæåíöåâ Â.È.

Provable security of rijndael-like ciphers to truncated differentials attack

Äîêàçóºìà ñò³éê³ñòü rijndael-ïîä³áíèõ øèôð³â äî àòàêè óñ³÷åíèõ äèôåðåíö³àë³â

ÄÎÊÀÇÓÅÌÀß ÑÒÎÉÊÎÑÒÜ RIJNDAEL-ÏÎÄÎÁÍÛÕ ØÈÔÐÎÂ Ê ÀÒÀÊÅ ÓÑÅ×ÅÍÍÛÕ ÄÈÔÔÅÐÅÍÖÈÀËÎÂ

51–55
(5)

Savenko O.S.,
Lysenko S.M.,
Kryshchuk A.F.

MULTI-AGENT BASED APPROACH OF BOTNET DETECTION

ÂÈßÂËÅÍÍß ÁÎÒÍÅÒ ÌÅÐÅÆ ÍÀ ÎÑÍβ ÌÓËÜÒÈ-ÀÃÅÍÒÍÈÕ ÑÈÑÒÅÌ

ÎÁÍÀÐÓÆÅÍÈÅ ÁÎÒÍÅÒ-ÑÅÒÅÉ ÍÀ ÎÑÍÎÂÅ ÌÓËÜÒÈÀÃÅÍÒÍÛÕ ÑÈÑÒÅÌ

56–61
(6)

Skatkov A.V.,
Bruhoveckiy A.A.,
Loviahin V.S.

DEVELOPMENT OF METHODS FOR ADAPTIVE PROTECTION AND COMPUTER SECURITY BASED ON THE THEORY OF ARTIFICIAL IMMUNE SYSTEMS

ÐÎÇÐÎÁÊÀ ÌÅÒÎIJ ÀÄÀÏÒÈÂÍÎÃÎ ÇÀÕÈÑÒÓ ÒÀ ÊÎÌÏ'ÞÒÅÐÍί ÁÅÇÏÅÊÈ, ÇÀÑÍÎÂÀÍÈÕ ÍÀ ÒÅÎв¯ ØÒÓ×ÍÈÕ ²ÌÓÍÍÈÕ ÑÈÑÒÅÌ

ÐÀÇÐÀÁÎÒÊÀ ÌÅÒÎÄÎÂ ÀÄÀÏÒÈÂÍÎÉ ÇÀÙÈÒÛ È ÊÎÌÏÜÞÒÅÐÍÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ, ÎÑÍÎÂÀÍÍÛÕ ÍÀ ÒÅÎÐÈÈ ÈÑÊÓÑÑÒÂÅÍÍÛÕ ÈÌÌÓÍÍÛÕ ÑÈÑÒÅÌ

62–66
(5)

ªìåëüÿíîâ Â.Î.,
Á³ðþêîâ À.Â.

The software for protecting of the confidential data

²ÍÑÒÐÓÌÅÍÒÀËÜÍÈÉ ÇÀѲÁ ÇÀÁÅÇÏÅ×ÅÍÍß ²ÍÔÎÐÌÀÖ²ÉÍί ÁÅÇÏÅÊÈ ÊÎÍÔ²ÄÅÍÖ²ÉÍÈÕ ÄÀÍÈÕ

ÈÍÑÒÐÓÌÅÍÒÀËÜÍÎÅ ÑÐÅÄÑÒÂÎ ÎÁÅÑÏÅ×ÅÍÈß ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ ÊÎÍÔÈÄÅÍÖÈÀËÜÍÛÕ ÄÀÍÍÛÕ

67–71
(5)

Potiy A.V.,
Pilipenko D.Y.,
Rebriy I.N.

THE PREREQUISITES OF INFORMATION SECURITY CULTURE DEVELOPMENT AND AN APPROACH TO COMPLEX EVALUATION OF ITS LEVEL

ÏÅÐÅÄÓÌÎÂÈ ÔÎÐÌÓÂÀÍÍß ÊÓËÜÒÓÐÈ ²ÍÔÎÐÌÀÖ²ÉÍί ÁÅÇÏÅÊÈ ÒÀ ÌÅÒÎÄ ÊÎÌÏËÅÊÑÍÎÃÎ ÎÖ²ÍÞÂÀÍÍß ¯¯ вÂÍß

ÏÐÅÄÏÎÑÛËÊÈ Ê ÔÎÐÌÈÐÎÂÀÍÈÞ ÊÓËÜÒÓÐÛ ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈÈ ÌÅÒÎÄ ÊÎÌÏËÅÊÑÍÎÃÎ ÎÖÅÍÈÂÀÍÈß ÅÅ ÓÐÎÂÍß

72–77
(6)

Êðèñèëîâ Â.À.,
Ìàðóëèí Ñ.Þ.

METHODOLOGY REDUCING LABORIOUSNESS TRANSFERRING PROCESS OF DOCUMENTS PAPER COPIES CONTENT INTO INFORMATION SYSTEM DATA BASE

ÌÅÒÎÄÈÊÀ ÑÊÎÐÎ×ÅÍÍß ÒÐÓÄÎ̲ÑÒÊÎÑÒ² ÏÐÎÖÅÑÓ ÏÅÐÅÍÎÑÓ Â̲ÑÒÓ ÏÀÏÅÐÎÂÈÕ ÊÎÏ²É ÄÎÊÓÌÅÍÒ²Â Ó ÁÀÇÓ ÄÀÍÈÕ ²ÍÔÎÐÌÀÖ²ÉÍÈÕ ÑÈÑÒÅÌ

ÌÅÒÎÄÈÊÀ ÑÎÊÐÀÙÅÍÈß ÒÐÓÄÎÅÌÊÎÑÒÈ ÏÐÎÖÅÑÑÀ ÏÅÐÅÍÎÑÀ ÑÎÄÅÐÆÈÌÎÃÎ ÁÓÌÀÆÍÛÕ ÊÎÏÈÉ ÄÎÊÓÌÅÍÒÎÂ Â ÁÀÇÓ ÄÀÍÍÛÕ ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÑÈÑÒÅÌÛ

78–82
(5)

Ôèñóí Ñ.Í.,
Êîïûëîâ À.È.

METHODOLOGY OF ENCRYPTION DATA USING SOFTWARE COMPLEX VisualAES

ÌÅÒÎÄÈÊÀ ØÈÔÐÓÂÀÍÍß ÄÀÍÈÕ Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ÏÐÎÃÐÀÌÍÎ-ÌÅÒÎÄÈ×ÍÎÃÎ ÊÎÌÏËÅÊÑÀ VisualAES

ÌÅÒÎÄÈÊÀ ØÈÔÐÎÂÀÍÈß ÄÀÍÍÛÕ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÏÐÎÃÐÀÌÌÍÎ-ÌÅÒÎÄÈ×ÅÑÊÎÃÎ ÊÎÌÏËÅÊÑÀ VisualAES

83–65
(3)

Øåâ÷óê Î.À.,
Ãîðáåíêî ².Ä.

METHOD OF ACCELERATION OF SCALAR MULTIPLICATION FOR CRYPTOGRAPHIC SCHEMES

ÌÅÒÎÄ ÏÐÈÑÊÎÐÅÍÍß ÑÊÀËßÐÍÎÃÎ ÌÍÎÆÅÍÍß ÄËß ÊÐÈÏÒÎÃÐÀÔ²×ÍÈÕ ÄÎÄÀÒʲÂ

ÌÅÒÎÄ ÓÑÊÎÐÅÍÈß ÑÊÀËßÐÍÎÃÎ ÓÌÍÎÆÅÍÈß ÄËß ÊÐÈÏÒÎÃÐÀÔÈ×ÅÑÊèõ ÏÐÈËÎÆÅÍÈÉ

86–90
(5)

Íàä³éí³ñòü àïàðàòíèõ çàñîá³â òà ñèñòåì íà ïðîãðàìîâàíèõ êðèñòàëàõ

Ðîìàíêåâè÷ À.Ì.,
Ìèëàä Ìîðàâåäæ Ñåéåä,
Ðîìàíêåâè÷ Â.À.,
Ìîðîçîâ Ê.Â.

About one problem of reconfiguration in multiprocessor systems

ÏÐÎ ÎÄÍÓ ÇÀÄÀ×Ó ÐÅÊÎÍÔ²ÃÓÐÓÂÀÍÍß Ó ÁÀÃÀÒÎÏÐÎÖÅÑÎÐÍÈÕ ÑÈÑÒÅÌÀÕ

ÎÁ ÎÄÍÎÉ ÇÀÄÀ×Å ÐÅÊÎÍÔÈÃÓÐÈÐÎÂÀÍÈß Â ÌÍÎÃÎÏÐÎÖÅÑÑÎÐÍÛÕ ÑÈÑÒÅÌÀÕ

91–94
(4)

Øï³öåð À.Ñ.

overview OF SEGMENTATION methods AND ADAPTATION ONE OF THEM FOR SOLUTIONS NETWORK SEGMENTATION PROBLEM BY ELEMENTS workload

ÑÒÈÑËÈÉ ÎÃËßÄ ÌÅÒÎIJ ÑÅÃÌÅÍÒÀÖ²¯ ÒÀ ÀÄÀÏÒÀÖ²ß ÎÄÍÎÃÎ Ç ÍÈÕ ÄËß Ð²ØÅÍÍß ÇÀÄÀײ ÑÅÃÌÅÍÒÀÖ²¯ ÌÅÐÅƲ ÇÀ ÊÐÈÒÅвªÌ ÇÀÂÀÍÒÀÆÅÍÎÑÒ² ÅËÅÌÅÍÒ²Â

êðàòêèé îáçîð ÌÅÒÎÄΠÑÅÃÌÅÍÒÀÖÈÈ È ÀÄÀÏÒÀÖÈß ÎÄÍÎÃÎ ÈÇ ÍÈÕ ÄËß ÐÅØÅÍÈß ÇÀÄÀ×È ñåãìåíòàöèè ñåòè Ïî êðèòåðèþ çàãðóæåííîñòè ÝËÅÌÅÍÒÎÂ

95–99
(5)

Ïàíàðèí À.Ñ.

SOFT-PROCESSORS SIMULATION USING MODEL-BASED TESTING CONCEPT

²Ì²ÒÀÖ²ÉÍÅ ÌÎÄÅËÞÂÀÍÍß SOFT-ÏÐÎÖÅÑÎв ÍÀ ÁÀDz ÊÎÍÖÅÏÖ²¯ MODEL-BASED TESTING

ÈÌÈÒÀÖÈÎÍÍÎÅ ÌÎÄÅËÈÐÎÂÀÍÈÅ SOFT-ÏÐÎÖÅÑÑÎÐÎÂ ÍÀ ÁÀÇÅ ÊÎÍÖÅÏÖÈÈ MODEL-BASED TESTING

100–106
(7)

Êî÷àí Ð.Â.

Investigation of integral nonlinearity of third order sigma-delta modulator

ÄÎÑ˲ÄÆÅÍÍß ²ÍÒÅÃÐÀËÜÍί ÍÅ˲ͲÉÍÎÑÒ² ÑÈÃÌÀ-ÄÅËÜÒÀ ÌÎÄÓËßÒÎÐÀ ÒÐÅÒÜÎÃÎ ÏÎÐßÄÊÓ

Èññëåäîâàíèå èíòåãðàëüíîé íåëèíåéíîñòè ñèãìà-äåëüòà ìîäóëÿòîðà òðåòüåãî ïîðÿäêà

107–113
(7)

Èâàíîâ Ä.Å.

PARALLEL FAULT SIMULATION METHODS OF VLSI

ÌÅÒÎÄÈ ÏÀÐÀËÅËÜÍÎÃÎ ÌÎÄÅËÞÂÀÍÍß ÍÂ²Ñ ²Ç ÏÎØÊÎÄÆÅÍÍßÌÈ

ÌÅÒÎÄÛ ÏÀÐÀËËÅËÜÍÎÃÎ ÌÎÄÅËÈÐÎÂÀÍÈß ÑÁÈÑ Ñ ÍÅÈÑÏÐÀÂÍÎÑÒßÌÈ

114–119
(6)

Áåðåçîâñüêèé Ì.Î.,
Äóíåöü Ð.Á.

INSTRUCTION FORMAT OPTIMIZATION OF DYNAMICALLY RECONFIGURABLE PROCESSOR CORE

ÎÏÒÈ̲ÇÀÖ²ß ÔÎÐÌÀÒÓ ÌÀØÈÍÍÈÕ ÊÎÌÀÍÄ ÄÈÍÀ̲×ÍÎ ÐÅÊÎÍÔ²ÃÓÐÎÂÀÍÎÃÎ ÏÐÎÖÅÑÎÐÍÎÃÎ ßÄÐÀ

ÎÏÒÈÌÈÇÀÖÈß ÔÎÐÌÀÒÀ ÌÀØÈÍÍÛÕ ÊÎÌÀÍÄ ÄÈÍÀÌÈ×ÅÑÊÈ ÐÅÊÎÍÔÈÃÓÐÈÐÎÂÀÍÍÎÃÎ ÏÐÎÖÅÑÑÎÐÍÎÃÎ ßÄÐÀ

120–124
(5)

Ñîñíîâñêèé Þ.Â.

MULTI-SITUATIONAL ASSESSMENT OF STATICTICAL SOFTWARE IN THE SPECIFIC PROBLEM OF ESTIMATION

Ìóëüò³ñ³òóàò³âíà îö³íêà ñïîæèâ÷èõ ÿêîñòåé ïðîãðàìíèõ çàñîá³â ñòàòèñòè÷íîãî àíàë³çó äàíèõ ó ñïåö³àëüí³é çàäà÷³ îö³íþâàííÿ

ÌÓËÜÒÈÑÈÒÓÀÒÈÂÍÀß ÎÖÅÍÊÀ ÏÎÒÐÅÁÈÒÅËÜÑÊÈÕ ÊÀ×ÅÑÒ ÏÐÎÃÐÀÌÌÍÛÕ ÑÐÅÄÑÒâ ÑÒÀÒÈÑÒÈ×ÅÑÊÎÃÎ ÀÍÀËÈÇÀ ÄÀÍÍÛÕ Â ÑÏÅÖÈÀËÜÍÎÉ ÇÀÄÀ×Å ÎÖÅÍÈÂÀÍÈß

125–129
(5)

Åïèôàíîâ À.Ñ.

the methods of regularization of partially set automatons

ìåòîäè äîâèçíà÷åííÿ ÷àñòêîâî çàäàíèõ àâòîìàò³â

ÌÅÒÎÄÛ ÄÎÎÏÐÅÄÅËÅÍÈß ×ÀÑÒÈ×ÍÎ ÇÀÄÀÍÍÛÕ ÀÂÒÎÌÀÒÎÂ

130–135
(6)

Áåðåæàíñüêèé Þ.².

HIGH RELIABILITY quadrature decoder

ÊÂÀÄÐÀÒÓÐÍÈÉ ÄÅÊÎÄÅРϲÄÂÈÙÅÍί ÍÀIJÉÍÎÑÒ²

Êâàäðàòóðíûé ÄÅÊÎÄÅÐ ÏÎÂÛØÅÍÍÎÉ íàäåæíîñòè

136–141
(6)

×åðêàñüêèé Ì.Â.,
Òêà÷óê Ò.².

multiplication devices complexity Characteristics

ÕÀÐÀÊÒÅÐÈÑÒÈÊÈ ÑÊËÀÄÍÎÑÒ² ÏÐÈÑÒÐί ÌÍÎÆÅÍÍß

õàðàêòåðèñòèêè ñëîæíîñòè óñòðîéñòâ óìíîæåíèÿ

142–147
(6)

Òåñëåíêî Î.Ê.,
Ëàâñüêèé Î.Ì.

Synthesis of 2-groups on the logic elements

ÑÈÍÒÅÇ 2-ÃÐÓÏ ÍÀ ËÎò×ÍÈÕ ÅËÅÌÅÍÒÀÕ

ÑÈÍÒÅÇ 2-ÃÐÓÏÏ ÍÀ ËÎÃÈ×ÅÑÊÈÕ Ýëåìåíòàõ

148–153
(6)

ijàãíîñòèêà òà â³äìîâîñò³éê³ñòü

Êîçàê Ë.ß.

THE FORMATION OF INTEGRATED QUALITY OF  HIGH-MELTING STEEL GRADES

ÔÎÐÌÓÂÀÍÍß ÊÎÌÏËÅÊÑÍÎÃÎ ÏÎÊÀÇÍÈÊÀ ßÊÎÑÒI ÂÈÏËÀÂÊÈ ÂÈÑÎÊÎÂÓÃËÅÖÅÂÎΪ ÌÀÐÊÈ ÑÒÀËI

ÔÎÐÌÈÐÎÂÀÍÈÅ ÊÎÌÏËÅÊÑÍÎÃÎ ÏÎÊÀÇÀÒÅËß ÊÀ×ÅÑÒÂÀ ÏËÀÂÊÈ ÂÛÑÎÊÎÓÃËÅÐÎÄÈÑÒÎÉ ÌÀÐÊÈ ÑÒÀËÈ

154–157
(4)

Äåãòÿð¸â À.Í.

MINIMIZATION OF ERROR IN LINEAR SIGNAL SPLITTING  BY THE EQUI-DISTANT PHYSICALLY REALIZED FUNCTIONS

̲Ͳ̲ÇÀÖ²ß ÏÎÌÈËÊÈ ÐÎÇÊËÀÄÀÍÍß ÑÈÃÍÀË²Â Ó ÐßÄ  ÏÎ ÅʲÄÈÑÒÀÍÒÍÈÕ ÔÓÍÊÖ²ßÕ, ÿêi Ô²ÇÈ×ÍÎ ÐÅÀ˲ÇÎÂÓÞÒÜÑß

ÌÈÍÈÌÈÇÀÖÈß ÎØÈÁÊÈ ÐÀÇËÎÆÅÍÈß ÑÈÃÍÀËΠ ÐßÄ ÏÎ ÝÊÂÈÄÈÑÒÀÍÒÍÛÌ ÔÈÇÈ×ÅÑÊÈ ÐÅÀËÈÇÓÅÌÛÌ ÔÓÍÊÖÈßÌ

158–164
(7)

Äîëãîâ Þ.À.

THE INVESTIGATION OF INTERVAL ASSESSMENTS AND METHODS  OF THE MAXIMUM ORDER  FOR SMALL SIZE SAMPLES

ÄÎÑ˲ÄÆÅÍÍß ²ÍÒÅÐÂÀËÜÍÈÕ ÎÖ²ÍÎÊ ² ÌÅÒÎIJ ÂÈÙÎÃÎ ÏÎÐßÄÊÓ  ÄËß ÂÈÁ²ÐÎÊ ÌÀËÎÃÎ ÎÁ'ªÌÓ

ÈÑÑËÅÄÎÂÀÍÈÅ ÈÍÒÅÐÂÀËÜÍÛÕ ÎÖÅÍÎÊ È ÌÅÒÎÄΠÂÛÑØÅÃÎ ÏÎÐßÄÊÀ ÄËß ÂÛÁÎÐÎÊ ÌÀËÎÃÎ ÎÁÚÅÌÀ

165–170
(6)

×óõðàé À.Ã.

METHOD OF SIMILAR OBJECTS SEARCH

Ìåòîä íå÷³òêîãî ïîØÓÊÓ îá'ªêò³â

ÌÅÒÎÄ ÍÅ×ÅÒÊÎÃÎ ÏÎÈÑÊÀ ÎÁÚÅÊÒÎÂ

171–177
(7)

Ôîðìàëüí³ ìåòîäè òà Case òåõíîëî㳿 âåðèô³êàö³¿

Áëàæêî À.À.,
Ëÿøåíêî Å.Â.,
Ñàóä Èáàà

CONFLICTS DETECTION IN ACCESS RULES  TO THE RELATIONAL DATABASES WITH USING UML AND OCL LANGUAGES

ÂÈßÂËÅÍÍß ÊÎÍÔ˲ÊÒ²Â Ó ÏÐÀÂÈËÀÕ ÄÎÑÒÓÏÓ  ÄÎ ÐÅËßÖ²ÉÍÈÕ ÁÀÇ ÄÀÍÈÕ Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ÌΠUML ÒÀ OCL

ÎÁÍÀÐÓÆÅÍÈÅ ÊÎÍÔËÈÊÒΠ ÏÐÀÂÈËÀÕ  ÄÎÑÒÓÏÀ Ê ÐÅËßÖÈÎÍÍÛÌ ÁÀÇÀÌ ÄÀÍÍÛÕ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ßÇÛÊÀ UML È OCL

178–183
(6)

Konorev B.M.,
Sergiienko V.V.,
Zholtkevych G.N.,
Chertkov G.N.,
Alexeev Y.G.

CONCEPT OF CRITICAL SOFTWARE INDEPENDENT VERIFICATION BASED ON INVARIANT-ORIENTED MODEL-CHECKING APPROACH

ÊÎÍÖÅÏÖ²ß ÍÅÇÀËÅÆÍί ÂÅÐÈÔ²ÊÀÖ²¯  ÊÐÈÒÈ×ÍÎÃÎ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß  ÍÀ ÎÑÍβ ²ÍÂÀвÀÍÒÎ-ÎвªÍÒÎÂÀÍÎÃÎ  MODEL-CHECKING ϲÄÕÎÄÓ

ÊÎÍÖÅÏÖÈß ÍÅÇÀÂÈÑÈÌÎÉ ÂÅÐÈÔÈÊÀÖÈÈ  ÊÐÈÒÈ×ÅÑÊÎÃÎ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß  ÍÀ ÎÑÍÎÂÅ ÈÍÂÀÐÈÀÍÒÎ-ÎÐÈÅÍÒÈÐÎÂÀÍÍÎÃÎ  MODEL-CHECKING ÏÎÄÕÎÄÀ

184–190
(
7)

Áåçïåêà êðèòè÷íèõ ³íôðàñòðóêòóð

Ìàùåíêî Å.Í.,
Øåâ÷åíêî Â.È.

RESEARCH OF CRITICAL SITUATIONS IN IT- infrastructures  of cluster analysis methods

ÄÎÑ˲ÄÆÅÍÍß ÊÐÈÒÈ×ÍÈÕ ÑÈÒÓÀֲɠ ²Ò-³íôðàñòðóêòóðàÕ  Ìåòîäàìè êëàñòåðíîãî àíàë³çó

ÈÑÑËÅÄÎÂÀÍÈÅ ÊÐÈÒÈ×ÅÑÊÈÕ ÑÈÒÓÀÖÈÉ Â ÈÒ-ÈÍÔÐÀÑÒÐÓÊÒÓÐÀÕ ÌÅÒÎÄÀÌÈ ÊËÀÑÒÅÐÍÎÃÎ ÀÍÀËÈÇÀ

191–196
(6)

Èâàí÷åíêî Î.Â.,
Áî÷àðîâà Â.Â.

VALIDATION OF RELIABILITY LIMIT VALUES  OF CRITICAL ENERGY INFRASTRUCTURE

ÎÁÃÐÓÍÒÓÂÀÍÍß ÃÐÀÍÈ×ÍÈÕ ÂÅËÈ×ÈÍ ÏÎÊÀÇÍÈʲ ÍÀIJÉÍÎÑÒ²  ÊÐÈÒÈ×ÍÈÕ ÅÍÅÐÃÅÒÈ×ÍÈÕ ²ÍÔÐÀÑÒÐÓÊÒÓÐ

ÎÁÎÑÍÎÂÀÍÈÅ ÏÐÅÄÅËÜÍÛÕ ÂÅËÈ×ÈÍ ÏÎÊÀÇÀÒÅËÅÉ ÍÀÄÅÆÍÎÑÒÈ ÊÐÈÒÈ×ÅÑÊÈÕ ÝÍÅÐÃÅÒÈ×ÅÑÊÈÕ ÈÍÔÐÀÑÒÐÓÊÒÓÐ

197–201
(5)

Çàèêà Å.Â.,
Èçèäèíîâ À.Ñ.,
Ñêàòêîâ È.À.

INFORMATION ANALYSIS THE MONITORING  OF CRITICAL SYSTEMS

²ÍÔÎÐÌÀÖ²ÉÍÈÉ ÀÍÀË²Ç ÏÐÎÖÅѲ ÌÎͲÒÎÐÈÍÃÓ  ÊÐÈÒÈ×ÍÈÕ ÑÈÑÒÅÌ

ÈÍÔÎÐÌÀÖÈÎÍÍÛÉ ÀÍÀËÈÇ ÏÐÎÖÅÑÑΠÌÎÍÈÒÎÐÈÍÃÀ ÊÐÈÒÈ×ÅÑÊÈÕ ÑÈÑÒÅÌ

202–207
(6)

Ryazantsev A.I.,
Skarga-Bandurova I.S.

QUANTITATIVE RISK ANALYSIS AND EVALUATING ENVIRONMENTAL PROTECTION PROJECTS

ʲËÜʲÑÍÈÉ ÀÍÀË²Ç ÐÈÇÈʲ ² ÎÖ²ÍÊÀ ÏÐÎÅÊҲ   ÃÀËÓDz ÎÕÎÐÎÍÈ ÍÀÂÊÎËÈØÍÜÎÃÎ ÑÅÐÅÄÎÂÈÙÀ

ÊÎËÈ×ÅÑÒÂÅÍÍÛÉ ÀÍÀËÈÇ ÐÈÑÊÎÂ È ÎÖÅÍÊÀ ÏÐÎÅÊÒΠ  ÎÁËÀÑÒÈ ÎÕÐÀÍÛ ÎÊÐÓÆÀÞÙÅÉ ÑÐÅÄÛ

208–211
(4)

Íàä³éí³ñòü òà åâîëþö³éí³ñòü ïðîãðàìíèõ ñèñòåì

ßðåì÷óê Ñ.A.

THE METHOD OF EVALUATION OF THE NUMBER OF SOFTWARE DEFECTSUSING COMPLEXITY METRICS

ÌÅÒÎÄ ÎÖ²ÍÊÈ Ê²ËÜÊÎÑÒ²  ÏÐÎÃÐÀÌÍÈÕ ÄÅÔÅÊÒ²ÂÇ ÂÈÊÎÐÈÑÒÀÍÍßÌ ÌÅÒÐÈÊ ÑÊËÀÄÍÎÑÒ²

ÌÅÒÎÄ ÎÖÅÍÊÈ ÊÎËÈ×ÅÑÒÂÀ ÏÐÎÃÐÀÌÌÍÛÕ ÄÅÔÅÊÒÎÂ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÌÅÒÐÈÊ ÑËÎÆÍÎÑÒÈ

212–218
(7)

Ïîìîðîâà Î.Â.,
Ãîâîðóùåíêî Ò.Î.

THE REsearch OF Matlab functions features  for scaling input data of SOFTWARE QUALITY  EVALUATION ARTIFICIAL NEURAL NETWORK

ÄÎÑ˲ÄÆÅÍÍß ÎÑÎÁËÈÂÎÑÒÅÉ ÂÁÓÄÎÂÀÍÈÕ ÔÓÍÊÖ²É ÏÀÊÅÒÓ MATLAB ÄËß ÌÀÑØÒÀÁÓÂÀÍÍß ÂÕ²ÄÍÈÕ ÄÀÍÈÕ ØÒÓ×Íί ÍÅÉÐÎÍÍί ÌÅÐÅƲ ÎÖ²ÍÞÂÀÍÍß ßÊÎÑÒ² ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß

Èññëåäîâàíèå îñîáåííîñòåé âñòðîåííûõ ôóíêöèé ïàêåòà MATLAB  ÄËß ÌÀÑØÒÀÁÈÐÎÂÀÍÈß ÂÕÎÄÍÛÕ ÄÀÍÍÛÕ  ÈÑÊÓÑÑÒÂÅÍÍÎÉ ÍÅÉÐÎÍÍÎÉ ÑÅÒÈ  ÎÖÅÍÈÂÀÍÈß ÊÀ×ÅÑÒÂÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß

219–224
(6)

Òåõíîëî㳿 Ada òà áàãàòîâåðñ³éíèé êîìï’þòèíã

Ãîäóíêî Â.Ì.,
Ìèùåíêî Â.Î.,
Ðåçíèê Ì.Ì.,
Øòåôàí Ä.Â.

QUALITY OF THE DYNAMIC HTML PAGES TRANSLATOR FOR ADA WEB SERVERS

ßʲÑÒÜ ÒÐÀÍÑËßÒÎÐÀ ØÀÁËÎͲ ÄÈÍÀ̲×ÍÈÕ HTML ÑÒÎвÍÎÊ  ÄËß ADA WEB ÑÅÐÂÅвÂ

ÊÀ×ÅÑÒÂÎ ÒÐÀÍÑËßÒÎÐÀ ØÀÁËÎÍΠÄÈÍÀÌÈ×ÅÑÊÈÕ HTML ÑÒÐÀÍÈÖ ÄËß ADA WEB ÑÅÐÂÅÐÎÂ

225–229
(5)

Ôóíêö³îíàëüíà áåçïåêà ³íôîðìàö³éíî-êåðóþ÷èõ ñèñòåì

Îðåõîâà À.À.,
Òèëèíñêèé Â.Ð.,
Õàð÷åíêî Â.Ñ.

INTEGRATED HMI SAFETY ASSESSMENT METHODOLOGY FOR SAFETY-CRITICAL I&C SYTEMS

ÌÅÒÎÄÈÊÀ ÊÎÌÏËÅÊÑÍί ÎÖ²ÍÊÈ ÁÅÇÏÅÊÈ ëþäèíî-ìàøèííÎÃÎ ³íòåðôåéñó  ²ÊÑ ÊÐÈÒÈ×ÍÎÃÎ ÇÀÑÒÎÑÓÂÀÍÍß

ÌÅÒÎÄÈÊÀ ÊÎÌÏËÅÊÑÍÎÉ ÎÖÅÍÊÈ ÁÅÇÎÏÀÑÍÎÑÒÈ ×ÅËÎÂÅÊÎ-ÌÀØÈÍÍÎÃÎ ÈÍÒÅÐÔÅÉÑÀ ÈÓÑ ÊÐÈÒÈ×ÅÑÊÎÃÎ ÏÐÈÌÅÍÅÍÈß

230–235
(6)

Èçâàëîâ À.Â.

MODELLING THE AIRCRAFT’S FLIGHT MODE CHANGE  WHILE GENERATING POTENTIALLY-CONFLICTING SITUATIONS

ÌÎÄÅËÞÂÀÍÍß Ç̲ÍÈ ÐÅÆÈÌÓ ÏÎËÜÎÒÓ ÏβÒÐßÍÎÃÎ ÑÄÓÍÀ  ÏÐÈ ÑÒÂÎÐÅÍͲ ÏÎÒÅÍÖ²ÉÍÎ-ÊÎÍÔ˲ÊÒÍÈÕ ÑÈÒÓÀÖ²É

ÌÎÄÅËÈÐÎÂÀÍÈÅ ÑÌÅÍÛ ÐÅÆÈÌÀ ÏÎ˨ÒÀ ÂÎÇÄÓØÍÎÃÎ ÑÓÄÍÀ ÏÐÈ ÃÅÍÅÐÀÖÈÈ ÏÎÒÅÍÖÈÀËÜÍÎ-ÊÎÍÔËÈÊÒÍÛÕ ÑÈÒÓÀÖÈÉ

236–240
(5)

Ïîâ³äîìëåííÿ

Åôèìîâ Ñ.Í.,
Òûí÷åíêî Â.Â.,
Òûí÷åíêî Â.Ñ.

THE RELIABILITY ESTIMATION MODEL  OF THE HETEROGENEOUS CLIENT-SERVER COMPUTER NETWORK

ÌÎÄÅËÜ ÎÖ²ÍÊÈ ÍÀIJÉÍÎÑÒ² ÃÅÒÅÐÎÃÅÍÍί  ÎÁ×ÈÑËÞÂÀËÜÍ²É ÌÅÐÅƲ Ê˲ªÍÒ-ÑÅÐÂÅÐÍί ÀÐÕ²ÒÅÊÒÓÐÈ

ÌÎÄÅËÜ ÎÖÅÍÊÈ ÍÀÄÅÆÍÎÑÒÈ ÃÅÒÅÐÎÃÅÍÍÎÉ ÂÛ×ÈÑËÈÒÅËÜÍÎÉ ÑÅÒÈ ÊËÈÅÍÒ-ÑÅÐÂÅÐÍÎÉ ÀÐÕÈÒÅÊÒÓÐÛ

241–243
(3)

 

 

Øàíîâí³ ÷èòà÷³!

Íàóêîâî-òåõí³÷íèé æóðíàë “ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ'ÞÒÅÐͲ ÑÈÑÒÅÌÈ
âêëþ÷åíèé äî ïåðåë³êó íàóêîâèõ âèäàíü, â ÿêèõ ìîæóòü äðóêóâàòèñÿ îñíîâí³ ðåçóëüòàòè äèñåðòàö³éíèõ ðîá³ò
(äèâ. ïîñòàíîâó ïðåçè䳿 ÂÀÊ Óêðà¿íè ¹1-05/3 â³ä 8.07.2009)

 

Ðåôåðàòèâíà ³íôîðìàö³ÿ çáåð³ãàºòüñÿ:

– ó çàãàëüíîäåðæàâí³é ðåôåðàòèâí³é áàç³ äàíèõ «Óêðà¿í³êà íàóêîâà» òà ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÓÐÆ «Äæåðåëî» (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.nbuv.gov.ua);

– ó ðåôåðàòèâí³é áàç³ äàíèõ Âñåðîñ³éñüêîãî ³íñòèòóòó íàóêîâî¿ ³ òåõí³÷íî¿ ³íôîðìàö³¿ (²ͲҲ) Ðîñ³éñüêî¿ àêàäå쳿 íàóê ³ ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÐÆ (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.viniti.ru).