Íàö³îíàëüíèé
àåðîêîñì³÷íèé óí³âåðñèòåò ³ì. Ì.ª. Æóêîâñüêîãî “Õàðê³âñüêèé àâ³àö³éíèé
³íñòèòóò”
ÑÒÀÒÒ² (articleS)
Àâòîðè |
Íàçâà ñòàòò³ (article title) |
Ñòîð³íêè (pages) |
||
English |
Óêðà¿íñüêà ìîâà |
Ðóññêèé ÿçûê |
||
Ãàðàíòîçäàòí³còü òà ñèñòåìè ³ êîìóí³êàö³¿ âèñîêî¿ ãîòîâíîñò³ |
||||
Òþðèí Ñ.Ô., |
LUT FPGA
SYNTHESIS BASED ON FUNCTIONALLY COMPLETE TOLERANT ELEMENTS |
ÑÈÍÒÅÇ LUT ÏË²Ñ Ó
ÔÓÍÊÖ²ÎÍÀËÜÍÎ ÏÎÂÍÎÌÓ ÒÎËÅÐÀÍÒÍÎÌÓ ÁÀÇÈѲ |
11–16 |
|
Ïîëÿêîâ Ã.À., |
ASSESSMENTS OF
COMPUTING SYNTHESIS COMPLEXITY OF PARALLEL TIME-PARAMETERIZED MODELS OF TASKS |
ÎÖ²ÍÊÈ
ÎÁ×ÈÑËÞÂÀËÜÍί ÑÊËÀÄÍÎÑÒ² ÑÈÍÒÅÇÓ ÏÀÐÀËÅËÜÍÈÕ ×ÀÑÎÏÀÐÀÌÅÒÐÈÇÎÂÀÍÈÕ ÌÎÄÅËÅÉ
ÇÀÄÀ× |
ÎÖÅÍÊÈ
ÂÛ×ÈÑËÈÒÅËÜÍÎÉ ÑËÎÆÍÎÑÒÈ ÑÈÍÒÅÇÀ ÏÀÐÀËËÅËÜÍÛÕ ÂÐÅÌßÏÀÐÀÌÅÒÐÈÇÎÂÀÍÍÛÕ ÌÎÄÅËÅÉ
ÇÀÄÀ× |
17–22 |
Skarga-Bandurova
I.S., |
IMPLEMENTATION OF HIGH AVAILABILITY HEALTHCARE
INFORMATION SYSTEM ARCHITECTURE |
ÐÅÀ˲ÇÀÖ²ß ÀÐÕ²ÒÅÊÒÓÐÈ ÂÈÑÎÊί
ÃÎÒÎÂÍÎÑÒ² ÄËß ÌÅÄÈ×Íί ²ÍÔÎÐÌÀÖ²ÉÍί ÑÈÑÒÅÌÈ |
ÐÅÀËÈÇÀÖÈß
ÀÐÕÈÒÅÊÒÓÐÛ ÂÛÑÎÊÎÉ ÃÎÒÎÂÍÎÑÒÈ ÄËß ÌÅÄÈÖÈÍÑÊÎÉ ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÑÈÑÒÅÌÛ |
23–27 |
Êðèâöîâ À.Þ., |
analysys of reliable web-SERVICE’S
application for the dependably economic expert system’s implementation |
Àíàëèç
ïðèìåíåíèÿ íàäåæíûõ web-ñåðâèñîâ äëÿ ðåàëèçàöèè ãàðàíòîñïîñîáíûõ
ýêîíîìè÷åñêèõ ýêñïåðòíûõ ñèñòåì |
28–32 |
|
Davies J.N., |
AN INVESTIGATION INTO THE EFFECT OF RULE COMPLEXITY IN
ACCESS CONTROL LIST |
ÄÎÑ˲ÄÆÅÍÍß ÂÏËÈÂÓ ÑÊËÀÄÍÎÑÒ² ÏÐÀÂÈË Â ACCESS
CONTROL LIST |
ÈÑÑËÅÄÎÂÀÍÈÅ ÂËÈßÍÈß ÑËÎÆÍÎÑÒÈ ÏÐÀÂÈË Â
ACCESS CONTROL LIST |
33–38 |
Àïðàêñèí Þ.Ê., |
TOPOLOGICAL
SYNTHESIS OF GEOGRAPHICALLY DISTRIBUTED NETWORKS BASED ON MULTIAGENT METHODS |
ÒÎÏÎËÎò×ÍÈÉ ÑÈÍÒÅÇ
ÒÅÐÅÒÎвÀËÜÍÎ-ÐÎÇÏÎIJËÅÍÈÕ ÌÅÐÅÆ ÍÀ ÎÑÍβ ÌÓËÜÒÈÀÃÅÍÒÍÈÕ ÌÅÒÎIJ |
ÒÎÏÎËÎÃÈ×ÅÑÊÈÉ
ÑÈÍÒÅÇ ÒÅÐÐÈÒÎÐÈÀËÜÍÎ-ÐÀÑÏÐÅÄÅËÅÍÍÛÕ ÑÅÒÅÉ ÍÀ ÎÑÍÎÂÅ ÌÓËÜÒÈÀÃÅÍÒÍÛÕ ÌÅÒÎÄÎÂ |
39–41 |
²íôîðìàö³éíà áåçïåêà òà áåçïå÷íèé êîìï’þòèíã |
||||
Oliynykov R.V., |
PERSPECTIVE SYMMETRIC BLOCK CIPHER OPTIMIZED FOR HARDWARE
IMPLEMENTATION |
ÏÅÐÑÏÅÊÒÈÂÍÈÉ ÁËÎÊÎÂÈÉ ÑÈÌÅÒÐÈ×ÍÈÉ
ØÈÔÐ, ÎÏÒÈ̲ÇÎÂÀÍÈÉ ÄËß ÀÏÀÐÀÒÍί ÐÅÀ˲ÇÀÖ²¯ |
ÏÅÐÑÏÅÊÒÈÂÍÛÉ ÁËÎ×ÍÛÉ ÑÈÌÌÅÒÐÈ×ÍÛÉ
ØÈÔÐ, ÎÏÒÈÌÈÇÈÐÎÂÀÍÍÛÉ ÄËß ÀÏÏÀÐÀÒÍÎÉ ÐÅÀËÈÇÀÖÈÈ |
42–47 |
Chevardin V.E. |
A PSEUDORANDOM BIT GENERATOR BASED ON ELLIPTIC CURVE
TRANSFORMATIONS |
ÃÅÍÅÐÀÒÎÐ ÏÑÅÂÄÎÂÈÏÀÄÊÎÂÈÕ Á²Ò ÍÀ ÎÑÍβ
ÒÐÀÍÑÔÎÐÌÀÖ²É Å˲ÏÒÈ×Íί ÊÐÈÂί |
ÃÅÍÅÐÀÒÎÐ ÏÑÅÂÄÎÑËÓ×ÀÉÍÛÕ ÁÈÒ ÍÀ ÎÑÍÎÂÅ
ÒÐÀÍÑÔÎÐÌÀÖÈÉ ÝËËÈÏÒÈ×ÅÑÊÎÉ ÊÐÈÂÎÉ |
48–50 |
Ðóæåíöåâ Â.È. |
Provable security of rijndael-like ciphers to truncated differentials
attack |
Äîêàçóºìà
ñò³éê³ñòü rijndael-ïîä³áíèõ øèôð³â äî àòàêè óñ³÷åíèõ äèôåðåíö³àë³â |
ÄÎÊÀÇÓÅÌÀß
ÑÒÎÉÊÎÑÒÜ RIJNDAEL-ÏÎÄÎÁÍÛÕ
ØÈÔÐÎÂ Ê ÀÒÀÊÅ ÓÑÅ×ÅÍÍÛÕ ÄÈÔÔÅÐÅÍÖÈÀËΠ|
51–55 |
Savenko O.S., |
ÂÈßÂËÅÍÍß ÁÎÒÍÅÒ ÌÅÐÅÆ ÍÀ ÎÑÍβ
ÌÓËÜÒÈ-ÀÃÅÍÒÍÈÕ ÑÈÑÒÅÌ |
ÎÁÍÀÐÓÆÅÍÈÅ ÁÎÒÍÅÒ-ÑÅÒÅÉ ÍÀ ÎÑÍÎÂÅ
ÌÓËÜÒÈÀÃÅÍÒÍÛÕ ÑÈÑÒÅÌ |
56–61 |
|
Skatkov A.V., |
ÐÎÇÐÎÁÊÀ
ÌÅÒÎIJ ÀÄÀÏÒÈÂÍÎÃÎ ÇÀÕÈÑÒÓ ÒÀ ÊÎÌÏ'ÞÒÅÐÍί ÁÅÇÏÅÊÈ, ÇÀÑÍÎÂÀÍÈÕ ÍÀ ÒÅÎв¯
ØÒÓ×ÍÈÕ ²ÌÓÍÍÈÕ ÑÈÑÒÅÌ |
ÐÀÇÐÀÁÎÒÊÀ ÌÅÒÎÄÎÂ ÀÄÀÏÒÈÂÍÎÉ ÇÀÙÈÒÛ È ÊÎÌÏÜÞÒÅÐÍÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ,
ÎÑÍÎÂÀÍÍÛÕ ÍÀ ÒÅÎÐÈÈ ÈÑÊÓÑÑÒÂÅÍÍÛÕ ÈÌÌÓÍÍÛÕ ÑÈÑÒÅÌ |
62–66 |
|
ªìåëüÿíîâ Â.Î., |
The software for protecting of the confidential
data |
²ÍÑÒÐÓÌÅÍÒÀËÜÍÈÉ
ÇÀѲÁ ÇÀÁÅÇÏÅ×ÅÍÍß ²ÍÔÎÐÌÀÖ²ÉÍί ÁÅÇÏÅÊÈ ÊÎÍÔ²ÄÅÍÖ²ÉÍÈÕ ÄÀÍÈÕ |
ÈÍÑÒÐÓÌÅÍÒÀËÜÍÎÅ
ÑÐÅÄÑÒÂÎ ÎÁÅÑÏÅ×ÅÍÈß ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ ÊÎÍÔÈÄÅÍÖÈÀËÜÍÛÕ ÄÀÍÍÛÕ |
67–71 |
Potiy A.V., |
ÏÅÐÅÄÓÌÎÂÈ
ÔÎÐÌÓÂÀÍÍß ÊÓËÜÒÓÐÈ ²ÍÔÎÐÌÀÖ²ÉÍί ÁÅÇÏÅÊÈ ÒÀ ÌÅÒÎÄ ÊÎÌÏËÅÊÑÍÎÃÎ ÎÖ²ÍÞÂÀÍÍß ¯¯
вÂÍß |
ÏÐÅÄÏÎÑÛËÊÈ Ê
ÔÎÐÌÈÐÎÂÀÍÈÞ ÊÓËÜÒÓÐÛ ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈÈ ÌÅÒÎÄ ÊÎÌÏËÅÊÑÍÎÃÎ
ÎÖÅÍÈÂÀÍÈß ÅÅ ÓÐÎÂÍß |
72–77 |
|
Êðèñèëîâ Â.À., |
METHODOLOGY
REDUCING LABORIOUSNESS TRANSFERRING PROCESS OF DOCUMENTS PAPER COPIES CONTENT
INTO INFORMATION SYSTEM DATA BASE |
ÌÅÒÎÄÈÊÀ ÑÊÎÐÎ×ÅÍÍß ÒÐÓÄÎ̲ÑÒÊÎÑÒ²
ÏÐÎÖÅÑÓ ÏÅÐÅÍÎÑÓ Â̲ÑÒÓ ÏÀÏÅÐÎÂÈÕ ÊÎÏ²É ÄÎÊÓÌÅÍÒ²Â Ó ÁÀÇÓ ÄÀÍÈÕ ²ÍÔÎÐÌÀÖ²ÉÍÈÕ
ÑÈÑÒÅÌ |
78–82 |
|
Ôèñóí Ñ.Í., |
METHODOLOGY OF ENCRYPTION DATA USING SOFTWARE COMPLEX VisualAES |
ÌÅÒÎÄÈÊÀ ØÈÔÐÓÂÀÍÍß ÄÀÍÈÕ Ç
ÂÈÊÎÐÈÑÒÀÍÍßÌ ÏÐÎÃÐÀÌÍÎ-ÌÅÒÎÄÈ×ÍÎÃÎ ÊÎÌÏËÅÊÑÀ VisualAES |
ÌÅÒÎÄÈÊÀ ØÈÔÐÎÂÀÍÈß
ÄÀÍÍÛÕ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÏÐÎÃÐÀÌÌÍÎ-ÌÅÒÎÄÈ×ÅÑÊÎÃÎ ÊÎÌÏËÅÊÑÀ VisualAES |
83–65 |
Øåâ÷óê Î.À., |
METHOD OF ACCELERATION OF SCALAR
MULTIPLICATION FOR CRYPTOGRAPHIC SCHEMES |
ÌÅÒÎÄ ÏÐÈÑÊÎÐÅÍÍß
ÑÊÀËßÐÍÎÃÎ ÌÍÎÆÅÍÍß ÄËß ÊÐÈÏÒÎÃÐÀÔ²×ÍÈÕ ÄÎÄÀÒʲ |
ÌÅÒÎÄ ÓÑÊÎÐÅÍÈß ÑÊÀËßÐÍÎÃÎ
ÓÌÍÎÆÅÍÈß ÄËß ÊÐÈÏÒÎÃÐÀÔÈ×ÅÑÊèõ
ÏÐÈËÎÆÅÍÈÉ |
86–90 |
Íàä³éí³ñòü àïàðàòíèõ çàñîá³â òà ñèñòåì íà ïðîãðàìîâàíèõ êðèñòàëàõ |
||||
Ðîìàíêåâè÷ À.Ì., |
About one problem of reconfiguration in multiprocessor systems |
ÏÐÎ ÎÄÍÓ ÇÀÄÀ×Ó ÐÅÊÎÍÔ²ÃÓÐÓÂÀÍÍß Ó
ÁÀÃÀÒÎÏÐÎÖÅÑÎÐÍÈÕ ÑÈÑÒÅÌÀÕ |
ÎÁ ÎÄÍÎÉ ÇÀÄÀ×Å
ÐÅÊÎÍÔÈÃÓÐÈÐÎÂÀÍÈß Â ÌÍÎÃÎÏÐÎÖÅÑÑÎÐÍÛÕ ÑÈÑÒÅÌÀÕ |
91–94 |
Øï³öåð À.Ñ. |
overview OF SEGMENTATION methods AND ADAPTATION
ONE OF THEM FOR SOLUTIONS NETWORK SEGMENTATION PROBLEM BY ELEMENTS workload |
êðàòêèé
îáçîð ÌÅÒÎÄΠÑÅÃÌÅÍÒÀÖÈÈ È ÀÄÀÏÒÀÖÈß ÎÄÍÎÃÎ ÈÇ ÍÈÕ ÄËß ÐÅØÅÍÈß ÇÀÄÀ×È
ñåãìåíòàöèè ñåòè Ïî êðèòåðèþ çàãðóæåííîñòè ÝËÅÌÅÍÒÎÂ |
95–99 |
|
Ïàíàðèí À.Ñ. |
SOFT-PROCESSORS SIMULATION USING MODEL-BASED
TESTING CONCEPT |
²Ì²ÒÀÖ²ÉÍÅ
ÌÎÄÅËÞÂÀÍÍß SOFT-ÏÐÎÖÅÑÎвÂ
ÍÀ ÁÀDz ÊÎÍÖÅÏÖ²¯ MODEL-BASED TESTING |
ÈÌÈÒÀÖÈÎÍÍÎÅ
ÌÎÄÅËÈÐÎÂÀÍÈÅ SOFT-ÏÐÎÖÅÑÑÎÐÎÂ
ÍÀ ÁÀÇÅ ÊÎÍÖÅÏÖÈÈ MODEL-BASED TESTING |
100–106 |
Êî÷àí Ð.Â. |
Investigation of integral
nonlinearity of third order sigma-delta modulator |
ÄÎÑ˲ÄÆÅÍÍß
²ÍÒÅÃÐÀËÜÍί ÍÅ˲ͲÉÍÎÑÒ² ÑÈÃÌÀ-ÄÅËÜÒÀ ÌÎÄÓËßÒÎÐÀ ÒÐÅÒÜÎÃÎ ÏÎÐßÄÊÓ |
Èññëåäîâàíèå
èíòåãðàëüíîé íåëèíåéíîñòè ñèãìà-äåëüòà ìîäóëÿòîðà òðåòüåãî ïîðÿäêà |
107–113 |
Èâàíîâ Ä.Å. |
PARALLEL FAULT
SIMULATION METHODS OF VLSI |
ÌÅÒÎÄÈ ÏÀÐÀËÅËÜÍÎÃÎ ÌÎÄÅËÞÂÀÍÍß ÍÂ²Ñ ²Ç
ÏÎØÊÎÄÆÅÍÍßÌÈ |
114–119 |
|
Áåðåçîâñüêèé Ì.Î., |
INSTRUCTION
FORMAT OPTIMIZATION OF DYNAMICALLY RECONFIGURABLE PROCESSOR CORE |
ÎÏÒÈ̲ÇÀÖ²ß ÔÎÐÌÀÒÓ
ÌÀØÈÍÍÈÕ ÊÎÌÀÍÄ ÄÈÍÀ̲×ÍÎ ÐÅÊÎÍÔ²ÃÓÐÎÂÀÍÎÃÎ ÏÐÎÖÅÑÎÐÍÎÃÎ ßÄÐÀ |
ÎÏÒÈÌÈÇÀÖÈß ÔÎÐÌÀÒÀ ÌÀØÈÍÍÛÕ ÊÎÌÀÍÄ ÄÈÍÀÌÈ×ÅÑÊÈ
ÐÅÊÎÍÔÈÃÓÐÈÐÎÂÀÍÍÎÃÎ ÏÐÎÖÅÑÑÎÐÍÎÃÎ ßÄÐÀ |
120–124 |
Ñîñíîâñêèé Þ.Â. |
MULTI-SITUATIONAL
ASSESSMENT OF STATICTICAL SOFTWARE IN THE SPECIFIC PROBLEM OF ESTIMATION |
Ìóëüò³ñ³òóàò³âíà
îö³íêà ñïîæèâ÷èõ ÿêîñòåé ïðîãðàìíèõ çàñîá³â ñòàòèñòè÷íîãî àíàë³çó äàíèõ ó
ñïåö³àëüí³é çàäà÷³ îö³íþâàííÿ |
125–129 |
|
Åïèôàíîâ À.Ñ. |
the methods of regularization of partially
set automatons |
ìåòîäè äîâèçíà÷åííÿ ÷àñòêîâî çàäàíèõ àâòîìàò³â |
130–135 |
|
Áåðåæàíñüêèé Þ.². |
HIGH RELIABILITY quadrature decoder |
Êâàäðàòóðíûé ÄÅÊÎÄÅÐ
ÏÎÂÛØÅÍÍÎÉ íàäåæíîñòè |
136–141 |
|
×åðêàñüêèé Ì.Â., |
multiplication
devices complexity Characteristics |
õàðàêòåðèñòèêè
ñëîæíîñòè óñòðîéñòâ óìíîæåíèÿ |
142–147 |
|
Òåñëåíêî Î.Ê., |
Synthesis of 2-groups on
the logic elements |
ÑÈÍÒÅÇ 2-ÃÐÓÏÏ ÍÀ ËÎÃÈ×ÅÑÊÈÕ Ýëåìåíòàõ |
148–153 |
|
ijàãíîñòèêà òà â³äìîâîñò³éê³ñòü |
||||
Êîçàê Ë.ß. |
THE FORMATION
OF INTEGRATED QUALITY OF HIGH-MELTING
STEEL GRADES |
ÔÎÐÌÓÂÀÍÍß ÊÎÌÏËÅÊÑÍÎÃÎ ÏÎÊÀÇÍÈÊÀ
ßÊÎÑÒI ÂÈÏËÀÂÊÈ ÂÈÑÎÊÎÂÓÃËÅÖÅÂÎΪ ÌÀÐÊÈ ÑÒÀËI |
ÔÎÐÌÈÐÎÂÀÍÈÅ
ÊÎÌÏËÅÊÑÍÎÃÎ ÏÎÊÀÇÀÒÅËß ÊÀ×ÅÑÒÂÀ ÏËÀÂÊÈ ÂÛÑÎÊÎÓÃËÅÐÎÄÈÑÒÎÉ ÌÀÐÊÈ ÑÒÀËÈ |
154–157 |
Äåãòÿð¸â À.Í. |
MINIMIZATION OF ERROR IN LINEAR SIGNAL SPLITTING BY THE EQUI-DISTANT PHYSICALLY REALIZED
FUNCTIONS |
̲Ͳ̲ÇÀÖ²ß ÏÎÌÈËÊÈ ÐÎÇÊËÀÄÀÍÍß
ÑÈÃÍÀË²Â Ó ÐßÄ ÏÎ ÅʲÄÈÑÒÀÍÒÍÈÕ
ÔÓÍÊÖ²ßÕ, ÿêi Ô²ÇÈ×ÍÎ
ÐÅÀ˲ÇÎÂÓÞÒÜÑß |
ÌÈÍÈÌÈÇÀÖÈß
ÎØÈÁÊÈ ÐÀÇËÎÆÅÍÈß ÑÈÃÍÀËΠ ÐßÄ ÏÎ ÝÊÂÈÄÈÑÒÀÍÒÍÛÌ ÔÈÇÈ×ÅÑÊÈ ÐÅÀËÈÇÓÅÌÛÌ
ÔÓÍÊÖÈßÌ |
158–164 |
Äîëãîâ Þ.À. |
THE INVESTIGATION
OF INTERVAL ASSESSMENTS AND METHODS OF
THE MAXIMUM ORDER FOR SMALL SIZE
SAMPLES |
ÄÎÑ˲ÄÆÅÍÍß ²ÍÒÅÐÂÀËÜÍÈÕ ÎÖ²ÍÎÊ ²
ÌÅÒÎIJ ÂÈÙÎÃÎ ÏÎÐßÄÊÓ ÄËß ÂÈÁ²ÐÎÊ
ÌÀËÎÃÎ ÎÁ'ªÌÓ |
ÈÑÑËÅÄÎÂÀÍÈÅ
ÈÍÒÅÐÂÀËÜÍÛÕ ÎÖÅÍÎÊ È ÌÅÒÎÄΠÂÛÑØÅÃÎ ÏÎÐßÄÊÀ ÄËß ÂÛÁÎÐÎÊ ÌÀËÎÃÎ ÎÁÚÅÌÀ |
165–170 |
×óõðàé À.Ã. |
METHOD OF
SIMILAR OBJECTS SEARCH |
Ìåòîä
íå÷³òêîãî ïîØÓÊÓ îá'ªêò³â |
171–177 |
|
Ôîðìàëüí³ ìåòîäè òà Case òåõíîëî㳿 âåðèô³êàö³¿ |
||||
Áëàæêî À.À., |
CONFLICTS
DETECTION IN ACCESS RULES TO THE
RELATIONAL DATABASES WITH USING UML AND OCL LANGUAGES |
ÂÈßÂËÅÍÍß ÊÎÍÔ˲ÊÒ²Â Ó ÏÐÀÂÈËÀÕ
ÄÎÑÒÓÏÓ ÄÎ ÐÅËßÖ²ÉÍÈÕ ÁÀÇ ÄÀÍÈÕ Ç
ÂÈÊÎÐÈÑÒÀÍÍßÌ ÌΠUML ÒÀ OCL |
178–183 |
|
Konorev B.M., |
ÊÎÍÖÅÏÖ²ß ÍÅÇÀËÅÆÍί ÂÅÐÈÔ²ÊÀÖ²¯ ÊÐÈÒÈ×ÍÎÃÎ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÍÀ ÎÑÍβ ²ÍÂÀвÀÍÒÎ-ÎвªÍÒÎÂÀÍÎÃÎ MODEL-CHECKING ϲÄÕÎÄÓ |
ÊÎÍÖÅÏÖÈß ÍÅÇÀÂÈÑÈÌÎÉ ÂÅÐÈÔÈÊÀÖÈÈ ÊÐÈÒÈ×ÅÑÊÎÃÎ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÍÀ ÎÑÍÎÂÅ ÈÍÂÀÐÈÀÍÒÎ-ÎÐÈÅÍÒÈÐÎÂÀÍÍÎÃÎ MODEL-CHECKING ÏÎÄÕÎÄÀ |
184–190 |
|
Áåçïåêà êðèòè÷íèõ ³íôðàñòðóêòóð |
||||
Ìàùåíêî Å.Í., |
RESEARCH OF CRITICAL SITUATIONS IN IT- infrastructures of cluster analysis methods |
ÄÎÑ˲ÄÆÅÍÍß ÊÐÈÒÈ×ÍÈÕ ÑÈÒÓÀÖ²É Â
²Ò-³íôðàñòðóêòóðàÕ Ìåòîäàìè êëàñòåðíîãî àíàë³çó |
ÈÑÑËÅÄÎÂÀÍÈÅ
ÊÐÈÒÈ×ÅÑÊÈÕ ÑÈÒÓÀÖÈÉ Â ÈÒ-ÈÍÔÐÀÑÒÐÓÊÒÓÐÀÕ ÌÅÒÎÄÀÌÈ ÊËÀÑÒÅÐÍÎÃÎ ÀÍÀËÈÇÀ |
191–196 |
Èâàí÷åíêî Î.Â., |
VALIDATION OF RELIABILITY LIMIT VALUES
OF CRITICAL ENERGY INFRASTRUCTURE |
ÎÁÃÐÓÍÒÓÂÀÍÍß ÃÐÀÍÈ×ÍÈÕ ÂÅËÈ×ÈÍ
ÏÎÊÀÇÍÈʲ ÍÀIJÉÍÎÑÒ² ÊÐÈÒÈ×ÍÈÕ
ÅÍÅÐÃÅÒÈ×ÍÈÕ ²ÍÔÐÀÑÒÐÓÊÒÓÐ |
ÎÁÎÑÍÎÂÀÍÈÅ
ÏÐÅÄÅËÜÍÛÕ ÂÅËÈ×ÈÍ ÏÎÊÀÇÀÒÅËÅÉ ÍÀÄÅÆÍÎÑÒÈ ÊÐÈÒÈ×ÅÑÊÈÕ ÝÍÅÐÃÅÒÈ×ÅÑÊÈÕ
ÈÍÔÐÀÑÒÐÓÊÒÓÐ |
197–201 |
Çàèêà Å.Â., |
INFORMATION
ANALYSIS THE MONITORING OF CRITICAL
SYSTEMS |
²ÍÔÎÐÌÀÖ²ÉÍÈÉ ÀÍÀË²Ç ÏÐÎÖÅѲÂ
ÌÎͲÒÎÐÈÍÃÓ ÊÐÈÒÈ×ÍÈÕ ÑÈÑÒÅÌ |
ÈÍÔÎÐÌÀÖÈÎÍÍÛÉ
ÀÍÀËÈÇ ÏÐÎÖÅÑÑΠÌÎÍÈÒÎÐÈÍÃÀ ÊÐÈÒÈ×ÅÑÊÈÕ ÑÈÑÒÅÌ |
202–207 |
Ryazantsev
A.I., |
QUANTITATIVE RISK ANALYSIS AND EVALUATING ENVIRONMENTAL
PROTECTION PROJECTS |
ʲËÜʲÑÍÈÉ ÀÍÀË²Ç ÐÈÇÈʲ ² ÎÖ²ÍÊÀ
ÏÐÎÅÊҲ  ÃÀËÓDz ÎÕÎÐÎÍÈ
ÍÀÂÊÎËÈØÍÜÎÃÎ ÑÅÐÅÄÎÂÈÙÀ |
ÊÎËÈ×ÅÑÒÂÅÍÍÛÉ ÀÍÀËÈÇ ÐÈÑÊÎÂ È ÎÖÅÍÊÀ
ÏÐÎÅÊÒÎÂ Â ÎÁËÀÑÒÈ ÎÕÐÀÍÛ ÎÊÐÓÆÀÞÙÅÉ
ÑÐÅÄÛ |
208–211 |
Íàä³éí³ñòü òà åâîëþö³éí³ñòü ïðîãðàìíèõ ñèñòåì |
||||
ßðåì÷óê Ñ.A. |
THE METHOD OF EVALUATION OF THE NUMBER
OF SOFTWARE DEFECTSUSING COMPLEXITY METRICS |
ÌÅÒÎÄ ÎÖ²ÍÊÈ Ê²ËÜÊÎÑÒ² ÏÐÎÃÐÀÌÍÈÕ ÄÅÔÅÊÒ²ÂÇ ÂÈÊÎÐÈÑÒÀÍÍßÌ ÌÅÒÐÈÊ
ÑÊËÀÄÍÎÑÒ² |
ÌÅÒÎÄ ÎÖÅÍÊÈ
ÊÎËÈ×ÅÑÒÂÀ ÏÐÎÃÐÀÌÌÍÛÕ ÄÅÔÅÊÒÎÂ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÌÅÒÐÈÊ ÑËÎÆÍÎÑÒÈ |
212–218 |
Ïîìîðîâà Î.Â., |
THE REsearch OF Matlab functions features for scaling
input data of SOFTWARE QUALITY EVALUATION ARTIFICIAL NEURAL
NETWORK |
Èññëåäîâàíèå
îñîáåííîñòåé âñòðîåííûõ ôóíêöèé ïàêåòà MATLAB ÄËß
ÌÀÑØÒÀÁÈÐÎÂÀÍÈß ÂÕÎÄÍÛÕ ÄÀÍÍÛÕ
ÈÑÊÓÑÑÒÂÅÍÍÎÉ ÍÅÉÐÎÍÍÎÉ ÑÅÒÈ
ÎÖÅÍÈÂÀÍÈß ÊÀ×ÅÑÒÂÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß |
219–224 |
|
Òåõíîëî㳿 Ada òà áàãàòîâåðñ³éíèé êîìï’þòèíã |
||||
Ãîäóíêî Â.Ì., |
QUALITY OF THE
DYNAMIC HTML PAGES TRANSLATOR FOR ADA WEB SERVERS |
ßʲÑÒÜ ÒÐÀÍÑËßÒÎÐÀ ØÀÁËÎͲ ÄÈÍÀ̲×ÍÈÕ HTML
ÑÒÎвÍÎÊ ÄËß ADA WEB ÑÅÐÂÅв |
ÊÀ×ÅÑÒÂÎ
ÒÐÀÍÑËßÒÎÐÀ ØÀÁËÎÍΠÄÈÍÀÌÈ×ÅÑÊÈÕ HTML ÑÒÐÀÍÈÖ ÄËß ADA WEB ÑÅÐÂÅÐΠ|
225–229 |
Ôóíêö³îíàëüíà áåçïåêà ³íôîðìàö³éíî-êåðóþ÷èõ ñèñòåì |
||||
Îðåõîâà À.À., |
INTEGRATED HMI SAFETY ASSESSMENT METHODOLOGY FOR SAFETY-CRITICAL
I&C SYTEMS |
ÌÅÒÎÄÈÊÀ
ÊÎÌÏËÅÊÑÍί ÎÖ²ÍÊÈ ÁÅÇÏÅÊÈ ëþäèíî-ìàøèííÎÃÎ ³íòåðôåéñó ²ÊÑ
ÊÐÈÒÈ×ÍÎÃÎ ÇÀÑÒÎÑÓÂÀÍÍß |
ÌÅÒÎÄÈÊÀ
ÊÎÌÏËÅÊÑÍÎÉ ÎÖÅÍÊÈ ÁÅÇÎÏÀÑÍÎÑÒÈ ×ÅËÎÂÅÊÎ-ÌÀØÈÍÍÎÃÎ ÈÍÒÅÐÔÅÉÑÀ ÈÓÑ
ÊÐÈÒÈ×ÅÑÊÎÃÎ ÏÐÈÌÅÍÅÍÈß |
230–235 |
Èçâàëîâ À.Â. |
MODELLING THE AIRCRAFT’S
FLIGHT MODE CHANGE WHILE
GENERATING POTENTIALLY-CONFLICTING SITUATIONS |
ÌÎÄÅËÞÂÀÍÍß Ç̲ÍÈ ÐÅÆÈÌÓ ÏÎËÜÎÒÓ
ÏβÒÐßÍÎÃÎ ÑÄÓÍÀ ÏÐÈ ÑÒÂÎÐÅÍͲ
ÏÎÒÅÍÖ²ÉÍÎ-ÊÎÍÔ˲ÊÒÍÈÕ ÑÈÒÓÀÖ²É |
ÌÎÄÅËÈÐÎÂÀÍÈÅ
ÑÌÅÍÛ ÐÅÆÈÌÀ ÏÎ˨ÒÀ ÂÎÇÄÓØÍÎÃÎ ÑÓÄÍÀ ÏÐÈ ÃÅÍÅÐÀÖÈÈ ÏÎÒÅÍÖÈÀËÜÍÎ-ÊÎÍÔËÈÊÒÍÛÕ
ÑÈÒÓÀÖÈÉ |
236–240 |
Ïîâ³äîìëåííÿ |
||||
Åôèìîâ Ñ.Í., |
THE RELIABILITY
ESTIMATION MODEL OF THE HETEROGENEOUS
CLIENT-SERVER COMPUTER NETWORK |
ÌÎÄÅËÜ ÎÖ²ÍÊÈ ÍÀIJÉÍÎÑÒ²
ÃÅÒÅÐÎÃÅÍÍί ÎÁ×ÈÑËÞÂÀËÜÍ²É ÌÅÐÅƲ
Ê˲ªÍÒ-ÑÅÐÂÅÐÍί ÀÐÕ²ÒÅÊÒÓÐÈ |
ÌÎÄÅËÜ ÎÖÅÍÊÈ
ÍÀÄÅÆÍÎÑÒÈ ÃÅÒÅÐÎÃÅÍÍÎÉ ÂÛ×ÈÑËÈÒÅËÜÍÎÉ ÑÅÒÈ ÊËÈÅÍÒ-ÑÅÐÂÅÐÍÎÉ ÀÐÕÈÒÅÊÒÓÐÛ |
241–243 |
Øàíîâí³
÷èòà÷³!
Íàóêîâî-òåõí³÷íèé æóðíàë “ÐÀIJÎÅËÅÊÒÐÎÍͲ
² ÊÎÌÏ'ÞÒÅÐͲ ÑÈÑÒÅÌÈ“
âêëþ÷åíèé äî ïåðåë³êó íàóêîâèõ âèäàíü, â ÿêèõ ìîæóòü äðóêóâàòèñÿ îñíîâí³
ðåçóëüòàòè äèñåðòàö³éíèõ ðîá³ò
(äèâ. ïîñòàíîâó ïðåçè䳿 ÂÀÊ Óêðà¿íè ¹1-05/3 â³ä 8.07.2009)
– ó çàãàëüíîäåðæàâí³é
ðåôåðàòèâí³é áàç³ äàíèõ «Óêðà¿í³êà
íàóêîâà» òà ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÓÐÆ «Äæåðåëî» (â³ëüíèé îí-ëàéíîâèé äîñòóï äî
ðåñóðñ³â íà Web-ñåðâåð³ http://www.nbuv.gov.ua);
– ó
ðåôåðàòèâí³é áàç³ äàíèõ Âñåðîñ³éñüêîãî
³íñòèòóòó íàóêîâî¿ ³ òåõí³÷íî¿ ³íôîðìàö³¿ (²ͲҲ) Ðîñ³éñüêî¿ àêàäå쳿 íàóê
³ ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÐÆ (â³ëüíèé îí-ëàéíîâèé äîñòóï
äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.viniti.ru).