Íàö³îíàëüíèé àåðîêîñì³÷íèé óí³âåðñèòåò ³ì. Ì.ª. Æóêîâñüêîãî “Õàðê³âñüêèé àâ³àö³éíèé ³íñòèòóò”

 

ISSN 1814-4225. ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ’ÞÒÅÐͲ ÑÈÑÒÅÌÈ. – 2013. ¹ 5 (64). – 426 ñ.

ISSN 1814-4225. ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÅ È ÊÎÌÏÜÞÒÅÐÍÛÅ ÑÈÑÒÅÌÛ. – 2013. ¹ 5 (64). – 426 ñ.

ISSN 1814-4225. RADIOELECTRONIC AND COMPUTER SYSTEMS. – 2013. ¹ 5 (64).426 ñ.

 

ÑÒÀÒÒ² (articleS)

 

Àâòîðè
(ìîâà
îðèã³íàëó)

Íàçâà ñòàòò³  (article title)

Ñòîð³íêè

(pages)

English

Óêðà¿íñüêà ìîâà

Ðóññêèé ÿçûê

Áåçïåêà ³ ðåçèëüºíòí³ñòü ³íôðàñòðóêòóð

Áàêàåâ Î.Â.

INFORMATION MODEL OF MONITORING LATENT FORMATION OF CRACKS IN FRONT OF BREAKAGE HEADING OF COAL MINE

²ÍÔÎÐÌÀÖ²ÉÍÀ ÌÎÄÅËÜ ÌÎͲÒÎÐÈÍÃÓ ÏÐÈÕÎÂÀÍÎÃÎ ÒвÙÈÍÎÓÒÂÎÐÅÍÍß ÏÎÏÅÐÅÄÓ Î×ÈÑÍÎÃÎ ÂÈÁÎÞ ÂÓòËÜÍί ØÀÕÒÈ

ÈÍÔÎÐÌÀÖÈÎÍÍÀß ÌÎÄÅËÜ ÌÎÍÈÒÎÐÈÍÃÀ ÑÊÐÛÒÎÃÎ ÒÐÅÙÈÍÎÎÁÐÀÇÎÂÀÍÈß ÂÏÅÐÅÄÈ Î×ÈÑÒÍÎÉ ÂÛÐÀÁÎÒÊÈ ÓÃÎËÜÍÎÉ ØÀÕÒÛ

13–17
(5)

Áðþõîâåöêèé À.À.,
Ñêàòêîâ À.Â.,
Áåðåçåíêî Ï.Î.

Detection of vulnerabilities in critical applications based on Decision Trees

Âèÿâëåííÿ óðàçëèâîñòåé  ÊÐÈÒÈ×ÍÈÕ äîäàòê³â íà îñíîâ³ ÂÈвØÀËÜÍÈÕ ÄÅÐÅÂ

ÎÁÍÀÐÓÆÅÍÈÅ ÓßÇÂÈÌÎÑÒÅÉ Â ÊÐÈÒÈ×ÅÑÊÈÕ ÏÐÈËÎÆÅÍÈßÕ ÍÀ ÎÑÍÎÂÅ ÐÅØÀÞÙÈÕ ÄÅÐÅÂÜÅÂ

18–22
(5)

Ãîëóá Ñ.Â.,
Áóðëÿé ².Â.

STRUCTURING OF INPUT DATA IN INFORMATION TECHNOLOGY OF FIRE SAFETY MONITORING

ÑÒÐÓÊÒÓÐÈÇÀÖ²ß ÌÀÑȲ ÂÕ²ÄÍÈÕ ÄÀÍÈÕ Â ²ÍÔÎÐÌÀÖ²ÉÍ²É ÒÅÕÍÎËÎò¯ ÎÏÅÐÀÒÈÂÍÎÃÎ ÌÎͲÒÎÐÈÍÃÓ ÏÎÆÅÆÎÃÀѲÍÍß

ÑÒÐÓÊÒÓÐÈÐÎÂÀÍÈÅ ÌÀÑÑÈÂÎÂ ÂÕÎÄÍÛÕ ÄÀÍÍÛÕ Â ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÒÅÕÍÎËÎÃÈÈ ÎÏÅÐÀÒÈÂÍÎÃÎ ÌÎÍÈÒÎÐÈÍÃÀ ÏÎÆÀÐÎÒÓØÅÍÈß

23–30
(8)

Ãîðäååâ À.À.

CREATION OF FACET-HIERARCHICAL CLASSIFICATION IN RISK-MANAGEMENT TERMS

ÔÎÐÌÓÂÀÍÍß ÔÀÑÅÒÍÎ-²ªÐÀÐÕ²×Íί ÊËÀÑÈÔ²ÊÀÖ²¯ ÒÅÐ̲Ͳ  ÓÏÐÀÂ˲ÍͲ ÐÈÇÈÊÀÌÈ

ÔÎÐÌÈÐÎÂÀÍÈÅ ÔÀÑÅÒÍÎ-ÈÅÐÀÐÕÈ×ÅÑÊÎÉ ÊËÀÑÑÈÔÈÊÀÖÈÈ ÒÅÐÌÈÍΠ ÓÏÐÀÂËÅÍÈÈ ÐÈÑÊÀÌÈ

31–38
(8)

Davies J.N.,
Tevkun M.,
Grout V.,
Rvachova N.

A COMPARISON OF THE PERFORMANCE OF IPV4 & IPV6 INFRASTRUCTURE NETWORKS

ÏÐÈÍÖÈÏÈ ÎÏÒÈ̲ÇÀÖ²¯ ÑÏÈÑʲ ÊÎÍÒÐÎËÞ ÄÎÑÒÓÏÓ Â ÌÅÆÀÕ ÄÎÌÅÍÓ

ÏÐÈÍÖÈÏÛ ÎÏÒÈÌÈÇÀÖÈÈ ÑÏÈÑÊÎÂ ÊÎÍÒÐÎËß ÄÎÑÒÓÏÀ Â ÏÐÅÄÅËÀÕ ÄÎÌÅÍÀ

39–44
(
6)

Èâàí÷åíêî Î.Â.,
Õàð÷åíêî Â.Ñ.,
Áèðþêîâ Ä.Þ.

Semi-markov Model of Critical Infrastructures Accident

ÍÀϲÂÌÀÐʲÂÑÜÊÀ ÌÎÄÅËÜ ÀÂÀв¯ ÊÐÈÒÈ×Íί ²ÍÔÐÀÑÒÐÓÊÒÓÐÈ

ÏÎËÓÌÀÐÊÎÂÑÊÀß ÌÎÄÅËÜ ÏÐÎÒÅÊÀÍÈß ÀÂÀÐÈÈ ÊÐÈÒÈ×ÅÑÊÎÉ ÈÍÔÐÀÑÒÐÓÊÒÓÐÛ

45–51
(
7)

Izvalov A.V.,
Nedelko V.N.,
Nedelko S.N.

VALIDATION OF INPUT DATA FLOW GENERATING ALGORITHM FOR INTELLIGENT AIR TRAFFIC CONTROL SIMULATOR

ÂÀ˲ÄÀÖ²ß ÀËÃÎÐÈÒÌÓ ÃÅÍÅÐÀÖ²¯ ÂÕ²ÄÍÈÕ ÄÀÍÈÕ ÄËß ²ÍÒÅËÅÊÒÓÀËÜÍÎÃÎ ÒÐÅÍÀÆÅÐÓ À²ÀÄÈÑÏÅÒ×ÅÐÀ

ÂÀËÈÄÀÖÈß àëãîðèòìà ãåíåðàöèè ÂÕÎÄÍÛÕ ÄÀÍÍÛÕ ÄËß ÈÍÒÅËËÅÊÒÓÀËÜÍÎÃÎ ÒÐÅÍÀƨÐÀ ÀÂÈÀÄÈÑÏÅÒ×ÅÐÀ

52–56
(
5)

Ìàùåíêî Å.Í.,
Øåâ÷åíêî Â.È.

Research of the critical IT infrastructure service process, based on the Semi-Markov ìodel

Äîñë³äæåííÿ ÏÐÎÖÅѲ ÑÅвÑÍÎÃÎ ÎÁÑËÓÃÎÂÓÂÀÍÍß ÊÐÈÒÈ×ÍÈÕ ²Ò-³íôðàñòðóêòóð íà îñíîâ³ íàï³âìàðê³âñüêî¿ ìîäåë³

ÈÑÑËÅÄÎÂÀÍÈÅ ÏÐÎÖÅÑÑΠÑÅÐÂÈÑÍÎÃÎ ÎÁÑËÓÆÈÂÀÍÈß ÊÐÈÒÈ×ÅÑÊÈÕ ÈÒ-ÈÍÔÐÀÑÒÐÓÊÒÓÐ ÍÀ ÎÑÍÎÂÅ ÏÎËÓÌÀÐÊÎÂÑÊÎÉ ÌÎÄÅËÈ

57–63
(7)

Ìåëåíåö À.Â.

PROTECTION of CLOUD-architecture from DDOS-attacks

çàÕÈÑò cloud-àðõ³òåêòóð Â²Ä DDoS-àòàê

ÇÀÙÈÒÀ CLOUD-ÀÐÕÈÒÅÊÒÓÐ ÎÒ DDOS-ÀÒÀÊ

64–69
(6)

Ïîìîðîâà Î.Â.,
Ìåäçàòèé Ä.Ì.

The simple behavioral model and algorithms of autonomous mobile robot for territory cleaning

ÏÐÈ̲ÒÈÂÍÀ ÏÎÂÅIJÍÊÎÂÀ ÌÎÄÅËÜ ÒÀ ÀËÃÎÐÈÒÌÈ Î×ÈÙÅÍÍß ÒÅÐÈÒÎв¯ ÀÂÒÎÍÎÌÍÈÌ ÌÎÁ²ËÜÍÈÌ ÐÎÁÎÒÎÌ

Ïðèìèòèâíàÿ ïîâåäåí÷èñêàÿ ìîäåëü è àëãîðèòìû î÷èñòêè òåððèòîðèè àâòîíîìíûì ìîáèëüíûì ðîáîòîì

70–76
(7)

Procházková D.

OPEN PROBLEMS IN PROTECTION OF LIFE-GIVING INFRASTRUCTURES AND SUPPLY CHAINS

²ÄÊÐÈÒ² ÏÐÎÁËÅÌÈ ÇÀÕÈÑÒÓ ²ÍÔÐÀÑÒÐÓÊÒÓРϲÄÒÐÈÌÊÈ ÆÈÒÒªÇÀÁÅÇÏÅ×ÅÍÍß ² ËÀÍÖÞÆʲ ÏÎÑÒÀ×ÀÍÜ

ÎÒÊÐÛÒÛÅ ÏÐÎÁËÅÌÛ ÇÀÙÈÒÛ ÈÍÔÐÀÑÒÐÓÊÒÓÐ ÏÎÄÄÅÐÆÊÈ ÆÈÇÍÅÎÁÅÑÏÅ×ÅÍÈß È ÖÅÏÎ×ÅÊ ÏÎÑÒÀÂÎÊ

77–87
(
11)

Ðÿçàíöåâ A.È.,
Ñêàðãà-Áàíäóðîâà È.Ñ.,
Íåñòåðîâ Ì.Â.

A METHOD FOR REGIONAL ENVIRONMENTAL RISK ASSESSMENT

ÌÅÒÎÄ ÎÖ²ÍÊÈ ÒÅÕÍÎÃÅÍÍÎÃÎ ÐÈÇÈÊÓ Â ²ÍÔÎÐÌÀÖ²ÉÍ²É ÑÈÑÒÅ̲ ÅÊÎËÎò×Íί ÁÅÇÏÅÊÈ ÐÅòÎÍÓ

ÌÅÒÎÄ ÎÖÅÍÊÈ ÒÅÕÍÎÃÅÍÍÎÃÎ ÐÈÑÊÀ  ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÑÈÑÒÅÌÅ ÝÊÎËÎÃÈ×ÅÑÊÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ ÐÅÃÈÎÍÀ

88–95
(8)

Ñêàðãà-Áàíäóðîâà È.Ñ.

A MULTIDIMENSIONAL APPROACH TOWARDS ENVIRONMENTAL MONITORING AND HAZARDOUS MATERIALS INVENTORY

ÌÅÒÎÄÈ áàãàòîâèì³ðíîãî ìîäåëþâàííÿ  ÇÀÄÀ×ÀÕ ÅÊÎËÎò×ÍÎÃÎ ÌÎͲÒÎÐÈÍÃÓ òà ²ÍÂÅÍÒÀÐÈÇÀÖ²¯ ²ÄÕÎIJÂ

ÌÅÒÎÄÛ ÌÍÎÃÎÌÅÐÍÎÃÎ ÌÎÄÅËÈÐÎÂÀÍÈß Â ÇÀÄÀ×ÀÕ ÝÊÎËÎÃÈ×ÅÑÊÎÃÎ ÌÎÍÈÒÎÐÈÍÃÀ È ÈÍÂÅÍÒÀÐÈÇÀÖÈÈ ÎÒÕÎÄÎÂ

96–99
(4)

Òðóá÷àíèíîâ Ñ.À.

COMPARISON OF REQUIREMENTS FOR NPP POST-ACCIDENT MONITORING SYSTEMS

DzÑÒÀÂËÅÍÍß ÂÈÌÎà ÄÎ ÑÈÑÒÅÌ Ï²ÑËßÀÂÀвÉÍÎÃÎ ÌÎͲÒÎÐÈÍÃÓ ÀÒÎÌÍÈÕ ÅËÅÊÒÐÎÑÒÀÍÖ²É

ÑÎÏÎÑÒÀÂËÅÍÈÅ ÒÐÅÁÎÂÀÍÈÉ Ê ÑÈÑÒÅÌÀÌ ÏÎÑËÅÀÂÀÐÈÉÍÎÃÎ ÌÎÍÈÒÎÐÈÍÃÀ ÀÒÎÌÍÛÕ ÝËÅÊÒÐÎÑÒÀÍÖÈÉ

100–105
(6)

Õàõàíîâ Â.È.,
Ýíãëåçè È.Ï.,
Ëèòâèíîâà Å.È.,
×óìà÷åíêî Ñ.Â.,
Ãóçü Î.À.,
Õàõàíîâà À.Â.

Green Wave Traffic on Cloud

Õìàðíà ³íôðàñòðóêòóðà  ÌÎͳÒÎÐÈÍÃÀ òà ÓÏÐÀÂ˳ííß ÄÎÐÎÆÍèÌ ðóõîÌ

ÎÁËÀ×ÍÀß ÈÍÔÐÀÑÒÐÓÊÒÓÐÀ ÌÎÍÈÒÎÐÈÍÃÀ È ÓÏÐÀÂËÅÍÈß ÄÎÐÎÆÍÛÌ ÄÂÈÆÅÍÈÅÌ

106–111
(6)

Øåâ÷åíêî Â.È.

DECISION-MAKING TECHNOLOGY IN QUALITY MANAGEMENT OF IT SERVICES IN BUSINESS-CRITICAL SYSTEMS

ÒÅÕÍÎËÎÃ²ß ÏÐÈÉÍßÒÒß Ð²ØÅÍÜ Ç ÓÏÐÀÂ˲ÍÍß ßʲÑÒÞ ²Ò-ÏÎÑËÓà  Á²ÇÍÅÑ-ÊÐÈÒÈ×ÍÈÕ ÑÈÑÒÅÌÀÕ

ÒÅÕÍÎËÎÃÈß ÏÐÈÍßÒÈß ÐÅØÅÍÈÉ ÏÎ ÓÏÐÀÂËÅÍÈÞ ÊÀ×ÅÑÒÂÎÌ ÈÒ-ÓÑËÓà  ÁÈÇÍÅÑ-ÊÐÈÒÈ×ÅÑÊÈÕ ÑÈÑÒÅÌÀÕ

112–118
(7)

Ãàðàíòîçäàòí³ñòü òà ³íôîðìàö³éíà áåçïåêà êîìï’þòåðíèõ ñèñòåì ³ ìåðåæ

Áåçä³òêî Î.Ì.

CONSTRUCTION OF DEVICES OF MMX OF EXPANSION BASE MICROPROCESSOR

ÁÓÄÎÂÀ ÏÐÈÑÒÐί ÌÌÕ ÐÎÇØÈÐÅÍÍß ÁÀÇÎÂÎÃΠ̲ÊÐÎÏÐÎÖÅÑÎÐÀ

ÏÎÑÒÐÎÅÍÈÅ ÓÑÒÐÎÉÑÒÂ ÌÌÕ ÐÀÑØÈÐÅÍÈß ÁÀÇÎÂÎÃÎ ÌÈÊÐÎÏÐÎÖÅÑÑÎÐÀ

119–129
(11)

Áóõàíîâ Ä.Ã.,
Ïîëÿêîâ Â.Ì.,
Ðóáàíîâ Â.Ã.,
Ñèíþê Â.Ã.

METHOD OF STRUCTURING IN TASKS OF SELF-DIAGNOSIS OF DISTRIBUTED COMPUTER SYSTEMS

ÌÅÒÎÄ ÑÒÐÓÊÒÓÐÈÇÀÖȲ² Ó ÇÀÄÀ×ÀÕ ÑÀÌÎIJÀÃÍÎÑÒÓÂÀÍÍß ÐÎÇÏÎIJËÅÍÈÕ ÎÁ×ÈÑËÞÂÀËÜÍÈÕ ÑÈÑÒÅÌ

ÌÅÒÎÄ ÑÒÐÓÊÒÓÐÈÇÀÖÈÈ Â ÇÀÄÀ×ÀÕ ÑÀÌÎÄÈÀÃÍÎÑÒÈÐÎÂÀÍÈß ÐÀÑÏÐÅÄÅËÅÍÍÛÕ ÂÛ×ÈÑËÈÒÅËÜÍÛÕ ÑÈÑÒÅÌ

130–134
(5)

Äîëãîâ À.Þ.

INCREASE OF PARAMETR ESTIMATION ACCURACY OF CHECK SMALL SIZE SAMPLE WITH EXPONENTIAL DISTRIBUTION

ϲÄÂÈÙÅÍÍß ÒÎ×ÍÎÑÒ² ÎÖ²ÍÎÊ ÏÀÐÀÌÅÒв ÊÎÍÒÐÎËÜÍί ÂÈÁ²ÐÊÈ ÌÀËÎÃÎ ÎÁÑßÃÓ ÏÐÈ åêñïîíåíö³àëüíîìó çàêîíi ÐÎÇÏÎIJËÓ

ÏÎÂÛØÅÍÈÅ ÒÎ×ÍÎÑÒÈ ÎÖÅÍÎÊ ÏÀÐÀÌÅÒÐΠÊÎÍÒÐÎËÜÍÎÉ ÂÛÁÎÐÊÈ ÌÀËÎÃÎ ÎÁÚÅÌÀ ÏÐÈ ÝÊÑÏÎÍÅÍÖÈÀËÜÍÎÌ ÇÀÊÎÍÅ ÐÀÑÏÐÅÄÅËÅÍÈß

135–138
(4)

Äîëãîâ Þ.À.

DEFINITION OF EQUIVALENT SAMPLE SIZE IN POINT DISTRIBUTION METHOD

Âèçíà÷åííÿ îáñÿãó åêâ³âàëåíòíî¿ âèá³ðêè ó ìåòîä³ òî÷êîâèõ ðîçïîä³ë³â

ÎÏÐÅÄÅËÅÍÈÅ ÎÁÚÅÌÀ ÝÊÂÈÂÀËÅÍÒÍÎÉ ÂÛÁÎÐÊÈ Â ÌÅÒÎÄÅ ÒÎ×Å×ÍÛÕ ÐÀÑÏÐÅÄÅËÅÍÈÉ

139–141
(3)

Äðîçä À.Â.,
Õàð÷åíêî Â.Ñ.,
Àíòîùóê Ñ.Ã.,
Äðîçä Ì.À.

CHECKABILITY OF SAFETY-CRITICAL SYSTEMS COMPONENTS IN RELATION TO FAULTS OF SHORTS TYPE

ÎÖ²ÍÊÀ ÊÎÍÒÐÎËÅÏÐÈÄÀÒÍÎÑÒ² ÖÈÔÐÎÂÈÕ ÊÎÌÏÎÍÅÍҲ ÂÁÓÄÎÂÀÍÈÕ ÑÈÑÒÅÌ ÊÐÈÒÈ×ÅÑÊÎÃÎ ÇÀÑÒÎÑÓÂÀÍÍß ÙÎÄÎ ÍÅÑÏÐÀÂÍÎÑÒÅÉ ÒÈÏÓ "ÇÀÌÈÊÀÍÍß"

ÊÎÍÒÐÎËÅÏÐÈÃÎÄÍÎÑÒÜ ÖÈÔÐÎÂÛÕ ÊÎÌÏÎÍÅÍÒΠÑÈÑÒÅÌ ÊÐÈÒÈ×ÅÑÊÎÃÎ ÏÐÈÌÅÍÅÍÈß ÏÎ ÎÒÍÎØÅÍÈÞ Ê ÍÅÈÑÏÐÀÂÍÎÑÒßÌ ÒÈÏÀ «ÇÀÌÛÊÀÍÈÅ»

142–147
(6)

Åñèíà Ì.Â.,
Ðàññîìàõèí Ñ.Ã.

PSEUDO-RANDOM CODING BY linear congruent GENERATION METHOD

ÏñåâäîÂÈÏÀÄÊÎÂÅ êîäÓÂÀÍÍß çà ìåòîäîì ë²Í²ÉÍί êîíãðóÅíòíî¯ ãåíåðàö²¯

ÏÑÅÂÄÎÑËÓ×ÀÉÍÎÅ ÊÎÄÈÐÎÂÀÍÈÅ ÏÎ ÌÅÒÎÄÓ ËÈÍÅÉÍÎÉ ÊÎÍÃÐÓÝÍÒÍÎÉ ÃÅÍÅÐÀÖÈÈ

148–150
(3)

Çàùåëêèí Ê.Â.,
Èâàùåíêî À.È.,
Èâàíîâà Å.Í.

IMPROVEMENT OF THE METHOD OF STEGANOGRAPHIC INFORMATION HIDING OF KUTTER-JORDAN-BOSSEN

ÓÄÎÑÊÎÍÀËÅÍÍß ÌÅÒÎÄÓ ÑÒÅÃÀÍÎÃÐÀÔ²×ÍÎÃÎ ÏÐÈÕÎÂÀÍÍß ÄÀÍÈÕ ÊÓÒÒÅÐÀ-ÄÆÎÐÄÀÍÀ-ÁÎÑÑÅÍÀ

ÓÑÎÂÅÐØÅÍÑÒÂÎÂÀÍÈÅ ÌÅÒÎÄÀ ÑÒÅÃÀÍÎÃÐÀÔÈ×ÅÑÊÎÃÎ ÑÊÐÛÒÈß ÄÀÍÍÛÕ ÊÓÒÒÅÐÀ-ÄÆÎÐÄÀÍÀ-ÁÎÑÑÅÍÀ

151–155
(5)

Èâàíîâ Ä.Å.

Methodology for the synthesis of evolutionary algorithms of CONSTRUCTION of identifYing sequences of digital devices

ÌÅÒÎÄÎËÎÃ²ß ÑÈÍÒÅÇÓ åâîëþö³éíèõ àëãîðèòì³â ÏÎÁÓÄÎÂÈ ³äåíòèô³êóþ÷èõ ïîñë³äîâíîñòåé ÖÈÔÐÎÂÈÕ ÏÐÈÑÒÐίÂ

ÌÅÒÎÄÎËÎÃÈß ÑÈÍÒÅÇÀ ÝÂÎËÞÖÈÎÍÍÛÕ ÀËÃÎÐÈÒÌÎÂ ÏÎÑÒÐÎÅÍÈß ÈÄÅÍÒÈÔÈÖÈÐÓÞÙÈÕ ÏÎÑËÅÄÎÂÀÒÅËÜÍÎÑÒÅÉ ÖÈÔÐÎÂÛÕ ÓÑÒÐÎÉÑÒÂ

156–161
(6)

Kamenskih A.N.,
Ponurovskiy I.S.,
Tyurin S.F.

SYNTESIS AND ANALYSIS OF SELF-TIMED FUNCTIONALLY COMPLETE TOLERANT ELEMENT

Ñèíòåç ³ àíàë³ç ñóâîðî ñàìîñ³íõðîííîãî ôóíêö³îíàëüíî-ïîâíîãî òîëåðàíòíîãî åëåìåíò

Ñèíòåç è àíàëèç ñòðîãî ñàìîñèíõðîííîãî ôóíêöèîíàëüíî-ïîëíîãî òîëåðàíòíîãî ýëåìåíòà

162–167
(
6)

Ñêàòêîâ À.Â.,
Âîðîíèí Ä.Þ.,
×îðíîìûç Ñ.À.

INFORMATIONAL PROPORTIONAL-INTEGRAL-DERIVATIVE CONTROLLER AS A DEVICE FOR ATTACK CONSEQUENCES COMPENSATION

²ÍÔÎÐÌÀÖ²ÉÍÈÉ ïðîïîðö³éíî-³íòåãðàëüíî-äèôåðåíö³àëüíèé ðåãóëÿòîð ßÊ ÇÀѲÁ ÊÎÌÏÅÍÑÀÖ²¯ ÍÀÑ˲Äʲ ÀÒÀÊ

ÈÍÔÎÐÌÀÖÈÎÍÍÛÉ ÏÐÎÏÎÐÖÈÎÍÀËÜÍÎ-ÈÍÒÅÃÐÀËÜÍÎ-ÄÈÔÔÅÐÅÍÖÈÀËÜÍÛÉ ÐÅÃÓËßÒÎÐ ÊÀÊ ÑÐÅÄÑÒÂÎ ÊÎÌÏÅÍÑÀÖÈÈ ÏÎÑËÅÄÑÒÂÈÉ ÀÒÀÊ

168–171
(4)

Òþðèí Ñ.Ô.,
Ãîðîäèëîâ À.Þ.,
Ïîíóðîâñêèé È.Ñ.

Improving Fault Tolerance OF FPGA by Reconfiguration of Operable Elements

ϲÄÂÈÙÅÍÍß Â²ÄÌÎÂÎÑÒ²ÉÊÎÑÒ² FPGA ØËßÕÎÌ ÐÅÊÎÍÔ²ÃÓÐÀÖ²¯ ÏÐÀÖÅÇÄÀÒÍÈÕ ÅËÅÌÅÍÒ²Â

ÏÎÂÛØÅÍÈÅ ÎÒÊÀÇÎÓÑÒÎÉ×ÈÂÎÑÒÈ FPGA ÏÓÒÅÌ ÐÅÊÎÍÔÈÃÓÐÀÖÈÈ ÐÀÁÎÒÎÑÏÎÑÎÁÍÛÕ ÝËÅÌÅÍÒÎÂ

172–176
(5)

Tyurin S.F.,
Grekov A.V.,
Gromov O.A.,
Ponurovskiy I.S.

ADAPTABLE LOGICAL FPGA-ELEMENTS

ÀÄÀÏÒÀÖ²ß FPGA äî â³äìîâè ËÎòÊÈ

ÀÄÀÏÒÀÖÈß FPGA Ê ÎÒÊÀÇÀÌ ËÎÃÈÊÈ

177–182
(6)

×åìåðèñ À.À.,
Ëàçîðåíêî Ä.È.,
Ïðîíçåëåâà Ñ.Þ.

EXPLORATION OF POWER CONSUMPTION REDUCTION OF A COMPUTING DEVICE BY MEANS OF DVFS

ÄÎÑ˲ÄÆÅÍÍß ÌÎÆËÈÂÎÑÒ² ÇÌÅÍØÅÍÍß ÅÍÅÐÃÎÑÏÎÆÈÂÀÍÍß ÎÁ×ÈÑËÞÂÀËÜÍÎÃÎ ÏÐÈÑÒÐÎÞ ØËßÕÎÌ ÂÈÊÎÐÈÑÒÀÍÍß ÐÅÆÈ̲ ÏÐÎÄÓÊÒÈÂÍÎÑÒ² ÏÐÎÖÅÑÎÐÀ

ÈÑÑËÅÄÎÂÀÍÈÅ ÂÎÇÌÎÆÍÎÑÒÈ ÑÍÈÆÅÍÈß ÝÍÅÐÃÎÏÎÒÐÅÁËÅÍÈß ÂÛ×ÈÑËÈÒÅËÜÍÎÃÎ ÓÑÒÐÎÉÑÒÂÀ ÏÓÒÅÌ ÈÑÏÎËÜÇÎÂÀÍÈß ÐÅÆÈÌΠÏÐÎÈÇÂÎÄÈÒÅËÜÍÎÑÒÈ ÏÐÎÖÅÑÑÎÐÀ

183–185
(3)

ßê³ñòü, íàä³éí³ñòü òà ðåñóðñîçáåðåæåííÿ äëÿ àïàðàòíèõ ³ ïðîãðàìíèõ çàñîá³â

Àáäóë-Õàäè À.Ì.,
Ïîíî÷îâíûé Þ.Ë.,
Õàð÷åíêî Â.Ñ.

DEVELOPMENT OF BASIC Markov model FOR RESEARCH OF COMMERCIAL WEB SERVICES AVAILABILITY

ÐÎÇÐÎÁÊÀ ÁÀÇÎÂÈÕ Ìàðê³âñüêèõ ÌÎÄÅËÅÉ ÄÎÑ˲ÄÆÅÍÍß ÃÎÒÎÂÍÎÑÒ² ÊÎÌÅÐÖ²ÉÍÈÕ ÂÅÁ-ÑÅвѲÂ

ÐÀÇÐÀÁÎÒÊÀ ÁÀÇÎÂÛÕ ÌÀÐÊÎÂÑÊÈÕ ÌÎÄÅËÅÉ ÄËß ÈÑÑËÅÄÎÂÀÍÈß ÃÎÒÎÂÍÎÑÒÈ ÊÎÌÌÅÐ×ÅÑÊÈÕ ÂÅÁ-ÑÅÐÂÈÑÎÂ

186–191
(6)

Áåðäí³êîâà À.Ë.,
Ìàíæîñ Þ.Ñ.

INFORMATION TECHNOLOGY ANALYSIS OF COMPLEX SYSTEMS

²ÍÔÎÐÌÀÖ²ÉÍÀ ÒÅÕÍÎËÎÃ²ß ÀÍÀËIÇÓÂÀÍÍß ÑÊËÀÄÍÈÕ ÑÈÑÒÅÌ

ÈíôîðìàöÈÎÍÍÀß ÒÅÕÍÎËÎÃÈß ÀÍÀËÈÇÀ ÑËÎÆÍÛÕ ÑÈÑÒÅÌ

192–197
(6)

Biscoglio I.,
Fusani Ì.

REDUCING TEXTUAL AMBIGUITY RISK IN HIGH-IMPACT STANDARDS

Çíèæåííÿ ðèçèêó íåâèçíà÷åíîñò³ â òåêñòàõ ñòàíäàðò³â âåëèêîãî âïëèâó

Ñíèæåíèå ðèñêà íåîïðåäåëåííîñòè â òåêñòàõ ñòàíäàðòîâ áîëüøîãî âëèÿíèÿ

198–203
(
6)

Áóé Ä.Á.,
Ãðèøêî Þ.Î.

APPLICATIONS OF THE MULTISETS THEORY

ÇÀÑÒÎÑÓÂÀÍÍß ÒÅÎв¯ ÌÓËÜÒÈÌÍÎÆÈÍ

Ïðèìåíåíèå òåîðèè ÌÓËÜÒÈÌÍÎÆÅÑÒÂ

204–209
(6)

Áóé Ä.Á.,
Êîìïàí Ñ.Â.

MODEL The intersection class specification of object oriented programming

ÌÎÄÅËÜ ÎÏÅÐÀÖ²¯  ÏÅÐÅÒÈÍÓ ÑÏÅÖÈÔ²ÊÀÖ²É ÊËÀѲ ÎÁ’ÅÊÒÍÎ-ÎвªÍÒÎÂÀÍÎÃÎ ÏÐÎÃÐÀÌÓÂÀÍÍß

ÌÎÄÅËÜ ÎÏÅÐÀÖÈÈ  ÏÅÐÅÑÅ×ÅÍÈß ÑÏÅÖÈÔÈÊÀÖÈÉ ÊËÀÑÑΠÎÁÚÅÊÒÍÎ-ÎÐÈÅÍÒÈÐÎÂÀÍÍÎÃÎ ÏÐÎÃÐÀÌÌÈÐÎÂÀÍÈß

210–213
(4)

Butenko V.Î.,
Odarushchenko O.N.,
Kharchenko V.S.

METRIC-BASED ANALYSIS OF MARKOV MODELS FOR COMPUTER SYSTEM AVAILABILITY ASSESSMENT

ÌÅÒÐÈ×ÍÈÉ ÀÍÀË²Ç ÌÀÐʲÂÑÜÊÈÕ ÌÎÄÅËÅÉ ÄËß ÎÖ²ÍÊÈ ÃÎÒÎÂÍÎÑÒ² ÊÎÌÏ'ÞÒÅÐÍÈÕ ÑÈÑÒÅÌ

ÌÅÒÐÈ×ÅÑÊÈÉ ÀÍÀËÈÇ ÌÀÐÊÎÂÑÊÈÕ ÌÎÄÅËÅÉ ÄËß ÎÖÅÍÊÈ ÃÎÒÎÂÍÎÑÒÈ ÊÎÌÏÜÞÒÅÐÍÛÕ ÑÈÑÒÅÌ

214–220
(
7)

Âîëî÷³é Á.Þ.,
Îç³ðêîâñüêèé Ë.Ä.,
Ìóëÿê Î.Â.,
Çìèñíèé Ì.Ì.

RELIABILITY MODEL OF THE FAULT-TOLERANT HARDWARE/SOFTWARE SYSTEM BASED ON MAJORITY STRUCTURE WITH SOFTWARE AUTOMATIC RESTART

ÍÀIJÉͲÑÍÀ ÌÎÄÅËÜ Â²ÄÌÎÂÎÑÒ²ÉÊί ÏÐÎÃÐÀÌÍÎ-ÀÏÀÐÀÒÍί ÑÈÑÒÅÌÈ ÍÀ ÎÑÍβ ÌÀÆÎÐÈÒÀÐÍί ÑÒÐÓÊÒÓÐÈ Ç ÊÎÂÇÍÈÌ ÐÅÇÅÐÂÓÂÀÍÍßÌ ÒÀ ÀÂÒÎÌÀÒÈ×ÍÈÌ ÏÅÐÅÇÀÂÀÍÒÀÆÅÍÍßÌ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß

ÍÀÄÅÆÍÎÑÒÍÀß ÌÎÄÅËÜ ÎÒÊÀÇÎÓÑÒÎÉ×ÈÂÎÉ ÏÐÎÃÐÀÌÌÍÎ-ÀÏÏÀÐÀÒÍÎÉ ÑÈÑÒÅÌÛ ÍÀ ÎÑÍÎÂÅ ÌÀÆÎÐÈÒÀÐÍÎÉ ÑÒÐÓÊÒÓÐÛ ÑÎ ÑÊÎËÜÇßÙÈÌ ÐÅÇÅÐÂÈÐÎÂÀÍÈÅÌ È ÀÂÒÎÌÀÒÈ×ÅÑÊÎÉ ÏÅÐÅÇÀÃÐÓÇÊÎÉ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß

221–226
(6)

Glukhikh M.,
Moiseev M.,
Richter H.

A STATIC ANALYSIS APPROACH FOR FORMAL VERIFICATION OF SYSTEMC DESIGNS

ϲÄÕ²Ä ÄÎ ÔÎÐÌÀËÜÍί ÂÅÐÈÔ²ÊÀÖ²¯ SYSTEMC-ÏÐÎÅÊҲ ÍÀ ÎÑÍβ ÑÒÀÒÈ×ÍÎÃÎ ÀÍÀ˲ÇÓ

ÏÎÄÕÎÄ Ê ÔÎÐÌÀËÜÍÎÉ ÂÅÐÈÔÈÊÀÖÈÈ SYSTEMC-ÏÐÎÅÊÒΠÍÀ ÎÑÍÎÂÅ ÑÒÀÒÈ×ÅÑÊÎÃÎ ÀÍÀËÈÇÀ

227–232
(
6)

Ãîëèêîâ Ñ.Å.

USING FACETed-HIERARCHICAL STRUCTURES IN THE gui OF THE BANKING INFORMATION SYSTEMs

ÇÀÑÒÎÑÓÂÀÍÍß ôàñåòíî¿-³ºðàðõ³÷íèõ ñòðóêòóð â êîðèñòóâàËÜÍÈöüêèõ ³íòåðôåéñ³â ÑÈÑÒÅÌ ÀÂÒÎÌÀÒÈÇÀÖ²¯ ÁÀÍʲÂ

ÏÐÈÌÅÍÅÍÈÅ ÔÀÑÅÒÍÎ-ÈÅÐÀÐÕÈ×ÅÑÊÈÕ ÑÒÐÓÊÒÓÐ Â ÏÎËÜÇÎÂÀÒÅËÜÑÊÈÕ ÈÍÒÅÐÔÅÉÑÀÕ ÑÈÑÒÅÌ ÀÂÒÎÌÀÒÈÇÀÖÈÈ ÁÀÍÊÎÂ

233–236
(4)

Ãîðáåíêî À.Â.

ANALYSIS OF DEPENDABLE SERVICE-ORIENTED SYSTEMS DEVELOPMENT FEATURES

ÀÍÀË²Ç ÎÑÎÁËÈÂÎÑÒÅÉ ÑÒÂÎÐÅÍÍß ÒÀ ÅÊÑÏËÓÀÒÀÖ²¯ ÃÀÐÀÍÒÎÇÄÀÒÍÈÕ ÑÅвÑ-ÎвªÍÒÎÂÀÍÈÕ ÑÈÑÒÅÌ

ÀÍÀËÈÇ ÎÑÎÁÅÍÍÎÑÒÅÉ ÑÎÇÄÀÍÈß È ÝÊÑÏËÓÀÒÀÖÈÈ ÃÀÐÀÍÒÎÑÏÎÑÎÁÍÛÕ ÑÅÐÂÈÑ-ÎÐÈÅÍÒÈÐÎÂÀÍÍÛÕ ÑÈÑÒÅÌ

237–242
(6)

Äìèòðèåâà Î.À.

DEVELOPMENT OF PARALLEL MULTISTEP COLLOCATION BLOCK METHODS USING HERMITE INTERPOLATION POLYNOMIALS

ÐÎÇÐÎÁÊÀ ÁÀÃÀÒÎÊÐÎÊÎÂÈÕ ÏÀÐÀËÅËÜÍÈÕ ÊÎËÎÊÀÖIÉÍÈÕ ÁËÎÊÎÂÈÕ ÌÅÒÎÄ²Â Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ²ÍÒÅÐÏÎËßÖ²ÉÍÈÕ ÏÎ˲ÍÎ̲ ÅÐÌIÒÀ

ÐÀÇÐÀÁÎÒÊÀ ÌÍÎÃÎØÀÃÎÂÛÕ ÏÀÐÀËËÅËÜÍÛÕ ÊÎËËÎÊÀÖÈÎÍÍÛÕ ÁËÎ×ÍÛÕ ÌÅÒÎÄÎÂ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÈÍÒÅÐÏÎËßÖÈÎÍÍÛÕ ÏÎËÈÍÎÌΠÝÐÌÈÒÀ

243–249
(7)

Åïèôàíîâ À.Ñ.

regularization of partially set lows of functioning of discrete determined automatons with use of splines

Äîâèçíà÷åííÿ ÷àñòêîâî çàäàíèõ çàêîí³â ôóíêö³îíóâàííÿ äèñêðåòíèõ äèíàì³÷íèõ ñèñòåì ç âèêîðèñòàííÿì ñïëàéí³â

ÄÎÎÏÐÅÄÅËÅÍÈÅ ×ÀÑÒÈ×ÍÎ ÇÀÄÀÍÍÛÕ ÇÀÊÎÍΠÔÓÍÊÖÈÎÍÈÐÎÂÀÍÈß ÄÈÑÊÐÅÒÍÛÕ ÄÈÍÀÌÈ×ÅÑÊÈÕ ÑÈÑÒÅÌ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÑÏËÀÉÍÎÂ

250–254
(5)

Çèíîâàòíàÿ Ñ.Ë.,
Ëåâ÷åíêî À.Þ.,
Ãàëàíþê Ê.À.

THE SIMULATION MODEL FOR DESIGNING THE OPTIMAL INDEX STRUCTURE OF THE DATABASE

³ì³òàö³éíà ÌÎÄÅËÜ ÄËß ÏÐÎÅÊÒÓÂÀÍÍß ÎÏÒÈÌÀËÜÍί ²ÍÄÅÊÑÍί ÑÒÐÓÊÒÓÐÈ ÁÀÇÈ ÄÀÍÈÕ

ÈÌÈÒÀÖÈÎÍÍÀß ÌÎÄÅËÜ ÄËß ÏÐÎÅÊÒÈÐÎÂÀÍÈß ÎÏÒÈÌÀËÜÍÎÉ ÈÍÄÅÊÑÍÎÉ ÑÒÐÓÊÒÓÐÛ ÁÀÇÛ ÄÀÍÍÛÕ

255–260
(6)

Kvassay M.,
Levashenko V.

BIRNBAUM IMPORTANCE FOR ESTIMATION OF MULTI-STATE AND BINARY-STATE SYSTEMS

ÎÖ²ÍÊÀ Á²ÐÍÁÀÓÌÀ ÄËß ÀÍÀ˲ÇÓ ÍÀIJÉÍÎÑÒ² ÑÈÑÒÅÌÈ Ç ÄÅʲËÜÊÎÌÀ ² ÄÂÎÌÀ вÂÍßÌÈ ÏÐÀÖÅÇÄÀÒÍÎÑÒ²

ÎÖÅÍÊÀ ÁÈÐÍÁÀÓÌÀ ÄËß ÀÍÀËÈÇÀ ÍÀÄÅÆÍÎÑÒÈ ÑÈÑÒÅÌÛ Ñ ÍÅÑÊÎËÜÊÈÌÈ È ÄÂÓÌß ÓÐÎÂÍßÌÈ ÐÀÁÎÒÎÑÏÎÑÎÁÍÎÑÒÈ

261–266
(
6)

Êîçàê Ë.ß.,
Øåñòîïàë Î.Â.

THE SELECTION PROCEDURE OF SIGNIFICANT FACTORS IN  MODELING PROCESS

ÏÐÎÖÅÄÓÐÀ ÂÈÄIËÅÍÍß ÂÀÃÎÌÈÕ ÔÀÊÒÎÐI ÏÐÈ ÌÎÄÅËÞÂÀÍÍI ÒÅÕÍÎËÎÃI×ÍÈÕ ÏÐÎÖÅÑIÂ

ÏÐÎÖÅÄÓÐÀ ÂÛÄÅËÅÍÈß ÇÍÀ×ÈÌÛÕ ÔÀÊÒÎÐΠÏÐÈ ÌÎÄÅËÈÐÎÂÀÍÈÈ ÒÅÕÍÎËÎÃÈ×ÅÑÊÈÕ ÏÐÎÖÅÑÑÎÂ

267–270
(4)

Êîëäîâñüêèé Â.Â.

METHODS OF ASSESSING RELIABILITY AND SAFETY OF SOFTWARE SYSTEMS REMOTE BANKING SERVICE BASED ON SOURCE CODE METRICS

ÌÅÒÎÄÈÊÀ ÎÖ²ÍÊÈ ÍÀIJÉÍÎÑÒ² ² ÁÅÇÏÅÊÈ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÑÈÑÒÅÌ ÄÈÑÒÀÍÖ²ÉÍÎÃÎ ÁÀÍʲÂÑÜÊÎÃÎ ÎÁÑËÓÃÎÂÓÂÀÍÍß ÍÀ ÎÑÍβ ÌÅÒÐÈÊ ÂÈÕ²ÄÍÎÃÎ ÊÎÄÓ

ÌÅÒÎÄÈÊÀ ÎÖÅÍÊÈ ÍÀÄÅÆÍÎÑÒÈ È ÁÅÇÎÏÀÑÍÎÑÒÈ ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ ÄÈÑÒÀÍÖÈÎÍÍÎÃÎ ÁÀÍÊÎÂÑÊÎÃÎ ÎÁÑËÓÆÈÂÀÍÈß ÍÀ ÎÑÍÎÂÅ ÌÅÒÐÈÊ ÈÑÕÎÄÍÎÃÎ ÊÎÄÀ

271–275
(5)

Kostolny J.,
Zaitseva E.

DECISION DIAGRAM AND DIRECT PARTIAL LOGIC DERIVATIVES IN RELIABILITY ANALYSIS OF MULTI-STATE SYSTEM

IJÀÃÐÀÌÈ Ð²ØÅÍÜ ² ËÎò×Ͳ ÍÀÏÐÀÂËÅͲ ÏÎÕ²ÄͲ ÄËß ÀÍÀ˲ÇÓ ÍÀIJÉÍÎÑÒ² ÑÈÑÒÅÌ Ç ÄÅʲËÜÊÎÌÀ вÂÍßÌÈ ÍÀIJÉÍÎÑÒ²

ÄÈÀÃÐÀÌÌÛ ÐÅØÅÍÈÉ È ËÎÃÈ×ÅÑÊÈÅ ÍÀÏÐÀÂËÅÍÍÛÅ ÏÐÎÈÇÂÎÄÍÛÅ ÄËß ÀÍÀËÈÇÀ ÍÀÄÅÆÍÎÑÒÈ ÑÈÑÒÅÌ Ñ ÍÅÑÊÎËÜÊÈÌÈ ÓÐÎÂÍßÌÈ ÍÀÄÅÆÍÎÑÒÈ

276–281
(
6)

Êðèâóëÿ Ã.Ô.,
Øêèëü À.Ñ.,
Êó÷åðåíêî Ä.Å.

EXPERT ASSESSMENT for software product quality definition

ÅÊÑÏÅÐÒÍÅ ÎÖ²ÍÞÂÀÍÍß ßÊÎÑÒ² ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß

ÝÊÑÏÅÐÒÍÎÅ ÎÖÅÍÈÂÀÍÈÅ ÊÀ×ÅÑÒÂÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß

282–286
(5)

Êðîòîâ Ê.Â.,
Ñêàòêîâ À.Â.

RATIONALE FOR A MULTI-CRITERIA MULTI-LEVEL MODEL OF THE STRUCTURE OF SCHEDULES OF GROUP PROCESSING THE REQUIREMENTS OF THE PARTIES

ÎÁ¥ÐÓÍÒÓÂÀÍÍß ÁÀÃÀÒÎÊÐÈÒÅвÀËÜÍί ÁÀÃÀÒÎвÂÍÅÂί ÌÎÄÅ˲ ÁÓÄÎÂÈ ÐÎÇÊËÀIJ ÃÐÓÏÎÂί ÎÁÐÎÁÊÈ ÏÀÐÒ²É ÂÈÌÎÃ

ÎÁÎÑÍÎÂÀÍÈÅ ÌÍÎÃÎÊÐÈÒÅÐÈÀËÜÍÎÉ ÌÍÎÃÎÓÐÎÂÍÅÂÎÉ ÌÎÄÅËÈ ÏÎÑÒÐÎÅÍÈß ÐÀÑÏÈÑÀÍÈÉ ÃÐÓÏÏÎÂÎÉ ÎÁÐÀÁÎÒÊÈ ÏÀÐÒÈÉ ÒÐÅÁÎÂÀÍÈÉ

287–292
(6)

Êóçíåöîâà Þ.À.,
Òóðêèí È.Á.

AN EVALUATION OF HUMAN-MACHINE INTERFACES IN GRAPH VISUALIZATION SYSTEMS

ÎÖ²ÍÞÂÀÍÍß ËÞÄÈÍÎ-ÌÀØÈÍÍÈÕ ²ÍÒÅÐÔÅÉÑ²Â Ó ÑÈÑÒÅÌÀÕ Â²ÇÓÀ˲ÇÀÖ²¯ ÃÐÀÔ²Â

ÎÖÅÍÈÂÀÍÈÅ ×ÅËÎÂÅÊÎ-ÌÀØÈÍÍÛÕ ÈÍÒÅÐÔÅÉÑΠ ÑÈÑÒÅÌÀÕ ÂÈÇÓÀËÈÇÀÖÈÈ ÃÐÀÔÎÂ

293–299
(7)

Ìàåâñêèé Ä.À.

RELIABILITY EVALUATION ON MULTI-SYSTEM SOFTWARE

ÎÖ²ÍÊÀ ÏÎÊÀÇÍÈʲ ÍÀIJÉÍÎÑÒ² ÁÀÃÀÒÎÊÎÌÏÎÍÅÍÒÍÈÕ ÏÐÎÃÐÀÌÍÈÕ ÑÈÑÒÅÌ

ÎÖÅÍÊÀ ÏÎÊÀÇÀÒÅËÅÉ ÍÀÄÅÆÍÎÑÒÈ ÌÍÎÃÎÊÎÌÏÎÍÅÍÒÍÛÕ ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ

300–304
(5)

Ìàíæîñ Þ.Ñ.

THE FACTORS OF SOFTWARE RELIABILITY

ÔÀÊÒÎÐÈ ÍÀIJÉÍÎÑÒ² ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß

ÔÀÊÒÎÐÛ ÍÀÄÅÆÍÎÑÒÈ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß

305–312
(
8)

Polschykov K.A.,
Odaruschenko O.N.,
Lyubchenko K.N.

ANALYTIC MODEL OF THE REAL TIME TRAFFIC TRANSMISSION REQUESTS SERVICE IN A TELECOMMUNICATION NETWORK

ÀÍÀËÈÒÈ×ÅÑÊÀß ÌÎÄÅËÜ ÎÁÑËÓÆÈÂÀÍÈß ÇÀÏÐÎÑΠÍÀ ÏÅÐÅÄÀ×Ó ÏÎÒÎÊΠÐÅÀËÜÍÎÃÎ ÂÐÅÌÅÍÈ Â ÒÅËÅÊÎÌÌÓÍÈÊÀÖÈÎÍÍÎÉ ÑÅÒÈ

ÀÍÀ˲ÒÈ×ÍÀ ÌÎÄÅËÜ ÎÁÑËÓÃÎÂÓÂÀÍÍß ÇÀÏÈҲ ÍÀ ÏÅÐÅÄÀ×Ó ÏÎÒÎʲ ÐÅÀËÜÍÎÃÎ ×ÀÑÓ Ó ÒÅËÅÊÎÌÓͲÊÀÖ²ÉÍ²É ÌÅÐÅƲ

313–318
(
6)

Ïîìîðîâà Î.Â.,
Ãîâîðóùåíêî Ò.Î.

tHE ACTUAL PROBLEMS of software quality evaluation

ÑÓ×ÀÑͲ ÏÐÎÁËÅÌÈ ÎÖ²ÍÞÂÀÍÍß ßÊÎÑÒ² ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß

ÑÎÂÐÅÌÅÍÍÛÅ ÏÐÎÁËÅÌÛ îöåíèâàíèÿ êà÷åñòâà ïðîãðàììíîãî îáåñïå÷åíèÿ

319–327
(9)

Pomorova O.V.,
Ivanchyshyn D.O.

ASSESSMENT OF THE STATIC ANALYZERS USAGE FITNESS FOR SOFTWARE VULNERABILITIES IDENTIFICATION

Îö³íêà ïðèäàòíîñò³ çàñòîñóâàííÿ ñòàòè÷íèõ àíàë³çàòîð³â äëÿ âèÿâëåííÿ âðàçëèâîñòåé â ïðîãðàìíîìó çàáåçïå÷åíí³

ÎÖÅÍÊÀ ÏÐÈÃÎÄÍÎÑÒÈ ïðèìèíåíèÿ ÑÒÀÒÈ×ÅÑÊÈÕ ÀÍÀËÈÇÀÒÎÐîâ ÄËß ÂÛßÂËÅÍÈß óÿçâèìîñòåé â Ïðîãðàìíîì îáåñïå÷åíèè

328–332
(
5)

Ðîìàíêåâè÷ À.Ì.,
Ðîìàíêåâè÷ Â.À.,
Ìîðîçîâ Ê.Â.

On a GL-model of the system with sliding redundancy

Ïðî îäíó GL-ìîäåëü ñèñòåìè ç êîâçàþ÷èì ðåçåðâîì

ÎÁ ÎÄÍÎÉ GL-ÌÎÄÅËÈ ÑÈÑÒÅÌÛ ÑÎ ÑÊÎËÜÇßÙÈÌ ÐÅÇÅÐÂÎÌ

333–336
(4)

Ðûæêîâà Î.Â.

CRITICALITY FAILURES ASSESMENT OF SWITCHES IN CLUSTER OF DATA CENTER ACCESS LAYER

ÀÍÀ˲Ǡ ÊÐÈÒÈ×ÍÎÑÒ² ²ÄÌΠÊÎÌÓÒÀÒÎв вÂÍß ÄÎÑÒÓÏÓ ÊËÀÑÒÅÐÀ ÖÅÍÒÐÓ ÎÁÐÎÁÊÈ ÄÀÍÈÕ

ÎÖÅÍÊÀ ÊÐÈÒÈ×ÍÎÑÒÈ ÎÒÊÀÇΠÊÎÌÌÓÒÀÒÎÐΠÓÐÎÂÍß ÄÎÑÒÓÏÀ ÊËÀÑÒÅÐÀ ÖÅÍÒÐÀ ÎÁÐÀÁÎÒÊÈ ÄÀÍÍÛÕ

337–341
(5)

Savenko O.S.,
Lysenko S.M.,
Kryshchuk A.F.

MODEL OF THE COMPUTER SYSTEM DIAGNOSIS PROCESS FOR BOTNET PRESENCE IN CORPORATE AREA NETWORK

ÌÎÄÅËÜ ÏÐÎÖÅÑÑÀ ÄÈÀÃÍÎÑÒÈÐÎÂÀÍÈß ÊÎÌÏÜÞÒÅÐÍÛÕ ÑÈÑÒÅÌ ÍÀ ÍÀËÈ×ÈÅ ÁÎÒÍÅÒ Â ÊÎÐÏÎÐÀÒÈÂÍÈÕ ÑÅÒßÕ

ÌÎÄÅËÜ ÏÐÎÖÅÑÓ Ä²ÀÃÍÎÑÒÓÂÀÍÍß ÊÎÌÏ’ÞÒÅÐÍÈÕ ÑÈÑÒÅÌ ÍÀ ÍÀßÂͲÑÒÜ ÁÎÒÍÅÒ-ÌÅÐÅÆ Â ÊÎÐÏÎÐÀÒÈÂÍ²É ÌÅÐÅƲ

342–347
(
6)

Sklyar V.V.,
Kharybin A.V.,
Yurtsevich A.M.

APPLICATION OF FPGA-BASED ROD CONTROL SYSTEM FOR NUCLEAR POWER PLANTS SAFETY IMPROVEMENT

ÇÀÑÒÎÑÓÂÀÍÍß ÑÈÑÒÅÌÈ ÃÐÓÏÎÂÎÃÎ ÒÀ ²ÍÄȲÄÓÀËÜÍÎÃÎ ÓÏÐÀÂ˲ÍÍß ÎÐÃÀÍÀÌÈ ÐÅÃÓËÞÂÀÍÍß ÍÀ ÁÀDz ÏË²Ñ ÄËß Ï²ÄÂÈÙÅÍÍß ÁÅÇÏÅÊÈ ÀÅÑ

ÏÐÈÌÅÍÅÍÈÅ ÑÈÑÒÅÌÛ ÃÐÓÏÏÎÂÎÃÎ È ÈÍÄÈÂÈÄÓÀËÜÍÎÃÎ ÓÏÐÀÂËÅÍÈß ÎÐÃÀÍÀÌÈ ÐÅÃÓËÈÐÎÂÀÍÈß ÍÀ ÁÀÇÅ ÏËÈÑ ÄËß ÏÎÂÛØÅÍÈß ÁÅÇÏÅÊÈ ÀÅÑ

348–351
(
4)

Ñêîáåëåâ Â.Ã.

SECURITY OF IT-SYSTEMS (A SURVEY)

ÁÅÇÏÅÊÀ IT-ÑÈÑÒÅÌ (ÎÃËßÄ)

ÁÅÇÎÏÀÑÍÎÑÒÜ IT-ÑÈÑÒÅÌ (ÎÁÇÎÐ)

352–361
(
10)

Starov O.,
Vilkomir S.

CLOUD SERVICES AND TOOLS FOR MOBILE TESTING

ÕÌÀÐͲ ÑÅвÑÈ ÒÀ ²ÍÑÒÐÓÌÅÍÒÈ ÄËß ÌÎÁ²ËÜÍÎÃÎ ÒÅÑÒÓÂÀÍÍß

ÎÁËÀ×ÍÛÅ ÑÅÐÂÈÑÛ È ÈÍÑÒÐÓÌÅÍÒÛ ÄËß ÌÎÁÈËÜÍÎÃÎ ÒÅÑÒÈÐÎÂÀÍÈß

362–371
(10)

Ñòðþê Î.Þ.,
Ëàâðóò Î.Î.

METHOD OF QUALITY OF experience fairness providing  FOR Ad Hoc Wireless Networks subscribers

ÌÅÒÎÄ ÇÀÁÅÇÏÅ×ÅÍÍß ÑÏÐÀÂÅÄËÈÂÎÃΠвÂÍß ÑÏÐÈÉÍßÒÒß ßÊÎÑÒ² ÎÁÑËÓÃÎÂÓÂÀÍÍß ÀÁÎÍÅÍҲ  ÌÎÁ²ËÜÍί ÐÀIJÎÌÅÐÅƲ

Ìåòîä îáåñïå÷åíèÿ ñïðàâåäëèâîãî óðîâíÿ âîñïðèÿòèÿ êà÷åñòâà îáñëóæèâàíèÿ àáîíåíòîâ ìîáèëüíîé ðàäèîñåòè

372–378
(7)

Òâåðäîõëåáîâ Â.À.

Basic theorems for construction of geometric image of automatons mappiings

Îñíîâí³ òåîðåìè äëÿ ïîáóäîâè ãåîìåòðè÷íèõ îáðàç³â àâòîìàòíèõ â³äîáðàæåíü

ÎÑÍÎÂÍÛÅ ÒÅÎÐÅÌÛ ÄËß ÏÎÑÒÐÎÅÍÈß ÃÅÎÌÅÒÐÈ×ÅÑÊÈÕ ÎÁÐÀÇΠÀÂÒÎÌÀÒÍÛÕ ÎÒÎÁÐÀÆÅÍÈÉ

379–384
(6)

Ôåäîñååâà À.À.

Representation of the technological process of manufacture of drugs in tablet form with block-schemeS and Timed Petri nets

ÏÐÅÄÑÒÀÂËÅÍÍß òåõíîëîã³÷íîãî ïðîöåñó âèðîáíèöòâà ë³êàðñ³êèõ ïðåïàðàò³â ó ôîðì³ òàáëåòîê çà äîïîìîãîþ áëîê-ñõåì òà ÷àñîâèõ ìåðåæ ïåòð³

ÏÐÅÄÑÒÀÂËÅÍÈÅ ÒÅÕÍÎËÎÃÈ×ÅÑÊÎÃÎ ÏÐÎÖÅÑÑÀ ÏÐÎÈÇÂÎÄÑÒÂÀ ÒÀÁËÅÒÈÐÎÂÀÍÍÛÕ ËÅÊÀÐÑÒÂÅÍÍÛÕ ÏÐÅÏÀÐÀÒÎÂ Ñ ÏÎÌÎÙÜÞ ÁËÎÊ-ÑÕÅÌ È ÂÐÅÌÅÍÍÛÕ ÑÅÒÅÉ ÏÅÒÐÈ

385–389
(5)

×óõðàé À.Ã.

Models and methods of knowledge and skills acquisition adaptive computer support in solving of algorithmic educational problems

ÌÎÄÅ˲ ÒÀ ÌÅÒÎÄÈ àäàïòèâíÈõ ÊÎÌÏÜ’ÞÒÅÐÍèÕ ÑÈÑÒÅÌ Ï²ÄÒÐÈÌÊÈ ÍÀÄÁÀÍÍß ÇÍÀÍÜ ÒÀ Â̲ÍÜ ÏÐÈ ÂÈвØÅÍͲ ÀËÃÎÐÈÒ̲×ÍÈÕ ÍÀÂ×ÀËÜÍÈÕ ÇÀÄÀ×

ÌÎÄÅËÈ È ÌÅÒÎÄÛ ÀÄÀÏÒÈÂÍÛÕ ÊÎÌÏÜÞÒÅÐÍÛÕ ÑÈÑÒÅÌ ÏÎÄÄÅÐÆÊÈ ÏÐÈÎÁÐÅÒÅÍÈß ÇÍÀÍÈÉ È ÓÌÅÍÈÉ ÏÐÈ ÐÅØÅÍÈÈ ÀËÃÎÐÈÒÌÈ×ÅÑÊÈÕ Ó×ÅÁÍÛÕ ÇÀÄÀ×

390–402
(13)

Ùåðáîâñüêèõ Ñ.Â.

DETERMINATION OF NON-UNIFORM LOAD-SHARING IMPACT ON MINIMAL CUT SETFOR REPAIRABLE 2-OUT-OF-3 SYSTEM

ÂÈÇÍÀ×ÅÍÍß ÂÏËÈÂÓ ÍÅвÂÍÎ̲ÐÍÎÑÒ² ÏÅÐÅÐÎÇÏÎIJËÓ ÍÀÂÀÍÒÀÆÅÍÍß ÍÀ ̲ͲÌÀËÜÍÓ ÌÍÎÆÈÍÓ ÏÅÐÅÒÈͲ ²ÄÍÎÂËÞÂÀÍί ÑÈÑÒÅÌÈ ²Ç ÐÅÇÅÐÂÓÂÀÍÍßÌ ÇÀ ÑÕÅÌÎÞ 2-²Ç-3

ÎÏÐÅÄÅËÅÍÈÅ ÂËÈßÍÈß ÍÅÐÀÂÍÎÌÅÐÍÎÑÒÈ ÏÅÐÅÐÀÑÏÐÅÄÅËÅÍÈß ÍÀÃÐÓÇÊÈ ÍÀ ÌÈÍÈÌÀËÜÍÎÅ ÑÅÊÓÙÅÅ ÌÍÎÆÅÑÒÂÎ ÂÎÑÑÒÀÍÀÂËÈÂÀÅÌÎÉ ÑÈÑÒÅÌÛC ÐÅÇÅÐÂÈÐÎÂÀÍÈÅÌ ÏÎ ÑÕÅÌÅ 2-ÈÇ-3

403–407
(
5)

Yamatov A.R.,
Plesovskih S.À.,
Tyurin S.F.

THE TECHNIQUE OF BUILDING STRUCTURAL SCHEMES OF SYSTEM RELIABILITY USING WITH MODIFIED GRADIENT FOR THE PROCEDURE OF THE STEEPEST DESCENT

ÌÅÒÎÄÈÊÀ ÑÈÍÒÅÇÀ ÑÒÐÓÊÒÓÐÍÎÉ ÑÕÅÌÛ ÍÀĨÆÍÎÑÒÈ ÑÈÑÒÅÌÛ Ñ ÏÐÈÌÅÍÅÍÈÅÌ ÌÎÄÈÔÈÖÈÐÎÂÀÍÍÎÃÎ ÃÐÀÄÈÅÍÒÀ  ÏÐÎÖÅÄÓÐÅ ÍÀÈÑÊÎÐÅÉØÅÃÎ ÑÏÓÑÊÀ

ÌÅÒÎÄÈÊÀ ÑÈÍÒÅÇÓ ÑÒÐÓÊÒÓÐÍί ÑÕÅÌÈ ÍÀIJÉÍÎÑÒ² ÑÈÑÒÅÌÈ ²Ç ÇÀÑÒÎÑÓÂÀÍÍßÌ ÌÎÄÈÔ²ÊÎÂÀÍÎÃÎ ÃÐÀIJªÍÒÓ Ó ÏÐÎÖÅÄÓв ÍÀÉØÂÈÄØÎÃÎ ÑÏÓÑÊÓ

408–413
(
6)

ßðåì÷óê Ñ.À.

Problems Àn aprioristic estimation of indicators reliability  of dependability INFORMATION SYSTEMS  CRITICAL APPOINTMENT

ÏÐÎÁËÅÌÈ ÀÏвÎÐÍί ÎÖ²ÍÊÈ ÏÎÊÀÇÍÈʲ ÍÀIJÉÍÎÑÒ² ÃÀÐÀÍÒÎÇÄÀÒÍÈÕ ²ÍÔÎÐÌÀÖ²ÉÍÈÕ ÑÈÑÒÅÌ ÊÐÈÒÈ×ÍÎÃÎ ÏÐÈÇÍÀ×ÅÍÍß

ÏÐÎÁËÅÌÛ ÀÏÐÈÎÐÍÎÉ ÎÖÅÍÊÈ ÏÎÊÀÇÀÒÅËÅÉ ÍÀÄÅÆÍÎÑÒÈ ÃÀÐÀÍÒÎÑÏÎÑÎÁÍÛÕ  ÈÍÔÎÐÌÀÖÈÎÍÍÛÕ ÑÈÑÒÅÌ ÊÐÈÒÈ×ÅÑÊÎÃÎ ÍÀÇÍÀ×ÅÍÈß

414–420
(7)

Ïîâ³äîìëåííÿ

Êîëÿäà C.Â.,
Áàéãåð Â.Ì.

controlled quality solution of security, guard, and monitoring tasks based on new generation video surveillance

ÊÎÍÒÐÎËÜÎÂÀÍÀ ßʲÑÒÜ ÂÈвØÅÍÍß ÇÀÂÄÀÍÜ ÁÅÇÏÅÊÈ, ÎÕÎÐÎÍÈ ÒÀ ÌÎͲÒÎÐÈÍÃÓ ÍÀ ÁÀDz ÇÀÑÒÎÑÓÂÀÍÍß Â²ÄÅÎÑÏÎÑÒÅÐÅÆÅÍÍß ÍÎÂÎÃÎ ÏÎÊÎ˲ÍÍß

êîíòðîëèðóåìîå êà÷åñòâî ðåøåíèÿ çàäà÷ áåçîïàñíîñòè, îõðàíû è  ìîíèòîðèíãà íà îñíîâå ïðèìåíåíèÿ âèäåîíàáëþäåíèÿ íîâîãî ïîêîëåíèÿ

421–423
(3)

 

 

 

Øàíîâí³ ÷èòà÷³!

Íàóêîâî-òåõí³÷íèé æóðíàë «ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ'ÞÒÅÐͲ ÑÈÑÒÅÌÈ»:

- âõîäèòü äî çàòâåðäæåíîãî ÄÀÊ Ïåðåë³êó íàóêîâèõ ôàõîâèõ âèäàíü Óêðà¿íè, â ÿêèõ ìîæóòü äðóêóâàòèñÿ îñíîâí³ ðåçóëüòàòè äèñåðòàö³éíèõ ðîá³ò íà çäîáóòòÿ íàóêîâèõ ñòóïåí³â äîêòîðà ³ êàíäèäàòà íàóê (äèâ. ïîñòàíîâó ïðåçè䳿 ÂÀÊ Óêðà¿íè ¹ 1-05/3 â³ä 8.07.2009 ð.);

- çáåð³ãàºòüñÿ ó çàãàëüíîäåðæàâí³é ðåôåðàòèâí³é áàç³ äàíèõ «Óêðà¿í³êà íàóêîâà» òà ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ óêðà¿íñüêîãî ðåôåðàòèâíîãî æóðíàëó «Äæåðåëî» (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.nbuv.gov.ua) (Óêðà¿íà);

- çáåð³ãàºòüñÿ ó ðåôåðàòèâí³é áàç³ äàíèõ Âñåðîñ³éñüêîãî ³íñòèòóòó íàóêîâî¿ ³ òåõí³÷íî¿ ³íôîðìàö³¿ (²ͲҲ) Ðîñ³éñüêî¿ àêàäå쳿 íàóê ³ ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÐÆ (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.viniti.ru) (Ðîñ³éñüêà Ôåäåðàö³ÿ);

- âêëþ÷åíèé â ì³æíàðîäí³ íàóêîìåòðè÷í³ áàçè äàíèõ: íàóêîâî¿ åëåêòðîííî¿ á³áë³îòåêè eLIBRARY.RU (Ðîñ³éñüêà Ôåäåðàö³ÿ), Index Copernicus (Ïîëüùà), Google Scholar.