Íàö³îíàëüíèé
àåðîêîñì³÷íèé óí³âåðñèòåò ³ì. Ì.ª. Æóêîâñüêîãî “Õàðê³âñüêèé àâ³àö³éíèé
³íñòèòóò”
ISSN 1814-4225. ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ’ÞÒÅÐͲ ÑÈÑÒÅÌÈ. – 2013. – ¹ 5 (64). – 426
ñ.
ISSN 1814-4225. ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÅ È
ÊÎÌÏÜÞÒÅÐÍÛÅ ÑÈÑÒÅÌÛ. – 2013. – ¹ 5 (64).
– 426 ñ.
ISSN 1814-4225. RADIOELECTRONIC AND COMPUTER SYSTEMS. – 2013. – ¹ 5 (64). – 426 ñ.
ÑÒÀÒÒ² (articleS)
Àâòîðè |
Íàçâà ñòàòò³ (article title) |
Ñòîð³íêè (pages) |
||
English |
Óêðà¿íñüêà ìîâà |
Ðóññêèé ÿçûê |
||
Áåçïåêà
³ ðåçèëüºíòí³ñòü ³íôðàñòðóêòóð |
||||
Áàêàåâ Î.Â. |
INFORMATION MODEL OF MONITORING LATENT
FORMATION OF CRACKS IN FRONT OF BREAKAGE HEADING OF COAL MINE |
²ÍÔÎÐÌÀÖ²ÉÍÀ ÌÎÄÅËÜ ÌÎͲÒÎÐÈÍÃÓ ÏÐÈÕÎÂÀÍÎÃÎ ÒвÙÈÍÎÓÒÂÎÐÅÍÍß ÏÎÏÅÐÅÄÓ
Î×ÈÑÍÎÃÎ ÂÈÁÎÞ ÂÓòËÜÍί ØÀÕÒÈ |
13–17 |
|
Áðþõîâåöêèé À.À., |
Detection of vulnerabilities in critical
applications based on Decision Trees |
Âèÿâëåííÿ óðàçëèâîñòåé  ÊÐÈÒÈ×ÍÈÕ äîäàòê³â íà îñíîâ³ ÂÈвØÀËÜÍÈÕ
ÄÅÐÅÂ |
ÎÁÍÀÐÓÆÅÍÈÅ ÓßÇÂÈÌÎÑÒÅÉ Â ÊÐÈÒÈ×ÅÑÊÈÕ ÏÐÈËÎÆÅÍÈßÕ ÍÀ
ÎÑÍÎÂÅ ÐÅØÀÞÙÈÕ ÄÅÐÅÂÜÅÂ |
18–22 |
Ãîëóá Ñ.Â., |
STRUCTURING OF INPUT DATA IN INFORMATION TECHNOLOGY OF FIRE
SAFETY MONITORING |
ÑÒÐÓÊÒÓÐÈÐÎÂÀÍÈÅ ÌÀÑÑÈÂÎÂ ÂÕÎÄÍÛÕ ÄÀÍÍÛÕ Â ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÒÅÕÍÎËÎÃÈÈ
ÎÏÅÐÀÒÈÂÍÎÃÎ ÌÎÍÈÒÎÐÈÍÃÀ ÏÎÆÀÐÎÒÓØÅÍÈß |
23–30 |
|
Ãîðäååâ À.À. |
CREATION OF FACET-HIERARCHICAL CLASSIFICATION IN RISK-MANAGEMENT TERMS |
ÔÎÐÌÓÂÀÍÍß ÔÀÑÅÒÍÎ-²ªÐÀÐÕ²×Íί ÊËÀÑÈÔ²ÊÀÖ²¯ ÒÅÐ̲Ͳ  ÓÏÐÀÂ˲ÍͲ ÐÈÇÈÊÀÌÈ |
ÔÎÐÌÈÐÎÂÀÍÈÅ ÔÀÑÅÒÍÎ-ÈÅÐÀÐÕÈ×ÅÑÊÎÉ ÊËÀÑÑÈÔÈÊÀÖÈÈ ÒÅÐÌÈÍÎÂ
 ÓÏÐÀÂËÅÍÈÈ ÐÈÑÊÀÌÈ |
31–38 |
Davies
J.N., |
A COMPARISON OF THE PERFORMANCE OF IPV4 & IPV6
INFRASTRUCTURE NETWORKS |
ÏÐÈÍÖÈÏÈ
ÎÏÒÈ̲ÇÀÖ²¯ ÑÏÈÑʲ ÊÎÍÒÐÎËÞ ÄÎÑÒÓÏÓ Â ÌÅÆÀÕ ÄÎÌÅÍÓ |
ÏÐÈÍÖÈÏÛ
ÎÏÒÈÌÈÇÀÖÈÈ ÑÏÈÑÊÎÂ ÊÎÍÒÐÎËß ÄÎÑÒÓÏÀ Â ÏÐÅÄÅËÀÕ ÄÎÌÅÍÀ |
39–44 |
Èâàí÷åíêî Î.Â., |
Semi-markov Model of Critical Infrastructures Accident |
ÍÀϲÂÌÀÐʲÂÑÜÊÀ ÌÎÄÅËÜ ÀÂÀв¯ ÊÐÈÒÈ×Íί
²ÍÔÐÀÑÒÐÓÊÒÓÐÈ |
ÏÎËÓÌÀÐÊÎÂÑÊÀß ÌÎÄÅËÜ ÏÐÎÒÅÊÀÍÈß ÀÂÀÐÈÈ ÊÐÈÒÈ×ÅÑÊÎÉ
ÈÍÔÐÀÑÒÐÓÊÒÓÐÛ |
45–51 |
Izvalov A.V., |
VALIDATION OF INPUT DATA FLOW GENERATING ALGORITHM FOR
INTELLIGENT AIR TRAFFIC CONTROL SIMULATOR |
ÂÀ˲ÄÀÖ²ß ÀËÃÎÐÈÒÌÓ ÃÅÍÅÐÀÖ²¯ ÂÕ²ÄÍÈÕ
ÄÀÍÈÕ ÄËß ²ÍÒÅËÅÊÒÓÀËÜÍÎÃÎ ÒÐÅÍÀÆÅÐÓ À²ÀÄÈÑÏÅÒ×ÅÐÀ |
ÂÀËÈÄÀÖÈß
àëãîðèòìà ãåíåðàöèè ÂÕÎÄÍÛÕ ÄÀÍÍÛÕ ÄËß ÈÍÒÅËËÅÊÒÓÀËÜÍÎÃÎ ÒÐÅÍÀƨÐÀ
ÀÂÈÀÄÈÑÏÅÒ×ÅÐÀ |
52–56 |
Ìàùåíêî Å.Í., |
Research of the critical IT infrastructure service process, based on
the Semi-Markov ìodel |
Äîñë³äæåííÿ
ÏÐÎÖÅѲ ÑÅвÑÍÎÃÎ ÎÁÑËÓÃÎÂÓÂÀÍÍß ÊÐÈÒÈ×ÍÈÕ ²Ò-³íôðàñòðóêòóð íà îñíîâ³
íàï³âìàðê³âñüêî¿ ìîäåë³ |
57–63 |
|
Ìåëåíåö À.Â. |
PROTECTION of CLOUD-architecture from DDOS-attacks |
çàÕÈÑò
cloud-àðõ³òåêòóð Â²Ä DDoS-àòàê |
64–69 |
|
Ïîìîðîâà Î.Â., |
The simple behavioral
model and algorithms of autonomous mobile robot for territory cleaning |
ÏÐÈ̲ÒÈÂÍÀ ÏÎÂÅIJÍÊÎÂÀ ÌÎÄÅËÜ ÒÀ ÀËÃÎÐÈÒÌÈ Î×ÈÙÅÍÍß
ÒÅÐÈÒÎв¯ ÀÂÒÎÍÎÌÍÈÌ ÌÎÁ²ËÜÍÈÌ ÐÎÁÎÒÎÌ |
Ïðèìèòèâíàÿ
ïîâåäåí÷èñêàÿ ìîäåëü è àëãîðèòìû î÷èñòêè òåððèòîðèè àâòîíîìíûì ìîáèëüíûì
ðîáîòîì |
70–76 |
Procházková
D. |
OPEN PROBLEMS IN PROTECTION OF LIFE-GIVING INFRASTRUCTURES
AND SUPPLY CHAINS |
²ÄÊÐÈÒ² ÏÐÎÁËÅÌÈ ÇÀÕÈÑÒÓ ²ÍÔÐÀÑÒÐÓÊÒÓÐ
ϲÄÒÐÈÌÊÈ ÆÈÒÒªÇÀÁÅÇÏÅ×ÅÍÍß ² ËÀÍÖÞÆʲ ÏÎÑÒÀ×ÀÍÜ |
ÎÒÊÐÛÒÛÅ ÏÐÎÁËÅÌÛ
ÇÀÙÈÒÛ ÈÍÔÐÀÑÒÐÓÊÒÓÐ ÏÎÄÄÅÐÆÊÈ ÆÈÇÍÅÎÁÅÑÏÅ×ÅÍÈß È ÖÅÏÎ×ÅÊ ÏÎÑÒÀÂÎÊ |
77–87 |
Ðÿçàíöåâ A.È., |
A METHOD FOR
REGIONAL ENVIRONMENTAL RISK ASSESSMENT |
ÌÅÒÎÄ ÎÖ²ÍÊÈ ÒÅÕÍÎÃÅÍÍÎÃÎ ÐÈÇÈÊÓ Â
²ÍÔÎÐÌÀÖ²ÉÍ²É ÑÈÑÒÅ̲ ÅÊÎËÎò×Íί ÁÅÇÏÅÊÈ ÐÅòÎÍÓ |
ÌÅÒÎÄ ÎÖÅÍÊÈ ÒÅÕÍÎÃÅÍÍÎÃÎ ÐÈÑÊÀ Â ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÑÈÑÒÅÌÅ
ÝÊÎËÎÃÈ×ÅÑÊÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ ÐÅÃÈÎÍÀ |
88–95 |
Ñêàðãà-Áàíäóðîâà
È.Ñ. |
A
MULTIDIMENSIONAL APPROACH TOWARDS ENVIRONMENTAL MONITORING AND HAZARDOUS
MATERIALS INVENTORY |
ÌÅÒÎÄÈ
áàãàòîâèì³ðíîãî ìîäåëþâàííÿ  ÇÀÄÀ×ÀÕ ÅÊÎËÎò×ÍÎÃÎ ÌÎͲÒÎÐÈÍÃÓ òà
²ÍÂÅÍÒÀÐÈÇÀÖ²¯ ²ÄÕÎIJ |
ÌÅÒÎÄÛ ÌÍÎÃÎÌÅÐÍÎÃÎ ÌÎÄÅËÈÐÎÂÀÍÈß Â ÇÀÄÀ×ÀÕ ÝÊÎËÎÃÈ×ÅÑÊÎÃÎ
ÌÎÍÈÒÎÐÈÍÃÀ È ÈÍÂÅÍÒÀÐÈÇÀÖÈÈ ÎÒÕÎÄÎÂ |
96–99 |
Òðóá÷àíèíîâ Ñ.À. |
COMPARISON OF REQUIREMENTS FOR NPP POST-ACCIDENT MONITORING SYSTEMS |
DzÑÒÀÂËÅÍÍß ÂÈÌÎÃ
ÄÎ ÑÈÑÒÅÌ Ï²ÑËßÀÂÀвÉÍÎÃÎ ÌÎͲÒÎÐÈÍÃÓ ÀÒÎÌÍÈÕ ÅËÅÊÒÐÎÑÒÀÍÖ²É |
ÑÎÏÎÑÒÀÂËÅÍÈÅ ÒÐÅÁÎÂÀÍÈÉ Ê ÑÈÑÒÅÌÀÌ ÏÎÑËÅÀÂÀÐÈÉÍÎÃÎ
ÌÎÍÈÒÎÐÈÍÃÀ ÀÒÎÌÍÛÕ ÝËÅÊÒÐÎÑÒÀÍÖÈÉ |
100–105 |
Õàõàíîâ Â.È., |
Green Wave Traffic
on Cloud |
Õìàðíà
³íôðàñòðóêòóðà ÌÎͳÒÎÐÈÍÃÀ òà ÓÏÐÀÂ˳ííß
ÄÎÐÎÆÍèÌ ðóõîÌ |
ÎÁËÀ×ÍÀß ÈÍÔÐÀÑÒÐÓÊÒÓÐÀ ÌÎÍÈÒÎÐÈÍÃÀ È ÓÏÐÀÂËÅÍÈß ÄÎÐÎÆÍÛÌ
ÄÂÈÆÅÍÈÅÌ |
106–111 |
Øåâ÷åíêî Â.È. |
DECISION-MAKING
TECHNOLOGY IN QUALITY MANAGEMENT OF IT SERVICES IN BUSINESS-CRITICAL SYSTEMS |
ÒÅÕÍÎËÎÃ²ß ÏÐÈÉÍßÒÒß Ð²ØÅÍÜ
Ç ÓÏÐÀÂ˲ÍÍß ßʲÑÒÞ ²Ò-ÏÎÑËÓà  Á²ÇÍÅÑ-ÊÐÈÒÈ×ÍÈÕ ÑÈÑÒÅÌÀÕ |
ÒÅÕÍÎËÎÃÈß ÏÐÈÍßÒÈß ÐÅØÅÍÈÉ ÏÎ ÓÏÐÀÂËÅÍÈÞ ÊÀ×ÅÑÒÂÎÌ
ÈÒ-ÓÑËÓà  ÁÈÇÍÅÑ-ÊÐÈÒÈ×ÅÑÊÈÕ ÑÈÑÒÅÌÀÕ |
112–118 |
Ãàðàíòîçäàòí³ñòü òà ³íôîðìàö³éíà áåçïåêà êîìï’þòåðíèõ
ñèñòåì ³ ìåðåæ |
||||
Áåçä³òêî Î.Ì. |
CONSTRUCTION OF
DEVICES OF MMX OF EXPANSION BASE MICROPROCESSOR |
ÏÎÑÒÐÎÅÍÈÅ ÓÑÒÐÎÉÑÒÂ ÌÌÕ ÐÀÑØÈÐÅÍÈß ÁÀÇÎÂÎÃÎ
ÌÈÊÐÎÏÐÎÖÅÑÑÎÐÀ |
119–129 |
|
Áóõàíîâ Ä.Ã., |
METHOD OF STRUCTURING IN TASKS OF SELF-DIAGNOSIS OF DISTRIBUTED
COMPUTER SYSTEMS |
ÌÅÒÎÄ ÑÒÐÓÊÒÓÐÈÇÀÖȲ² Ó ÇÀÄÀ×ÀÕ ÑÀÌÎIJÀÃÍÎÑÒÓÂÀÍÍß
ÐÎÇÏÎIJËÅÍÈÕ ÎÁ×ÈÑËÞÂÀËÜÍÈÕ ÑÈÑÒÅÌ |
ÌÅÒÎÄ ÑÒÐÓÊÒÓÐÈÇÀÖÈÈ Â ÇÀÄÀ×ÀÕ ÑÀÌÎÄÈÀÃÍÎÑÒÈÐÎÂÀÍÈß
ÐÀÑÏÐÅÄÅËÅÍÍÛÕ ÂÛ×ÈÑËÈÒÅËÜÍÛÕ ÑÈÑÒÅÌ |
130–134 |
Äîëãîâ À.Þ. |
INCREASE OF PARAMETR ESTIMATION ACCURACY OF CHECK SMALL SIZE SAMPLE
WITH EXPONENTIAL DISTRIBUTION |
ϲÄÂÈÙÅÍÍß ÒÎ×ÍÎÑÒ² ÎÖ²ÍÎÊ ÏÀÐÀÌÅÒв ÊÎÍÒÐÎËÜÍί ÂÈÁ²ÐÊÈ ÌÀËÎÃÎ ÎÁÑßÃÓ
ÏÐÈ åêñïîíåíö³àëüíîìó çàêîíi ÐÎÇÏÎIJËÓ |
135–138 |
|
Äîëãîâ Þ.À. |
DEFINITION OF EQUIVALENT SAMPLE SIZE IN POINT DISTRIBUTION METHOD |
Âèçíà÷åííÿ îáñÿãó åêâ³âàëåíòíî¿ âèá³ðêè ó ìåòîä³ òî÷êîâèõ ðîçïîä³ë³â |
ÎÏÐÅÄÅËÅÍÈÅ ÎÁÚÅÌÀ ÝÊÂÈÂÀËÅÍÒÍÎÉ ÂÛÁÎÐÊÈ Â ÌÅÒÎÄÅ ÒÎ×Å×ÍÛÕ
ÐÀÑÏÐÅÄÅËÅÍÈÉ |
139–141 |
Äðîçä À.Â., |
CHECKABILITY OF
SAFETY-CRITICAL SYSTEMS COMPONENTS IN RELATION TO FAULTS OF SHORTS TYPE |
ÎÖ²ÍÊÀ ÊÎÍÒÐÎËÅÏÐÈÄÀÒÍÎÑÒ² ÖÈÔÐÎÂÈÕ
ÊÎÌÏÎÍÅÍҲ ÂÁÓÄÎÂÀÍÈÕ ÑÈÑÒÅÌ ÊÐÈÒÈ×ÅÑÊÎÃÎ ÇÀÑÒÎÑÓÂÀÍÍß ÙÎÄÎ ÍÅÑÏÐÀÂÍÎÑÒÅÉ
ÒÈÏÓ "ÇÀÌÈÊÀÍÍß" |
142–147 |
|
Åñèíà Ì.Â., |
PSEUDO-RANDOM CODING BY linear congruent GENERATION METHOD |
ÏñåâäîÂÈÏÀÄÊÎÂÅ
êîäÓÂÀÍÍß çà ìåòîäîì ë²Í²ÉÍί êîíãðóÅíòíî¯ ãåíåðàö²¯ |
ÏÑÅÂÄÎÑËÓ×ÀÉÍÎÅ
ÊÎÄÈÐÎÂÀÍÈÅ ÏÎ ÌÅÒÎÄÓ ËÈÍÅÉÍÎÉ ÊÎÍÃÐÓÝÍÒÍÎÉ ÃÅÍÅÐÀÖÈÈ |
148–150 |
Çàùåëêèí Ê.Â., |
IMPROVEMENT OF
THE METHOD OF STEGANOGRAPHIC INFORMATION HIDING OF KUTTER-JORDAN-BOSSEN |
ÓÄÎÑÊÎÍÀËÅÍÍß
ÌÅÒÎÄÓ ÑÒÅÃÀÍÎÃÐÀÔ²×ÍÎÃÎ ÏÐÈÕÎÂÀÍÍß ÄÀÍÈÕ ÊÓÒÒÅÐÀ-ÄÆÎÐÄÀÍÀ-ÁÎÑÑÅÍÀ |
ÓÑÎÂÅÐØÅÍÑÒÂÎÂÀÍÈÅ ÌÅÒÎÄÀ ÑÒÅÃÀÍÎÃÐÀÔÈ×ÅÑÊÎÃÎ ÑÊÐÛÒÈß
ÄÀÍÍÛÕ ÊÓÒÒÅÐÀ-ÄÆÎÐÄÀÍÀ-ÁÎÑÑÅÍÀ |
151–155 |
Èâàíîâ Ä.Å. |
Methodology for the synthesis of evolutionary algorithms of
CONSTRUCTION of identifYing sequences of digital devices |
ÌÅÒÎÄÎËÎòß
ÑÈÍÒÅÇÓ åâîëþö³éíèõ àëãîðèòì³â ÏÎÁÓÄÎÂÈ ³äåíòèô³êóþ÷èõ ïîñë³äîâíîñòåé
ÖÈÔÐÎÂÈÕ ÏÐÈÑÒÐί |
156–161 |
|
Kamenskih A.N., |
SYNTESIS AND ANALYSIS OF SELF-TIMED FUNCTIONALLY COMPLETE
TOLERANT ELEMENT |
Ñèíòåç ³
àíàë³ç ñóâîðî ñàìîñ³íõðîííîãî ôóíêö³îíàëüíî-ïîâíîãî òîëåðàíòíîãî åëåìåíò |
Ñèíòåç è
àíàëèç ñòðîãî ñàìîñèíõðîííîãî ôóíêöèîíàëüíî-ïîëíîãî òîëåðàíòíîãî ýëåìåíòà |
162–167 |
Ñêàòêîâ À.Â., |
INFORMATIONAL PROPORTIONAL-INTEGRAL-DERIVATIVE
CONTROLLER AS A DEVICE FOR ATTACK CONSEQUENCES COMPENSATION |
²ÍÔÎÐÌÀÖ²ÉÍÈÉ
ïðîïîðö³éíî-³íòåãðàëüíî-äèôåðåíö³àëüíèé ðåãóëÿòîð ßÊ ÇÀѲÁ ÊÎÌÏÅÍÑÀÖ²¯
ÍÀÑ˲Äʲ ÀÒÀÊ |
168–171 |
|
Òþðèí Ñ.Ô., |
Improving Fault Tolerance OF FPGA by Reconfiguration of Operable
Elements |
ϲÄÂÈÙÅÍÍß
²ÄÌÎÂÎÑÒ²ÉÊÎÑÒ² FPGA ØËßÕÎÌ ÐÅÊÎÍÔ²ÃÓÐÀÖ²¯ ÏÐÀÖÅÇÄÀÒÍÈÕ ÅËÅÌÅÍҲ |
ÏÎÂÛØÅÍÈÅ ÎÒÊÀÇÎÓÑÒÎÉ×ÈÂÎÑÒÈ FPGA ÏÓÒÅÌ ÐÅÊÎÍÔÈÃÓÐÀÖÈÈ
ÐÀÁÎÒÎÑÏÎÑÎÁÍÛÕ ÝËÅÌÅÍÒÎÂ |
172–176 |
Tyurin S.F., |
ÀÄÀÏÒÀÖ²ß FPGA
äî â³äìîâè ËÎòÊÈ |
ÀÄÀÏÒÀÖÈß FPGA Ê ÎÒÊÀÇÀÌ ËÎÃÈÊÈ |
177–182 |
|
×åìåðèñ À.À., |
EXPLORATION OF POWER CONSUMPTION REDUCTION OF A COMPUTING DEVICE BY
MEANS OF DVFS |
ÄÎÑ˲ÄÆÅÍÍß
ÌÎÆËÈÂÎÑÒ² ÇÌÅÍØÅÍÍß ÅÍÅÐÃÎÑÏÎÆÈÂÀÍÍß ÎÁ×ÈÑËÞÂÀËÜÍÎÃÎ ÏÐÈÑÒÐÎÞ ØËßÕÎÌ
ÂÈÊÎÐÈÑÒÀÍÍß ÐÅÆÈ̲ ÏÐÎÄÓÊÒÈÂÍÎÑÒ² ÏÐÎÖÅÑÎÐÀ |
183–185 |
|
ßê³ñòü,
íàä³éí³ñòü òà ðåñóðñîçáåðåæåííÿ äëÿ àïàðàòíèõ ³ ïðîãðàìíèõ çàñîá³â |
||||
Àáäóë-Õàäè À.Ì., |
DEVELOPMENT OF BASIC Markov model FOR RESEARCH OF COMMERCIAL WEB
SERVICES AVAILABILITY |
ÐÎÇÐÎÁÊÀ
ÁÀÇÎÂÈÕ Ìàðê³âñüêèõ ÌÎÄÅËÅÉ ÄÎÑ˲ÄÆÅÍÍß ÃÎÒÎÂÍÎÑÒ² ÊÎÌÅÐÖ²ÉÍÈÕ ÂÅÁ-ÑÅвѲ |
ÐÀÇÐÀÁÎÒÊÀ
ÁÀÇÎÂÛÕ ÌÀÐÊÎÂÑÊÈÕ ÌÎÄÅËÅÉ ÄËß ÈÑÑËÅÄÎÂÀÍÈß ÃÎÒÎÂÍÎÑÒÈ ÊÎÌÌÅÐ×ÅÑÊÈÕ ÂÅÁ-ÑÅÐÂÈÑΠ|
186–191 |
Áåðäí³êîâà À.Ë., |
INFORMATION
TECHNOLOGY ANALYSIS OF COMPLEX SYSTEMS |
ÈíôîðìàöÈÎÍÍÀß ÒÅÕÍÎËÎÃÈß ÀÍÀËÈÇÀ ÑËÎÆÍÛÕ ÑÈÑÒÅÌ |
192–197 |
|
Biscoglio I., |
Çíèæåííÿ ðèçèêó íåâèçíà÷åíîñò³ â òåêñòàõ ñòàíäàðò³â âåëèêîãî âïëèâó |
Ñíèæåíèå ðèñêà íåîïðåäåëåííîñòè â òåêñòàõ
ñòàíäàðòîâ áîëüøîãî âëèÿíèÿ |
198–203 |
|
Áóé Ä.Á., |
APPLICATIONS OF THE MULTISETS THEORY |
Ïðèìåíåíèå òåîðèè ÌÓËÜÒÈÌÍÎÆÅÑÒÂ |
204–209 |
|
Áóé Ä.Á., |
MODEL The intersection class specification of object oriented
programming |
ÌÎÄÅËÜ ÎÏÅÐÀÖ²¯ ÏÅÐÅÒÈÍÓ ÑÏÅÖÈÔ²ÊÀÖ²É ÊËÀѲ ÎÁ’ÅÊÒÍÎ-ÎвªÍÒÎÂÀÍÎÃÎ
ÏÐÎÃÐÀÌÓÂÀÍÍß |
ÌÎÄÅËÜ ÎÏÅÐÀÖÈÈ ÏÅÐÅÑÅ×ÅÍÈß ÑÏÅÖÈÔÈÊÀÖÈÉ ÊËÀÑÑÎÂ
ÎÁÚÅÊÒÍÎ-ÎÐÈÅÍÒÈÐÎÂÀÍÍÎÃÎ ÏÐÎÃÐÀÌÌÈÐÎÂÀÍÈß |
210–213 |
Butenko V.Î., |
METRIC-BASED ANALYSIS OF MARKOV MODELS FOR COMPUTER SYSTEM
AVAILABILITY ASSESSMENT |
ÌÅÒÐÈ×ÍÈÉ
ÀÍÀË²Ç ÌÀÐʲÂÑÜÊÈÕ ÌÎÄÅËÅÉ ÄËß ÎÖ²ÍÊÈ ÃÎÒÎÂÍÎÑÒ² ÊÎÌÏ'ÞÒÅÐÍÈÕ ÑÈÑÒÅÌ |
ÌÅÒÐÈ×ÅÑÊÈÉ
ÀÍÀËÈÇ ÌÀÐÊÎÂÑÊÈÕ ÌÎÄÅËÅÉ ÄËß ÎÖÅÍÊÈ ÃÎÒÎÂÍÎÑÒÈ ÊÎÌÏÜÞÒÅÐÍÛÕ ÑÈÑÒÅÌ |
214–220 |
Âîëî÷³é Á.Þ., |
RELIABILITY MODEL OF THE FAULT-TOLERANT HARDWARE/SOFTWARE SYSTEM BASED
ON MAJORITY STRUCTURE WITH SOFTWARE AUTOMATIC RESTART |
ÍÀÄÅÆÍÎÑÒÍÀß
ÌÎÄÅËÜ ÎÒÊÀÇÎÓÑÒÎÉ×ÈÂÎÉ ÏÐÎÃÐÀÌÌÍÎ-ÀÏÏÀÐÀÒÍÎÉ ÑÈÑÒÅÌÛ ÍÀ ÎÑÍÎÂÅ ÌÀÆÎÐÈÒÀÐÍÎÉ
ÑÒÐÓÊÒÓÐÛ ÑÎ ÑÊÎËÜÇßÙÈÌ ÐÅÇÅÐÂÈÐÎÂÀÍÈÅÌ È ÀÂÒÎÌÀÒÈ×ÅÑÊÎÉ ÏÅÐÅÇÀÃÐÓÇÊÎÉ ÏÐÎÃÐÀÌÌÍÎÃÎ
ÎÁÅÑÏÅ×ÅÍÈß |
221–226 |
|
Glukhikh M., |
A STATIC ANALYSIS APPROACH FOR FORMAL VERIFICATION OF
SYSTEMC DESIGNS |
ϲÄÕ²Ä ÄÎ ÔÎÐÌÀËÜÍί ÂÅÐÈÔ²ÊÀÖ²¯ SYSTEMC-ÏÐÎÅÊҲ ÍÀ ÎÑÍβ ÑÒÀÒÈ×ÍÎÃÎ ÀÍÀ˲ÇÓ |
ÏÎÄÕÎÄ Ê
ÔÎÐÌÀËÜÍÎÉ ÂÅÐÈÔÈÊÀÖÈÈ SYSTEMC-ÏÐÎÅÊÒÎÂ ÍÀ
ÎÑÍÎÂÅ ÑÒÀÒÈ×ÅÑÊÎÃÎ ÀÍÀËÈÇÀ |
227–232 |
Ãîëèêîâ Ñ.Å. |
USING FACETed-HIERARCHICAL STRUCTURES IN THE gui OF THE BANKING
INFORMATION SYSTEMs |
ÇÀÑÒÎÑÓÂÀÍÍß
ôàñåòíî¿-³ºðàðõ³÷íèõ ñòðóêòóð â êîðèñòóâàËÜÍÈöüêèõ ³íòåðôåéñ³â ÑÈÑÒÅÌ
ÀÂÒÎÌÀÒÈÇÀÖ²¯ ÁÀÍʲ |
ÏÐÈÌÅÍÅÍÈÅ ÔÀÑÅÒÍÎ-ÈÅÐÀÐÕÈ×ÅÑÊÈÕ ÑÒÐÓÊÒÓÐ Â
ÏÎËÜÇÎÂÀÒÅËÜÑÊÈÕ ÈÍÒÅÐÔÅÉÑÀÕ ÑÈÑÒÅÌ ÀÂÒÎÌÀÒÈÇÀÖÈÈ ÁÀÍÊÎÂ |
233–236 |
Ãîðáåíêî À.Â. |
ANALYSIS OF
DEPENDABLE SERVICE-ORIENTED SYSTEMS DEVELOPMENT FEATURES |
ÀÍÀË²Ç ÎÑÎÁËÈÂÎÑÒÅÉ ÑÒÂÎÐÅÍÍß ÒÀ
ÅÊÑÏËÓÀÒÀÖ²¯ ÃÀÐÀÍÒÎÇÄÀÒÍÈÕ ÑÅвÑ-ÎвªÍÒÎÂÀÍÈÕ ÑÈÑÒÅÌ |
ÀÍÀËÈÇ ÎÑÎÁÅÍÍÎÑÒÅÉ ÑÎÇÄÀÍÈß È ÝÊÑÏËÓÀÒÀÖÈÈ
ÃÀÐÀÍÒÎÑÏÎÑÎÁÍÛÕ ÑÅÐÂÈÑ-ÎÐÈÅÍÒÈÐÎÂÀÍÍÛÕ ÑÈÑÒÅÌ |
237–242 |
Äìèòðèåâà Î.À. |
DEVELOPMENT OF
PARALLEL MULTISTEP COLLOCATION BLOCK METHODS USING HERMITE INTERPOLATION
POLYNOMIALS |
ÐÎÇÐÎÁÊÀ ÁÀÃÀÒÎÊÐÎÊÎÂÈÕ ÏÀÐÀËÅËÜÍÈÕ
ÊÎËÎÊÀÖIÉÍÈÕ
ÁËÎÊÎÂÈÕ ÌÅÒÎÄ²Â Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ²ÍÒÅÐÏÎËßÖ²ÉÍÈÕ ÏÎ˲ÍÎ̲ ÅÐÌIÒÀ |
243–249 |
|
Åïèôàíîâ À.Ñ. |
regularization of partially set lows of
functioning of discrete determined automatons with use of splines |
Äîâèçíà÷åííÿ ÷àñòêîâî çàäàíèõ çàêîí³â
ôóíêö³îíóâàííÿ äèñêðåòíèõ äèíàì³÷íèõ ñèñòåì ç âèêîðèñòàííÿì ñïëàéí³â |
250–254 |
|
Çèíîâàòíàÿ Ñ.Ë., |
THE
SIMULATION MODEL FOR DESIGNING THE OPTIMAL INDEX STRUCTURE OF THE DATABASE |
³ì³òàö³éíà
ÌÎÄÅËÜ ÄËß ÏÐÎÅÊÒÓÂÀÍÍß ÎÏÒÈÌÀËÜÍί ²ÍÄÅÊÑÍί ÑÒÐÓÊÒÓÐÈ ÁÀÇÈ ÄÀÍÈÕ |
ÈÌÈÒÀÖÈÎÍÍÀß ÌÎÄÅËÜ ÄËß ÏÐÎÅÊÒÈÐÎÂÀÍÈß ÎÏÒÈÌÀËÜÍÎÉ
ÈÍÄÅÊÑÍÎÉ ÑÒÐÓÊÒÓÐÛ ÁÀÇÛ ÄÀÍÍÛÕ |
255–260 |
Kvassay M., |
BIRNBAUM IMPORTANCE FOR ESTIMATION OF MULTI-STATE AND
BINARY-STATE SYSTEMS |
ÎÖ²ÍÊÀ Á²ÐÍÁÀÓÌÀ ÄËß ÀÍÀ˲ÇÓ ÍÀIJÉÍÎÑÒ² ÑÈÑÒÅÌÈ Ç ÄÅʲËÜÊÎÌÀ ² ÄÂÎÌÀ
вÂÍßÌÈ ÏÐÀÖÅÇÄÀÒÍÎÑÒ² |
ÎÖÅÍÊÀ ÁÈÐÍÁÀÓÌÀ ÄËß ÀÍÀËÈÇÀ ÍÀÄÅÆÍÎÑÒÈ
ÑÈÑÒÅÌÛ Ñ ÍÅÑÊÎËÜÊÈÌÈ È ÄÂÓÌß ÓÐÎÂÍßÌÈ ÐÀÁÎÒÎÑÏÎÑÎÁÍÎÑÒÈ |
261–266 |
Êîçàê Ë.ß., |
THE SELECTION PROCEDURE OF SIGNIFICANT FACTORS IN MODELING PROCESS |
ÏÐÎÖÅÄÓÐÀ ÂÈÄIËÅÍÍß ÂÀÃÎÌÈÕ ÔÀÊÒÎÐI ÏÐÈ ÌÎÄÅËÞÂÀÍÍI ÒÅÕÍÎËÎÃI×ÍÈÕ ÏÐÎÖÅÑI |
ÏÐÎÖÅÄÓÐÀ
ÂÛÄÅËÅÍÈß ÇÍÀ×ÈÌÛÕ ÔÀÊÒÎÐΠÏÐÈ ÌÎÄÅËÈÐÎÂÀÍÈÈ ÒÅÕÍÎËÎÃÈ×ÅÑÊÈÕ ÏÐÎÖÅÑÑΠ|
267–270 |
Êîëäîâñüêèé Â.Â. |
METHODS OF ASSESSING RELIABILITY AND SAFETY OF SOFTWARE SYSTEMS REMOTE
BANKING SERVICE BASED ON SOURCE CODE METRICS |
ÌÅÒÎÄÈÊÀ
ÎÖÅÍÊÈ ÍÀÄÅÆÍÎÑÒÈ È ÁÅÇÎÏÀÑÍÎÑÒÈ ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ
ÄÈÑÒÀÍÖÈÎÍÍÎÃÎ ÁÀÍÊÎÂÑÊÎÃÎ ÎÁÑËÓÆÈÂÀÍÈß ÍÀ ÎÑÍÎÂÅ ÌÅÒÐÈÊ ÈÑÕÎÄÍÎÃÎ ÊÎÄÀ |
271–275 |
|
Kostolny J., |
DECISION DIAGRAM AND DIRECT PARTIAL LOGIC DERIVATIVES IN
RELIABILITY ANALYSIS OF MULTI-STATE SYSTEM |
IJÀÃÐÀÌÈ Ð²ØÅÍÜ ² ËÎò×Ͳ ÍÀÏÐÀÂËÅͲ ÏÎÕ²ÄͲ ÄËß ÀÍÀ˲ÇÓ ÍÀIJÉÍÎÑÒ²
ÑÈÑÒÅÌ Ç ÄÅʲËÜÊÎÌÀ вÂÍßÌÈ ÍÀIJÉÍÎÑÒ² |
ÄÈÀÃÐÀÌÌÛ ÐÅØÅÍÈÉ È ËÎÃÈ×ÅÑÊÈÅ
ÍÀÏÐÀÂËÅÍÍÛÅ ÏÐÎÈÇÂÎÄÍÛÅ ÄËß ÀÍÀËÈÇÀ ÍÀÄÅÆÍÎÑÒÈ ÑÈÑÒÅÌ Ñ ÍÅÑÊÎËÜÊÈÌÈ ÓÐÎÂÍßÌÈ
ÍÀÄÅÆÍÎÑÒÈ |
276–281 |
Êðèâóëÿ Ã.Ô., |
EXPERT ASSESSMENT for software product quality definition |
ÅÊÑÏÅÐÒÍÅ ÎÖ²ÍÞÂÀÍÍß ßÊÎÑÒ² ÏÐÎÃÐÀÌÍÎÃÎ
ÇÀÁÅÇÏÅ×ÅÍÍß |
282–286 |
|
Êðîòîâ Ê.Â., |
RATIONALE FOR A
MULTI-CRITERIA MULTI-LEVEL MODEL OF THE STRUCTURE OF SCHEDULES OF GROUP
PROCESSING THE REQUIREMENTS OF THE PARTIES |
ÎÁ¥ÐÓÍÒÓÂÀÍÍß ÁÀÃÀÒÎÊÐÈÒÅвÀËÜÍί
ÁÀÃÀÒÎвÂÍÅÂί ÌÎÄÅ˲ ÁÓÄÎÂÈ ÐÎÇÊËÀIJ ÃÐÓÏÎÂί ÎÁÐÎÁÊÈ ÏÀÐÒ²É ÂÈÌÎà |
287–292 |
|
Êóçíåöîâà Þ.À., |
AN EVALUATION OF
HUMAN-MACHINE INTERFACES IN GRAPH VISUALIZATION SYSTEMS |
ÎÖ²ÍÞÂÀÍÍß ËÞÄÈÍÎ-ÌÀØÈÍÍÈÕ
²ÍÒÅÐÔÅÉÑ²Â Ó ÑÈÑÒÅÌÀÕ Â²ÇÓÀ˲ÇÀÖ²¯ ÃÐÀԲ |
ÎÖÅÍÈÂÀÍÈÅ ×ÅËÎÂÅÊÎ-ÌÀØÈÍÍÛÕ ÈÍÒÅÐÔÅÉÑΠ ÑÈÑÒÅÌÀÕ
ÂÈÇÓÀËÈÇÀÖÈÈ ÃÐÀÔÎÂ |
293–299 |
Ìàåâñêèé Ä.À. |
RELIABILITY
EVALUATION ON MULTI-SYSTEM SOFTWARE |
ÎÖ²ÍÊÀ ÏÎÊÀÇÍÈʲ ÍÀIJÉÍÎÑÒ² ÁÀÃÀÒÎÊÎÌÏÎÍÅÍÒÍÈÕ
ÏÐÎÃÐÀÌÍÈÕ ÑÈÑÒÅÌ |
ÎÖÅÍÊÀ ÏÎÊÀÇÀÒÅËÅÉ ÍÀÄÅÆÍÎÑÒÈ ÌÍÎÃÎÊÎÌÏÎÍÅÍÒÍÛÕ
ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ |
300–304 |
Ìàíæîñ Þ.Ñ. |
THE FACTORS OF SOFTWARE RELIABILITY |
ÔÀÊÒÎÐÛ ÍÀÄÅÆÍÎÑÒÈ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß |
305–312 |
|
Polschykov K.A., |
ANALYTIC MODEL OF THE REAL TIME TRAFFIC TRANSMISSION
REQUESTS SERVICE IN A TELECOMMUNICATION NETWORK |
ÀÍÀËÈÒÈ×ÅÑÊÀß ÌÎÄÅËÜ ÎÁÑËÓÆÈÂÀÍÈß
ÇÀÏÐÎÑΠÍÀ ÏÅÐÅÄÀ×Ó ÏÎÒÎÊΠÐÅÀËÜÍÎÃÎ ÂÐÅÌÅÍÈ Â ÒÅËÅÊÎÌÌÓÍÈÊÀÖÈÎÍÍÎÉ ÑÅÒÈ |
ÀÍÀ˲ÒÈ×ÍÀ ÌÎÄÅËÜ ÎÁÑËÓÃÎÂÓÂÀÍÍß
ÇÀÏÈҲ ÍÀ ÏÅÐÅÄÀ×Ó ÏÎÒÎʲ ÐÅÀËÜÍÎÃÎ ×ÀÑÓ Ó ÒÅËÅÊÎÌÓͲÊÀÖ²ÉÍ²É ÌÅÐÅƲ |
313–318 |
Ïîìîðîâà Î.Â., |
tHE ACTUAL PROBLEMS of
software quality evaluation |
ÑÎÂÐÅÌÅÍÍÛÅ ÏÐÎÁËÅÌÛ îöåíèâàíèÿ êà÷åñòâà ïðîãðàììíîãî
îáåñïå÷åíèÿ |
319–327 |
|
Pomorova O.V., |
ASSESSMENT OF THE STATIC ANALYZERS USAGE FITNESS FOR
SOFTWARE VULNERABILITIES IDENTIFICATION |
Îö³íêà
ïðèäàòíîñò³ çàñòîñóâàííÿ ñòàòè÷íèõ àíàë³çàòîð³â äëÿ âèÿâëåííÿ âðàçëèâîñòåé â
ïðîãðàìíîìó çàáåçïå÷åíí³ |
ÎÖÅÍÊÀ ÏÐÈÃÎÄÍÎÑÒÈ ïðèìèíåíèÿ ÑÒÀÒÈ×ÅÑÊÈÕ ÀÍÀËÈÇÀÒÎÐîâ ÄËß
ÂÛßÂËÅÍÈß óÿçâèìîñòåé â Ïðîãðàìíîì îáåñïå÷åíèè |
328–332 |
Ðîìàíêåâè÷ À.Ì., |
On a GL-model of the system with sliding redundancy |
Ïðî îäíó GL-ìîäåëü ñèñòåìè ç êîâçàþ÷èì ðåçåðâîì |
333–336 |
|
Ðûæêîâà Î.Â. |
CRITICALITY FAILURES ASSESMENT OF SWITCHES IN
CLUSTER OF DATA CENTER ACCESS LAYER |
ÀÍÀË²Ç ÊÐÈÒÈ×ÍÎÑÒ² ²ÄÌΠÊÎÌÓÒÀÒÎв вÂÍß
ÄÎÑÒÓÏÓ ÊËÀÑÒÅÐÀ ÖÅÍÒÐÓ ÎÁÐÎÁÊÈ ÄÀÍÈÕ |
ÎÖÅÍÊÀ ÊÐÈÒÈ×ÍÎÑÒÈ ÎÒÊÀÇΠÊÎÌÌÓÒÀÒÎÐÎÂ
ÓÐÎÂÍß ÄÎÑÒÓÏÀ ÊËÀÑÒÅÐÀ ÖÅÍÒÐÀ ÎÁÐÀÁÎÒÊÈ ÄÀÍÍÛÕ |
337–341 |
Savenko O.S., |
MODEL OF THE COMPUTER SYSTEM DIAGNOSIS PROCESS FOR BOTNET
PRESENCE IN CORPORATE AREA NETWORK |
ÌÎÄÅËÜ ÏÐÎÖÅÑÑÀ
ÄÈÀÃÍÎÑÒÈÐÎÂÀÍÈß ÊÎÌÏÜÞÒÅÐÍÛÕ ÑÈÑÒÅÌ ÍÀ ÍÀËÈ×ÈÅ ÁÎÒÍÅÒ Â ÊÎÐÏÎÐÀÒÈÂÍÈÕ ÑÅÒßÕ |
ÌÎÄÅËÜ ÏÐÎÖÅÑÓ
IJÀÃÍÎÑÒÓÂÀÍÍß ÊÎÌÏ’ÞÒÅÐÍÈÕ ÑÈÑÒÅÌ ÍÀ ÍÀßÂͲÑÒÜ ÁÎÒÍÅÒ-ÌÅÐÅÆ Â ÊÎÐÏÎÐÀÒÈÂͲÉ
ÌÅÐÅƲ |
342–347 |
Sklyar V.V., |
APPLICATION OF FPGA-BASED ROD CONTROL SYSTEM FOR NUCLEAR
POWER PLANTS SAFETY IMPROVEMENT |
ÇÀÑÒÎÑÓÂÀÍÍß ÑÈÑÒÅÌÈ ÃÐÓÏÎÂÎÃÎ ÒÀ
²ÍÄȲÄÓÀËÜÍÎÃÎ ÓÏÐÀÂ˲ÍÍß ÎÐÃÀÍÀÌÈ ÐÅÃÓËÞÂÀÍÍß ÍÀ ÁÀDz ÏË²Ñ ÄËß Ï²ÄÂÈÙÅÍÍß
ÁÅÇÏÅÊÈ ÀÅÑ |
ÏÐÈÌÅÍÅÍÈÅ ÑÈÑÒÅÌÛ ÃÐÓÏÏÎÂÎÃÎ È
ÈÍÄÈÂÈÄÓÀËÜÍÎÃÎ ÓÏÐÀÂËÅÍÈß ÎÐÃÀÍÀÌÈ ÐÅÃÓËÈÐÎÂÀÍÈß ÍÀ ÁÀÇÅ ÏËÈÑ ÄËß ÏÎÂÛØÅÍÈß
ÁÅÇÏÅÊÈ ÀÅÑ |
348–351 |
Ñêîáåëåâ Â.Ã. |
SECURITY OF
IT-SYSTEMS (A SURVEY) |
ÁÅÇÏÅÊÀ IT-ÑÈÑÒÅÌ (ÎÃËßÄ) |
352–361 |
|
Starov O., |
ÕÌÀÐͲ ÑÅвÑÈ ÒÀ ²ÍÑÒÐÓÌÅÍÒÈ ÄËß
ÌÎÁ²ËÜÍÎÃÎ ÒÅÑÒÓÂÀÍÍß |
ÎÁËÀ×ÍÛÅ ÑÅÐÂÈÑÛ È ÈÍÑÒÐÓÌÅÍÒÛ ÄËß
ÌÎÁÈËÜÍÎÃÎ ÒÅÑÒÈÐÎÂÀÍÈß |
362–371 |
|
Ñòðþê Î.Þ., |
METHOD OF QUALITY OF experience
fairness providing FOR Ad Hoc Wireless Networks subscribers |
Ìåòîä îáåñïå÷åíèÿ ñïðàâåäëèâîãî óðîâíÿ âîñïðèÿòèÿ
êà÷åñòâà îáñëóæèâàíèÿ àáîíåíòîâ ìîáèëüíîé ðàäèîñåòè |
372–378 |
|
Òâåðäîõëåáîâ Â.À. |
Basic theorems for construction of geometric
image of automatons mappiings |
Îñíîâí³ òåîðåìè äëÿ ïîáóäîâè ãåîìåòðè÷íèõ
îáðàç³â àâòîìàòíèõ â³äîáðàæåíü |
ÎÑÍÎÂÍÛÅ ÒÅÎÐÅÌÛ ÄËß ÏÎÑÒÐÎÅÍÈß ÃÅÎÌÅÒÐÈ×ÅÑÊÈÕ ÎÁÐÀÇÎÂ
ÀÂÒÎÌÀÒÍÛÕ ÎÒÎÁÐÀÆÅÍÈÉ |
379–384 |
Ôåäîñååâà À.À. |
Representation of the technological process of manufacture of drugs in
tablet form with block-schemeS and Timed Petri nets |
ÏÐÅÄÑÒÀÂËÅÍÍß òåõíîëîã³÷íîãî ïðîöåñó âèðîáíèöòâà ë³êàðñ³êèõ ïðåïàðàò³â ó ôîðì³
òàáëåòîê çà äîïîìîãîþ áëîê-ñõåì òà ÷àñîâèõ ìåðåæ ïåòð³ |
385–389 |
|
×óõðàé À.Ã. |
Models and methods of knowledge and skills acquisition adaptive
computer support in solving of algorithmic educational problems |
ÌÎÄÅ˲ ÒÀ ÌÅÒÎÄÈ àäàïòèâíÈõ ÊÎÌÏÜ’ÞÒÅÐÍèÕ ÑÈÑÒÅÌ Ï²ÄÒÐÈÌÊÈ ÍÀÄÁÀÍÍß ÇÍÀÍÜ ÒÀ Â̲ÍÜ ÏÐÈ
ÂÈвØÅÍͲ ÀËÃÎÐÈÒ̲×ÍÈÕ ÍÀÂ×ÀËÜÍÈÕ ÇÀÄÀ× |
390–402 |
|
Ùåðáîâñüêèõ Ñ.Â. |
DETERMINATION
OF NON-UNIFORM LOAD-SHARING IMPACT ON MINIMAL CUT SETFOR REPAIRABLE
2-OUT-OF-3 SYSTEM |
ÎÏÐÅÄÅËÅÍÈÅ ÂËÈßÍÈß
ÍÅÐÀÂÍÎÌÅÐÍÎÑÒÈ ÏÅÐÅÐÀÑÏÐÅÄÅËÅÍÈß ÍÀÃÐÓÇÊÈ ÍÀ ÌÈÍÈÌÀËÜÍÎÅ ÑÅÊÓÙÅÅ ÌÍÎÆÅÑÒÂÎ ÂÎÑÑÒÀÍÀÂËÈÂÀÅÌÎÉ
ÑÈÑÒÅÌÛC ÐÅÇÅÐÂÈÐÎÂÀÍÈÅÌ ÏÎ ÑÕÅÌÅ 2-ÈÇ-3 |
403–407 |
|
Yamatov A.R., |
ÌÅÒÎÄÈÊÀ ÑÈÍÒÅÇÀ ÑÒÐÓÊÒÓÐÍÎÉ ÑÕÅÌÛ
ÍÀĨÆÍÎÑÒÈ ÑÈÑÒÅÌÛ Ñ ÏÐÈÌÅÍÅÍÈÅÌ ÌÎÄÈÔÈÖÈÐÎÂÀÍÍÎÃÎ ÃÐÀÄÈÅÍÒÀ  ÏÐÎÖÅÄÓÐÅ ÍÀÈÑÊÎÐÅÉØÅÃÎ
ÑÏÓÑÊÀ |
ÌÅÒÎÄÈÊÀ ÑÈÍÒÅÇÓ ÑÒÐÓÊÒÓÐÍί ÑÕÅÌÈ
ÍÀIJÉÍÎÑÒ² ÑÈÑÒÅÌÈ ²Ç ÇÀÑÒÎÑÓÂÀÍÍßÌ ÌÎÄÈÔ²ÊÎÂÀÍÎÃÎ ÃÐÀIJªÍÒÓ Ó ÏÐÎÖÅÄÓв
ÍÀÉØÂÈÄØÎÃÎ ÑÏÓÑÊÓ |
408–413 |
|
ßðåì÷óê Ñ.À. |
Problems Àn
aprioristic estimation of indicators reliability of dependability
INFORMATION SYSTEMS CRITICAL
APPOINTMENT |
ÏÐÎÁËÅÌÈ
ÀÏвÎÐÍί ÎÖ²ÍÊÈ ÏÎÊÀÇÍÈʲ ÍÀIJÉÍÎÑÒ² ÃÀÐÀÍÒÎÇÄÀÒÍÈÕ
²ÍÔÎÐÌÀÖ²ÉÍÈÕ ÑÈÑÒÅÌ ÊÐÈÒÈ×ÍÎÃÎ ÏÐÈÇÍÀ×ÅÍÍß |
414–420 |
|
Ïîâ³äîìëåííÿ |
||||
Êîëÿäà C.Â., |
controlled quality solution of security,
guard, and monitoring tasks based on new generation video surveillance |
êîíòðîëèðóåìîå êà÷åñòâî ðåøåíèÿ çàäà÷ áåçîïàñíîñòè, îõðàíû è ìîíèòîðèíãà íà îñíîâå ïðèìåíåíèÿ âèäåîíàáëþäåíèÿ
íîâîãî ïîêîëåíèÿ |
421–423 |
Øàíîâí³
÷èòà÷³!
Íàóêîâî-òåõí³÷íèé æóðíàë «ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ'ÞÒÅÐͲ ÑÈÑÒÅÌÈ»:
- âõîäèòü äî çàòâåðäæåíîãî
ÄÀÊ Ïåðåë³êó íàóêîâèõ ôàõîâèõ âèäàíü Óêðà¿íè, â ÿêèõ ìîæóòü äðóêóâàòèñÿ îñíîâí³
ðåçóëüòàòè äèñåðòàö³éíèõ ðîá³ò íà çäîáóòòÿ íàóêîâèõ ñòóïåí³â äîêòîðà ³
êàíäèäàòà íàóê (äèâ. ïîñòàíîâó ïðåçè䳿
ÂÀÊ Óêðà¿íè ¹ 1-05/3 â³ä 8.07.2009 ð.);
- çáåð³ãàºòüñÿ ó
çàãàëüíîäåðæàâí³é ðåôåðàòèâí³é áàç³ äàíèõ «Óêðà¿í³êà
íàóêîâà» òà ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ óêðà¿íñüêîãî
ðåôåðàòèâíîãî æóðíàëó «Äæåðåëî»
(â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà
Web-ñåðâåð³ http://www.nbuv.gov.ua)
(Óêðà¿íà);
- çáåð³ãàºòüñÿ ó
ðåôåðàòèâí³é áàç³ äàíèõ Âñåðîñ³éñüêîãî ³íñòèòóòó íàóêîâî¿ ³ òåõí³÷íî¿
³íôîðìàö³¿ (²ͲҲ) Ðîñ³éñüêî¿
àêàäå쳿 íàóê ³ ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÐÆ (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.viniti.ru) (Ðîñ³éñüêà
Ôåäåðàö³ÿ);
- âêëþ÷åíèé â ì³æíàðîäí³ íàóêîìåòðè÷í³
áàçè äàíèõ: íàóêîâî¿ åëåêòðîííî¿ á³áë³îòåêè eLIBRARY.RU
(Ðîñ³éñüêà Ôåäåðàö³ÿ), Index Copernicus
(Ïîëüùà), Google Scholar.