Íàö³îíàëüíèé àåðîêîñì³÷íèé óí³âåðñèòåò ³ì. Ì.ª. Æóêîâñüêîãî “Õàðê³âñüêèé àâ³àö³éíèé ³íñòèòóò”

 

ISSN 1814-4225. ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ’ÞÒÅÐͲ ÑÈÑÒÅÌÈ. – 2014. ¹ 6 (70). – 184 ñ.

ISSN 1814-4225. ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÅ È ÊÎÌÏÜÞÒÅÐÍÛÅ ÑÈÑÒÅÌÛ. – 2014. ¹ 6 (70). – 184 ñ.

ISSN 1814-4225. RADIOELECTRONIC AND COMPUTER SYSTEMS. – 2014. ¹ 6 (70). – 184 ñ.

 

Ìàòåð³àëè, ùî ì³ñòÿòüñÿ â æóðíàë³, îïóáë³êîâàí³ çà ð³øåííÿì VII ì³æíàðîäíî¿ íàóêîâî-òåõí³÷íî¿ êîíôåðåíö³¿¿

«Ãàðàíòîçäàòí³ ñèñòåìè, ñåðâ³ñè òà òåõíîëî㳿 (DESSERT 2014)»

 

ÑÒÀÒÒ² (articleS)

 

Àâòîðè
(ìîâà
îðèã³íàëó)

Íàçâà ñòàòò³ (article title)

Ñòîð³íêè

(pages)

English

Óêðà¿íñüêà ìîâà

Ðóññêèé ÿçûê

Áåçïåêà êðèòè÷íèõ ³íôðàñòðóêòóð

Çàåö À. Þ.,
Êðàìàðü Â. À.

DEPENDABLE OCEANTECHNOLOGIES SYSTEMS UNDER THE INFLUENCE OF EXTERNAL ICE LOADS

ÃÀÐÀÍÒÎÇÄÀÒͲÑÒÜ ÎÊÅÀÍÎÒÅÕͲ×ÍÈÕ ÑÈÑÒÅÌ ÏÐÈ Ä²¯ ÇÎÂͲØÍ²Õ ËÜÎÄÎÂÈÕ ÍÀÂÀÍÒÀÆÅÍÜ

ÃÀÐÀÍÒÎÑÏÎÑÎÁÍÎÑÒÜ ÎÊÅÀÍÎÒÅÕÍÈ×ÅÑÊÈÕ ÑÈÑÒÅÌ ÏÐÈ ÂÎÇÄÅÉÑÒÂÈÈ ÂÍÅØÍÈÕ ËÅÄÎÂÛÕ ÍÀÃÐÓÇÎÊ

7–11
(5)

Ñêàðãà-
Áàíäóðîâà È. C.,
Ðÿçàíöåâ À. È.

the MODELs FOR EVALUATING ENVIRONMENTAL SEcurity OF REGION

ÌÎÄÅ˲ ÎÖ²ÍÊÈ ÅÊÎËÎò×Íί ÁÅÇÏÅÊÈ ÐÅòÎÍÓ

ÌÎÄÅËÈ ÎÖÅÍÊÈ ÝÊÎËÎÃÈ×ÅÑÊÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ ÐÅÃÈÎÍÀ

12–16
(5)

Prochazkova D.

DETERMINATION OF SEISMIC HAZARD AND ITS CONTRIBUTION TO SEISMIC RISK OF NUCLEAR FACILITY

ÏÎÍßÒÒß ÑÅÉÑ̲×Íί ÍÅÁÅÇÏÅÊÈ ÒÀ ÉÎÃÎ ÂÊËÀÄ Ó ÑÅÉÑ̲×ÍÈÉ ÐÈÇÈÊ ßÄÅÐÍÈÕ ÎÁ’ªÊÒ²Â

ÏÎÍßÒÈÅ ÑÅÉÑÌÈ×ÅÑÊÎÉ ÎÏÀÑÍÎÑÒÈ È ÅÃÎ ÂÊËÀÄ Â ÑÅÉÑÌÈ×ÅÑÊÈÉ ÐÈÑÊ ßÄÅÐÍÛÕ ÎÁÚÅÊÒÎÂ

17–22
(6)

Prochazkova D.

RESULTS OF PROJECT FOCUS

ÐÅÇÓËÜÒÀÒÈ ÏÐÎÅÊÒÓ FOCUS

ÐÅÇÓËÜÒÀÒÛ ÏÐÎÅÊÒÀ FOCUS

23–26
(4)

Prochazkova D., Prochazka J.

MODEL OF CRITICAL INFRASTRUCTURE SAFETY MANAGEMENT

ÌÎÄÅËÜ ÊÅÐÓÂÀÍÍß ÁÅÇÏÅÊÎÞ ²ÍÔÎÐÌÀÖ²ÉÍÈÕ ²ÍÔÐÀÑÒÐÓÊÒÓÐ

ÌÎÄÅËÜ ÓÏÐÀÂËÅÍÈß ÁÅÇÎÏÀÑÍÎÑÒÜÞ ÊÐÈÒÈ×ÅÑÊÈÕ ÈÍÔÐÀÑÒÐÓÊÒÓÐ

27–32
(6)

ßê³ñòü òà íàä³éí³ñòü ÏÇ

Ãîâîðóùåíêî Ò. Î.

APPLYING OF BACKCASTING AT THE DESIGN STAGE FOR SOFTWARE QUALITY ASSURANCE

ÂÈÊÎÐÈÑÒÀÍÍß ÐÅÒÐÎÑÏÅÊÒÈÂÍÎÃÎ ÀÍÀ˲ÇÓ (BACKCASTING) ÍÀ ÅÒÀϲ ÏÐÎÅÊÒÓÂÀÍÍß ÄËß ÇÀÁÅÇÏÅ×ÅÍÍß ßÊÎÑÒ² ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß

ÈÑÏÎËÜÇÎÂÀÍÈÅ ÐÅÒÐÎÑÏÅÊÒÈÂÍÎÃÎ ÀÍÀËÈÇÀ (BACKCASTING) ÍÀ ÝÒÀÏÅ ÏÐÎÅÊÒÈÐÎÂÀÍÈß ÄËß ÎÁÅÑÏÅ×ÅÍÈß ÊÀ×ÅÑÒÂÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß

33–38
(6)

Öèáàºâ ª. ².,
Çàéöåâ Â. Ã.,
Ïëàõîòíèé Ì. Â.

EVALUATION OF PROGRAM EXECUTION TIME

ÎÖ²ÍÊÀ ×ÀÑÓ ÂÈÊÎÍÀÍÍß ÏÐÎÃÐÀÌ

ÎÖÅÍÊÀ ÂÐÅÌÅÍÈ ÂÛÏÎËÍÅÍÈß ÏÐÎÃÐÀÌÌ

39–42
(4)

Ôåäîñååâà À. À.

ASSESSMENT Requirements to the software for the pharmaceutical enterprise based Safety-case metodology

îö³íêà âèìîã äî ïðîãðàìíîãî çàáåçïå÷åííÿ ôàðìàöåâòè÷íîãî ï³äïðèºìñòâà íà îñíîâ³ Safety-case ìåòîäîëî㳿

ÎÖÅÍÊÀ ÒÐÅÁÎÂÀÍÈÉ Ê ÏÐÎÃÐÀÌÌÍÎÌÓ ÎÁÅÑÏÅ×ÅÍÈÞ ÔÀÐÌÀÖÅÂÒÈ×ÅÑÊÎÃÎ ÏÐÅÄÏÐÈßÒÈß ÍÀ ÎÑÍÎÂÅ SAFETY-CASE ÌÅÒÎÄÎËÎÃÈÈ

43–47
(5)

Íåãóðèöÿ Ä. Ñ.

Adaptability and adaptability of software CRITICAL systems

ÀÄÀÏÒÈÂͲÑÒÜ ÒÀ ÀÄÀÏÒÎÂÀͲÑÒÜ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÑÈÑÒÅÌ ÊÐÈÒÈ×ÍÎÃÎ ÏÐÈÇÍÀ×ÅÍÍß

Àäàïòèâíîñòü È ÀÄÀÏÒÈðóåìîÑÒÜ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÑÈÑÒÅÌ ÊÐÈÒÈ×ÅÑÊÎÃÎ ÍÀÇÍÀ×ÅÍÈÅ

48–52
(5)

Áóé Ä. Á.,
Ñêîáåëåâ Â. Ã.

COMPLEXITY OF OPERATIONS IN DATABASE SYSTEMS (A SURVEY)

ÑÊËÀÄͲÑÒÜ ÎÏÅÐÀÖ²É Ç ÁÀÇÀÌÈ ÄÀÍÈÕ (ÎÃËßÄ)

ÑËÎÆÍÎÑÒÜ ÎÏÅÐÀÖÈÉ Â ÁÀÇÀÕ ÄÀÍÍÛÕ (ÎÁÇÎÐ)

53–59
(7)

Ñêàðãà-Áàíäóðîâà È. C.,
Êîâàëåíêî ß. Ï.

The software quality enhancement for safety-critical systems with static analysis techniques

ϲÄÂÈÙÅÍÍß ßÊÎÑÒ² ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÑÈÑÒÅÌ ÊÐÈÒÈ×ÍÎÃÎ ÏÐÈÇÍÀ×ÅÍÍß Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ÌÅÒÎIJ ÑÒÀÒÈ×ÍÎÃÎ ÀÍÀ˲ÇÓ

ÏÎÂÛØÅÍÈÅ ÊÀ×ÅÑÒÂÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÑÈÑÒÅÌ ÊÐÈÒÈ×ÅÑÊÎÃÎ ÍÀÇÍÀ×ÅÍÈß Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÌÅÒÎÄΠÑÒÀÒÈ×ÅÑÊÎÃÎ ÀÍÀËÈÇÀ

60–63
(4)

Ìàåâñêèé Ä. À.,
×åðáàäæè Þ. Ï.

AUTHORSHIP ATTRIBUTION OF SOFTWARE THROUGH SOURCE CODE

ÂÈÇÍÀ×ÅÍÍß ÀÂÒÎÐÑÒÂÀ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÇÀ ÏÎ×ÀÒÊÎÂÈÌ ÊÎÄÎÌ ÏÐÎÃÐÀÌ

ÎÏÐÅÄÅËÅÍÈÅ ÀÂÒÎÐÑÒÂÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÏÎ ÈÑÕÎÄÍÎÌÓ ÊÎÄÓ ÏÐÎÃÐÀÌÌ

64–68
(5)

Ivanchenko O. V.,
Yavkun Y. L.,
Tomashpolskaya A. A.

OPTIMIZATION OF THE TEST CONTROL OF SOFTWARE CRITICAL APPLICATION

ÎÏÒÈ̲ÇÀÖ²ß ÒÅÑÒÎÂÎÃÎ ÊÎÍÒÐÎËÞ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÊÐÈÒÈ×ÍÎÃÎ ÄÎÄÀÒÊÀ

ÎÏÒÈÌÈÇÀÖÈß ÒÅÑÒÎÂÎÃÎ ÊÎÍÒÐÎËß ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÊÐÈÒÈ×ÅÑÊÎÃÎ ÏÐÈËÎÆÅÍÈß

69–73
(5)

Çåëåí³ îá÷èñëåííÿ òà êîìóí³êàö³¿

Òóðêèí È. Á.,
Âäîâèò÷åíêî À. Â.,
Ñàìèð Ñ. À.

ENERGY SAVING FUNCTIONS of the SOFTWARE of MOBILE DEVICES

Åíåðãîçáåð³ãàþ÷³ ôóíêö³¿ ïðîãðàìíîãî çàáåçïå÷åííÿ ìîá³ëüíèõ ÏÐÈÑÒÐίÂ

ÝÍÅÐÃÎÑÁÅÐÅÃÀÞÙÈÅ ÔÓÍÊÖÈÈ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÌÎÁÈËÜÍÛÕ ÓÑÒÐÎÉÑÒÂ

74–78
(5)

Òàðàñþê Î. Ì.

MEANS OF SOLVING A PROBLEM OF UNEVEN DISTRIBUTION OF AIRTIME CONSUMPTION IN WIRELESS NETWORKS

ÑÏÎÑÎÁÈ ÂÈвØÅÍÍß ÏÐÎÁËÅÌÈ ÍÅвÂÍÎ̲ÐÍÎÃÎ ÐÎÇÏÎIJËÓ ×ÀÑÓ ÓÒÐÈÌÀÍÍß ÑÅÐÅÄÎÂÈÙÀ ÏÅÐÅÄÀײ  ÁÅÇÄÐÎÒÎÂÈÕ ÌÅÐÅÆÀÕ

ÑÏÎÑÎÁÛ ÐÅØÅÍÈß ÏÐÎÁËÅÌÛ ÍÅÐÀÂÍÎÌÅÐÍÎÃÎ ÐÀÑÏÐÅÄÅËÅÍÈß ÂÐÅÌÅÍÈ ÓÄÅÐÆÀÍÈß ÑÐÅÄÛ ÏÅÐÅÄÀ×È Â ÁÅÑÏÐÎÂÎÄÍÛÕ ÑÅÒßÕ

79–84
()

Ïëàõòååâ À. Ï.,
Îðåõîâ À. À.,
Ïëàõòååâ Ï. À.

FOREST FIRES MONITORING SYSTEM BASED ON SENSOR NETWORKS

ÑÈÑÒÅÌÀ ÌÎͲÒÎÐÈÍÃÓ Ë²ÑÎÂÈÕ ÏÎÆÅÆ ÍÀ ÎÑÍβ ÑÅÍÑÎÐÍÈÕ ÌÅÐÅÆ

ÑÈÑÒÅÌÀ ÌÎÍÈÒÎÐÈÍÃÀ ËÅÑÍÛÕ ÏÎÆÀÐÎÂ ÍÀ ÎÑÍÎÂÅ ÑÅÍÑÎÐÍÛÕ ÑÅÒÅÉ

85–89
(6)

ijàãíîñòóâàííÿ òà íàä³éí³ñòü êîìï’þòåðíèõ ñèñòåì

Ãîðáåíêî À. Â.,
Äóáíèöêèé Â. Þ.,
Ðóáàí Â. È.

THE COMPARATIVE ANALYSIS OF THE METHODS OF RECOVERY OF THE PASSED DATA MESUREMENT OF TIME OF AVAILABILITY OF THE SERVER IN THE SYSTEMS OF "CLOUD COMPUTING"

ÏÎвÂÍßËÜÍÈÉ ÀÍÀË²Ç ÌÅÒÎIJ ²ÄÍÎÂËÅÍÍß ÏÐÎÏÓÙÅÍÈÕ ÄÀÍÈÕ ÇÀ̲ÐÞÂÀÍÍß ×ÀÑÓ ÄÎÑÒÓÏÍÎÑÒ² ÑÅÐÂÅÐÀ  ÑÈÑÒÅÌÀÕ «ÕÌÀÐÍÈÕ ÎÁ×ÈÑËÅÍÜ»

ÑÐÀÂÍÈÒÅËÜÍÛÉ ÀÍÀËÈÇ ÌÅÒÎÄΠÂÎÑÑÒÀÍÎÂËÅÍÈß ÏÐÎÏÓÙÅÍÍÛÕ ÄÀÍÍÛÕ ÂÐÅÌÅÍÈ ÈÇÌÅÐÅÍÈß ÄÎÑÒÓÏÍÎÑÒÈ ÑÅÐÂÅÐÀ  ÑÈÑÒÅÌÀÕ «ÎÁËÀ×ÍÛÕ ÂÛ×ÈÑËÅÍÈÉ»

90–94
(5)

Ðîìàíêåâè÷ Â. À.,
Ìîðîçîâ Ê. Â.,
Ôåñåíþê À. Ï.

ON THE METHOD OF MODIFICATION OF EDGE FUNCTIONS OF GL-MODELS

Ïðî îäèí ìåòîä ìîäèô³êàö³¿ ðåáåðíèõ ôóíêö³é GL-ìîäåëåé

ÎÁ ÎÄÍÎÌ ÌÅÒÎÄÅ ÌÎÄÈÔÈÊÀÖÈÈ ÐÅÁÅÐÍÛÕ ÔÓÍÊÖÈÉ GL-ÌÎÄÅËÅÉ

95–99
(5)

Ëàâðèùåâà Å. Ì.

COMPUTER INFORMATION TECHNOLOGIES AND NANOTECHNOLOGIES

Â²Ä ²ÍÔÎÐÌÀÖ²ÉÍÈÕ ÒÅÕÍÎËÎÃ²É ÄÎ ÁÅÇÏÅ×ÍÈX ÍÀÍÎÒÅÕÍÎËÎòÉ

ÎÒ ÈÍÔÎÐÌÀÖÈÎÍÍÛÕ ÒÅÕÍÎËÎÃÈÉ Ê ÁÅÇÎÏÀÑÍÛÌ ÍÀÍÎÒÅÕÍÎËÎÃÈßÌ

100–109
(10)

Äîëãîâ À. Þ.

INCREASE OF PARAMETR ESTIMATION ACCURACY OF CHECK SMALL SIZE SAMPLE WITH Weibull DISTRIBUTION

ϲÄÂÈÙÅÍÍß ÒÎ×ÍÎÑÒ² ÎÖ²ÍÎÊ ÏÀÐÀÌÅÒв ÊÎÍÒÐÎËÜÍί ÂÈÁ²ÐÊÈ ÌÀËÎÃÎ ÎÁÑßÃÓ ÏÐÈ ÐÎÇÏÎIJ˲ ÂÅÉÁÓËËÀ

ÏÎÂÛØÅÍÈÅ ÒÎ×ÍÎÑÒÈ ÎÖÅÍÎÊ ÏÀÐÀÌÅÒÐΠÊÎÍÒÐÎËÜÍÎÉ ÂÛÁÎÐÊÈ ÌÀËÎÃÎ ÎÁÚ¨ÌÀ ÏÐÈ ÐÀÑÏÐÅÄÅËÅÍÈÈ ÂÅÉÁÓËËÀ

110–114
(5)

Êîìëåâàÿ Í. Î.,
Êîìëåâîé À. Í.,
Òèì÷åíêî Á. È.

COMPARATIVE ANALYSIS OF TWO APPROACHES IN SOLVING THE PROBLEM OF CLASSIFICATION

ÏÎвÂÍßËÜÍÈÉ ÀÍÀË²Ç ÄÂÎÕ Ï²ÄÕÎIJ ÏÐÈ ÂÈвØÅÍͲ ÇÀÂÄÀÍÍß ÊËÀÑÈÔ²ÊÀÖ²¯

ÑÐÀÂÍÈÒÅËÜÍÛÉ ÀÍÀËÈÇ ÄÂÓÕ ÏÎÄÕÎÄΠÏÐÈ ÐÅØÅÍÈÈ ÇÀÄÀ×È ÊËÀÑÑÈÔÈÊÀÖÈÈ

115–119
(5)

Ìàåâñêèé Ä. À.,
Ìàåâñêàÿ Å. Ä.,
Äðîçä À. Â.

METRICS OF “SHADES OF GREEN” IN THE SOFTWARE

ÌÅÒÐÈÊÈ «Â²ÄÒ²Íʲ ÇÅËÅÍÎÃλ  ÏÐÎÃÐÀÌÍÎÌÓ ÇÀÁÅÇÏÅ×ÅÍͲ

ÌÅÒÐÈÊÈ «ÎÒÒÅÍÊΠÇÅËÅÍÎÃλ  ÏÐÎÃÐÀÌÌÍÎÌ ÎÁÅÑÏÅ×ÅÍÈÈ

120–124
(5)

Klym H.,
Ingram A.,
Kochan R.

METHODOLOGICAL APPROACH AND TREATMENT ALGORITHMS FOR PAL DATA OF NANOMATERIALS USING COMPUTER-BASED SYSTEMS

ÌÅÒÎÄÎËÎò×ÍÈÉ Ï²ÄÕ²Ä ÒÀ ÀËÃÎÐÈÒÌÈ ÎÏÐÀÖÞÂÀÍÍß ÏÀÑ ÄÀÍÈÕ ÍÀÍÎÌÀÒÅвÀË²Â Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ÊÎÌÏ’ÞÒÅÐÍί ÑÈÑÒÅÌÈ

ÌÅÒÎÄÎËÎÃÈ×ÅÑÊÈÉ ÏÎÄÕÎÄ È ÀËÃÎÐÈÒÌÛ ÎÁÐÀÁÎÒÊÈ ÏÀÑ ÄÀÍÍÛÕ ÍÀÍÎÌÀÒÅÐÈÀËÎÂ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÊÎÌÏÜÞÒÅÐÍÎÉ ÑÈÑÒÅÌÛ

125–129
(5)

Âîëî÷³é Á. Þ.,
Îç³ðêîâñüêèé Ë. Ä.,
Øê³ëþê Î. Ï.,
Ìàùàê À. Â.

METHOD OF EFFICIENCY ANALYSIS OF BEHAVIOR ALGORITHMS OF RADIO ELECTRONIC COMPLEX SYSTEM FOR CRITICAL APPLICATIONS

ÌÅÒÎÄ ÀÍÀ˲ÇÓ ÅÔÅÊÒÈÂÍÎÑÒ² ÀËÃÎÐÈÒ̲ ÏÎÂÅIJÍÊÈ ÐÀIJÎÅËÅÊÒÐÎÍÍÈÕ ÊÎÌÏËÅÊѲ ²ÄÏβÄÀËÜÍÎÃÎ ÏÐÈÇÍÀ×ÅÍÍß

ÌÅÒÎÄ ÀÍÀËÈÇÀ ÝÔÔÅÊÒÈÂÍÎÑÒÈ ÀËÃÎÐÈÒÌΠÏÎÂÅÄÅÍÈß ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÕ ÊÎÌÏËÅÊÑΠÎÒÂÅÒÑÒÂÅÍÍÎÃÎ ÍÀÇÍÀ×ÅÍÈß

130–134
(5)

Ïîíî÷îâíûé Þ. Ë.,
Ñèîðà À. À.,
Õàð÷åíêî Â. Ñ.

Availability MODELS two channel INFORMATION-MANAGEMENT SYSTEM WITH SOFTWARE UPDATE

ÌÎÄÅ˲ ÃÎÒÎÂÍÎÑÒ² äâîêàíàëüíî¿ ²íôîðìàö³éíî-óïðàâëÿþ÷î¿ ñèñòåìè Ç ÓÐÀÕÓÂÀÍÍßÌ ÎÍÎÂËÅÍÍß ÏÐÎÃÐÀÌÍÈÕ ÇÀÑÎÁ²Â

ÌÎÄÅËÈ ÃÎÒÎÂÍÎÑÒÈ ÄÂÓÕÊÀÍÀËÜÍÎÉ ÈÍÔÎÐÌÀÖÈÎÍÍÎ-ÓÏÐÀÂËßÞÙÅÉ ÑÈÑÒÅÌÛ Ñ Ó×ÅÒÎÌ ÎÁÍÎÂËÅÍÈß ÏÐÎÃÐÀÌÌÍÛÕ ÑÐÅÄÑÒÂ

135–139
(5)

Ãàðàíòîçäàòí³ñòü òà ðåç³ë’ºíòí³ñòü õìàðíèõ ñèñòåì

Ìåëåíåö À. Â.

Multiversion MODEL of PROTECTION OF THE CLOUD FROM DDOS-attack

ÁÀÃÀÒÎÂÅÐѲÉÍÀ ÌÎÄÅËÜ ÇÀÙÈÑÒÓ ÕÌÀÐÈ Â²Ä DDoS-àòàê

ÌÍÎÃÎÂÅÐÑÈÎÍÍÀß ÌÎÄÅËÜ ÇÀÙÈÒÛ ÎÁËÀÊÀ ÎÒ DDOS-ÀÒÀÊÈ

140–144
(5)

Ëóêàøåíêî Â. Â.

COMPARATIVE ANALYSIS AND OPTIMIZATION OF PROTOCOLS FOR DELAY-TOLERANT NETWORKS

ÏÎвÂÍßËÜÍÈÉ ÀÍÀË²Ç ² ÎÏÒÈ̲ÇÀÖ²ß ÏÐÎÒÎÊÎ˲ ÄËß ÌÅÐÅÆ Ç ÍÈÇÜÊÎÞ ×ÓÒËȲÑÒÞ ÄÎ ÇÀÒÐÈÌÎÊ

ÑÐÀÂÍÈÒÅËÜÍÛÉ ÀÍÀËÈÇ È ÎÏÒÈÌÈÇÀÖÈß ÏÐÎÒÎÊÎËÎÂ ÄËß ÑÅÒÅÉ Ñ ÍÈÇÊÎÉ ×ÓÂÑÒÂÈÒÅËÜÍÎÑÒÜÞ Ê ÇÀÄÅÐÆÊÀÌ

145–149
(5)

³äìîâîáåçïåêà ñèñòåì íà ïðîãðàìîâàí³é ëîã³ö³

Åïèôàíîâ À. Ñ.

methods oF regularization of laws of functionings of field programmable gate arrays

ÌÅÒÎÄÈ äîâèçíà÷åííÿ ÇÀÊÎͲ ÔÓÍÊÖ²ÎÍÓÂÀÍÍß ïðîãðàìîâàíèõ ëîã³÷íèõ ³íòåãðàëüíèõ ñõåì

ÌÅÒÎÄÛ ÄÎÎÏÐÅÄÅËÅÍÈß ÇÀÊÎÍΠÔÓÍÊÖÈÎÍÈÐÎÂÀÍÈß ÏÐÎÃÐÀÌÌÈÐÓÅÌÛÕ ËÎÃÈ×ÅÑÊÈÕ ÈÍÒÅÃÐÀËÜÍÛÕ ÑÕÅÌ

150–156
(7)

Ðîìàíêåâè÷ À. Ì.,
Ìàéäàíþê È. Â.,
Ðîìàíêåâè÷ Â. À.

ABOUT FORMATION OF FUNCTIONS OF CONTROL FOR THE SEQUENCE GENERATOR OF BINARY VECTORS

Ïðî ôÎðìóâàííÿ ôóíêö³é óïðàâë³ííÿ äëÿ ãåíåðàòîðà ïîñë³äîâíîñòåé äâ³éêîâèõ âåêòîð³â

Î ÔÎÐÌÈÐÎÂÀÍÈÈ ÔÓÍÊÖÈÉ ÓÏÐÀÂËÅÍÈß ÄËß ÃÅÍÅÐÀÒÎÐÀ ÏÎÑËÅÄÎÂÀÒÅËÜÍÎÑÒÅÉ ÄÂÎÈ×ÍÛÕ ÂÅÊÒÎÐÎÂ

157–163
(7)

Çàùåëêèí Ê. Â.,
Èùåíêî À. À.,
Èâàíîâà Å. Í.

CLASSIFICATION PROBLEM SOLUTION OF CONTAINER UNITS AT JPEG-ATTACK ON STEGANOGRAPHIC METHOD OF BENHAM-MEMON-YEO-YEUNG

ÂÈвØÅÍÍß ÏÐÎÁËÅÌÈ ÊËÀÑÈÔ²ÊÀÖ²¯ ÁËÎʲ ÊÎÍÒÅÉÍÅÐÀ ÏÐÈ JPEG-ÀÒÀÖ² ÍÀ ÑÒÅÃÀÍÎÃÐÀÔ²×ÍÈÉ ÌÅÒÎÄ ÁÅÍÃÀÌÀ-ÌÅÌÎÍÀ-ÅÎ-ÞÍÃ

ÐÅØÅÍÈÅ ÏÐÎÁËÅÌÛ ÊËÀÑÑÈÔÈÊÀÖÈÈ ÁËÎÊΠÊÎÍÒÅÉÍÅÐÀ ÏÐÈ JPEG-ÀÒÀÊÅ ÍÀ ÑÒÅÃÀÍÎÃÐÀÔÈ×ÅÑÊÈÉ ÌÅÒÎÄ ÁÅÍÃÀÌÀ-ÌÅÌÎÍÀ-ÝÎ-ÞÍÃ

164–168
(5)

Êàìåíñêèõ À. Í.,
Òþðèí Ñ. Ô.

fault detection uNIT MODEl of self-timed circuits

ÌÎÄÅËÜ ÏÐÈÑÒÐί ÊÎÍÒÐÎËÞ ÏÎÐÓØÅÍÜ ÑÀÌÎѲÍÕÐÎÍÍÈÕ ÑÕÅÌ

ÌÎÄÅËÜ ÓÑÒÐÎÉÑÒÂÀ ÎÁÍÀÐÓÆÅÍÈß ÍÅÈÑÏÐÀÂÍÎÑÒÅÉ ÑÀÌÎÑÈÍÕÐÎÍÍÛÕ ÑÕÅÌ

169–172
(4)

Ùåðáà÷åíêî Ñ. Ñ.,
Ñòðþê Î. Þ.,
Ðåçóíåíêî À. À.,
Ñåíàòîðîâ À. À.

A method of FPGA random access memory’s UPSETs modeling by means of fault injections in the registry transfer level

Ìåòîä ìîäåëþâàííÿ ÇÁί îïåðàòèâíî¿ ïàì’ÿò³ FPGA âíåñåííÿì äåôåêò³â íà ð³âí³ ðåã³ñòðîâèõ çâ’ÿçê³â

ÌÅÒÎÄ ÌÎÄÅËÈÐÎÂÀÍÈß ÑÁÎÅ ÎÏÅÐÀÒÈÂÍÎÉ ÏÀÌßÒÈ FPGA ÂÍÅÑÅÍÈÅÌ ÄÅÔÅÊÒΠÍÀ ÓÐÎÂÍÅ ÐÅÃÈÑÒÐÎÂÛÕ ÑÂßÇÅÉ

173–177
(5)

Áðîøåâàí Å. Â., Ïåðåïåëèöûí À. Å., Õàð÷åíêî Â. Ñ.

FPGA-BASED SCALABLE IMPLEMENTATION OF ENCRYPTION ALGORITHMS: IDEA ALGORITHM

ÌÀÑØÒÀÁÎÂÀÍÀ ÐÅÀ˲ÇÀÖ²ß ÀËÃÎÐÈÒ̲ ØÈÔÐÓÂÀÍÍß ÍÀ Ï˲Ñ: ÀËÃÎÐÈÒÌ IDEA

ÌÀÑØÒÀÁÈÐÓÅÌÀß ÐÅÀËÈÇÀÖÈß ÀËÃÎÐÈÒÌÎÂ ØÈÔÐÎÂÀÍÈß ÍÀ ÏËÈÑ: ÀËÃÎÐÈÒÌ IDEA

178–182
(5)

 

 

 

Øàíîâí³ ÷èòà÷³!

Íàóêîâî-òåõí³÷íèé æóðíàë «ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ'ÞÒÅÐͲ ÑÈÑÒÅÌÈ»:

- âõîäèòü äî çàòâåðäæåíîãî ÄÀÊ Ïåðåë³êó íàóêîâèõ ôàõîâèõ âèäàíü Óêðà¿íè, â ÿêèõ ìîæóòü äðóêóâàòèñÿ îñíîâí³ ðåçóëüòàòè äèñåðòàö³éíèõ ðîá³ò íà çäîáóòòÿ íàóêîâèõ ñòóïåí³â äîêòîðà ³ êàíäèäàòà íàóê (äèâ. ïîñòàíîâó ïðåçè䳿 ÂÀÊ Óêðà¿íè ¹ 1-05/3 â³ä 8.07.2009 ð.);

- çáåð³ãàºòüñÿ ó çàãàëüíîäåðæàâí³é ðåôåðàòèâí³é áàç³ äàíèõ «Óêðà¿í³êà íàóêîâà» òà ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ óêðà¿íñüêîãî ðåôåðàòèâíîãî æóðíàëó «Äæåðåëî» (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.nbuv.gov.ua) (Óêðà¿íà);

- çáåð³ãàºòüñÿ ó ðåôåðàòèâí³é áàç³ äàíèõ Âñåðîñ³éñüêîãî ³íñòèòóòó íàóêîâî¿ ³ òåõí³÷íî¿ ³íôîðìàö³¿ (²ͲҲ) Ðîñ³éñüêî¿ àêàäå쳿 íàóê ³ ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÐÆ (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.viniti.ru) (Ðîñ³éñüêà Ôåäåðàö³ÿ);

- âêëþ÷åíèé â ì³æíàðîäí³ á³áë³îìåòðè÷í³ òà íàóêîìåòðè÷í³ áàçè äàíèõ: íàóêîâî¿ åëåêòðîííî¿ á³áë³îòåêè eLIBRARY.RU (Ðîñ³éñüêà Ôåäåðàö³ÿ), Index Copernicus (Ïîëüùà), INSPEC (Institution of Engineering and Technology, Âåëèêîáðèòàí³ÿ), Google Scholar.