Íàö³îíàëüíèé
àåðîêîñì³÷íèé óí³âåðñèòåò ³ì. Ì.ª. Æóêîâñüêîãî “Õàðê³âñüêèé àâ³àö³éíèé
³íñòèòóò”
ISSN 1814-4225. ÐÀIJÎÅËÅÊÒÐÎÍͲ ²
ÊÎÌÏ’ÞÒÅÐͲ ÑÈÑÒÅÌÈ. – 2014. – ¹ 6 (70).
– 184 ñ.
ISSN 1814-4225. ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÅ È ÊÎÌÏÜÞÒÅÐÍÛÅ ÑÈÑÒÅÌÛ. – 2014. – ¹ 6 (70). – 184
ñ.
ISSN 1814-4225. RADIOELECTRONIC
AND COMPUTER SYSTEMS. – 2014. – ¹ 6 (70). – 184 ñ.
Ìàòåð³àëè, ùî ì³ñòÿòüñÿ â æóðíàë³, îïóáë³êîâàí³ çà ð³øåííÿì VII ì³æíàðîäíî¿ íàóêîâî-òåõí³÷íî¿ êîíôåðåíö³¿¿
«Ãàðàíòîçäàòí³ ñèñòåìè, ñåðâ³ñè òà òåõíîëî㳿 (DESSERT 2014)»
ÑÒÀÒÒ² (articleS)
Àâòîðè |
Íàçâà ñòàòò³ (article title) |
Ñòîð³íêè (pages) |
||
English |
Óêðà¿íñüêà ìîâà |
Ðóññêèé ÿçûê |
||
Áåçïåêà
êðèòè÷íèõ ³íôðàñòðóêòóð |
||||
Çàåö À. Þ., |
DEPENDABLE
OCEANTECHNOLOGIES SYSTEMS UNDER THE INFLUENCE OF EXTERNAL ICE LOADS |
ÃÀÐÀÍÒÎÇÄÀÒͲÑÒÜ ÎÊÅÀÍÎÒÅÕͲ×ÍÈÕ ÑÈÑÒÅÌ
ÏÐÈ Ä²¯ ÇÎÂͲØÍ²Õ ËÜÎÄÎÂÈÕ ÍÀÂÀÍÒÀÆÅÍÜ |
ÃÀÐÀÍÒÎÑÏÎÑÎÁÍÎÑÒÜ
ÎÊÅÀÍÎÒÅÕÍÈ×ÅÑÊÈÕ ÑÈÑÒÅÌ ÏÐÈ ÂÎÇÄÅÉÑÒÂÈÈ ÂÍÅØÍÈÕ ËÅÄÎÂÛÕ ÍÀÃÐÓÇÎÊ |
7–11 |
Ñêàðãà- |
the MODELs FOR EVALUATING ENVIRONMENTAL SEcurity OF REGION |
ÌÎÄÅ˲ ÎÖ²ÍÊÈ ÅÊÎËÎò×Íί ÁÅÇÏÅÊÈ
ÐÅòÎÍÓ |
12–16 |
|
Prochazkova D. |
DETERMINATION OF SEISMIC HAZARD AND ITS CONTRIBUTION TO
SEISMIC RISK OF NUCLEAR FACILITY |
ÏÎÍßÒÒß ÑÅÉÑ̲×Íί
ÍÅÁÅÇÏÅÊÈ ÒÀ ÉÎÃÎ ÂÊËÀÄ Ó ÑÅÉÑ̲×ÍÈÉ ÐÈÇÈÊ ßÄÅÐÍÈÕ ÎÁ’ªÊҲ |
ÏÎÍßÒÈÅ
ÑÅÉÑÌÈ×ÅÑÊÎÉ ÎÏÀÑÍÎÑÒÈ È ÅÃÎ ÂÊËÀÄ Â ÑÅÉÑÌÈ×ÅÑÊÈÉ ÐÈÑÊ ßÄÅÐÍÛÕ ÎÁÚÅÊÒΠ|
17–22 |
Prochazkova
D. |
ÐÅÇÓËÜÒÀÒÈ ÏÐÎÅÊÒÓ FOCUS |
ÐÅÇÓËÜÒÀÒÛ ÏÐÎÅÊÒÀ FOCUS |
23–26 |
|
Prochazkova D.,
Prochazka J. |
ÌÎÄÅËÜ ÊÅÐÓÂÀÍÍß ÁÅÇÏÅÊÎÞ ²ÍÔÎÐÌÀÖ²ÉÍÈÕ
²ÍÔÐÀÑÒÐÓÊÒÓÐ |
ÌÎÄÅËÜ ÓÏÐÀÂËÅÍÈß ÁÅÇÎÏÀÑÍÎÑÒÜÞ ÊÐÈÒÈ×ÅÑÊÈÕ
ÈÍÔÐÀÑÒÐÓÊÒÓÐ |
27–32 |
|
ßê³ñòü
òà íàä³éí³ñòü ÏÇ |
||||
Ãîâîðóùåíêî Ò. Î. |
APPLYING OF BACKCASTING AT THE DESIGN
STAGE FOR SOFTWARE QUALITY ASSURANCE |
ÈÑÏÎËÜÇÎÂÀÍÈÅ ÐÅÒÐÎÑÏÅÊÒÈÂÍÎÃÎ ÀÍÀËÈÇÀ
(BACKCASTING) ÍÀ ÝÒÀÏÅ ÏÐÎÅÊÒÈÐÎÂÀÍÈß ÄËß ÎÁÅÑÏÅ×ÅÍÈß ÊÀ×ÅÑÒÂÀ ÏÐÎÃÐÀÌÌÍÎÃÎ
ÎÁÅÑÏÅ×ÅÍÈß |
33–38 |
|
Öèáàºâ ª. ²., |
EVALUATION OF PROGRAM EXECUTION TIME |
ÎÖÅÍÊÀ ÂÐÅÌÅÍÈ
ÂÛÏÎËÍÅÍÈß ÏÐÎÃÐÀÌÌ |
39–42 |
|
Ôåäîñååâà À. À. |
ASSESSMENT Requirements
to the software for the pharmaceutical enterprise based Safety-case
metodology |
îö³íêà âèìîã
äî ïðîãðàìíîãî çàáåçïå÷åííÿ ôàðìàöåâòè÷íîãî ï³äïðèºìñòâà íà îñíîâ³
Safety-case ìåòîäîëî㳿 |
43–47 |
|
Íåãóðèöÿ Ä. Ñ. |
Adaptability and adaptability of software CRITICAL systems |
ÀÄÀÏÒÈÂͲÑÒÜ ÒÀ
ÀÄÀÏÒÎÂÀͲÑÒÜ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÑÈÑÒÅÌ ÊÐÈÒÈ×ÍÎÃÎ ÏÐÈÇÍÀ×ÅÍÍß |
Àäàïòèâíîñòü È
ÀÄÀÏÒÈðóåìîÑÒÜ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÑÈÑÒÅÌ ÊÐÈÒÈ×ÅÑÊÎÃÎ ÍÀÇÍÀ×ÅÍÈÅ |
48–52 |
Áóé Ä. Á., |
COMPLEXITY OF
OPERATIONS IN DATABASE SYSTEMS (A SURVEY) |
ÑÊËÀÄͲÑÒÜ ÎÏÅÐÀÖ²É Ç ÁÀÇÀÌÈ ÄÀÍÈÕ
(ÎÃËßÄ) |
53–59 |
|
Ñêàðãà-Áàíäóðîâà È. C., |
The software
quality enhancement for safety-critical systems with static analysis
techniques |
ϲÄÂÈÙÅÍÍß ßÊÎÑÒ² ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß
ÑÈÑÒÅÌ ÊÐÈÒÈ×ÍÎÃÎ ÏÐÈÇÍÀ×ÅÍÍß Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ÌÅÒÎIJ ÑÒÀÒÈ×ÍÎÃÎ ÀÍÀ˲ÇÓ |
60–63 |
|
Ìàåâñêèé Ä. À., |
AUTHORSHIP
ATTRIBUTION OF SOFTWARE THROUGH SOURCE CODE |
ÂÈÇÍÀ×ÅÍÍß ÀÂÒÎÐÑÒÂÀ ÏÐÎÃÐÀÌÍÎÃÎ
ÇÀÁÅÇÏÅ×ÅÍÍß ÇÀ ÏÎ×ÀÒÊÎÂÈÌ ÊÎÄÎÌ ÏÐÎÃÐÀÌ |
ÎÏÐÅÄÅËÅÍÈÅ
ÀÂÒÎÐÑÒÂÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÏÎ ÈÑÕÎÄÍÎÌÓ ÊÎÄÓ ÏÐÎÃÐÀÌÌ |
64–68 |
Ivanchenko
O. V., |
OPTIMIZATION OF THE TEST CONTROL OF SOFTWARE CRITICAL
APPLICATION |
ÎÏÒÈ̲ÇÀÖ²ß ÒÅÑÒÎÂÎÃÎ ÊÎÍÒÐÎËÞ
ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÊÐÈÒÈ×ÍÎÃÎ ÄÎÄÀÒÊÀ |
ÎÏÒÈÌÈÇÀÖÈß ÒÅÑÒÎÂÎÃÎ ÊÎÍÒÐÎËß
ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÊÐÈÒÈ×ÅÑÊÎÃÎ ÏÐÈËÎÆÅÍÈß |
69–73 |
Çåëåí³
îá÷èñëåííÿ òà êîìóí³êàö³¿ |
||||
Òóðêèí È. Á., |
ENERGY SAVING FUNCTIONS
of the SOFTWARE of MOBILE DEVICES |
Åíåðãîçáåð³ãàþ÷³
ôóíêö³¿ ïðîãðàìíîãî çàáåçïå÷åííÿ ìîá³ëüíèõ ÏÐÈÑÒÐί |
ÝÍÅÐÃÎÑÁÅÐÅÃÀÞÙÈÅ
ÔÓÍÊÖÈÈ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÌÎÁÈËÜÍÛÕ ÓÑÒÐÎÉÑÒ |
74–78 |
Òàðàñþê Î. Ì. |
MEANS OF
SOLVING A PROBLEM OF UNEVEN DISTRIBUTION OF AIRTIME CONSUMPTION IN WIRELESS
NETWORKS |
ÑÏÎÑÎÁÈ ÂÈвØÅÍÍß ÏÐÎÁËÅÌÈ
ÍÅвÂÍÎ̲ÐÍÎÃÎ ÐÎÇÏÎIJËÓ ×ÀÑÓ ÓÒÐÈÌÀÍÍß ÑÅÐÅÄÎÂÈÙÀ ÏÅÐÅÄÀײ  ÁÅÇÄÐÎÒÎÂÈÕ
ÌÅÐÅÆÀÕ |
79–84 |
|
Ïëàõòååâ À. Ï., |
FOREST FIRES MONITORING SYSTEM BASED ON
SENSOR NETWORKS |
ÑÈÑÒÅÌÀ ÌÎͲÒÎÐÈÍÃÓ Ë²ÑÎÂÈÕ ÏÎÆÅÆ ÍÀ ÎÑÍβ
ÑÅÍÑÎÐÍÈÕ ÌÅÐÅÆ |
ÑÈÑÒÅÌÀ
ÌÎÍÈÒÎÐÈÍÃÀ ËÅÑÍÛÕ ÏÎÆÀÐÎÂ ÍÀ ÎÑÍÎÂÅ ÑÅÍÑÎÐÍÛÕ ÑÅÒÅÉ |
85–89 |
ijàãíîñòóâàííÿ
òà íàä³éí³ñòü êîìï’þòåðíèõ ñèñòåì |
||||
Ãîðáåíêî À. Â., |
THE COMPARATIVE ANALYSIS OF THE METHODS
OF RECOVERY OF THE PASSED DATA MESUREMENT
OF TIME OF AVAILABILITY OF THE SERVER IN THE SYSTEMS OF "CLOUD
COMPUTING" |
ÏÎвÂÍßËÜÍÈÉ ÀÍÀË²Ç ÌÅÒÎIJ ²ÄÍÎÂËÅÍÍß
ÏÐÎÏÓÙÅÍÈÕ ÄÀÍÈÕ ÇÀ̲ÐÞÂÀÍÍß ×ÀÑÓ
ÄÎÑÒÓÏÍÎÑÒ² ÑÅÐÂÅÐÀ  ÑÈÑÒÅÌÀÕ «ÕÌÀÐÍÈÕ ÎÁ×ÈÑËÅÍÜ» |
90–94 |
|
Ðîìàíêåâè÷ Â. À., |
ON THE METHOD OF MODIFICATION OF EDGE FUNCTIONS OF GL-MODELS |
Ïðî îäèí ìåòîä
ìîäèô³êàö³¿ ðåáåðíèõ ôóíêö³é GL-ìîäåëåé |
95–99 |
|
Ëàâðèùåâà Å. Ì. |
COMPUTER
INFORMATION TECHNOLOGIES AND NANOTECHNOLOGIES |
Â²Ä ²ÍÔÎÐÌÀÖ²ÉÍÈÕ ÒÅÕÍÎËÎÃ²É ÄÎ
ÁÅÇÏÅ×ÍÈX ÍÀÍÎÒÅÕÍÎËÎÃ²É |
100–109 |
|
Äîëãîâ À. Þ. |
INCREASE OF PARAMETR
ESTIMATION ACCURACY OF CHECK SMALL SIZE SAMPLE WITH Weibull DISTRIBUTION |
ϲÄÂÈÙÅÍÍß
ÒÎ×ÍÎÑÒ² ÎÖ²ÍÎÊ ÏÀÐÀÌÅÒв ÊÎÍÒÐÎËÜÍί ÂÈÁ²ÐÊÈ ÌÀËÎÃÎ ÎÁÑßÃÓ ÏÐÈ ÐÎÇÏÎIJ˲
ÂÅÉÁÓËËÀ |
ÏÎÂÛØÅÍÈÅ ÒÎ×ÍÎÑÒÈ
ÎÖÅÍÎÊ ÏÀÐÀÌÅÒÐΠÊÎÍÒÐÎËÜÍÎÉ ÂÛÁÎÐÊÈ ÌÀËÎÃÎ ÎÁÚ¨ÌÀ ÏÐÈ ÐÀÑÏÐÅÄÅËÅÍÈÈ
ÂÅÉÁÓËËÀ |
110–114 |
Êîìëåâàÿ Í. Î., |
COMPARATIVE
ANALYSIS OF TWO APPROACHES IN SOLVING THE PROBLEM OF CLASSIFICATION |
ÏÎвÂÍßËÜÍÈÉ ÀÍÀË²Ç ÄÂÎÕ Ï²ÄÕÎIJ ÏÐÈ
ÂÈвØÅÍͲ ÇÀÂÄÀÍÍß ÊËÀÑÈÔ²ÊÀÖ²¯ |
ÑÐÀÂÍÈÒÅËÜÍÛÉ
ÀÍÀËÈÇ ÄÂÓÕ ÏÎÄÕÎÄΠÏÐÈ ÐÅØÅÍÈÈ ÇÀÄÀ×È ÊËÀÑÑÈÔÈÊÀÖÈÈ |
115–119 |
Ìàåâñêèé Ä. À., |
METRICS OF
“SHADES OF GREEN” IN THE SOFTWARE |
ÌÅÒÐÈÊÈ «Â²ÄÒ²Íʲ ÇÅËÅÍÎÃλ Â
ÏÐÎÃÐÀÌÍÎÌÓ ÇÀÁÅÇÏÅ×ÅÍͲ |
120–124 |
|
Klym
H., |
ÌÅÒÎÄÎËÎò×ÍÈÉ Ï²ÄÕ²Ä ÒÀ ÀËÃÎÐÈÒÌÈ
ÎÏÐÀÖÞÂÀÍÍß ÏÀÑ ÄÀÍÈÕ ÍÀÍÎÌÀÒÅвÀË²Â Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ÊÎÌÏ’ÞÒÅÐÍί ÑÈÑÒÅÌÈ |
ÌÅÒÎÄÎËÎÃÈ×ÅÑÊÈÉ ÏÎÄÕÎÄ È ÀËÃÎÐÈÒÌÛ
ÎÁÐÀÁÎÒÊÈ ÏÀÑ ÄÀÍÍÛÕ ÍÀÍÎÌÀÒÅÐÈÀËÎÂ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÊÎÌÏÜÞÒÅÐÍÎÉ ÑÈÑÒÅÌÛ |
125–129 |
|
Âîëî÷³é Á. Þ., |
METHOD OF
EFFICIENCY ANALYSIS OF BEHAVIOR ALGORITHMS OF RADIO ELECTRONIC COMPLEX SYSTEM
FOR CRITICAL APPLICATIONS |
ÌÅÒÎÄ ÀÍÀËÈÇÀ ÝÔÔÅÊÒÈÂÍÎÑÒÈ ÀËÃÎÐÈÒÌÎÂ ÏÎÂÅÄÅÍÈß ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÕ
ÊÎÌÏËÅÊÑΠÎÒÂÅÒÑÒÂÅÍÍÎÃÎ ÍÀÇÍÀ×ÅÍÈß |
130–134 |
|
Ïîíî÷îâíûé Þ. Ë., |
Availability MODELS two channel INFORMATION-MANAGEMENT SYSTEM WITH
SOFTWARE UPDATE |
ÌÎÄÅ˲ ÃÎÒÎÂÍÎÑÒ² äâîêàíàëüíî¿ ²íôîðìàö³éíî-óïðàâëÿþ÷î¿ ñèñòåìè Ç
ÓÐÀÕÓÂÀÍÍßÌ ÎÍÎÂËÅÍÍß ÏÐÎÃÐÀÌÍÈÕ ÇÀÑÎÁ²Â |
135–139 |
|
Ãàðàíòîçäàòí³ñòü
òà ðåç³ë’ºíòí³ñòü õìàðíèõ ñèñòåì |
||||
Ìåëåíåö À. Â. |
Multiversion MODEL of PROTECTION OF THE CLOUD FROM DDOS-attack |
ÁÀÃÀÒÎÂÅÐѲÉÍÀ
ÌÎÄÅËÜ ÇÀÙÈÑÒÓ ÕÌÀÐÈ Â²Ä DDoS-àòàê |
140–144 |
|
Ëóêàøåíêî Â. Â. |
COMPARATIVE
ANALYSIS AND OPTIMIZATION OF PROTOCOLS FOR DELAY-TOLERANT NETWORKS |
ÏÎвÂÍßËÜÍÈÉ ÀÍÀË²Ç ² ÎÏÒÈ̲ÇÀÖ²ß
ÏÐÎÒÎÊÎ˲ ÄËß ÌÅÐÅÆ Ç ÍÈÇÜÊÎÞ ×ÓÒËȲÑÒÞ ÄÎ ÇÀÒÐÈÌÎÊ |
ÑÐÀÂÍÈÒÅËÜÍÛÉ
ÀÍÀËÈÇ È ÎÏÒÈÌÈÇÀÖÈß ÏÐÎÒÎÊÎËÎÂ ÄËß ÑÅÒÅÉ Ñ ÍÈÇÊÎÉ ×ÓÂÑÒÂÈÒÅËÜÍÎÑÒÜÞ Ê
ÇÀÄÅÐÆÊÀÌ |
145–149 |
³äìîâîáåçïåêà
ñèñòåì íà ïðîãðàìîâàí³é ëîã³ö³ |
||||
Åïèôàíîâ À. Ñ. |
methods oF regularization of laws of functionings of field
programmable gate arrays |
ÌÅÒÎÄÈ
äîâèçíà÷åííÿ ÇÀÊÎͲ ÔÓÍÊÖ²ÎÍÓÂÀÍÍß ïðîãðàìîâàíèõ ëîã³÷íèõ ³íòåãðàëüíèõ ñõåì |
ÌÅÒÎÄÛ
ÄÎÎÏÐÅÄÅËÅÍÈß ÇÀÊÎÍΠÔÓÍÊÖÈÎÍÈÐÎÂÀÍÈß ÏÐÎÃÐÀÌÌÈÐÓÅÌÛÕ ËÎÃÈ×ÅÑÊÈÕ
ÈÍÒÅÃÐÀËÜÍÛÕ ÑÕÅÌ |
150–156 |
Ðîìàíêåâè÷ À. Ì., |
ABOUT FORMATION OF FUNCTIONS OF CONTROL FOR THE SEQUENCE GENERATOR OF
BINARY VECTORS |
Ïðî ôÎðìóâàííÿ
ôóíêö³é óïðàâë³ííÿ äëÿ ãåíåðàòîðà ïîñë³äîâíîñòåé äâ³éêîâèõ âåêòîð³â |
Î ÔÎÐÌÈÐÎÂÀÍÈÈ
ÔÓÍÊÖÈÉ ÓÏÐÀÂËÅÍÈß ÄËß ÃÅÍÅÐÀÒÎÐÀ ÏÎÑËÅÄÎÂÀÒÅËÜÍÎÑÒÅÉ ÄÂÎÈ×ÍÛÕ ÂÅÊÒÎÐΠ|
157–163 |
Çàùåëêèí Ê. Â., |
CLASSIFICATION
PROBLEM SOLUTION OF CONTAINER UNITS AT JPEG-ATTACK ON STEGANOGRAPHIC METHOD
OF BENHAM-MEMON-YEO-YEUNG |
ÂÈвØÅÍÍß ÏÐÎÁËÅÌÈ
ÊËÀÑÈÔ²ÊÀÖ²¯ ÁËÎʲ ÊÎÍÒÅÉÍÅÐÀ ÏÐÈ JPEG-ÀÒÀÖ²
ÍÀ ÑÒÅÃÀÍÎÃÐÀÔ²×ÍÈÉ ÌÅÒÎÄ ÁÅÍÃÀÌÀ-ÌÅÌÎÍÀ-ÅÎ-ÞÍà |
164–168 |
|
Êàìåíñêèõ À. Í., |
fault detection uNIT MODEl of self-timed circuits |
ÌÎÄÅËÜ ÏÐÈÑÒÐί ÊÎÍÒÐÎËÞ ÏÎÐÓØÅÍÜ
ÑÀÌÎѲÍÕÐÎÍÍÈÕ ÑÕÅÌ |
ÌÎÄÅËÜ
ÓÑÒÐÎÉÑÒÂÀ ÎÁÍÀÐÓÆÅÍÈß ÍÅÈÑÏÐÀÂÍÎÑÒÅÉ ÑÀÌÎÑÈÍÕÐÎÍÍÛÕ ÑÕÅÌ |
169–172 |
Ùåðáà÷åíêî Ñ. Ñ., |
A method of FPGA random access memory’s UPSETs modeling by means of
fault injections in the registry transfer level |
Ìåòîä ìîäåëþâàííÿ ÇÁί îïåðàòèâíî¿ ïàì’ÿò³ FPGA âíåñåííÿì äåôåêò³â íà
ð³âí³ ðåã³ñòðîâèõ çâ’ÿçê³â |
ÌÅÒÎÄ
ÌÎÄÅËÈÐÎÂÀÍÈß ÑÁÎÅ ÎÏÅÐÀÒÈÂÍÎÉ ÏÀÌßÒÈ FPGA ÂÍÅÑÅÍÈÅÌ ÄÅÔÅÊÒΠÍÀ ÓÐÎÂÍÅ ÐÅÃÈÑÒÐÎÂÛÕ ÑÂßÇÅÉ |
173–177 |
Áðîøåâàí Å. Â., Ïåðåïåëèöûí À. Å.,
Õàð÷åíêî Â. Ñ. |
FPGA-BASED SCALABLE IMPLEMENTATION OF ENCRYPTION ALGORITHMS: IDEA
ALGORITHM |
ÌÀÑØÒÀÁÎÂÀÍÀ
ÐÅÀ˲ÇÀÖ²ß ÀËÃÎÐÈÒ̲ ØÈÔÐÓÂÀÍÍß ÍÀ Ï˲Ñ: ÀËÃÎÐÈÒÌ IDEA |
ÌÀÑØÒÀÁÈÐÓÅÌÀß
ÐÅÀËÈÇÀÖÈß ÀËÃÎÐÈÒÌÎÂ ØÈÔÐÎÂÀÍÈß ÍÀ ÏËÈÑ: ÀËÃÎÐÈÒÌ IDEA |
178–182 |
Øàíîâí³
÷èòà÷³!
Íàóêîâî-òåõí³÷íèé æóðíàë «ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ'ÞÒÅÐͲ ÑÈÑÒÅÌÈ»:
- âõîäèòü äî çàòâåðäæåíîãî
ÄÀÊ Ïåðåë³êó íàóêîâèõ ôàõîâèõ âèäàíü Óêðà¿íè, â ÿêèõ ìîæóòü äðóêóâàòèñÿ îñíîâí³
ðåçóëüòàòè äèñåðòàö³éíèõ ðîá³ò íà çäîáóòòÿ íàóêîâèõ ñòóïåí³â äîêòîðà ³
êàíäèäàòà íàóê (äèâ. ïîñòàíîâó ïðåçè䳿
ÂÀÊ Óêðà¿íè ¹ 1-05/3 â³ä 8.07.2009 ð.);
- çáåð³ãàºòüñÿ ó
çàãàëüíîäåðæàâí³é ðåôåðàòèâí³é áàç³ äàíèõ «Óêðà¿í³êà
íàóêîâà» òà ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ óêðà¿íñüêîãî
ðåôåðàòèâíîãî æóðíàëó «Äæåðåëî»
(â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.nbuv.gov.ua) (Óêðà¿íà);
- çáåð³ãàºòüñÿ ó
ðåôåðàòèâí³é áàç³ äàíèõ Âñåðîñ³éñüêîãî ³íñòèòóòó íàóêîâî¿ ³ òåõí³÷íî¿
³íôîðìàö³¿ (²ͲҲ) Ðîñ³éñüêî¿
àêàäå쳿 íàóê ³ ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÐÆ (â³ëüíèé
îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.viniti.ru) (Ðîñ³éñüêà Ôåäåðàö³ÿ);
- âêëþ÷åíèé â ì³æíàðîäí³
á³áë³îìåòðè÷í³ òà íàóêîìåòðè÷í³ áàçè
äàíèõ: íàóêîâî¿ åëåêòðîííî¿ á³áë³îòåêè eLIBRARY.RU
(Ðîñ³éñüêà Ôåäåðàö³ÿ), Index Copernicus
(Ïîëüùà), INSPEC (Institution of
Engineering and Technology, Âåëèêîáðèòàí³ÿ), Google Scholar.