Íàö³îíàëüíèé àåðîêîñì³÷íèé óí³âåðñèòåò ³ì. Ì.ª. Æóêîâñüêîãî “Õàðê³âñüêèé àâ³àö³éíèé ³íñòèòóò”

 

ISSN 1814-4225. ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ’ÞÒÅÐͲ ÑÈÑÒÅÌÈ. – 2016. ¹ 5 (79). – 216 ñ.

ISSN 1814-4225. ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÅ È ÊÎÌÏÜÞÒÅÐÍÛÅ ÑÈÑÒÅÌÛ. – 2016. ¹ 5 (79). – 216 ñ.

ISSN 1814-4225. RADIOELECTRONIC AND COMPUTER SYSTEMS. – 2016. ¹ 5 (79).216 ñ.

 

Ìàòåð³àëè, ùî ì³ñòÿòüñÿ â æóðíàë³, îïóáë³êîâàí³ çà ð³øåííÿì Ïðîãðàìíîãî êîì³òåòó
̳æíàðîäíî¿ íàóêîâî-òåõí³÷íî¿ êîíôåðåíö³¿ «CYBER FORUM DESSERT 2016»

 

ÑÒÀÒÒ² (articleS)

 

Àâòîðè (ìîâà îðèã³íàëó)

Íàçâà ñòàòò³ (article title)

Ñòîð³íêè

(pages)

English

Óêðà¿íñüêà ìîâà

Ðóññêèé ÿçûê

Ãàðàíòîçäàòí³ñòü òà ðåç³ë’ºíòí³ñòü õìàðíèõ ñèñòåì

Äóáíèöêèé Â. Þ.,
Çåëèíêî È. Â.,
Õàð÷åíêî Â. Ñ.,
ßñüêî À. Â.

SCIENTOMETRIC ANALYSIS OF CONFERENCES «DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES» (DESSERT 2006-2014)

ÍÀÓÊÎÌÅÒÐÈ×ÍÈÉ ÀÍÀË²Ç ÊÎÍÔÅÐÅÍÖ²É «ÃÀÐÀÍÒÎÇÄÀÒͲ ÑÈÑÒÅÌÈ, ÑÅвÑÈ ² ÒÅÕÍÎËÎò¯» (DESSERT 2006-2014)

ÍÀÓÊÎÌÅÒÐÈ×ÅÑÊÈÉ ÀÍÀËÈÇ ÊÎÍÔÅÐÅÍÖÈÉ «ÃÀÐÀÍÒÎÑÏÎÑÎÁÍÛÅ ÑÈÑÒÅÌÛ, ÑÅÐÂÈÑÛ È ÒÅÕÍÎËÎÃÈÈ» (DESSERT 2006-2014)

6–14
 (9)

Èâàí÷åíêî Î. Â.,
Õàð÷åíêî Â. Ñ.

SEMI-MARKOV AVAILABILITY MODEL FOR CLOUD INFRASTRUCTURE WITH INTEGRATED TECHNICAL STATE CONTROL SYSTEM

ÍÀϲÂÌÀÐʲÂÑÜÊÀ ÌÎÄÅËÜ ÃÎÒÎÂÍÎÑÒ² ÕÌÀÐÍί ²ÍÔÐÀÑÒÐÓÊÒÓÐÈ Ç ²ÍÒÅÃÐÎÂÀÍÎÞ ÑÈÑÒÅÌÎÞ ÌÎͲÒÎÐÈÍÃÓ ÒÅÕͲ×ÍÎÃÎ ÑÒÀÍÓ

ÏÎËÓÌÀÐÊÎÂÑÊÀß ÌÎÄÅËÜ ÃÎÒÎÂÍÎÑÒÈ ÎÁËÀ×ÍÎÉ ÈÍÔÐÀÑÒÐÓÊÒÓÐÛ Ñ ÈÍÒÅÃÐÈÐÎÂÀÍÍÎÉ ÑÈÑÒÅÌÎÉ ÌÎÍÈÒÎÐÈÍÃÀ ÒÅÕÍÈ×ÅÑÊÎÃÎ ÑÎÑÒÎßÍÈß

15–19
 (5)

Kazymyr V. V.,
Posadska A.S.,
Sysa D. M.

CLOUD SIMULATION ENVIRONMENT BASED ON HLA

ÌÎÄÅËÞÂÀÍÍß Â ÕÌÀÐÍÎÌÓ ÑÅÐÅÄÎÂÈÙ² ÍÀ ÎÑÍβ HLA

ÌÎÄÅËÈÐÎÂÀÍÈÅ Â ÎÁËÀ×ÍÎÉ ÑÐÅÄÅ ÍÀ ÎÑÍÎÂÅ HLA

20–25
 (6)

²íôîðìàö³éíà òà ôóíêö³îíàëüíà áåçïåêà ²ÓÑ

Áðåæíåâ Å. Â.,
Êîâàëåíêî À. À.,
Èëüÿøåíêî Î. À.

ASSURANCE OF CYBER SECURITY FOR I&C SYSTEMS IMPORTANT TO SAFETY: PROCESS APPROACH BASED ON QUALITY MANAGEMENT SYSTEM

ÇÀÁÅÇÏÅ×ÅÍÍß ²ÍÔÎÐÌÀÖ²ÉÍÍί ÁÅÇÏÅÊÈ ²ÓÑ ÂÀÆËÈÂÈÕ ÄËß ÁÅÇÏÅÊÈ: ÏÐÎÖÅÑÍÈÉ Ï²ÄÕ²Ä ÍÀ ÎÑÍβ ÑÈÑÒÅÌÈ ÌÅÍÅÄÆÌÅÍÒÓ ßÊÎÑÒ²

ÎÁÅÑÏÅ×ÅÍÈÅ ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ ÈÓÑ, ÂÀÆÍÛÕ ÄËß ÁÅÇÎÏÀÑÍÎÑÒÈ: ÏÐÎÖÅÑÑÍÛÉ ÏÎÄÕÎÄ ÍÀ ÎÑÍÎÂÅ ÑÈÑÒÅÌÛ ÌÅÍÅÄÆÌÅÍÒÀ ÊÀ×ÅÑÒÂÀ

26–32
 (7)

Áàëàêèí Ñ. Â.,
Æóêîâ È. À.

DETECTION OF COMPUTER ATTACKS USING OUTLINER METHOD

ÂÈßÂËÅÍÍß ÊÎÌÏ’ÞÒÅÐÍÈÕ ÀÒÀÊ ÇÀ ÄÎÏÎÌÎÃÎÞ ÌÅÒÎÄÓ Â²ÄÕÈËÅÍÜ

ÎÁÍÀÐÓÆÅÍÈÅ ÊÎÌÏÜÞÒÅÐÍÛÕ ÀÒÀÊ Ñ ÏÎÌÎÙÜÞ ÌÅÒÎÄÀ ÎÒÊËÎÍÅÍÈÉ

33–37
 
(5)

Ñàâåíêî Î. Ñ.,
Ëèñåíêî Ñ. Ì.,
Áîáðîâí³êîâà Ê. Þ.

THE INFORMATION TECHNOLOGY FOR BOTNET DETECTION BASED ON DNS-TRAFFIC ANALYSIS

²ÍÔÎÐÌÀÖ²ÉÍÀ ÒÅÕÍÎËÎÃ²ß ÂÈßÂËÅÍÍß ÁÎÒ-ÌÅÐÅÆ ÍÀ ÎÑÍβ ÀÍÀ˲ÇÓ DNS-ÒÐÀÔ²ÊÀ

ÈÍÔÎÐÌÀÖÈÎÍÍÀß ÒÅÕÍÎËÎÃÈß ÎÁÍÀÐÓÆÅÍÈß ÁÎÒ-ÑÅÒÅÉ ÍÀ ÎÑÍÎÂÅ ÀÍÀËÈÇÀ DNS-ÒÐÀÔÈÊÀ

38–42
 (5)

Volochiy B.,
Ozirkovskyy L.,
Kulyk I.,
Zmysnyi M.

THE MAINTANANCE STATEGY OPTIMIZATION OF BASE STATIONS OF COMMUNICATION CELLULAR NETWORK

ÎÏÒÈ̲ÇÀÖ²ß ÑÒÐÀÒÅò¯ ÒÅÕͲ×ÍÎÃÎ ÎÁÑËÓÃÎÂÓÂÀÍÍß ÁÀÇÎÂÈÕ ÑÒÀÍÖ²É ÌÅÐÅƲ ÊÎ̲ÐÊÎÂÎÃÎ ÇÂ’ßÇÊÓ

ÎÏÒÈÌÈÇÀÖÈß ÑÒÐÀÒÅÃÈÈ ÒÅÕÍÈ×ÅÑÊÎÃÎ ÎÁÑËÓÆÈÂÀÍÈß ÁÀÇÎÂÛÕ ÑÒÀÍÖÈÉ ÑÅÒÈ ÑÎÒÎÂÎÉ ÑÂßÇÈ

43–53
 (11)

ßê³ñòü, íàä³éí³ñòü òà áåçïåêà ÏÇ

Ìàåâñêèé Ä. À.,
Ìàåâñêàÿ Å. Þ.,
×åðáàäæè Þ. Ï.

CLASSIFICATION EXISTING TOOLS FOR SOFTWARE RELIABILITY

CLASSIFICATION EXISTING TOOLS FOR SOFTWARE RELIABILITY

ÎÁÇÎÐ È ÊËÀÑÑÈÔÈÊÀÖÈß ÑÐÅÄÑÒ ÎÖÅÍÈÂÀÍÈß ÍÀÄÅÆÍÎÑÒÈ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß

54–58
 (5)

Ôåäîñååâà À. À.

CASE-ORIENTED INFORMATION TECHNOLOGY FOR QUALITY AND SAFETY ASSESSMENT SOFTWARE OF TECHNOLOGICAL PROCESS OF DRUGS IN THE PHARMACEUTICAL ENTERPRISE

CASE-ÎвªÍÒÎÂÀÍÀ ²ÍÔÎÐÌÀÖ²ÉÍÀ ÒÅÕÍÎËÎÃ²ß ÎÖ²ÍÊÈ ßÊÎÑÒ² ÒÀ ÁÅÇÏÅÊÈ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀ ÁÅÇÏÅ×ÅÍÍÈß ÒÅÕÍÎËÎò×ÍÎÃÎ ÏÐÎÖÅÑÓ ÂÈÐÎÁÍÈÖÒÂÀ ˲ÊÀÐÑÜÊÈÕ ÇÀÑÎÁ²Â ÍÀ ÔÀÐÌÀÖÅÂÒÈ×ÍÎÌÓ Ï²ÄÏÐȪÌÑÒ²

CASE-ÎÐÈÅÍÒÈÐÎÂÀÍÍÀß ÎÖÅÍÊÀ ÊÀ×ÅÑÒÂÀ È ÁÅÇÎÏÀÑÍÎÑÒÈ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÒÅÕÍÎËÎÃÈ×ÅÑÊÎÃÎ ÏÐÎÖÅÑÑÀ ÏÐÎÈÇÂÎÄÑÒÂÀ ËÅÊÀÐÑÒÂÅÍÍÛÕ ÑÐÅÄÑÒ ÍÀ ÔÀÐÌÀÖÅÂÒÈ×ÅÑÊÎÌ ÏÐÅÄÏÐÈßÒÈÈ

59–63
 (5)

ßðåì÷óê Ñ. À.,
Õàð÷åíêî Â. Ñ.

METHOD OF SELECTION OF THE PROGRAM SYSTEM COMPONENTS CONTAINING DEFECTS

ÌÅÒÎÄ ÂÈÁÎÐÓ ÄÅÔÅÊÒÎ̲ÑÒÊÈÕ ÊÎÌÏÎÍÅÍҲ ÏÐÎÃÐÀÌÍÈÕ ÑÈÑÒÅÌ

ÌÅÒÎÄ ÎÒÁÎÐÀ ÄÅÔÅÊÒÎÑÎÄÅÐÆÀÙÈÕ ÊÎÌÏÎÍÅÍÒÎÂ ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ

64–69
 (6)

Ìàëÿð÷óê Ð. À.,
Ãîâîðóùåíêî Ò. Î.

SET REPRESENTATIONS OF TYPES AND DEVELOPMENT METHODOLOGIES OF SOFTWARE

ÌÍÎÆÈÍͲ ÏÐÅÄÑÒÀÂËÅÍÍß ÒÈϲ ÒÀ ÌÅÒÎÄÎËÎÃ²É ÐÎÇÐÎÁËÅÍÍß ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß

ÌÍÎÆÅÑÒÂÅÍÍÛÅ ÏÐÅÄÑÒÀÂËÅÍÈß ÒÈÏÎÂ È ÌÅÒÎÄÎËÎÃÈÉ ÐÀÇÐÀÁÎÒÊÈ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß

70–77
 (8)

ijàãíîñòóâàííÿ òà âåðèô³êàö³ÿ

Ëåòè÷åâñüêèé Î. Î.

SYMBOLIC METHODS OF VERIFICATION AND TESTING OF HIGH RELIABILTY SOFTWARE

ÑÈÌÂÎËÜͲ ÌÅÒÎÄÈ Ó ÂÅÐÈÔ²ÊÀÖ²¯ ÒÀ ÒÅÑÒÓÂÀÍͲ ÂÈÑÎÊÎÍÀIJÉÍÈÕ ÑÈÑÒÅÌ

ÑÈÌÂÎËÜÍÛÅ ÌÅÒÎÄÛ ÂÅÐÈÔÈÊÀÖÈÈ È ÒÅÑÒÈÐÎÂÀÍÈß ÂÛÑÎÊÎÍÀÄÅÆÍÛÕ ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ

78–83
 (6)

Ïðèãîæåâ À. Ñ.,
Íåèçâåñòíûé Ä. À.,
Ëàðèîíîâà Î.Ñ.

ARCHITECTURE MODEL BASED TESTING ENVIRONMENT USE HYBRID RESOURCE NETWORKS

ÀÐÕ²ÒÅÊÒÓÐÀ ÑÅÐÅÄÎÂÈÙÀ ÒÅÑÒÓÂÀÍÍß ÍÀ ÎÑÍβ ÌÎÄÅ˲ òÁÐÈÄÍÈÕ ÐÅÑÓÐÑÍÈÕ ÌÅÐÅÆ

ÀÐÕÈÒÅÊÒÓÐÀ ÑÐÅÄÛ ÒÅÑÒÈÐÎÂÀÍÈß ÍÀ ÎÑÍÎÂÅ ÌÎÄÅËÈ ÃÈÁÐÈÄÍÛÕ ÐÅÑÓÐÑÍÛÕ ÑÅÒÅÉ

84–92
 (9)

Opanasenko V.,
Kryvyi S.

METHOD SYNTHESIS OF THE CONFIGURABLE LOGICAL BLOCKS ON BASIS OF UNIVERSAL LOGICAL ELEMENTS

ÌÅÒÎÄ ÑÈÍÒÅÇÓ ÊÎÍÔ²ÃÓÐÎÂÍÈÕ ËÎò×ÍÈÕ ÁËÎʲ ÍÀ ÎÑÍβ ÓͲÂÅÐÑÀËÜÍÈÕ ËÎò×ÍÈÕ ÅËÅÌÅÍÒ²Â

ÌÅÒÎÄ ÑÈÍÒÅÇÀ ÊÎÍÔÈÃÓÐÈÐÓÅÌÛÕ ËÎÃÈ×ÅÑÊÈÕ ÁËÎÊΠÍÀ ÎÑÍÎÂÅ ÓÍÈÂÅÐÑÀËÜÍÛÕ ËÎÃÈ×ÅÑÊÈÕ ÝËÅÌÅÍÒÎÂ

93–97
(5)

Kharchenko V. S.,
Sklyar V. V.

ASSURANCE CASE DRIVEN DESIGN FOR SOFTWARE AND HARDWARE DESCRIPTION LANGUAGE BASED SYSTEMS

ÏÐÎÅÊÒÓÂÀÍÍß ÍÀ ÎÑÍβ ASSURANCE CASE ÄËß ÑÈÑÒÅÌ Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÒÀ ÌΠÎÏÈÑÓ ÀÏÀÐÀÒÓÐÈ

ÏÐÎÅÊÒÈÐÎÂÀÍÈÅ ÍÀ ÎÑÍÎÂÅ ASSURANCE CASE ÄËß ÑÈÑÒÅÌ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß È ßÇÛÊΠÎÏÈÑÀÍÈß ÀÏÏÀÐÀÒÓÐÛ

98–103
 
(6)

³äìîâîáåçïå÷í³ ïðîãðàìîâí³ ñèñòåìè

Ïåðåïåëèöûí À. Å.

USAGE OF PARAMETRIZABLE IP INFRASTRUCTURES FOR FPGA-BASED FAULT-TOLERANT ONBOARD SYSTEMS DEVELOPMENT

ÇÀÑÒÎÑÓÂÀÍÍß ÏÀÐÀÌÅÒÐÈÇÎÂÍÈÕ IP ²ÍÔÐÀÑÒÐÓÊÒÓÐ ÄËß ÐÎÇÐÎÁÊÈ ÂÁÓÄÎÂÀÍÈÕ Â²ÄÌÎÂÎÑÒ²ÉÊÈÕ ÑÈÑÒÅÌ ÍÀ Ï˲Ñ

ÈÑÏÎËÜÇÎÂÀÍÈÅ ÏÀÐÀÌÅÒÐÈÇÈÐÓÅÌÛÕ IP ÈÍÔÐÀÑÒÐÓÊÒÓÐ ÄËß ÐÀÇÐÀÁÎÒÊÈ ÂÑÒÐÎÅÍÍÛÕ ÎÒÊÀÇÎÓÑÒÎÉ×ÈÂÛÕ ÑÈÑÒÅÌ ÍÀ ÏËÈÑ

104–112
 (9)

Babeshko E.,
Kharchenko V.,
Siora A.

RELIABILITY ASSESSMENT OF FPGA-BASED NPP I&C: EXPERIENCE, METHODS AND TOOLS

ÎÖ²ÍÊÀ ÍÀIJÉÍÎÑÒ² ²ÍÔÎÐÌÀÖ²ÉÍÎ-ÊÅвÂÍÈÕ ÑÈÑÒÅÌ ÀÅÑ, ÏÎÁÓÄÎÂÀÍÈÕ ÍÀ Ï˲Ñ: ÄÎѲÄ, ÌÅÒÎÄÈ ÒÀ ²ÍÑÒÐÓÌÅÍÒÀËÜͲ ÇÀÑÎÁÈ

ÎÖÅÍÊÀ ÍÀÄÅÆÍÎÑÒÈ ÈÓÑ ÀÝÑ, ÎÑÍÎÂÀÍÍÛÕ ÍÀ ÏËÈÑ: ÎÏÛÒ, ÌÅÒÎÄÛ È ÈÍÑÒÐÓÌÅÍÒÀËÜÍÛÅ ÑÐÅÄÑÒÂÀ

113–119
 
(7)

Äóíåöü Ð. Á.,
Øï³öåð À. Ñ.

ORGANIZATION OF SWITCHING PACKETS IN ONE NETWORK NODE ON A CHIP WITH MATRIX TOPOLOGY

ÎÐÃÀͲÇÀÖ²ß ÊÎÌÓÒÀÖ²¯ ÏÀÊÅÒ²Â Ó ÎÄÍÎÌÓ ÂÓÇ˲ ÌÅÐÅƲ ÍÀ ÊÐÈÑÒÀ˲ Ç ÌÀÒÐÈ×ÍÎÞ ÒÎÏÎËÎòªÞ

ÎÐÃÀÍÈÇÀÖÈß ÊÎÌÓÒÀÖÈÈ ÏÀÊÅÒΠ ÎÄÍÎÌ ÂÓÇËÅ ÑÅÒÈ ÍÀ ÊÐÈÑÒÀËÅ Ñ ÌÀÒÐÈ×ÍÎÉ ÒÎÏÎËÎÃÈÅÉ

120–124
 
(5)

Kamenskih A. N.,
Tyurin S. F.

THE ANALYSIS OF REDUNDANT TRANSISTOR NETWORKS WITH DUPLICATION OF POWER SUPPLY IN TERMS OF RELIABILITY

ÀÍÀË²Ç ÍÀIJÉÍÎÑÒ² ÍÀÄËÈØÊÎÂÈÕ ÒÐÀÍÇÈÑÒÎÐÍÈÕ ÌÅÐÅÆ Ç ÄÓÁËÞÂÀÍÍßÌ ÄÆÅÐÅËÀ ÆÈÂËÅÍÍß

ÀÍÀËÈÇ ÍÀÄÅÆÍÎÑÒÈ ÈÇÁÛÒÎ×ÍÛÕ ÒÐÀÍÇÈÑÒÎÐÍÛÕ ÑÅÒÅÉ Ñ ÄÓÁËÈÐÎÂÀÍÈÅÌ ÈÑÒÎ×ÍÈÊÀ ÏÈÒÀÍÈß

125–130
 
(6)

Ñïåö³àë³çîâàí³ ñèñòåìè, ìåðåæ³ òà ³íôîðìàö³éí³ òåõíîëî㳿

Vartanjan V. M.,
Turkina V. V.

GAME THEORETICAL APPROACH TO COOPERATION IN AUTONOMOUS W IRELESS NETWORKS

ÒÅÎÐÅÒÈÊÎ-²ÃÐÎÂÈÉ Ï²ÄÕ²Ä ÄÎ ÊÎÎÏÅÐÀÖ²¯  ÀÂÒÎÍÎÌÍÈÕ ÁÅÇÄÐÎÒÎÂÈÕ ÌÅÐÅÆÀÕ

ÒÅÎÐÅÒÈÊÎ-ÈÃÐÎÂÎÉ ÏÎÄÕÎÄ Ê ÊÎÎÏÅÐÀÖÈÈ Â ÀÂÒÎÍÎÌÍÛÕ ÁÅÑÏÐÎÂÎÄÍÛÕ ÑÅÒßÕ

131–136
 
(6)

Æèõàðåâè÷ Â. Â.,
Îñòàïîâ Ñ. Å.,
Ìèðîí³â ². Â.

ANALYSIS OF THE TEXT CHARACTER RECOGNITION METHODS

ÀÍÀË²Ç ÌÅÒÎIJ ÐÎÇϲÇÍÀÂÀÍÍß ÑÈÌÂÎ˲ ÒÅÊÑÒÓ

ÀÍÀËÈÇ ÌÅÒÎÄÎÂ ÐÀÑÏÎÇÍÀÂÀÍÈß ÑÈÌÂÎËÎÂ ÒÅÊÑÒÀ

137–142
 (6)

Turkin I. B.,
Ignatev D.S. 

OPTIMISATION PROBLEM STATEMENT OF DECISION-MAKING ON HANDOVER IN HETEROGENEOUS AD HOC NETWORKS

ÎÏÒÈ̲ÇÀÖ²ÉÍÀ ÏÎÑÒÀÍÎÂÊÀ ÇÀÄÀײ ÏÐÈÉÍßÒÒß Ð²ØÅÍÜ ÏÐÎ ÏÅÐÅÄÀ×Ó ÎÁÑËÓÃÎÂÓÂÀÍÍß Â ÃÅÒÅÐÎÃÅÍÍÈÕ ÎÄÍÎÐÀÍÃÎÂÈÕ ÑÀÌÎÎÐÃÀͲÇÎÂÀÍÈÕ ÌÅÐÅÆÀÕ

ÎÏÒÈÌÈÇÀÖÈÎÍÍÀß ÏÎÑÒÀÍÎÂÊÀ ÇÀÄÀ×È ÏÐÈÍßÒÈß ÐÅØÅÍÈÉ Î ÏÅÐÅÄÀ×Å ÎÁÑËÓÆÈÂÀÍÈß Â ÃÅÒÅÐÎÃÅÍÍÛÕ ÎÄÍÎÐÀÍÃÎÂÛÕ ÑÀÌÎÎÐÃÀÍÈÇÓÞÙÈÕÑß ÑÅÒßÕ

143–147
 
(5)

 

Çåëåíèé êîìï’þòèíã òà êîìóí³êàö³¿

Òàðàñþê Î. Ì.

ISSUES OF DEVELOPING HETEROGENEOUS SYSTEMS FOR GLOBALLY-DISTRIBUTED DATA PROCESSING AND STORAGE

ÏÐÎÁËÅÌÈ ÑÒÂÎÐÅÍÍß ÃÅÒÅÐÎÃÅÍÍÈÕ ÑÈÑÒÅÌ ÄËß ÃËÎÁÀËÜÍÎ-ÐÎÇÏÎIJËÅÍί ÎÁÐÎÁÊÈ ÒÀ ÇÁÅвÃÀÍÍß ²ÍÔÎÐÌÀÖ²¯

ÏÐÎÁËÅÌÛ ÑÎÇÄÀÍÈß ÃÅÒÅÐÎÃÅÍÍÛÕ ÑÈÑÒÅÌ ÄËß ÃËÎÁÀËÜÍÎ-ÐÀÑÏÐÅÄÅ˨ÍÍÎÉ ÎÁÐÀÁÎÒÊÈ È ÕÐÀÍÅÍÈß ÈÍÔÎÐÌÀÖÈÈ

148–154
 (7)

Îë³éíèê Â. Ï.,
Êóë³ø Ñ. Ì.

ESTIMATION OF RADIATIVE PROPERTIES OF APPARATUS FOR INFORMATION-WAVE THERAPY

ÎÖ²ÍÊÀ ÂÈÏÐÎ̲ÍÞÂÀËÜÍÈÕ ÂËÀÑÒÈÂÎÑÒÅÉ ÀÏÀÐÀÒÓ ÄËß ²ÍÔÎÐÌÀÖ²ÉÍÎ-ÕÂÈËÜÎÂί ÒÅÐÀϲ¯

 

155–159
 (5)

Òóðêèí È. Á.,
Âäîâèò÷åíêî À. Â. 

THE MODEL OF USER’S ACTIVITY IN POLIÑY OF PERSONAL COMPUTER POWER MANAGEMENT

ÌÎÄÅËÜ ÀÊÒÈÂÍÎÑÒ² ÊÎÐÈÑÒÓÂÀ×À  ÏÎ˲ÒÈÖ² ÊÅÐÓÂÀÍÍß ÆÈÂËÅÍÍßÌ ÏÅÐÑÎÍÀËÜÍÎÃÎ ÊÎÌÏ'ÞÒÅÐÀ

ÌÎÄÅËÜ ÀÊÒÈÂÍÎÑÒÈ ÏÎËÜÇÎÂÀÒÅËß Â ÏÎËÈÒÈÊÅ ÓÏÐÀÂËÅÍÈß ÝÍÅÐÃÎÏÈÒÀÍÈÅÌ ÏÅÐÑÎÍÀËÜÍÎÃÎ ÊÎÌÏÜÞÒÅÐÀ

160–164
 (5)

Ϻâíºâ Â. ß.,
Öóðàíîâ Ì. Â.,
Ëîãâèíåíêî Ì. Ô.

ENERGY EFFICIENCY OF ERROR CONTROLLED CODES ASSESSMENT METHODOLOGY

ÌÅÒÎÄÈÊÀ ÎÖ²ÍÊÈ ÅÍÅÐÃÎÅÔÅÊÒÈÂÍÎÑÒ² ÇÀÂÀÄÎÑÒ²ÉÊÈÕ ÊÎIJÂ

ÌÅÒÎÄÈÊÀ ÎÖÅÍÊÈ ÝÍÅÐÃÎÝÔÔÅÊÒÈÂÍÎÑÒÈ ÏÎÌÅÕÎÓÑÒÎÉ×ÈÂÛÕ ÊÎÄÎÂ

165–170
 (6)

Iqbal A.,
Pattinson C.,
Kor A.

USING SNMPV3 FOR RESOURCES MONITORING OF HOSTED AND BARE-METAL HYPERVISORS

ÂÈÊÎÐÈÑÒÀÍÍß SNMP V3 ÄËß ÌÎͲÒÎÐÈÍÃÓ ÐÅÑÓÐѲ ÕÎÑÒÎÂÈÕ ² ÀÂÒÎÍÎÌÍÈÕ Ã²ÏÅвÇÎвÂ

ÈÑÏÎËÜÇÎÂÀÍÈÅ SNMPV3 ÄËß ÌÎÍÈÒÎÐÈÍÃÀ ÐÅÑÓÐÑÎÂ ÕÎÑÒÎÂÛÕ È ÀÂÒÎÍÎÌÍÛÕ ÃÈÏÅÐÂÈÇÎÐÎÂ

171–178
 
(8)

Andreichenko D. K.,
Melnichuk D. V.,
Eroftiev A.A.

DYNAMIC BALANCING OF COMPUTING LOAD IN HIGHLY PARALLEL PROBLEM SOLVING

ÄÈÍÀ̲×ÍÅ ÁÀËÀÍÑÓÂÀÍÍß ÎÁ×ÈÑËÞÂÀËÜÍÎÃÎ ÍÀÂÀÍÒÀÆÅÍÍß ÏÐÈ ÂÈвØÅÍͲ ÇÀÂÄÀÍÜ Ç ÂÈÑÎÊÈÌ ÑÒÓÏÅÍÅÌ ÏÀÐÀËÅ˲ÇÌÓ

ÄÈÍÀÌÈ×ÅÑÊÀß ÁÀËÀÍÑÈÐÎÂÊÀ ÂÛ×ÈÑËÈÒÅËÜÍÎÉ ÍÀÃÐÓÇÊÈ ÏÐÈ ÐÅØÅÍÈÈ ÇÀÄÀ× Ñ ÂÛÑÎÊÎÉ ÑÒÅÏÅÍÜÞ ÏÀÐÀËËÅËÈÇÌÀ

179–186
 (8)

ʳáåðô³çè÷í³ ñèñòåìè òà ²íòåðíåò ðå÷åé

Õàõàíîâ Â. È.,
Ëèòâèíîâà Å. È.,
×óìà÷åíêî Ñ. Â.,
Ìèùåíêî À. Ñ.

CYBER SOCIAL SYSTEMSMART CYBER UNIVERSITY

ʲÁÅÐÑÎÖ²ÀËÜÍÀ ÑÈÑÒÅÌÀÐÎÇÓÌÍÈÉ Ê²ÁÅÐ ÓͲÂÅÐÑÈÒÅÒ

ÊÈÁÅÐÑÎÖÈÀËÜÍÀß ÑÈÑÒÅÌÀ – ÓÌÍÛÉ ÊÈÁÅÐ-ÓÍÈÂÅÐÑÈÒÅÒ

187–194
 (8)

Kulik À.S.

AIRCRAFTS CONTROL RATIONAL INTELLECTUALIZATION

ÐÀÖ²ÎÍÀËÜÍÀ ²ÍÒÅËÅÊÒÓÀ˲ÇÀÖ²ß ÓÏÐÀÂ˲ÍÍß Ë²ÒÀËÜÍÈÌÈ ÀÏÀÐÀÒÀÌÈ

ÐÀÖÈÎÍÀËÜÍÀß ÈÍÒÅËËÅÊÒÓÀËÈÇÀÖÈß ÓÏÐÀÂËÅÍÈß ËÅÒÀÒÅËÜÍÛÌÈ ÀÏÏÀÐÀÒÀÌÈ

195–200
 
(6)

Ñèëàêîâ À. È.,
Óãðþìîâ Ì. Ë.,
Øìåëåâ À. Ñ.

MODELING OF TECHNOLOGICAL PROCESSES AND HYDRAULIC NETWORKS FOR SEARCH AND ANALYZING OF DEFECTS ON THE MANUFACTURE

ÌÎÄÅËÞÂÀÍÍß ÒÅÕÍÎËÎò×ÍÈÕ ÏÐÎÖÅѲ ² òÄÐÀÂ˲×ÍÈÕ ÌÅÐÅÆ ÄËß ÏÎØÓÊÓ ² ÀÍÀ˲ÇÓ ÄÅÔÅÊҲ ÍÀ ÂÈÐÎÁÍÈÖÒ²

ÌÎÄÅËÈÐÎÂÀÍÈÅ ÒÅÕÍÎËÎÃÈ×ÅÑÊÈÕ ÏÐÎÖÅÑÑÎÂ È ÃÈÄÐÀÂËÈ×ÅÑÊÈÕ ÑÅÒÅÉ ÄËß ÏÎÈÑÊÀ È ÀÍÀËÈÇÀ ÄÅÔÅÊÒΠÍÀ ÏÐÎÈÇÂÎÄÑÒÂÅ

201–206
 (6)

Ñà÷åíêî À. Î.,
Êî÷àí Â. Â.,
Õàð÷åíêî Â. Ñ.,
ßöê³â Â. Â.,
×åðíèøîâ Ì. À.,
Áèêîâèé Ï. ª.,
Ðîùóïê³í Î. Þ.,
Êîâàëü Â. Ñ.

THE CONCEPTION OF IMPLEMENTING THE MOBILE SYSTEMS OF AFTER-EMERGENSY MONITORING OF NUCLEAR POWER PLANTS USING A FLEET OF QUADROCOPTERS

ÊÎÍÖÅÏÖ²ß ÏÎÁÓÄÎÂÈ ÌÎÁ²ËÜÍÈÕ ÑÈÑÒÅÌ ÏÎÑÒ-ÀÂÀвÉÍÎÃÎ ÌÎͲÒÎÐÈÍÃÓ ÀÅÑ Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ÔËÎÒÓ ÊÂÀÄÐÎÊÎÏÒÅвÂ

ÊÎÍÖÅÏÖÈß ÏÎÑÒÐÎÅÍÈß ÌÎÁÈËÜÍÛÕ ÑÈÑÒÅÌ ÏÎÑÒ-ÀÂÀÐÈÉÍÎÃÎ ÌÎÍÈÒÎÐÈÍÃÀ ÀÅÑ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÔËÎÒÀ ÊÂÀÄÐÎÊÎÏÒÅÐÎÂ

207–214
 (8)

 

ÀËÔÀ²ÒÍÈÉ ÏÎÊÀÆ×ÈÊ

215

 

 

Øàíîâí³ ÷èòà÷³!

Íàóêîâî-òåõí³÷íèé æóðíàë «ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ'ÞÒÅÐͲ ÑÈÑÒÅÌÈ»:

- âõîäèòü äî çàòâåðäæåíîãî ÌÎÍ Óêðà¿íè Ïåðåë³êó íàóêîâèõ ôàõîâèõ âèäàíü Óêðà¿íè, â ÿêèõ ìîæóòü ïóáë³êóâàòèñÿ ðåçóëüòàòè äèñåðòàö³éíèõ ðîá³ò íà çäîáóòòÿ íàóêîâèõ ñòóïåí³â äîêòîðà ³ êàíäèäàòà íàóê (äèâ. íàêàç ÌÎÍ Óêðà¿íè ¹ 1279 â³ä 6.11.2014 ð.);

- çáåð³ãàºòüñÿ ó çàãàëüíîäåðæàâí³é ðåôåðàòèâí³é áàç³ äàíèõ «Óêðà¿í³êà íàóêîâà» òà ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ óêðà¿íñüêîãî ðåôåðàòèâíîãî æóðíàëó «Äæåðåëî» (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.nbuv.gov.ua) (Óêðà¿íà);

- çáåð³ãàºòüñÿ ó ðåôåðàòèâí³é áàç³ äàíèõ Âñåðîñ³éñüêîãî ³íñòèòóòó íàóêîâî¿ ³ òåõí³÷íî¿ ³íôîðìàö³¿ (²ͲҲ) Ðîñ³éñüêî¿ àêàäå쳿 íàóê ³ ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÐÆ (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.viniti.ru) (Ðîñ³éñüêà Ôåäåðàö³ÿ);

- âêëþ÷åíèé äî ì³æíàðîäíèõ á³áë³îìåòðè÷íèõ òà íàóêîìåòðè÷íèõ áàç äàíèõ: íàóêîâî¿ åëåêòðîííî¿ á³áë³îòåêè eLIBRARY.RU (Ðîñ³éñüêà Ôåäåðàö³ÿ); Index Copernicus (ICV 2013: 4,36; 2014: 52,23) (Ïîëüùà); INSPEC (Institution of Engineering and Technology, Âåëèêîáðèòàí³ÿ); CiteFactor; Academic Keys; Infobase Index; Google Scholar (á³áë³îìåòðè÷í³ ïîêàçíèêè – quot.=1766 / h = 11 / i10 = 17).