Íàö³îíàëüíèé
àåðîêîñì³÷íèé óí³âåðñèòåò ³ì. Ì.ª. Æóêîâñüêîãî “Õàðê³âñüêèé àâ³àö³éíèé ³íñòèòóò”
ISSN 1814-4225. ÐÀIJÎÅËÅÊÒÐÎÍͲ
² ÊÎÌÏ’ÞÒÅÐͲ ÑÈÑÒÅÌÈ. – 2016. – ¹ 5 (79).
– 216 ñ.
ISSN 1814-4225. ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÅ È ÊÎÌÏÜÞÒÅÐÍÛÅ ÑÈÑÒÅÌÛ. – 2016. – ¹ 5 (79).
– 216 ñ.
ISSN 1814-4225. RADIOELECTRONIC AND COMPUTER SYSTEMS. – 2016. – ¹ 5 (79). – 216 ñ.
Ìàòåð³àëè, ùî ì³ñòÿòüñÿ â æóðíàë³,
îïóáë³êîâàí³ çà ð³øåííÿì Ïðîãðàìíîãî
êîì³òåòó
̳æíàðîäíî¿
íàóêîâî-òåõí³÷íî¿ êîíôåðåíö³¿ «CYBER FORUM DESSERT 2016»
ÑÒÀÒÒ² (articleS)
Àâòîðè (ìîâà îðèã³íàëó) |
Íàçâà ñòàòò³ (article title) |
Ñòîð³íêè (pages) |
||
English |
Óêðà¿íñüêà ìîâà |
Ðóññêèé ÿçûê |
||
Ãàðàíòîçäàòí³ñòü òà ðåç³ë’ºíòí³ñòü
õìàðíèõ ñèñòåì |
||||
Äóáíèöêèé Â. Þ., |
SCIENTOMETRIC ANALYSIS
OF CONFERENCES «DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES» (DESSERT
2006-2014) |
ÍÀÓÊÎÌÅÒÐÈ×ÍÈÉ ÀÍÀ˲Ç
ÊÎÍÔÅÐÅÍÖ²É «ÃÀÐÀÍÒÎÇÄÀÒͲ ÑÈÑÒÅÌÈ, ÑÅвÑÈ ²
ÒÅÕÍÎËÎò¯» (DESSERT 2006-2014) |
6–14 |
|
Èâàí÷åíêî Î. Â., |
SEMI-MARKOV AVAILABILITY
MODEL FOR CLOUD INFRASTRUCTURE WITH INTEGRATED TECHNICAL STATE CONTROL SYSTEM |
ÍÀϲÂÌÀÐʲÂÑÜÊÀ ÌÎÄÅËÜ ÃÎÒÎÂÍÎÑÒ² ÕÌÀÐÍί
²ÍÔÐÀÑÒÐÓÊÒÓÐÈ Ç ²ÍÒÅÃÐÎÂÀÍÎÞ ÑÈÑÒÅÌÎÞ ÌÎͲÒÎÐÈÍÃÓ ÒÅÕͲ×ÍÎÃÎ ÑÒÀÍÓ |
15–19 |
|
Kazymyr V. V., |
ÌÎÄÅËÞÂÀÍÍß Â ÕÌÀÐÍÎÌÓ ÑÅÐÅÄÎÂÈÙ² ÍÀ ÎÑÍβ HLA |
ÌÎÄÅËÈÐÎÂÀÍÈÅ Â
ÎÁËÀ×ÍÎÉ ÑÐÅÄÅ ÍÀ ÎÑÍÎÂÅ HLA |
20–25 |
|
²íôîðìàö³éíà
òà ôóíêö³îíàëüíà áåçïåêà ²ÓÑ |
||||
Áðåæíåâ Å. Â., |
ASSURANCE OF CYBER SECURITY FOR I&C SYSTEMS IMPORTANT TO SAFETY: PROCESS APPROACH BASED ON QUALITY MANAGEMENT
SYSTEM |
ÇÀÁÅÇÏÅ×ÅÍÍß ²ÍÔÎÐÌÀÖ²ÉÍÍί
ÁÅÇÏÅÊÈ ²ÓÑ ÂÀÆËÈÂÈÕ ÄËß ÁÅÇÏÅÊÈ: ÏÐÎÖÅÑÍÈÉ Ï²ÄÕ²Ä ÍÀ ÎÑÍβ ÑÈÑÒÅÌÈ ÌÅÍÅÄÆÌÅÍÒÓ ßÊÎÑÒ² |
26–32 |
|
Áàëàêèí Ñ. Â., |
DETECTION OF COMPUTER ATTACKS USING OUTLINER METHOD |
ÂÈßÂËÅÍÍß ÊÎÌÏ’ÞÒÅÐÍÈÕ ÀÒÀÊ ÇÀ
ÄÎÏÎÌÎÃÎÞ ÌÅÒÎÄÓ Â²ÄÕÈËÅÍÜ |
33–37 |
|
Ñàâåíêî Î.
Ñ., |
THE INFORMATION TECHNOLOGY FOR BOTNET DETECTION BASED ON DNS-TRAFFIC ANALYSIS |
²ÍÔÎÐÌÀÖ²ÉÍÀ ÒÅÕÍÎËÎòß
ÂÈßÂËÅÍÍß ÁÎÒ-ÌÅÐÅÆ ÍÀ ÎÑÍβ ÀÍÀ˲ÇÓ
DNS-ÒÐÀÔ²ÊÀ |
ÈÍÔÎÐÌÀÖÈÎÍÍÀß ÒÅÕÍÎËÎÃÈß
ÎÁÍÀÐÓÆÅÍÈß ÁÎÒ-ÑÅÒÅÉ ÍÀ ÎÑÍÎÂÅ ÀÍÀËÈÇÀ DNS-ÒÐÀÔÈÊÀ |
38–42 |
Volochiy B., |
THE MAINTANANCE STATEGY OPTIMIZATION OF BASE STATIONS
OF COMMUNICATION CELLULAR NETWORK |
ÎÏÒÈ̲ÇÀÖ²ß ÑÒÐÀÒÅò¯ ÒÅÕͲ×ÍÎÃÎ
ÎÁÑËÓÃÎÂÓÂÀÍÍß ÁÀÇÎÂÈÕ ÑÒÀÍÖ²É ÌÅÐÅƲ ÊÎ̲ÐÊÎÂÎÃÎ ÇÂ’ßÇÊÓ |
ÎÏÒÈÌÈÇÀÖÈß ÑÒÐÀÒÅÃÈÈ ÒÅÕÍÈ×ÅÑÊÎÃÎ ÎÁÑËÓÆÈÂÀÍÈß ÁÀÇÎÂÛÕ ÑÒÀÍÖÈÉ ÑÅÒÈ ÑÎÒÎÂÎÉ
ÑÂßÇÈ |
43–53 |
ßê³ñòü,
íàä³éí³ñòü òà áåçïåêà ÏÇ |
||||
Ìàåâñêèé Ä. À., |
CLASSIFICATION EXISTING
TOOLS FOR SOFTWARE RELIABILITY |
CLASSIFICATION
EXISTING TOOLS FOR SOFTWARE RELIABILITY |
ÎÁÇÎÐ È ÊËÀÑÑÈÔÈÊÀÖÈß ÑÐÅÄÑÒÂ ÎÖÅÍÈÂÀÍÈß ÍÀÄÅÆÍÎÑÒÈ
ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß |
54–58 |
Ôåäîñååâà À. À. |
CASE-ORIENTED INFORMATION
TECHNOLOGY FOR QUALITY AND SAFETY
ASSESSMENT SOFTWARE OF TECHNOLOGICAL PROCESS OF DRUGS
IN THE PHARMACEUTICAL ENTERPRISE |
CASE-ÎвªÍÒÎÂÀÍÀ ²ÍÔÎÐÌÀÖ²ÉÍÀ ÒÅÕÍÎËÎÃ²ß ÎÖ²ÍÊÈ ßÊÎÑÒ² ÒÀ ÁÅÇÏÅÊÈ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀ ÁÅÇÏÅ×ÅÍÍÈß ÒÅÕÍÎËÎò×ÍÎÃÎ ÏÐÎÖÅÑÓ ÂÈÐÎÁÍÈÖÒÂÀ ˲ÊÀÐÑÜÊÈÕ ÇÀÑÎÁ²Â ÍÀ ÔÀÐÌÀÖÅÂÒÈ×ÍÎÌÓ Ï²ÄÏÐȪÌÑÒ² |
59–63 |
|
ßðåì÷óê Ñ.
À., |
METHOD OF SELECTION OF THE PROGRAM SYSTEM
COMPONENTS CONTAINING DEFECTS |
ÌÅÒÎÄ ÂÈÁÎÐÓ ÄÅÔÅÊÒÎ̲ÑÒÊÈÕ ÊÎÌÏÎÍÅÍҲ ÏÐÎÃÐÀÌÍÈÕ ÑÈÑÒÅÌ |
ÌÅÒÎÄ ÎÒÁÎÐÀ ÄÅÔÅÊÒÎÑÎÄÅÐÆÀÙÈÕ
ÊÎÌÏÎÍÅÍÒÎÂ ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ |
64–69 |
Ìàëÿð÷óê Ð. À., |
SET REPRESENTATIONS
OF TYPES AND DEVELOPMENT METHODOLOGIES OF SOFTWARE |
ÌÍÎÆÈÍͲ ÏÐÅÄÑÒÀÂËÅÍÍß
ÒÈϲ ÒÀ ÌÅÒÎÄÎËÎÃ²É ÐÎÇÐÎÁËÅÍÍß ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß |
ÌÍÎÆÅÑÒÂÅÍÍÛÅ ÏÐÅÄÑÒÀÂËÅÍÈß ÒÈÏÎÂ
È ÌÅÒÎÄÎËÎÃÈÉ ÐÀÇÐÀÁÎÒÊÈ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß |
70–77 |
ijàãíîñòóâàííÿ
òà âåðèô³êàö³ÿ |
||||
Ëåòè÷åâñüêèé Î. Î. |
SYMBOLIC METHODS
OF VERIFICATION AND TESTING OF
HIGH RELIABILTY SOFTWARE |
ÑÈÌÂÎËÜͲ ÌÅÒÎÄÈ Ó ÂÅÐÈÔ²ÊÀÖ²¯ ÒÀ ÒÅÑÒÓÂÀÍͲ ÂÈÑÎÊÎÍÀIJÉÍÈÕ
ÑÈÑÒÅÌ |
ÑÈÌÂÎËÜÍÛÅ
ÌÅÒÎÄÛ ÂÅÐÈÔÈÊÀÖÈÈ È ÒÅÑÒÈÐÎÂÀÍÈß ÂÛÑÎÊÎÍÀÄÅÆÍÛÕ ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ |
78–83 |
Ïðèãîæåâ À. Ñ., |
ARCHITECTURE MODEL
BASED TESTING ENVIRONMENT USE HYBRID RESOURCE NETWORKS |
ÀÐÕ²ÒÅÊÒÓÐÀ ÑÅÐÅÄÎÂÈÙÀ
ÒÅÑÒÓÂÀÍÍß ÍÀ ÎÑÍβ ÌÎÄÅ˲ òÁÐÈÄÍÈÕ ÐÅÑÓÐÑÍÈÕ ÌÅÐÅÆ |
ÀÐÕÈÒÅÊÒÓÐÀ ÑÐÅÄÛ ÒÅÑÒÈÐÎÂÀÍÈß ÍÀ ÎÑÍÎÂÅ ÌÎÄÅËÈ
ÃÈÁÐÈÄÍÛÕ ÐÅÑÓÐÑÍÛÕ ÑÅÒÅÉ |
84–92 |
Opanasenko V., |
METHOD SYNTHESIS OF THE CONFIGURABLE
LOGICAL BLOCKS ON BASIS OF
UNIVERSAL LOGICAL ELEMENTS |
ÌÅÒÎÄ ÑÈÍÒÅÇÓ ÊÎÍÔ²ÃÓÐÎÂÍÈÕ
ËÎò×ÍÈÕ ÁËÎʲ ÍÀ ÎÑÍβ ÓͲÂÅÐÑÀËÜÍÈÕ ËÎò×ÍÈÕ ÅËÅÌÅÍҲ |
ÌÅÒÎÄ
ÑÈÍÒÅÇÀ ÊÎÍÔÈÃÓÐÈÐÓÅÌÛÕ ËÎÃÈ×ÅÑÊÈÕ ÁËÎÊΠÍÀ ÎÑÍÎÂÅ ÓÍÈÂÅÐÑÀËÜÍÛÕ ËÎÃÈ×ÅÑÊÈÕ
ÝËÅÌÅÍÒÎÂ |
93–97 |
Kharchenko V. S., |
ASSURANCE CASE DRIVEN DESIGN FOR SOFTWARE AND HARDWARE DESCRIPTION LANGUAGE BASED SYSTEMS |
ÏÐÎÅÊÒÓÂÀÍÍß ÍÀ ÎÑÍβ ASSURANCE CASE ÄËß ÑÈÑÒÅÌ
Ç
ÂÈÊÎÐÈÑÒÀÍÍßÌ ÏÐÎÃÐÀÌÍÎÃÎ
ÇÀÁÅÇÏÅ×ÅÍÍß ÒÀ ÌΠÎÏÈÑÓ ÀÏÀÐÀÒÓÐÈ |
ÏÐÎÅÊÒÈÐÎÂÀÍÈÅ ÍÀ
ÎÑÍÎÂÅ ASSURANCE CASE ÄËß
ÑÈÑÒÅÌ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß È ßÇÛÊΠÎÏÈÑÀÍÈß ÀÏÏÀÐÀÒÓÐÛ |
98–103 |
³äìîâîáåçïå÷í³ ïðîãðàìîâí³
ñèñòåìè |
||||
Ïåðåïåëèöûí À. Å. |
USAGE OF PARAMETRIZABLE IP INFRASTRUCTURES FOR FPGA-BASED
FAULT-TOLERANT ONBOARD SYSTEMS
DEVELOPMENT |
ÇÀÑÒÎÑÓÂÀÍÍß ÏÀÐÀÌÅÒÐÈÇÎÂÍÈÕ
IP ²ÍÔÐÀÑÒÐÓÊÒÓÐ ÄËß ÐÎÇÐÎÁÊÈ ÂÁÓÄÎÂÀÍÈÕ Â²ÄÌÎÂÎÑÒ²ÉÊÈÕ ÑÈÑÒÅÌ ÍÀ ÏË²Ñ |
104–112 |
|
Babeshko E., |
RELIABILITY ASSESSMENT OF FPGA-BASED NPP I&C: EXPERIENCE, METHODS AND TOOLS |
ÎÖ²ÍÊÀ ÍÀIJÉÍÎÑÒ² ²ÍÔÎÐÌÀÖ²ÉÍÎ-ÊÅвÂÍÈÕ
ÑÈÑÒÅÌ ÀÅÑ, ÏÎÁÓÄÎÂÀÍÈÕ
ÍÀ Ï˲Ñ: ÄÎѲÄ, ÌÅÒÎÄÈ ÒÀ ²ÍÑÒÐÓÌÅÍÒÀËÜͲ ÇÀÑÎÁÈ |
ÎÖÅÍÊÀ ÍÀÄÅÆÍÎÑÒÈ
ÈÓÑ ÀÝÑ, ÎÑÍÎÂÀÍÍÛÕ ÍÀ ÏËÈÑ: ÎÏÛÒ, ÌÅÒÎÄÛ È
ÈÍÑÒÐÓÌÅÍÒÀËÜÍÛÅ ÑÐÅÄÑÒÂÀ |
113–119 |
Äóíåöü Ð. Á., |
ORGANIZATION OF SWITCHING PACKETS IN ONE NETWORK
NODE ON A CHIP WITH MATRIX
TOPOLOGY |
ÎÐÃÀͲÇÀÖ²ß ÊÎÌÓÒÀÖ²¯
ÏÀÊÅÒ²Â Ó ÎÄÍÎÌÓ ÂÓÇ˲ ÌÅÐÅƲ ÍÀ ÊÐÈÑÒÀ˲ Ç ÌÀÒÐÈ×ÍÎÞ ÒÎÏÎËÎòªÞ |
ÎÐÃÀÍÈÇÀÖÈß ÊÎÌÓÒÀÖÈÈ ÏÀÊÅÒÎÂ Â ÎÄÍÎÌ ÂÓÇËÅ
ÑÅÒÈ ÍÀ ÊÐÈÑÒÀËÅ Ñ ÌÀÒÐÈ×ÍÎÉ ÒÎÏÎËÎÃÈÅÉ |
120–124 |
Kamenskih A. N., |
ÀÍÀË²Ç ÍÀIJÉÍÎÑÒ² ÍÀÄËÈØÊÎÂÈÕ
ÒÐÀÍÇÈÑÒÎÐÍÈÕ ÌÅÐÅÆ Ç ÄÓÁËÞÂÀÍÍßÌ ÄÆÅÐÅËÀ ÆÈÂËÅÍÍß |
ÀÍÀËÈÇ
ÍÀÄÅÆÍÎÑÒÈ ÈÇÁÛÒÎ×ÍÛÕ ÒÐÀÍÇÈÑÒÎÐÍÛÕ ÑÅÒÅÉ Ñ ÄÓÁËÈÐÎÂÀÍÈÅÌ ÈÑÒÎ×ÍÈÊÀ ÏÈÒÀÍÈß |
125–130 |
|
Ñïåö³àë³çîâàí³
ñèñòåìè, ìåðåæ³ òà ³íôîðìàö³éí³ òåõíîëî㳿 |
||||
Vartanjan V. M., |
GAME THEORETICAL APPROACH TO COOPERATION
IN AUTONOMOUS W IRELESS NETWORKS |
ÒÅÎÐÅÒÈÊÎ-²ÃÐÎÂÈÉ Ï²ÄÕ²Ä ÄÎ ÊÎÎÏÅÐÀÖ²¯  ÀÂÒÎÍÎÌÍÈÕ ÁÅÇÄÐÎÒÎÂÈÕ ÌÅÐÅÆÀÕ |
ÒÅÎÐÅÒÈÊÎ-ÈÃÐÎÂÎÉ
ÏÎÄÕÎÄ Ê ÊÎÎÏÅÐÀÖÈÈ Â ÀÂÒÎÍÎÌÍÛÕ ÁÅÑÏÐÎÂÎÄÍÛÕ ÑÅÒßÕ |
131–136 |
Æèõàðåâè÷ Â. Â., |
ANALYSIS OF THE TEXT CHARACTER
RECOGNITION METHODS |
ÀÍÀËÈÇ ÌÅÒÎÄÎÂ
ÐÀÑÏÎÇÍÀÂÀÍÈß ÑÈÌÂÎËÎÂ ÒÅÊÑÒÀ |
137–142 |
|
Turkin I. B., |
OPTIMISATION PROBLEM STATEMENT OF DECISION-MAKING ON HANDOVER IN HETEROGENEOUS AD HOC NETWORKS |
ÎÏÒÈ̲ÇÀÖ²ÉÍÀ ÏÎÑÒÀÍÎÂÊÀ ÇÀÄÀײ ÏÐÈÉÍßÒÒß Ð²ØÅÍÜ ÏÐÎ ÏÅÐÅÄÀ×Ó ÎÁÑËÓÃÎÂÓÂÀÍÍß Â ÃÅÒÅÐÎÃÅÍÍÈÕ ÎÄÍÎÐÀÍÃÎÂÈÕ ÑÀÌÎÎÐÃÀͲÇÎÂÀÍÈÕ
ÌÅÐÅÆÀÕ |
ÎÏÒÈÌÈÇÀÖÈÎÍÍÀß ÏÎÑÒÀÍÎÂÊÀ ÇÀÄÀ×È ÏÐÈÍßÒÈß ÐÅØÅÍÈÉ Î ÏÅÐÅÄÀ×Å ÎÁÑËÓÆÈÂÀÍÈß
 ÃÅÒÅÐÎÃÅÍÍÛÕ ÎÄÍÎÐÀÍÃÎÂÛÕ
ÑÀÌÎÎÐÃÀÍÈÇÓÞÙÈÕÑß ÑÅÒßÕ |
143–147 |
|
||||
Çåëåíèé
êîìï’þòèíã òà êîìóí³êàö³¿ |
||||
Òàðàñþê Î.
Ì. |
ISSUES OF DEVELOPING HETEROGENEOUS SYSTEMS FOR
GLOBALLY-DISTRIBUTED DATA PROCESSING
AND STORAGE |
ÏÐÎÁËÅÌÈ ÑÒÂÎÐÅÍÍß ÃÅÒÅÐÎÃÅÍÍÈÕ ÑÈÑÒÅÌ
ÄËß ÃËÎÁÀËÜÍÎ-ÐÎÇÏÎIJËÅÍί ÎÁÐÎÁÊÈ ÒÀ ÇÁÅвÃÀÍÍß ²ÍÔÎÐÌÀÖ²¯ |
ÏÐÎÁËÅÌÛ ÑÎÇÄÀÍÈß ÃÅÒÅÐÎÃÅÍÍÛÕ ÑÈÑÒÅÌ ÄËß
ÃËÎÁÀËÜÍÎ-ÐÀÑÏÐÅÄÅ˨ÍÍÎÉ ÎÁÐÀÁÎÒÊÈ È ÕÐÀÍÅÍÈß ÈÍÔÎÐÌÀÖÈÈ |
148–154 |
Îë³éíèê Â.
Ï., |
ESTIMATION OF RADIATIVE PROPERTIES OF APPARATUS FOR INFORMATION-WAVE THERAPY |
ÎÖ²ÍÊÀ ÂÈÏÐÎ̲ÍÞÂÀËÜÍÈÕ
ÂËÀÑÒÈÂÎÑÒÅÉ ÀÏÀÐÀÒÓ ÄËß ²ÍÔÎÐÌÀÖ²ÉÍÎ-ÕÂÈËÜÎÂί ÒÅÐÀϲ¯ |
|
155–159 |
Òóðêèí
È. Á., |
THE MODEL OF USER’S ACTIVITY
IN POLIÑY OF PERSONAL COMPUTER POWER MANAGEMENT |
ÌÎÄÅËÜ ÀÊÒÈÂÍÎÑÒ²
ÊÎÐÈÑÒÓÂÀ×À  ÏÎ˲ÒÈÖ² ÊÅÐÓÂÀÍÍß ÆÈÂËÅÍÍßÌ ÏÅÐÑÎÍÀËÜÍÎÃÎ ÊÎÌÏ'ÞÒÅÐÀ |
ÌÎÄÅËÜ ÀÊÒÈÂÍÎÑÒÈ ÏÎËÜÇÎÂÀÒÅËß Â ÏÎËÈÒÈÊÅ ÓÏÐÀÂËÅÍÈß
ÝÍÅÐÃÎÏÈÒÀÍÈÅÌ ÏÅÐÑÎÍÀËÜÍÎÃÎ ÊÎÌÏÜÞÒÅÐÀ |
160–164 |
Ϻâíºâ Â. ß., |
ENERGY EFFICIENCY
OF ERROR CONTROLLED CODES ASSESSMENT METHODOLOGY |
ÌÅÒÎÄÈÊÀ ÎÖÅÍÊÈ ÝÍÅÐÃÎÝÔÔÅÊÒÈÂÍÎÑÒÈ ÏÎÌÅÕÎÓÑÒÎÉ×ÈÂÛÕ ÊÎÄΠ|
165–170 |
|
Iqbal A., |
USING
SNMPV3 FOR RESOURCES MONITORING OF HOSTED AND
BARE-METAL HYPERVISORS |
ÂÈÊÎÐÈÑÒÀÍÍß SNMP V3 ÄËß ÌÎͲÒÎÐÈÍÃÓ
ÐÅÑÓÐѲ ÕÎÑÒÎÂÈÕ ² ÀÂÒÎÍÎÌÍÈÕ Ã²ÏÅвÇÎв |
ÈÑÏÎËÜÇÎÂÀÍÈÅ SNMPV3 ÄËß ÌÎÍÈÒÎÐÈÍÃÀ ÐÅÑÓÐÑÎÂ ÕÎÑÒÎÂÛÕ
È ÀÂÒÎÍÎÌÍÛÕ ÃÈÏÅÐÂÈÇÎÐÎÂ |
171–178 |
Andreichenko D. K., |
DYNAMIC BALANCING OF COMPUTING LOAD IN HIGHLY
PARALLEL PROBLEM SOLVING |
ÄÈÍÀ̲×ÍÅ ÁÀËÀÍÑÓÂÀÍÍß ÎÁ×ÈÑËÞÂÀËÜÍÎÃÎ ÍÀÂÀÍÒÀÆÅÍÍß ÏÐÈ ÂÈвØÅÍͲ ÇÀÂÄÀÍÜ Ç
ÂÈÑÎÊÈÌ ÑÒÓÏÅÍÅÌ ÏÀÐÀËÅ˲ÇÌÓ |
ÄÈÍÀÌÈ×ÅÑÊÀß
ÁÀËÀÍÑÈÐÎÂÊÀ ÂÛ×ÈÑËÈÒÅËÜÍÎÉ ÍÀÃÐÓÇÊÈ ÏÐÈ ÐÅØÅÍÈÈ ÇÀÄÀ× Ñ ÂÛÑÎÊÎÉ ÑÒÅÏÅÍÜÞ
ÏÀÐÀËËÅËÈÇÌÀ |
179–186 |
ʳáåðô³çè÷í³ ñèñòåìè òà ²íòåðíåò ðå÷åé |
||||
Õàõàíîâ Â. È., |
CYBER SOCIAL
SYSTEM – SMART CYBER UNIVERSITY |
ʲÁÅÐÑÎÖ²ÀËÜÍÀ ÑÈÑÒÅÌÀ – ÐÎÇÓÌÍÈÉ Ê²ÁÅÐ ÓͲÂÅÐÑÈÒÅÒ |
187–194 |
|
Kulik À.S. |
ÐÀÖ²ÎÍÀËÜÍÀ ²ÍÒÅËÅÊÒÓÀ˲ÇÀÖ²ß ÓÏÐÀÂ˲ÍÍß Ë²ÒÀËÜÍÈÌÈ ÀÏÀÐÀÒÀÌÈ |
ÐÀÖÈÎÍÀËÜÍÀß
ÈÍÒÅËËÅÊÒÓÀËÈÇÀÖÈß ÓÏÐÀÂËÅÍÈß ËÅÒÀÒÅËÜÍÛÌÈ ÀÏÏÀÐÀÒÀÌÈ |
195–200 |
|
Ñèëàêîâ À. È., |
MODELING OF TECHNOLOGICAL PROCESSES AND HYDRAULIC NETWORKS FOR SEARCH AND ANALYZING
OF DEFECTS ON THE MANUFACTURE |
ÌÎÄÅËÞÂÀÍÍß ÒÅÕÍÎËÎò×ÍÈÕ ÏÐÎÖÅѲ ² òÄÐÀÂ˲×ÍÈÕ ÌÅÐÅÆ ÄËß ÏÎØÓÊÓ ² ÀÍÀ˲ÇÓ
ÄÅÔÅÊҲ ÍÀ ÂÈÐÎÁÍÈÖÒ² |
201–206 |
|
Ñà÷åíêî À. Î., |
THE CONCEPTION OF IMPLEMENTING THE MOBILE SYSTEMS
OF AFTER-EMERGENSY MONITORING
OF NUCLEAR POWER PLANTS USING A FLEET OF QUADROCOPTERS |
ÊÎÍÖÅÏÖÈß
ÏÎÑÒÐÎÅÍÈß ÌÎÁÈËÜÍÛÕ ÑÈÑÒÅÌ ÏÎÑÒ-ÀÂÀÐÈÉÍÎÃÎ
ÌÎÍÈÒÎÐÈÍÃÀ ÀÅÑ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÔËÎÒÀ ÊÂÀÄÐÎÊÎÏÒÅÐÎÂ |
207–214 |
|
|
||||
215 |
Øàíîâí³
÷èòà÷³!
Íàóêîâî-òåõí³÷íèé æóðíàë «ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ'ÞÒÅÐͲ ÑÈÑÒÅÌÈ»:
- âõîäèòü äî çàòâåðäæåíîãî ÌÎÍ Óêðà¿íè Ïåðåë³êó íàóêîâèõ ôàõîâèõ âèäàíü Óêðà¿íè, â
ÿêèõ ìîæóòü ïóáë³êóâàòèñÿ ðåçóëüòàòè äèñåðòàö³éíèõ ðîá³ò íà çäîáóòòÿ íàóêîâèõ
ñòóïåí³â äîêòîðà ³ êàíäèäàòà íàóê (äèâ. íàêàç
ÌÎÍ Óêðà¿íè ¹ 1279 â³ä 6.11.2014 ð.);
- çáåð³ãàºòüñÿ ó
çàãàëüíîäåðæàâí³é ðåôåðàòèâí³é áàç³ äàíèõ «Óêðà¿í³êà
íàóêîâà» òà ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ óêðà¿íñüêîãî
ðåôåðàòèâíîãî æóðíàëó «Äæåðåëî»
(â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà
Web-ñåðâåð³ http://www.nbuv.gov.ua)
(Óêðà¿íà);
- çáåð³ãàºòüñÿ ó
ðåôåðàòèâí³é áàç³ äàíèõ Âñåðîñ³éñüêîãî ³íñòèòóòó íàóêîâî¿ ³ òåõí³÷íî¿
³íôîðìàö³¿ (²ͲҲ)
Ðîñ³éñüêî¿ àêàäå쳿 íàóê ³ ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÐÆ (â³ëüíèé îí-ëàéíîâèé äîñòóï äî
ðåñóðñ³â íà Web-ñåðâåð³ http://www.viniti.ru)
(Ðîñ³éñüêà Ôåäåðàö³ÿ);
- âêëþ÷åíèé äî ì³æíàðîäíèõ
á³áë³îìåòðè÷íèõ òà íàóêîìåòðè÷íèõ
áàç äàíèõ: íàóêîâî¿ åëåêòðîííî¿ á³áë³îòåêè eLIBRARY.RU (Ðîñ³éñüêà
Ôåäåðàö³ÿ); Index
Copernicus (ICV
2013: 4,36; 2014: 52,23) (Ïîëüùà); INSPEC (Institution of
Engineering and Technology, Âåëèêîáðèòàí³ÿ); CiteFactor; Academic Keys; Infobase Index; Google Scholar (á³áë³îìåòðè÷í³ ïîêàçíèêè – quot.=1766
/ h = 11 / i10 = 17).