Íàö³îíàëüíèé àåðîêîñì³÷íèé óí³âåðñèòåò ³ì. Ì.ª. Æóêîâñüêîãî “Õàðê³âñüêèé àâ³àö³éíèé ³íñòèòóò”

 

ISSN 1814-4225. ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ’ÞÒÅÐͲ ÑÈÑÒÅÌÈ. – 2016. ¹ 6 (80). – 242 ñ.

ISSN 1814-4225. ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÅ È ÊÎÌÏÜÞÒÅÐÍÛÅ ÑÈÑÒÅÌÛ. – 2016. ¹ 6 (80). – 242 ñ.

ISSN 1814-4225. RADIOELECTRONIC AND COMPUTER SYSTEMS. – 2016. ¹ 6 (80). – 242 ñ.

 

Ìàòåð³àëè, ùî ì³ñòÿòüñÿ â æóðíàë³, îïóáë³êîâàí³ çà ð³øåííÿì Ïðîãðàìíîãî êîì³òåòó
̳æíàðîäíî¿ íàóêîâî-òåõí³÷íî¿ êîíôåðåíö³¿ «CYBER FORUM DESSERT 2016»

 

ÑÒÀÒÒ² (articleS)

 

Àâòîðè (ìîâà îðèã³íàëó)

Íàçâà ñòàòò³ (article title)

Ñòîð³íêè

(pages)

English

Óêðà¿íñüêà ìîâà

Ðóññêèé ÿçûê

Ãàðàíòîçäàòí³ñòü òà ðåç³ë’ºíòí³ñòü õìàðíèõ ñèñòåì

Èâàí÷åíêî Î. Â.,
Õàð÷åíêî Â. Ñ.

ANALYSIS OF STOCHASTIC METHODS FOR METAMODELING AND AVAILABILITY ESTIMATION FOR CLOUD INFRASTRUCTURE

ÀÍÀË²Ç ÑÒÎÕÀÑÒÈ×ÍÈÕ ÌÅÒÎIJ ÌÅÒÀÌÎÄÅËÞÂÀÍÍß ÒÀ ÎÖ²ÍÞÂAÍÍß ÃÎÒÎÂÍÎÑÒ² ÕÌÀÐÍÈÕ ²ÍÔÐÀÑÒÐÓÊÒÓÐ

ÀÍÀËÈÇ ÑÒÎÕÀÑÒÈ×ÅÑÊÈÕ ÌÅÒÎÄΠÌÅÒÀÌÎÄÅËÈÐÎÂÀÍÈß È ÎÖÅÍÈÂÀÍÈß ÃÎÒÎÂÍÎÑÒÈ ÎÁËÀ×ÍÛÕ ÈÍÔÐÀÑÒÐÓÊÒÓÐ

6–11
(6)

Ñîêîëîâà Å. Â.,
Ïåòåðãåðèíà Þ. À.

COMPARATIVE QUALITY ANALYSIS OF GOOGLE DOCS AND MICROSOFT OFFICE WORD CLOUD-BASED WEB APPS USER INTERFACES

ÏÎвÂÍßËÜÍÈÉ ÀÍÀË²Ç ßÊÎÑÒ² ÊÎÐÈÑÒÓÂÀËÜÍÈÖÜÊÈÕ ²ÍÒÅÐÔÅÉѲ ÕÌÀÐÍÈÕ ÒÅÊÑÒÎÂÈÕ ÐÅÄÀÊÒÎв GOOGLE DOCS ² MICROSOFT OFFICE WORD WEB APPS

ÑÐÀÂÍÈÒÅËÜÍÛÉ ÀÍÀËÈÇ ÊÀ×ÅÑÒÂÀ ÏÎËÜÇÎÂÀÒÅËÜÑÊÈÕ ÈÍÒÅÐÔÅÉÑΠÎÁËÀ×ÍÛÕ ÒÅÊÑÒÎÂÛÕ ÐÅÄÀÊÒÎÐΠGOOGLE DOCS È MICROSOFT OFFICE WORD WEB APPS

12–17
(6)

Yanovsky M.,
Yanovskaya O.,
Butenko V.,
Devetzoglou M.

DISTRIBUTED CLOUD SYSTEM: SECURITY AND KEYWORD INDEXING ISSUES WITH IMPLEMENTATION STRATEGY AND BUSINESS LIMITATIONS

ÐÎÇÏÎIJËÅÍÀ ÕÌÀÐÍÀ ÑÈÑÒÅÌÀ: ÊÎÍÖÅÏÖ²ß ÁÅÇÏÅÊÈ, ²ÍÄÅÊÑÀÖ²ß ÊÎÍÒÅÍÒÓ ² ÑÒÐÀÒÅÃ²ß ÂÏÐÎÂÀÄÆÅÍÍß Â ÓÌÎÂÀÕ ÎÁÌÅÆÅÍÍß ÂÈÒÐÀÒ

ÐÀÑÏÐÅÄÅËÅÍÍÀß ÎÁËÀ×ÍÀß ÑÈÑÒÅÌÀ: ÊÎÍÖÅÏÖÈß ÁÅÇÎÏÀÑÍÎÑÒÈ, ÈÍÄÅÊÑÀÖÈß ÊÎÍÒÅÍÒÀ È ÑÒÐÀÒÅÃÈß ÂÍÅÄÐÅÍÈß Â ÓÑËÎÂÈßÕ ÎÃÐÀÍÈ×ÅÍÈß ÇÀÒÐÀÒ

18–23
(6)

²íôîðìàö³éíà òà ôóíêö³îíàëüíà áåçïåêà ²ÓÑ

Ôåäàñþê Ä. Â.,
Âîëî÷³é Ñ. Á.

METHOD OF THE STRUCTURAL-AUTOMATON MODELS DEVELOPMENT FOR DISCRETE-CONTINUOUS STOCHASTIC SYSTEMS

ÌÅÒÎÄÈÊÀ ÐÎÇÐÎÁËÅÍÍß ÑÒÐÓÊÒÓÐÍÎ-ÀÂÒÎÌÀÒÍÈÕ ÌÎÄÅËÅÉ ÄÈÑÊÐÅÒÍÎ-ÍÅÏÅÐÅÐÂÍÈÕ ÑÒÎÕÀÑÒÈ×ÍÈÕ ÑÈÑÒÅÌ

ÌÅÒÎÄÈÊÀ ÐÎÇÐÀÁÎÒÊÈ ÑÒÐÓÊÒÓÐÍÎ-ÀÂÒÎÌÀÒÍÛÕ ÌÎÄÅËÅÉ ÄÈÑÊÐÅÒÍÎ-ÍÅÏÐÅÐÛÂÍÈÕ ÑÒÎÕÀÑÒÈ×ÍÈÕ ÑÈÑÒÅÌ

24–34
(11)

Ñàâåíêî Î. Ñ.,
ͳ÷åïîðóê À. Î.,
Ëèñåíêî Ñ. Ì.

METHODS FOR DETECTION OF POLYMORPHIC VIRUSES BASED ON MODIFIED EMULATORS

ÌÅÒÎÄ ÂÈßÂËÅÍÍß ÏÎ˲ÌÎÐÔÍÈÕ Â²ÐÓѲ ÍÀ ÎÑÍβ ÌÎÄÈÔ²ÊÎÂÀÍÈÕ ÅÌÓËßÒÎвÂ

ÌÅÒÎÄ ÎÁÍÀÐÓÆÅÍÈß ÏÎËÈÌÎÐÔÍÛÕ ÂÈÐÓÑÎÂ ÍÀ ÎÑÍÎÂÅ ÌÎÄÈÔÈÖÈÐÎÂÀÍÍÛÕ ÝÌÓËßÒÎÐÎÂ

35–40
(6)

Malinovsky M. L.,
Karaman D. G.

ARCHITECTURE AND IMPLEMENTATION PRINCIPLES OF DATA EXCHANGE EQUIPMENT FOR SAFETY RELATED SYSTEMS

ÀÐÕ²ÒÅÊÒÓÐÀ ÒÀ ÏÐÈÍÖÈÏÈ ÐÅÀ˲ÇÀÖ²¯ ÀÏÀÐÀÒÓÐÈ ÑÏÎËÓ×ÅÍÍß ÑÈÑÒÅÌ, ÙÎ ÏÎÂ'ßÇÀͲ Ç ÁÅÇÏÅÊÎÞ

ÀÐÕÈÒÅÊÒÓÐÀ È ÏÐÈÍÖÈÏÛ ÐÅÀËÈÇÀÖÈÈ ÀÏÏÀÐÀÒÓÐÛ ÑÎÏÐ߯ÅÍÈß ÑÈÑÒÅÌ, ÑÂßÇÀÍÍÛÕ Ñ ÁÅÇÎÏÀÑÍÎÑÒÜÞ

41–45
(5)

Òåöêèé À. Ã.,
Óçóí Ä. Ä.

RESEARCH OF PENETRATION ATTACK ON CONTENT MANAGEMENT SYSTEM USING MARKOV’S MODEL

ÄÎÑË²ÄÆÅÍÍß ÀÒÀÊÈ ÍÀ ÏÐÎÍÈÊÍÅÍÍß ÍÀ ÑÈÑÒÅÌÓ ÓÏÐÀÂ˲ÍÍß ÊÎÍÒÅÍÒÎÌ ÇÀ ÄÎÏÎÌÎÃÎÞ ÌÀÐÊÎÂÑÜÊί ÌÎÄÅ˲

ÈÑÑËÅÄÎÂÀÍÈÅ ÀÒÀÊÈ ÍÀ ÏÐÎÍÈÊÍÎÂÅÍÈÅ ÍÀ ÑÈÑÒÅÌÓ ÓÏÐÀÂËÅÍÈß ÊÎÍÒÅÍÒÎÌ Ñ ÏÎÌÎÙÜÞ ÌÀÐÊÎÂÑÊÎÉ ÌÎÄÅËÈ

46–49
(4)

ßê³ñòü, íàä³éí³ñòü òà áåçïåêà ÏÇ

Áåëîáîðîäîâ À. Þ.,
Ãîðáåíêî À. Â.,
Òàðàñþê Î. Ì.,
Øåðåìåò Ñ. À.

SERVER OPERATING SYSTEM VULNERABILITIES INVESTIGATION

ÄÎÑË²ÄÆÅÍÍß ÂÐÀÇËÈÂÎÑÒÅÉ ÑÅÐÂÅÐÍÈÕ ÎÏÅÐÀÖ²ÉÍÈÕ ÑÈÑÒÅÌ

ÈÑÑËÅÄÎÂÀÍÈÅ ÓßÇÂÈÌÎÑÒÅÉ ÑÅÐÂÅÐÍÛÕ ÎÏÅÐÀÖÈÎÍÍÛÕ ÑÈÑÒÅÌ

50–58
(9)

Ãîâîðóùåíêî Ò. Î.,
Ïîìîðîâà Î. Â.

METHOD OF ASSESSMENT OF INFORMATION SUFFICIENCY FOR DETERMINATION OF SOFTWARE COMPLEXITY AND QUALITY BASED ON THE COMPARATIVE ANALYSIS OF ONTOLOGIES

ÌÅÒÎÄ ÎÖ²ÍÊÈ ÄÎÑÒÀÒÍÎÑÒ² ²ÍÔÎÐÌÀÖ²¯ ÄËß ÂÈÇÍÀ×ÅÍÍß ÑÊËÀÄÍÎÑÒ² ÒÀ ßÊÎÑÒ² ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÍÀ ÎÑÍβ ÏÎвÂÍßËÜÍÎÃÎ ÀÍÀ˲ÇÓ ÎÍÒÎËÎòÉ

ÌÅÒÎÄ ÎÖÅÍÊÈ ÄÎÑÒÀÒÎ×ÍÎÑÒÈ ÈÍÔÎÐÌÀÖÈÈ ÄËß ÎÏÐÅÄÅËÅÍÈß ÑËÎÆÍÎÑÒÈ È ÊÀ×ÅÑÒÂÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÍÀ ÎÑÍÎÂÅ ÑÐÀÂÍÈÒÅËÜÍÎÃÎ ÀÍÀËÈÇÀ ÎÍÒÎËÎÃÈÉ

59–68
(10)

Äóáíèöêèé Â. Þ.,
Êîáûëèí À. Ì.

INTERVAL CALCULATIONS IN CENTER-RADIUS SYSTEM FOR ASSESSMENT OF SOFTWARE SYSTEMS RELIABILITY

ÇÀÑÒÎÑÓÂÀÍÍß ²ÍÒÅÐÂÀËÜÍÈÕ ÎÁ×ÈÑËÅÍÜ Â ÑÈÑÒÅ̲ ÖÅÍÒÐ-ÐÀIJÓÑ ÄËß ÂÈÇÍÀ×ÅÍÍß ÍÀIJÉÍÎÑÒ² ÏÐÎÃÐÀÌÍÈÕ ÑÈÑÒÅÌ

ÏÐÈÌÅÍÅÍÈÅ ÈÍÒÅÐÂÀËÜÍÛÕ ÂÛ×ÈÑËÅÍÈÉ Â ÑÈÑÒÅÌÅ ÖÅÍÒÐ-ÐÀÄÈÓÑ ÄËß ÎÏÐÅÄÅËÅÍÈß ÍÀĨÆÍÎÑÒÈ ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ

69–76
(8)

ßðåì÷óê Ñ. À.,
Õàð÷åíêî Â. Ñ.

EXPERIMENTAL VERIFICATION OF THE METHOD FOR CHOOSING COMPONENTS WITH FAULTS FOR SOFTWARE SYSTEMS

ÅÊÑÏÅÐÈÌÅÍÒÀËÜÍÀ ÏÅÐŲÐÊÀ ÌÅÒÎÄÓ Â²ÄÁÎÐÓ ÄÅÔÅÊÒÎÂ̲ÙÓÞ×ÈÕ ÊÎÌÏÎÍÅÍҲ ÏÐÎÃÐÀÌÍÈÕ ÑÈÑÒÅÌ

ÝÊÑÏÅÐÈÌÅÍÒÀËÜÍÀß ÏÐÎÂÅÐÊÀ ÌÅÒÎÄÀ ÎÒÁÎÐÀ ÄÅÔÅÊÒÎÑÎÄÅÐÆÀÙÈÕ ÊÎÌÏÎÍÅÍÒÎÂ ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ

77–81
(5)

ijàãíîñòóâàííÿ òà âåðèô³êàö³ÿ

Èâàñþê À. Î.,
Ïîíî÷îâíûé Þ. Ë.,
Áóëüáà Å. Í.

THE FAULT-INJECTION TESTING OF INSTRUMENTATION AND CONTROL SYSTEM MODULES BASED ON SELF-DIAGNOSTIC PROGRAMMABLE PLATFORMS

ÏÐÎÖÅÄÓÐÈ ÒÅÑÒÓÂÀÍÍß ÌÎÄÓ˲ ²ÍÔÎÐÌÀÖ²ÉÍÎ-ÓÏÐÀÂËßÞ×ÈÕ ÑÈÑÒÅÌ ÍÀ ÎÑÍβ ÑÀÌÎIJÀÃÍÎÑÒÎÂÀÍÈÕ ÏÐÎÃÐÀÌÎÂÀÍÈÕ ÏËÀÒÔÎÐÌ Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ÇÀѲÂÓ ÄÅÔÅÊÒ²Â

ÏÐÎÖÅÄÓÐÛ ÒÅÑÒÈÐÎÂÀÍÈß ÌÎÄÓËÅÉ ÈÍÔÎÐÌÀÖÈÎÍÍÎ-ÓÏÐÀÂËßÞÙÈÕ ÑÈÑÒÅÌ ÍÀ ÎÑÍÎÂÅ ÑÀÌÎÄÈÀÃÍÎÑÒÈÐÓÅÌÛÕ ÏÐÎÃÐÀÌÌÈÐÓÅÌÛÕ ÏËÀÒÔÎÐÌ Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÇÀÑÅÂÀ ÄÅÔÅÊÒÎÂ

82–87
(6)

Êîë³ñíèê Ì. Î.,
ϳñêà÷îâà ². Â.,
Áàíòþêîâà Ñ. Î.

IMPACT ASSESSMENT OF QUALIFICATION OF SOFTWARE DEVELOPERS ON THE RELIABILITY OF MICROPROCESSOR SYSTEMS OF RELAY PROTECTION AND AUTOMATION

ÎÖ²ÍÊÀ ÂÏËÈÂÓ ÊÂÀ˲ԲÊÀÖ²¯ Ó×ÀÑÍÈʲ ÐÎÇÐÎÁÊÈ ÏÐÎÃÐÀÌÍÈÕ ÇÀÑÎÁ²Â ÍÀ ÍÀIJÉͲÑÒÜ Ì²ÊÐÎÏÐÎÖÅÑÎÐÍÈÕ ÑÈÑÒÅÌ ÐÅËÅÉÍÎÃÎ ÇÀÕÈÑÒÓ É ÀÂÒÎÌÀÒÈÊÈ

ÎÖÅÍÊÀ ÂËÈßÍÈß ÊÂÀËÈÔÈÊÀÖÈÈ Ó×ÀÑÒÍÈÊΠÐÀÇÐÀÁÎÒÊÈ ÏÐÎÃÐÀÌÌÍÛÕ ÑÐÅÄÑÒ ÍÀ ÍÀÄÅÆÍÎÑÒÜ ÌÈÊÐÎÏÐÎÖÅÑÑÎÐÍÛÕ ÑÈÑÒÅÌ ÐÅËÅÉÍÎÉ ÇÀÙÈÒÛ È ÀÂÒÎÌÀÒÈÊÈ

88–93
(6)

Ñêàðãà-Áàíäóðîâà ². Ñ.,
Êîâàëåíêî ß. Ï.

TECHNOLOGICAL ASPECTS OF STATIC CODE ANALYSIS FOR SOFTWARE COMPONENTS OF MICROPROCESSOR INTERLOCKING SYSTEM

ÒÅÕÍÎËÎò×Ͳ ÀÑÏÅÊÒÈ ÑÒÀÒÈ×ÍÎÃÎ ÀÍÀ˲ÇÓ ÊÎÄÓ ÏÐÎÃÐÀÌÍÎÃÎ ÇÀÁÅÇÏÅ×ÅÍÍß ÑÈÑÒÅÌ ÇÀ˲ÇÍÈ×Íί ÀÂÒÎÌÀÒÈÇÀÖ²¯

ÒÅÕÍÎËÎÃÈ×ÅÑÊÈÅ ÀÑÏÅÊÒÛ ÑÒÀÒÈ×ÅÑÊÎÃÎ ÀÍÀËÈÇÀ ÊÎÄÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÑÈÑÒÅÌ ÆÅËÅÇÍÎÄÎÐÎÆÍÎÉ ÀÂÒÎÌÀÒÈÇÀÖÈÈ

94–100
(7)

Drozd A.,
Drozd J.,
Nikul V.,
Al-Dhabi M.

A METHOD OF THE SCAN CHECKING FOR ON-LINE TESTING OF SAFE MULTITHREADED BITWISE PIPELINE SYSTEM

ÌÅÒÎÄ ÑÊÀÍÓÞ×ÎÃÎ ÊÎÍÒÐÎËÞ ÄËß ÐÎÁÎ×ÎÃΠIJÀÃÍÎÑÒÓÂÀÍÍß ÁÀÃÀÒÎÏÎÒÎ×Íί ÏÎÐÎÇÐßÄÍί ÊÎÍÂŪÐÍί ÑÈÑÒÅÌÈ

ÌÅÒÎÄ ÑÊÀÍÈÐÓÞÙÅÃÎ ÊÎÍÒÐÎËß ÄËß ÐÀÁÎ×ÅÃÎ ÄÈÀÃÍÎÑÒÈÐÎÂÀÍÈß ÌÍÎÃÎÏÎÒÎ×ÍÎÉ ÏÎÐÀÇÐßÄÍÎÉ ÊÎÍÂÅÉÅÐÍÎÉ ÑÈÑÒÅÌÛ

101–107
(7)

Ìîðîçîâ Ê. Â.,
Ðîìàíêåâè÷ À. Ì.,
Ðîìàíêåâè÷ Â. À.

ABOUT THE INFLUENCE OF EDGE FUNCTIONS MODIFICATION OF GL-MODEL ON ITS BEHAVIOR IN FLOW OF FAILURES

ÏÐÎ ÕÀÐÀÊÒÅÐ ÂÏËÈÂÓ ÌÎÄÈÔ²ÊÀÖ²¯ ÐÅÁÅÐÍÈÕ ÔÓÍÊÖ²É GL-ÌÎÄÅ˲ ÍÀ ¯¯ ÏÎÂÅIJÍÊÓ Â ÏÎÒÎÖ² ²ÄÌÎÂ

Î ÕÀÐÀÊÒÅÐÅ ÂËÈßÍÈß ÌÎÄÈÔÈÊÀÖÈÈ ÐÅÁÅÐÍÛÕ ÔÓÍÊÖÈÉ GL-ÌÎÄÅËÈ ÍÀ ÅÅ ÏÎÂÅÄÅÍÈÅ Â ÏÎÒÎÊÅ ÎÒÊÀÇÎÂ

108–112
(5)

Ìîñêâ³íà ². ².,
Ñòåôàíîâè÷ Ò. Î.,
Ùåðáîâñüêèõ Ñ. Â.

CONSIDERING OF THE FIRST AND SECOND TYPES ERRORS OF SWITCHING DEVICE FOR RELIABILITY OF SYSTEM WITH COLD REDUNDANCY

ÂÐÀÕÓÂÀÍÍß ÏÎÌÈËÎÊ ÏÅÐØÎÃÎ ÒÀ ÄÐÓÃÎÃÎ ÐÎÄÓ ÏÅÐÅÌÈÊÀËÜÍÎÃÎ ÏÐÈÑÒÐÎÞ ÄËß ÑÈÑÒÅÌÈ ²Ç ÕÎËÎÄÍÈÌ ÐÅÇÅÐÂÓÂÀÍÍßÌ

Ó×ÅÒ ÎØÈÁÎÊ ÏÅÐÂÎÃÎ È ÂÒÎÐÎÃÎ ÐÎÄÀ ÓÑÒÐÎÉÑÒÂÀ ÏÅÐÅÊËÞ×ÅÍÈß ÄËß ÑÈÑÒÅÌÛ Ñ ÕÎËÎÄÍÛÌ ÐÅÇÅÐÂÈÐÎÂÀÍÈÅÌ

113–119
(7)

Volochiy B.,
Ozirkovkyy L.,
Zmysnyi M.,
Kulyk I.

DESIGNING OF FAULT-TOLERANT RADIO ELECTRONIC SYSTEMS WITH COMPLEX MAJORITY STRUCTURES

ÏÐÎÅÊÒÓÂÀÍÍß Â²ÄÌÎÂÎÑÒ²ÉÊÈÕ ÐÀIJÎÅËÅÊÒÐÎÍÍÈÕ ÑÈÑÒÅÌ ²Ç ÑÊËÀÄÍÈÌÈ ÌÀÆÎÐÈÒÀÐÍÈÌÈ ÑÒÐÓÊÒÓÐÀÌÈ

ÏÐÎÅÊÒÈÐÎÂÀÍÈÅ ÎÒÊÀÇÎÓÑÒÎÉ×ÈÂÛÕ ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÕ ÑÈÑÒÅÌ ÑÎ ÑËÎÆÍÛÌÈ ÌÀÆÎÐÈÒÀÐÍÈÌÈ ÑÒÐÓÊÒÓÐÀÌÈ

120–129
(10)

³äìîâîáåçïå÷í³ ïðîãðàìîâí³ ñèñòåìè

Êîëåñíèê È. Í.,
Êóëàíîâ Â. À.,
Ïåðåïåëèöûí À. Å.

ANALYSIS OF FPGA TECHNOLOGIES APPLICATION AS A PART OF CLOUD INFRASTRUCTURE

ÀÍÀË²Ç ÇÀÑÒÎÑÓÂÀÍÍß ÒÅÕÍÎËÎò¯ FPGA  ÑÊËÀIJ ÕÌÀÐÍί ²ÍÔÐÀÑÒÐÓÊÒÓÐÈ

ÀÍÀËÈÇ ÏÐÈÌÅÍÅÍÈß ÒÅÕÍÎËÎÃÈÈ FPGA  ÑÎÑÒÀÂÅ ÎÁËÀ×ÍÎÉ ÈÍÔÐÀÑÒÐÓÊÒÓÐÛ

130–135
(6)

Òêà÷óê Ò. ².

ANALYSIS OF VHDL-MODELS OF OPTIMIZED MATRIX MULTIPLICATION DEVICES

ÀÍÀË²Ç VHDL-ÌÎÄÅËÅÉ ÎÏÒÈ̲ÇÎÂÀÍÈÕ ÌÀÒÐÈ×ÍÈÕ ÏÐÈÑÒÐί ÌÍÎÆÅÍÍß

ÀÍÀËÈÇ VHDL-ÌÎÄÅËÅÉ ÎÏÒÈÌÈÇÈÐÎÂÀÍÍÛÕ ÌÀÒÐÈ×ÍÛÕ ÓÑÒÐÎÉÑÒ ÓÌÍÎÆÅÍÈß

136–140
(5)

Èëüÿøåíêî Î. À.,
Õàð÷åíêî Â. Ñ.,
×óéêîâ ß. À.

SAFETY ANALYSIS OF FPGA-BASED SYSTEMS USING XMECA FOR V-MODEL OF LIFE CYCLE

ÎÖ²ÍÊÀ ÁÅÇÏÅÊÈ ÑÈÑÒÅÌ ÍÀ FPGA Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ XMECA ÄËß V-ÌÎÄÅ˲ ÆÈÒÒªÂÎÃÎ ÖÈÊËÓ

ÎÖÅÍÊÀ ÁÅÇÎÏÀÑÍÎÑÒÈ ÑÈÑÒÅÌ ÍÀ FPGA Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ XMECA ÄËß V-ÌÎÄÅËÈ ÆÈÇÍÅÍÍÎÃÎ ÖÈÊËÀ

141–147
(7)

ʳáåðô³çè÷í³ ñèñòåìè òà ³íòåðíåò ðå÷åé

Habh Yasir Mundher, Kharchenko V. S.

SMART HOME FOR OLDER PEOPLE: REVIEW OF ARDUINO BASED SYSTEM

ÓÌÍÛÉ ÄÎÌ ÄËß ÏÎÆÈËÛÕ ËÞÄÅÉ: ÎÁÇÎÐ ÑÈÑÒÅÌ ÍÀ ÎÑÍÎÂÅ ARDUINO

ÐÎÇÓÌÍÈÉ ÁÓÄÈÍÎÊ ÄËß ËÞÄÅÉ ÏÎÕÈËÎÃΠ²ÊÓ: ÎÃÄßÄ ÑÈÑÒÅÌ ÍÀ ÎÑÍβ ARDUINO

148–151
(4)

Ïàâëåíêî Â. Ì.,
Øîñòàê ². Â.,
Äàíîâà Ì. Î.,
Ìîðîçîâà Î. ².

THE PROBLEMS OF LOGISTICAL PROCESSES INFORMATIZATION WHILE CREATING THE VIRTUAL ENTERPRISES

ÏÐÎÁËÅÌÈ ²ÍÔÎÐÌÀÒÈÇÀÖ²¯ ËÎòÑÒÈ×ÍÈÕ ÏÐÎÖÅѲ ÏÐÈ ÑÒÂÎÐÅÍͲ ²ÐÒÓÀËÜÍÈÕ Ï²ÄÏÐȪÌÑÒÂ

ÏÐÎÁËÅÌÛ ÈÍÔÎÐÌÀÒÈÇÀÖÈÈ ËÎÃÈÑÒÈ×ÅÑÊÈÕ ÏÐÎÖÅÑÑΠÏÐÈ ÑÎÇÄÀÍÈÈ ÂÈÐÒÓÀËÜÍÛÕ ÏÐÅÄÏÐÈßÒÈÉ

152–157
(6)

Ôåäîðåíêî Í. È.,
Õàð÷åíêî Â. Ñ.

THE DEVELOPMENT OF MULTILEVEL SYSTEM FOR DISEASE DIAGNOSTICS USING NEURAL MODULES: THE PRINCIPLES OF IMPLEMENTATION

ÁÀÃÀÒÎвÂÍÅÂÀ ÑÈÑÒÅÌÀ IJÀÃÍÎÑÒÓÂÀÍÍß ÇÀÕÂÎÐÞÂÀÍÜ ÍÀ ÎÑÍβ ÍÅÉÐÎÌÅÐÅÆÅÂÈÕ ÌÎÄÓ˲Â: ÏÐÈÍÖÈÏÈ ÐÅÀ˲ÇÀÖ²¯

ÌÍÎÃÎÓÐÎÂÍÅÂÀß ÑÈÑÒÅÌÀ ÄÈÀÃÍÎÑÒÈÐÎÂÀÍÈß ÇÀÁÎËÅÂÀÍÈÉ ÍÀ ÎÑÍÎÂÅ ÍÅÉÐÎÑÅÒÅÂÛÕ ÌÎÄÓËÅÉ: ÏÐÈÍÖÈÏÛ ÐÅÀËÈÇÀÖÈÈ

158–162
(5)

Õàõàíîâ Â. È.,
Ëèòâèíîâà Å. È.,
×óìà÷åíêî Ñ. Â.,
Åìåëüÿíîâ È.,
Òàìåð Áàíè Àìåð

PROCESSOR STRUCTURES FOR BIG DATA ANALYSIS

ÏÐÎÖÅÑÎÐͲ ÑÒÐÓÊÒÓÐÈ ÄËß ÀÍÀ˲ÇÓ BIG DATA

ÏÐÎÖÅÑÑÎÐÍÛÅ ÑÒÐÓÊÒÓÐÛ ÄËß ÀÍÀËÈÇÀ BIG DATA

163–175
(13)

Ñïåö³àë³çîâàí³ ñèñòåìè, ìåðåæ³ òà ³íôîðìàö³éí³ òåõíîëî㳿

Subbotin S.,
Oliinyk A.,
Levashenko V.,
Zaitseva E.

INDUCTION OF CLASSIFICATION RULES IN CASE OF UNEVEN DISTRIBUTION OF CLASSES

ÏÎÁÓÄÎÂÀ ÏÐÀÂÈË ÊËÀÑÈÔ²ÊÀÖ²¯ ÏÐÈ ÍÅвÂÍÎ̲ÐÍÎÌÓ ÇÀÂÄÀÍͲ ÊËÀѲÂ

ÑÎÇÄÀÍÈÅ ÏÐÀÂÈË ÊËÀÑÑÈÔÈÊÀÖÈÈ ÏÐÈ ÍÅÐÀÂÍÎÌÅÐÍÎÌ ÇÀÄÀÍÈÈ ÊËÀÑÑÎÂ

176–180
(5)

Àëáóë À. Ñ.,
Áàáàêîâ Ì. Ô.

JUSTIFICATION OF THE ROUTING MODEL FOR LEO HIGH-SPEED DATA TRANSMISSION SATELLITE SYSTEMS

ÎÁÃÐÓÍÒÓÂÀÍÍß ÌÎÄÅ˲ ÌÀÐØÐÓÒÈÇÀÖ²¯ ÄËß ÁÀÃÀÒÎÑÓÏÓÒÍÈÊÎÂÈÕ LEO ÑÈÑÒÅÌ ÂÈÑÎÊÎØÂÈÄʲÑÍί ÏÅÐÅÄÀײ ÄÀÍÈÕ

ÎÁÎÑÍÎÂÀÍÈÅ ÌÎÄÅËÈ ÌÀÐØÐÓÒÈÇÀÖÈÈ ÄËß ÌÍÎÃÎÑÏÓÒÍÈÊÎÂÛÕ LEO ÑÈÑÒÅÌ ÂÛÑÎÊÎÑÊÎÐÎÑÒÍÎÉ ÏÅÐÅÄÀ×È ÄÀÍÍÛÕ

181–187
(7)

Âàìáîëü À. Ñ.

INVESTIGATION OF PERFORMANCE OF MAJORANT-SUPERPOSITION ALGORITHM FOR GENERATING A ROBUST SOLITON DISTRIBUTION

ÄÎÑË²ÄÆÅÍÍß ÏÐÎÄÓÊÒÈÂÍÎÑÒ² ÌÀÆÎÐÀÍÒÍÎ-ÑÓÏÅÐÏÎÇÈÖ²ÉÍÎÃÎ ÀËÃÎÐÈÒÌÓ ÃÅÍÅÐÀÖ²¯ ÐÎÁÀÑÒÍÎÃÎ ÐÎÇÏÎIJËÓ ÑÎ˲ÒÎÍÀ

ÈÑÑËÅÄÎÂÀÍÈÅ ÏÐÎÈÇÂÎÄÈÒÅËÜÍÎÑÒÈ ÌÀÆÎÐÀÍÒÎ-ÑÓÏÅÐÏÎÇÈÖÈÎÍÍÎÃÎ ÀËÃÎÐÈÒÌÀ ÃÅÍÅÐÀÖÈÈ ÐÎÁÀÑÒÍÎÃÎ ÐÀÑÏÐÅÄÅËÅÍÈß ÑÎËÈÒÎÍÀ

188–193
(6)

Æèõàðåâè÷ Â. Â.,
Îñòàïîâ Ñ. Ý.

RESEARCH OF REVERSIBILITY OF PROGRAMMATIC BINARY PSEUDORANDOM SEQUENCERS ON BASIS OF CELLULAR AUTOMATS

ÄÎÑË²ÄÆÅÍÍß ÇÂÎÐÎÒÍÎÑÒ² ÏÐÎÃÐÀÌÍÈÕ ÃÅÍÅÐÀÒÎв ÏÑÅÂÄÎÂÈÏÀÄÊÎÂÈÕ Á²ÍÀÐÍÈÕ ÏÎÑ˲ÄÎÂÍÎÑÒÅÉ ÍÀ ÎÑÍβ Ê˲ÒÈÍÍÈÕ ÀÂÒÎÌÀÒ²Â

ÈÑÑËÅÄÎÂÀÍÈÅ ÎÁÐÀÒÈÌÎÑÒÈ ÏÐÎÃÐÀÌÌÍÛÕ ÃÅÍÅÐÀÒÎÐΠÏÑÅÂÄÎÑËÓ×ÀÉÍÛÕ ÁÈÍÀÐÍÛÕ ÏÎÑËÅÄÎÂÀÒÅËÜÍÎÑÒÅÉ ÍÀ ÎÑÍÎÂÅ ÊËÅÒÎ×ÍÛÕ ÀÂÒÎÌÀÒÎÂ

194–198
(5)

Æóêîâ È. À.,
Êîâàëåâ Í.
 À.

PERFORMANCE OF DIGITAL INTEGRATING STRUCTURES

ØÂÈÄÊÎÄ²ß ÖÈÔÐÎÂÈÕ ²ÍÒÅÃÐÈÐÓÞ×ÈÕ ÑÒÐÓÊÒÓÐ

ÁÛÑÒÐÎÄÅÉÑÒÂÈÅ ÖÈÔÐÎÂÛÕ ÈÍÒÅÃÐÈÐÓÞÙÈÕ ÑÒÐÓÊÒÓÐ

199–203
(5)

Zemliachenko A. N.,
Vozel B.,
Lukin V. V.,
Zelensky A. A.

PREDICTION OF COMPRESSION RATIO FOR ADCT CODER

ÏÐÎÃÍÎÇÈÐÎÂÀÍÈÅ ÊÎÝÔÔÈÖÈÅÍÒÀ ÑÆÀÒÈß ÄËß ÊÎÄÅÐÀ ADCT

ÏÐÎÃÍÎÇÓÂÀÍÍß ÊÎÅÔ²Ö²ªÍÒÀ ÑÒÈÑÍÅÍÍß ÄËß ÊÎÄÅÐÀ ADCT

204–209
(6)

Ïåâíåâ Â. ß.

THE THEORETICAL JUSTIFICATION FOR METHODOLOGY OF CONSTRUCTING PSEUDO-PRIMES

ÒÅÎÐÅÒÈ×ÍÅ ÎÁ¥ÐÓÍÒÓÂÀÍÍß ÌÅÒÎÄÈÊÈ ÏÎÁÓÄÎÂÈ ÏÑÅÂÄÎÏÐÎÑÒÈÕ ×ÈÑÅË

ÒÅÎÐÅÒÈ×ÅÑÊÎÅ ÎÁÎÑÍÎÂÀÍÈÅ ÌÅÒÎÄÈÊÈ ÏÎÑÒÐÎÅÍÈß ÏÑÅÂÄÎÏÐÎÑÒÛÕ ×ÈÑÅË

210–213
(4)

Ïè÷óãèíà Î. Ñ.

A GENERALIZATION OF THE HYPERCUBE TOPOLOGY OF A DATA TRANSMISSION NETWORK

ÎÄÍÅ ÓÇÀÃÀËÜÍÅÍÍß Ã²ÏÅÐÊÓÁ-ÒÎÏÎËÎò¯ ÌÅÐÅÆ² ÏÅÐÅÄÀײ ÄÀÍÈÕ

ÎÄÍÎ ÎÁÎÁÙÅÍÈÅ ÃÈÏÅÐÊÓÁ-ÒÎÏÎËÎÃÈÈ ÑÅÒÈ ÏÅÐÅÄÀ×È ÄÀÍÍÛÕ

214–221
(8)

Òóðêèíà Â. Â.

UNMANIPULATED EXCHANGE MECHANISM AS A BASIC PRINCIPLE OF THE MOBILE SUBSCRIBERS INTERACTION ORGANIZATION IN AD-HOS NETWORKS

ÍÅÌÀͲÏÓËÜÎÂÀͲ ÌÅÕÀͲÇÌÈ ÎÁ̲ÍÓ ßÊ ÎÑÍÎÂÍÈÉ ÏÐÈÍÖÈÏ ÎÐÃÀͲÇÀÖ²¯ ÂÇÀªÌÎIJ¯ ÌÎÁ²ËÜÍÈÕ ÀÁÎÍÅÍÒ²Â Ó AD-HOÑ ÌÅÐÅÆÀÕ

ÍÅÌÀÍÈÏÓËÈÐÓÅÌÛÅ ÌÅÕÀÍÈÇÌÛ ÎÁÌÅÍÀ ÊÀÊ ÎÑÍÎÂÍÎÉ ÏÐÈÍÖÈÏ ÎÐÃÀÍÈÇÀÖÈÈ ÂÇÀÈÌÎÄÅÉÑÒÂÈß ÌÎÁÈËÜÍÛÕ ÀÁÎÍÅÍÒÎÂ Â AD-HOÑ ÑÅÒßÕ

222–227
(6)

Øòåéíáðåõåð Ä. À.

APPLYING OF OBJECT-STRUCTURAL ANALYSIS FOR PROJECT KNOWLEDGE MANAGEMENT

ÂÈÊÎÐÈÑÒÀÍÍß ÎÁ’ªÊÒÍÎ-ÑÒÐÅÊÒÓÐÍÎÃÎ ÀÍÀ˲ÇÓ ÄËß ÓÏÐÀÂËßÍÍß ÇÍÀÍÍßÌÈ Â ÏÐÎÅÊÒ²

ÏÐÈÌÅÍÅÍÈÅ ÎÁÚÅÊÒÍÎ-ÑÒÐÓÊÒÓÐÍÎÃÎ ÀÍÀËÈÇÀ  ÓÏÐÀÂËÅÍÈÈ ÏÐÎÅÊÒÍÛÌÈ ÇÍÀÍÈßÌÈ

228–234
(7)

Çåëåíèé êîìï’þòèíã òà êîìóí³êàö³¿

Òóðêèí È. Á.,
Âäîâèò÷åíêî À. Â. 

THE EXPERIMENTAL EVALUATION OF EFFECTIVENESS OF POWER’S SCHEMES OF TRAINING CLASS’S PERSONAL COMPUTERS

ÅÊÑÏÅÐÈÌÅÍÒÀËÜÍÀ ÎÖ²ÍÊÀ ÅÔÅÊÒÈÂÍÎÑÒ² ÑÕÅÌ ÅËÅÊÒÐÎÆÈÂËÅÍÍß ÏÅÐÑÎÍÀËÜÍÈÕ ÊÎÌÏ'ÞÒÅв ÍÀÂ×ÀËÜÍÎÃÎ ÊËÀÑÓ

ÝÊÑÏÅÐÈÌÅÍÒÀËÜÍÀß ÎÖÅÍÊÀ ÝÔÔÅÊÒÈÂÍÎÑÒÈ ÑÕÅÌ ÝËÅÊÒÐÎÏÈÒÀÍÈß ÏÅÐÑÎÍÀËÜÍÛÕ ÊÎÌÏÜÞÒÅÐΠÓ×ÅÁÍÎÃÎ ÊËÀÑÑÀ

235–240
(6)

 

ÀËÔÀ²ÒÍÈÉ ÏÎÊÀÆ×ÈÊ

241

 

 

Øàíîâí³ ÷èòà÷³!

Íàóêîâî-òåõí³÷íèé æóðíàë «ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ'ÞÒÅÐͲ ÑÈÑÒÅÌÈ»:

- âõîäèòü äî çàòâåðäæåíîãî ÌÎÍ Óêðà¿íè Ïåðåë³êó íàóêîâèõ ôàõîâèõ âèäàíü Óêðà¿íè, â ÿêèõ ìîæóòü ïóáë³êóâàòèñÿ ðåçóëüòàòè äèñåðòàö³éíèõ ðîá³ò íà çäîáóòòÿ íàóêîâèõ ñòóïåí³â äîêòîðà ³ êàíäèäàòà íàóê (äèâ. íàêàç ÌÎÍ Óêðà¿íè ¹ 1279 â³ä 6.11.2014 ð.);

- çáåð³ãàºòüñÿ ó çàãàëüíîäåðæàâí³é ðåôåðàòèâí³é áàç³ äàíèõ «Óêðà¿í³êà íàóêîâà» òà ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ óêðà¿íñüêîãî ðåôåðàòèâíîãî æóðíàëó «Äæåðåëî» (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.nbuv.gov.ua) (Óêðà¿íà);

- çáåð³ãàºòüñÿ ó ðåôåðàòèâí³é áàç³ äàíèõ Âñåðîñ³éñüêîãî ³íñòèòóòó íàóêîâî¿ ³ òåõí³÷íî¿ ³íôîðìàö³¿ (²ͲҲ) Ðîñ³éñüêî¿ àêàäå쳿 íàóê ³ ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÐÆ (â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.viniti.ru) (Ðîñ³éñüêà Ôåäåðàö³ÿ);

- âêëþ÷åíèé äî ì³æíàðîäíèõ á³áë³îìåòðè÷íèõ òà íàóêîìåòðè÷íèõ áàç äàíèõ: íàóêîâî¿ åëåêòðîííî¿ á³áë³îòåêè eLIBRARY.RU (Ðîñ³éñüêà Ôåäåðàö³ÿ); Index Copernicus (ICV 2013: 4,36; 2014: 52,23) (Ïîëüùà); INSPEC (Institution of Engineering and Technology, Âåëèêîáðèòàí³ÿ); CiteFactor; Academic Keys; Infobase Index; Google Scholar (á³áë³îìåòðè÷í³ ïîêàçíèêè – quot.=1766 / h = 11 / i10 = 17).