Íàö³îíàëüíèé
àåðîêîñì³÷íèé óí³âåðñèòåò ³ì. Ì.ª. Æóêîâñüêîãî “Õàðê³âñüêèé àâ³àö³éíèé
³íñòèòóò”
ISSN 1814-4225. ÐÀIJÎÅËÅÊÒÐÎÍͲ ²
ÊÎÌÏ’ÞÒÅÐͲ ÑÈÑÒÅÌÈ. – 2016. – ¹ 6 (80).
– 242 ñ.
ISSN 1814-4225. ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÅ È
ÊÎÌÏÜÞÒÅÐÍÛÅ ÑÈÑÒÅÌÛ. – 2016. – ¹ 6 (80).
– 242 ñ.
ISSN 1814-4225. RADIOELECTRONIC
AND COMPUTER SYSTEMS. – 2016. – ¹ 6 (80). – 242 ñ.
Ìàòåð³àëè, ùî ì³ñòÿòüñÿ â æóðíàë³,
îïóáë³êîâàí³ çà ð³øåííÿì Ïðîãðàìíîãî
êîì³òåòó
̳æíàðîäíî¿
íàóêîâî-òåõí³÷íî¿ êîíôåðåíö³¿ «CYBER FORUM DESSERT 2016»
ÑÒÀÒÒ² (articleS)
Àâòîðè (ìîâà îðèã³íàëó) |
Íàçâà ñòàòò³ (article title) |
Ñòîð³íêè (pages) |
||
English |
Óêðà¿íñüêà ìîâà |
Ðóññêèé ÿçûê |
||
Ãàðàíòîçäàòí³ñòü
òà ðåç³ë’ºíòí³ñòü õìàðíèõ ñèñòåì |
||||
Èâàí÷åíêî Î. Â., |
ANALYSIS
OF STOCHASTIC METHODS FOR METAMODELING AND AVAILABILITY ESTIMATION FOR CLOUD INFRASTRUCTURE |
ÀÍÀË²Ç ÑÒÎÕÀÑÒÈ×ÍÈÕ ÌÅÒÎIJÂ
ÌÅÒÀÌÎÄÅËÞÂÀÍÍß ÒÀ ÎÖ²ÍÞÂAÍÍß ÃÎÒÎÂÍÎÑÒ² ÕÌÀÐÍÈÕ ²ÍÔÐÀÑÒÐÓÊÒÓÐ |
ÀÍÀËÈÇ ÑÒÎÕÀÑÒÈ×ÅÑÊÈÕ ÌÅÒÎÄΠÌÅÒÀÌÎÄÅËÈÐÎÂÀÍÈß È
ÎÖÅÍÈÂÀÍÈß ÃÎÒÎÂÍÎÑÒÈ ÎÁËÀ×ÍÛÕ ÈÍÔÐÀÑÒÐÓÊÒÓÐ |
6–11 |
Ñîêîëîâà Å. Â., |
COMPARATIVE
QUALITY ANALYSIS OF GOOGLE DOCS AND MICROSOFT OFFICE WORD CLOUD-BASED WEB
APPS USER INTERFACES |
ÏÎвÂÍßËÜÍÈÉ ÀÍÀ˲Ç
ßÊÎÑÒ² ÊÎÐÈÑÒÓÂÀËÜÍÈÖÜÊÈÕ ²ÍÒÅÐÔÅÉѲ ÕÌÀÐÍÈÕ ÒÅÊÑÒÎÂÈÕ ÐÅÄÀÊÒÎв GOOGLE DOCS
² MICROSOFT OFFICE WORD WEB APPS |
12–17 |
|
Yanovsky M., |
ÐÎÇÏÎIJËÅÍÀ ÕÌÀÐÍÀ ÑÈÑÒÅÌÀ: ÊÎÍÖÅÏÖ²ß ÁÅÇÏÅÊÈ, ²ÍÄÅÊÑÀÖ²ß
ÊÎÍÒÅÍÒÓ ² ÑÒÐÀÒÅÃ²ß ÂÏÐÎÂÀÄÆÅÍÍß Â ÓÌÎÂÀÕ ÎÁÌÅÆÅÍÍß ÂÈÒÐÀÒ |
ÐÀÑÏÐÅÄÅËÅÍÍÀß
ÎÁËÀ×ÍÀß ÑÈÑÒÅÌÀ: ÊÎÍÖÅÏÖÈß ÁÅÇÎÏÀÑÍÎÑÒÈ, ÈÍÄÅÊÑÀÖÈß ÊÎÍÒÅÍÒÀ È ÑÒÐÀÒÅÃÈß
ÂÍÅÄÐÅÍÈß Â ÓÑËÎÂÈßÕ ÎÃÐÀÍÈ×ÅÍÈß ÇÀÒÐÀÒ |
18–23 |
|
²íôîðìàö³éíà
òà ôóíêö³îíàëüíà áåçïåêà ²ÓÑ |
||||
Ôåäàñþê Ä. Â., |
METHOD
OF THE STRUCTURAL-AUTOMATON MODELS DEVELOPMENT FOR DISCRETE-CONTINUOUS
STOCHASTIC SYSTEMS |
ÌÅÒÎÄÈÊÀ ÐÎÇÐÎÁËÅÍÍß ÑÒÐÓÊÒÓÐÍÎ-ÀÂÒÎÌÀÒÍÈÕ ÌÎÄÅËÅÉ
ÄÈÑÊÐÅÒÍÎ-ÍÅÏÅÐÅÐÂÍÈÕ ÑÒÎÕÀÑÒÈ×ÍÈÕ ÑÈÑÒÅÌ |
ÌÅÒÎÄÈÊÀ ÐÎÇÐÀÁÎÒÊÈ ÑÒÐÓÊÒÓÐÍÎ-ÀÂÒÎÌÀÒÍÛÕ ÌÎÄÅËÅÉ ÄÈÑÊÐÅÒÍÎ-ÍÅÏÐÅÐÛÂÍÈÕ
ÑÒÎÕÀÑÒÈ×ÍÈÕ ÑÈÑÒÅÌ |
24–34 |
Ñàâåíêî Î. Ñ., |
METHODS FOR DETECTION OF POLYMORPHIC VIRUSES BASED
ON MODIFIED EMULATORS |
ÌÅÒÎÄ ÂÈßÂËÅÍÍß ÏÎ˲ÌÎÐÔÍÈÕ Â²ÐÓѲ ÍÀ ÎÑÍβ
ÌÎÄÈÔ²ÊÎÂÀÍÈÕ ÅÌÓËßÒÎв |
ÌÅÒÎÄ
ÎÁÍÀÐÓÆÅÍÈß ÏÎËÈÌÎÐÔÍÛÕ ÂÈÐÓÑÎÂ ÍÀ ÎÑÍÎÂÅ ÌÎÄÈÔÈÖÈÐÎÂÀÍÍÛÕ ÝÌÓËßÒÎÐÎÂ |
35–40 |
Malinovsky M. L., |
ARCHITECTURE
AND IMPLEMENTATION PRINCIPLES OF DATA EXCHANGE EQUIPMENT FOR SAFETY RELATED
SYSTEMS |
ÀÐÕ²ÒÅÊÒÓÐÀ ÒÀ
ÏÐÈÍÖÈÏÈ ÐÅÀ˲ÇÀÖ²¯ ÀÏÀÐÀÒÓÐÈ ÑÏÎËÓ×ÅÍÍß ÑÈÑÒÅÌ, ÙÎ ÏÎÂ'ßÇÀͲ Ç ÁÅÇÏÅÊÎÞ |
ÀÐÕÈÒÅÊÒÓÐÀ
È ÏÐÈÍÖÈÏÛ ÐÅÀËÈÇÀÖÈÈ ÀÏÏÀÐÀÒÓÐÛ ÑÎÏÐ߯ÅÍÈß ÑÈÑÒÅÌ, ÑÂßÇÀÍÍÛÕ Ñ ÁÅÇÎÏÀÑÍÎÑÒÜÞ |
41–45 |
Òåöêèé À. Ã., |
RESEARCH
OF PENETRATION ATTACK ON CONTENT MANAGEMENT SYSTEM USING MARKOV’S MODEL |
ÄÎÑË²ÄÆÅÍÍß ÀÒÀÊÈ ÍÀ
ÏÐÎÍÈÊÍÅÍÍß ÍÀ ÑÈÑÒÅÌÓ ÓÏÐÀÂ˲ÍÍß ÊÎÍÒÅÍÒÎÌ ÇÀ ÄÎÏÎÌÎÃÎÞ ÌÀÐÊÎÂÑÜÊί ÌÎÄÅ˲ |
ÈÑÑËÅÄÎÂÀÍÈÅ ÀÒÀÊÈ ÍÀ ÏÐÎÍÈÊÍÎÂÅÍÈÅ ÍÀ ÑÈÑÒÅÌÓ ÓÏÐÀÂËÅÍÈß
ÊÎÍÒÅÍÒÎÌ Ñ ÏÎÌÎÙÜÞ ÌÀÐÊÎÂÑÊÎÉ ÌÎÄÅËÈ |
46–49 |
ßê³ñòü,
íàä³éí³ñòü òà áåçïåêà ÏÇ |
||||
Áåëîáîðîäîâ À. Þ., |
SERVER
OPERATING SYSTEM VULNERABILITIES INVESTIGATION |
ÄÎÑË²ÄÆÅÍÍß ÂÐÀÇËÈÂÎÑÒÅÉ
ÑÅÐÂÅÐÍÈÕ ÎÏÅÐÀÖ²ÉÍÈÕ ÑÈÑÒÅÌ |
50–58 |
|
Ãîâîðóùåíêî Ò. Î., |
METHOD OF ASSESSMENT
OF INFORMATION SUFFICIENCY FOR DETERMINATION OF SOFTWARE COMPLEXITY AND
QUALITY BASED ON THE COMPARATIVE ANALYSIS OF ONTOLOGIES |
ÌÅÒÎÄ ÎÖÅÍÊÈ ÄÎÑÒÀÒÎ×ÍÎÑÒÈ ÈÍÔÎÐÌÀÖÈÈ ÄËß ÎÏÐÅÄÅËÅÍÈß
ÑËÎÆÍÎÑÒÈ È ÊÀ×ÅÑÒÂÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÍÀ ÎÑÍÎÂÅ ÑÐÀÂÍÈÒÅËÜÍÎÃÎ
ÀÍÀËÈÇÀ ÎÍÒÎËÎÃÈÉ |
59–68 |
|
Äóáíèöêèé Â. Þ., |
INTERVAL
CALCULATIONS IN CENTER-RADIUS SYSTEM FOR ASSESSMENT OF SOFTWARE SYSTEMS
RELIABILITY |
ÇÀÑÒÎÑÓÂÀÍÍß ²ÍÒÅÐÂÀËÜÍÈÕ ÎÁ×ÈÑËÅÍÜ Â ÑÈÑÒÅ̲ ÖÅÍÒÐ-ÐÀIJÓÑ ÄËß ÂÈÇÍÀ×ÅÍÍß
ÍÀIJÉÍÎÑÒ² ÏÐÎÃÐÀÌÍÈÕ ÑÈÑÒÅÌ |
69–76 |
|
ßðåì÷óê Ñ. À., |
EXPERIMENTAL
VERIFICATION OF THE METHOD FOR CHOOSING COMPONENTS WITH FAULTS FOR SOFTWARE
SYSTEMS |
ÅÊÑÏÅÐÈÌÅÍÒÀËÜÍÀ ÏÅÐŲÐÊÀ ÌÅÒÎÄÓ
²ÄÁÎÐÓ ÄÅÔÅÊÒÎÂ̲ÙÓÞ×ÈÕ ÊÎÌÏÎÍÅÍҲ ÏÐÎÃÐÀÌÍÈÕ ÑÈÑÒÅÌ |
ÝÊÑÏÅÐÈÌÅÍÒÀËÜÍÀß ÏÐÎÂÅÐÊÀ ÌÅÒÎÄÀ ÎÒÁÎÐÀ
ÄÅÔÅÊÒÎÑÎÄÅÐÆÀÙÈÕ ÊÎÌÏÎÍÅÍÒÎÂ ÏÐÎÃÐÀÌÌÍÛÕ ÑÈÑÒÅÌ |
77–81 |
ijàãíîñòóâàííÿ
òà âåðèô³êàö³ÿ |
||||
Èâàñþê À. Î., |
THE
FAULT-INJECTION TESTING OF INSTRUMENTATION AND CONTROL SYSTEM MODULES BASED
ON SELF-DIAGNOSTIC PROGRAMMABLE PLATFORMS |
ÏÐÎÖÅÄÓÐÈ ÒÅÑÒÓÂÀÍÍß ÌÎÄÓ˲Â
²ÍÔÎÐÌÀÖ²ÉÍÎ-ÓÏÐÀÂËßÞ×ÈÕ ÑÈÑÒÅÌ ÍÀ ÎÑÍβ ÑÀÌÎIJÀÃÍÎÑÒÎÂÀÍÈÕ ÏÐÎÃÐÀÌÎÂÀÍÈÕ
ÏËÀÒÔÎÐÌ Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ ÇÀѲÂÓ ÄÅÔÅÊҲ |
82–87 |
|
Êîë³ñíèê Ì. Î., |
IMPACT
ASSESSMENT OF QUALIFICATION OF SOFTWARE DEVELOPERS ON THE RELIABILITY OF
MICROPROCESSOR SYSTEMS OF RELAY PROTECTION AND AUTOMATION |
ÎÖÅÍÊÀ
ÂËÈßÍÈß ÊÂÀËÈÔÈÊÀÖÈÈ Ó×ÀÑÒÍÈÊΠÐÀÇÐÀÁÎÒÊÈ ÏÐÎÃÐÀÌÌÍÛÕ ÑÐÅÄÑÒ ÍÀ ÍÀÄÅÆÍÎÑÒÜ
ÌÈÊÐÎÏÐÎÖÅÑÑÎÐÍÛÕ ÑÈÑÒÅÌ ÐÅËÅÉÍÎÉ ÇÀÙÈÒÛ È ÀÂÒÎÌÀÒÈÊÈ |
88–93 |
|
Ñêàðãà-Áàíäóðîâà ². Ñ., |
TECHNOLOGICAL
ASPECTS OF STATIC CODE ANALYSIS FOR SOFTWARE COMPONENTS OF MICROPROCESSOR
INTERLOCKING SYSTEM |
ÒÅÕÍÎËÎÃÈ×ÅÑÊÈÅ
ÀÑÏÅÊÒÛ ÑÒÀÒÈ×ÅÑÊÎÃÎ ÀÍÀËÈÇÀ ÊÎÄÀ ÏÐÎÃÐÀÌÌÍÎÃÎ ÎÁÅÑÏÅ×ÅÍÈß ÑÈÑÒÅÌ
ÆÅËÅÇÍÎÄÎÐÎÆÍÎÉ ÀÂÒÎÌÀÒÈÇÀÖÈÈ |
94–100 |
|
Drozd A., |
A METHOD OF
THE SCAN CHECKING FOR ON-LINE TESTING OF SAFE MULTITHREADED BITWISE PIPELINE
SYSTEM |
ÌÅÒÎÄ ÑÊÀÍÓÞ×ÎÃÎ ÊÎÍÒÐÎËÞ ÄËß
ÐÎÁÎ×ÎÃΠIJÀÃÍÎÑÒÓÂÀÍÍß ÁÀÃÀÒÎÏÎÒÎ×Íί ÏÎÐÎÇÐßÄÍί ÊÎÍÂŪÐÍί ÑÈÑÒÅÌÈ |
ÌÅÒÎÄ
ÑÊÀÍÈÐÓÞÙÅÃÎ ÊÎÍÒÐÎËß ÄËß ÐÀÁÎ×ÅÃÎ ÄÈÀÃÍÎÑÒÈÐÎÂÀÍÈß ÌÍÎÃÎÏÎÒÎ×ÍÎÉ ÏÎÐÀÇÐßÄÍÎÉ
ÊÎÍÂÅÉÅÐÍÎÉ ÑÈÑÒÅÌÛ |
101–107 |
Ìîðîçîâ Ê. Â., |
ABOUT
THE INFLUENCE OF EDGE FUNCTIONS MODIFICATION OF GL-MODEL ON ITS BEHAVIOR IN FLOW
OF FAILURES |
ÏÐÎ ÕÀÐÀÊÒÅÐ ÂÏËÈÂÓ ÌÎÄÈÔ²ÊÀÖ²¯
ÐÅÁÅÐÍÈÕ ÔÓÍÊÖ²É GL-ÌÎÄÅ˲ ÍÀ ¯¯ ÏÎÂÅIJÍÊÓ Â ÏÎÒÎÖ² ²ÄÌΠ|
Î ÕÀÐÀÊÒÅÐÅ ÂËÈßÍÈß ÌÎÄÈÔÈÊÀÖÈÈ ÐÅÁÅÐÍÛÕ ÔÓÍÊÖÈÉ GL-ÌÎÄÅËÈ
ÍÀ ÅÅ ÏÎÂÅÄÅÍÈÅ Â ÏÎÒÎÊÅ ÎÒÊÀÇÎÂ |
108–112 |
Ìîñêâ³íà ². ²., |
CONSIDERING
OF THE FIRST AND SECOND TYPES ERRORS OF SWITCHING DEVICE FOR RELIABILITY OF
SYSTEM WITH COLD REDUNDANCY |
Ó×ÅÒ
ÎØÈÁÎÊ ÏÅÐÂÎÃÎ È ÂÒÎÐÎÃÎ ÐÎÄÀ ÓÑÒÐÎÉÑÒÂÀ ÏÅÐÅÊËÞ×ÅÍÈß ÄËß ÑÈÑÒÅÌÛ Ñ ÕÎËÎÄÍÛÌ
ÐÅÇÅÐÂÈÐÎÂÀÍÈÅÌ |
113–119 |
|
Volochiy B., |
DESIGNING
OF FAULT-TOLERANT RADIO ELECTRONIC SYSTEMS WITH COMPLEX MAJORITY STRUCTURES |
ÏÐÎÅÊÒÓÂÀÍÍß
²ÄÌÎÂÎÑÒ²ÉÊÈÕ ÐÀIJÎÅËÅÊÒÐÎÍÍÈÕ ÑÈÑÒÅÌ ²Ç ÑÊËÀÄÍÈÌÈ ÌÀÆÎÐÈÒÀÐÍÈÌÈ ÑÒÐÓÊÒÓÐÀÌÈ |
ÏÐÎÅÊÒÈÐÎÂÀÍÈÅ
ÎÒÊÀÇÎÓÑÒÎÉ×ÈÂÛÕ ÐÀÄÈÎÝËÅÊÒÐÎÍÍÛÕ ÑÈÑÒÅÌ ÑÎ ÑËÎÆÍÛÌÈ ÌÀÆÎÐÈÒÀÐÍÈÌÈ ÑÒÐÓÊÒÓÐÀÌÈ |
120–129 |
³äìîâîáåçïå÷í³
ïðîãðàìîâí³ ñèñòåìè |
||||
Êîëåñíèê È. Í., |
ANALYSIS
OF FPGA TECHNOLOGIES APPLICATION AS A PART OF CLOUD INFRASTRUCTURE |
ÀÍÀË²Ç ÇÀÑÒÎÑÓÂÀÍÍß ÒÅÕÍÎËÎò¯ FPGA
 ÑÊËÀIJ ÕÌÀÐÍί ²ÍÔÐÀÑÒÐÓÊÒÓÐÈ |
ÀÍÀËÈÇ ÏÐÈÌÅÍÅÍÈß ÒÅÕÍÎËÎÃÈÈ FPGA  ÑÎÑÒÀÂÅ ÎÁËÀ×ÍÎÉ
ÈÍÔÐÀÑÒÐÓÊÒÓÐÛ |
130–135 |
Òêà÷óê Ò. ². |
ANALYSIS
OF VHDL-MODELS OF OPTIMIZED MATRIX MULTIPLICATION DEVICES |
ÀÍÀË²Ç VHDL-ÌÎÄÅËÅÉ
ÎÏÒÈ̲ÇÎÂÀÍÈÕ ÌÀÒÐÈ×ÍÈÕ ÏÐÈÑÒÐί ÌÍÎÆÅÍÍß |
ÀÍÀËÈÇ
VHDL-ÌÎÄÅËÅÉ ÎÏÒÈÌÈÇÈÐÎÂÀÍÍÛÕ ÌÀÒÐÈ×ÍÛÕ ÓÑÒÐÎÉÑÒ ÓÌÍÎÆÅÍÈß |
136–140 |
Èëüÿøåíêî Î. À., |
SAFETY
ANALYSIS OF FPGA-BASED SYSTEMS USING XMECA FOR V-MODEL OF LIFE CYCLE |
ÎÖ²ÍÊÀ ÁÅÇÏÅÊÈ ÑÈÑÒÅÌ ÍÀ FPGA Ç ÂÈÊÎÐÈÑÒÀÍÍßÌ XMECA ÄËß V-ÌÎÄÅ˲ ÆÈÒÒªÂÎÃÎ ÖÈÊËÓ |
ÎÖÅÍÊÀ ÁÅÇÎÏÀÑÍÎÑÒÈ ÑÈÑÒÅÌ ÍÀ FPGA Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ
XMECA ÄËß V-ÌÎÄÅËÈ ÆÈÇÍÅÍÍÎÃÎ ÖÈÊËÀ |
141–147 |
ʳáåðô³çè÷í³
ñèñòåìè òà ³íòåðíåò ðå÷åé |
||||
Habh Yasir Mundher, Kharchenko V. S. |
ÓÌÍÛÉ ÄÎÌ ÄËß ÏÎÆÈËÛÕ
ËÞÄÅÉ: ÎÁÇÎÐ ÑÈÑÒÅÌ ÍÀ ÎÑÍÎÂÅ ARDUINO |
ÐÎÇÓÌÍÈÉ
ÁÓÄÈÍÎÊ ÄËß ËÞÄÅÉ
ÏÎÕÈËÎÃΠ²ÊÓ: ÎÃÄßÄ ÑÈÑÒÅÌ ÍÀ ÎÑÍβ ARDUINO |
148–151 |
|
Ïàâëåíêî Â. Ì., |
THE PROBLEMS OF LOGISTICAL
PROCESSES INFORMATIZATION WHILE CREATING THE VIRTUAL ENTERPRISES |
ÏÐÎÁËÅÌÈ ²ÍÔÎÐÌÀÒÈÇÀÖ²¯ ËÎòÑÒÈ×ÍÈÕ ÏÐÎÖÅѲ ÏÐÈ
ÑÒÂÎÐÅÍͲ ²ÐÒÓÀËÜÍÈÕ Ï²ÄÏÐȪÌÑÒ |
ÏÐÎÁËÅÌÛ ÈÍÔÎÐÌÀÒÈÇÀÖÈÈ ËÎÃÈÑÒÈ×ÅÑÊÈÕ ÏÐÎÖÅÑÑΠÏÐÈ
ÑÎÇÄÀÍÈÈ ÂÈÐÒÓÀËÜÍÛÕ ÏÐÅÄÏÐÈßÒÈÉ |
152–157 |
Ôåäîðåíêî Í. È., |
THE
DEVELOPMENT OF MULTILEVEL SYSTEM FOR DISEASE DIAGNOSTICS USING NEURAL
MODULES: THE PRINCIPLES OF IMPLEMENTATION |
ÁÀÃÀÒÎвÂÍÅÂÀ ÑÈÑÒÅÌÀ IJÀÃÍÎÑÒÓÂÀÍÍß
ÇÀÕÂÎÐÞÂÀÍÜ ÍÀ ÎÑÍβ ÍÅÉÐÎÌÅÐÅÆÅÂÈÕ ÌÎÄÓ˲Â: ÏÐÈÍÖÈÏÈ ÐÅÀ˲ÇÀÖ²¯ |
158–162 |
|
Õàõàíîâ Â. È., |
PROCESSOR STRUCTURES FOR BIG DATA ANALYSIS |
ÏÐÎÖÅÑÎÐͲ ÑÒÐÓÊÒÓÐÈ ÄËß ÀÍÀ˲ÇÓ BIG DATA |
163–175 |
|
Ñïåö³àë³çîâàí³
ñèñòåìè, ìåðåæ³ òà ³íôîðìàö³éí³ òåõíîëî㳿 |
||||
Subbotin S., |
INDUCTION
OF CLASSIFICATION RULES IN CASE OF UNEVEN DISTRIBUTION OF CLASSES |
ÏÎÁÓÄÎÂÀ ÏÐÀÂÈË ÊËÀÑÈÔ²ÊÀÖ²¯ ÏÐÈ ÍÅвÂÍÎ̲ÐÍÎÌÓ
ÇÀÂÄÀÍͲ ÊËÀѲ |
ÑÎÇÄÀÍÈÅ ÏÐÀÂÈË ÊËÀÑÑÈÔÈÊÀÖÈÈ ÏÐÈ ÍÅÐÀÂÍÎÌÅÐÍÎÌ ÇÀÄÀÍÈÈ ÊËÀÑÑÎÂ |
176–180 |
Àëáóë À. Ñ., |
JUSTIFICATION
OF THE ROUTING MODEL FOR LEO HIGH-SPEED DATA TRANSMISSION SATELLITE SYSTEMS |
ÎÁÃÐÓÍÒÓÂÀÍÍß ÌÎÄÅ˲
ÌÀÐØÐÓÒÈÇÀÖ²¯ ÄËß ÁÀÃÀÒÎÑÓÏÓÒÍÈÊÎÂÈÕ LEO ÑÈÑÒÅÌ ÂÈÑÎÊÎØÂÈÄʲÑÍί ÏÅÐÅÄÀײ
ÄÀÍÈÕ |
ÎÁÎÑÍÎÂÀÍÈÅ ÌÎÄÅËÈ ÌÀÐØÐÓÒÈÇÀÖÈÈ ÄËß ÌÍÎÃÎÑÏÓÒÍÈÊÎÂÛÕ LEO
ÑÈÑÒÅÌ ÂÛÑÎÊÎÑÊÎÐÎÑÒÍÎÉ ÏÅÐÅÄÀ×È ÄÀÍÍÛÕ |
181–187 |
Âàìáîëü À. Ñ. |
INVESTIGATION
OF PERFORMANCE OF MAJORANT-SUPERPOSITION ALGORITHM FOR GENERATING A ROBUST
SOLITON DISTRIBUTION |
ÄÎÑË²ÄÆÅÍÍß ÏÐÎÄÓÊÒÈÂÍÎÑÒ²
ÌÀÆÎÐÀÍÒÍÎ-ÑÓÏÅÐÏÎÇÈÖ²ÉÍÎÃÎ ÀËÃÎÐÈÒÌÓ ÃÅÍÅÐÀÖ²¯ ÐÎÁÀÑÒÍÎÃÎ ÐÎÇÏÎIJËÓ ÑÎ˲ÒÎÍÀ |
188–193 |
|
Æèõàðåâè÷ Â. Â., |
RESEARCH OF REVERSIBILITY OF PROGRAMMATIC BINARY
PSEUDORANDOM SEQUENCERS ON BASIS OF CELLULAR AUTOMATS |
ÄÎÑË²ÄÆÅÍÍß
ÇÂÎÐÎÒÍÎÑÒ² ÏÐÎÃÐÀÌÍÈÕ ÃÅÍÅÐÀÒÎв ÏÑÅÂÄÎÂÈÏÀÄÊÎÂÈÕ Á²ÍÀÐÍÈÕ ÏÎÑ˲ÄÎÂÍÎÑÒÅÉ
ÍÀ ÎÑÍβ Ê˲ÒÈÍÍÈÕ ÀÂÒÎÌÀҲ |
194–198 |
|
Æóêîâ È. À., |
PERFORMANCE OF DIGITAL INTEGRATING STRUCTURES |
ØÂÈÄÊÎÄ²ß ÖÈÔÐÎÂÈÕ ²ÍÒÅÃÐÈÐÓÞ×ÈÕ ÑÒÐÓÊÒÓÐ |
199–203 |
|
Zemliachenko A. N., |
ÏÐÎÃÍÎÇÈÐÎÂÀÍÈÅ ÊÎÝÔÔÈÖÈÅÍÒÀ ÑÆÀÒÈß
ÄËß ÊÎÄÅÐÀ ADCT |
ÏÐÎÃÍÎÇÓÂÀÍÍß
ÊÎÅÔ²Ö²ªÍÒÀ ÑÒÈÑÍÅÍÍß ÄËß ÊÎÄÅÐÀ ADCT |
204–209 |
|
Ïåâíåâ Â. ß. |
THE THEORETICAL JUSTIFICATION FOR METHODOLOGY OF CONSTRUCTING
PSEUDO-PRIMES |
ÒÅÎÐÅÒÈ×ÍÅ
ÎÁ¥ÐÓÍÒÓÂÀÍÍß ÌÅÒÎÄÈÊÈ ÏÎÁÓÄÎÂÈ ÏÑÅÂÄÎÏÐÎÑÒÈÕ ×ÈÑÅË |
ÒÅÎÐÅÒÈ×ÅÑÊÎÅ ÎÁÎÑÍÎÂÀÍÈÅ ÌÅÒÎÄÈÊÈ ÏÎÑÒÐÎÅÍÈß ÏÑÅÂÄÎÏÐÎÑÒÛÕ
×ÈÑÅË |
210–213 |
Ïè÷óãèíà Î. Ñ. |
A GENERALIZATION OF
THE HYPERCUBE TOPOLOGY OF A DATA
TRANSMISSION NETWORK |
ÎÄÍÅ ÓÇÀÃÀËÜÍÅÍÍß Ã²ÏÅÐÊÓÁ-ÒÎÏÎËÎò¯ ÌÅÐÅÆ² ÏÅÐÅÄÀײ
ÄÀÍÈÕ |
214–221 |
|
Òóðêèíà Â. Â. |
UNMANIPULATED EXCHANGE MECHANISM
AS A BASIC PRINCIPLE OF THE MOBILE SUBSCRIBERS INTERACTION ORGANIZATION IN
AD-HOS NETWORKS |
ÍÅÌÀͲÏÓËÜÎÂÀͲ ÌÅÕÀͲÇÌÈ
ÎÁ̲ÍÓ ßÊ ÎÑÍÎÂÍÈÉ ÏÐÈÍÖÈÏ ÎÐÃÀͲÇÀÖ²¯ ÂÇÀªÌÎIJ¯ ÌÎÁ²ËÜÍÈÕ ÀÁÎÍÅÍÒ²Â Ó AD-HOÑ
ÌÅÐÅÆÀÕ |
222–227 |
|
Øòåéíáðåõåð Ä. À. |
APPLYING OF OBJECT-STRUCTURAL ANALYSIS FOR
PROJECT KNOWLEDGE MANAGEMENT |
ÂÈÊÎÐÈÑÒÀÍÍß ÎÁ’ªÊÒÍÎ-ÑÒÐÅÊÒÓÐÍÎÃÎ ÀÍÀ˲ÇÓ ÄËß ÓÏÐÀÂËßÍÍß ÇÍÀÍÍßÌÈ Â
ÏÐÎÅÊÒ² |
ÏÐÈÌÅÍÅÍÈÅ ÎÁÚÅÊÒÍÎ-ÑÒÐÓÊÒÓÐÍÎÃÎ ÀÍÀËÈÇÀ Â
ÓÏÐÀÂËÅÍÈÈ ÏÐÎÅÊÒÍÛÌÈ ÇÍÀÍÈßÌÈ |
228–234 |
Çåëåíèé
êîìï’þòèíã òà êîìóí³êàö³¿ |
||||
Òóðêèí È. Á., |
THE
EXPERIMENTAL EVALUATION OF EFFECTIVENESS OF POWER’S SCHEMES OF TRAINING CLASS’S
PERSONAL COMPUTERS |
ÅÊÑÏÅÐÈÌÅÍÒÀËÜÍÀ ÎÖ²ÍÊÀ
ÅÔÅÊÒÈÂÍÎÑÒ² ÑÕÅÌ ÅËÅÊÒÐÎÆÈÂËÅÍÍß ÏÅÐÑÎÍÀËÜÍÈÕ ÊÎÌÏ'ÞÒÅв ÍÀÂ×ÀËÜÍÎÃÎ ÊËÀÑÓ |
ÝÊÑÏÅÐÈÌÅÍÒÀËÜÍÀß ÎÖÅÍÊÀ ÝÔÔÅÊÒÈÂÍÎÑÒÈ ÑÕÅÌ
ÝËÅÊÒÐÎÏÈÒÀÍÈß ÏÅÐÑÎÍÀËÜÍÛÕ ÊÎÌÏÜÞÒÅÐΠÓ×ÅÁÍÎÃÎ ÊËÀÑÑÀ |
235–240 |
|
||||
241 |
Øàíîâí³
÷èòà÷³!
Íàóêîâî-òåõí³÷íèé æóðíàë «ÐÀIJÎÅËÅÊÒÐÎÍͲ ² ÊÎÌÏ'ÞÒÅÐͲ ÑÈÑÒÅÌÈ»:
- âõîäèòü äî çàòâåðäæåíîãî ÌÎÍ
Óêðà¿íè Ïåðåë³êó íàóêîâèõ ôàõîâèõ âèäàíü Óêðà¿íè, â ÿêèõ ìîæóòü ïóáë³êóâàòèñÿ
ðåçóëüòàòè äèñåðòàö³éíèõ ðîá³ò íà çäîáóòòÿ íàóêîâèõ ñòóïåí³â äîêòîðà ³
êàíäèäàòà íàóê (äèâ. íàêàç ÌÎÍ Óêðà¿íè
¹ 1279 â³ä 6.11.2014 ð.);
- çáåð³ãàºòüñÿ ó çàãàëüíîäåðæàâí³é
ðåôåðàòèâí³é áàç³ äàíèõ «Óêðà¿í³êà
íàóêîâà» òà ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ óêðà¿íñüêîãî
ðåôåðàòèâíîãî æóðíàëó «Äæåðåëî»
(â³ëüíèé îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.nbuv.gov.ua) (Óêðà¿íà);
- çáåð³ãàºòüñÿ ó
ðåôåðàòèâí³é áàç³ äàíèõ Âñåðîñ³éñüêîãî ³íñòèòóòó íàóêîâî¿ ³ òåõí³÷íî¿
³íôîðìàö³¿ (²ͲҲ) Ðîñ³éñüêî¿
àêàäå쳿 íàóê ³ ïóáë³êóºòüñÿ ó â³äïîâ³äíèõ òåìàòè÷íèõ ñåð³ÿõ ÐÆ (â³ëüíèé
îí-ëàéíîâèé äîñòóï äî ðåñóðñ³â íà Web-ñåðâåð³ http://www.viniti.ru) (Ðîñ³éñüêà Ôåäåðàö³ÿ);
- âêëþ÷åíèé äî ì³æíàðîäíèõ
á³áë³îìåòðè÷íèõ òà íàóêîìåòðè÷íèõ áàç
äàíèõ: íàóêîâî¿ åëåêòðîííî¿ á³áë³îòåêè eLIBRARY.RU
(Ðîñ³éñüêà Ôåäåðàö³ÿ); Index Copernicus (ICV 2013: 4,36; 2014: 52,23)
(Ïîëüùà); INSPEC (Institution of
Engineering and Technology, Âåëèêîáðèòàí³ÿ); CiteFactor; Academic
Keys; Infobase Index; Google
Scholar (á³áë³îìåòðè÷í³ ïîêàçíèêè – quot.=1766 / h = 11 / i10 = 17).