. ..

 

ISSN 1814-4225. IJͲ ϒͲ . , , 2012. - 5(57). 246 .

ISSN 1814-4225. . , , 2012. - 5(57). 246 .

ISSN 1814-4225. RADIOELECTRONIC AND COMPUTER SYSTEMS. Kharkiv, NAU KhAI, 2012. 5(57). 246 p.

 

Ҳ (articleS)

 


(
)

(article title)

(pages)

English

c

..,
..

LUT FPGA SYNTHESIS BASED ON FUNCTIONALLY COMPLETE TOLERANT ELEMENTS

LUT ˲ ֲ Ѳ

LUT

1116
(6)

..,
..,
..

 

ASSESSMENTS OF COMPUTING SYNTHESIS COMPLEXITY OF PARALLEL TIME-PARAMETERIZED MODELS OF TASKS

ֲ ί Ҳ

1722
(6)

Skarga-Bandurova I.S.,
Nesterov M.V.

 

IMPLEMENTATION OF HIGH AVAILABILITY HEALTHCARE INFORMATION SYSTEM ARCHITECTURE

˲ֲ ղ ί Ҳ ί ֲί

2327
(5)

Grid-, Web- Cloud-

..,
..

 

analysys of reliable web-SERVICES application for the dependably economic expert systems implementation

˲ IJ WEB-²Ѳ ˲ֲ ̲

web-

2832
(5)

Davies J.N.,
Comerford P.,
Grout V.,
Rvachova N.,
Korkh O.

AN INVESTIGATION INTO THE EFFECT OF RULE COMPLEXITY IN ACCESS CONTROL LIST

˲ Ҳ ACCESS CONTROL LIST

ACCESS CONTROL LIST

3338
(6)

..,
..

TOPOLOGICAL SYNTHESIS OF GEOGRAPHICALLY DISTRIBUTED NETWORKS BASED ON MULTIAGENT METHODS

ò в-IJ ² IJ

-

3941
(3)

Oliynykov R.V.,
Kiyanchuk R.I.

PERSPECTIVE SYMMETRIC BLOCK CIPHER OPTIMIZED FOR HARDWARE IMPLEMENTATION

, ̲ ί ˲ֲ

,

4247
(6)

Chevardin V.E.

A PSEUDORANDOM BIT GENERATOR BASED ON ELLIPTIC CURVE TRANSFORMATIONS

² ֲ ˲ί ί

4850
(3)

..

Provable security of rijndael-like ciphers to truncated differentials attack

rijndael-

RIJNDAEL-

5155
(5)

Savenko O.S.,
Lysenko S.M.,
Kryshchuk A.F.

MULTI-AGENT BASED APPROACH OF BOTNET DETECTION

² -

-

5661
(6)

Skatkov A.V.,
Bruhoveckiy A.A.,
Loviahin V.S.

DEVELOPMENT OF METHODS FOR ADAPTIVE PROTECTION AND COMPUTER SECURITY BASED ON THE THEORY OF ARTIFICIAL IMMUNE SYSTEMS

IJ 'ί , в

,

6266
(5)

..,
..

The software for protecting of the confidential data

Ѳ ֲί Բֲ

6771
(5)

Potiy A.V.,
Pilipenko D.Y.,
Rebriy I.N.

THE PREREQUISITES OF INFORMATION SECURITY CULTURE DEVELOPMENT AND AN APPROACH TO COMPLEX EVALUATION OF ITS LEVEL

ֲί ֲ в

7277
(6)

..,
..

METHODOLOGY REDUCING LABORIOUSNESS TRANSFERRING PROCESS OF DOCUMENTS PAPER COPIES CONTENT INTO INFORMATION SYSTEM DATA BASE

̲Ҳ ̲ ϲ Ҳ ֲ

7882
(5)

..,
..

METHODOLOGY OF ENCRYPTION DATA USING SOFTWARE COMPLEX VisualAES

- VisualAES

- VisualAES

8365
(3)

..,
..

METHOD OF ACCELERATION OF SCALAR MULTIPLICATION FOR CRYPTOGRAPHIC SCHEMES

Բ ʲ

 

8690
(5)

..,
,
..,
..

About one problem of reconfiguration in multiprocessor systems

Բ

9194
(4)

..

overview OF SEGMENTATION methods AND ADAPTATION ONE OF THEM FOR SOLUTIONS NETWORK SEGMENTATION PROBLEM BY ELEMENTS workload

IJ ֲ ֲ в ײ ֲ Ʋ в Ҳ Ҳ

9599
(5)

..

SOFT-PROCESSORS SIMULATION USING MODEL-BASED TESTING CONCEPT

ֲ̲ SOFT-в Dz ֲ MODEL-BASED TESTING

SOFT- MODEL-BASED TESTING

100106
(7)

..

Investigation of integral nonlinearity of third order sigma-delta modulator

˲ ί ˲ͲҲ -

-

107113
(7)

..

PARALLEL FAULT SIMULATION METHODS OF VLSI

²

114119
(6)

..,
..

INSTRUCTION FORMAT OPTIMIZATION OF DYNAMICALLY RECONFIGURABLE PROCESSOR CORE

ֲ̲ ̲ Բ

120124
(5)

..

MULTI-SITUATIONAL ASSESSMENT OF STATICTICAL SOFTWARE IN THE SPECIFIC PROBLEM OF ESTIMATION

125129
(5)

..

the methods of regularization of partially set automatons

130135
(6)

..

HIGH RELIABILITY quadrature decoder

ϲί IJҲ

136141
(6)

..,
..

multiplication devices complexity Characteristics

Ҳ ί

142147
(6)

..,
..

Synthesis of 2-groups on the logic elements

2- ò

2-

148153
(6)

ij

..

THE FORMATION OF INTEGRATED QUALITY OF HIGH-MELTING STEEL GRADES

I Ϊ I

154157
(4)

..

MINIMIZATION OF ERROR IN LINEAR SIGNAL SPLITTING BY THE EQUI-DISTANT PHYSICALLY REALIZED FUNCTIONS

̲Ͳֲ̲ ˲ ² ֲ, i Բ ˲

158164
(7)

..

THE INVESTIGATION OF INTERVAL ASSESSMENTS AND METHODS OF THE MAXIMUM ORDER FOR SMALL SIZE SAMPLES

˲ ֲ IJ '

165170
(6)

..

METHOD OF SIMILAR OBJECTS SEARCH

'

171177
(7)

Case 㳿

..,
..,

CONFLICTS DETECTION IN ACCESS RULES TO THE RELATIONAL DATABASES WITH USING UML AND OCL LANGUAGES

˲Ҳ ֲ UML OCL

UML OCL

178183
(6)

Konorev B.M.,
Sergiienko V.V.,
Zholtkevych G.N.,
Chertkov G.N.,
Alexeev Y.G.

CONCEPT OF CRITICAL SOFTWARE INDEPENDENT VERIFICATION BASED ON INVARIANT-ORIENTED MODEL-CHECKING APPROACH

ֲ ί Բֲ ² в-в MODEL-CHECKING ϲ

- MODEL-CHECKING

184190
(
7)

..,
..

RESEARCH OF CRITICAL SITUATIONS IN IT- infrastructures of cluster analysis methods

˲  ֲ  - 

-

191196
(6)

..,
..

VALIDATION OF RELIABILITY LIMIT VALUES OF CRITICAL ENERGY INFRASTRUCTURE

ʲ IJҲ

197201
(5)

..,
..,
..

INFORMATION ANALYSIS THE MONITORING OF CRITICAL SYSTEMS

ֲ ˲ Ѳ Ͳ

202207
(6)

Ryazantsev A.I.,
Skarga-Bandurova I.S.

QUANTITATIVE RISK ANALYSIS AND EVALUATING ENVIRONMENTAL PROTECTION PROJECTS

ʲʲ ˲ ʲ ֲ Ҳ Dz

208211
(4)

.A.

THE METHOD OF EVALUATION OF THE NUMBER OF SOFTWARE DEFECTSUSING COMPLEXITY METRICS

ֲ ʲҲ Ҳ Ҳ

212218
(7)

..,
..

THE REsearch OF Matlab functions features for scaling input data of SOFTWARE QUALITY EVALUATION ARTIFICIAL NEURAL NETWORK

˲ ֲ MATLAB ղ ί ί Ʋ ֲ Ҳ

MATLAB

219224
(6)

㳿 Ada

..,
..,
..,
..

QUALITY OF THE DYNAMIC HTML PAGES TRANSLATOR FOR ADA WEB SERVERS

ʲ Ͳ ̲ HTML в ADA WEB в

HTML ADA WEB

225229
(5)

-

..,
..,
..

INTEGRATED HMI SAFETY ASSESSMENT METHODOLOGY FOR SAFETY-CRITICAL I&C SYTEMS

ί ֲ -

-

230235
(6)

..

MODELLING THE AIRCRAFTS FLIGHT MODE CHANGE WHILE GENERATING POTENTIALLY-CONFLICTING SITUATIONS

̲ ² Ͳ ֲ-˲ ֲ

˨ -

236240
(5)

..,
..,
..

THE RELIABILITY ESTIMATION MODEL OF THE HETEROGENEOUS CLIENT-SERVER COMPUTER NETWORK

ֲ IJҲ ί Ͳ Ʋ ˲-ί ղ

-

241243
(3)

 

 

!

- IJͲ 'Ͳ
,
(. 䳿 1-05/3 8.07.2009)

 

:

  ( - Web- http://www.nbuv.gov.ua);

  (²ͲҲ) 쳿 ( - Web- http://www.viniti.ru).