Methods to provide fail-safety of computational systems intended to solve the problems of digital signal processing
Authors: Platanov S.V., Romanovskiy A.S., Chukhrov S.Yu. | Published: 14.04.2015 |
Published in issue: #2(34)/1999 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | |
Keywords: |
Applying the Branch-and-Bound method to solve the problem of hyper-graph dichotomous division
Authors: Ovchinnikov V.A., Ivanova G.S., Popov A.Yu. | Published: 14.04.2015 |
Published in issue: #2(34)/1999 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | |
Keywords: |
Determining the characteristics of parametric reliability according to the fuzzy set theory
Authors: Chekanov A.N. | Published: 14.04.2015 |
Published in issue: #2(34)/1999 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | |
Keywords: |
Methods to optimise the computational systems by means of simulation models
Authors: Komartsova L.G. | Published: 14.04.2015 |
Published in issue: #2(34)/1999 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | |
Keywords: |
Optimisation parameters of the permanent-magnet drive with transformer current leads
Authors: Strelkov B.V., Sherstniakov Yu.G. | Published: 14.04.2015 |
Published in issue: #2(34)/1999 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | |
Keywords: |
Algorithm to transform a tabular description of continuous signal to piecewise analytical description
Authors: Pobedonostsev V.A. | Published: 14.04.2015 |
Published in issue: #2(34)/1999 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | |
Keywords: |
Formalization of Information Security Insider Model
Authors: Sychev V.M. | Published: 14.04.2015 |
Published in issue: #2(101)/2015 | |
DOI: 10.18698/0236-3933-2015-2-92-106 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: insider model, threat level quantitative assessment, rating method |
Multiagent Analysis of Specification Accuracy of Session Initialization Protocols
Authors: Devyatkov V.V., Myo Thet Naung | Published: 14.04.2015 |
Published in issue: #2(101)/2015 | |
DOI: 10.18698/0236-3933-2015-2-107-116 | |
Category: Informatics, Computer Engineering and Control | |
Keywords: sequential process, user agent elient, user agent server, session initiating protocol, logic programming language VISUAL PROLOG |
Frame synchronization of digital telemetry information
Authors: Sidyakin I.M., Elshafey M.A. | Published: 14.04.2015 |
Published in issue: #2(101)/2015 | |
DOI: 10.18698/0236-3933-2015-2-117-132 | |
Category: Informatics, Computer Engineering and Control | |
Keywords: telemetry information, frame synchronization, synchronization code, synchronization threshold, Search mode, Test mode, Capture modes, IRIG-106 standard, symmetric binary channel with missing bits |
Definition of Characteristics for Computer’s Network Traffic
Authors: BoychenkoM.K., Ivanov I.P., Lokhturov V.A. | Published: 14.04.2015 |
Published in issue: #2(101)/2015 | |
DOI: 10.18698/0236-3933-2015-2-133-140 | |
Category: Informatics, Computer Engineering and Control | |
Keywords: computer network, network interface card, self- similarity, network traffic, Hurst parameter, scaled range, aggregation |