Browsing Наукові праці by Subject "radio electronic and computer systems"
Now showing items 1-20 of 84
-
About static analysis of variables physical dimensions for critical-mission software
(ХАІ, 2010)Some strong method of static code analysis, namely, analysis of physical dimensions of program variables is researched in the paper. The formal model to analyze the dimensions of variables is built. -
Adaptive two-step method for providing the desired visual quality for SPIHT
(ХАІ, 2022)is employed to evaluate the image quality. The research method is based on a validation ex periment that is conducted for an image set covering different image complexity and texture features. The comparison results ... -
Algorithm for estimation of electrophysical parameters of the surface by its own microwave radiation
(ХАІ, 2019)The performance characteristics obtained at the level of digital statistical modeling of the developed test confirmed, firstly, the conclusions of theoretical studies. Secondly, they give specialists in the field of ... -
Analysis of opportunities to improve image denoising efficiency for DCT-based filter
(ХАІ, 2018)The subject matter of the paper is the process of image filtering. The goal is to provide high efficiency of denoising according to metrics that are more adequate to human vision system than traditional criteria as mean ... -
Architecture and implementing service-oriented pharmacological system «medicine»
(ХАІ, 2007)Present work is devoted to service-oriented systems problems. Particularly, medical web-services are discussed. Information technologies classification in medicine and urgency of web-services using in medicine are ... -
Artificial intelligence as the cognitive value of heuristic models
(ХАІ, 2022)This article is devoted to heuristic modeling of the structure of interconnections in nano-, bio- and information technologies and in cyber-physical systems, graphic images of which allow studying the fine structure of ... -
Assessing software vulnerabilities and recovery time using open resources: elements of technique and results
(ХАІ, 2007)Modern vulnerability resources are considered, their content, security and recovery time of different software products are analyzed. To make the process smoother and more efficient three main stages are distinguished: source ... -
Assurance Case driven design for software and hardware description language based systems
(ХАІ, 2016)The Claim-Argument-Evidence (CAE) approach is one from the worldly recognized technique directed to find gaps in safety-related Instrumentation and Control systems design and implementation and after that to justify meeting ... -
Ata-based security assessment of smart building automation systems
(ХАІ, 2016)The information and control system of smart building is considered as a set of subsystems including building automation system (BAS). -
Comparison of algorithms for controlled pixel-by-pixel classification of noisy multichannel images
(ХАІ, 2019)The subject of this study is the pixel-by-pixel controlled classification of multichannel satellite images distorted by additive white Gaussian noise. The paper aim is to study the effectiveness of various methods of image ... -
Cybersecurity of FPGA-based automation systems for smart building
(ХАІ, 2015)Technology advancements such as programmable logic (FPGA) and mobile decisions have made the implementation of embedded intelligent systems within home and office appliances. This increased their capabilities and features. ... -
Design of the robust PID control for uncertain nonlinear model of the UAV using artificial gain and time-delay model
(ХАІ, 2017)Estimations of the flight vehicles aerodynamic coefficients through the theoretical, numerical, wind tunnel and flight-test methods have always errors and uncertainties. Nonlinear dynamics of the unmanned aerial vehicle ... -
Determination of distribution laws of delays contributing to web-services response time
(ХАІ, 2010)The paper reports results of finding distribution laws representing Web-Services response time and delays contributing. -
Distributed cloud system: security and keyword indexing issues with implementation strategy and business limitations
(ХАІ, 2016)The article focuses on several technical and business issues that are essential for the development of distributed cloud system related to security, keyword indexing and business implementation. -
Eddy current tomography for visualization of cracks in aircraft riveted joints
(ХАІ, 2021)The control of the subsurface areas of metal products is necessary in many technological processes. So, for example, in aerospace technology it is essential to determine the presence of defects in aircraft engines. The ... -
Event-B patterns for developing FPGA-BASED hardware
(ХАІ, 2010)The paper describes the first step of methodology for designing dependable hardware which is based on field programmable gate array technology. This step means the development of patterns using Event-B language useful ... -
Exploring timeout as a performance and availability factor of distributed replicated database systems
(ХАІ, 2020)In the paper, we consider the role of the application timeout which is the fundamental part of all distributed fault tolerance mechanisms working over the Internet and used as the main error detection mechanism here. The ... -
Fault-tolerant SoPC-based approaches with multi-version IIP
(ХАІ, 2007)In this paper different approaches of Infrastructure Intellectual Property (IIP) implementation for System-on- Programmable-Chip (SoPC) are discussed. Several diversity-oriented SoPC approaches and different techniques of ... -
Features of banking information systems dependability taxonomy
(ХАІ, 2007)Banking information systems (BIS) evolution history and general structure are considered. The main BIS requirements are analyzed. The dependability attributes with regard to BIS are determined. -
GAP- and HTT-based analysis of safety-critical systems
(ХАІ, 2012)The paper discusses importance of assessment of interference degree for various attributes of safety-critical systems, as well as proposes applicable metrics. Also, the paper presents an approach to analysis of ...