Посмотр Статті з наукових журналів та збірок по названию
Отображаемые элементы 27-46 из 825
-
Fault-tolerant SoPC-based approaches with multi-version IIP
(ХАІ, 2007)In this paper different approaches of Infrastructure Intellectual Property (IIP) implementation for System-on- Programmable-Chip (SoPC) are discussed. Several diversity-oriented SoPC approaches and different techniques of ... -
Features of banking information systems dependability taxonomy
(ХАІ, 2007)Banking information systems (BIS) evolution history and general structure are considered. The main BIS requirements are analyzed. The dependability attributes with regard to BIS are determined. -
Four-antenna amplitude direction finder: statistical synthesis and experimental research of signal processing algorithm
(ХАІ, 2023)The subject of this study is the algorithms for measuring the angular positions of radio emission sources. The goal of this study is to develop an improved algorithm for signal processing in amplitude direction finders ... -
GAP- and HTT-based analysis of safety-critical systems
(ХАІ, 2012)The paper discusses importance of assessment of interference degree for various attributes of safety-critical systems, as well as proposes applicable metrics. Also, the paper presents an approach to analysis of ... -
Grid safety analysis based on linguistic bayesian belief network
(ХАІ, 2012)The state of power grid is determined by states of its systems, conditioned by their mutual influence of different nature. These influences cause the change of state of each system during grid life cycle. The proposed ... -
Helicopter radio system for low altitudes and flight speed measuring with pulsed ultra-wideband stochastic sounding signals and artificial intelligence elements
(ХАІ, 2023)The subject matter of this study is algorithms for measuring the components of an aircraft speed vector and altitude. The goal of this study is to improve algorithms for processing wideband stochastic pulse signals in ... -
Heuristic self-organization of knowledge representation and development: analysis in the context of explainable artificial intelligence
(ХАІ, 2022)The three hypotheses about the explainability of artificial intelligence and the theory of machine identification can be further defined as statements or theorems and strictly proved. -
Information-extreme machine learning of a cyber attack detection system
(ХАІ, 2022)This study increases the functional efficiency of machine learning of a cyber attack detection system. An information-extreme machine learning method for a cyber attack detection system with the optimization of control ... -
Instability analysis of delays contributing to web service response time
(ХАІ, 2010)This paper reports our practical experience of benchmarking a complex System Biology Web Service, and investigates the instability of its behaviour and the delays induced by the communication medium. -
Intrusion tolerance of Web-systems: IMEA-Analysis and multiversion architecture
(ХАІ, 2006)The kinds of network attacks are considered, their classification is carried out and the IMEA-table (Intrusion Modes and Effect Analysis) is designed. The multiversion variant of Web-system architecture tolerated to ... -
JPEG сжатие изображений с применением рекурсивного группового кодирования
(ХАІ, 2015)Рассмотрена задача альтернативного кодирования квантованных коэффициентов дискретного косинусного преобразования (ДКП) в стандарте JPEG. Проведен сравнительный анализ эффективности JPEG и предлагаемой модификации при сжатии ... -
Low SNR treshold in rapid estimators of complex sinusoidals
(ХАІ, 2016)A task of estimation of complex sinusoid frequency is considered. A particular but practically important case of low signal-to-noise ratio (SNR) is studied. The low SNR threshold, commonly overlooked in development of ... -
Making Web-services fault-tolerant: methods and technics
(ХАІ, 2007)With emergent growing use of Internet, Web services become increasingly popular and their growth rate surpasses even the most optimistic predictions. Services are self-descriptive, self-contained, platform-independent and ... -
Mathematical description of imaging processes in ultra-wideband active aperture synthesis systems using stochastic sounding signals
(ХАІ, 2021)Mathematical models of the fields of stochastic ultra-wideband signals that are necessary for solving problems of aperture synthesis of images using active radar methods are presented. The expediency of using V-transformations ... -
Medical information systems: analysis of development and application experience
(ХАІ, 2008)Public Health is one of the main areas, where information technologies are intensively employed. Here we have reviewed and analyzed a number of foreign and native medical information systems (MIS), experience of ... -
Method of creation of FPGA based implementation of artificial intelligence as a service
(ХАІ, 2023)The subject of study in this article is the technologies of Field Programmable Gate Array (FPGA), methods, and tools for prototyping of hardware accelerators of Artificial Intelligence (AI) and providing it as a service. ... -
Method of creation of power sources for home appliances under constraints of limited resources
(ХАІ, 2023)The subject of study in this article is the voltage ranges, methods, and tools for prototyping independent sources of power supply and artificial lighting for home appliances with reuse of only widespread components. The ... -
Method of QOS evaluation of FPGA as a service
(ХАІ, 2022)The subject of study in this article is the evaluation of the performance issues of cloud services implemented using FPGA technology. The goal is to improve the performance of cloud services built on top of multiple FPGA ... -
Method of realization of arithmetic operations on the basis of the use of modulyarnoy number system
(ХАІ, 2009)In this article we consider two arithmetic operation realizations in modular arithmetics, based on the ring shift principle. The method of binary position and remainder encoding has proved to be very efficient comparing ... -
Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks
(ХАІ, 2021)The subject matter of the article is methods and technologies of ensuring the cybersecurity of industrial and web-oriented systems and networks, training of cybersecurity specialists during the acquisition of professional ...