Information Processing Systems

digest of scientific works

Year of publication:
2012

Issue:
4(102)

# Title Authors Pages
1. THE USE OF RESOURCES DESCRIPTION TECHNOLOGY RDF IN THE SEMANTIC WEB V.N. Anohin, A.I. Bets 2-5
2. ANALYSIS OF SYNTHESIS AND SEMANTICS OF LANGUAGES OF QUERIES OF RDF DATA LAYOUT FOR REALIZATION OF EFFECTIVE SEMANTIC SEARCH V.N. Anohin, B.O. Marchak, D.V. Grinev 6-8
3. CONTENT MANAGEMENT SYSTEM AND SECURITY WEB-SITE FAN CLUB "INGEC-METALIST" A.F. Balashov, Yu.I. Skorin, M.Yu. Losev 9-11
4. Modeling production and business activities enterprise O.M. Vas’kiv 12-15
5. The system for analysis of growth defects of semiconductor crystals L.І. D’yachenko, E.V. Minov, S.E. Ostapov, I.J. Nakonechnyi, V.І. Burkut, O.V. Kopach, P.M. Fochuk 16-19
6. SYNCHRONIZATION BLOCK IN DEVICES AIMED AT THE IMAGES REPRODUCTION FROM TEMPEST VIDEO SYSTEM OF A PC Y.Y. Zelyanovsky, B.D. Budz, V.B. Dudykevych 20-23
7. Method of the multicriterial assessment of techno-economic systems, which are based on fuzzy set-performance analysis M.Y. Losev, Y.N. Kononov, Y.M. Loseva 24-29
8. FEATURES OF THE DATA ACCESS SQL SERVER USING ADO.NET ENTITY FRAMEWORK M.Y. Losev, Y.I. Skorin 30-34
9. Investigation of algorithms for minimizing the total tardiness time problem with policy terms of performance based rank approach S.V. Minukhin, D.S. Lienko, M.I. Sukhonos 35-41
10. INVESTIGATION OF METHODS FOR LOCAL RESOURCE SCHEDULING AND THEIR MODIFICATIONS IN GRID SYSTEMS S.V. Minukhin, O.V. Miezientsev 42-48
11. Using design patterns in software development Y.E. Parfyonov, O.V. Shcherbakov 49-55
12. Software testing A.A. Pivem, Yu.I. Skorin 56-58
13. Implementation of information support for patients A.I. Pugachev, Yu.I. Skorin, A.V. Scherbakov 59-61
14. Decision making under uncertainty proof of Ellsberg’s experiment V.H. Salimov, L.A. Gardashova 62-64
15. Virtual measurement and diagnostic equipment Yu.I. Skorin, A.V. Scherbakov, T.I. Mahdalyts 65-68
16. Modeling advertising campaigns cultural events A.V. Tarasov, N.A. Bakirov 68-71
17. Researching the efficiency of block statistical data compression method А.V. Tarasov, E.V. Onopko 72-75
18. DESIGN OF INFORMATIVE INFLUENCE OF SOCIAL NETWORKS ON LOYALTY OF CLIENTS FACILITIES OF PACKAGE ANYLOGIC I.A. Ushakova, S.A. Panasenko 76-80
19. Method of quantitative evaluation of the effectiveness of the quality assurance software engineer O.V. Shcherbakov, E.S. Lutcenko, Y.I.Skorin 81-84
20. The example of designing and calculation the networks with multimedia traffic K.N. Yakovishin 85-92
21. Hardware implementation of data acquisition and data processing module in telemetric research system І.D. Iakovlieva, M.A. Kuz, O.Y. Roshchupkіn, Y.A. Galіn, V.V. Sydorchuk., O.O. Pshenychnyi 92-96
22. For determination of fundamental quantity information constant (entropy) L.B. Petryshyn, M.L. Petryshyn 97-99
23. Synthesis of compositions based on binomial valued number A.A. Borisenko, T.A. Protasova, E.A. Protasova 100-103
24. Method of parameters’ information content assessment of the input data flow for the network intrusion detection systems R.V. Grischuk, V.N. Mamarev 103-107
25. Personal data protection S.P. Evseev, E.A. Lind, O.G. Korol, A.M. Nosik 108-117
26. Biometrics technologies are in the tasks of authentication of users of the informative computer systems V.G. Ivanov, N.A. Koshevaya, N.I. Maznichenko 118-121
27. Analysis of authentication methods during via banking cards in internet payment systems O.V. Klyuvak, S.S. Korolyuk, A.A. Zasjad’ko 122-127
28. Brief mathematical model indirect method of encryption with a fixed key V.A. Marchenko 128-131
29. Crypto-code systems of information security with nonbinary equilibrium codes B.P. Tomashevskii 132-136
30. Differentially playing model by system of active noise fiber-optic line S.A. Hodakivskiy 137-141
31. Application of agents is in model of contractual networks А.V. Kholodkova 142-145
32. Biometric methods in information security systems V.B. Cherednyhenko, K.E. Cherednychenko 145-148
33. GIS TECHNOLOGIES FOR CORPORATE OBJECTS MANAGEMENT K.V. Bekkuzin 149-152
34. SINGLE INFORMATION MANAGEMENT SYSTEM EDUCATION IN UKRAINE I.A. Zolotaryova, E.A. Vlasenko 152-154
35. Distance learning in the educational process T.I. Mazur, Yu.I. Skorin 155-157
36. Increases of accuracy of definition of molecular weight polymer with application of the viskozimetrichesky method R.G. Mamedov,V.A. Abbasov,U.G. Mamedov, A.J. Jabiyeva 158-161
37. METHODS OF DETERMINING THE CONNECTION BETWEEN THE INDICATORS OF CORPORATE MANAGEMENT AND INDICATORS OF FINANCE AND ECONOMIC ACTIVITY OF CORPORATE ENTERPRISES IN UKRAINE L.A. Pavlenko, A.A. Gavrilova 162-165
38. AUTOMATION FOR WATER RESOURCES INVESTIGATION OF SEVERSKY DONETS RIVER BASED ON WEB-TECHNOLOGY L.A. Pavlenko, I.K. Galetych, K.I. Popov 165-167
39. Risk analysis of a virtual enterprise using artificial intelligence R.V. Reznichenko 168-172
40. Analysis of the functionality of the software is aimed at tourism R.N. Chen, T.A. Sverdlo 172-179
41. Service of reputations V.F. Bezmaliy 2-8
42. Complex models of estimation of enterprises economic security N.V. Biloshkurska 9-11
43. Systematization of methods and facilities of apartments acoustics defence G. Borte 12-14
44. Terrorists cyber attacks and ICTD index Robert Brumnik 14-22
45. General paradigm of priv: transmitters and environment of distribution of information І.А. Gromyko 23-26
46. Interval estimation of indexes of financial safety of commercial bank V.Yu. Dubnickiy, A.M. Kobilin 27-31
47. Systematization of methods and facilities of apartments acoustics defence S.L. Emelyanov 31-36
48. SECURING CONTENT MANAGEMENT SYSTEM WORDPRESS WEB-SITE I.V. Kobzev, K.E. Petrov, S.V. Kalyakin 37-41
49. The locks use in information activity objects protection O.V. Manzhai 47-50
50. THE ECONOMIC EFFICIENCY OF SECURITY SYSTEMS IN 4G CELLULAR NETWORKS R.S. Odarchenko, S.Y. Lukin 51-55
51. Construction of optimal code tables V.Ya. Pevnev, M.V. Tsuranov 56-59
52. CALCULATION OF VALUES OF FUNCTIONS, PREDSTAVIMYKH SEDATE ROWS, BY CYCLIC REFS.S OF MS EXCEL Д.М. Smagin, I.G. Oksanich 60-63
53. Мodel of intellectual agent of active protection is in the processes of the evolutional learning I.B. Tregubenko 64-67
54. Behavioral classification polymorphic and metamorphic of harmful software Е.Р. Tumoyan, L.K. Babenko, K.V. Gipsies, M.V. Anikeev 68-74
55. A design of network attacks is in the tasks of automatic analysis of protected of the informative systems Е.П. Tumoyan, D.A. Kavchuk 74-78
56. Safety standards for operating systems M.V. Tsuranov, O.V. Slipchenko 78-81
57. FEATURES OF THE CIRCUIT IMPLEMENTATION OF INFORMATION SECURITY SEARCHINFORM Chaplyga V.M., Nemkova H.A. 82-86