ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
16 June 2024

Articles of journal № 2 at 2010 year.

Order result by:
Public date | Title | Authors

31. Evaluation of innovative potential of organizations of the region based on hybrid expert systems [№2 за 2010 год]
Authors: Пятковский О.И., Тишков О.И.
Visitors: 13754
The article considers models and architecture of a special software system for determining the level of innovative potential of the organization based on hybrid expert systems technology and neural networks.

32. Automated protection technology of the internet information service [№2 за 2010 год]
Author: Алексеевский М.В.
Visitors: 11215
This article is devoted to the technology of construction of the automated information real-time systems on the Internet scale with dynamic encryption of the information resources. The submitted technology essentially outstrips the known technologies of information service, adhering to standard HTML/XML and the concept of application server, in effectivity, throughput, the level of automation and safety.

33. A blur detection method for digital images’ edges [№2 за 2010 год]
Author: Koltsov P.P.
Visitors: 7822
The paper submits image blur estimation method, which is not based on a priori information on external conditions for image taking. The method based on previously introduced edge detector operator. This operator produces local approximation of the digital image’s fragments by some more easy function. The approximation is made with a step-form function in the round-form windows.

34. The increasing inductor spaces and analyze of parallel algorithms [№2 за 2010 год]
Author: Коганов А.В.
Visitors: 9255
It defined the criterions of effectively for using of parallel algorithms in computing of logical and mathematical functions. The apparatus of increasing inductor spaces suggested for analyze of that criterions. It considered narrow two tasks with effectively and small effectively paralleling of algorithms.

35. Realization of a stereo mode for various devices of display in a real-time mode [№2 за 2010 год]
Author: Torgashev M.A.
Visitors: 10562
Algorithms of realization of a stereo mode in a real time for the various formats used in different devices of stereo visualization are in detail considered. The number of considered systems and technologies of stereo visualization includes anaglyph systems, shutter-glasses systems, polarizing projective systems, monitors with interlaced technology of stereo and autostereoscopic monitors Philips 3D Solutions

36. Modelling of three-dimensionnal temperature fields in electronic modules [№2 за 2010 год]
Authors: Madera A.G., Kandalov P.I.
Visitors: 13493
The article is dedicated to a method of mathematical and computer modeling of three-dimensional temperature fields in complex design of the real electronic modules, containing multilayer printed circuit board, installed integrated circuits and electroradio elements. The method is made as the program for personal computer

37. The development of the system for microprocessor random testing INTEG [№2 за 2010 год]
Authors: Грибков И.В., Zakharov A.V., Коганов М.А., Koltsov P.P., Kotovich N.V., Кравченко А.А., Куцаев А.С., Осипов А.С., Хисамбеев И.Ш.
Visitors: 12214
Stochastic testing is one of the most powerful tools for verification of microprocessor design. To simplify the generation of random tests and to create a tool for testing processors of the MIPS64 architecture, the system named INTEG has been developed. After its use for several years, a deep modernization of INTEG has been carried out, resulting in the program complex INTEG2. In the paper the main features of both INTEG and INTEG2, as well as their similarities and dissimilarities, are considered. Also some directions for further development of INTEG2 are finally addressed

38. Analyze of fault tolerance for parallel circular computing system [№2 за 2010 год]
Authors: Коганов А.В., Сазонов А.Н.
Visitors: 9492
It inputted the notion of circular computing system model (CCS) (which represented in form non-orienteering circular coloring graph) and set of several identical that models (SCCS). Model of task for SCCS defined haw graph which is identical model of CCS. Destruction of CCS mean a selection any own subgraph in model (DCCS), and mending DCCS is addition of any vertexes and-or edges from CCS/DCCS. Failure of SCCS is inability to find isomorphic image of task model in any DCCS on SCCS. It is researching the possible of task entering on DSSC and depending that on color number and ring long. It is reasserting the depending mean time of first failure SCCS on parameters of graph CCS and increase low of SCCS by imitation modeling method

39. Monitor oriented programming as a part of controlled execution [№2 за 2010 год]
Authors: Galatenko V.A., Kostyukhin K.A., Шмырев Н.В.
Visitors: 11198
Formal methods of verification based on static code analysis, theorem proving and model verification do not describe quantitative characteristics of applications. This article presents the novel approach including the static analysis of a program code, model validation and dynamic verification of the program properties during runtime

40. Mathematical model of controlled execution [№2 за 2010 год]
Author: Шмырев Н.В.
Visitors: 9347
Formal description of a complex information systems should be able to describe the objects of a system and their interaction and should unify approaches to the description of calculations. In this article the model of the calculations describing the main aspects of controlled execution of distributed reliable realtime applications is presented

← Preview | 1 | 2 | 3 | 4