|
- Year: 2014
- Category: №2(32)
- File
In article the known radio propagation model in an open space are considered. The method and means o
|
|
- Year: 2014
- Category: №2(32)
- File
В роботі досліджено вуглецеві нанотрубки як катодні м
|
|
- Year: 2014
- Category: №2(32)
- File
The model of a typical functional workflow system in the government is developed. The conditions for
|
|
- Year: 2014
- Category: №2(32)
- File
Opto-acoustic laser microphone is one of the threats of speech information leakage from the premises
|
|
- Year: 2014
- Category: №2(32)
- File
The results of experimental researches of compression diagrams for individual sheets of paper have b
|
|
- Year: 2014
- Category: №2(32)
- File
Discreet probability model of economical looses for conservative security systems are developed. On
|
|
- Year: 2014
- Category: №2(32)
- File
The complex manufacturing methods and strengthen working surfaces of friction pairs have been consid
|
|
- Year: 2014
- Category: №2(32)
- File
The described method of calculating the coordinates of color spectral reflectance curves of colored
|
|
- Year: 2014
- Category: №2(32)
- File
The security threats on subscriber telephone loops are described. The protecting methods and means a
|
|
- Year: 2014
- Category: №2(32)
- File
The structural scheme of pseudorandom pulse sequences generator on the base of modified Fibonacci ge
|
|
- Year: 2014
- Category: №2(32)
- File
A structural-functional approach to optimal consolidation of virtual machines based on multiple serv
|
|
- Year: 2014
- Category: №2(32)
- File
The model for calculating of multilayer telecommunication networks using diakoptics has been propose
|
|
- Year: 2014
- Category: №2(32)
- File
|
|
- Year: 2014
- Category: №2(32)
- File
Mathematical description of the transformations is given at the fast calculation of inverse square r
|
|
- Year: 2014
- Category: №2(32)
- File
The article deals with the problems of assessing information security risks in the system of air tra
|
|
- Year: 2014
- Category: №2(32)
- File
A conformal mapping of cloud-based service platform structure was performed with the application of
|