27 articles in this issue
Vladimir Y. Bohdanovych,Anatoliy M. Sirotenko,Vladimir S. Komarov
It is considered method to evaluate efficiency of the complex use military and non-military power and facilities in system of the provision to military security state, which enables to value the quality of the management decisions comparatively variant of... see more
Oleh V. Borovyk,Liudmyla V. Borovyk,Mykola V. Krasovsky
Evaluation of indeterminate forms is a current problem for a significant class of formalized system analysis tasks. Formally, the problems of indeterminate forms evaluation in the system analysis and the operations research theory are largely similar. How... see more
Oleksiy V. Danick,Irina V. Trofimenko,Oksana M. Kolomiets
The article is devoted to the analysis of the existing indicators of the effectiveness of navigation systems and vessel traffic management, which led to the conclusion that the probability of performing a task without emergency events is the most acceptab... see more
Evgeny A. Zhivilo
Protection of the underwater space within the territorial sea of Ukraine is one of the functions of the Armed Forces of Ukraine. Responsibility for the exercise of these functions lies directly with the Naval Forces of the Armed Forces of Ukraine. The ill... see more
Denys M. Zapara,Mykhailo B. Brovko,Serhii A. Bortnovskyi,Pavlo V. Openko
The article deals with the issues of improving the information support of a perspective logistic support automatic control system by forming the procedure for predicting the expected damage to armament and military equipment (AME) of air defence troops (A... see more
Sergei V. Kovbasjuk,Felix M. Andreev,Andrei V. Statkus
The theoretical capabilities and practical recommendations of increasing the both an accuracy of coordinate estimation and reliability of ballistic and space targets classification by using estimates of range higher order derivatives for surveillanc... see more
Igor M. Kozubtsov,Lesja M. Kozubtsova,Volodymyr V. Kutsayev,Tetyana P. Tereshchenko
The article analyzes the open sources of the Internet for the presence of methods of assessment of cybernetic security of information and telecommunication system of the organization. It is established that at present there is no similar melody of assessm... see more
Yurii V. Kravchenko,Olena V. Starkova,Roman A. Mykolaichuk,Serhii A. Mykus
The article introduces the OSI-interlayer consistency problem, gives the possible solution through the use of developed theoretical foundations the OSI-interlayer protocol consistency. It is known that the formation and organization of data transfer subje... see more
Michael I. Litvinenko,Volodymyr S. Mazharov,Serhii I. Antonenko
The paper proposes a model of the decision support system limited internal language, which is a necessary component for realizing the process of interaction between the intellectual system and the operators of the automated air traffic control system. The... see more
Leonid A. Bondarenko,Nikolay A. M?sesov,Kateryna A. Efanova,Oleg I. Sadykov
One of the most demanded and loud problems in telecommunication networks is the development of methodological bases for evaluating the survivability of hierarchical telecommunication systems when they are destroyed and restored. The article reflects the v... see more
Yaroslav V. Melnyk,Anatoly A. Kravchuk,Ruslana G. Yefimova,Bobylov Y. Bobylov
In recent years, especially with the beginning of the aggression of the Russian Federation against Ukraine, the requirements for the preparation of military units and battle staffs of all levels of the Armed Forces of Ukraine have increased significantly.... see more
Nikolai B. Nikulin,Igor V. Romashko
Recently, in a number of works devoted to the synthesis and processing of complex signals, along with the trigonometric basis, other orthogonal bases are also used. However, in these works, often, such signals are not evaluated by the peak factor, and als... see more
Serhii A. Oberemok,Serhii V. Polishchuk
When transmitting information in modern networks of automated air traffic control systems, various methods of data exchange control are used, which is caused by the need to ensure the delivery time and the acceptable value of the equivalent error probabil... see more
Viktor M. Ostapchuk,Sergiy I. Pharaon,Leonid O. Bondarenko
A methodology for calculating the capacity of a military communications system for the planning and combat application of a military communications system is presented. The methodology differs from the known ones taking into account the use of digital cha... see more
Yurii B. Pribyliev
The mathematical model, which makes it possible to build a control and test station of anti-aircraft missiles with minimal costs and specified technical characteristics is developed. An expression that determines the effect of improving the quality of the... see more
Alexander V. Ryzhkov,Marina A. Gerashchenko,Ruslan D. Barvinok,Fyodor V. Yermolenko
A series of international standards ISO / IEC 25000-25099, which regulate the quality of software products, is considered. It is determined that the standards have always played a special role for the telecommunications industry, since they are the key to... see more
Lev N. Sakovich,Vadim P. Romanenko,Sergey E. Gnatyuk,Igor Y. Rozum
Improving the efficiency of communication systems in the modern conditions of their development is one of the most urgent scientific and practical problems. Particular attention is paid to the problem of quantifying the effectiveness of the functioning of... see more
Vadym I. Slusar,Andrii O. Zinchenko,Yurii H. Danyk
For the first time, with the help of mathematical modelling, clarified the properties of the received analytical relations and set the limits possibilities of OFDM (N-OFDM) signal demodulation method in the background of impulse signals in the integrated ... see more
Andrey B. Steiskal
During last time noticed a trend to the implementation radio electronic systems (RES) for various purposes with a spread spectrum signals. For contraction RES with aggregated signals, wideband and noise-like signals very often utilized radio emission with... see more
Vasyl P. Yasynetskyi,Oleksandr V. Yakobinchuk,Ihor O. Borozenec,Volodymyr S. Mazharov
The article is devoted to the consideration of the main provisions of statistical modeling of the operator’s activity in the performance of his functional duties of air traffic control. A mathematical model of the system that reflects the features of the ... see more
Anatolii S. Dudush,Vladislav A. Tyutyunnik,Alexander A. Reznichenko,Spartak U. Hohoniants
In the article considered one of the most intensive developing threat for civilian and military spheres – hostile use of Low, Slow and Small Unmanned Aerial Vehicles (LSS UAVs). The classification of the LSS UAVs is given. World tendencies of hostile use ... see more
Ruslan V. Kubal
The article is devoted to the methodology of substantiation of requirements to the supply system of troops (forces) by fuel, the execution of which guarantees the timely and complete provision of troops (forces) by fuel. The analysis of existing methods (... see more
Valentyn Y. Mazur,Oleh V. Borovyk
Border security is a specific and important type of national security.The current tasks for the State Border Guard Service of Ukraine are: to ensure the development of integrated border management taking into account the experience of the member states of... see more
Aleksandr A. S?iborovsky,Artem V. Bratko
In this article, the authors have investigated and scientifically substantiated the recommendations that determine the unified approach of the Departments of the Administration of the State Border Service of Ukraine, the headquarters of regional administr... see more
Volodymyr M. Cherneha,Vitaliy O. Katsalap,?leksandr V. Voitko
Development of modern information society stipulated to the origin of new threats to the state information security in a military sphere. Effective counteraction to the threats in a military sphere depends on prior conduction of their qualitative assessme... see more
Roman M. Shtonda,Yulia A. Chernish,Yurii O. Protsiuk,Irina R. Maltseva
For today on the first plan in Ukraine opposition goes out in informative space. Aggression against Ukraine that showed up in "hybrid" war needs modern and effective events and methods of counteraction. With every year these events and methods get all mor... see more
Yurii G. Danyk,Oleksandr Permiakov
In the article has been analys of the current state and trends in the development defence tecnologys. Accomplished impact the high-tech on national security and defense. And accomplished problems of their implementation in the military field and ways of t... see more