Contents
Academic literature on the topic 'Розподілений комплекс'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Розподілений комплекс.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Розподілений комплекс"
Доброштан, Олена Олегівна. "Використання мережевого навчально-методичного комплексу у процесі вивчення природничо-математичних дисциплін для майбутніх судноводіїв." Theory and methods of e-learning 3 (February 10, 2014): 78–82. http://dx.doi.org/10.55056/e-learn.v3i1.320.
Full textКоваль, О. В., В. О. Кузьміних, С. Я. Свістунов, Сюй Бейбей, and Чжу Шивэй. "Збір даних для аналітичної діяльності з використанням адаптивної мікросервісної архітектури." Реєстрація, зберігання і обробка даних 23, no. 1 (March 16, 2021): 67–79. http://dx.doi.org/10.35681/1560-9189.2021.23.1.235408.
Full textЧумак, Дмитро Олександрович, and Сергій Олексійович Семеріков. "Розробка програмного комплексу для метакомп’ютерних обчислень." New computer technology 5 (November 10, 2013): 102–3. http://dx.doi.org/10.55056/nocote.v5i1.106.
Full textКалашник-Рибалко, М. А., and Г. А. Калашник. "Удосконалення методу синтезу оптимально розподіленої структури інтегрованого комплексу бортового обладнання літального апарату за показниками функціональної стійкості." Наука і техніка Повітряних Сил Збройних Сил України, no. 1(42,) (January 21, 2021): 34–40. http://dx.doi.org/10.30748/nitps.2021.42.05.
Full textUzdenov, T. A. "Simulator of Task Sheduling in Geographically Distributed Computer Systems with Non-Alienable Resources." Èlektronnoe modelirovanie 43, no. 1 (February 1, 2021): 117–29. http://dx.doi.org/10.15407/emodel.43.01.117.
Full textSkakalina, E. V. "ІННОВАЦІЙНА КОНЦЕПЦІЯ СИСТЕМИ УПРАВЛІННЯ СКЛАДНИМИ РОЗПОДІЛЕНИМИ СИСТЕМАМИ." Системи управління, навігації та зв’язку. Збірник наукових праць 2, no. 48 (April 11, 2018): 24–29. http://dx.doi.org/10.26906/sunz.2018.2.024.
Full textArpentii, S. "Особливості застосування розподілених обчислень при обробці потокових даних." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 43 (June 26, 2021): 171–76. http://dx.doi.org/10.36910/6775-2524-0560-2021-43-28.
Full textArpentii, S. "Особливості застосування розподілених обчислень при обробці потокових даних." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 43 (June 26, 2021): 171–76. http://dx.doi.org/10.36910/6775-2524-0560-2021-43-28.
Full textОсадча, А. О., and О. А. Макаренко. "ОЦІНКА ВПЛИВУ ЛІКУВАЛЬНО- ПРОФІЛАКТИЧНОГО КОМПЛЕКСУ, РОЗРОБЛЕНОГО ДЛЯ ДІТЕЙ- СПОРТСМЕНІВ, НА «ПЕЧІНКОВІ» МАРКЕРИ ТА ПОКАЗНИКИ ЛІПІДНОГО ОБМІНУ У СИРОВАТЦІ КРОВІ, СТАН МІКРОБІОЦЕНОЗУ КИШЕЧНИКУ ТА ВИТРИВАЛІСТЬ ЩУРІВ." Scientific and practical journal "Stomatological Bulletin" 119, no. 2 (May 26, 2022): 2–8. http://dx.doi.org/10.35220/2078-8916-2022-44-2.1.
Full textСіциліцин, Юрій Олександрович, and Вячеслав Володимирович Осадчий. "МОДЕЛЮВАННЯ НАВЧАЛЬНОГО ОБЧИСЛЮВАЛЬНОГО КЛАСТЕРУ НА ОСНОВІ ОДНОПЛАТНИХ КОМП’ЮТЕРІВ RASPBERRY ДЛЯ НАВЧАННЯ РОЗПОДІЛЕНОГО ПРОГРАМУВАННЯ." Information Technologies and Learning Tools 81, no. 1 (February 23, 2021): 97–108. http://dx.doi.org/10.33407/itlt.v81i1.3657.
Full textDissertations / Theses on the topic "Розподілений комплекс"
Свид, І. В., and О. С. Мальцев. "Енергоефективний менеджмент розподіленого комплексу теплопостачання." Thesis, ХНУРЕ, 2020. http://openarchive.nure.ua/handle/document/13711.
Full textКлець, П. В. "Розподілена система маршрутизації даних." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81586.
Full textМигаль, К. В. "Система керування компресорною установкою комплексу очищення палива." Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/75410.
Full textЛуценко, Іван Андрійович. "Мікросервісна архітектура в хмарних програмно-апаратних комплексах з використовуванням технології Node.JS." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/45315.
Full textThesis: 79 pages, 22 figures, 7 tables, 2 appendices, 11 sources. Topic: microservice architecture in cloud software and hardware using Node.JS technology. The paper considers various options for building systems such as microservices, monolithic architecture, serverless. Object of research: Different options for building architectures, advantages and disadvantages of microservice architecture. Subject of research: Basic templates of microservice architecture. Purpose: To develop a software product that will consider the basic templates, and will solve the main problems of microservice architecture. Developed a software product for the assessment of objects using a microservice approach and Node.JS technology.
Микитенко, Олександр Вікторович. "Моніторинг станів інформаційних ресурсів для реалізації адаптивного управління захищеністю комп’ютерних систем." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/43792.
Full textThesis: 66 p., 6 tabl., 13 fig., 1 appendix, 37 sources. The need to use security monitoring systems in computer systems and networks (CSM) is determined by the fact that the use of conventional means and mechanisms of information protection is insufficient, because they perform only basic functions and do not control the security of information systems in constant modifications of intrusions, update of CSM hardware and software. Preliminary analysis, operational control and implementation of response mechanisms to the intrusion into the CSM allow not only to detect attacks on computer systems, but also to form a set of measures to prevent, localize and eliminate the consequences of unauthorized actions in the CSM. However, existing security monitoring systems (SMS) are not able to comprehensively assess the actions of attackers, build a sequence of implemented vulnerabilities, determine the ultimate goal of attackers and assess the risks of security threats to information resources, which can lead to repeated successful attacks on computer systems and networks , as well as financial losses. To comprehensively address these challenges, it is necessary to increase the amount of data processed by the security monitoring system, which causes a slowdown in response to attacks on KSM. Thus, it is important to create new methods, as well as modified security monitoring tools that provide a high probability of correct detection and timely prevention of attacks by attackers. The object of research is the processes of analysis of actions of legal users of corporate networks in the framework of solving security monitoring problems. The subject of research is the methods and means of risk analysis of the implementation of security threats to information resources and means of counteracting intruders, which increase the effectiveness of security monitoring systems in the CSM. Research methods. The dissertation uses the mathematical apparatus of graph theory for research and assessment of VS vulnerabilities; linear algebra, the theory of linear programming for the analysis of the level of threats of KSM; probability theory and mathematical statistics to assess the risks of security threats; methods of observation processing theory for analysis of experimental data. The main provisions and theoretical assessments are confirmed by the results of analysis and modeling of security monitoring systems in computer systems and networks. The aim of the work is to increase the efficiency of security monitoring systems based on assessing the level of intrusion threats, taking into account the objectives of violators and risk analysis of information security threats, which will provide adaptive security management KSM anticipatory response to attackers. The practical significance of the obtained results is to develop new effective algorithms for analyzing the behavior of legal users of corporate networks, which are used to create software for security monitoring systems that predict possible intrusions and increase the efficiency of information security. The architecture of the decision support system of the security administrator is proposed, which according to the monitoring data uses the means of adaptive management of the security of information resources of KSM. A specialized environment has also been created for modeling and analyzing the parameters of security monitoring systems in computer systems and networks, which can be used to study various methods and means of detecting intrusions into KSM. The relevance of the topic is that monitoring the state of information resources makes it much safer to work with computer systems. As a result of the work, a number of methods for optimizing the security management of computer systems were considered and tested, and the results were analyzed.