Анотація. У роботі проведено порівняльний аналіз деяких моделей авторегресії на прикладі нестаціонарних процесів у фінансово-економічній сфері.
Ключові слова: авторегресія, різницеві рівняння, процес з трендом, гетероскедастичний процес.
Abstract: A method for calculating the optimal mode of gas mains in the decline in pumping.
Keywords: gas, operation, optimization.
Summary: In the article the author researches the process of implementation of the campaign for human rights in the Soviet vector of foreign policy of the J. Carter’s administration. The article analyzes the influence of the human rights policy of the President on the US-Soviet relations development.
Key words: the conception of human rights, The J. Carter administration, US-Soviet relations, USA foreign policy, dissidents.
Abstract: The method of predicting respiratory viral diseases using Hidden Markov chains.
Keywords: Markov process, forecasting, Hidden Markov Model, Serfing‘s method, Bayes' theorem.
Summary: Were investigated features and approaches of developing cross-platform mobile applications.
Keywords: cross-platform, mobile, application, iOS, Android.
Summary: Analyse of mobile applications of mHealth and applications for patients with diabetes.
Key words: mobile application, medicine, diabetes, the analysis of blood sugar levels.
Summary: Review of technologies of analyze of the glucose level in a human body.
Keywords: technologies, analyze of glucose level, diabetes, medicine.
Анотація. У даній роботі проведено огляд найбільш поширених моделей оцінки банківських ризиків. Проведена їхня порівняльна характеристика.
Ключові слова: кредитний ризик, прогнозування, кредитоспроможність, модель.
Abstract: The possibility of "smart" search RDF-storage facilities such as library publications.
Keywords: RDF, OWL, ontology, base of knowledge, semantic web, SPARQL, resource description environment, triple.
Summary: The article is being considered the functions, rights of the National Commission, Carrying Out State Regulation of Financial Services Markets as a subject of the state financial control over the Ukraine marine insurers’ activities.
Key words: control, marine insurance, supervision, insurance activities of the cargo transportation at sea transport, insurer.
Abstract: The classification of conflicts in the context-aware system based on its conceptual boundaries layers and features of its resolving.
Keywords: context-aware systems, conflict, conflict classification, conceptual boundaries layers, conflict resolution.
Abstract: The basic principles of the semantic reasoners were investigated and a comparative analysis was made.
Keywords: reasoner, Structural reasoner, Pellet, Hermit, semantic tableau, hypertableau, forward chaining, backward chaining.
Abstract: Lagrangian method (Discrete Phase Model) made simulation of multiphase flows motion in compressor station fittings (elbows, tees) to program complex ANSYS Fluent R17.0 Academic.
Keywords: elbow, discrete phase, erosion wear, computer modeling, Lagrangian method, tee.
Summary: The article considers the problem of using VirtualBox virtualization environment for automated testing of mixed cryptographic systems..
Key words: information protection, testing in virtual environment, VirtualBox, cryptographic system.
Summary: In this work an overview of existed systems of cluster analysis and data visualization was made. After analysis and projecting was made system with such functionality: uploading, normalizing and analysis of input data; cluster analysis using various types of algorithms; visualization and saving results of cluster analysis.
Key words: cluster analysis, data analysis, big data, cluster, distance measure.
Summary: The work is dedicated to the development of an automated system of big data collection, processing and analyzing.
Key words: hadoop, big data, flume, data processing.
Actual problems of modern science: Abstracts of IX International scientific-practical conference (St. Petersburg - Astana - Kyiv - Vienna, June 29, 2016)
Summary: The article considers problems are used for applications and also software tools used for inspection of code and launched a new security model code.
Key words: information security, protection system against hacking.
Abstract: The modern requirements of the choice of platform for distance learning are analyzed and administrative functions of management training are considered. The methods of designing e-course are described. The approach to the organization of the curriculum, based on a combination of traditional education with on-line education on the example of the discipline "New Information Technologies" for prospective philologists of Zhytomyr Ivan Franko State University. This course will be adapted for blended learning, described the structure of the educational-methodical complex on-line course. The on-line course is fully complied of credit-module and it makes possible to use it in assessing students in all learning activities and organizes independent work. This course enables intermediate and final sections of knowledge.
Keywords: distance learning, information technologies.
Summary. The corresponding sub-system deals with measurable properties that can be orthogonal outputs of filters, or any other potential operators.
If the output signal is continuous it is quantized as if the logic, then this is perceived, and each digital input signal is treated as a dimension. Proposed in this paper, an automatic signal detection system allows the device structure based on mass-produce integrated circuits and microprocessors to develop a model and prototype systems.