Digital technology security - NUMBER №2(84) April - June 2016

DIGITAL TECHNOLOGY SECURITY

DIGITAL
TECHNOLOGY SECURITY

English | Русский

Recent issue
№2(2025) April - June 2025

NUMBER №2(84) April - June 2016

All issues

On the possibility of applying methods and models of scheduling theory to optimization of working a web-studio
P. 7-20
DOI: 10.17212/2307-6879-2016-2-7-20
Active identification of the inverted pendulum model data on angle in applied to the input sinusoidal signal
P. 21-37
DOI: 10.17212/2307-6879-2016-2-21-37
Simulation of stabilizing control on the example of triple mathematical pendulum
P. 38-48
DOI: 10.17212/2307-6879-2016-2-38-48
Pseudo hodograph Nyquist
P. 49-57
DOI: 10.17212/2307-6879-2016-2-49-57
The formation of the correlated noises
P. 58-67
DOI: 10.17212/2307-6879-2016-2-58-67
Feedback linearization
P. 68-76
DOI: 10.17212/2307-6879-2016-2-68-76
Application of neural networks in the loop PLL
P. 77-87
DOI: 10.17212/2307-6879-2016-2-77-87
RF controlled model based on microcontroller Arduino MEGA 2560
P. 88-98
DOI: 10.17212/2307-6879-2016-2-88-98
Class identification of UML-model using extended activity diagram
P. 99-106
DOI: 10.17212/2307-6879-2016-2-99-106
Application of software development technology «Model driven architecture»
P. 107-115
DOI: 10.17212/2307-6879-2016-2-107-115
The methods of liquidation single-phase short circuit in the aerial lines of extra-high voltage
P. 116-130
DOI: 10.17212/2307-6879-2016-2-116-130
Sheet parts manufacturing progressive methods
P. 131-142
DOI: 10.17212/2307-6879-2016-2-131-142