Digital technology security - NUMBER №3(85) July – September 2016

DIGITAL TECHNOLOGY SECURITY

DIGITAL
TECHNOLOGY SECURITY

English | Русский

Recent issue
№2(2025) April - June 2025

NUMBER №3(85) July – September 2016

All issues

Identification parameters of the linearized model of an inverted pendulum: test signal - a double meander
P. 7-17
DOI: 10.17212/2307-6879-2016-3-7-17
Calculation of controller parameters for the stabilization of the inverted pendulum by corner deviation
P. 18-32
DOI: 10.17212/2307-6879-2016-3-18-32
The parameters estimation of the linear static objects with use of the recursive least-squares method in the Simulink environment
P. 33-48
DOI: 10.17212/2307-6879-2016-3-33-48
Feedback linearization: inverted pendulum
P. 49-60
DOI: 10.17212/2307-6879-2016-3-49-60
Examples of applying of nonlinear output injection for nonlinear objects
P. 61-70
DOI: 10.17212/2307-6879-2016-3-61-70
Choose of the best one-parameter threshold function to the wavelet filtering algorithms
P. 71-82
DOI: 10.17212/2307-6879-2016-3-71-82
Calculation of reliability characteristics of radio systems with recovery
P. 83-97
DOI: 10.17212/2307-6879-2016-3-83-97
Аsynchronous HeapSort
P. 98-106
DOI: 10.17212/2307-6879-2016-3-98-106
On constraints of applicability of the theorem of solenoidal Vector fields
P. 107-114
DOI: 10.17212/2307-6879-2016-3-107-114
On the peculiarities of realization the two-parameter regulator of stabilization the position pendulum in environment MATLAB
P. 115-130
DOI: 10.17212/2307-6879-2016-3-115-130
An Algorithm of Parallel Concatenation of Arrayswith Using of Petri Nets
P. 131-138
DOI: 10.17212/2307-6879-2016-3-131-138