Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011929
S. Imomov, M. Sultonov, Sh Aynakulov, K. Usmonov, O. Khafizov
It is stated in the paper that the key products obtained in a biogas digester from anaerobic processing of agricultural organic waste is biogas, high-quality organic fertilizers and B12 vitamins. A program was compiled and solution was found for the method of menatogenesis mixing in a biogas digester and the operation mechanism of this digester. In addition, information is provided that experiments were conducted with the program in production on biogas devices.
{"title":"Mathematical Model Of The Processes Of Step-By-Step Processing Of Organic Waste","authors":"S. Imomov, M. Sultonov, Sh Aynakulov, K. Usmonov, O. Khafizov","doi":"10.1109/ICISCT47635.2019.9011929","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011929","url":null,"abstract":"It is stated in the paper that the key products obtained in a biogas digester from anaerobic processing of agricultural organic waste is biogas, high-quality organic fertilizers and B12 vitamins. A program was compiled and solution was found for the method of menatogenesis mixing in a biogas digester and the operation mechanism of this digester. In addition, information is provided that experiments were conducted with the program in production on biogas devices.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133071771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Possibility of use of the bipolar transistor working in injection-voltaic a mode, as the operated generator of a stable current is investigated. It is created three-structural injection-voltaic the transistor, simultaneously strengthening and high-current resistance (a mode of the generator of a current). It is developed operated high-current generator on the bipolar transistor. The scheme of the power amplifier with no need of initial or subsequent adjustments of quiescent current, resistant to temperature variations, supply voltage variations and the scatter of parameters of transistors.
{"title":"Power Amplifier With Injection-Voltaic Transistor With Quiescent Current Stabilization","authors":"Aripov Khayrulla Kabilovich, Toshmatov Shunqorjon Toshpulatovich, Aripova Umida Khayrullayevna","doi":"10.1109/ICISCT47635.2019.9011888","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011888","url":null,"abstract":"Possibility of use of the bipolar transistor working in injection-voltaic a mode, as the operated generator of a stable current is investigated. It is created three-structural injection-voltaic the transistor, simultaneously strengthening and high-current resistance (a mode of the generator of a current). It is developed operated high-current generator on the bipolar transistor. The scheme of the power amplifier with no need of initial or subsequent adjustments of quiescent current, resistant to temperature variations, supply voltage variations and the scatter of parameters of transistors.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133383808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9012009
Sultonova Hilola, Nigmatova Hilola
In this study we investigate maximization of shareholders wealth in financial operations. We revealed that the budgetary chief can best serve business people by identifying stock and undertakings that improve the firm in light of the fact that the business focus needs and regard what the firm offers. We also examine the fundamental aim of assignment. Issues on maximization benefit, weaknesses of PM and the monetary market are widely discussed in the paper. We also investigated that the Financial boss has the obligation to act in their best interest. It was revealed that cash related organization covers broad assortment of issues, for instance, budgetary angles, financing and accounting. Objectives of affirmation of possible threats and benefit, monetary adequacy, wander valuation advantage may be reinvested, created off or paid in benefits. The idea that each objective financial specialist, at a given level of hazard, will acknowledge just the biggest expected return. That is, given two ventures at precisely the same of hazard, every other thing being equivalent, each objective financial specialist will put resources into the one that offers the higher return. The Markowitz Portfolio Theory endeavours to scientifically distinguish the portfolio with the most noteworthy return at each level of hazard.
{"title":"Maximitazion Of Shareholders Wealth As A Primary Goal Of A Firm","authors":"Sultonova Hilola, Nigmatova Hilola","doi":"10.1109/ICISCT47635.2019.9012009","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9012009","url":null,"abstract":"In this study we investigate maximization of shareholders wealth in financial operations. We revealed that the budgetary chief can best serve business people by identifying stock and undertakings that improve the firm in light of the fact that the business focus needs and regard what the firm offers. We also examine the fundamental aim of assignment. Issues on maximization benefit, weaknesses of PM and the monetary market are widely discussed in the paper. We also investigated that the Financial boss has the obligation to act in their best interest. It was revealed that cash related organization covers broad assortment of issues, for instance, budgetary angles, financing and accounting. Objectives of affirmation of possible threats and benefit, monetary adequacy, wander valuation advantage may be reinvested, created off or paid in benefits. The idea that each objective financial specialist, at a given level of hazard, will acknowledge just the biggest expected return. That is, given two ventures at precisely the same of hazard, every other thing being equivalent, each objective financial specialist will put resources into the one that offers the higher return. The Markowitz Portfolio Theory endeavours to scientifically distinguish the portfolio with the most noteworthy return at each level of hazard.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114848392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011900
Sharipova Aziza Abdumanapovna
Corpus Linguistics refers to an enormous collection of text through which use of language or corpus of a particular variety is represented. The importance of reviewing corpus linguistics and its principle from a linguistic perspective should be documented. Thus, this paper aims at examining the plausibility of corpus linguistics’ objectives and methodologies in context of basic tenets related to linguistics. The doctrines about the data nature and usage for linguistic analysis will also be used to determine how corpus linguistics methods stand up to them. This paper also encompasses a discussion regarding the issue of representativeness in light of Douglas Biber’s influential research paper “Representativeness in Corpus Design”.
{"title":"The Applicability of Corpus Linguistics in the Field of Linguistics","authors":"Sharipova Aziza Abdumanapovna","doi":"10.1109/ICISCT47635.2019.9011900","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011900","url":null,"abstract":"Corpus Linguistics refers to an enormous collection of text through which use of language or corpus of a particular variety is represented. The importance of reviewing corpus linguistics and its principle from a linguistic perspective should be documented. Thus, this paper aims at examining the plausibility of corpus linguistics’ objectives and methodologies in context of basic tenets related to linguistics. The doctrines about the data nature and usage for linguistic analysis will also be used to determine how corpus linguistics methods stand up to them. This paper also encompasses a discussion regarding the issue of representativeness in light of Douglas Biber’s influential research paper “Representativeness in Corpus Design”.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124698536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011921
S. Pozilova
The article devoted to the methodology for the development of creative learning of higher educational institutions' teachers in advanced training courses and retraining of pedagogical staff in the areas of computer science, mathematics and physics. The course “Innovative educational technologies” includes concepts as creativity, creative learning, organizational and pedagogical conditions of creative learning, and stages of development of creativity of pedagogical staff.
{"title":"Development Of Creativity Of Learners In The Courses Of Advanced Training And Retraining Of Pedagogical Staff In The Process Of Studying The Course \"Innovative Educational Technology\"","authors":"S. Pozilova","doi":"10.1109/ICISCT47635.2019.9011921","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011921","url":null,"abstract":"The article devoted to the methodology for the development of creative learning of higher educational institutions' teachers in advanced training courses and retraining of pedagogical staff in the areas of computer science, mathematics and physics. The course “Innovative educational technologies” includes concepts as creativity, creative learning, organizational and pedagogical conditions of creative learning, and stages of development of creativity of pedagogical staff.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011892
Mukhriddin Mukhiddinov, Bakhtiyor Akmuradov, O. Djuraev
Text recognition is a challenging and emerging research area in computer vision. The text which is located in images includes semantic data which is practiced in many various applications such as robot navigation, information retrieval of complex images, street signs, beneficial for visually impaired, automatic read the signboard, etc. We propose a text recognition method for Uzbek language using the Tesseract engine. We show that the model can recognize the Uzbek language, including Latin and Cyrillic alphabet text. The experimental results of the proposed method show robust performance than other methods.
{"title":"Robust Text Recognition for Uzbek Language in Natural Scene Images","authors":"Mukhriddin Mukhiddinov, Bakhtiyor Akmuradov, O. Djuraev","doi":"10.1109/ICISCT47635.2019.9011892","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011892","url":null,"abstract":"Text recognition is a challenging and emerging research area in computer vision. The text which is located in images includes semantic data which is practiced in many various applications such as robot navigation, information retrieval of complex images, street signs, beneficial for visually impaired, automatic read the signboard, etc. We propose a text recognition method for Uzbek language using the Tesseract engine. We show that the model can recognize the Uzbek language, including Latin and Cyrillic alphabet text. The experimental results of the proposed method show robust performance than other methods.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121982537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9012047
A. Zhdanov, V. I. Borisov, L. Dorosinsky
In modern radiology treatment workflow, verification is a critical process for determining the validity of specific treatment planning. In this article, we verified a treatment plan by modeling of dose delivery by shifting MLC angel and phantom position. The study result shows that any error during the verification process such as an error in the MLC angle or the phantom positioning may lead to different passing rate and refuse a plan, which it is correct originally.
{"title":"IMRT Verification, Analysis and Performance Evaluations: Modeling of Dose Delivery by Shifting MLC Angel and Phantom Position","authors":"A. Zhdanov, V. I. Borisov, L. Dorosinsky","doi":"10.1109/ICISCT47635.2019.9012047","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9012047","url":null,"abstract":"In modern radiology treatment workflow, verification is a critical process for determining the validity of specific treatment planning. In this article, we verified a treatment plan by modeling of dose delivery by shifting MLC angel and phantom position. The study result shows that any error during the verification process such as an error in the MLC angle or the phantom positioning may lead to different passing rate and refuse a plan, which it is correct originally.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122641466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011901
Yusupov Bakhodir Karamatovich, Toshev Sarvar Norboboevich, Nishanov Islom Ibrohimovich
In this paper an approach to the verification of filtering rules is proposed, designed to detect and resolve the anomaly of filtration in the specifications of the computer network security policy. The approach is based on the method of verification on the model. The models of computer system, firewall and anomalies of filtration are considered, which serve for verification of filtering rules by this method. As well as algorithms for detecting such anomalies. A technique for verifying the rules for filtering security policies based on these models is proposed.
{"title":"Verification of the pocket filtering based on method of verification on the model","authors":"Yusupov Bakhodir Karamatovich, Toshev Sarvar Norboboevich, Nishanov Islom Ibrohimovich","doi":"10.1109/ICISCT47635.2019.9011901","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011901","url":null,"abstract":"In this paper an approach to the verification of filtering rules is proposed, designed to detect and resolve the anomaly of filtration in the specifications of the computer network security policy. The approach is based on the method of verification on the model. The models of computer system, firewall and anomalies of filtration are considered, which serve for verification of filtering rules by this method. As well as algorithms for detecting such anomalies. A technique for verifying the rules for filtering security policies based on these models is proposed.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125905505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of color in image processing is due to two main reasons. Firstly, color is an important feature that often facilitates recognition and selection of an object in an image. Secondly, a person is able to distinguish between thousands of different shades of color and only about two dozen shades of gray. The second circumstance is especially important when visual (that is, performed directly by man) image analysis.Processing of color images can divided into two main areas: image processing in natural colors and image processing in pseudo-colors. In the first case, the images in question are usually formed by color image recording devices, such as a color television camera or a color scanner. In the second case, the task is to assign colors to some intensity values of a monochrome signal or to some ranges of changes in its intensity. Until relatively recently, digital processing of color images was carried out mostly at the level of pseudo colors. Over the past decade, however, color input devices and color image processing hardware have become quite affordable. As a result, natural image processing technology currently used in a wide range of applications, including publishing systems, visualization systems, and the Internet. It will be clear from the subsequent discussions that some halftone processing techniques developed in previous chapters are directly applicable to color images. Other methods should be reformulated and consistent with the properties of the color space, which constructed later in this chapter. The methods described in this chapter are far from exhaustive; they illustrate a variety of techniques applicable to color image processing.
{"title":"Processing Color Images, Brightness and Color Conversion","authors":"Beknazarova Saida Safibullaevna, Mukhamadiyev Abduvali Shukurovich, Jaumitbayeva Mehriban Karamtdin kizi","doi":"10.1109/ICISCT47635.2019.9012040","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9012040","url":null,"abstract":"The use of color in image processing is due to two main reasons. Firstly, color is an important feature that often facilitates recognition and selection of an object in an image. Secondly, a person is able to distinguish between thousands of different shades of color and only about two dozen shades of gray. The second circumstance is especially important when visual (that is, performed directly by man) image analysis.Processing of color images can divided into two main areas: image processing in natural colors and image processing in pseudo-colors. In the first case, the images in question are usually formed by color image recording devices, such as a color television camera or a color scanner. In the second case, the task is to assign colors to some intensity values of a monochrome signal or to some ranges of changes in its intensity. Until relatively recently, digital processing of color images was carried out mostly at the level of pseudo colors. Over the past decade, however, color input devices and color image processing hardware have become quite affordable. As a result, natural image processing technology currently used in a wide range of applications, including publishing systems, visualization systems, and the Internet. It will be clear from the subsequent discussions that some halftone processing techniques developed in previous chapters are directly applicable to color images. Other methods should be reformulated and consistent with the properties of the color space, which constructed later in this chapter. The methods described in this chapter are far from exhaustive; they illustrate a variety of techniques applicable to color image processing.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011825
Karimov Madjit Malikovich, Khudoykulov Zarif Turakulovich, Arzieva Jamila Tileubayevna
Something you know based authentication method is the most classical authentication technique on the computer system, and is performed more easily and successfully than other methods even it is a vulnerable method against attacks such as eavesdropping or replay attack. To solve this problem, OTP (Onetime Password) technique is used. OTP is delivered from one side to the other in two approaches. In the first approach, OTP is generated on server side and sent to clients, for example, by SMS. In the second approach, OTP is generated on both sides at one time based on shared counter, such as, HOTP. In most cases, one-way hash functions are used in both approaches to generate OTP. As resent researches show the weakness of the hash functions, we need new a new OTP generation algorithms to solve this problem. In this paper, we propose a method of creating one time password based on pseudorandom number generators (PRNG), which they are exist on many systems and programming languages as native.
{"title":"A Method of Efficient OTP Generation Using Pseudorandom Number Generators","authors":"Karimov Madjit Malikovich, Khudoykulov Zarif Turakulovich, Arzieva Jamila Tileubayevna","doi":"10.1109/ICISCT47635.2019.9011825","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011825","url":null,"abstract":"Something you know based authentication method is the most classical authentication technique on the computer system, and is performed more easily and successfully than other methods even it is a vulnerable method against attacks such as eavesdropping or replay attack. To solve this problem, OTP (Onetime Password) technique is used. OTP is delivered from one side to the other in two approaches. In the first approach, OTP is generated on server side and sent to clients, for example, by SMS. In the second approach, OTP is generated on both sides at one time based on shared counter, such as, HOTP. In most cases, one-way hash functions are used in both approaches to generate OTP. As resent researches show the weakness of the hash functions, we need new a new OTP generation algorithms to solve this problem. In this paper, we propose a method of creating one time password based on pseudorandom number generators (PRNG), which they are exist on many systems and programming languages as native.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"33 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121008059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}