Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011929
S. Imomov, M. Sultonov, Sh Aynakulov, K. Usmonov, O. Khafizov
It is stated in the paper that the key products obtained in a biogas digester from anaerobic processing of agricultural organic waste is biogas, high-quality organic fertilizers and B12 vitamins. A program was compiled and solution was found for the method of menatogenesis mixing in a biogas digester and the operation mechanism of this digester. In addition, information is provided that experiments were conducted with the program in production on biogas devices.
{"title":"Mathematical Model Of The Processes Of Step-By-Step Processing Of Organic Waste","authors":"S. Imomov, M. Sultonov, Sh Aynakulov, K. Usmonov, O. Khafizov","doi":"10.1109/ICISCT47635.2019.9011929","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011929","url":null,"abstract":"It is stated in the paper that the key products obtained in a biogas digester from anaerobic processing of agricultural organic waste is biogas, high-quality organic fertilizers and B12 vitamins. A program was compiled and solution was found for the method of menatogenesis mixing in a biogas digester and the operation mechanism of this digester. In addition, information is provided that experiments were conducted with the program in production on biogas devices.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133071771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Possibility of use of the bipolar transistor working in injection-voltaic a mode, as the operated generator of a stable current is investigated. It is created three-structural injection-voltaic the transistor, simultaneously strengthening and high-current resistance (a mode of the generator of a current). It is developed operated high-current generator on the bipolar transistor. The scheme of the power amplifier with no need of initial or subsequent adjustments of quiescent current, resistant to temperature variations, supply voltage variations and the scatter of parameters of transistors.
{"title":"Power Amplifier With Injection-Voltaic Transistor With Quiescent Current Stabilization","authors":"Aripov Khayrulla Kabilovich, Toshmatov Shunqorjon Toshpulatovich, Aripova Umida Khayrullayevna","doi":"10.1109/ICISCT47635.2019.9011888","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011888","url":null,"abstract":"Possibility of use of the bipolar transistor working in injection-voltaic a mode, as the operated generator of a stable current is investigated. It is created three-structural injection-voltaic the transistor, simultaneously strengthening and high-current resistance (a mode of the generator of a current). It is developed operated high-current generator on the bipolar transistor. The scheme of the power amplifier with no need of initial or subsequent adjustments of quiescent current, resistant to temperature variations, supply voltage variations and the scatter of parameters of transistors.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133383808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011851
Yulia Rysyukova
The article reveals the essence and content of the concept of “scientific and methodological web-activity as well as the methodology for the formation of scientific and methodological web-activity for students of higher educational institutions of pedagogical areas of education based on the use of research web-quests of a pedagogical nature. Tashkent University of Information Technologies, Karakalpak State University and Navoi State Pedagogical Institute with a sample of 271 students were selected as an experimental site. The experimental results analyzed on the basis of student t-test showed the effectiveness of the proposed approach.
{"title":"Web Quest as a Method Formation Teacher’s Scientific and Methodological Activity","authors":"Yulia Rysyukova","doi":"10.1109/ICISCT47635.2019.9011851","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011851","url":null,"abstract":"The article reveals the essence and content of the concept of “scientific and methodological web-activity as well as the methodology for the formation of scientific and methodological web-activity for students of higher educational institutions of pedagogical areas of education based on the use of research web-quests of a pedagogical nature. Tashkent University of Information Technologies, Karakalpak State University and Navoi State Pedagogical Institute with a sample of 271 students were selected as an experimental site. The experimental results analyzed on the basis of student t-test showed the effectiveness of the proposed approach.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/icisct47635.2019.9011910
Begmatov Ilkhom Abduraimovich, Aynakulov Sharafidin Abdujalilovich, Baydillayev Sanjar Abdumumin ogli
The article discusses the calculation of drainage and its parameters using a mathematical model. Drainage on irrigated land is a complex of hydraulic structures designed to collect and drain groundwater. The main parameters of horizontal drainage are its depth and the distance between drains. A program has been created to calculate the depth of horizontal drainage and the distance between drains.
{"title":"Modeling the problem of horizontal drainage on irrigated lands","authors":"Begmatov Ilkhom Abduraimovich, Aynakulov Sharafidin Abdujalilovich, Baydillayev Sanjar Abdumumin ogli","doi":"10.1109/icisct47635.2019.9011910","DOIUrl":"https://doi.org/10.1109/icisct47635.2019.9011910","url":null,"abstract":"The article discusses the calculation of drainage and its parameters using a mathematical model. Drainage on irrigated land is a complex of hydraulic structures designed to collect and drain groundwater. The main parameters of horizontal drainage are its depth and the distance between drains. A program has been created to calculate the depth of horizontal drainage and the distance between drains.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132563885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper are given mean and types of audit, probabilities of transitions between the functioning states of information of protection tools with discrete work time. Also, in this work are given four types of antivirus errors with possible situations in the performance of means of discrete work time. Performance cases of antivirus software are described in the form of directed Graf. By four types of antivirus errors is calculated average time of operation without breaking, intensity of appearing of error, average time of backup and intensity of backup of error.
{"title":"Method of analyzing of antivirus errors when audit provides","authors":"Nasrullaev Nurbek Baxtiyorovich, Holimtaeva Ikbol Ubaydullaevna, Islomov Shahboz Zokir Ugli","doi":"10.1109/ICISCT47635.2019.9011840","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011840","url":null,"abstract":"In this paper are given mean and types of audit, probabilities of transitions between the functioning states of information of protection tools with discrete work time. Also, in this work are given four types of antivirus errors with possible situations in the performance of means of discrete work time. Performance cases of antivirus software are described in the form of directed Graf. By four types of antivirus errors is calculated average time of operation without breaking, intensity of appearing of error, average time of backup and intensity of backup of error.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134599748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011892
Mukhriddin Mukhiddinov, Bakhtiyor Akmuradov, O. Djuraev
Text recognition is a challenging and emerging research area in computer vision. The text which is located in images includes semantic data which is practiced in many various applications such as robot navigation, information retrieval of complex images, street signs, beneficial for visually impaired, automatic read the signboard, etc. We propose a text recognition method for Uzbek language using the Tesseract engine. We show that the model can recognize the Uzbek language, including Latin and Cyrillic alphabet text. The experimental results of the proposed method show robust performance than other methods.
{"title":"Robust Text Recognition for Uzbek Language in Natural Scene Images","authors":"Mukhriddin Mukhiddinov, Bakhtiyor Akmuradov, O. Djuraev","doi":"10.1109/ICISCT47635.2019.9011892","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011892","url":null,"abstract":"Text recognition is a challenging and emerging research area in computer vision. The text which is located in images includes semantic data which is practiced in many various applications such as robot navigation, information retrieval of complex images, street signs, beneficial for visually impaired, automatic read the signboard, etc. We propose a text recognition method for Uzbek language using the Tesseract engine. We show that the model can recognize the Uzbek language, including Latin and Cyrillic alphabet text. The experimental results of the proposed method show robust performance than other methods.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121982537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011825
Karimov Madjit Malikovich, Khudoykulov Zarif Turakulovich, Arzieva Jamila Tileubayevna
Something you know based authentication method is the most classical authentication technique on the computer system, and is performed more easily and successfully than other methods even it is a vulnerable method against attacks such as eavesdropping or replay attack. To solve this problem, OTP (Onetime Password) technique is used. OTP is delivered from one side to the other in two approaches. In the first approach, OTP is generated on server side and sent to clients, for example, by SMS. In the second approach, OTP is generated on both sides at one time based on shared counter, such as, HOTP. In most cases, one-way hash functions are used in both approaches to generate OTP. As resent researches show the weakness of the hash functions, we need new a new OTP generation algorithms to solve this problem. In this paper, we propose a method of creating one time password based on pseudorandom number generators (PRNG), which they are exist on many systems and programming languages as native.
{"title":"A Method of Efficient OTP Generation Using Pseudorandom Number Generators","authors":"Karimov Madjit Malikovich, Khudoykulov Zarif Turakulovich, Arzieva Jamila Tileubayevna","doi":"10.1109/ICISCT47635.2019.9011825","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011825","url":null,"abstract":"Something you know based authentication method is the most classical authentication technique on the computer system, and is performed more easily and successfully than other methods even it is a vulnerable method against attacks such as eavesdropping or replay attack. To solve this problem, OTP (Onetime Password) technique is used. OTP is delivered from one side to the other in two approaches. In the first approach, OTP is generated on server side and sent to clients, for example, by SMS. In the second approach, OTP is generated on both sides at one time based on shared counter, such as, HOTP. In most cases, one-way hash functions are used in both approaches to generate OTP. As resent researches show the weakness of the hash functions, we need new a new OTP generation algorithms to solve this problem. In this paper, we propose a method of creating one time password based on pseudorandom number generators (PRNG), which they are exist on many systems and programming languages as native.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"33 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121008059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9012009
Sultonova Hilola, Nigmatova Hilola
In this study we investigate maximization of shareholders wealth in financial operations. We revealed that the budgetary chief can best serve business people by identifying stock and undertakings that improve the firm in light of the fact that the business focus needs and regard what the firm offers. We also examine the fundamental aim of assignment. Issues on maximization benefit, weaknesses of PM and the monetary market are widely discussed in the paper. We also investigated that the Financial boss has the obligation to act in their best interest. It was revealed that cash related organization covers broad assortment of issues, for instance, budgetary angles, financing and accounting. Objectives of affirmation of possible threats and benefit, monetary adequacy, wander valuation advantage may be reinvested, created off or paid in benefits. The idea that each objective financial specialist, at a given level of hazard, will acknowledge just the biggest expected return. That is, given two ventures at precisely the same of hazard, every other thing being equivalent, each objective financial specialist will put resources into the one that offers the higher return. The Markowitz Portfolio Theory endeavours to scientifically distinguish the portfolio with the most noteworthy return at each level of hazard.
{"title":"Maximitazion Of Shareholders Wealth As A Primary Goal Of A Firm","authors":"Sultonova Hilola, Nigmatova Hilola","doi":"10.1109/ICISCT47635.2019.9012009","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9012009","url":null,"abstract":"In this study we investigate maximization of shareholders wealth in financial operations. We revealed that the budgetary chief can best serve business people by identifying stock and undertakings that improve the firm in light of the fact that the business focus needs and regard what the firm offers. We also examine the fundamental aim of assignment. Issues on maximization benefit, weaknesses of PM and the monetary market are widely discussed in the paper. We also investigated that the Financial boss has the obligation to act in their best interest. It was revealed that cash related organization covers broad assortment of issues, for instance, budgetary angles, financing and accounting. Objectives of affirmation of possible threats and benefit, monetary adequacy, wander valuation advantage may be reinvested, created off or paid in benefits. The idea that each objective financial specialist, at a given level of hazard, will acknowledge just the biggest expected return. That is, given two ventures at precisely the same of hazard, every other thing being equivalent, each objective financial specialist will put resources into the one that offers the higher return. The Markowitz Portfolio Theory endeavours to scientifically distinguish the portfolio with the most noteworthy return at each level of hazard.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114848392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011979
N. Uteuliev, G. Djaykov, Sh.A. Yadgarov
We considered a problem of reconstruction function in a strip, if we know the integrals of sought function in the family of straight-line segments with a given weight function of a special kind. We obtained an analytical representation of solution in the class of smooth finite functions, the uniqueness theorems for solution of the problem is proved. The stability estimate of solution in Sobolev spaces is presented, which implies its weakly ill-posedness. These theoretical results are used in order to recover the internal structure objects from their integral data. Numerical results and their graphical representation are given.
{"title":"Analytical and numerical reconstruction of internal structure of the objects in a family of straight-line segments","authors":"N. Uteuliev, G. Djaykov, Sh.A. Yadgarov","doi":"10.1109/ICISCT47635.2019.9011979","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011979","url":null,"abstract":"We considered a problem of reconstruction function in a strip, if we know the integrals of sought function in the family of straight-line segments with a given weight function of a special kind. We obtained an analytical representation of solution in the class of smooth finite functions, the uniqueness theorems for solution of the problem is proved. The stability estimate of solution in Sobolev spaces is presented, which implies its weakly ill-posedness. These theoretical results are used in order to recover the internal structure objects from their integral data. Numerical results and their graphical representation are given.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116883755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011900
Sharipova Aziza Abdumanapovna
Corpus Linguistics refers to an enormous collection of text through which use of language or corpus of a particular variety is represented. The importance of reviewing corpus linguistics and its principle from a linguistic perspective should be documented. Thus, this paper aims at examining the plausibility of corpus linguistics’ objectives and methodologies in context of basic tenets related to linguistics. The doctrines about the data nature and usage for linguistic analysis will also be used to determine how corpus linguistics methods stand up to them. This paper also encompasses a discussion regarding the issue of representativeness in light of Douglas Biber’s influential research paper “Representativeness in Corpus Design”.
{"title":"The Applicability of Corpus Linguistics in the Field of Linguistics","authors":"Sharipova Aziza Abdumanapovna","doi":"10.1109/ICISCT47635.2019.9011900","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011900","url":null,"abstract":"Corpus Linguistics refers to an enormous collection of text through which use of language or corpus of a particular variety is represented. The importance of reviewing corpus linguistics and its principle from a linguistic perspective should be documented. Thus, this paper aims at examining the plausibility of corpus linguistics’ objectives and methodologies in context of basic tenets related to linguistics. The doctrines about the data nature and usage for linguistic analysis will also be used to determine how corpus linguistics methods stand up to them. This paper also encompasses a discussion regarding the issue of representativeness in light of Douglas Biber’s influential research paper “Representativeness in Corpus Design”.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124698536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}