首页 > 最新文献

2019 International Conference on Information Science and Communications Technologies (ICISCT)最新文献

英文 中文
Mathematical Model Of The Processes Of Step-By-Step Processing Of Organic Waste 有机废物分步处理过程的数学模型
Pub Date : 2019-11-01 DOI: 10.1109/ICISCT47635.2019.9011929
S. Imomov, M. Sultonov, Sh Aynakulov, K. Usmonov, O. Khafizov
It is stated in the paper that the key products obtained in a biogas digester from anaerobic processing of agricultural organic waste is biogas, high-quality organic fertilizers and B12 vitamins. A program was compiled and solution was found for the method of menatogenesis mixing in a biogas digester and the operation mechanism of this digester. In addition, information is provided that experiments were conducted with the program in production on biogas devices.
本文阐述了农业有机废弃物厌氧处理在沼气池中获得的关键产品是沼气、优质有机肥和维生素B12。编制了沼气池发酵混合法程序,并对沼气池的运行机理进行了求解。此外,提供的资料表明,在生产沼气装置的过程中对该程序进行了实验。
{"title":"Mathematical Model Of The Processes Of Step-By-Step Processing Of Organic Waste","authors":"S. Imomov, M. Sultonov, Sh Aynakulov, K. Usmonov, O. Khafizov","doi":"10.1109/ICISCT47635.2019.9011929","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011929","url":null,"abstract":"It is stated in the paper that the key products obtained in a biogas digester from anaerobic processing of agricultural organic waste is biogas, high-quality organic fertilizers and B12 vitamins. A program was compiled and solution was found for the method of menatogenesis mixing in a biogas digester and the operation mechanism of this digester. In addition, information is provided that experiments were conducted with the program in production on biogas devices.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133071771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Power Amplifier With Injection-Voltaic Transistor With Quiescent Current Stabilization 静态稳流注入伏特晶体管功率放大器
Pub Date : 2019-11-01 DOI: 10.1109/ICISCT47635.2019.9011888
Aripov Khayrulla Kabilovich, Toshmatov Shunqorjon Toshpulatovich, Aripova Umida Khayrullayevna
Possibility of use of the bipolar transistor working in injection-voltaic a mode, as the operated generator of a stable current is investigated. It is created three-structural injection-voltaic the transistor, simultaneously strengthening and high-current resistance (a mode of the generator of a current). It is developed operated high-current generator on the bipolar transistor. The scheme of the power amplifier with no need of initial or subsequent adjustments of quiescent current, resistant to temperature variations, supply voltage variations and the scatter of parameters of transistors.
研究了双极晶体管在注入-伏打模式下作为稳定电流发电机工作的可能性。它是由三种结构的注入-伏打晶体管创造的,同时加强和高电流电阻(一种模式的发电机的电流)。研制了基于双极晶体管的操作式大电流发电机。该方案无需初始或后续调整静态电流,可抵抗温度变化、电源电压变化和晶体管参数的散射。
{"title":"Power Amplifier With Injection-Voltaic Transistor With Quiescent Current Stabilization","authors":"Aripov Khayrulla Kabilovich, Toshmatov Shunqorjon Toshpulatovich, Aripova Umida Khayrullayevna","doi":"10.1109/ICISCT47635.2019.9011888","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011888","url":null,"abstract":"Possibility of use of the bipolar transistor working in injection-voltaic a mode, as the operated generator of a stable current is investigated. It is created three-structural injection-voltaic the transistor, simultaneously strengthening and high-current resistance (a mode of the generator of a current). It is developed operated high-current generator on the bipolar transistor. The scheme of the power amplifier with no need of initial or subsequent adjustments of quiescent current, resistant to temperature variations, supply voltage variations and the scatter of parameters of transistors.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133383808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Maximitazion Of Shareholders Wealth As A Primary Goal Of A Firm 股东财富最大化是企业的首要目标
Pub Date : 2019-11-01 DOI: 10.1109/ICISCT47635.2019.9012009
Sultonova Hilola, Nigmatova Hilola
In this study we investigate maximization of shareholders wealth in financial operations. We revealed that the budgetary chief can best serve business people by identifying stock and undertakings that improve the firm in light of the fact that the business focus needs and regard what the firm offers. We also examine the fundamental aim of assignment. Issues on maximization benefit, weaknesses of PM and the monetary market are widely discussed in the paper. We also investigated that the Financial boss has the obligation to act in their best interest. It was revealed that cash related organization covers broad assortment of issues, for instance, budgetary angles, financing and accounting. Objectives of affirmation of possible threats and benefit, monetary adequacy, wander valuation advantage may be reinvested, created off or paid in benefits. The idea that each objective financial specialist, at a given level of hazard, will acknowledge just the biggest expected return. That is, given two ventures at precisely the same of hazard, every other thing being equivalent, each objective financial specialist will put resources into the one that offers the higher return. The Markowitz Portfolio Theory endeavours to scientifically distinguish the portfolio with the most noteworthy return at each level of hazard.
在本研究中,我们探讨了股东财富在金融经营中的最大化。我们发现,预算主管可以根据业务重点的需要和公司提供的东西,确定改善公司的股票和事业,从而最好地为业务人员服务。我们还考察了赋值的基本目的。本文主要讨论了收益最大化、项目管理的缺陷和货币市场等问题。我们还调查了金融部门的老板有义务为他们的最大利益行事。据透露,与现金有关的组织包括各种各样的问题,例如预算角度,财务和会计。目标确认可能的威胁和利益,货币充分性,徘徊估值优势可再投资,创造或支付的利益。每个客观的金融专家,在给定的风险水平下,只会承认最大的预期回报。也就是说,假设两个风险完全相同的企业,在其他条件相同的情况下,每个客观的金融专家都会把资源投入到提供更高回报的企业中。马科维茨投资组合理论力求科学地区分在每一风险水平上收益最高的投资组合。
{"title":"Maximitazion Of Shareholders Wealth As A Primary Goal Of A Firm","authors":"Sultonova Hilola, Nigmatova Hilola","doi":"10.1109/ICISCT47635.2019.9012009","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9012009","url":null,"abstract":"In this study we investigate maximization of shareholders wealth in financial operations. We revealed that the budgetary chief can best serve business people by identifying stock and undertakings that improve the firm in light of the fact that the business focus needs and regard what the firm offers. We also examine the fundamental aim of assignment. Issues on maximization benefit, weaknesses of PM and the monetary market are widely discussed in the paper. We also investigated that the Financial boss has the obligation to act in their best interest. It was revealed that cash related organization covers broad assortment of issues, for instance, budgetary angles, financing and accounting. Objectives of affirmation of possible threats and benefit, monetary adequacy, wander valuation advantage may be reinvested, created off or paid in benefits. The idea that each objective financial specialist, at a given level of hazard, will acknowledge just the biggest expected return. That is, given two ventures at precisely the same of hazard, every other thing being equivalent, each objective financial specialist will put resources into the one that offers the higher return. The Markowitz Portfolio Theory endeavours to scientifically distinguish the portfolio with the most noteworthy return at each level of hazard.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114848392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Applicability of Corpus Linguistics in the Field of Linguistics 语料库语言学在语言学领域的适用性
Pub Date : 2019-11-01 DOI: 10.1109/ICISCT47635.2019.9011900
Sharipova Aziza Abdumanapovna
Corpus Linguistics refers to an enormous collection of text through which use of language or corpus of a particular variety is represented. The importance of reviewing corpus linguistics and its principle from a linguistic perspective should be documented. Thus, this paper aims at examining the plausibility of corpus linguistics’ objectives and methodologies in context of basic tenets related to linguistics. The doctrines about the data nature and usage for linguistic analysis will also be used to determine how corpus linguistics methods stand up to them. This paper also encompasses a discussion regarding the issue of representativeness in light of Douglas Biber’s influential research paper “Representativeness in Corpus Design”.
语料库语言学指的是一个庞大的文本集合,通过它来表达语言的使用或特定种类的语料库。从语言学的角度审视语料库语言学及其原理的重要性应当得到证明。因此,本文旨在考察语料库语言学的目标和方法在语言学基本原则的背景下的合理性。关于语言分析的数据性质和用法的理论也将用于确定语料库语言学方法如何应对它们。本文还结合Douglas Biber颇具影响力的研究论文《语料库设计中的代表性》对代表性问题进行了探讨。
{"title":"The Applicability of Corpus Linguistics in the Field of Linguistics","authors":"Sharipova Aziza Abdumanapovna","doi":"10.1109/ICISCT47635.2019.9011900","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011900","url":null,"abstract":"Corpus Linguistics refers to an enormous collection of text through which use of language or corpus of a particular variety is represented. The importance of reviewing corpus linguistics and its principle from a linguistic perspective should be documented. Thus, this paper aims at examining the plausibility of corpus linguistics’ objectives and methodologies in context of basic tenets related to linguistics. The doctrines about the data nature and usage for linguistic analysis will also be used to determine how corpus linguistics methods stand up to them. This paper also encompasses a discussion regarding the issue of representativeness in light of Douglas Biber’s influential research paper “Representativeness in Corpus Design”.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124698536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development Of Creativity Of Learners In The Courses Of Advanced Training And Retraining Of Pedagogical Staff In The Process Of Studying The Course "Innovative Educational Technology" “创新教育技术”课程学习过程中教师进修与再培训课程中学习者创造力的培养
Pub Date : 2019-11-01 DOI: 10.1109/ICISCT47635.2019.9011921
S. Pozilova
The article devoted to the methodology for the development of creative learning of higher educational institutions' teachers in advanced training courses and retraining of pedagogical staff in the areas of computer science, mathematics and physics. The course “Innovative educational technologies” includes concepts as creativity, creative learning, organizational and pedagogical conditions of creative learning, and stages of development of creativity of pedagogical staff.
本文专门讨论了在计算机科学、数学和物理领域的高级培训课程中发展高等教育机构教师创造性学习的方法和对教学人员的再培训。“创新教育技术”这门课程包括创造力、创造性学习、创造性学习的组织条件和教学条件、教学人员创造力发展的阶段等概念。
{"title":"Development Of Creativity Of Learners In The Courses Of Advanced Training And Retraining Of Pedagogical Staff In The Process Of Studying The Course \"Innovative Educational Technology\"","authors":"S. Pozilova","doi":"10.1109/ICISCT47635.2019.9011921","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011921","url":null,"abstract":"The article devoted to the methodology for the development of creative learning of higher educational institutions' teachers in advanced training courses and retraining of pedagogical staff in the areas of computer science, mathematics and physics. The course “Innovative educational technologies” includes concepts as creativity, creative learning, organizational and pedagogical conditions of creative learning, and stages of development of creativity of pedagogical staff.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Text Recognition for Uzbek Language in Natural Scene Images 自然场景图像中乌兹别克语的鲁棒文本识别
Pub Date : 2019-11-01 DOI: 10.1109/ICISCT47635.2019.9011892
Mukhriddin Mukhiddinov, Bakhtiyor Akmuradov, O. Djuraev
Text recognition is a challenging and emerging research area in computer vision. The text which is located in images includes semantic data which is practiced in many various applications such as robot navigation, information retrieval of complex images, street signs, beneficial for visually impaired, automatic read the signboard, etc. We propose a text recognition method for Uzbek language using the Tesseract engine. We show that the model can recognize the Uzbek language, including Latin and Cyrillic alphabet text. The experimental results of the proposed method show robust performance than other methods.
文本识别是计算机视觉中一个具有挑战性的新兴研究领域。图像中的文本包括语义数据,在机器人导航、复杂图像的信息检索、街道标志、有利于视障人士的标志、自动读牌等许多不同的应用中都有应用。本文提出了一种基于Tesseract引擎的乌兹别克语文本识别方法。结果表明,该模型能够识别乌兹别克语中包括拉丁字母和西里尔字母的文本。实验结果表明,该方法具有较好的鲁棒性。
{"title":"Robust Text Recognition for Uzbek Language in Natural Scene Images","authors":"Mukhriddin Mukhiddinov, Bakhtiyor Akmuradov, O. Djuraev","doi":"10.1109/ICISCT47635.2019.9011892","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011892","url":null,"abstract":"Text recognition is a challenging and emerging research area in computer vision. The text which is located in images includes semantic data which is practiced in many various applications such as robot navigation, information retrieval of complex images, street signs, beneficial for visually impaired, automatic read the signboard, etc. We propose a text recognition method for Uzbek language using the Tesseract engine. We show that the model can recognize the Uzbek language, including Latin and Cyrillic alphabet text. The experimental results of the proposed method show robust performance than other methods.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121982537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IMRT Verification, Analysis and Performance Evaluations: Modeling of Dose Delivery by Shifting MLC Angel and Phantom Position IMRT的验证、分析和性能评估:通过移动MLC角度和幻影位置来模拟剂量传递
Pub Date : 2019-11-01 DOI: 10.1109/ICISCT47635.2019.9012047
A. Zhdanov, V. I. Borisov, L. Dorosinsky
In modern radiology treatment workflow, verification is a critical process for determining the validity of specific treatment planning. In this article, we verified a treatment plan by modeling of dose delivery by shifting MLC angel and phantom position. The study result shows that any error during the verification process such as an error in the MLC angle or the phantom positioning may lead to different passing rate and refuse a plan, which it is correct originally.
在现代放射学治疗流程中,验证是确定具体治疗计划有效性的关键过程。在本文中,我们通过改变MLC角度和幻体位置的给药模型来验证一种治疗方案。研究结果表明,在验证过程中出现的任何误差,如MLC角度的误差或幻像定位的误差,都可能导致通过率不同而拒绝方案,而该方案原本是正确的。
{"title":"IMRT Verification, Analysis and Performance Evaluations: Modeling of Dose Delivery by Shifting MLC Angel and Phantom Position","authors":"A. Zhdanov, V. I. Borisov, L. Dorosinsky","doi":"10.1109/ICISCT47635.2019.9012047","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9012047","url":null,"abstract":"In modern radiology treatment workflow, verification is a critical process for determining the validity of specific treatment planning. In this article, we verified a treatment plan by modeling of dose delivery by shifting MLC angel and phantom position. The study result shows that any error during the verification process such as an error in the MLC angle or the phantom positioning may lead to different passing rate and refuse a plan, which it is correct originally.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122641466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of the pocket filtering based on method of verification on the model 基于模型验证方法的口袋滤波验证
Pub Date : 2019-11-01 DOI: 10.1109/ICISCT47635.2019.9011901
Yusupov Bakhodir Karamatovich, Toshev Sarvar Norboboevich, Nishanov Islom Ibrohimovich
In this paper an approach to the verification of filtering rules is proposed, designed to detect and resolve the anomaly of filtration in the specifications of the computer network security policy. The approach is based on the method of verification on the model. The models of computer system, firewall and anomalies of filtration are considered, which serve for verification of filtering rules by this method. As well as algorithms for detecting such anomalies. A technique for verifying the rules for filtering security policies based on these models is proposed.
本文提出了一种过滤规则的验证方法,旨在检测和解决计算机网络安全策略规范中的过滤异常。该方法基于对模型的验证方法。该方法考虑了计算机系统模型、防火墙模型和过滤异常模型,为过滤规则的验证提供了依据。以及检测这种异常的算法。提出了一种基于这些模型的安全策略过滤规则验证技术。
{"title":"Verification of the pocket filtering based on method of verification on the model","authors":"Yusupov Bakhodir Karamatovich, Toshev Sarvar Norboboevich, Nishanov Islom Ibrohimovich","doi":"10.1109/ICISCT47635.2019.9011901","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011901","url":null,"abstract":"In this paper an approach to the verification of filtering rules is proposed, designed to detect and resolve the anomaly of filtration in the specifications of the computer network security policy. The approach is based on the method of verification on the model. The models of computer system, firewall and anomalies of filtration are considered, which serve for verification of filtering rules by this method. As well as algorithms for detecting such anomalies. A technique for verifying the rules for filtering security policies based on these models is proposed.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125905505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Processing Color Images, Brightness and Color Conversion 处理彩色图像,亮度和颜色转换
Pub Date : 2019-11-01 DOI: 10.1109/ICISCT47635.2019.9012040
Beknazarova Saida Safibullaevna, Mukhamadiyev Abduvali Shukurovich, Jaumitbayeva Mehriban Karamtdin kizi
The use of color in image processing is due to two main reasons. Firstly, color is an important feature that often facilitates recognition and selection of an object in an image. Secondly, a person is able to distinguish between thousands of different shades of color and only about two dozen shades of gray. The second circumstance is especially important when visual (that is, performed directly by man) image analysis.Processing of color images can divided into two main areas: image processing in natural colors and image processing in pseudo-colors. In the first case, the images in question are usually formed by color image recording devices, such as a color television camera or a color scanner. In the second case, the task is to assign colors to some intensity values of a monochrome signal or to some ranges of changes in its intensity. Until relatively recently, digital processing of color images was carried out mostly at the level of pseudo colors. Over the past decade, however, color input devices and color image processing hardware have become quite affordable. As a result, natural image processing technology currently used in a wide range of applications, including publishing systems, visualization systems, and the Internet. It will be clear from the subsequent discussions that some halftone processing techniques developed in previous chapters are directly applicable to color images. Other methods should be reformulated and consistent with the properties of the color space, which constructed later in this chapter. The methods described in this chapter are far from exhaustive; they illustrate a variety of techniques applicable to color image processing.
色彩在图像处理中的运用主要有两个原因。首先,颜色是一个重要的特征,通常有助于识别和选择图像中的物体。其次,一个人能够区分数千种不同深浅的颜色,而只有大约24种深浅的灰色。第二种情况在视觉(即直接由人执行)图像分析时尤为重要。彩色图像的处理可分为两个主要领域:自然色图像处理和伪色图像处理。在第一种情况下,所讨论的图像通常由彩色图像记录设备形成,例如彩色电视摄像机或彩色扫描仪。在第二种情况下,任务是将颜色分配给单色信号的某些强度值或其强度的某些变化范围。直到最近,彩色图像的数字处理主要是在伪颜色的水平上进行的。然而,在过去的十年中,彩色输入设备和彩色图像处理硬件已经变得相当便宜。因此,自然图像处理技术目前在广泛的应用中使用,包括出版系统、可视化系统和Internet。从后面的讨论中可以清楚地看出,在前几章中发展的一些半色调处理技术直接适用于彩色图像。其他方法应该重新制定,并与本章后面构造的色彩空间的属性一致。本章所描述的方法远非详尽无遗;它们说明了适用于彩色图像处理的各种技术。
{"title":"Processing Color Images, Brightness and Color Conversion","authors":"Beknazarova Saida Safibullaevna, Mukhamadiyev Abduvali Shukurovich, Jaumitbayeva Mehriban Karamtdin kizi","doi":"10.1109/ICISCT47635.2019.9012040","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9012040","url":null,"abstract":"The use of color in image processing is due to two main reasons. Firstly, color is an important feature that often facilitates recognition and selection of an object in an image. Secondly, a person is able to distinguish between thousands of different shades of color and only about two dozen shades of gray. The second circumstance is especially important when visual (that is, performed directly by man) image analysis.Processing of color images can divided into two main areas: image processing in natural colors and image processing in pseudo-colors. In the first case, the images in question are usually formed by color image recording devices, such as a color television camera or a color scanner. In the second case, the task is to assign colors to some intensity values of a monochrome signal or to some ranges of changes in its intensity. Until relatively recently, digital processing of color images was carried out mostly at the level of pseudo colors. Over the past decade, however, color input devices and color image processing hardware have become quite affordable. As a result, natural image processing technology currently used in a wide range of applications, including publishing systems, visualization systems, and the Internet. It will be clear from the subsequent discussions that some halftone processing techniques developed in previous chapters are directly applicable to color images. Other methods should be reformulated and consistent with the properties of the color space, which constructed later in this chapter. The methods described in this chapter are far from exhaustive; they illustrate a variety of techniques applicable to color image processing.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Method of Efficient OTP Generation Using Pseudorandom Number Generators 一种利用伪随机数发生器高效生成OTP的方法
Pub Date : 2019-11-01 DOI: 10.1109/ICISCT47635.2019.9011825
Karimov Madjit Malikovich, Khudoykulov Zarif Turakulovich, Arzieva Jamila Tileubayevna
Something you know based authentication method is the most classical authentication technique on the computer system, and is performed more easily and successfully than other methods even it is a vulnerable method against attacks such as eavesdropping or replay attack. To solve this problem, OTP (Onetime Password) technique is used. OTP is delivered from one side to the other in two approaches. In the first approach, OTP is generated on server side and sent to clients, for example, by SMS. In the second approach, OTP is generated on both sides at one time based on shared counter, such as, HOTP. In most cases, one-way hash functions are used in both approaches to generate OTP. As resent researches show the weakness of the hash functions, we need new a new OTP generation algorithms to solve this problem. In this paper, we propose a method of creating one time password based on pseudorandom number generators (PRNG), which they are exist on many systems and programming languages as native.
基于您所知的身份验证方法是计算机系统中最经典的身份验证技术,它比其他方法执行起来更容易、更成功,即使它是一种容易受到窃听或重放攻击等攻击的方法。为了解决这个问题,使用了OTP(一次性密码)技术。OTP以两种方式从一端传送到另一端。在第一种方法中,OTP是在服务器端生成的,然后通过SMS发送给客户端。在第二种方法中,基于共享计数器(如HOTP)在双方同时生成OTP。在大多数情况下,两种方法都使用单向散列函数来生成OTP。由于现有的研究显示了哈希函数的弱点,我们需要新的OTP生成算法来解决这个问题。本文提出了一种基于伪随机数生成器(PRNG)的一次性密码生成方法。伪随机数生成器作为本机存在于许多系统和编程语言中。
{"title":"A Method of Efficient OTP Generation Using Pseudorandom Number Generators","authors":"Karimov Madjit Malikovich, Khudoykulov Zarif Turakulovich, Arzieva Jamila Tileubayevna","doi":"10.1109/ICISCT47635.2019.9011825","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011825","url":null,"abstract":"Something you know based authentication method is the most classical authentication technique on the computer system, and is performed more easily and successfully than other methods even it is a vulnerable method against attacks such as eavesdropping or replay attack. To solve this problem, OTP (Onetime Password) technique is used. OTP is delivered from one side to the other in two approaches. In the first approach, OTP is generated on server side and sent to clients, for example, by SMS. In the second approach, OTP is generated on both sides at one time based on shared counter, such as, HOTP. In most cases, one-way hash functions are used in both approaches to generate OTP. As resent researches show the weakness of the hash functions, we need new a new OTP generation algorithms to solve this problem. In this paper, we propose a method of creating one time password based on pseudorandom number generators (PRNG), which they are exist on many systems and programming languages as native.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"33 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121008059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2019 International Conference on Information Science and Communications Technologies (ICISCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1