Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9012047
A. Zhdanov, V. I. Borisov, L. Dorosinsky
In modern radiology treatment workflow, verification is a critical process for determining the validity of specific treatment planning. In this article, we verified a treatment plan by modeling of dose delivery by shifting MLC angel and phantom position. The study result shows that any error during the verification process such as an error in the MLC angle or the phantom positioning may lead to different passing rate and refuse a plan, which it is correct originally.
{"title":"IMRT Verification, Analysis and Performance Evaluations: Modeling of Dose Delivery by Shifting MLC Angel and Phantom Position","authors":"A. Zhdanov, V. I. Borisov, L. Dorosinsky","doi":"10.1109/ICISCT47635.2019.9012047","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9012047","url":null,"abstract":"In modern radiology treatment workflow, verification is a critical process for determining the validity of specific treatment planning. In this article, we verified a treatment plan by modeling of dose delivery by shifting MLC angel and phantom position. The study result shows that any error during the verification process such as an error in the MLC angle or the phantom positioning may lead to different passing rate and refuse a plan, which it is correct originally.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122641466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of color in image processing is due to two main reasons. Firstly, color is an important feature that often facilitates recognition and selection of an object in an image. Secondly, a person is able to distinguish between thousands of different shades of color and only about two dozen shades of gray. The second circumstance is especially important when visual (that is, performed directly by man) image analysis.Processing of color images can divided into two main areas: image processing in natural colors and image processing in pseudo-colors. In the first case, the images in question are usually formed by color image recording devices, such as a color television camera or a color scanner. In the second case, the task is to assign colors to some intensity values of a monochrome signal or to some ranges of changes in its intensity. Until relatively recently, digital processing of color images was carried out mostly at the level of pseudo colors. Over the past decade, however, color input devices and color image processing hardware have become quite affordable. As a result, natural image processing technology currently used in a wide range of applications, including publishing systems, visualization systems, and the Internet. It will be clear from the subsequent discussions that some halftone processing techniques developed in previous chapters are directly applicable to color images. Other methods should be reformulated and consistent with the properties of the color space, which constructed later in this chapter. The methods described in this chapter are far from exhaustive; they illustrate a variety of techniques applicable to color image processing.
{"title":"Processing Color Images, Brightness and Color Conversion","authors":"Beknazarova Saida Safibullaevna, Mukhamadiyev Abduvali Shukurovich, Jaumitbayeva Mehriban Karamtdin kizi","doi":"10.1109/ICISCT47635.2019.9012040","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9012040","url":null,"abstract":"The use of color in image processing is due to two main reasons. Firstly, color is an important feature that often facilitates recognition and selection of an object in an image. Secondly, a person is able to distinguish between thousands of different shades of color and only about two dozen shades of gray. The second circumstance is especially important when visual (that is, performed directly by man) image analysis.Processing of color images can divided into two main areas: image processing in natural colors and image processing in pseudo-colors. In the first case, the images in question are usually formed by color image recording devices, such as a color television camera or a color scanner. In the second case, the task is to assign colors to some intensity values of a monochrome signal or to some ranges of changes in its intensity. Until relatively recently, digital processing of color images was carried out mostly at the level of pseudo colors. Over the past decade, however, color input devices and color image processing hardware have become quite affordable. As a result, natural image processing technology currently used in a wide range of applications, including publishing systems, visualization systems, and the Internet. It will be clear from the subsequent discussions that some halftone processing techniques developed in previous chapters are directly applicable to color images. Other methods should be reformulated and consistent with the properties of the color space, which constructed later in this chapter. The methods described in this chapter are far from exhaustive; they illustrate a variety of techniques applicable to color image processing.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011887
O. Ruzibaev, R. Kabulov, Sherzod Sayfullaev
This article is devoted pressing question of the interval analysis, definition of relations of an order between intervals. Interval relations are widely used at the decision of problems of optimization, decision-making and management in the conditions of interval uncertainty. In article, the concept of function of an estimation of interval relations of an order, and an axiom with which estimation function should satisfy is entered. Based on estimation, function it is entered relations of comparison and its equivalence to the usual relation of an order is proved
{"title":"The Axiomatic Approach to Definition of Interval Relations","authors":"O. Ruzibaev, R. Kabulov, Sherzod Sayfullaev","doi":"10.1109/ICISCT47635.2019.9011887","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011887","url":null,"abstract":"This article is devoted pressing question of the interval analysis, definition of relations of an order between intervals. Interval relations are widely used at the decision of problems of optimization, decision-making and management in the conditions of interval uncertainty. In article, the concept of function of an estimation of interval relations of an order, and an axiom with which estimation function should satisfy is entered. Based on estimation, function it is entered relations of comparison and its equivalence to the usual relation of an order is proved","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130369915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011921
S. Pozilova
The article devoted to the methodology for the development of creative learning of higher educational institutions' teachers in advanced training courses and retraining of pedagogical staff in the areas of computer science, mathematics and physics. The course “Innovative educational technologies” includes concepts as creativity, creative learning, organizational and pedagogical conditions of creative learning, and stages of development of creativity of pedagogical staff.
{"title":"Development Of Creativity Of Learners In The Courses Of Advanced Training And Retraining Of Pedagogical Staff In The Process Of Studying The Course \"Innovative Educational Technology\"","authors":"S. Pozilova","doi":"10.1109/ICISCT47635.2019.9011921","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011921","url":null,"abstract":"The article devoted to the methodology for the development of creative learning of higher educational institutions' teachers in advanced training courses and retraining of pedagogical staff in the areas of computer science, mathematics and physics. The course “Innovative educational technologies” includes concepts as creativity, creative learning, organizational and pedagogical conditions of creative learning, and stages of development of creativity of pedagogical staff.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011901
Yusupov Bakhodir Karamatovich, Toshev Sarvar Norboboevich, Nishanov Islom Ibrohimovich
In this paper an approach to the verification of filtering rules is proposed, designed to detect and resolve the anomaly of filtration in the specifications of the computer network security policy. The approach is based on the method of verification on the model. The models of computer system, firewall and anomalies of filtration are considered, which serve for verification of filtering rules by this method. As well as algorithms for detecting such anomalies. A technique for verifying the rules for filtering security policies based on these models is proposed.
{"title":"Verification of the pocket filtering based on method of verification on the model","authors":"Yusupov Bakhodir Karamatovich, Toshev Sarvar Norboboevich, Nishanov Islom Ibrohimovich","doi":"10.1109/ICISCT47635.2019.9011901","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011901","url":null,"abstract":"In this paper an approach to the verification of filtering rules is proposed, designed to detect and resolve the anomaly of filtration in the specifications of the computer network security policy. The approach is based on the method of verification on the model. The models of computer system, firewall and anomalies of filtration are considered, which serve for verification of filtering rules by this method. As well as algorithms for detecting such anomalies. A technique for verifying the rules for filtering security policies based on these models is proposed.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125905505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011939
Ahmedova Oydin Pulatovna, Mardiyev Ulugbek Rasulovich, Karimov Abduqodir Abdisalomovich
this article describes a new method for distributing secret encryption keys, in which processes use algebra with a parameter, the secrecy of which provides increased durability of the key.
{"title":"A new way to distribute secret encryption keys","authors":"Ahmedova Oydin Pulatovna, Mardiyev Ulugbek Rasulovich, Karimov Abduqodir Abdisalomovich","doi":"10.1109/ICISCT47635.2019.9011939","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011939","url":null,"abstract":"this article describes a new method for distributing secret encryption keys, in which processes use algebra with a parameter, the secrecy of which provides increased durability of the key.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011882
A. Sterenharz, Radjabov Ozod Sattorivich, Avezova Mohigul Rustamovna
Investors which wish to enclose the means first of all analyze not only object of investment, but both an investment climate of the country and development degree of the branch. Uzbekistan possesses huge investment potential. For years of independence thanks to realization of deeply thought over and purposeful program of economic reforming and country modernization high rates of economic growth is provided in Uzbekistan. For the first quarter of current year the gain of a total internal product has made 7.6 percent, volumes of manufacture of an industrial output -6.2 percent, including consumer goods -10.3 percent, services -12.6 percent. The state budget is executed with proficiency at a rate of more than 0.3 % to a total internal product. The rate of inflation has not exceeded expected parameters.Taken measures on the world supports and to stimulation of activity the enterprise -the exporter and to competitiveness increase domestic production on sale foreign markets have provided growth of volumes of export on 28.5 % and considerable positive balance of the foreign trade turnover.
{"title":"Estimating of National Economy’s Investment Attraction","authors":"A. Sterenharz, Radjabov Ozod Sattorivich, Avezova Mohigul Rustamovna","doi":"10.1109/ICISCT47635.2019.9011882","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011882","url":null,"abstract":"Investors which wish to enclose the means first of all analyze not only object of investment, but both an investment climate of the country and development degree of the branch. Uzbekistan possesses huge investment potential. For years of independence thanks to realization of deeply thought over and purposeful program of economic reforming and country modernization high rates of economic growth is provided in Uzbekistan. For the first quarter of current year the gain of a total internal product has made 7.6 percent, volumes of manufacture of an industrial output -6.2 percent, including consumer goods -10.3 percent, services -12.6 percent. The state budget is executed with proficiency at a rate of more than 0.3 % to a total internal product. The rate of inflation has not exceeded expected parameters.Taken measures on the world supports and to stimulation of activity the enterprise -the exporter and to competitiveness increase domestic production on sale foreign markets have provided growth of volumes of export on 28.5 % and considerable positive balance of the foreign trade turnover.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121311839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011986
Kholmatov Bakhtiyor, Hudayberdiev Mirzaakbar
In this paper, we consider an integration of information technology with biology, which made it possible for specialists to further explore the subject area. The objects of research are taken by the Insects Orthopteroidea of Uzbekistan. An information-identification software complex has been created for this kind and a systematic morphological analysis of information on taxa of a large number of samples of representatives of insects of orthopteroidea has been carried out.
{"title":"Formation Relational Structures of Dataset of the Insecta Orthopteroidea for Identification Models","authors":"Kholmatov Bakhtiyor, Hudayberdiev Mirzaakbar","doi":"10.1109/ICISCT47635.2019.9011986","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011986","url":null,"abstract":"In this paper, we consider an integration of information technology with biology, which made it possible for specialists to further explore the subject area. The objects of research are taken by the Insects Orthopteroidea of Uzbekistan. An information-identification software complex has been created for this kind and a systematic morphological analysis of information on taxa of a large number of samples of representatives of insects of orthopteroidea has been carried out.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122225362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9012013
M. Saidalieva, M. Hidirova
This paper deals with modeling the regulatory mechanisms of living systems to identify effective regulatory points during anomalies. Computational experiments show that at certain values of internal and external cellular conditions there are exist the following regimes: stationary state, auto-oscillations and chaotic behavior, “black hole” effect, “r-windows”. The results showed that in the anomaly areas (dynamic chaos and “black hole” area), the most optimal “treatment strategy” is the transition to the nearest “r-windows” of irregular oscillations or a sequential transition along the chain from “r-windows” to the region of limit cycles using minimization of irregularity levels and metabolic load.
{"title":"Quantitative analysis of the regulatory mechanisms of living systems to identify effective influence points during anomalies","authors":"M. Saidalieva, M. Hidirova","doi":"10.1109/ICISCT47635.2019.9012013","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9012013","url":null,"abstract":"This paper deals with modeling the regulatory mechanisms of living systems to identify effective regulatory points during anomalies. Computational experiments show that at certain values of internal and external cellular conditions there are exist the following regimes: stationary state, auto-oscillations and chaotic behavior, “black hole” effect, “r-windows”. The results showed that in the anomaly areas (dynamic chaos and “black hole” area), the most optimal “treatment strategy” is the transition to the nearest “r-windows” of irregular oscillations or a sequential transition along the chain from “r-windows” to the region of limit cycles using minimization of irregularity levels and metabolic load.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122370560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISCT47635.2019.9011821
Z. Abdullaev, Dildora Kendjaeva, Sanjar Xikmatullaev
This article discusses the role of the online form of education in today's conditions of informationalization of society, the importance of online education as one of the forms of basic and additional education is deduced, the role of the interaction of traditional professional education and its innovative online forms is shown. It also analyzes the advantages and disadvantages of the distance view of the educational process in comparison with the traditional education system, the potential difficulties and positive aspects of using online learning.
{"title":"Innovative approach of distance learning in the form of online courses","authors":"Z. Abdullaev, Dildora Kendjaeva, Sanjar Xikmatullaev","doi":"10.1109/ICISCT47635.2019.9011821","DOIUrl":"https://doi.org/10.1109/ICISCT47635.2019.9011821","url":null,"abstract":"This article discusses the role of the online form of education in today's conditions of informationalization of society, the importance of online education as one of the forms of basic and additional education is deduced, the role of the interaction of traditional professional education and its innovative online forms is shown. It also analyzes the advantages and disadvantages of the distance view of the educational process in comparison with the traditional education system, the potential difficulties and positive aspects of using online learning.","PeriodicalId":170576,"journal":{"name":"2019 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122818191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}