Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146969
R. Nasimov, N. Nasimova, B. Muminov
Predicting the impact of different factors on the patient’s health is as important as diagnosing diseases, especially when monitoring patients with chronic diseases. To perform this by Artificial Intelligence (AI) methods, it is recommended to determine the features importance (FI) of data. There are a number of methods to evaluate FI. However, we can see a big variation in their results which is difficult to interpret. To solve this issue, we proposed new method which aim is minimizing the differences. Furthermore, to demonstrate the effectiveness of the proposed method we used the extracted FIs as weights of the weighted KNN and compared performances.
{"title":"Hybrid Method for Evaluating Feature Importance for Predicting Chronic Heart Diseases","authors":"R. Nasimov, N. Nasimova, B. Muminov","doi":"10.1109/ICISCT55600.2022.10146969","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146969","url":null,"abstract":"Predicting the impact of different factors on the patient’s health is as important as diagnosing diseases, especially when monitoring patients with chronic diseases. To perform this by Artificial Intelligence (AI) methods, it is recommended to determine the features importance (FI) of data. There are a number of methods to evaluate FI. However, we can see a big variation in their results which is difficult to interpret. To solve this issue, we proposed new method which aim is minimizing the differences. Furthermore, to demonstrate the effectiveness of the proposed method we used the extracted FIs as weights of the weighted KNN and compared performances.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125985710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146809
M. Umarov, Jamshid Elov, Sirojiddin Khalilov, Inomjon Narzullayev, Marat Karimov
In the lighting conditions such as snowing, hazing, raining, and weak lighting condition, the accuracy of traffic sign recognition is not very high. It is important to develop an algorithms for real-time fast detection of road signs from video images and use them in driver assistance systems. Firstly, we image preprocessing by using dark channel prior based image dehazing for remove noises from the input image. In this article, we develop a transposed image filtering method combined with other fast parallel filtering algorithms. We propose a high-speed and high-accuracy method by improving image dehazing algorithms and analyzing GPU architecture. In this, we quickly removing fog from HD video images using DCP with image quality and visual effects.
{"title":"An algorithm for parallel processing of traffic signs video on a graphics processor","authors":"M. Umarov, Jamshid Elov, Sirojiddin Khalilov, Inomjon Narzullayev, Marat Karimov","doi":"10.1109/ICISCT55600.2022.10146809","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146809","url":null,"abstract":"In the lighting conditions such as snowing, hazing, raining, and weak lighting condition, the accuracy of traffic sign recognition is not very high. It is important to develop an algorithms for real-time fast detection of road signs from video images and use them in driver assistance systems. Firstly, we image preprocessing by using dark channel prior based image dehazing for remove noises from the input image. In this article, we develop a transposed image filtering method combined with other fast parallel filtering algorithms. We propose a high-speed and high-accuracy method by improving image dehazing algorithms and analyzing GPU architecture. In this, we quickly removing fog from HD video images using DCP with image quality and visual effects.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"14 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146850
Komil Rakhmatov, Kh. B. Mirzokulov
In this paper, we consider the problem of synthesizing a test signal from a given autocorrelation function. A formula for the energy spectrum is obtained. The method for synthesizing binary pulse processes proposed in this work makes it possible to simulate signals whose energy spectrum envelopes are close to the envelopes of the continuous part of the energy spectra of an equivalent first-order test sequence. The algorithm used in the calculations and the value of the parameter $lambda$ for the obtained pulse process are given. The problem of synthesizing pulse processes in this formulation is close to the problem of synthesizing quantum phase-shift keyed signals, usually used in radar, according to a given autocorrelation function.
{"title":"Synthesis of a test signal from a given autocorrelation function","authors":"Komil Rakhmatov, Kh. B. Mirzokulov","doi":"10.1109/ICISCT55600.2022.10146850","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146850","url":null,"abstract":"In this paper, we consider the problem of synthesizing a test signal from a given autocorrelation function. A formula for the energy spectrum is obtained. The method for synthesizing binary pulse processes proposed in this work makes it possible to simulate signals whose energy spectrum envelopes are close to the envelopes of the continuous part of the energy spectra of an equivalent first-order test sequence. The algorithm used in the calculations and the value of the parameter $lambda$ for the obtained pulse process are given. The problem of synthesizing pulse processes in this formulation is close to the problem of synthesizing quantum phase-shift keyed signals, usually used in radar, according to a given autocorrelation function.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146743
A. Fayziev, A. Turgunov, Khusniddin Mamadaliev, Salohiddin Nasridinov
Observations on some phenomenon, the nature of which changes over time, generates an ordered sequence, which is called a time series. The article, using the method of statistical analysis of time series, studied the statistical regularity of the series of dynamics $left(bar{y}_tright)$-average potato yield in the Republic of Uzbekistan (based on the materials of the CSO of the Republic of Uzbekistan for 1991-2018). Point and interval estimates for the average potato yield in the Republic were constructed with a 95 procent guarantee, explicit types of trends have also been determined as well as the yield in the Republic was predicted for subsequent years. Using the Durbin-Watson statistical criteria, it was determined that the average potato yield in the region has an autocorrelation dependence, i.e. Confirmed that the yield of potatoes in the Republic this year depends on the yield of past years.
{"title":"Statistical analysis and forecasting of potato yield dynamics in the Republic of Uzbekistan","authors":"A. Fayziev, A. Turgunov, Khusniddin Mamadaliev, Salohiddin Nasridinov","doi":"10.1109/ICISCT55600.2022.10146743","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146743","url":null,"abstract":"Observations on some phenomenon, the nature of which changes over time, generates an ordered sequence, which is called a time series. The article, using the method of statistical analysis of time series, studied the statistical regularity of the series of dynamics $left(bar{y}_tright)$-average potato yield in the Republic of Uzbekistan (based on the materials of the CSO of the Republic of Uzbekistan for 1991-2018). Point and interval estimates for the average potato yield in the Republic were constructed with a 95 procent guarantee, explicit types of trends have also been determined as well as the yield in the Republic was predicted for subsequent years. Using the Durbin-Watson statistical criteria, it was determined that the average potato yield in the region has an autocorrelation dependence, i.e. Confirmed that the yield of potatoes in the Republic this year depends on the yield of past years.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127704846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146830
E. Reypnazarov, Halim Khujamatov, D. Khasanov, Z. Allamuratova
This paper presents the threshold value determination model, its implementation algorithm, and the characteristics of the threshold value depending on the probability of false signal detection, developed for the purpose of researching the method of energy determination in spectrum sensing in cognitive radio networks. Also, the main methods of single-band spectrum sensing in cognitive radio networks were initially studied in the article, and the main spectrum detection algorithms were comparatively analyzed.
{"title":"Research of Energy Detection Method in Spectrum Sensing in Cognitive Radio Networks","authors":"E. Reypnazarov, Halim Khujamatov, D. Khasanov, Z. Allamuratova","doi":"10.1109/ICISCT55600.2022.10146830","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146830","url":null,"abstract":"This paper presents the threshold value determination model, its implementation algorithm, and the characteristics of the threshold value depending on the probability of false signal detection, developed for the purpose of researching the method of energy determination in spectrum sensing in cognitive radio networks. Also, the main methods of single-band spectrum sensing in cognitive radio networks were initially studied in the article, and the main spectrum detection algorithms were comparatively analyzed.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132832339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146864
Bayram Fayzullaev
In this article liquid-gas on the example of the calcinated soda is considered as the solution of a problem of phase balance. The analytical method is used for the solution of an objective. Results which are calculated with the help the program Matlab 7.5 (R2007b) are given in a table form. The activity coefficient for an important component in the calcinated soda production of carbon dioxide is calculated. Concentration of gas for each component of production admissible pressure are given in a graphic form.
{"title":"Mathematical Modeling of Liquid-Gas Phase Equilibrium on the Example of Soda Production","authors":"Bayram Fayzullaev","doi":"10.1109/ICISCT55600.2022.10146864","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146864","url":null,"abstract":"In this article liquid-gas on the example of the calcinated soda is considered as the solution of a problem of phase balance. The analytical method is used for the solution of an objective. Results which are calculated with the help the program Matlab 7.5 (R2007b) are given in a table form. The activity coefficient for an important component in the calcinated soda production of carbon dioxide is calculated. Concentration of gas for each component of production admissible pressure are given in a graphic form.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146757
Sh. N. Usmonov, Umida Asatova, A. Akhmedov
By the method of liquid-phase epitaxy, narrow-gap layers of solid solutions of indium antimonide molecular substitution were grown from a limited volume of indium solution - melt. The layers were grown on GaAs (100) and GaP (111) substrates.It is shown that the binary compound of indium antimonide in an indium solution at temperatures of 350-220°C does not dissociate into individual In and Sb atoms, but is mainly in the form of InSb molecules. The photosensitivity of nGaAs-p$(InSb)_{1-z}(Sn_{2})_{1-z}$ and nGaP-p$(InSb)_{1-z}(Sn_{2})_{z}$ structures have been studied.An anomalous temperature dependence of the current-voltage characteristic of the nGaP-p$(InSb)_{1-z}(Sn_{2})_{z}$ structure was found. The results are explained on the basis of a model that takes into account the possibility of the formation of defects and defect-impurity complexes of the “vacancy + recombination impurity center” type with increasing temperature.
{"title":"Features of Liquid–Phase Epitaxy of (InSb)1–z(Sn2)z Solid Solutions of Molecular Substitution on GaAs and GaP Substrates","authors":"Sh. N. Usmonov, Umida Asatova, A. Akhmedov","doi":"10.1109/ICISCT55600.2022.10146757","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146757","url":null,"abstract":"By the method of liquid-phase epitaxy, narrow-gap layers of solid solutions of indium antimonide molecular substitution were grown from a limited volume of indium solution - melt. The layers were grown on GaAs (100) and GaP (111) substrates.It is shown that the binary compound of indium antimonide in an indium solution at temperatures of 350-220°C does not dissociate into individual In and Sb atoms, but is mainly in the form of InSb molecules. The photosensitivity of nGaAs-p$(InSb)_{1-z}(Sn_{2})_{1-z}$ and nGaP-p$(InSb)_{1-z}(Sn_{2})_{z}$ structures have been studied.An anomalous temperature dependence of the current-voltage characteristic of the nGaP-p$(InSb)_{1-z}(Sn_{2})_{z}$ structure was found. The results are explained on the basis of a model that takes into account the possibility of the formation of defects and defect-impurity complexes of the “vacancy + recombination impurity center” type with increasing temperature.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130138692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146946
Halim Khujamatov, A. Lazarev, Nurshod Akhmedov, Nurbek Asenbaev, Aybek Bekturdiev
This article provides an overview of the security of VANET, which is a vehicle network. When reviewing this topic, publications of various researchers were considered. The article provides information security requirements for VANET, an overview of security research, an overview of existing attacks, methods for detecting attacks and appropriate countermeasures against such threats.
{"title":"Overview Of Vanet Network Security","authors":"Halim Khujamatov, A. Lazarev, Nurshod Akhmedov, Nurbek Asenbaev, Aybek Bekturdiev","doi":"10.1109/ICISCT55600.2022.10146946","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146946","url":null,"abstract":"This article provides an overview of the security of VANET, which is a vehicle network. When reviewing this topic, publications of various researchers were considered. The article provides information security requirements for VANET, an overview of security research, an overview of existing attacks, methods for detecting attacks and appropriate countermeasures against such threats.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130723222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10147005
Tserenpurev Chuluunsaikhan, Jong-Hyeok Choi, A. Nasridinov
Applications of real-time video surveillance are contributing to traffic management and public safety. One example is analyzing crowd behavior and responding immediately to violations, such as assault, fighting, and child abuse. However, monitoring real-time video surveillance continuously is arduous work, and there is a high chance of missed violations. This paper proposes an application for detecting child abuse using deep learning methods. The combination of real-time video surveillance and deep learning can contribute to avoiding child abuse and responding on time.
{"title":"Application for Detecting Child Abuse via Real-Time Video Surveillance","authors":"Tserenpurev Chuluunsaikhan, Jong-Hyeok Choi, A. Nasridinov","doi":"10.1109/ICISCT55600.2022.10147005","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10147005","url":null,"abstract":"Applications of real-time video surveillance are contributing to traffic management and public safety. One example is analyzing crowd behavior and responding immediately to violations, such as assault, fighting, and child abuse. However, monitoring real-time video surveillance continuously is arduous work, and there is a high chance of missed violations. This paper proposes an application for detecting child abuse using deep learning methods. The combination of real-time video surveillance and deep learning can contribute to avoiding child abuse and responding on time.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"33 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132025121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146815
K. Tashev, Irgasheva Durdona, Agzamova Mokhinabonu
Nowadays the Internet is very massive and the need for a system to protect the networks from being attacked becomes very important. One of the main goals of studying pattern matching techniques is their significant role in real-world applications, such as the intrusion detection systems branch. The purpose of the network attack detection systems NIDS is to protect the info communication network from unauthorized access. This article provides an analysis of the exact match and fuzzy matching methods, and discusses a new implementation of the classic Aho-Corasick pattern matching algorithm at the hardware level. The proposed approach to the implementation of the Aho-Corasick algorithm can make it possible to ensure the efficient use of resources, such as memory and energy.
{"title":"Comparative performance analysis the Aho-Corasick algorithm for developing a network detection system","authors":"K. Tashev, Irgasheva Durdona, Agzamova Mokhinabonu","doi":"10.1109/ICISCT55600.2022.10146815","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146815","url":null,"abstract":"Nowadays the Internet is very massive and the need for a system to protect the networks from being attacked becomes very important. One of the main goals of studying pattern matching techniques is their significant role in real-world applications, such as the intrusion detection systems branch. The purpose of the network attack detection systems NIDS is to protect the info communication network from unauthorized access. This article provides an analysis of the exact match and fuzzy matching methods, and discusses a new implementation of the classic Aho-Corasick pattern matching algorithm at the hardware level. The proposed approach to the implementation of the Aho-Corasick algorithm can make it possible to ensure the efficient use of resources, such as memory and energy.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130671895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}