Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146887
S. Fazilov, O. R. Yusupov, Kh.S. Abdiyeva
Image contrast, area ratio, entropy, pupil dilation measure, occlusion measure, the ratio of iris and pupil measurements, iris image processing area measurement, and eccentric distance measurements in iris image biometric identification factors affect the quality of the iris image field. This work explored the issue of quality assessment of the characteristics describing the image of the iris provided for person recognition for this purpose. A calculation of the parameters determining the quality of the eye’s iris is offered. An algorithm for evaluating the quality of the iris by reducing the parameters describing the quality of the iris to a single parameter through Principal component analysis has been developed. Recommendations for the application of biometric technologies are presented.
{"title":"An Algorithm for Evaluating the Parameters Characterizing the Quality of the Image Field of the Iris by the Principal component analysis method","authors":"S. Fazilov, O. R. Yusupov, Kh.S. Abdiyeva","doi":"10.1109/ICISCT55600.2022.10146887","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146887","url":null,"abstract":"Image contrast, area ratio, entropy, pupil dilation measure, occlusion measure, the ratio of iris and pupil measurements, iris image processing area measurement, and eccentric distance measurements in iris image biometric identification factors affect the quality of the iris image field. This work explored the issue of quality assessment of the characteristics describing the image of the iris provided for person recognition for this purpose. A calculation of the parameters determining the quality of the eye’s iris is offered. An algorithm for evaluating the quality of the iris by reducing the parameters describing the quality of the iris to a single parameter through Principal component analysis has been developed. Recommendations for the application of biometric technologies are presented.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128462972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146952
I. Normatov, Inomjon Yarashov, Alisher Otakhonov, Bobur Ergashev
Currently, the development of information technology and digitalization is conducting various scientific and theoretical studies to increase the convenience of systems as much as possible. At the same time, it is focused on reducing errors in the work of system participants and security managers. In this way, modernization and/or improvement of system capabilities has been implemented. In this method, an algorithmic model of permission management of users of the ecological situation monitoring system based on the Functioning table is proposed. In the part of the reliable grouping of the algorithmic model, it is necessary to dynamically distribute the tasks of the participants in the facility based on the characteristics of the monitoring wells and the location of the monitoring wells depending on the type of system participants. For this purpose, the invariants are considered in the circle plane by improving the method, and the criteria considered important in task allocation are selected and analyzed.
{"title":"Construction of reliable well distribution functions based on the principle of invariance for convenient user access control","authors":"I. Normatov, Inomjon Yarashov, Alisher Otakhonov, Bobur Ergashev","doi":"10.1109/ICISCT55600.2022.10146952","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146952","url":null,"abstract":"Currently, the development of information technology and digitalization is conducting various scientific and theoretical studies to increase the convenience of systems as much as possible. At the same time, it is focused on reducing errors in the work of system participants and security managers. In this way, modernization and/or improvement of system capabilities has been implemented. In this method, an algorithmic model of permission management of users of the ecological situation monitoring system based on the Functioning table is proposed. In the part of the reliable grouping of the algorithmic model, it is necessary to dynamically distribute the tasks of the participants in the facility based on the characteristics of the monitoring wells and the location of the monitoring wells depending on the type of system participants. For this purpose, the invariants are considered in the circle plane by improving the method, and the criteria considered important in task allocation are selected and analyzed.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146988
Jamshid Khoshimov, N. Usmanova, Halim Khujamatov, Nurshod Akhmedov
In recent years, artificial intelligence has been introduced into more and more areas and used for various purposes that are impossible for an ordinary person. One of the applications of artificial intelligence is the task of face recognition, which is used at airports, train stations and other crowded places. However, face recognition requires huge computing resources. In this article, we demonstrated the process of face recognition in a machine with minimal computing resources and showed the possibility of performing the task on fog servers.
{"title":"Development of face detection system based on Fog computing","authors":"Jamshid Khoshimov, N. Usmanova, Halim Khujamatov, Nurshod Akhmedov","doi":"10.1109/ICISCT55600.2022.10146988","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146988","url":null,"abstract":"In recent years, artificial intelligence has been introduced into more and more areas and used for various purposes that are impossible for an ordinary person. One of the applications of artificial intelligence is the task of face recognition, which is used at airports, train stations and other crowded places. However, face recognition requires huge computing resources. In this article, we demonstrated the process of face recognition in a machine with minimal computing resources and showed the possibility of performing the task on fog servers.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146987
Shuhratjon Toshmatov, Inomjon Yarashov, Alisher Otakhonov, Avazbek Ismatillayev
In today’s world of information technology, information security is an important issue. In addressing information security issues, identification of attacks on the system, search for countermeasures to eliminate them, analysis of the causes of attacks, algorithmic review and algorithmization are carried out.Attacks were taken as an example in the analysis of attacks. Issues such as traffic changes and packet overload are investigated in the origin of attacks. Processes can be fully described through algorithmization in research. Identifying a specific set of information security threats by analyzing Functioning tables for algorithmic models and synthesizing and verifying incoming and outgoing data in their different versions allows any complex protection to be achieved through algorithmic descriptions. This is especially noteworthy.The diversity of system blocks means their ability to grow automatically to increase data size and provide redundant data protection. Therefore, additional safety precautions should be taken, as this article discusses the use of certain types of Functioning tables.
{"title":"Designing an algorithmic formalization of threat actions based on a Functioning table","authors":"Shuhratjon Toshmatov, Inomjon Yarashov, Alisher Otakhonov, Avazbek Ismatillayev","doi":"10.1109/ICISCT55600.2022.10146987","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146987","url":null,"abstract":"In today’s world of information technology, information security is an important issue. In addressing information security issues, identification of attacks on the system, search for countermeasures to eliminate them, analysis of the causes of attacks, algorithmic review and algorithmization are carried out.Attacks were taken as an example in the analysis of attacks. Issues such as traffic changes and packet overload are investigated in the origin of attacks. Processes can be fully described through algorithmization in research. Identifying a specific set of information security threats by analyzing Functioning tables for algorithmic models and synthesizing and verifying incoming and outgoing data in their different versions allows any complex protection to be achieved through algorithmic descriptions. This is especially noteworthy.The diversity of system blocks means their ability to grow automatically to increase data size and provide redundant data protection. Therefore, additional safety precautions should be taken, as this article discusses the use of certain types of Functioning tables.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114599037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper considers the issues and the functionality mechanism of Port-knocking in computer networks. The scheme of a dynamic Port-knocking based on authentication and buffer information is proposed. Based on the proposed dynamic port knocking scheme, a flowchart of dynamic Port-knocking algorithm is proposed, which improves the detection of ports by using a sequence of knocks of various lengths.
{"title":"Port-Knocking Method For Enhancing Network Security","authors":"Gulomov Sherzod Rajaboevich, Mirzaeva Malika Bakhadirovna, Iminov Abdurasul Abdulatipovich","doi":"10.1109/ICISCT55600.2022.10146918","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146918","url":null,"abstract":"This paper considers the issues and the functionality mechanism of Port-knocking in computer networks. The scheme of a dynamic Port-knocking based on authentication and buffer information is proposed. Based on the proposed dynamic port knocking scheme, a flowchart of dynamic Port-knocking algorithm is proposed, which improves the detection of ports by using a sequence of knocks of various lengths.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117312568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10147013
Anvar Kadirov, Abdunosir Nigmanov, Halim Khujamatov
The article considers proposals to modernize the Hata models as applied to rural areas. It is proposed to take into account in the calculations the hilly terrain and the slope of the terrain.
本文考虑了在农村地区应用Hata模式实现现代化的建议。建议在计算时考虑丘陵地形和地形坡度。
{"title":"On the Use of the ITU-R P.1546 Model in Calculations of Mobile Coverage Areas","authors":"Anvar Kadirov, Abdunosir Nigmanov, Halim Khujamatov","doi":"10.1109/ICISCT55600.2022.10147013","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10147013","url":null,"abstract":"The article considers proposals to modernize the Hata models as applied to rural areas. It is proposed to take into account in the calculations the hilly terrain and the slope of the terrain.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115472059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes the issues of SDN security problems and solutions analysis, the scheme of functioning of the orchestrator as well. Moreover, the method for implementing traffic filtering in SDN networks is proposed. The proposed method is allowed to inspect network traffic flows, simplify security management and apply the necessary packet filtering policy to prevent unwanted content in SDN networks.
{"title":"Method for implementing traffic filtering in SDN networks","authors":"Gulomov Sherzod Rajaboevich, Kadirov Mir-Xusan Mirpulatovich, Arzieva Jamila Tileubaevna","doi":"10.1109/ICISCT55600.2022.10146873","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146873","url":null,"abstract":"This paper describes the issues of SDN security problems and solutions analysis, the scheme of functioning of the orchestrator as well. Moreover, the method for implementing traffic filtering in SDN networks is proposed. The proposed method is allowed to inspect network traffic flows, simplify security management and apply the necessary packet filtering policy to prevent unwanted content in SDN networks.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115507163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper considers the problems of developing intelligent algorithms for interpreting images of a remote image of the earth, since the automatic interpretation of these images becomes relevant. In this context, reference datasets serve as important prerequisites for developing and testing intelligent interpretation algorithms. The paper discusses the problem of how to efficiently prepare a suitable reference dataset for the interpretation of remote sensing images. The paper discusses the problem of classification of remote sensing images using the Convolutional Neural Network.
{"title":"Development of Intelligent Algorithms for Interpretation of Images of the Remote Image of the Earth","authors":"Muhamediyeva Dilnoz Tulkinovna, Tukhtamuradov Nozir","doi":"10.1109/ICISCT55600.2022.10146861","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146861","url":null,"abstract":"The paper considers the problems of developing intelligent algorithms for interpreting images of a remote image of the earth, since the automatic interpretation of these images becomes relevant. In this context, reference datasets serve as important prerequisites for developing and testing intelligent interpretation algorithms. The paper discusses the problem of how to efficiently prepare a suitable reference dataset for the interpretation of remote sensing images. The paper discusses the problem of classification of remote sensing images using the Convolutional Neural Network.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122749795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146962
Madaminov Uktam Ataxanovich
The main content of this scientific article is the use of new technologies for teaching web programming in higher education organizations, the analysis of the methods available today, the study and improvement of the method that is convenient for the higher education system. In addition, the methods of obtaining high-quality results by developing and implementing large-scale web applications by teaching web programming based on new technologies are explained in detail.
{"title":"Methods of teaching and improving web programming in higher education organizations","authors":"Madaminov Uktam Ataxanovich","doi":"10.1109/ICISCT55600.2022.10146962","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146962","url":null,"abstract":"The main content of this scientific article is the use of new technologies for teaching web programming in higher education organizations, the analysis of the methods available today, the study and improvement of the method that is convenient for the higher education system. In addition, the methods of obtaining high-quality results by developing and implementing large-scale web applications by teaching web programming based on new technologies are explained in detail.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146747
Salimjon O. Mahmudov, D. Temirova
This paper discusses the issues of models, tools and rankings in the subject area of smart cities, which served as the basis for the Smart City standardization. Familiarity with these issues allows you to assess and understand the origins and state of standardization in this area, which covers various aspects of the design, organization and functioning of a smart city. As a result, the article ends with the introduction of standards related to smart city information and communication technologies. The main interpretations of the concept of “smart city” are considered, the key current international and national standards are described, and the main problems of urban digitalization in Uzbekistan are described.
{"title":"Smart Cities: Concepts, Standarts, Frameworks, Models, Technologies","authors":"Salimjon O. Mahmudov, D. Temirova","doi":"10.1109/ICISCT55600.2022.10146747","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146747","url":null,"abstract":"This paper discusses the issues of models, tools and rankings in the subject area of smart cities, which served as the basis for the Smart City standardization. Familiarity with these issues allows you to assess and understand the origins and state of standardization in this area, which covers various aspects of the design, organization and functioning of a smart city. As a result, the article ends with the introduction of standards related to smart city information and communication technologies. The main interpretations of the concept of “smart city” are considered, the key current international and national standards are described, and the main problems of urban digitalization in Uzbekistan are described.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126266454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}