首页 > 最新文献

2022 International Conference on Information Science and Communications Technologies (ICISCT)最新文献

英文 中文
An Algorithm for Evaluating the Parameters Characterizing the Quality of the Image Field of the Iris by the Principal component analysis method 用主成分分析法评价表征虹膜像场质量的参数
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146887
S. Fazilov, O. R. Yusupov, Kh.S. Abdiyeva
Image contrast, area ratio, entropy, pupil dilation measure, occlusion measure, the ratio of iris and pupil measurements, iris image processing area measurement, and eccentric distance measurements in iris image biometric identification factors affect the quality of the iris image field. This work explored the issue of quality assessment of the characteristics describing the image of the iris provided for person recognition for this purpose. A calculation of the parameters determining the quality of the eye’s iris is offered. An algorithm for evaluating the quality of the iris by reducing the parameters describing the quality of the iris to a single parameter through Principal component analysis has been developed. Recommendations for the application of biometric technologies are presented.
虹膜图像生物特征识别中的图像对比度、面积比、熵、瞳孔扩张测度、遮挡测度、虹膜与瞳孔之比测度、虹膜图像处理面积测度、偏心距离测度等因素影响着虹膜图像场的质量。这项工作探讨了描述虹膜图像的特征的质量评估问题,为人类识别提供了这个目的。给出了决定虹膜质量的参数的计算方法。提出了一种通过主成分分析将描述虹膜质量的参数简化为单个参数的虹膜质量评价算法。对生物识别技术的应用提出了建议。
{"title":"An Algorithm for Evaluating the Parameters Characterizing the Quality of the Image Field of the Iris by the Principal component analysis method","authors":"S. Fazilov, O. R. Yusupov, Kh.S. Abdiyeva","doi":"10.1109/ICISCT55600.2022.10146887","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146887","url":null,"abstract":"Image contrast, area ratio, entropy, pupil dilation measure, occlusion measure, the ratio of iris and pupil measurements, iris image processing area measurement, and eccentric distance measurements in iris image biometric identification factors affect the quality of the iris image field. This work explored the issue of quality assessment of the characteristics describing the image of the iris provided for person recognition for this purpose. A calculation of the parameters determining the quality of the eye’s iris is offered. An algorithm for evaluating the quality of the iris by reducing the parameters describing the quality of the iris to a single parameter through Principal component analysis has been developed. Recommendations for the application of biometric technologies are presented.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128462972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Construction of reliable well distribution functions based on the principle of invariance for convenient user access control 基于不变性原理构建可靠的井分布函数,方便用户访问控制
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146952
I. Normatov, Inomjon Yarashov, Alisher Otakhonov, Bobur Ergashev
Currently, the development of information technology and digitalization is conducting various scientific and theoretical studies to increase the convenience of systems as much as possible. At the same time, it is focused on reducing errors in the work of system participants and security managers. In this way, modernization and/or improvement of system capabilities has been implemented. In this method, an algorithmic model of permission management of users of the ecological situation monitoring system based on the Functioning table is proposed. In the part of the reliable grouping of the algorithmic model, it is necessary to dynamically distribute the tasks of the participants in the facility based on the characteristics of the monitoring wells and the location of the monitoring wells depending on the type of system participants. For this purpose, the invariants are considered in the circle plane by improving the method, and the criteria considered important in task allocation are selected and analyzed.
目前,随着信息技术和数字化的发展,人们正在进行各种科学和理论研究,以尽可能地增加系统的便利性。同时,它的重点是减少系统参与者和安全管理人员工作中的错误。通过这种方式,实现了系统能力的现代化和/或改进。在此方法中,提出了一种基于功能表的生态态势监测系统用户权限管理算法模型。在算法模型的可靠分组部分,需要根据监测井的特点和监测井的位置,根据系统参与者的类型动态分配设施中参与者的任务。为此,通过改进方法,在圆平面上考虑不变量,选择并分析任务分配中认为重要的准则。
{"title":"Construction of reliable well distribution functions based on the principle of invariance for convenient user access control","authors":"I. Normatov, Inomjon Yarashov, Alisher Otakhonov, Bobur Ergashev","doi":"10.1109/ICISCT55600.2022.10146952","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146952","url":null,"abstract":"Currently, the development of information technology and digitalization is conducting various scientific and theoretical studies to increase the convenience of systems as much as possible. At the same time, it is focused on reducing errors in the work of system participants and security managers. In this way, modernization and/or improvement of system capabilities has been implemented. In this method, an algorithmic model of permission management of users of the ecological situation monitoring system based on the Functioning table is proposed. In the part of the reliable grouping of the algorithmic model, it is necessary to dynamically distribute the tasks of the participants in the facility based on the characteristics of the monitoring wells and the location of the monitoring wells depending on the type of system participants. For this purpose, the invariants are considered in the circle plane by improving the method, and the criteria considered important in task allocation are selected and analyzed.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of face detection system based on Fog computing 基于雾计算的人脸检测系统的开发
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146988
Jamshid Khoshimov, N. Usmanova, Halim Khujamatov, Nurshod Akhmedov
In recent years, artificial intelligence has been introduced into more and more areas and used for various purposes that are impossible for an ordinary person. One of the applications of artificial intelligence is the task of face recognition, which is used at airports, train stations and other crowded places. However, face recognition requires huge computing resources. In this article, we demonstrated the process of face recognition in a machine with minimal computing resources and showed the possibility of performing the task on fog servers.
近年来,人工智能被引入到越来越多的领域,并用于各种普通人不可能达到的目的。人工智能的应用之一是人脸识别任务,它被用于机场、火车站和其他拥挤的场所。然而,人脸识别需要大量的计算资源。在本文中,我们用最少的计算资源演示了在机器上进行人脸识别的过程,并展示了在雾服务器上执行任务的可能性。
{"title":"Development of face detection system based on Fog computing","authors":"Jamshid Khoshimov, N. Usmanova, Halim Khujamatov, Nurshod Akhmedov","doi":"10.1109/ICISCT55600.2022.10146988","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146988","url":null,"abstract":"In recent years, artificial intelligence has been introduced into more and more areas and used for various purposes that are impossible for an ordinary person. One of the applications of artificial intelligence is the task of face recognition, which is used at airports, train stations and other crowded places. However, face recognition requires huge computing resources. In this article, we demonstrated the process of face recognition in a machine with minimal computing resources and showed the possibility of performing the task on fog servers.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing an algorithmic formalization of threat actions based on a Functioning table 基于功能表设计威胁行为的算法形式化
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146987
Shuhratjon Toshmatov, Inomjon Yarashov, Alisher Otakhonov, Avazbek Ismatillayev
In today’s world of information technology, information security is an important issue. In addressing information security issues, identification of attacks on the system, search for countermeasures to eliminate them, analysis of the causes of attacks, algorithmic review and algorithmization are carried out.Attacks were taken as an example in the analysis of attacks. Issues such as traffic changes and packet overload are investigated in the origin of attacks. Processes can be fully described through algorithmization in research. Identifying a specific set of information security threats by analyzing Functioning tables for algorithmic models and synthesizing and verifying incoming and outgoing data in their different versions allows any complex protection to be achieved through algorithmic descriptions. This is especially noteworthy.The diversity of system blocks means their ability to grow automatically to increase data size and provide redundant data protection. Therefore, additional safety precautions should be taken, as this article discusses the use of certain types of Functioning tables.
在当今信息技术的世界里,信息安全是一个重要的问题。在解决信息安全问题时,识别对系统的攻击,寻找消除攻击的对策,分析攻击的原因,进行算法审查和算法化。在分析攻击时,以攻击为例。在攻击源中研究流量变化和数据包过载等问题。在研究中,过程可以通过算法来充分描述。通过分析算法模型的功能表,并综合和验证不同版本的传入和传出数据,从而识别一组特定的信息安全威胁,从而允许通过算法描述实现任何复杂的保护。这一点尤其值得注意。系统块的多样性意味着它们能够自动增长以增加数据大小并提供冗余数据保护。因此,在本文讨论某些类型的功能表的使用时,应该采取额外的安全预防措施。
{"title":"Designing an algorithmic formalization of threat actions based on a Functioning table","authors":"Shuhratjon Toshmatov, Inomjon Yarashov, Alisher Otakhonov, Avazbek Ismatillayev","doi":"10.1109/ICISCT55600.2022.10146987","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146987","url":null,"abstract":"In today’s world of information technology, information security is an important issue. In addressing information security issues, identification of attacks on the system, search for countermeasures to eliminate them, analysis of the causes of attacks, algorithmic review and algorithmization are carried out.Attacks were taken as an example in the analysis of attacks. Issues such as traffic changes and packet overload are investigated in the origin of attacks. Processes can be fully described through algorithmization in research. Identifying a specific set of information security threats by analyzing Functioning tables for algorithmic models and synthesizing and verifying incoming and outgoing data in their different versions allows any complex protection to be achieved through algorithmic descriptions. This is especially noteworthy.The diversity of system blocks means their ability to grow automatically to increase data size and provide redundant data protection. Therefore, additional safety precautions should be taken, as this article discusses the use of certain types of Functioning tables.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114599037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Port-Knocking Method For Enhancing Network Security 提高网络安全性的敲端口方法
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146918
Gulomov Sherzod Rajaboevich, Mirzaeva Malika Bakhadirovna, Iminov Abdurasul Abdulatipovich
This paper considers the issues and the functionality mechanism of Port-knocking in computer networks. The scheme of a dynamic Port-knocking based on authentication and buffer information is proposed. Based on the proposed dynamic port knocking scheme, a flowchart of dynamic Port-knocking algorithm is proposed, which improves the detection of ports by using a sequence of knocks of various lengths.
本文研究了计算机网络中端口敲门的问题及其实现机制。提出了一种基于认证和缓冲区信息的动态端口敲门方案。在提出的动态端口敲打方案的基础上,提出了动态端口敲打算法流程图,利用不同长度的敲打序列改进了端口的检测。
{"title":"Port-Knocking Method For Enhancing Network Security","authors":"Gulomov Sherzod Rajaboevich, Mirzaeva Malika Bakhadirovna, Iminov Abdurasul Abdulatipovich","doi":"10.1109/ICISCT55600.2022.10146918","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146918","url":null,"abstract":"This paper considers the issues and the functionality mechanism of Port-knocking in computer networks. The scheme of a dynamic Port-knocking based on authentication and buffer information is proposed. Based on the proposed dynamic port knocking scheme, a flowchart of dynamic Port-knocking algorithm is proposed, which improves the detection of ports by using a sequence of knocks of various lengths.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117312568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Use of the ITU-R P.1546 Model in Calculations of Mobile Coverage Areas 关于在移动覆盖区域计算中使用ITU-R P.1546模型
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10147013
Anvar Kadirov, Abdunosir Nigmanov, Halim Khujamatov
The article considers proposals to modernize the Hata models as applied to rural areas. It is proposed to take into account in the calculations the hilly terrain and the slope of the terrain.
本文考虑了在农村地区应用Hata模式实现现代化的建议。建议在计算时考虑丘陵地形和地形坡度。
{"title":"On the Use of the ITU-R P.1546 Model in Calculations of Mobile Coverage Areas","authors":"Anvar Kadirov, Abdunosir Nigmanov, Halim Khujamatov","doi":"10.1109/ICISCT55600.2022.10147013","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10147013","url":null,"abstract":"The article considers proposals to modernize the Hata models as applied to rural areas. It is proposed to take into account in the calculations the hilly terrain and the slope of the terrain.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115472059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method for implementing traffic filtering in SDN networks 在SDN网络中实现流量过滤的方法
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146873
Gulomov Sherzod Rajaboevich, Kadirov Mir-Xusan Mirpulatovich, Arzieva Jamila Tileubaevna
This paper describes the issues of SDN security problems and solutions analysis, the scheme of functioning of the orchestrator as well. Moreover, the method for implementing traffic filtering in SDN networks is proposed. The proposed method is allowed to inspect network traffic flows, simplify security management and apply the necessary packet filtering policy to prevent unwanted content in SDN networks.
本文介绍了SDN存在的安全问题及解决方案分析,并给出了编排器的功能方案。此外,还提出了在SDN网络中实现流量过滤的方法。该方法可以检测网络流量,简化安全管理,并应用必要的包过滤策略来防止SDN网络中不需要的内容。
{"title":"Method for implementing traffic filtering in SDN networks","authors":"Gulomov Sherzod Rajaboevich, Kadirov Mir-Xusan Mirpulatovich, Arzieva Jamila Tileubaevna","doi":"10.1109/ICISCT55600.2022.10146873","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146873","url":null,"abstract":"This paper describes the issues of SDN security problems and solutions analysis, the scheme of functioning of the orchestrator as well. Moreover, the method for implementing traffic filtering in SDN networks is proposed. The proposed method is allowed to inspect network traffic flows, simplify security management and apply the necessary packet filtering policy to prevent unwanted content in SDN networks.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115507163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Intelligent Algorithms for Interpretation of Images of the Remote Image of the Earth 地球遥感影像解译智能算法的发展
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146861
Muhamediyeva Dilnoz Tulkinovna, Tukhtamuradov Nozir
The paper considers the problems of developing intelligent algorithms for interpreting images of a remote image of the earth, since the automatic interpretation of these images becomes relevant. In this context, reference datasets serve as important prerequisites for developing and testing intelligent interpretation algorithms. The paper discusses the problem of how to efficiently prepare a suitable reference dataset for the interpretation of remote sensing images. The paper discusses the problem of classification of remote sensing images using the Convolutional Neural Network.
本文考虑了开发用于解释地球遥感图像的智能算法的问题,因为这些图像的自动解释变得相关。在这种情况下,参考数据集是开发和测试智能解释算法的重要先决条件。本文讨论了如何有效地为遥感影像解译准备合适的参考数据集的问题。本文讨论了基于卷积神经网络的遥感图像分类问题。
{"title":"Development of Intelligent Algorithms for Interpretation of Images of the Remote Image of the Earth","authors":"Muhamediyeva Dilnoz Tulkinovna, Tukhtamuradov Nozir","doi":"10.1109/ICISCT55600.2022.10146861","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146861","url":null,"abstract":"The paper considers the problems of developing intelligent algorithms for interpreting images of a remote image of the earth, since the automatic interpretation of these images becomes relevant. In this context, reference datasets serve as important prerequisites for developing and testing intelligent interpretation algorithms. The paper discusses the problem of how to efficiently prepare a suitable reference dataset for the interpretation of remote sensing images. The paper discusses the problem of classification of remote sensing images using the Convolutional Neural Network.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122749795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of teaching and improving web programming in higher education organizations 高等教育机构网络编程教学与改进方法
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146962
Madaminov Uktam Ataxanovich
The main content of this scientific article is the use of new technologies for teaching web programming in higher education organizations, the analysis of the methods available today, the study and improvement of the method that is convenient for the higher education system. In addition, the methods of obtaining high-quality results by developing and implementing large-scale web applications by teaching web programming based on new technologies are explained in detail.
本文的主要内容是利用新技术在高等教育机构进行web编程教学,分析目前可用的方法,研究和改进方便高等教育系统的方法。此外,还详细阐述了基于新技术的web编程教学中开发和实现大规模web应用程序以获得高质量结果的方法。
{"title":"Methods of teaching and improving web programming in higher education organizations","authors":"Madaminov Uktam Ataxanovich","doi":"10.1109/ICISCT55600.2022.10146962","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146962","url":null,"abstract":"The main content of this scientific article is the use of new technologies for teaching web programming in higher education organizations, the analysis of the methods available today, the study and improvement of the method that is convenient for the higher education system. In addition, the methods of obtaining high-quality results by developing and implementing large-scale web applications by teaching web programming based on new technologies are explained in detail.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Cities: Concepts, Standarts, Frameworks, Models, Technologies 智慧城市:概念、标准、框架、模型、技术
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146747
Salimjon O. Mahmudov, D. Temirova
This paper discusses the issues of models, tools and rankings in the subject area of smart cities, which served as the basis for the Smart City standardization. Familiarity with these issues allows you to assess and understand the origins and state of standardization in this area, which covers various aspects of the design, organization and functioning of a smart city. As a result, the article ends with the introduction of standards related to smart city information and communication technologies. The main interpretations of the concept of “smart city” are considered, the key current international and national standards are described, and the main problems of urban digitalization in Uzbekistan are described.
本文讨论了智慧城市学科领域的模型、工具和排名问题,为智慧城市标准化奠定了基础。熟悉这些问题使您能够评估和理解该领域标准化的起源和状态,该领域涵盖了智慧城市设计、组织和功能的各个方面。因此,文章最后介绍了与智慧城市信息通信技术相关的标准。考虑了“智慧城市”概念的主要解释,描述了当前关键的国际和国家标准,并描述了乌兹别克斯坦城市数字化的主要问题。
{"title":"Smart Cities: Concepts, Standarts, Frameworks, Models, Technologies","authors":"Salimjon O. Mahmudov, D. Temirova","doi":"10.1109/ICISCT55600.2022.10146747","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146747","url":null,"abstract":"This paper discusses the issues of models, tools and rankings in the subject area of smart cities, which served as the basis for the Smart City standardization. Familiarity with these issues allows you to assess and understand the origins and state of standardization in this area, which covers various aspects of the design, organization and functioning of a smart city. As a result, the article ends with the introduction of standards related to smart city information and communication technologies. The main interpretations of the concept of “smart city” are considered, the key current international and national standards are described, and the main problems of urban digitalization in Uzbekistan are described.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126266454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Information Science and Communications Technologies (ICISCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1