Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146999
K. Nosirov, Aziz Ataniyazov, Mokhirjon Rikhsivoev, Mukhriddin Arabboev, Shohruh Begmatov
Nowadays, information technology and communication systems are evolving, and there is a growing demand for multiservice network analysis processes to provide multimedia services through IMS. IP Multimedia Subsystem (IMS) is a next-generation standard-based network architecture designed for telecommunications operators who want to deliver cutting-edge services over mobile and fixed networks. IMS is a service-oriented architectural framework that aims to provide current and future Internet services to fixed and mobile end users on an all-IP multi-access platform. The 3rd Generation Partnership Project (3GPP) and 3GPP2 developed IMS to provide service delivery platforms for a converged communication model [1].
{"title":"Analysis Of Multi-Service Networks For The Provision Of Multimedia Services Based On IMS","authors":"K. Nosirov, Aziz Ataniyazov, Mokhirjon Rikhsivoev, Mukhriddin Arabboev, Shohruh Begmatov","doi":"10.1109/ICISCT55600.2022.10146999","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146999","url":null,"abstract":"Nowadays, information technology and communication systems are evolving, and there is a growing demand for multiservice network analysis processes to provide multimedia services through IMS. IP Multimedia Subsystem (IMS) is a next-generation standard-based network architecture designed for telecommunications operators who want to deliver cutting-edge services over mobile and fixed networks. IMS is a service-oriented architectural framework that aims to provide current and future Internet services to fixed and mobile end users on an all-IP multi-access platform. The 3rd Generation Partnership Project (3GPP) and 3GPP2 developed IMS to provide service delivery platforms for a converged communication model [1].","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126093260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146846
Kudratjon Zohirov
In this article written about a scientific research on the classification of the sensitive movements of human fingers through a single-channel device. A high degree of classification accuracy is ensured by selecting the parameters of the EMG signal. On the basis of the recommendations presented in this article, human-machine interfaces can be created and such interfaces will in the future lay the groundwork for the development of control systems through biosignals in remote control, rehabilitation and many other areas.
{"title":"Classification Of Some Sensitive Motion Of Fingers To Create Modern Biointerface","authors":"Kudratjon Zohirov","doi":"10.1109/ICISCT55600.2022.10146846","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146846","url":null,"abstract":"In this article written about a scientific research on the classification of the sensitive movements of human fingers through a single-channel device. A high degree of classification accuracy is ensured by selecting the parameters of the EMG signal. On the basis of the recommendations presented in this article, human-machine interfaces can be created and such interfaces will in the future lay the groundwork for the development of control systems through biosignals in remote control, rehabilitation and many other areas.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125726232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146905
M. Rakhimov, Dias Abdurakhmanov
Diagnostics of electrical equipment today is one of the main “devices” for assessing its technical condition and allows you to predict its service life (residual resource), which is an a priori task for such strategically important facilities as power transformer. Over the past decade, the understanding of the economic feasibility of technical diagnostics and condition assessment of electrical equipment has increased for many reasons. Therefore, determining which transformers require the most attention can be an extremely difficult task. Condition assessment and data analysis based on artificial intelligence is of great importance for improving the completeness, efficiency and accuracy of the state assessment. Artificial intelligence technologies, such as machine learning, are among the most effective that can be used to solve the problems of assessing the condition of power transformers. K-nearest neighbors (KNN) algorithm is a simple, easy-to-implement supervised machine learning algorithm that can be used to solve a binary classification. This paper presents the selection of important technical indicators of the transformer and the implementation of the KNN algorithm that aims to improve the accuracy of the binary classification.
{"title":"AI-based Power Transformer Condition Assessment","authors":"M. Rakhimov, Dias Abdurakhmanov","doi":"10.1109/ICISCT55600.2022.10146905","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146905","url":null,"abstract":"Diagnostics of electrical equipment today is one of the main “devices” for assessing its technical condition and allows you to predict its service life (residual resource), which is an a priori task for such strategically important facilities as power transformer. Over the past decade, the understanding of the economic feasibility of technical diagnostics and condition assessment of electrical equipment has increased for many reasons. Therefore, determining which transformers require the most attention can be an extremely difficult task. Condition assessment and data analysis based on artificial intelligence is of great importance for improving the completeness, efficiency and accuracy of the state assessment. Artificial intelligence technologies, such as machine learning, are among the most effective that can be used to solve the problems of assessing the condition of power transformers. K-nearest neighbors (KNN) algorithm is a simple, easy-to-implement supervised machine learning algorithm that can be used to solve a binary classification. This paper presents the selection of important technical indicators of the transformer and the implementation of the KNN algorithm that aims to improve the accuracy of the binary classification.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125999034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146842
Sergeev Alexandr, Sergeev Mikhail
the issue of ensuring the reliability of the functioning of global systems of remote online monitoring of the condition of patients is considered. Remote monitoring is in demand when supervision the health status of disabled people with cardiovascular diseases, pregnant women and children. It is especially in demand in the context of a pandemic and the accompanying restrictions on movement. Monitoring is carried out “transparently” for the patient, without involving him in the subtleties of the process of interaction with a medical institution, ensuring the preservation of his mobility due to the proposed concept of implementing a wearable online monitor device. The procedures of the online monitor initialization and distribution of functions in it are considered. Threats to the normal functioning of distributed systems with online monitors are presented, including existing problems of a general nature related mainly to global communications. Solutions are offered to ensure reliable operation of wearable devices as part of online monitors.
{"title":"Ensuring the reliability of remote online monitoring systems","authors":"Sergeev Alexandr, Sergeev Mikhail","doi":"10.1109/ICISCT55600.2022.10146842","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146842","url":null,"abstract":"the issue of ensuring the reliability of the functioning of global systems of remote online monitoring of the condition of patients is considered. Remote monitoring is in demand when supervision the health status of disabled people with cardiovascular diseases, pregnant women and children. It is especially in demand in the context of a pandemic and the accompanying restrictions on movement. Monitoring is carried out “transparently” for the patient, without involving him in the subtleties of the process of interaction with a medical institution, ensuring the preservation of his mobility due to the proposed concept of implementing a wearable online monitor device. The procedures of the online monitor initialization and distribution of functions in it are considered. Threats to the normal functioning of distributed systems with online monitors are presented, including existing problems of a general nature related mainly to global communications. Solutions are offered to ensure reliable operation of wearable devices as part of online monitors.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122313360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146787
Inomjon Yarashov
Digitization in various fields and the development of digital technologies are giving rise to information security issues such as security management. In addition, a user-friendly method based on the properties of the object should be proposed. Of course, the system will be able to evaluate itself based on improvement criteria. In accordance with the criteria, a formula is presented that evaluates the reliable distribution based on the entered criteria, the base points necessary for the invariant method are selected when choosing the best path of action of the system participants with respect to the defined areas. When selecting the center points of the circles, the observation is determined according to the location density of the wells, to reduce the complexity of the selection of the base points and the reliable grouping problem, the reliable part is divided into sets, a knowledge base is formed, and the values of the knowledge base store the values considered to be highly effective.
{"title":"Development of a reliable method for grouping users in user access control based on a Functioning table","authors":"Inomjon Yarashov","doi":"10.1109/ICISCT55600.2022.10146787","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146787","url":null,"abstract":"Digitization in various fields and the development of digital technologies are giving rise to information security issues such as security management. In addition, a user-friendly method based on the properties of the object should be proposed. Of course, the system will be able to evaluate itself based on improvement criteria. In accordance with the criteria, a formula is presented that evaluates the reliable distribution based on the entered criteria, the base points necessary for the invariant method are selected when choosing the best path of action of the system participants with respect to the defined areas. When selecting the center points of the circles, the observation is determined according to the location density of the wells, to reduce the complexity of the selection of the base points and the reliable grouping problem, the reliable part is divided into sets, a knowledge base is formed, and the values of the knowledge base store the values considered to be highly effective.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133229165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146904
E. Reypnazarov, Halim Khujamatov, D. Khasanov, Z. Allamuratova
This paper analyzes of the hardware and software tools for implementing a cognitive radio network. In particular, software-configurable radio modules, which are considered the main element of the cognitive network, were studied according to their main characteristics, among which the widely used ones were comparatively analyzed. As a result of the analysis, the HackRF One device was selected as the most preferred option for cognitive network research, and its working principles, structure, and characteristics were revealed in detail. It also provides information about the GNU Radio software environment and its capabilities, which are used to operate the HackRF One device.
{"title":"Analysis of Hardware and Software Tools for Implementation of Cognitive Radio Networks","authors":"E. Reypnazarov, Halim Khujamatov, D. Khasanov, Z. Allamuratova","doi":"10.1109/ICISCT55600.2022.10146904","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146904","url":null,"abstract":"This paper analyzes of the hardware and software tools for implementing a cognitive radio network. In particular, software-configurable radio modules, which are considered the main element of the cognitive network, were studied according to their main characteristics, among which the widely used ones were comparatively analyzed. As a result of the analysis, the HackRF One device was selected as the most preferred option for cognitive network research, and its working principles, structure, and characteristics were revealed in detail. It also provides information about the GNU Radio software environment and its capabilities, which are used to operate the HackRF One device.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114974425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146865
Ilkhomjon Siddikov, Halim Khujamatov, D. Khasanov, E. Reypnazarov, A.O. Iminov
The most important requirement in the provision of telecommunication services is its continuous provision. Continuity of services depends mainly on the uninterrupted power supply of telecommunications equipment. for this reason, today, scientists are conducting research on continuous monitoring of energy supply sources, prediction and early detection of possible failures and outages. In particular, wireless sensor networks are widely used in real-time monitoring of energy supply sources and have become the center of interest. In this article, the data transmission processes and transmission problems of wireless sensor networks used in monitoring systems are studied. Also, several algorithms aimed at improving the effectiveness of wireless sensor networks and improving the efficiency of data transmission are proposed in the article.
{"title":"Data Transfer Methods and Algorithms in Wireless Sensor Networks for IoT-based Remote Monitoring System of Hybrid Energy Supply Sources","authors":"Ilkhomjon Siddikov, Halim Khujamatov, D. Khasanov, E. Reypnazarov, A.O. Iminov","doi":"10.1109/ICISCT55600.2022.10146865","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146865","url":null,"abstract":"The most important requirement in the provision of telecommunication services is its continuous provision. Continuity of services depends mainly on the uninterrupted power supply of telecommunications equipment. for this reason, today, scientists are conducting research on continuous monitoring of energy supply sources, prediction and early detection of possible failures and outages. In particular, wireless sensor networks are widely used in real-time monitoring of energy supply sources and have become the center of interest. In this article, the data transmission processes and transmission problems of wireless sensor networks used in monitoring systems are studied. Also, several algorithms aimed at improving the effectiveness of wireless sensor networks and improving the efficiency of data transmission are proposed in the article.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115621950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146923
K. Tashev, J. Arzieva, A.T Arziev, Rakhimberdiev Kuvonchbek
In this article, the issue of authentication of objects of information and communication systems based on mutual authentication, models of authentication of users of information and communication systems, the use a five-level authentication model in the control of access to computer systems, the use of blockchain technology in solving the problem of identification and authentication basics, working principle of Blockstack and uPort authentication protocols based on Blockchain technology, advantages and disadvantages of Blockstack, uPort authentication protocols are analyzed. Also, the working principle of the DNS server system based on the Blockstack authentication protocol, developed on the basis of the Bitcoin blockchain, was studied. The blockchain layer of the Blockstack infrastructure is an analogue of the bitcoin blockchain. Here, the blockchain analogue is crypto-resistant, decentralized, and information is distributed through a consensus mechanism. In the given thesis questions of the authentication of objects of information-communication systems on the basis of mutual authenticate are considered.
{"title":"Method authentication of objects information communication systems","authors":"K. Tashev, J. Arzieva, A.T Arziev, Rakhimberdiev Kuvonchbek","doi":"10.1109/ICISCT55600.2022.10146923","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146923","url":null,"abstract":"In this article, the issue of authentication of objects of information and communication systems based on mutual authentication, models of authentication of users of information and communication systems, the use a five-level authentication model in the control of access to computer systems, the use of blockchain technology in solving the problem of identification and authentication basics, working principle of Blockstack and uPort authentication protocols based on Blockchain technology, advantages and disadvantages of Blockstack, uPort authentication protocols are analyzed. Also, the working principle of the DNS server system based on the Blockstack authentication protocol, developed on the basis of the Bitcoin blockchain, was studied. The blockchain layer of the Blockstack infrastructure is an analogue of the bitcoin blockchain. Here, the blockchain analogue is crypto-resistant, decentralized, and information is distributed through a consensus mechanism. In the given thesis questions of the authentication of objects of information-communication systems on the basis of mutual authenticate are considered.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123331582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146907
A. E. Atamuratov, B.Q. Jumaboyev, A. Yusupov, A. Abdikarimov, A. Loureiro
In the paper the effect of height, base width and doping level on efficiency of the silicon vertical solar cell with two p-n junctions connected by tunnel junction, is investigated by 2D simulations. It is shown that the dependence efficiency on the height of p-n junction has non monotonic behavior. It is attributed to impact of high solar concentration on distribution of effective electric field normal to p-n junction border in the n-base of vertical solar cell. The distribution of the field depend on the height of p-n junction at high solar concentration. Efficiency is increased with increasing the width of base up to 25 $mu$m. Increasing of the efficiency with decreasing the base doping level is connected with increasing the carrier mobility. Dependence of the efficiency on solar concentration is also considered. Efficiency is reached the saturation at solar concentration around 1000 suns.
{"title":"The effect of geometrical sizes on efficiency of vertical silicon tunnel junction solar cell for high solar concentration","authors":"A. E. Atamuratov, B.Q. Jumaboyev, A. Yusupov, A. Abdikarimov, A. Loureiro","doi":"10.1109/ICISCT55600.2022.10146907","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146907","url":null,"abstract":"In the paper the effect of height, base width and doping level on efficiency of the silicon vertical solar cell with two p-n junctions connected by tunnel junction, is investigated by 2D simulations. It is shown that the dependence efficiency on the height of p-n junction has non monotonic behavior. It is attributed to impact of high solar concentration on distribution of effective electric field normal to p-n junction border in the n-base of vertical solar cell. The distribution of the field depend on the height of p-n junction at high solar concentration. Efficiency is increased with increasing the width of base up to 25 $mu$m. Increasing of the efficiency with decreasing the base doping level is connected with increasing the carrier mobility. Dependence of the efficiency on solar concentration is also considered. Efficiency is reached the saturation at solar concentration around 1000 suns.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146836
Akmal Arifdjanov, S. Sadchikova
Multimedia applications require the access network modernization based on optical technologies. Automatic network planning is not finished on the access technology choice. Next step is definition geographical area and the main network element locations and special parameters calculation of chosen access technology, it is the most time-consuming the initial data processing of the terrain objects. FTTH architecture uses PON as a transport technology. This article is discussed how you can develop algorithms for GPON based network planning using digital area maps.
{"title":"GPON based network planning using digital area maps","authors":"Akmal Arifdjanov, S. Sadchikova","doi":"10.1109/ICISCT55600.2022.10146836","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146836","url":null,"abstract":"Multimedia applications require the access network modernization based on optical technologies. Automatic network planning is not finished on the access technology choice. Next step is definition geographical area and the main network element locations and special parameters calculation of chosen access technology, it is the most time-consuming the initial data processing of the terrain objects. FTTH architecture uses PON as a transport technology. This article is discussed how you can develop algorithms for GPON based network planning using digital area maps.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131118970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}