首页 > 最新文献

2022 International Conference on Information Science and Communications Technologies (ICISCT)最新文献

英文 中文
A Leslie-Gower predator-prey model with a two-free boundary 具有两自由边界的Leslie-Gower捕食者-猎物模型
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146896
A. Elmurodov, N.N. Yuldashev, R. Maqsudov, Gulnoz Abdikayimova
In this article, we study the behavior of two species evolving in a domain with a two-free boundary. This system mimics the spread of invasive or new predator species, in which free boundaries represent the expanding fronts of predator species and are described by the Stefan condition. A priori estimates for the required functions are established. These estimates are used to prove the existence and uniqueness of the solution.
在本文中,我们研究了两个物种在具有两自由边界的区域内进化的行为。该系统模拟了入侵或新的捕食者物种的传播,其中自由边界代表了捕食者物种的扩张前沿,并由Stefan条件描述。建立了所需功能的先验估计。这些估计被用来证明解的存在唯一性。
{"title":"A Leslie-Gower predator-prey model with a two-free boundary","authors":"A. Elmurodov, N.N. Yuldashev, R. Maqsudov, Gulnoz Abdikayimova","doi":"10.1109/ICISCT55600.2022.10146896","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146896","url":null,"abstract":"In this article, we study the behavior of two species evolving in a domain with a two-free boundary. This system mimics the spread of invasive or new predator species, in which free boundaries represent the expanding fronts of predator species and are described by the Stefan condition. A priori estimates for the required functions are established. These estimates are used to prove the existence and uniqueness of the solution.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Co- evolutionary hybrid intelligence technologies are the next step in the development of personalized intelligent human assistants 协同进化混合智能技术是个性化智能人类助手发展的下一步
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146734
Y. Shichkina, K. Krinkin
In this article we show that the transfer to a fundamentally new level of development of intelligent systems is possible if they are personified. The optimal way of transition to personified AI systems is their construction on the basis of the concept of co-evolutionary hybrid intelligence. In this article the basic principles of coevolutionary hybrid intelligence and their importance for the construction of a new generation of intelligent systems are considered. An example of creating a personalized intelligent human assistant for patients with Parkinson’s disease is given.
在这篇文章中,我们表明,转移到一个根本的智能系统的发展新水平是可能的,如果他们是人格化。向人格化人工智能系统过渡的最佳途径是基于协同进化混合智能概念的构建。本文讨论了共同进化混合智能的基本原理及其对构建新一代智能系统的重要性。给出了一个为帕金森病患者创建个性化智能助手的实例。
{"title":"Co- evolutionary hybrid intelligence technologies are the next step in the development of personalized intelligent human assistants","authors":"Y. Shichkina, K. Krinkin","doi":"10.1109/ICISCT55600.2022.10146734","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146734","url":null,"abstract":"In this article we show that the transfer to a fundamentally new level of development of intelligent systems is possible if they are personified. The optimal way of transition to personified AI systems is their construction on the basis of the concept of co-evolutionary hybrid intelligence. In this article the basic principles of coevolutionary hybrid intelligence and their importance for the construction of a new generation of intelligent systems are considered. An example of creating a personalized intelligent human assistant for patients with Parkinson’s disease is given.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131315490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SulfoTyr-PseAAC: A Machine Learning Framework to Identify Sulfotyrosine Sites SulfoTyr-PseAAC:一种识别巯基酪氨酸位点的机器学习框架
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146792
Asghar Ali Shah, Y. Khan
Tyrosine is a type of protein which is a chain of amino acid residues. It is utilized to synthesize proteins by eukaryotic. It is post-Translational modified (PTM) by its side chain hydeoxyl group by sulfation, phosphorylation, and nitration. Sulfotyrosine participate in protein-protein interaction. Sulfotyrosine is irreversible because still there is no enzymes that removes sulfate from tyrosine residue. Sulfotyrosines are identified in human diseases such as diabetes and Age-related Macular degeneration (AMD). It is very important to investigate the occurrence of sulfation in Tyrosine. There are many methods available to accurately predict Sulfotyrosines but most of them need more time and expert team. Therefore, a model is developed to predict sulfotyrosine accurately and efficiently and it is possible through machine learning algorithms which reduce cast and time. This study created a Machine through Logistic Regression which learnt statistical moments and can predict accurately. The prediction accuracy of this proposed model is 100%. The methodology of this study depends upon Chou’s 5-step rule.
酪氨酸是一种蛋白质,它是氨基酸残基链。真核生物利用它合成蛋白质。它是由其侧链羟基经过磺化、磷酸化和硝化修饰而成的翻译后修饰(PTM)。硫代酪氨酸参与蛋白质-蛋白质相互作用。硫代酪氨酸是不可逆的,因为仍然没有酶从酪氨酸残留物中去除硫酸盐。磺胺基酪氨酸在糖尿病和老年性黄斑变性(AMD)等人类疾病中被发现。研究酪氨酸中硫酸化的发生具有重要意义。目前有许多方法可以准确地预测硫代酪氨酸,但大多数方法需要更多的时间和专家团队。因此,开发了一个模型来准确有效地预测硫代酪氨酸,并且可以通过机器学习算法减少铸造和时间。本研究通过逻辑回归创造了一个学习统计矩并能准确预测的机器。该模型的预测精度为100%。这项研究的方法取决于周的五步规则。
{"title":"SulfoTyr-PseAAC: A Machine Learning Framework to Identify Sulfotyrosine Sites","authors":"Asghar Ali Shah, Y. Khan","doi":"10.1109/ICISCT55600.2022.10146792","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146792","url":null,"abstract":"Tyrosine is a type of protein which is a chain of amino acid residues. It is utilized to synthesize proteins by eukaryotic. It is post-Translational modified (PTM) by its side chain hydeoxyl group by sulfation, phosphorylation, and nitration. Sulfotyrosine participate in protein-protein interaction. Sulfotyrosine is irreversible because still there is no enzymes that removes sulfate from tyrosine residue. Sulfotyrosines are identified in human diseases such as diabetes and Age-related Macular degeneration (AMD). It is very important to investigate the occurrence of sulfation in Tyrosine. There are many methods available to accurately predict Sulfotyrosines but most of them need more time and expert team. Therefore, a model is developed to predict sulfotyrosine accurately and efficiently and it is possible through machine learning algorithms which reduce cast and time. This study created a Machine through Logistic Regression which learnt statistical moments and can predict accurately. The prediction accuracy of this proposed model is 100%. The methodology of this study depends upon Chou’s 5-step rule.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133190298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The use of Big Data in the field healthcare: Uzbekistan and foreign experience 大数据在医疗领域的应用:乌兹别克斯坦和国外的经验
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146984
Khudayshukur Kuzibaev, T.K. Urazmatov, B. B. Nurmetova
The article analyzes the use of big data in healthcare. Various approaches have been described to the definition of the concept (Big Data), the scope of this technology; the most demanded technologies by industries are shown. Considered the prerequisites for the use of big data in healthcare, as well as the advantages and disadvantages of using big data in healthcare. The historical experience of using Big Data in Uzbekistan and the USA is noted, specific examples of application in Uzbekistan, Europe, the USA, and China are analyzed. The article provides a forecast for the big data market in Uzbekistan healthcare and shows a practical example of using Python as part of the analysis large flow of medical data. Conclusions are drawn about the characteristic trends in the use of large data in different countries. The conclusion is made about the importance of using big data in healthcare.
本文分析了大数据在医疗保健中的应用。各种方法已经被描述到概念(大数据)的定义,该技术的范围;展示了行业最需要的技术。考虑了在医疗保健中使用大数据的先决条件,以及在医疗保健中使用大数据的优缺点。指出了乌兹别克斯坦和美国使用大数据的历史经验,分析了乌兹别克斯坦、欧洲、美国和中国的具体应用实例。本文提供了乌兹别克斯坦医疗保健大数据市场的预测,并展示了使用Python作为分析大流量医疗数据的一部分的实际示例。得出结论,在不同的国家在使用大数据的特点趋势。总结了大数据在医疗保健领域应用的重要性。
{"title":"The use of Big Data in the field healthcare: Uzbekistan and foreign experience","authors":"Khudayshukur Kuzibaev, T.K. Urazmatov, B. B. Nurmetova","doi":"10.1109/ICISCT55600.2022.10146984","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146984","url":null,"abstract":"The article analyzes the use of big data in healthcare. Various approaches have been described to the definition of the concept (Big Data), the scope of this technology; the most demanded technologies by industries are shown. Considered the prerequisites for the use of big data in healthcare, as well as the advantages and disadvantages of using big data in healthcare. The historical experience of using Big Data in Uzbekistan and the USA is noted, specific examples of application in Uzbekistan, Europe, the USA, and China are analyzed. The article provides a forecast for the big data market in Uzbekistan healthcare and shows a practical example of using Python as part of the analysis large flow of medical data. Conclusions are drawn about the characteristic trends in the use of large data in different countries. The conclusion is made about the importance of using big data in healthcare.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132100275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Acceptable Risk Skills Among Students of Technical Higher Educational Institutions Based on Interactive Case Technologies 基于交互式案例技术的高职学生可接受风险技能培养
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146789
E. A. Borisova
The modern world has rejected the concept of absolute security due to the unattainability of the latter and has come to the concept of acceptable risk. The essence of the concept of acceptable risk lies in the desire to provide such a small security that society accepts in a given period of time, with which one can agree. Acceptable risk combines technical, economic, social and political aspects and represents some compromise between the level of safety and the possibilities of achieving it. Therefore, the development of acceptable risk skills based on interactive case technologies is the main task of the Life Safety discipline.
现代世界拒绝了绝对安全的概念,因为绝对安全是不可能实现的,并产生了可接受风险的概念。可接受风险概念的本质在于希望提供社会在一定时期内接受的、人们能够同意的很小的安全。可接受的风险结合了技术、经济、社会和政治方面,代表了安全水平与实现安全的可能性之间的某种妥协。因此,基于交互式案例技术的可接受风险技能的发展是生命安全学科的主要任务。
{"title":"Development of Acceptable Risk Skills Among Students of Technical Higher Educational Institutions Based on Interactive Case Technologies","authors":"E. A. Borisova","doi":"10.1109/ICISCT55600.2022.10146789","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146789","url":null,"abstract":"The modern world has rejected the concept of absolute security due to the unattainability of the latter and has come to the concept of acceptable risk. The essence of the concept of acceptable risk lies in the desire to provide such a small security that society accepts in a given period of time, with which one can agree. Acceptable risk combines technical, economic, social and political aspects and represents some compromise between the level of safety and the possibilities of achieving it. Therefore, the development of acceptable risk skills based on interactive case technologies is the main task of the Life Safety discipline.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125074758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of the Bigrams of the Letters of the Uzbek Alphabet for Cryptanalysis 用于密码分析的乌兹别克字母双字母分析
Pub Date : 2022-09-28 DOI: 10.1109/icisct55600.2022.10146879
N. Zaynalov, A. Shakarov, Muzaffar Saidmurodov, Abdinabi Mukhamadiyev, Dusmurod Kilichev
The development and development of means and methods of cryptography is directly accompanied by the development of cryptanalysis methods. The classical and one of the first methods of cryptanalysis is the frequency method. Historically, the first traces of frequency analysis of the text can be found in the works of scientists since the 10th century. And here the scientists of the East, such scientists as al-Kindi, made a great contribution to cryptanalysis. This paper presents an analysis of the frequencies of bigram of letters of the text in the Uzbek language. It should be noted that at the moment the Uzbek language is based on two alphabets, namely the Latin alphabet and the alphabet based on the Cyrillic alphabet. And now further changes in the alphabet of the Uzbek language are being considered. Determining the frequencies of bigram of the letters of the Latin alphabet of the Uzbek language is accompanied by difficulties associated with the fact that some letters are combinations of letters from the original alphabet and a symbol that is not in the alphabet, for example, the letter ‘ch’. Here the letter ‘h’ belongs to the given alphabet, but the letter ‘c’ does not. And this, in turn, leads to problems in the definitions of bigrams. Based on this, texts in the Uzbek language are analyzed here using the Cyrillic alphabet, where each letter corresponds to one character. Literary work is used as content. Based on this, in this article we present the results of determining the frequencies of bigram of letters of the Uzbek language based on the Cyrillic alphabet.
密码学的手段和方法的发展和发展,是直接伴随着密码分析方法的发展而来的。频率法是密码分析的经典方法之一,也是最早的方法之一。从历史上看,文本频率分析的第一个痕迹可以在10世纪以来科学家的作品中找到。在这里,东方的科学家,比如al-Kindi,对密码分析做出了巨大贡献。本文对乌兹别克语文本中字母双拼的频率进行了分析。应该指出的是,目前乌兹别克语是基于两个字母,即拉丁字母和基于西里尔字母的字母。现在正在考虑进一步改变乌兹别克语的字母表。确定乌兹别克语拉丁字母的双字母频率有困难,因为有些字母是原始字母和字母表中不存在的符号的组合,例如字母“ch”。这里字母“h”属于给定的字母表,但字母“c”不属于给定的字母表。这反过来又会导致双元图定义中的问题。基于此,本文使用西里尔字母分析乌兹别克语文本,其中每个字母对应一个字符。文学作品作为内容。在此基础上,本文给出了基于西里尔字母确定乌兹别克语双字母频率的结果。
{"title":"Analysis of the Bigrams of the Letters of the Uzbek Alphabet for Cryptanalysis","authors":"N. Zaynalov, A. Shakarov, Muzaffar Saidmurodov, Abdinabi Mukhamadiyev, Dusmurod Kilichev","doi":"10.1109/icisct55600.2022.10146879","DOIUrl":"https://doi.org/10.1109/icisct55600.2022.10146879","url":null,"abstract":"The development and development of means and methods of cryptography is directly accompanied by the development of cryptanalysis methods. The classical and one of the first methods of cryptanalysis is the frequency method. Historically, the first traces of frequency analysis of the text can be found in the works of scientists since the 10th century. And here the scientists of the East, such scientists as al-Kindi, made a great contribution to cryptanalysis. This paper presents an analysis of the frequencies of bigram of letters of the text in the Uzbek language. It should be noted that at the moment the Uzbek language is based on two alphabets, namely the Latin alphabet and the alphabet based on the Cyrillic alphabet. And now further changes in the alphabet of the Uzbek language are being considered. Determining the frequencies of bigram of the letters of the Latin alphabet of the Uzbek language is accompanied by difficulties associated with the fact that some letters are combinations of letters from the original alphabet and a symbol that is not in the alphabet, for example, the letter ‘ch’. Here the letter ‘h’ belongs to the given alphabet, but the letter ‘c’ does not. And this, in turn, leads to problems in the definitions of bigrams. Based on this, texts in the Uzbek language are analyzed here using the Cyrillic alphabet, where each letter corresponds to one character. Literary work is used as content. Based on this, in this article we present the results of determining the frequencies of bigram of letters of the Uzbek language based on the Cyrillic alphabet.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2D Reflexive CA Rules over ℤp p上二维自反CA规则
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146761
Doston Jumaniyozov, Shovkat Redjepov, Otaxon Khudayberganov
The present paper is devoted to study of a new type of lattice that is called pentagonal lattice. We define the von Neumann neighborhood of a cell in this lattice. After that, it is considered a linear Cellular Automata with von Neumann neighborhood over pentagonal lattice. We investigate this Cellular Automata with reflexive boundary condition. For the considered Cellular Automata, we construct the transition rule matrix over the field ℤp with reflexive boundary condition.
本文研究了一种叫做五边形晶格的新型晶格。我们定义了晶格中细胞的冯·诺依曼邻域。然后,将其视为五边形晶格上具有冯·诺依曼邻域的线性元胞自动机。研究了具有自反边界条件的元胞自动机。对于所考虑的元胞自动机,我们构造了具有自反边界条件的域上的转移规则矩阵。
{"title":"2D Reflexive CA Rules over ℤp","authors":"Doston Jumaniyozov, Shovkat Redjepov, Otaxon Khudayberganov","doi":"10.1109/ICISCT55600.2022.10146761","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146761","url":null,"abstract":"The present paper is devoted to study of a new type of lattice that is called pentagonal lattice. We define the von Neumann neighborhood of a cell in this lattice. After that, it is considered a linear Cellular Automata with von Neumann neighborhood over pentagonal lattice. We investigate this Cellular Automata with reflexive boundary condition. For the considered Cellular Automata, we construct the transition rule matrix over the field ℤp with reflexive boundary condition.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121024306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithms for highlighting the contours of images based on the theory of fuzzy sets 基于模糊集理论的图像轮廓高亮算法
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146799
A.Q. Ergashev, O.Kh. Turakulov, A. Abdumalikov, O. A. Kayumov
In the work, algorithms for isolating the contours of images based on the theory of fuzzy sets are carried out, In this section, the state of the issue of image processing using the concept of fuzzy sets is considered in relation to the following tasks: improving image quality, image segmentation and outlining on images.
在这项工作中,基于模糊集理论进行了图像轮廓隔离的算法。在本节中,使用模糊集概念的图像处理问题的现状与以下任务有关:提高图像质量,图像分割和图像概述。
{"title":"Algorithms for highlighting the contours of images based on the theory of fuzzy sets","authors":"A.Q. Ergashev, O.Kh. Turakulov, A. Abdumalikov, O. A. Kayumov","doi":"10.1109/ICISCT55600.2022.10146799","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146799","url":null,"abstract":"In the work, algorithms for isolating the contours of images based on the theory of fuzzy sets are carried out, In this section, the state of the issue of image processing using the concept of fuzzy sets is considered in relation to the following tasks: improving image quality, image segmentation and outlining on images.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Procedure for Forming a List of Sources of Attack in the Information System 形成信息系统攻击源列表的程序
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146884
Bekmirzaev Obidjon Nuralievich, Muminov Bahodir Boltaevich, Bekmurodov Ulugbek Bahrom Ugli
the purpose of the attack on the information system is separated and the clear cause and effect are formed. Taking this into account, the impact of the negative consequences of the type of damage is determined. the procedure of creating a list of sources of attack in the information system was seen, on the basis of which it was suggested that there is a need to see the set of events of the node state under the influence of the attack.
对信息系统的攻击目的进行了分离,形成了明确的因果关系。考虑到这一点,确定了损害类型的负面后果的影响。看到了在信息系统中创建攻击源列表的过程,在此基础上,有人建议有必要查看受攻击影响的节点状态事件集。
{"title":"The Procedure for Forming a List of Sources of Attack in the Information System","authors":"Bekmirzaev Obidjon Nuralievich, Muminov Bahodir Boltaevich, Bekmurodov Ulugbek Bahrom Ugli","doi":"10.1109/ICISCT55600.2022.10146884","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146884","url":null,"abstract":"the purpose of the attack on the information system is separated and the clear cause and effect are formed. Taking this into account, the impact of the negative consequences of the type of damage is determined. the procedure of creating a list of sources of attack in the information system was seen, on the basis of which it was suggested that there is a need to see the set of events of the node state under the influence of the attack.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114946198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Printed Antenna for Signal Analysis in the UHF Band 用于UHF频段信号分析的印刷天线
Pub Date : 2022-09-28 DOI: 10.1109/ICISCT55600.2022.10146826
Akhmad Olmasov, Kh. B. Mirzokulov, Bekmirzo Djaniyev, Nodirjon Mardiyev
This article presents the properties and capabilities of a patch antenna (printed antennas). In the course of scientific research, using the CST Studio environment, simulation modeling of a patch antenna was performed. The antenna model consists of a ground layer, a substrate and an exciter in the form of a strip patch antenna. In the course of simulation modeling, results were obtained for the parameter S (return loss) and the radiation pattern. Next, an experimental sample of the antenna was created and measurement work was carried out. The obtained results show that this antenna is broadband and works effectively in the UHF band.
本文介绍了贴片天线(印刷天线)的特性和性能。在科研过程中,利用CST Studio环境对贴片天线进行了仿真建模。该天线模型由接地面层、基片和带状贴片天线形式的激励器组成。在模拟建模过程中,得到了回波损耗参数S和辐射方向图的计算结果。然后,建立了天线的实验样品,并进行了测量工作。实验结果表明,该天线具有宽带特性,在UHF频段内工作效率高。
{"title":"Printed Antenna for Signal Analysis in the UHF Band","authors":"Akhmad Olmasov, Kh. B. Mirzokulov, Bekmirzo Djaniyev, Nodirjon Mardiyev","doi":"10.1109/ICISCT55600.2022.10146826","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146826","url":null,"abstract":"This article presents the properties and capabilities of a patch antenna (printed antennas). In the course of scientific research, using the CST Studio environment, simulation modeling of a patch antenna was performed. The antenna model consists of a ground layer, a substrate and an exciter in the form of a strip patch antenna. In the course of simulation modeling, results were obtained for the parameter S (return loss) and the radiation pattern. Next, an experimental sample of the antenna was created and measurement work was carried out. The obtained results show that this antenna is broadband and works effectively in the UHF band.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Information Science and Communications Technologies (ICISCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1