Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146836
Akmal Arifdjanov, S. Sadchikova
Multimedia applications require the access network modernization based on optical technologies. Automatic network planning is not finished on the access technology choice. Next step is definition geographical area and the main network element locations and special parameters calculation of chosen access technology, it is the most time-consuming the initial data processing of the terrain objects. FTTH architecture uses PON as a transport technology. This article is discussed how you can develop algorithms for GPON based network planning using digital area maps.
{"title":"GPON based network planning using digital area maps","authors":"Akmal Arifdjanov, S. Sadchikova","doi":"10.1109/ICISCT55600.2022.10146836","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146836","url":null,"abstract":"Multimedia applications require the access network modernization based on optical technologies. Automatic network planning is not finished on the access technology choice. Next step is definition geographical area and the main network element locations and special parameters calculation of chosen access technology, it is the most time-consuming the initial data processing of the terrain objects. FTTH architecture uses PON as a transport technology. This article is discussed how you can develop algorithms for GPON based network planning using digital area maps.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131118970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146734
Y. Shichkina, K. Krinkin
In this article we show that the transfer to a fundamentally new level of development of intelligent systems is possible if they are personified. The optimal way of transition to personified AI systems is their construction on the basis of the concept of co-evolutionary hybrid intelligence. In this article the basic principles of coevolutionary hybrid intelligence and their importance for the construction of a new generation of intelligent systems are considered. An example of creating a personalized intelligent human assistant for patients with Parkinson’s disease is given.
{"title":"Co- evolutionary hybrid intelligence technologies are the next step in the development of personalized intelligent human assistants","authors":"Y. Shichkina, K. Krinkin","doi":"10.1109/ICISCT55600.2022.10146734","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146734","url":null,"abstract":"In this article we show that the transfer to a fundamentally new level of development of intelligent systems is possible if they are personified. The optimal way of transition to personified AI systems is their construction on the basis of the concept of co-evolutionary hybrid intelligence. In this article the basic principles of coevolutionary hybrid intelligence and their importance for the construction of a new generation of intelligent systems are considered. An example of creating a personalized intelligent human assistant for patients with Parkinson’s disease is given.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131315490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146792
Asghar Ali Shah, Y. Khan
Tyrosine is a type of protein which is a chain of amino acid residues. It is utilized to synthesize proteins by eukaryotic. It is post-Translational modified (PTM) by its side chain hydeoxyl group by sulfation, phosphorylation, and nitration. Sulfotyrosine participate in protein-protein interaction. Sulfotyrosine is irreversible because still there is no enzymes that removes sulfate from tyrosine residue. Sulfotyrosines are identified in human diseases such as diabetes and Age-related Macular degeneration (AMD). It is very important to investigate the occurrence of sulfation in Tyrosine. There are many methods available to accurately predict Sulfotyrosines but most of them need more time and expert team. Therefore, a model is developed to predict sulfotyrosine accurately and efficiently and it is possible through machine learning algorithms which reduce cast and time. This study created a Machine through Logistic Regression which learnt statistical moments and can predict accurately. The prediction accuracy of this proposed model is 100%. The methodology of this study depends upon Chou’s 5-step rule.
{"title":"SulfoTyr-PseAAC: A Machine Learning Framework to Identify Sulfotyrosine Sites","authors":"Asghar Ali Shah, Y. Khan","doi":"10.1109/ICISCT55600.2022.10146792","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146792","url":null,"abstract":"Tyrosine is a type of protein which is a chain of amino acid residues. It is utilized to synthesize proteins by eukaryotic. It is post-Translational modified (PTM) by its side chain hydeoxyl group by sulfation, phosphorylation, and nitration. Sulfotyrosine participate in protein-protein interaction. Sulfotyrosine is irreversible because still there is no enzymes that removes sulfate from tyrosine residue. Sulfotyrosines are identified in human diseases such as diabetes and Age-related Macular degeneration (AMD). It is very important to investigate the occurrence of sulfation in Tyrosine. There are many methods available to accurately predict Sulfotyrosines but most of them need more time and expert team. Therefore, a model is developed to predict sulfotyrosine accurately and efficiently and it is possible through machine learning algorithms which reduce cast and time. This study created a Machine through Logistic Regression which learnt statistical moments and can predict accurately. The prediction accuracy of this proposed model is 100%. The methodology of this study depends upon Chou’s 5-step rule.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133190298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146984
Khudayshukur Kuzibaev, T.K. Urazmatov, B. B. Nurmetova
The article analyzes the use of big data in healthcare. Various approaches have been described to the definition of the concept (Big Data), the scope of this technology; the most demanded technologies by industries are shown. Considered the prerequisites for the use of big data in healthcare, as well as the advantages and disadvantages of using big data in healthcare. The historical experience of using Big Data in Uzbekistan and the USA is noted, specific examples of application in Uzbekistan, Europe, the USA, and China are analyzed. The article provides a forecast for the big data market in Uzbekistan healthcare and shows a practical example of using Python as part of the analysis large flow of medical data. Conclusions are drawn about the characteristic trends in the use of large data in different countries. The conclusion is made about the importance of using big data in healthcare.
{"title":"The use of Big Data in the field healthcare: Uzbekistan and foreign experience","authors":"Khudayshukur Kuzibaev, T.K. Urazmatov, B. B. Nurmetova","doi":"10.1109/ICISCT55600.2022.10146984","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146984","url":null,"abstract":"The article analyzes the use of big data in healthcare. Various approaches have been described to the definition of the concept (Big Data), the scope of this technology; the most demanded technologies by industries are shown. Considered the prerequisites for the use of big data in healthcare, as well as the advantages and disadvantages of using big data in healthcare. The historical experience of using Big Data in Uzbekistan and the USA is noted, specific examples of application in Uzbekistan, Europe, the USA, and China are analyzed. The article provides a forecast for the big data market in Uzbekistan healthcare and shows a practical example of using Python as part of the analysis large flow of medical data. Conclusions are drawn about the characteristic trends in the use of large data in different countries. The conclusion is made about the importance of using big data in healthcare.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132100275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10147000
Kunduz Medetova, Djamshid Sultanov
This paper presents methods for solving problems using the method of fuzzy logic. This method serves to study the characteristics of determining the level of compliance of a candidate for an existing vacant position. When measuring compliance with database requirements based on the results of assessing compliance with the requirements of an employee for a position. The use of artificial intelligence in personnel records gives high efficiency and serves for decision making.
{"title":"Applications of Fuzzy Logic in Recruitment Systems","authors":"Kunduz Medetova, Djamshid Sultanov","doi":"10.1109/ICISCT55600.2022.10147000","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10147000","url":null,"abstract":"This paper presents methods for solving problems using the method of fuzzy logic. This method serves to study the characteristics of determining the level of compliance of a candidate for an existing vacant position. When measuring compliance with database requirements based on the results of assessing compliance with the requirements of an employee for a position. The use of artificial intelligence in personnel records gives high efficiency and serves for decision making.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146883
Nodir Raximov, Jura Kuvandikov, Khasanov Dilmurod
As known, Artificial Intelligence is based on Machine Learning(ML) and Deep Learning(DL). And improving ML and DL is connected to Loss function in neural networks. In the importance optimization algorithms Loss function of great importance. There are different types of Loss function in Artificial Intelligence. In this article, some Loss types are illustrated advantages (disadvantages) and analyzed with examples. We may seek to maximize or minimize the objective function, meaning that we are searching for a candidate solution that has the highest or lowest score respectively. Typically, with neural networks that are one of the main part of the Artificial intelligence, we seek to minimize the error. As such, the objective function is often referred to as a cost function or a loss function and the value calculated by the loss function is referred to as simply “Loss.”
{"title":"The importance of loss function in artificial intelligence","authors":"Nodir Raximov, Jura Kuvandikov, Khasanov Dilmurod","doi":"10.1109/ICISCT55600.2022.10146883","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146883","url":null,"abstract":"As known, Artificial Intelligence is based on Machine Learning(ML) and Deep Learning(DL). And improving ML and DL is connected to Loss function in neural networks. In the importance optimization algorithms Loss function of great importance. There are different types of Loss function in Artificial Intelligence. In this article, some Loss types are illustrated advantages (disadvantages) and analyzed with examples. We may seek to maximize or minimize the objective function, meaning that we are searching for a candidate solution that has the highest or lowest score respectively. Typically, with neural networks that are one of the main part of the Artificial intelligence, we seek to minimize the error. As such, the objective function is often referred to as a cost function or a loss function and the value calculated by the loss function is referred to as simply “Loss.”","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129064021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146936
Halim Khujamatov, A. Lazarev, Nurshod Akhmedov
This article deals with the problems of VANET networks, which is a network of motor vehicles. Attention will be paid to such problems as: aggregation, clustering, broadcasting, routing, quality of service, security, etc. The article also discusses the process of transmitting and relaying data, and in order to reduce the load on the relay node, an algorithm will be proposed.
{"title":"Problems of Vanet Networks","authors":"Halim Khujamatov, A. Lazarev, Nurshod Akhmedov","doi":"10.1109/ICISCT55600.2022.10146936","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146936","url":null,"abstract":"This article deals with the problems of VANET networks, which is a network of motor vehicles. Attention will be paid to such problems as: aggregation, clustering, broadcasting, routing, quality of service, security, etc. The article also discusses the process of transmitting and relaying data, and in order to reduce the load on the relay node, an algorithm will be proposed.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146799
A.Q. Ergashev, O.Kh. Turakulov, A. Abdumalikov, O. A. Kayumov
In the work, algorithms for isolating the contours of images based on the theory of fuzzy sets are carried out, In this section, the state of the issue of image processing using the concept of fuzzy sets is considered in relation to the following tasks: improving image quality, image segmentation and outlining on images.
{"title":"Algorithms for highlighting the contours of images based on the theory of fuzzy sets","authors":"A.Q. Ergashev, O.Kh. Turakulov, A. Abdumalikov, O. A. Kayumov","doi":"10.1109/ICISCT55600.2022.10146799","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146799","url":null,"abstract":"In the work, algorithms for isolating the contours of images based on the theory of fuzzy sets are carried out, In this section, the state of the issue of image processing using the concept of fuzzy sets is considered in relation to the following tasks: improving image quality, image segmentation and outlining on images.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The present paper is devoted to study of a new type of lattice that is called pentagonal lattice. We define the von Neumann neighborhood of a cell in this lattice. After that, it is considered a linear Cellular Automata with von Neumann neighborhood over pentagonal lattice. We investigate this Cellular Automata with reflexive boundary condition. For the considered Cellular Automata, we construct the transition rule matrix over the field ℤp with reflexive boundary condition.
{"title":"2D Reflexive CA Rules over ℤp","authors":"Doston Jumaniyozov, Shovkat Redjepov, Otaxon Khudayberganov","doi":"10.1109/ICISCT55600.2022.10146761","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146761","url":null,"abstract":"The present paper is devoted to study of a new type of lattice that is called pentagonal lattice. We define the von Neumann neighborhood of a cell in this lattice. After that, it is considered a linear Cellular Automata with von Neumann neighborhood over pentagonal lattice. We investigate this Cellular Automata with reflexive boundary condition. For the considered Cellular Automata, we construct the transition rule matrix over the field ℤp with reflexive boundary condition.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121024306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
the purpose of the attack on the information system is separated and the clear cause and effect are formed. Taking this into account, the impact of the negative consequences of the type of damage is determined. the procedure of creating a list of sources of attack in the information system was seen, on the basis of which it was suggested that there is a need to see the set of events of the node state under the influence of the attack.
{"title":"The Procedure for Forming a List of Sources of Attack in the Information System","authors":"Bekmirzaev Obidjon Nuralievich, Muminov Bahodir Boltaevich, Bekmurodov Ulugbek Bahrom Ugli","doi":"10.1109/ICISCT55600.2022.10146884","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146884","url":null,"abstract":"the purpose of the attack on the information system is separated and the clear cause and effect are formed. Taking this into account, the impact of the negative consequences of the type of damage is determined. the procedure of creating a list of sources of attack in the information system was seen, on the basis of which it was suggested that there is a need to see the set of events of the node state under the influence of the attack.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114946198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}