Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146896
A. Elmurodov, N.N. Yuldashev, R. Maqsudov, Gulnoz Abdikayimova
In this article, we study the behavior of two species evolving in a domain with a two-free boundary. This system mimics the spread of invasive or new predator species, in which free boundaries represent the expanding fronts of predator species and are described by the Stefan condition. A priori estimates for the required functions are established. These estimates are used to prove the existence and uniqueness of the solution.
{"title":"A Leslie-Gower predator-prey model with a two-free boundary","authors":"A. Elmurodov, N.N. Yuldashev, R. Maqsudov, Gulnoz Abdikayimova","doi":"10.1109/ICISCT55600.2022.10146896","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146896","url":null,"abstract":"In this article, we study the behavior of two species evolving in a domain with a two-free boundary. This system mimics the spread of invasive or new predator species, in which free boundaries represent the expanding fronts of predator species and are described by the Stefan condition. A priori estimates for the required functions are established. These estimates are used to prove the existence and uniqueness of the solution.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146734
Y. Shichkina, K. Krinkin
In this article we show that the transfer to a fundamentally new level of development of intelligent systems is possible if they are personified. The optimal way of transition to personified AI systems is their construction on the basis of the concept of co-evolutionary hybrid intelligence. In this article the basic principles of coevolutionary hybrid intelligence and their importance for the construction of a new generation of intelligent systems are considered. An example of creating a personalized intelligent human assistant for patients with Parkinson’s disease is given.
{"title":"Co- evolutionary hybrid intelligence technologies are the next step in the development of personalized intelligent human assistants","authors":"Y. Shichkina, K. Krinkin","doi":"10.1109/ICISCT55600.2022.10146734","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146734","url":null,"abstract":"In this article we show that the transfer to a fundamentally new level of development of intelligent systems is possible if they are personified. The optimal way of transition to personified AI systems is their construction on the basis of the concept of co-evolutionary hybrid intelligence. In this article the basic principles of coevolutionary hybrid intelligence and their importance for the construction of a new generation of intelligent systems are considered. An example of creating a personalized intelligent human assistant for patients with Parkinson’s disease is given.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131315490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146792
Asghar Ali Shah, Y. Khan
Tyrosine is a type of protein which is a chain of amino acid residues. It is utilized to synthesize proteins by eukaryotic. It is post-Translational modified (PTM) by its side chain hydeoxyl group by sulfation, phosphorylation, and nitration. Sulfotyrosine participate in protein-protein interaction. Sulfotyrosine is irreversible because still there is no enzymes that removes sulfate from tyrosine residue. Sulfotyrosines are identified in human diseases such as diabetes and Age-related Macular degeneration (AMD). It is very important to investigate the occurrence of sulfation in Tyrosine. There are many methods available to accurately predict Sulfotyrosines but most of them need more time and expert team. Therefore, a model is developed to predict sulfotyrosine accurately and efficiently and it is possible through machine learning algorithms which reduce cast and time. This study created a Machine through Logistic Regression which learnt statistical moments and can predict accurately. The prediction accuracy of this proposed model is 100%. The methodology of this study depends upon Chou’s 5-step rule.
{"title":"SulfoTyr-PseAAC: A Machine Learning Framework to Identify Sulfotyrosine Sites","authors":"Asghar Ali Shah, Y. Khan","doi":"10.1109/ICISCT55600.2022.10146792","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146792","url":null,"abstract":"Tyrosine is a type of protein which is a chain of amino acid residues. It is utilized to synthesize proteins by eukaryotic. It is post-Translational modified (PTM) by its side chain hydeoxyl group by sulfation, phosphorylation, and nitration. Sulfotyrosine participate in protein-protein interaction. Sulfotyrosine is irreversible because still there is no enzymes that removes sulfate from tyrosine residue. Sulfotyrosines are identified in human diseases such as diabetes and Age-related Macular degeneration (AMD). It is very important to investigate the occurrence of sulfation in Tyrosine. There are many methods available to accurately predict Sulfotyrosines but most of them need more time and expert team. Therefore, a model is developed to predict sulfotyrosine accurately and efficiently and it is possible through machine learning algorithms which reduce cast and time. This study created a Machine through Logistic Regression which learnt statistical moments and can predict accurately. The prediction accuracy of this proposed model is 100%. The methodology of this study depends upon Chou’s 5-step rule.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133190298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146984
Khudayshukur Kuzibaev, T.K. Urazmatov, B. B. Nurmetova
The article analyzes the use of big data in healthcare. Various approaches have been described to the definition of the concept (Big Data), the scope of this technology; the most demanded technologies by industries are shown. Considered the prerequisites for the use of big data in healthcare, as well as the advantages and disadvantages of using big data in healthcare. The historical experience of using Big Data in Uzbekistan and the USA is noted, specific examples of application in Uzbekistan, Europe, the USA, and China are analyzed. The article provides a forecast for the big data market in Uzbekistan healthcare and shows a practical example of using Python as part of the analysis large flow of medical data. Conclusions are drawn about the characteristic trends in the use of large data in different countries. The conclusion is made about the importance of using big data in healthcare.
{"title":"The use of Big Data in the field healthcare: Uzbekistan and foreign experience","authors":"Khudayshukur Kuzibaev, T.K. Urazmatov, B. B. Nurmetova","doi":"10.1109/ICISCT55600.2022.10146984","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146984","url":null,"abstract":"The article analyzes the use of big data in healthcare. Various approaches have been described to the definition of the concept (Big Data), the scope of this technology; the most demanded technologies by industries are shown. Considered the prerequisites for the use of big data in healthcare, as well as the advantages and disadvantages of using big data in healthcare. The historical experience of using Big Data in Uzbekistan and the USA is noted, specific examples of application in Uzbekistan, Europe, the USA, and China are analyzed. The article provides a forecast for the big data market in Uzbekistan healthcare and shows a practical example of using Python as part of the analysis large flow of medical data. Conclusions are drawn about the characteristic trends in the use of large data in different countries. The conclusion is made about the importance of using big data in healthcare.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132100275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146789
E. A. Borisova
The modern world has rejected the concept of absolute security due to the unattainability of the latter and has come to the concept of acceptable risk. The essence of the concept of acceptable risk lies in the desire to provide such a small security that society accepts in a given period of time, with which one can agree. Acceptable risk combines technical, economic, social and political aspects and represents some compromise between the level of safety and the possibilities of achieving it. Therefore, the development of acceptable risk skills based on interactive case technologies is the main task of the Life Safety discipline.
{"title":"Development of Acceptable Risk Skills Among Students of Technical Higher Educational Institutions Based on Interactive Case Technologies","authors":"E. A. Borisova","doi":"10.1109/ICISCT55600.2022.10146789","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146789","url":null,"abstract":"The modern world has rejected the concept of absolute security due to the unattainability of the latter and has come to the concept of acceptable risk. The essence of the concept of acceptable risk lies in the desire to provide such a small security that society accepts in a given period of time, with which one can agree. Acceptable risk combines technical, economic, social and political aspects and represents some compromise between the level of safety and the possibilities of achieving it. Therefore, the development of acceptable risk skills based on interactive case technologies is the main task of the Life Safety discipline.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125074758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/icisct55600.2022.10146879
N. Zaynalov, A. Shakarov, Muzaffar Saidmurodov, Abdinabi Mukhamadiyev, Dusmurod Kilichev
The development and development of means and methods of cryptography is directly accompanied by the development of cryptanalysis methods. The classical and one of the first methods of cryptanalysis is the frequency method. Historically, the first traces of frequency analysis of the text can be found in the works of scientists since the 10th century. And here the scientists of the East, such scientists as al-Kindi, made a great contribution to cryptanalysis. This paper presents an analysis of the frequencies of bigram of letters of the text in the Uzbek language. It should be noted that at the moment the Uzbek language is based on two alphabets, namely the Latin alphabet and the alphabet based on the Cyrillic alphabet. And now further changes in the alphabet of the Uzbek language are being considered. Determining the frequencies of bigram of the letters of the Latin alphabet of the Uzbek language is accompanied by difficulties associated with the fact that some letters are combinations of letters from the original alphabet and a symbol that is not in the alphabet, for example, the letter ‘ch’. Here the letter ‘h’ belongs to the given alphabet, but the letter ‘c’ does not. And this, in turn, leads to problems in the definitions of bigrams. Based on this, texts in the Uzbek language are analyzed here using the Cyrillic alphabet, where each letter corresponds to one character. Literary work is used as content. Based on this, in this article we present the results of determining the frequencies of bigram of letters of the Uzbek language based on the Cyrillic alphabet.
{"title":"Analysis of the Bigrams of the Letters of the Uzbek Alphabet for Cryptanalysis","authors":"N. Zaynalov, A. Shakarov, Muzaffar Saidmurodov, Abdinabi Mukhamadiyev, Dusmurod Kilichev","doi":"10.1109/icisct55600.2022.10146879","DOIUrl":"https://doi.org/10.1109/icisct55600.2022.10146879","url":null,"abstract":"The development and development of means and methods of cryptography is directly accompanied by the development of cryptanalysis methods. The classical and one of the first methods of cryptanalysis is the frequency method. Historically, the first traces of frequency analysis of the text can be found in the works of scientists since the 10th century. And here the scientists of the East, such scientists as al-Kindi, made a great contribution to cryptanalysis. This paper presents an analysis of the frequencies of bigram of letters of the text in the Uzbek language. It should be noted that at the moment the Uzbek language is based on two alphabets, namely the Latin alphabet and the alphabet based on the Cyrillic alphabet. And now further changes in the alphabet of the Uzbek language are being considered. Determining the frequencies of bigram of the letters of the Latin alphabet of the Uzbek language is accompanied by difficulties associated with the fact that some letters are combinations of letters from the original alphabet and a symbol that is not in the alphabet, for example, the letter ‘ch’. Here the letter ‘h’ belongs to the given alphabet, but the letter ‘c’ does not. And this, in turn, leads to problems in the definitions of bigrams. Based on this, texts in the Uzbek language are analyzed here using the Cyrillic alphabet, where each letter corresponds to one character. Literary work is used as content. Based on this, in this article we present the results of determining the frequencies of bigram of letters of the Uzbek language based on the Cyrillic alphabet.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The present paper is devoted to study of a new type of lattice that is called pentagonal lattice. We define the von Neumann neighborhood of a cell in this lattice. After that, it is considered a linear Cellular Automata with von Neumann neighborhood over pentagonal lattice. We investigate this Cellular Automata with reflexive boundary condition. For the considered Cellular Automata, we construct the transition rule matrix over the field ℤp with reflexive boundary condition.
{"title":"2D Reflexive CA Rules over ℤp","authors":"Doston Jumaniyozov, Shovkat Redjepov, Otaxon Khudayberganov","doi":"10.1109/ICISCT55600.2022.10146761","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146761","url":null,"abstract":"The present paper is devoted to study of a new type of lattice that is called pentagonal lattice. We define the von Neumann neighborhood of a cell in this lattice. After that, it is considered a linear Cellular Automata with von Neumann neighborhood over pentagonal lattice. We investigate this Cellular Automata with reflexive boundary condition. For the considered Cellular Automata, we construct the transition rule matrix over the field ℤp with reflexive boundary condition.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121024306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146799
A.Q. Ergashev, O.Kh. Turakulov, A. Abdumalikov, O. A. Kayumov
In the work, algorithms for isolating the contours of images based on the theory of fuzzy sets are carried out, In this section, the state of the issue of image processing using the concept of fuzzy sets is considered in relation to the following tasks: improving image quality, image segmentation and outlining on images.
{"title":"Algorithms for highlighting the contours of images based on the theory of fuzzy sets","authors":"A.Q. Ergashev, O.Kh. Turakulov, A. Abdumalikov, O. A. Kayumov","doi":"10.1109/ICISCT55600.2022.10146799","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146799","url":null,"abstract":"In the work, algorithms for isolating the contours of images based on the theory of fuzzy sets are carried out, In this section, the state of the issue of image processing using the concept of fuzzy sets is considered in relation to the following tasks: improving image quality, image segmentation and outlining on images.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
the purpose of the attack on the information system is separated and the clear cause and effect are formed. Taking this into account, the impact of the negative consequences of the type of damage is determined. the procedure of creating a list of sources of attack in the information system was seen, on the basis of which it was suggested that there is a need to see the set of events of the node state under the influence of the attack.
{"title":"The Procedure for Forming a List of Sources of Attack in the Information System","authors":"Bekmirzaev Obidjon Nuralievich, Muminov Bahodir Boltaevich, Bekmurodov Ulugbek Bahrom Ugli","doi":"10.1109/ICISCT55600.2022.10146884","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146884","url":null,"abstract":"the purpose of the attack on the information system is separated and the clear cause and effect are formed. Taking this into account, the impact of the negative consequences of the type of damage is determined. the procedure of creating a list of sources of attack in the information system was seen, on the basis of which it was suggested that there is a need to see the set of events of the node state under the influence of the attack.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114946198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146826
Akhmad Olmasov, Kh. B. Mirzokulov, Bekmirzo Djaniyev, Nodirjon Mardiyev
This article presents the properties and capabilities of a patch antenna (printed antennas). In the course of scientific research, using the CST Studio environment, simulation modeling of a patch antenna was performed. The antenna model consists of a ground layer, a substrate and an exciter in the form of a strip patch antenna. In the course of simulation modeling, results were obtained for the parameter S (return loss) and the radiation pattern. Next, an experimental sample of the antenna was created and measurement work was carried out. The obtained results show that this antenna is broadband and works effectively in the UHF band.
{"title":"Printed Antenna for Signal Analysis in the UHF Band","authors":"Akhmad Olmasov, Kh. B. Mirzokulov, Bekmirzo Djaniyev, Nodirjon Mardiyev","doi":"10.1109/ICISCT55600.2022.10146826","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146826","url":null,"abstract":"This article presents the properties and capabilities of a patch antenna (printed antennas). In the course of scientific research, using the CST Studio environment, simulation modeling of a patch antenna was performed. The antenna model consists of a ground layer, a substrate and an exciter in the form of a strip patch antenna. In the course of simulation modeling, results were obtained for the parameter S (return loss) and the radiation pattern. Next, an experimental sample of the antenna was created and measurement work was carried out. The obtained results show that this antenna is broadband and works effectively in the UHF band.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}