The modern land cadastre is a multi-purpose information system that is maintained in order to provide reliable information to all interested government bodies and land users for organizing the most complete rational and efficient use of land and their protection, planning the location and specialization of agricultural production, land reclamation, as well as other activities related to land use. With the implementation of Geographic Information Systems, the technologies used in the maintenance of the state land cadastre are changing significantly, and electronic resources are the highest priority. Uzbekistan is actively working to modernize the existing “paper” cadastral registration system by creating a National Geographic Information System and a modern Integrated Cadastral Information System and real estate registration as part of electronic government using geoinformation and Web-technologies. As a result, a database was created and this cadastral information system was successfully tested as an effective tool for data management, operational interdepartmental integration of information, as well as for making effective decisions in the field of land management and regional development planning. This article discusses the main advantages and existing disadvantages of these systems.
{"title":"Integrated information system for cadastre based on GIS and Web technologies","authors":"Ilkhomjon Abdullaev, Abdumanap Nasirov, Jonibek Pirimov, Nargiza Abdullaeva","doi":"10.1109/ICISCT55600.2022.10146844","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146844","url":null,"abstract":"The modern land cadastre is a multi-purpose information system that is maintained in order to provide reliable information to all interested government bodies and land users for organizing the most complete rational and efficient use of land and their protection, planning the location and specialization of agricultural production, land reclamation, as well as other activities related to land use. With the implementation of Geographic Information Systems, the technologies used in the maintenance of the state land cadastre are changing significantly, and electronic resources are the highest priority. Uzbekistan is actively working to modernize the existing “paper” cadastral registration system by creating a National Geographic Information System and a modern Integrated Cadastral Information System and real estate registration as part of electronic government using geoinformation and Web-technologies. As a result, a database was created and this cadastral information system was successfully tested as an effective tool for data management, operational interdepartmental integration of information, as well as for making effective decisions in the field of land management and regional development planning. This article discusses the main advantages and existing disadvantages of these systems.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146901
Hakan Yekta Yatbaz, Adnan Yazici, E. Ever
Different types of data sets are established using various sensor-based networks and wearable devices for performing human activity recognition that can be used effectively in the e-health domain. Various machine learning models and relevant algorithms are used to perform detection with high accuracy. Depending on the characteristics of the data set, validation methods used to compute the accuracy may vary. The correct validation of machine learning algorithms is essential to correctly assess the performance of the models especially when the data analysed are related to the health domain. Activity recognition algorithms based on sliding windows with different overlapping ratios are popularly used for validation together with popular cross-validation methods such as k-fold, leave-one-out and leave-one-subject-out. In this study, validation methods commonly used for windowing-based activity recognition systems using wearable devices are analyzed. The advantages and disadvantages of each method are discussed taking into account various parameters. A case study, using the well-known MHEALTH data set, is presented with state-of-the art machine learning approaches. Experimental testing with a second window size using 10-fold cross-validation, a five-second window size using leave one out cross-validation, and a second window size using 5 fold cross-validation gave the highest accuracy, 96.71%, 95.65% and 95% respectively while the window overlap is 50%.
{"title":"Critical Analysis of Validation Methods for Machine Learning Models Used in E-health Applications","authors":"Hakan Yekta Yatbaz, Adnan Yazici, E. Ever","doi":"10.1109/ICISCT55600.2022.10146901","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146901","url":null,"abstract":"Different types of data sets are established using various sensor-based networks and wearable devices for performing human activity recognition that can be used effectively in the e-health domain. Various machine learning models and relevant algorithms are used to perform detection with high accuracy. Depending on the characteristics of the data set, validation methods used to compute the accuracy may vary. The correct validation of machine learning algorithms is essential to correctly assess the performance of the models especially when the data analysed are related to the health domain. Activity recognition algorithms based on sliding windows with different overlapping ratios are popularly used for validation together with popular cross-validation methods such as k-fold, leave-one-out and leave-one-subject-out. In this study, validation methods commonly used for windowing-based activity recognition systems using wearable devices are analyzed. The advantages and disadvantages of each method are discussed taking into account various parameters. A case study, using the well-known MHEALTH data set, is presented with state-of-the art machine learning approaches. Experimental testing with a second window size using 10-fold cross-validation, a five-second window size using leave one out cross-validation, and a second window size using 5 fold cross-validation gave the highest accuracy, 96.71%, 95.65% and 95% respectively while the window overlap is 50%.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146936
Halim Khujamatov, A. Lazarev, Nurshod Akhmedov
This article deals with the problems of VANET networks, which is a network of motor vehicles. Attention will be paid to such problems as: aggregation, clustering, broadcasting, routing, quality of service, security, etc. The article also discusses the process of transmitting and relaying data, and in order to reduce the load on the relay node, an algorithm will be proposed.
{"title":"Problems of Vanet Networks","authors":"Halim Khujamatov, A. Lazarev, Nurshod Akhmedov","doi":"10.1109/ICISCT55600.2022.10146936","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146936","url":null,"abstract":"This article deals with the problems of VANET networks, which is a network of motor vehicles. Attention will be paid to such problems as: aggregation, clustering, broadcasting, routing, quality of service, security, etc. The article also discusses the process of transmitting and relaying data, and in order to reduce the load on the relay node, an algorithm will be proposed.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10147000
Kunduz Medetova, Djamshid Sultanov
This paper presents methods for solving problems using the method of fuzzy logic. This method serves to study the characteristics of determining the level of compliance of a candidate for an existing vacant position. When measuring compliance with database requirements based on the results of assessing compliance with the requirements of an employee for a position. The use of artificial intelligence in personnel records gives high efficiency and serves for decision making.
{"title":"Applications of Fuzzy Logic in Recruitment Systems","authors":"Kunduz Medetova, Djamshid Sultanov","doi":"10.1109/ICISCT55600.2022.10147000","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10147000","url":null,"abstract":"This paper presents methods for solving problems using the method of fuzzy logic. This method serves to study the characteristics of determining the level of compliance of a candidate for an existing vacant position. When measuring compliance with database requirements based on the results of assessing compliance with the requirements of an employee for a position. The use of artificial intelligence in personnel records gives high efficiency and serves for decision making.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10147019
Sergeev Alexandr
orthogonal and quasi-orthogonal matrices with a limited number of element values and structured in some way are of considerable interest for many technical applications related to image processing and signal coding. The paper classifies and considers cyclic matrices and matrices with cyclic blocks. Descriptions of noise-resistant encoding methods of images and their protective masking using such matrices are given. Based on the analysis of the autocorrelation functions of new code sequences obtained from strings of modified cyclic quasi-orthogonal matrices and the simulation performed, numerical values of the quality parameters of the new code sequences are given. It is shown that their application makes it possible to reduce the maximum level of the side lobe of the aperiodic autocorrelation function, which allows us to conclude that their application is promising and that signal coding algorithms can be revised.
{"title":"Cyclic Quasi-Orthogonal Matrices in Image and Signal Encoding","authors":"Sergeev Alexandr","doi":"10.1109/ICISCT55600.2022.10147019","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10147019","url":null,"abstract":"orthogonal and quasi-orthogonal matrices with a limited number of element values and structured in some way are of considerable interest for many technical applications related to image processing and signal coding. The paper classifies and considers cyclic matrices and matrices with cyclic blocks. Descriptions of noise-resistant encoding methods of images and their protective masking using such matrices are given. Based on the analysis of the autocorrelation functions of new code sequences obtained from strings of modified cyclic quasi-orthogonal matrices and the simulation performed, numerical values of the quality parameters of the new code sequences are given. It is shown that their application makes it possible to reduce the maximum level of the side lobe of the aperiodic autocorrelation function, which allows us to conclude that their application is promising and that signal coding algorithms can be revised.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127687822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146883
Nodir Raximov, Jura Kuvandikov, Khasanov Dilmurod
As known, Artificial Intelligence is based on Machine Learning(ML) and Deep Learning(DL). And improving ML and DL is connected to Loss function in neural networks. In the importance optimization algorithms Loss function of great importance. There are different types of Loss function in Artificial Intelligence. In this article, some Loss types are illustrated advantages (disadvantages) and analyzed with examples. We may seek to maximize or minimize the objective function, meaning that we are searching for a candidate solution that has the highest or lowest score respectively. Typically, with neural networks that are one of the main part of the Artificial intelligence, we seek to minimize the error. As such, the objective function is often referred to as a cost function or a loss function and the value calculated by the loss function is referred to as simply “Loss.”
{"title":"The importance of loss function in artificial intelligence","authors":"Nodir Raximov, Jura Kuvandikov, Khasanov Dilmurod","doi":"10.1109/ICISCT55600.2022.10146883","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146883","url":null,"abstract":"As known, Artificial Intelligence is based on Machine Learning(ML) and Deep Learning(DL). And improving ML and DL is connected to Loss function in neural networks. In the importance optimization algorithms Loss function of great importance. There are different types of Loss function in Artificial Intelligence. In this article, some Loss types are illustrated advantages (disadvantages) and analyzed with examples. We may seek to maximize or minimize the objective function, meaning that we are searching for a candidate solution that has the highest or lowest score respectively. Typically, with neural networks that are one of the main part of the Artificial intelligence, we seek to minimize the error. As such, the objective function is often referred to as a cost function or a loss function and the value calculated by the loss function is referred to as simply “Loss.”","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129064021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146790
A. Yusupov, A. E. Atamuratov, A. Abdikarimov, T. A. Atamuratov, K. Sattarov, M. Rakhmatullaeva, J. Chedjou, K. Kyamakya
This paper reviews extant literature on the memristor as one of the main elements of neuromorphic computing, in particular, the future of artificial intelligence. It outlines the main characteristics and parameters of memristors based on various active layers. In particular, the paper discusses the memristors based on two-dimensional materials of planar and vertical architecture. The physical mechanisms of resistive switching on which the principles of operation of memristors are based are considered separately. At the end of the article, we point out the main advantages and disadvantages in comparison with the existing memory elements used in classical computers.
{"title":"Memristors: types, characteristics and prospects of use as the main element of the future artificial intelligence","authors":"A. Yusupov, A. E. Atamuratov, A. Abdikarimov, T. A. Atamuratov, K. Sattarov, M. Rakhmatullaeva, J. Chedjou, K. Kyamakya","doi":"10.1109/ICISCT55600.2022.10146790","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146790","url":null,"abstract":"This paper reviews extant literature on the memristor as one of the main elements of neuromorphic computing, in particular, the future of artificial intelligence. It outlines the main characteristics and parameters of memristors based on various active layers. In particular, the paper discusses the memristors based on two-dimensional materials of planar and vertical architecture. The physical mechanisms of resistive switching on which the principles of operation of memristors are based are considered separately. At the end of the article, we point out the main advantages and disadvantages in comparison with the existing memory elements used in classical computers.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"171 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146762
B. Assanovich, Alexey Ivanov, Vadim Savenkov
A greedy modified allocation algorithm for the computer network monitoring based on iterative maximization of path coverage in network graph is developed and a multiagent approach for the implementation of network analysis is presented. Experiments have demonstrated an improvement in the performance of network monitoring when agents are trained, interact and coordinate.
{"title":"Multi-Agent Approach for Monitoring of Computer Networks","authors":"B. Assanovich, Alexey Ivanov, Vadim Savenkov","doi":"10.1109/ICISCT55600.2022.10146762","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146762","url":null,"abstract":"A greedy modified allocation algorithm for the computer network monitoring based on iterative maximization of path coverage in network graph is developed and a multiagent approach for the implementation of network analysis is presented. Experiments have demonstrated an improvement in the performance of network monitoring when agents are trained, interact and coordinate.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115330969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146926
A. Muradova, D. Normatova
The article presents the results of a research of the reliability of a multiservice communication network (MCN) according to the developed model, taking into account the priority of voice, video and data packets. Based on the developed model, a research was made of the main reliability parameters, taking into account the priority of speech, video and data packets. In the research of the main parameters of reliability, the Kendall classification is used. The multiservice communication network is presented as the model used in Kendall’s classification. For such a network, a mathematical apparatus is used, based on the probabilistic interpretation of the Laplace-Style transformations, the probabilities of timely delivery of Qk packets to the MCN network for any priority are determined. Based on the results obtained, conclusions are drawn.
{"title":"The results of a research of the reliability of the multiservice communication network","authors":"A. Muradova, D. Normatova","doi":"10.1109/ICISCT55600.2022.10146926","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146926","url":null,"abstract":"The article presents the results of a research of the reliability of a multiservice communication network (MCN) according to the developed model, taking into account the priority of voice, video and data packets. Based on the developed model, a research was made of the main reliability parameters, taking into account the priority of speech, video and data packets. In the research of the main parameters of reliability, the Kendall classification is used. The multiservice communication network is presented as the model used in Kendall’s classification. For such a network, a mathematical apparatus is used, based on the probabilistic interpretation of the Laplace-Style transformations, the probabilities of timely delivery of Qk packets to the MCN network for any priority are determined. Based on the results obtained, conclusions are drawn.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146885
U. K. Matyokubov, M. Muradov, O.B. Djumaniyozov
Currently, the energy consumption of modern mobile communication networks is increasing. Reducing the energy consumption of mobile networks is a key parameter for the economic efficiency of telecom operators. As a result of issues such as energy management, renewable energy and sustainable energy supply, mobile operators are making serious efforts to reduce the energy consumption of large-scale computing and communication systems. Currently, 3% of global energy is consumed by ICT infrastructure, which accounts for approximately 2% of global CO2 emissions.. Approaches to reduce CO2 emissions are an important factor in network design. This article analyzes the provision of mobile communication base stations in Khorezm region with sustainable energy sources, taking into account the reduction of CO2 gas impact on nature in the use of renewable energy sources in base stations. The issues of using renewable energy sources in providing the base station with stable energy were considered. The main task of this work is to analyze the high efficiency of green energy use, taking into account the climatic conditions of the region, geographical location, energy consumption of base stations.
{"title":"Analysis of Sustainable Energy Sources of Mobile Communication Base Stations in the Case of Khorazm Region","authors":"U. K. Matyokubov, M. Muradov, O.B. Djumaniyozov","doi":"10.1109/ICISCT55600.2022.10146885","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146885","url":null,"abstract":"Currently, the energy consumption of modern mobile communication networks is increasing. Reducing the energy consumption of mobile networks is a key parameter for the economic efficiency of telecom operators. As a result of issues such as energy management, renewable energy and sustainable energy supply, mobile operators are making serious efforts to reduce the energy consumption of large-scale computing and communication systems. Currently, 3% of global energy is consumed by ICT infrastructure, which accounts for approximately 2% of global CO2 emissions.. Approaches to reduce CO2 emissions are an important factor in network design. This article analyzes the provision of mobile communication base stations in Khorezm region with sustainable energy sources, taking into account the reduction of CO2 gas impact on nature in the use of renewable energy sources in base stations. The issues of using renewable energy sources in providing the base station with stable energy were considered. The main task of this work is to analyze the high efficiency of green energy use, taking into account the climatic conditions of the region, geographical location, energy consumption of base stations.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127333042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}