Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10147019
Sergeev Alexandr
orthogonal and quasi-orthogonal matrices with a limited number of element values and structured in some way are of considerable interest for many technical applications related to image processing and signal coding. The paper classifies and considers cyclic matrices and matrices with cyclic blocks. Descriptions of noise-resistant encoding methods of images and their protective masking using such matrices are given. Based on the analysis of the autocorrelation functions of new code sequences obtained from strings of modified cyclic quasi-orthogonal matrices and the simulation performed, numerical values of the quality parameters of the new code sequences are given. It is shown that their application makes it possible to reduce the maximum level of the side lobe of the aperiodic autocorrelation function, which allows us to conclude that their application is promising and that signal coding algorithms can be revised.
{"title":"Cyclic Quasi-Orthogonal Matrices in Image and Signal Encoding","authors":"Sergeev Alexandr","doi":"10.1109/ICISCT55600.2022.10147019","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10147019","url":null,"abstract":"orthogonal and quasi-orthogonal matrices with a limited number of element values and structured in some way are of considerable interest for many technical applications related to image processing and signal coding. The paper classifies and considers cyclic matrices and matrices with cyclic blocks. Descriptions of noise-resistant encoding methods of images and their protective masking using such matrices are given. Based on the analysis of the autocorrelation functions of new code sequences obtained from strings of modified cyclic quasi-orthogonal matrices and the simulation performed, numerical values of the quality parameters of the new code sequences are given. It is shown that their application makes it possible to reduce the maximum level of the side lobe of the aperiodic autocorrelation function, which allows us to conclude that their application is promising and that signal coding algorithms can be revised.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127687822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/icisct55600.2022.10146879
N. Zaynalov, A. Shakarov, Muzaffar Saidmurodov, Abdinabi Mukhamadiyev, Dusmurod Kilichev
The development and development of means and methods of cryptography is directly accompanied by the development of cryptanalysis methods. The classical and one of the first methods of cryptanalysis is the frequency method. Historically, the first traces of frequency analysis of the text can be found in the works of scientists since the 10th century. And here the scientists of the East, such scientists as al-Kindi, made a great contribution to cryptanalysis. This paper presents an analysis of the frequencies of bigram of letters of the text in the Uzbek language. It should be noted that at the moment the Uzbek language is based on two alphabets, namely the Latin alphabet and the alphabet based on the Cyrillic alphabet. And now further changes in the alphabet of the Uzbek language are being considered. Determining the frequencies of bigram of the letters of the Latin alphabet of the Uzbek language is accompanied by difficulties associated with the fact that some letters are combinations of letters from the original alphabet and a symbol that is not in the alphabet, for example, the letter ‘ch’. Here the letter ‘h’ belongs to the given alphabet, but the letter ‘c’ does not. And this, in turn, leads to problems in the definitions of bigrams. Based on this, texts in the Uzbek language are analyzed here using the Cyrillic alphabet, where each letter corresponds to one character. Literary work is used as content. Based on this, in this article we present the results of determining the frequencies of bigram of letters of the Uzbek language based on the Cyrillic alphabet.
{"title":"Analysis of the Bigrams of the Letters of the Uzbek Alphabet for Cryptanalysis","authors":"N. Zaynalov, A. Shakarov, Muzaffar Saidmurodov, Abdinabi Mukhamadiyev, Dusmurod Kilichev","doi":"10.1109/icisct55600.2022.10146879","DOIUrl":"https://doi.org/10.1109/icisct55600.2022.10146879","url":null,"abstract":"The development and development of means and methods of cryptography is directly accompanied by the development of cryptanalysis methods. The classical and one of the first methods of cryptanalysis is the frequency method. Historically, the first traces of frequency analysis of the text can be found in the works of scientists since the 10th century. And here the scientists of the East, such scientists as al-Kindi, made a great contribution to cryptanalysis. This paper presents an analysis of the frequencies of bigram of letters of the text in the Uzbek language. It should be noted that at the moment the Uzbek language is based on two alphabets, namely the Latin alphabet and the alphabet based on the Cyrillic alphabet. And now further changes in the alphabet of the Uzbek language are being considered. Determining the frequencies of bigram of the letters of the Latin alphabet of the Uzbek language is accompanied by difficulties associated with the fact that some letters are combinations of letters from the original alphabet and a symbol that is not in the alphabet, for example, the letter ‘ch’. Here the letter ‘h’ belongs to the given alphabet, but the letter ‘c’ does not. And this, in turn, leads to problems in the definitions of bigrams. Based on this, texts in the Uzbek language are analyzed here using the Cyrillic alphabet, where each letter corresponds to one character. Literary work is used as content. Based on this, in this article we present the results of determining the frequencies of bigram of letters of the Uzbek language based on the Cyrillic alphabet.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146901
Hakan Yekta Yatbaz, Adnan Yazici, E. Ever
Different types of data sets are established using various sensor-based networks and wearable devices for performing human activity recognition that can be used effectively in the e-health domain. Various machine learning models and relevant algorithms are used to perform detection with high accuracy. Depending on the characteristics of the data set, validation methods used to compute the accuracy may vary. The correct validation of machine learning algorithms is essential to correctly assess the performance of the models especially when the data analysed are related to the health domain. Activity recognition algorithms based on sliding windows with different overlapping ratios are popularly used for validation together with popular cross-validation methods such as k-fold, leave-one-out and leave-one-subject-out. In this study, validation methods commonly used for windowing-based activity recognition systems using wearable devices are analyzed. The advantages and disadvantages of each method are discussed taking into account various parameters. A case study, using the well-known MHEALTH data set, is presented with state-of-the art machine learning approaches. Experimental testing with a second window size using 10-fold cross-validation, a five-second window size using leave one out cross-validation, and a second window size using 5 fold cross-validation gave the highest accuracy, 96.71%, 95.65% and 95% respectively while the window overlap is 50%.
{"title":"Critical Analysis of Validation Methods for Machine Learning Models Used in E-health Applications","authors":"Hakan Yekta Yatbaz, Adnan Yazici, E. Ever","doi":"10.1109/ICISCT55600.2022.10146901","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146901","url":null,"abstract":"Different types of data sets are established using various sensor-based networks and wearable devices for performing human activity recognition that can be used effectively in the e-health domain. Various machine learning models and relevant algorithms are used to perform detection with high accuracy. Depending on the characteristics of the data set, validation methods used to compute the accuracy may vary. The correct validation of machine learning algorithms is essential to correctly assess the performance of the models especially when the data analysed are related to the health domain. Activity recognition algorithms based on sliding windows with different overlapping ratios are popularly used for validation together with popular cross-validation methods such as k-fold, leave-one-out and leave-one-subject-out. In this study, validation methods commonly used for windowing-based activity recognition systems using wearable devices are analyzed. The advantages and disadvantages of each method are discussed taking into account various parameters. A case study, using the well-known MHEALTH data set, is presented with state-of-the art machine learning approaches. Experimental testing with a second window size using 10-fold cross-validation, a five-second window size using leave one out cross-validation, and a second window size using 5 fold cross-validation gave the highest accuracy, 96.71%, 95.65% and 95% respectively while the window overlap is 50%.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146826
Akhmad Olmasov, Kh. B. Mirzokulov, Bekmirzo Djaniyev, Nodirjon Mardiyev
This article presents the properties and capabilities of a patch antenna (printed antennas). In the course of scientific research, using the CST Studio environment, simulation modeling of a patch antenna was performed. The antenna model consists of a ground layer, a substrate and an exciter in the form of a strip patch antenna. In the course of simulation modeling, results were obtained for the parameter S (return loss) and the radiation pattern. Next, an experimental sample of the antenna was created and measurement work was carried out. The obtained results show that this antenna is broadband and works effectively in the UHF band.
{"title":"Printed Antenna for Signal Analysis in the UHF Band","authors":"Akhmad Olmasov, Kh. B. Mirzokulov, Bekmirzo Djaniyev, Nodirjon Mardiyev","doi":"10.1109/ICISCT55600.2022.10146826","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146826","url":null,"abstract":"This article presents the properties and capabilities of a patch antenna (printed antennas). In the course of scientific research, using the CST Studio environment, simulation modeling of a patch antenna was performed. The antenna model consists of a ground layer, a substrate and an exciter in the form of a strip patch antenna. In the course of simulation modeling, results were obtained for the parameter S (return loss) and the radiation pattern. Next, an experimental sample of the antenna was created and measurement work was carried out. The obtained results show that this antenna is broadband and works effectively in the UHF band.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146789
E. A. Borisova
The modern world has rejected the concept of absolute security due to the unattainability of the latter and has come to the concept of acceptable risk. The essence of the concept of acceptable risk lies in the desire to provide such a small security that society accepts in a given period of time, with which one can agree. Acceptable risk combines technical, economic, social and political aspects and represents some compromise between the level of safety and the possibilities of achieving it. Therefore, the development of acceptable risk skills based on interactive case technologies is the main task of the Life Safety discipline.
{"title":"Development of Acceptable Risk Skills Among Students of Technical Higher Educational Institutions Based on Interactive Case Technologies","authors":"E. A. Borisova","doi":"10.1109/ICISCT55600.2022.10146789","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146789","url":null,"abstract":"The modern world has rejected the concept of absolute security due to the unattainability of the latter and has come to the concept of acceptable risk. The essence of the concept of acceptable risk lies in the desire to provide such a small security that society accepts in a given period of time, with which one can agree. Acceptable risk combines technical, economic, social and political aspects and represents some compromise between the level of safety and the possibilities of achieving it. Therefore, the development of acceptable risk skills based on interactive case technologies is the main task of the Life Safety discipline.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125074758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The modern land cadastre is a multi-purpose information system that is maintained in order to provide reliable information to all interested government bodies and land users for organizing the most complete rational and efficient use of land and their protection, planning the location and specialization of agricultural production, land reclamation, as well as other activities related to land use. With the implementation of Geographic Information Systems, the technologies used in the maintenance of the state land cadastre are changing significantly, and electronic resources are the highest priority. Uzbekistan is actively working to modernize the existing “paper” cadastral registration system by creating a National Geographic Information System and a modern Integrated Cadastral Information System and real estate registration as part of electronic government using geoinformation and Web-technologies. As a result, a database was created and this cadastral information system was successfully tested as an effective tool for data management, operational interdepartmental integration of information, as well as for making effective decisions in the field of land management and regional development planning. This article discusses the main advantages and existing disadvantages of these systems.
{"title":"Integrated information system for cadastre based on GIS and Web technologies","authors":"Ilkhomjon Abdullaev, Abdumanap Nasirov, Jonibek Pirimov, Nargiza Abdullaeva","doi":"10.1109/ICISCT55600.2022.10146844","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146844","url":null,"abstract":"The modern land cadastre is a multi-purpose information system that is maintained in order to provide reliable information to all interested government bodies and land users for organizing the most complete rational and efficient use of land and their protection, planning the location and specialization of agricultural production, land reclamation, as well as other activities related to land use. With the implementation of Geographic Information Systems, the technologies used in the maintenance of the state land cadastre are changing significantly, and electronic resources are the highest priority. Uzbekistan is actively working to modernize the existing “paper” cadastral registration system by creating a National Geographic Information System and a modern Integrated Cadastral Information System and real estate registration as part of electronic government using geoinformation and Web-technologies. As a result, a database was created and this cadastral information system was successfully tested as an effective tool for data management, operational interdepartmental integration of information, as well as for making effective decisions in the field of land management and regional development planning. This article discusses the main advantages and existing disadvantages of these systems.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146809
M. Umarov, Jamshid Elov, Sirojiddin Khalilov, Inomjon Narzullayev, Marat Karimov
In the lighting conditions such as snowing, hazing, raining, and weak lighting condition, the accuracy of traffic sign recognition is not very high. It is important to develop an algorithms for real-time fast detection of road signs from video images and use them in driver assistance systems. Firstly, we image preprocessing by using dark channel prior based image dehazing for remove noises from the input image. In this article, we develop a transposed image filtering method combined with other fast parallel filtering algorithms. We propose a high-speed and high-accuracy method by improving image dehazing algorithms and analyzing GPU architecture. In this, we quickly removing fog from HD video images using DCP with image quality and visual effects.
{"title":"An algorithm for parallel processing of traffic signs video on a graphics processor","authors":"M. Umarov, Jamshid Elov, Sirojiddin Khalilov, Inomjon Narzullayev, Marat Karimov","doi":"10.1109/ICISCT55600.2022.10146809","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146809","url":null,"abstract":"In the lighting conditions such as snowing, hazing, raining, and weak lighting condition, the accuracy of traffic sign recognition is not very high. It is important to develop an algorithms for real-time fast detection of road signs from video images and use them in driver assistance systems. Firstly, we image preprocessing by using dark channel prior based image dehazing for remove noises from the input image. In this article, we develop a transposed image filtering method combined with other fast parallel filtering algorithms. We propose a high-speed and high-accuracy method by improving image dehazing algorithms and analyzing GPU architecture. In this, we quickly removing fog from HD video images using DCP with image quality and visual effects.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"14 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146850
Komil Rakhmatov, Kh. B. Mirzokulov
In this paper, we consider the problem of synthesizing a test signal from a given autocorrelation function. A formula for the energy spectrum is obtained. The method for synthesizing binary pulse processes proposed in this work makes it possible to simulate signals whose energy spectrum envelopes are close to the envelopes of the continuous part of the energy spectra of an equivalent first-order test sequence. The algorithm used in the calculations and the value of the parameter $lambda$ for the obtained pulse process are given. The problem of synthesizing pulse processes in this formulation is close to the problem of synthesizing quantum phase-shift keyed signals, usually used in radar, according to a given autocorrelation function.
{"title":"Synthesis of a test signal from a given autocorrelation function","authors":"Komil Rakhmatov, Kh. B. Mirzokulov","doi":"10.1109/ICISCT55600.2022.10146850","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146850","url":null,"abstract":"In this paper, we consider the problem of synthesizing a test signal from a given autocorrelation function. A formula for the energy spectrum is obtained. The method for synthesizing binary pulse processes proposed in this work makes it possible to simulate signals whose energy spectrum envelopes are close to the envelopes of the continuous part of the energy spectra of an equivalent first-order test sequence. The algorithm used in the calculations and the value of the parameter $lambda$ for the obtained pulse process are given. The problem of synthesizing pulse processes in this formulation is close to the problem of synthesizing quantum phase-shift keyed signals, usually used in radar, according to a given autocorrelation function.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146864
Bayram Fayzullaev
In this article liquid-gas on the example of the calcinated soda is considered as the solution of a problem of phase balance. The analytical method is used for the solution of an objective. Results which are calculated with the help the program Matlab 7.5 (R2007b) are given in a table form. The activity coefficient for an important component in the calcinated soda production of carbon dioxide is calculated. Concentration of gas for each component of production admissible pressure are given in a graphic form.
{"title":"Mathematical Modeling of Liquid-Gas Phase Equilibrium on the Example of Soda Production","authors":"Bayram Fayzullaev","doi":"10.1109/ICISCT55600.2022.10146864","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146864","url":null,"abstract":"In this article liquid-gas on the example of the calcinated soda is considered as the solution of a problem of phase balance. The analytical method is used for the solution of an objective. Results which are calculated with the help the program Matlab 7.5 (R2007b) are given in a table form. The activity coefficient for an important component in the calcinated soda production of carbon dioxide is calculated. Concentration of gas for each component of production admissible pressure are given in a graphic form.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-28DOI: 10.1109/ICISCT55600.2022.10146815
K. Tashev, Irgasheva Durdona, Agzamova Mokhinabonu
Nowadays the Internet is very massive and the need for a system to protect the networks from being attacked becomes very important. One of the main goals of studying pattern matching techniques is their significant role in real-world applications, such as the intrusion detection systems branch. The purpose of the network attack detection systems NIDS is to protect the info communication network from unauthorized access. This article provides an analysis of the exact match and fuzzy matching methods, and discusses a new implementation of the classic Aho-Corasick pattern matching algorithm at the hardware level. The proposed approach to the implementation of the Aho-Corasick algorithm can make it possible to ensure the efficient use of resources, such as memory and energy.
{"title":"Comparative performance analysis the Aho-Corasick algorithm for developing a network detection system","authors":"K. Tashev, Irgasheva Durdona, Agzamova Mokhinabonu","doi":"10.1109/ICISCT55600.2022.10146815","DOIUrl":"https://doi.org/10.1109/ICISCT55600.2022.10146815","url":null,"abstract":"Nowadays the Internet is very massive and the need for a system to protect the networks from being attacked becomes very important. One of the main goals of studying pattern matching techniques is their significant role in real-world applications, such as the intrusion detection systems branch. The purpose of the network attack detection systems NIDS is to protect the info communication network from unauthorized access. This article provides an analysis of the exact match and fuzzy matching methods, and discusses a new implementation of the classic Aho-Corasick pattern matching algorithm at the hardware level. The proposed approach to the implementation of the Aho-Corasick algorithm can make it possible to ensure the efficient use of resources, such as memory and energy.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130671895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}