Tashkent University of Information Technology

www.tuit.uz
Amir Timur, Uzbekistan
SEARCH FILTERS
Time filter
Source Type

Porubay O.,Tashkent University of Information Technology
2016 International Conference on Information Science and Communications Technologies, ICISCT 2016 | Year: 2016

Despite the fact that 'wavelet theory' was many times considered by scientists and the whole scientific direction connected with wavelet theory appeared recent years, it is still impossible to say exactly what wavelet is and what function are called wavelet function. Wavelets can be orthogonal Semiorthogonal and biorthogonal. These functions may be symmetrical, asymmetrical and unbalanced. This article details the concept of 'wavelet' are examples of different wavelets, the application of wavelet transforms, as well as a comparison of different wavelet - transformations in compression information. © 2016 IEEE.


Faxrutdinov R.M.,Tashkent University of Information Technology | Karimova V.A.,Tashkent University of Information Technology
2016 International Conference on Information Science and Communications Technologies, ICISCT 2016 | Year: 2016

The work devoted to modeling graduates monitoring processes based on data mining, including a model of oscillations change the number of graduates from the profile employment and cluster analysis of the data by the method of k-means, using the contingency tables, the chi-square test and Spearman correlation coefficients. The practical part is implemented in Java object-oriented language in the NetBeans IDE. © 2016 IEEE.


Olimjonovich M.S.,Tashkent University of Information Technology
2016 International Conference on Information Science and Communications Technologies, ICISCT 2016 | Year: 2016

In given article are described review of new network technologies: Software Defined Networks and Network Functions Virtualization, which are developing rapidly at present. The limitations of traditional network architectures that do not allow to meet the needs of the business. Principles of construction and performance study of the SDN, Network management tools and data flows on the basis of SDN. © 2016 IEEE.


Nishanbayev T.N.,Tashkent University of Information Technology | Abdullayev M.M.,Tashkent University of Information Technology
2016 International Conference on Information Science and Communications Technologies, ICISCT 2016 | Year: 2016

In the article the expediency of distributed resources and services of the company by creating a service-oriented corporate information system. © 2016 IEEE.


Karimovich G.S.,Tashkent University of Information Technology | Turakulovich K.Z.,Tashkent University of Information Technology
2016 International Conference on Information Science and Communications Technologies, ICISCT 2016 | Year: 2016

Key management, particularly, biometric cryptosystem is an exciting field in the system security domain. The challenges associated with this domain need to be addressed in detail since the security of the biometric template is itself a big challenge. Biometric template once lost or copied cannot be changed like simple password. This paper summarizes and discusses major challenges of biometric cryptosystem; categorization of the attacks and their known remedies has also been highlighted. © 2016 IEEE.


Gulomov S.R.,Tashkent University of Information Technology | Bakhtiyorovich N.N.,Tashkent University of Information Technology
2016 International Conference on Information Science and Communications Technologies, ICISCT 2016 | Year: 2016

This article is presented a method assessment of security intrusion detection system, allows operatively regulate the threshold formation an alarm and provides a quantitative and qualitative assessment of security of the network. Mathematical model of a special filtering traffic mode, allow to neutralize and prevent possible threats and attacks on computer networks is designed. © 2016 IEEE.


Rakhmanov A.,Tashkent University of Information Technology | Ibragimov G.,University Putra Malaysia
AIP Conference Proceedings | Year: 2016

We consider a simple motion pursuit differential game of one pursuer and one evader. Control of the pursuer is subjected to integral constraint, and that of the evader is subjected to geometric constraint. More precisely, value of control parameter of the evader belongs to a given convex subset of n. Pursuit is completed if the evader becomes in l vicinity of the pursuer. Sufficient conditions of completion of pursuit are obtained. © 2016 Author(s).


Muradova A.A.,Tashkent University of Information Technology
2013 International Siberian Conference on Control and Communications, SIBCON 2013 - Proceedings | Year: 2013

This article summarizes the main points of the algorithm and program for calculating the structural reliability of the NGN network using a statistical simulation method, which allows the designer for a short time to analyze the reliability of the designed network. © 2013 IEEE.


Safibullaevna B.S.,Tashkent University of Information Technology
8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Conference Proceedings | Year: 2014

This paper addresses the problem of improving the effectiveness of management information and educational resources in particular media courses designed by media education system and to improve their quality.


Sadullaeva S.A.,Tashkent University of Information Technology
Journal of Siberian Federal University - Mathematics and Physics | Year: 2016

In this paper we demonstrate the possibilities of the self-similar and approximately self-similar approaches for studying solutions of a nonlinear mutual reaction-diffusion system. The asymptotic behavior of compactly supported solutions and free boundary is studied. Based on established qualitative properties of solutions numerical computation is carried out. The solutions are presented in visualization form, which allows observing evolution of the studied process in time. © Siberian Federal University. All rights reserved.

Loading Tashkent University of Information Technology collaborators
Loading Tashkent University of Information Technology collaborators