{"title":"Application of acoustic-optical rebuild filters for optimize the spectral characteristics of fiber-optical communication networks","authors":"T. Radjabov, Z. T. Hakimov, A. Inogamov","doi":"10.1109/ICAICT.2010.5612008","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612008","url":null,"abstract":"In this paper we consider the methods of improving and optimization spectral characteristics fiber-optical networks. The main conceptions of using acoustic-optical rebuild filters and optical traveling wave amplifier are described.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121760783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using version control systems in software development","authors":"S. Kasimov, O. Djuraev","doi":"10.1109/ICAICT.2010.5612028","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612028","url":null,"abstract":"In the article version control systems (VCS) in software development are considered. Opportunity and main conceptions of VCS are analyzed.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Balancing the tasks between optical and electrical signal processing in Metro Networks","authors":"K. Aripov, U. A. Mavlyanov, F. R. Nasirkhodjaev","doi":"10.1109/ICAICT.2010.5612040","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612040","url":null,"abstract":"The given job is devoted to the analysis of current optical transport technologies in Metro networks, including current challenges and network development trends. Reconfigurable Optical Add/Drop Multiplexer (ROADM) based pure optical signal processing as well as its advantages and limitations are reviewed. Along with the solution of the key problems at the optical layer and maturity of corresponding technologies, the OTN will play a more and more important role in optical Metro networks, which will help eliminate ROADM shortcomings and can balance the Optical and Electrical signal processing features and will bring new values while network deployment.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132806091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"KETA: Public-key symmetric cryptosystem","authors":"B. Kabulov, N. Tashpulatova","doi":"10.1109/ICAICT.2010.5612069","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612069","url":null,"abstract":"The new method of encrypting has been developed. The difference from existing methods is that the identifier of one of the agreed plaintexts (resource files) and the number of the combinatorial permutation of symbols of the indicated resource file is being transmitted, but not the ciphertext. In this connection the developed cryptosystem was named KETA (Key Exist, cipherText Absent). The main idea of the method is based on that any text (plaintext) can be created in the result of permutations of symbols (and also by using some special methods) from any other given text.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy semantic hypernet for information authenticity controlling in electronic document circulation systems","authors":"I. I. Jumanov, A. Akhatov","doi":"10.1109/ICAICT.2010.5612063","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612063","url":null,"abstract":"To design the methods of textual information authenticity controlling in systems of electronic document circulation authors offered the new approaches based on application the fuzzy semantic hyphernet and use of statistical and structural information redundancy. The models, algorithms and programmed-sold modules of text processing authenticity controlling system are developed for extraction of structural characteristics, formation of relations, construction of information sources classes hierarchy. For developed methods and algorithms the comparative analysis of efficiency is carried out.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Imamverdiyev, H. Z. Asl, N. Janani, S. Siami, N. Babapoor, Sahar Nezhadseifi, B. Sami, Samira Faraji, Davar Pilevar, Maryam Bazel, E. Feyz
{"title":"A longitudinal study on degree centrality changes in a group of students","authors":"Y. Imamverdiyev, H. Z. Asl, N. Janani, S. Siami, N. Babapoor, Sahar Nezhadseifi, B. Sami, Samira Faraji, Davar Pilevar, Maryam Bazel, E. Feyz","doi":"10.1109/ICAICT.2010.5612057","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612057","url":null,"abstract":"We gathered the information about a group of female B. Sc. students at university for preparing their degree centralities. The degree centralities of this group were obtained by social network professional software in seven weeks. Finally the changes of degree centrality in these weeks are presented as charts and their differences were discussed.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116383634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deploying virtualization technology for verification of a network security","authors":"E. Abramov, O. Makarevich","doi":"10.1109/ICAICT.2010.5612012","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612012","url":null,"abstract":"This article discusses the issue of increasing the security of computer networks based on the constant verification of the level of information security. Simulation of the network, based on accurate data derived from the security audit, allows for constant monitoring of the level of network security. Using hardware virtualization to build models to avoid the restrictions of the programming model and apply the full range of information resources impacts for verification of security level is proposed.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"44 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123510523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods for assessing the effectiveness of information systems security","authors":"G. Saparova","doi":"10.1109/ICAICT.2010.5612019","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612019","url":null,"abstract":"In the article approach to determining the quality of information security systems is classified, indicators for assessing the quality and features of the calculation are given. A modified algorithm of Balash is described which allows to minimize the computational cost through the use of integer variables, addition and subtraction, and select the best direction of descent on a tree-making inherent in techniques such as branch and bound. A method of estimating the computational complexity of the algorithm using this modification is offered.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development Internet resources in Uzbekistan: Empirical investigation","authors":"A. Kuvnakov, S. Kasimov","doi":"10.1109/ICAICT.2010.5612068","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612068","url":null,"abstract":"This paper studies development Internet resources, driving force and use Internet, taking account local characteristics of Uzbekistan. The result shows that, intention to use Internet in local segment of Uzbekistan was significantly high in “business”, “entertainment” and “social”. Beside it comparable low visiting information resources in category of “science”, “education”, “divisions of Government” and requires additional strategies to development information resources in these categories.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121355937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inter-cell interference coordination with adaptive frequency-reuse for VoIP and data traffic in downlink of 3GPP-LTE","authors":"Zahra Bakhti, S. Moghaddam","doi":"10.1109/ICAICT.2010.5612042","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612042","url":null,"abstract":"One of the most important challenges is how to manage inter-cell interference. Special care has to be taken regarding voice traffic which has more strict requirements on delay and packet loss. The goal of inter-cell interference coordination schemes is to decrease inter-cell interference and get higher cell throughput, so we evaluated the performance of inter-cell interference coordination schemes containing reuse-one, reuse-three, reuse-one with power-planning, Soft frequency reuse and Fractional frequency reuse schemes. With considering high traffic load the best option regarding to the cell throughput what can be seen is the Fractional reuse with b=0.7 (b, percentage of reduced power sub-band). In the second step for interference control, adaptive reuse is proposed. The frequency reuse of the system can be changed in function of the proportion of voice users. When two traffic types are present at the same time reuse-one and reuse-three are the best schemes for data and voice, respectively. However the best scheme in performance for one traffic type is the worst for the other in general. The proposed algorithm gives a performance between reuse-one and reuse-three.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"127 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114011736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}