2010 4th International Conference on Application of Information and Communication Technologies最新文献

筛选
英文 中文
Application of acoustic-optical rebuild filters for optimize the spectral characteristics of fiber-optical communication networks 声光重构滤波器在优化光纤通信网络频谱特性中的应用
T. Radjabov, Z. T. Hakimov, A. Inogamov
{"title":"Application of acoustic-optical rebuild filters for optimize the spectral characteristics of fiber-optical communication networks","authors":"T. Radjabov, Z. T. Hakimov, A. Inogamov","doi":"10.1109/ICAICT.2010.5612008","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612008","url":null,"abstract":"In this paper we consider the methods of improving and optimization spectral characteristics fiber-optical networks. The main conceptions of using acoustic-optical rebuild filters and optical traveling wave amplifier are described.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121760783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using version control systems in software development 在软件开发中使用版本控制系统
S. Kasimov, O. Djuraev
{"title":"Using version control systems in software development","authors":"S. Kasimov, O. Djuraev","doi":"10.1109/ICAICT.2010.5612028","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612028","url":null,"abstract":"In the article version control systems (VCS) in software development are considered. Opportunity and main conceptions of VCS are analyzed.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balancing the tasks between optical and electrical signal processing in Metro Networks 城域网络中光与电信号处理任务的平衡
K. Aripov, U. A. Mavlyanov, F. R. Nasirkhodjaev
{"title":"Balancing the tasks between optical and electrical signal processing in Metro Networks","authors":"K. Aripov, U. A. Mavlyanov, F. R. Nasirkhodjaev","doi":"10.1109/ICAICT.2010.5612040","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612040","url":null,"abstract":"The given job is devoted to the analysis of current optical transport technologies in Metro networks, including current challenges and network development trends. Reconfigurable Optical Add/Drop Multiplexer (ROADM) based pure optical signal processing as well as its advantages and limitations are reviewed. Along with the solution of the key problems at the optical layer and maturity of corresponding technologies, the OTN will play a more and more important role in optical Metro networks, which will help eliminate ROADM shortcomings and can balance the Optical and Electrical signal processing features and will bring new values while network deployment.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132806091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KETA: Public-key symmetric cryptosystem KETA:公钥对称密码系统
B. Kabulov, N. Tashpulatova
{"title":"KETA: Public-key symmetric cryptosystem","authors":"B. Kabulov, N. Tashpulatova","doi":"10.1109/ICAICT.2010.5612069","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612069","url":null,"abstract":"The new method of encrypting has been developed. The difference from existing methods is that the identifier of one of the agreed plaintexts (resource files) and the number of the combinatorial permutation of symbols of the indicated resource file is being transmitted, but not the ciphertext. In this connection the developed cryptosystem was named KETA (Key Exist, cipherText Absent). The main idea of the method is based on that any text (plaintext) can be created in the result of permutations of symbols (and also by using some special methods) from any other given text.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy semantic hypernet for information authenticity controlling in electronic document circulation systems 电子文献流通系统中信息真实性控制的模糊语义超网络
I. I. Jumanov, A. Akhatov
{"title":"Fuzzy semantic hypernet for information authenticity controlling in electronic document circulation systems","authors":"I. I. Jumanov, A. Akhatov","doi":"10.1109/ICAICT.2010.5612063","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612063","url":null,"abstract":"To design the methods of textual information authenticity controlling in systems of electronic document circulation authors offered the new approaches based on application the fuzzy semantic hyphernet and use of statistical and structural information redundancy. The models, algorithms and programmed-sold modules of text processing authenticity controlling system are developed for extraction of structural characteristics, formation of relations, construction of information sources classes hierarchy. For developed methods and algorithms the comparative analysis of efficiency is carried out.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A longitudinal study on degree centrality changes in a group of students 一组学生学位中心性变化的纵向研究
Y. Imamverdiyev, H. Z. Asl, N. Janani, S. Siami, N. Babapoor, Sahar Nezhadseifi, B. Sami, Samira Faraji, Davar Pilevar, Maryam Bazel, E. Feyz
{"title":"A longitudinal study on degree centrality changes in a group of students","authors":"Y. Imamverdiyev, H. Z. Asl, N. Janani, S. Siami, N. Babapoor, Sahar Nezhadseifi, B. Sami, Samira Faraji, Davar Pilevar, Maryam Bazel, E. Feyz","doi":"10.1109/ICAICT.2010.5612057","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612057","url":null,"abstract":"We gathered the information about a group of female B. Sc. students at university for preparing their degree centralities. The degree centralities of this group were obtained by social network professional software in seven weeks. Finally the changes of degree centrality in these weeks are presented as charts and their differences were discussed.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116383634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deploying virtualization technology for verification of a network security 通过虚拟化技术对网络进行安全验证
E. Abramov, O. Makarevich
{"title":"Deploying virtualization technology for verification of a network security","authors":"E. Abramov, O. Makarevich","doi":"10.1109/ICAICT.2010.5612012","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612012","url":null,"abstract":"This article discusses the issue of increasing the security of computer networks based on the constant verification of the level of information security. Simulation of the network, based on accurate data derived from the security audit, allows for constant monitoring of the level of network security. Using hardware virtualization to build models to avoid the restrictions of the programming model and apply the full range of information resources impacts for verification of security level is proposed.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"44 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123510523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Methods for assessing the effectiveness of information systems security 评估信息系统安全有效性的方法
G. Saparova
{"title":"Methods for assessing the effectiveness of information systems security","authors":"G. Saparova","doi":"10.1109/ICAICT.2010.5612019","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612019","url":null,"abstract":"In the article approach to determining the quality of information security systems is classified, indicators for assessing the quality and features of the calculation are given. A modified algorithm of Balash is described which allows to minimize the computational cost through the use of integer variables, addition and subtraction, and select the best direction of descent on a tree-making inherent in techniques such as branch and bound. A method of estimating the computational complexity of the algorithm using this modification is offered.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development Internet resources in Uzbekistan: Empirical investigation 乌兹别克斯坦互联网资源开发:实证调查
A. Kuvnakov, S. Kasimov
{"title":"Development Internet resources in Uzbekistan: Empirical investigation","authors":"A. Kuvnakov, S. Kasimov","doi":"10.1109/ICAICT.2010.5612068","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612068","url":null,"abstract":"This paper studies development Internet resources, driving force and use Internet, taking account local characteristics of Uzbekistan. The result shows that, intention to use Internet in local segment of Uzbekistan was significantly high in “business”, “entertainment” and “social”. Beside it comparable low visiting information resources in category of “science”, “education”, “divisions of Government” and requires additional strategies to development information resources in these categories.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121355937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Inter-cell interference coordination with adaptive frequency-reuse for VoIP and data traffic in downlink of 3GPP-LTE 基于自适应频率复用的小区间干扰协调——用于VoIP和3GPP-LTE下行链路的数据流量
Zahra Bakhti, S. Moghaddam
{"title":"Inter-cell interference coordination with adaptive frequency-reuse for VoIP and data traffic in downlink of 3GPP-LTE","authors":"Zahra Bakhti, S. Moghaddam","doi":"10.1109/ICAICT.2010.5612042","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612042","url":null,"abstract":"One of the most important challenges is how to manage inter-cell interference. Special care has to be taken regarding voice traffic which has more strict requirements on delay and packet loss. The goal of inter-cell interference coordination schemes is to decrease inter-cell interference and get higher cell throughput, so we evaluated the performance of inter-cell interference coordination schemes containing reuse-one, reuse-three, reuse-one with power-planning, Soft frequency reuse and Fractional frequency reuse schemes. With considering high traffic load the best option regarding to the cell throughput what can be seen is the Fractional reuse with b=0.7 (b, percentage of reduced power sub-band). In the second step for interference control, adaptive reuse is proposed. The frequency reuse of the system can be changed in function of the proportion of voice users. When two traffic types are present at the same time reuse-one and reuse-three are the best schemes for data and voice, respectively. However the best scheme in performance for one traffic type is the worst for the other in general. The proposed algorithm gives a performance between reuse-one and reuse-three.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"127 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114011736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信