2010 4th International Conference on Application of Information and Communication Technologies最新文献

筛选
英文 中文
Detection of the latent laws at the analysis of the distributed attacks in computer networks 分析计算机网络中分布式攻击的潜在规律
S. Jumaniyozov
{"title":"Detection of the latent laws at the analysis of the distributed attacks in computer networks","authors":"S. Jumaniyozov","doi":"10.1109/ICAICT.2010.5611805","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5611805","url":null,"abstract":"In article questions of detection of the distributed attacks in computer networks by means of artificial neural networks are considered. And also approximation of functions in space of quantitative signs is resulted.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of virtual educational process at training of technical disciplines 虚拟教育过程在技术学科培训中的实施
Ch. M. Khidirova
{"title":"Implementation of virtual educational process at training of technical disciplines","authors":"Ch. M. Khidirova","doi":"10.1109/ICAICT.2010.5612047","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612047","url":null,"abstract":"In article has considered the basic directions of use of an information technology in process virtualization training of technical disciplines in HIGH SCHOOL. Modeling of the phenomena and processes of technical disciplines on the computer — is necessary, first of all, for studying of the phenomena and experiments which it is almost impossible to show in real training, but they can be shown in a virtual kind.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"39 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123466773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The development and becoming of innovative-telecommunication services in conditions of competitiveness 竞争条件下创新电信业务的发展与形成
N. B. Mukhamadaliyeva, L. Saatova
{"title":"The development and becoming of innovative-telecommunication services in conditions of competitiveness","authors":"N. B. Mukhamadaliyeva, L. Saatova","doi":"10.1109/ICAICT.2010.5612075","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612075","url":null,"abstract":"In given article is considered the development and becoming of innovative-telecommunication services in conditions of competitiveness, and also perfection of a control system at the present stage of modernization of national economy reveals.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130003004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Chernoff faces 增强切尔诺夫面
B. Kabulov, N. Tashpulatova
{"title":"Enhanced Chernoff faces","authors":"B. Kabulov, N. Tashpulatova","doi":"10.1109/ICAICT.2010.5612059","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612059","url":null,"abstract":"The new method for construction the Chernoff faces is offered. Enhanced Chernoff faces contain more information and allow to perform an interval estimation of values of each parameters.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Technology blocking malicious behavior 阻止恶意行为的技术
S. Kasimov, D. Rahmatov, D. Madusmanov
{"title":"Technology blocking malicious behavior","authors":"S. Kasimov, D. Rahmatov, D. Madusmanov","doi":"10.1109/ICAICT.2010.5612025","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612025","url":null,"abstract":"This paper describes the technology to block malicious behavior on the basis of security policies, signatures and statistics","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115739454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microprocessor based voice recognition system realization 基于微处理器的语音识别系统实现
N. Ozturk, Ulvi Unozkan
{"title":"Microprocessor based voice recognition system realization","authors":"N. Ozturk, Ulvi Unozkan","doi":"10.1109/ICAICT.2010.5612023","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612023","url":null,"abstract":"Voice recognition systems, which today is one of gradually started to gain importance. In this study, using a PIC18F452 microcontroller, two registered words, compared with a voice command input. Registered with the sound of the word overlap as a result of the exit sign is active. Recognition of the audio signals zero crossing for the count and time was examined. In general, the voice recognition process, sound recording and determination of the expression; processing of sound, making comparison and integration of rest; finally, the expression was created with the realization of the corresponding functions. Developed in this system, without sounds recording of audio signal processing are performed simultaneously. In this system, not a waste of time for this situation may be many advantages to the system. Work is relatively simple and economically cheap.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126697479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Need for developing strategic framework for Electronic Government 制定电子政府战略框架的必要性
A. Ahmad, Atta Ur Rehman
{"title":"Need for developing strategic framework for Electronic Government","authors":"A. Ahmad, Atta Ur Rehman","doi":"10.1109/ICAICT.2010.5612066","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612066","url":null,"abstract":"The advent of Information Technology as a highly leveraged enabling tool for delivery of services in the public and the private sector has by now been universally recognized. This has redefined the fundamentals and has the potential to change the institutions as well as the mechanisms of delivery of services forever. It is in this context that the issues of Smart Governance — Electronic Governance needs to be analyzed. Quite obviously, therefore, the objective of achieving Electronic Governance (EG) goes far beyond mere computerization of standalone back office operations. It means to fundamentally change as to how the Government operates and this implies a new set of responsibilities for the executive, legislature and the citizenry. The effort should aim to bring about a social catharsis which needs to be coordinated in a comprehensive, strenuous and deliberated fashion.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132577057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Licence protection of software products 软件产品的许可证保护
L. P. Bildina
{"title":"Licence protection of software products","authors":"L. P. Bildina","doi":"10.1109/ICAICT.2010.5612022","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612022","url":null,"abstract":"Questions of increasing of the efficiency of protection of the licensed software products are considered.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133181318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Calculation of multiservice communication network characteristics taking into account self similitude of multimedia traffic 考虑多媒体业务自相似性的多业务通信网络特性计算
Guzal Kayumova, Ismoil Sultanov
{"title":"Calculation of multiservice communication network characteristics taking into account self similitude of multimedia traffic","authors":"Guzal Kayumova, Ismoil Sultanov","doi":"10.1109/ICAICT.2010.5611799","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5611799","url":null,"abstract":"In given article methods multiservice communication network characteristics calculation a taking into account self-similitude of a multimedia traffic are offered.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131207987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of fuzzy systems 模糊系统辨识
Y. Kudinov, I. J. Kudinov, F. Pashchenko
{"title":"Identification of fuzzy systems","authors":"Y. Kudinov, I. J. Kudinov, F. Pashchenko","doi":"10.1109/ICAICT.2010.5612055","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612055","url":null,"abstract":"The paper deals with the basic principles of modeling of large production fuzzy systems with the properties of uncertainty. The problem of identification of fuzzy system as a problem of preselection of fuzzy model expressed by production rules and providing the at least some non-negative functional deviations of the current and the calculated output has been formulated. The problem of identification consists of two interacting problems: structural and parametric identification. To ensure the required accuracy of fuzzy model algorithms of parametric and structural identification are interacting in accordance with the terms of adequacy, the convergence and the transition from one the algorithm to another. The efficiency of hybrid identification largely depends on the quality of infor-mation received by the production, which depends on the availability of excess accurate data, noise and measurement errors, as well as data characterizing the nonstation-arity of characteristics of the equipment. The proposed method allows for a limited array of data to receive an adequate fuzzy model of a fuzzy production system.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信