{"title":"Detection of the latent laws at the analysis of the distributed attacks in computer networks","authors":"S. Jumaniyozov","doi":"10.1109/ICAICT.2010.5611805","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5611805","url":null,"abstract":"In article questions of detection of the distributed attacks in computer networks by means of artificial neural networks are considered. And also approximation of functions in space of quantitative signs is resulted.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of virtual educational process at training of technical disciplines","authors":"Ch. M. Khidirova","doi":"10.1109/ICAICT.2010.5612047","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612047","url":null,"abstract":"In article has considered the basic directions of use of an information technology in process virtualization training of technical disciplines in HIGH SCHOOL. Modeling of the phenomena and processes of technical disciplines on the computer — is necessary, first of all, for studying of the phenomena and experiments which it is almost impossible to show in real training, but they can be shown in a virtual kind.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"39 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123466773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The development and becoming of innovative-telecommunication services in conditions of competitiveness","authors":"N. B. Mukhamadaliyeva, L. Saatova","doi":"10.1109/ICAICT.2010.5612075","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612075","url":null,"abstract":"In given article is considered the development and becoming of innovative-telecommunication services in conditions of competitiveness, and also perfection of a control system at the present stage of modernization of national economy reveals.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130003004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Chernoff faces","authors":"B. Kabulov, N. Tashpulatova","doi":"10.1109/ICAICT.2010.5612059","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612059","url":null,"abstract":"The new method for construction the Chernoff faces is offered. Enhanced Chernoff faces contain more information and allow to perform an interval estimation of values of each parameters.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology blocking malicious behavior","authors":"S. Kasimov, D. Rahmatov, D. Madusmanov","doi":"10.1109/ICAICT.2010.5612025","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612025","url":null,"abstract":"This paper describes the technology to block malicious behavior on the basis of security policies, signatures and statistics","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115739454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microprocessor based voice recognition system realization","authors":"N. Ozturk, Ulvi Unozkan","doi":"10.1109/ICAICT.2010.5612023","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612023","url":null,"abstract":"Voice recognition systems, which today is one of gradually started to gain importance. In this study, using a PIC18F452 microcontroller, two registered words, compared with a voice command input. Registered with the sound of the word overlap as a result of the exit sign is active. Recognition of the audio signals zero crossing for the count and time was examined. In general, the voice recognition process, sound recording and determination of the expression; processing of sound, making comparison and integration of rest; finally, the expression was created with the realization of the corresponding functions. Developed in this system, without sounds recording of audio signal processing are performed simultaneously. In this system, not a waste of time for this situation may be many advantages to the system. Work is relatively simple and economically cheap.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126697479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Need for developing strategic framework for Electronic Government","authors":"A. Ahmad, Atta Ur Rehman","doi":"10.1109/ICAICT.2010.5612066","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612066","url":null,"abstract":"The advent of Information Technology as a highly leveraged enabling tool for delivery of services in the public and the private sector has by now been universally recognized. This has redefined the fundamentals and has the potential to change the institutions as well as the mechanisms of delivery of services forever. It is in this context that the issues of Smart Governance — Electronic Governance needs to be analyzed. Quite obviously, therefore, the objective of achieving Electronic Governance (EG) goes far beyond mere computerization of standalone back office operations. It means to fundamentally change as to how the Government operates and this implies a new set of responsibilities for the executive, legislature and the citizenry. The effort should aim to bring about a social catharsis which needs to be coordinated in a comprehensive, strenuous and deliberated fashion.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132577057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Licence protection of software products","authors":"L. P. Bildina","doi":"10.1109/ICAICT.2010.5612022","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612022","url":null,"abstract":"Questions of increasing of the efficiency of protection of the licensed software products are considered.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133181318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Calculation of multiservice communication network characteristics taking into account self similitude of multimedia traffic","authors":"Guzal Kayumova, Ismoil Sultanov","doi":"10.1109/ICAICT.2010.5611799","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5611799","url":null,"abstract":"In given article methods multiservice communication network characteristics calculation a taking into account self-similitude of a multimedia traffic are offered.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131207987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of fuzzy systems","authors":"Y. Kudinov, I. J. Kudinov, F. Pashchenko","doi":"10.1109/ICAICT.2010.5612055","DOIUrl":"https://doi.org/10.1109/ICAICT.2010.5612055","url":null,"abstract":"The paper deals with the basic principles of modeling of large production fuzzy systems with the properties of uncertainty. The problem of identification of fuzzy system as a problem of preselection of fuzzy model expressed by production rules and providing the at least some non-negative functional deviations of the current and the calculated output has been formulated. The problem of identification consists of two interacting problems: structural and parametric identification. To ensure the required accuracy of fuzzy model algorithms of parametric and structural identification are interacting in accordance with the terms of adequacy, the convergence and the transition from one the algorithm to another. The efficiency of hybrid identification largely depends on the quality of infor-mation received by the production, which depends on the availability of excess accurate data, noise and measurement errors, as well as data characterizing the nonstation-arity of characteristics of the equipment. The proposed method allows for a limited array of data to receive an adequate fuzzy model of a fuzzy production system.","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}