Web of Science
Permanent URI for this collectionhttps://tuit-demo.gcris.com/handle/123456789/22
Browse
Browsing Web of Science by Language "en"
Now showing 1 - 20 of 29
- Results Per Page
- Sort Options
Conference Object Citation Count: 1Algorithm for the Selection of Informative Symptoms in the Classification of Medical Data(World Scientific Publ Co Pte Ltd, 2020) Nishanov, A. Kh; Ruzibaev, O. B.; Chedjou, J. C.; Kyamakya, K.; Abhiram, Kolli; De Silva, Perumadura; Khasanova, M. A.; Department of System and Applied ProgrammingIn this paper the issues like preprocessing of medical data, reclassification of the training sets and determining the importance of classes, formation of reference tables, selection of an informative features set that differentiate between class objects, formed by medical professionals are discussed and solved. Mainly in the most studied references [5-8, 11-13] the Fisher's criterion is used to obtain solutions to problems/tasks. Also for solving problems, the algorithms for an estimate calculation as well as the related software programs are used. For all cases, algorithms and software programs are suggested. The study consists of two important steps. The first step is to build a reference table, based on the importance of the features and objects as well as their contribution to the classes [1-4, 9, 10]; the second step is concerned with the choice of the most useful characteristic features set to be investigated. This corresponds to solving the issue of selection of set of informative features from a given table, their visualization, and the determination of the contribution of the features set to the formation of classes [1-13].Conference Object Citation Count: 4Algorithms and Service for Digital Processing of Two-Dimensional Geophysical Fields Using Octave Method(Springer international Publishing Ag, 2022) Zaynidinov, H. N.; Singh, Dhananjay; Yusupov, I; Makhmudjanov, S. U.; Department of Artificial IntelligenceThis paper covers new algorithms for digital signal processing of two-dimensional geophysical fields using octave method, which predicts the mineral value of the field in terms of signal energy value. In addition, it addresses and shows a functional scheme of the platform service based on cloud technologies. The essence of the work is that the geophysical data are two-dimensional, so their volume is very large. This requires the use of fast algorithms for digital processing of large amounts of data. Therefore, if we use the octave method effectively, the required result is obtained by calculating the value of the signal energy and comparing the finite difference of these values with its previous value.Conference Object Citation Count: 0Analysis of Criteria for Ensuringinformation Security of Scientific and Educational Resources(Rezekne Higher Educ inst-rezeknes Augstskola, 2018) Rakhmatullaev, Marat; Normatov, Sherbek; Department of Information and Library SystemsAt present, information and knowledge in the field of science and education are strategic resources. From their formation, renewal, distribution depends not only the scientific and educational spheres, but also the socio-economic development of the country. Therefore, the confidentiality, integrity and accessibility of databases of a scientific and educational nature are an important subject of research. The purpose of this article is to conduct an analysis of methods, criteria for assessing units of scientific information in terms of ensuring information security. Classification of criteria for the evaluation of scientific and educational information (SEI), their systematization, analysis of problem of ensuring the security of information resources are given. Also, the information infrastructure development indicators and projects implemented in the field of information security are outlined. Evaluation of SEI units is carried out by experts who themselves have a weighting factor and are dependent on their qualifications. The results of the research are the basis for the creation of an automated system for ensuring information security in the corporate library system of academic libraries. The corporate network forms an electronic public library, distributes the SEI between resource users. The information security system will ensure the regulation of access to resources.Article Citation Count: 1Analysis of Methodology of Rating Evaluation of Digital Economy and E-Government Development in Uzbekistan(Anadolu Univ, 2022) Nishanov, Akhram Khasanovich; Norboyo'g'li, Saidrasulov Sherzod; Satimbaevich, Babadjanov Elmurad; Department of System and Applied ProgrammingThis article discusses the new rating assessment methodology approved by the Cabinet of Ministers of the Republic of Uzbekistan on June 15, 2021 "On measures to further improve the rating system of the digital economy and e-government" No. 373. initially the indicators are examined. In accordance with the Strategy "Digital Uzbekistan - 2030" in order to assess the state of digital transformation in the regions, a methodology for rating the level of digital development of regions was developed, which made it possible to diagnose the state of digitalization in the regions. In the rating assessment methodology, the indicators used by the United Nations (UN) to assess the development of information technology and the introduction of e-government in countries around the world have been adopted.Book Part Citation Count: 3B-Spline Approximation for Polynomial Splines(Springer international Publishing Ag, 2019) Singh, Dhananjay; Singh, Madhusudan; Hakimjon, Zaynidinov; Department of Artificial Intelligence[No Abstract Available]Article Citation Count: 2Bi-Cubic Spline Based Temperature Measurement in the Thermal Field for Navigation and Time System(Tamkang Univ, 2019) Singh, Madhusudan; Zaynidinov, Hakimjon; Zaynutdinova, Mastura; Singh, Dhananjay; Department of Artificial IntelligenceThis paper highlights the use of Bi-cubic splines sets for measuring the temperatures at any point (x, y) on printed circuit boards (PCB). This has accomplished by approximating the system of bi-cubic splines of sets of temperatures measured at points on the PCB in a graphical view. The proposed approximation method is using Bi-cubic splines of modeling the temperature field T (x, y) and replace the continuous two variable function by a combination of single variable functions. While developing designs for the navigation and time system (NTS), there is a need for calculating and analyzing the heat generation processes in units in the NTS equipment, which is a factor in choosing design solutions for systems. The boards currently used can conduct full-fledged 3D simulations of heat transfers to PCB which are about 10 percent accurate compared to full-scale tests. It is always difficult to determine the temperatures at specific points on the PCB. Therefore the accurate numbers are only available at the boundaries of temperature zones.Article Citation Count: 2Clustered Routing Using Chaotic Genetic Algorithm With Grey Wolf Optimization To Enhance Energy Efficiency in Sensor Networks(Mdpi, 2024) Khujamatov, Halimjon; Pitchai, Mohaideen; Shamsiev, Alibek; Mukhamadiyev, Abdinabi; Cho, Jinsoo; Department of Data Communication Networks and SystemsAs an alternative to flat architectures, clustering architectures are designed to minimize the total energy consumption of sensor networks. Nonetheless, sensor nodes experience increased energy consumption during data transmission, leading to a rapid depletion of energy levels as data are routed towards the base station. Although numerous strategies have been developed to address these challenges and enhance the energy efficiency of networks, the formulation of a clustering-based routing algorithm that achieves both high energy efficiency and increased packet transmission rate for large-scale sensor networks remains an NP-hard problem. Accordingly, the proposed work formulated an energy-efficient clustering mechanism using a chaotic genetic algorithm, and subsequently developed an energy-saving routing system using a bio-inspired grey wolf optimizer algorithm. The proposed chaotic genetic algorithm-grey wolf optimization (CGA-GWO) method is designed to minimize overall energy consumption by selecting energy-aware cluster heads and creating an optimal routing path to reach the base station. The simulation results demonstrate the enhanced functionality of the proposed system when associated with three more relevant systems, considering metrics such as the number of live nodes, average remaining energy level, packet delivery ratio, and overhead associated with cluster formation and routing.Conference Object Citation Count: 0Digital Processing of Blood Image by Applying Two-Dimensional Haar Wavelets(Springer international Publishing Ag, 2021) Zaynidinov, H. N.; Yusupov, I; Juraev, J. U.; Singh, Dhananjay; Department of Artificial IntelligenceIn this work, compression and zero coefficients have been determined by using digital processing of the blood image that is 1 mu l (approximately one drop of blood) in the Haar wavelet. Also using this amount, an algorithm is proposed to define the number of leukocytes in human blood. We know that there are currently two types of methods for determining the number of leukocytes: grease and counting by using a microscope. This is a loss of time, causes a number of errors and inconveniences. By using this algorithm, a program has been developed to calculate the number of leukocytes with high accuracy in a blood image of 1 mu l (about one drop of blood).Article Citation Count: 26Emerging Trends and Evolutions for Smart City Healthcare Systems(Elsevier, 2022) Bin Ahmad, Khairol Amali; Khujamatov, Halim; Akhmedov, Nurshod; Bajuri, Mohd Yazid; Ahmad, Mohammad Nazir; Ahmadian, Ali; Department of Data Communication Networks and Systemsrapid development of the industry affected all its branches, led to evolution, and influenced people's worldview and desires. The revolutionary changes also affected the healthcare system, contributing to its development in technological, socio economic, scientific, and physical terms. Healthcare has gone through several stages called Healthcare 1.0, Healthcare 2.0, Healthcare 3.0, and Healthcare 4.0. Each of these stages is a logical chain of one whole progress, resulting in solving open challenges and previous problems. Each stage has its advantages, disadvantages, distinctive features, methods of providing medical care, scientific and technical innovations, where the research of which is mandatory for understanding the system as a whole, identifying trends, and developing future directions. This paper is devoted to a systematic analysis of the evolutionary development of healthcare, identifying the causes, means, and influence on subsequent processes. The chronology of the methods is revealed. Each stage of development is analyzed in terms of social significance, scientific and technological significance, communications, and application of information technologies, which makes this paper unique in this area. The studies were carried out with an emphasis on the technical component of the system, particularly the application of network technologies and services, the issues of the introduction of emerging technologies.Article Citation Count: 0Erirms Evaluation of the Reliability of Iot-Aided Remote Monitoring Systems of Low-Voltage Overhead Transmission Lines(Mdpi, 2024) Khujamatov, Halimjon; Davronbekov, Dilmurod; Khayrullaev, Alisher; Abdullaev, Mirjamol; Mukhiddinov, Mukhriddin; Cho, Jinsoo; Department of Data Communication Networks and SystemsResearchers have studied instances of power line technical failures, the significant rise in the energy loss index in the line connecting the distribution transformer and consumer meters, and the inability to control unauthorized line connections. New, innovative, and scientific approaches are required to address these issues while enhancing the reliability and efficiency of electricity supply. This study evaluates the reliability of Internet of Things (IoT)-aided remote monitoring systems specifically designed for a low-voltage overhead transmission line. Many methods of analysis and comparison have been employed to examine the reliability of wireless sensor devices used in real-time remote monitoring. A reliability model was developed to evaluate the reliability of the monitoring system in various situations. Based on the developed models, it was found that the reliability indicators of the proposed monitoring system were 98% in 1 month. In addition, it has been proven that the reliability of the system remains high even when an optional sensor in the network fails. This study investigates various IoT technologies, their integration into monitoring systems, and their effectiveness in enhancing the reliability and efficiency of electrical transmission infrastructure. The analysis includes data from field deployments, case studies, and simulations to assess performance metrics, such as accuracy, latency, and fault detection capabilities.Book Part Citation Count: 3Evaluation Methods of Spline(Springer international Publishing Ag, 2019) Singh, Dhananjay; Singh, Madhusudan; Hakimjon, Zaynidinov; Department of Artificial Intelligence[No Abstract Available]Conference Object Citation Count: 2Expert System With Fuzzy Logic for Protecting Scientific Information Resources(Ieee, 2020) Rakhmatullaev, Marat; Normatov, Sherbek; Department of Information and Library SystemsAnalysis of the state of development of research on the protection of valuable scientific and educational databases, library resources, information centers, publishers show the importance of information security, especially in corporate information networks and systems for data exchange. Corporate library networks include dozens and even hundreds of libraries for active information exchange, and they (libraries) are equipped with information security tools to varying degrees. The purpose of the research is to create effective methods and tools to protect the databases of the scientific and educational resources from unauthorized access in libraries and library networks using fuzzy logic methods. As a model and solution method, a fuzzy model of second-type correspondences is proposed, which makes it possible to comprehensively solve the problem of identifying threats in the event of a situation, as well as provide recommendations on how to eliminate them. For the creation of a knowledge database, experts are involved who determine the functions of belonging to "Situation-Threat-Methods of eliminating threats". The research results are used in the expert system the corporate network of electronic libraries to protect scientific and educational information from unauthorized access.Conference Object Citation Count: 0Extended Model of Access Control for the Library Information Systems(Ieee, 2017) Normatov, Sherbek; Rakhmatullaev, Marat; Department of Information and Library SystemsIn this article were analyzed existing models of access control in information systems, and was explored an extended model of building access control for an automated information and library system. As the operating factor on the proposed model, operators and their functions were chosen. In addition, the generalized structure and algorithm of the proposed model is given.Conference Object Citation Count: 3Flying Ad Hoc Network Expedited by Dtn Scenario: Reliable and Cost-Effective Mac Protocols Perspective(Ieee, 2020) Arsheen, Sobiya; Wahid, Abdul; Ahmad, Khaleel; Khalim, Khujamatov; Department of Data Communication Networks and SystemsFlying Adhoc Network (FANET) is an emerging topic of research in the wireless network area, FANET has several common features with its predecessor e.g. Mobile Adhoc Network (MANET) and Vehicle Adhoc Network (VANET), but the network has several unique features also which make it different from other networks. The sparseness of nodes, coupled with frequent changing of topology significantly affects the data transmission rate of the network. To overcome this problem, FANET can be assisted with Delay Tolerant Network (DTN) approach to exploit its mobility and routing features. The main aim of this work is to make Flying Adhoc Network reliable by deploying two MAC protocols i.e. IEEE 802.11 and IEEE 802.15 and realize the functionality of Delay Tolerant Network (DTN) in a FANET.Article Citation Count: 0Fog Computing Capabilities for Big Data Provisioning: Visualization Scenario(Mdpi, 2022) Khujamatov, Halimjon; Ahmad, Khaleel; Usmanova, Nargiza; Khoshimov, Jamshid; Alduailij, Mai; Alduailij, Mona; Department of Data Communication Networks and SystemsWith the development of Internet technologies, huge amounts of data are collected from various sources, and used 'anytime, anywhere' to enrich and change the life of the whole of society, attract ways to do business, and better perceive people's lives. Those datasets, called 'big data', need to be processed, stored, or retrieved, and special tools were developed to analyze this big data. At the same time, the ever-increasing development of the Internet of Things (IoT) requires IoT devices to be mobile, with adequate data processing performance. The new fog computing paradigm makes computing resources more accessible, and provides a flexible environment that will be widely used in next-generation networks, vehicles, etc., demonstrating enhanced capabilities and optimizing resources. This paper is devoted to analyzing fog computing capabilities for big data provisioning, while considering this technology's different architectural and functional aspects. The analysis includes exploring the protocols suitable for fog computing by implementing an experimental fog computing network and assessing its capabilities for providing big data, originating from both a real-time stream and batch data, with appropriate visualization of big data processing.Book Part Citation Count: 2Geophysical Application for Splines(Springer international Publishing Ag, 2019) Singh, Dhananjay; Singh, Madhusudan; Hakimjon, Zaynidinov; Department of Artificial Intelligence[No Abstract Available]Conference Object Citation Count: 3Iot-Enabled Mobile Device for Electrogastrography Signal Processing(Springer international Publishing Ag, 2021) Zaynidinov, Hakimjon; Makhmudjanov, Sarvar; Rajabov, Farkhad; Singh, Dhananjay; Department of Artificial IntelligenceElectrogastrography (EGG) is a powerful instrument that represents and provides high time precision for direct heart activities. After processing the chest skin for the contact process by network electrodes, the conventional method of collecting heart signals involves the presence of electrodes directly connected to the patient's chest using gelatin. One of the most critical activities is tracking the clinical signs of cardiac patients. A real-time EGG signal acquisition and processing device is developed to observe patients in various IoT-based environments is discussed in this article. The EGG signals that are detected are passed to special software. For further protection, it is ensured that the transmission of the EGG signal from the patient without distortion to the doctors should take place. The ambulatory and wearable device for the transmission of real-time EGG signals is discussed in this article in order to monitor patients in various environments. For further analysis, the captured EGG signal is transferred to software and signals are transferred to the doctors for real-time evaluation of the patient.Conference Object Citation Count: 4Methods for Determining the Optimal Sampling Step of Signals in the Process of Device and Computer Integration(Springer international Publishing Ag, 2022) Zaynidinov, Hakimjon; Singh, Dhananjay; Makhmudjanov, Sarvar; Yusupov, Ibrohimbek; Department of Artificial IntelligenceIn this paper, digital signal processing methods and its solution for HCI were described. Mostly, problems are connected to taking signals or data from real time devices. Data is often serial, stream or etc. device and computer integration in HCI focuses to digital signal processing. Today, the use of interpolation methods in the digital processing of biomedical signals is important, and at the same time allows the detection and diagnosis of diseases as a result of digital processing of biomedical signals. This paper discusses the construction of a signal model using the spline-wavelet interpolation formula for equal intervals in the digital processing of biomedical signals.Conference Object Citation Count: 1Modification of Decision Rules "Ball Apolonia" the Problem of Classification(Ieee, 2016) Nishanov, A. X.; Ruzibaev, O. B.; Tran, Nguyen H.; Department of System and Applied ProgrammingThis article is devoted to the study of one of the main tasks of data mining, pattern recognition problem. The problem of classification by the modified decision rules "ball Apollonia". Also, in this paper, an algorithm for solving the modified rule "ball Apollonia", based on the algorithm developed by the software in the language C#. The result is applied to the recognition problem for several well-known set of data.Book Part Citation Count: 0Multidimensional Polynomial Splines(Springer international Publishing Ag, 2019) Singh, Dhananjay; Singh, Madhusudan; Hakimjon, Zaynidinov; Department of Artificial Intelligence[No Abstract Available]
