TIBBIY ILMIY TEKSHIRISHLARDA BEMOR ANONIMLIGI VA MA’LUMOTLARINI KONFIDENSIALLIGINI TA’ MINLASHDA BLOKCHEYN TEXNOLOGIYASINI QOʻLLASH

Toʻrayev Maqsudjon Oʻktamovich, Saliyev Sharobiddin Muydin o‘g‘li

ushbu tezisda tibbiy ilmiy tekshirishlarda ishtirokchilar anonimligi va shaxsiy ma’lumotlarni konfidensialligini ta’minlashdagi muammolar va bu muammolarni hal qilishda blokcheyn texnologiyasi qoʻllash istiqbollari tahlil qilinadi.

24.04.2023 View more Download

МАЪЛУМОТЛАР УЗАТИШ ТАРМОҚЛАРИДАН ФОЙДАЛАНА ОЛИШНИ БОШҚАРИШ УСУЛЛАРИНИНГ ТАҲЛИЛИ

Ш.Ю. Джаббаров

In this article the methods of access management to data transmission networks (DTN) are considered. Two basic access management mechanisms are conducted: discretionary and mandatory. The basis of the Discretionary Access Control is a matrix of access rights, in the cells of the matrix that contains the access rights of subjects to objects. Also mandatory access management is considered based on the model of the Bell-Lapadul which prohibits the transfer of right access between users. The most widespread protocols to management access to the (DTN) of remote users are protocols RADIUS and TACACS +. The advantages and disadvantages are demonstrated by analyzing of their capabilities.

24.04.2023 View more Download

EMBEDDING DATA HASHING ALGORITHMS INTO A CRYPTOGRAPHIC INFORMATION SECURITY TOOL

Nurullaev Mirkhon Mukhammadovich

This paper presents the problem of embedding data hashing algorithms into a cryptographic data protection tool. The introduction of data hashing algorithms into a means of cryptographic protection of information is the process of integrating special software modules implementing hashing algorithms into a complex of technical and software tools that are means of cryptographic protection of information. The sequence of the process of the data hashing function with a parameter in the cryptographic data protection tool is schematically described

24.04.2023 View more Download

МНОГОУРОВНЕВАЯ ФИЛЬТРАЦИИ СПАМА НА ОСНОВЕ ИСКУССТВЕННОЙ ИММУННОЙ СИСТЕМЫ

Ганиев Салим Каримович , Хамидов Шерзод Жалолдин угли

In this paper, presents an overview of the spam filtering process and various spam filtering methods, including their advantages and disadvantages. A multilevel method of spam filtering based on artificial immune system is considered.

24.04.2023 View more Download

BARDOSHLI KRIPTOGRAFIK KALITLARNI YARATISHDA PSEVDO-TASODIFIY RAQAMLAR GENERATORLARIDAN FOYDALANISH

Bozorov A.X., Muxamadiyev F.R.

Random numbers have long been used in many fields until today. This includes scientific research and computer modeling of physical processes, numerical analysis, and even computer games that require the ability to generate random samples.

24.04.2023 View more Download

DLP TIZIMLARIDA INSAYDERLARNI ANOMAL HOLATLAR ORQALI ANIQLASHNING ALGORITMI TAHLILI

Mukhammadiyev Firdavs Rudaki o’g’li, Bozorov Asqar Xaitmurotovich

This work presents an analysis of the algorithm for detecting anomalous situations in the behavior of data leak prevention (DLP) systems after forming a typical (normal) profile of these users by studying the behavior of malicious users on their computers.

23.04.2023 View more Download

SIMMETRIK BLOKLI SHIFRLASH ALGORITMLARIGA BARDOSHLI S-BLOKLARNI GENERATSIYA QILISH MUAMMOLARI

Abdurazzoqov Javohir Rustamovich

The use of the S-box is an important component of many symmetric block cipher algorithms used in modern cryptography. However, creating durable S-blocks that can resist various cryptanalysis methods is a complex problem. In this paper, we describe the challenges of achieving randomness and nonlinearity in the design of S-blocks, and the challenges of generating large numbers of these blocks to ensure security. By analyzing these issues, we discussed the challenges of creating robust S-blocks in symmetric block cipher algorithms and the importance of careful design and testing in achieving strong security.

23.04.2023 View more Download

TEXNOLOGIK MASHINALAR VA JIHOZLAR MUTAXASISLIGI TA’LIM JARAYONLARINI TAKOMILLASHTIRISHDA RAQAMLI TEXNOLOGIYALARDAN FOYDALANISH

Xursanov B.J., Mirzaev D.B.

Maqolada mutaxasislik fanlarida axborot texnologiyalari va ularning didaktik imkoniyatlari hamda ta’lim va tarbiya jarayonlarini raqamli texnologiyalar asosida takomillashtirish ko‘rsatilgan. Zamonaviy axborot texnologiyalarining o‘quv-ta’lim-tarbiya jarayonlariga joriy etilishi va o‘quv ma’lumotlarini taqdim etish va AKTlarning didaktik imkoniyatlari yoritilgan.

23.04.2023 View more Download

DIFFERENCE OF DLP SYSTEM METHODS

Irgasheva D.Y., Turobova G.O.

Sensitive and confidential data are a requisite for most companies, so protection for this data takes great attention by company's top management, administrators and IT managers. Data leakage causes negative impact on companies. The traditional security approaches, such as firewalls, can't protect data from leakage. Data leakage/loss prevention (DLP) systems are solutions that protect sensitive data from being in non-trusted hands. This paper is an attemptto survey and study DLP systems that will be conducted as well as a comparison with other security and data protection approaches.

23.04.2023 View more Download

ТУТ ИПАК ҚУРТИНИНГ РЕПРОДУКТИВ БЕЛГИЛАРИ БЎЙИЧА СЕЛЕКЦИЯ ЖАРАЁНИНИНГ АЛГОРИТМИ ВА ДАСТУРИЙ ТАЪМИНОТИ

Насириллаев Бахтияр Убайдуллаевич, Худжаматов Сафарали Хасанбой ўғли

This article discusses the issues of software algorithms in silkworm breeding for reproductive traits. This software has a mechanism for analyzing the effect of selecting such leading reproductive traits as total number of eggs in a laying, number of normal eggs in a laying, laying weight and weight per egg.

23.04.2023 View more Download