АЛГОРИТМ ПРЕОБРАЗОВАНИЯ ИСХОДНЫХ БИОМЕТРИЧЕСКИХ ПРИЗНАКОВ НЕЙРОННОЙ СЕТИ В КРИПТОГРАФИЧЕСКИЙ ЗАКРЫТЫЙ КЛЮЧ

Агзамова М.Ш., Рустамова С.

This paper discusses an algorithm for converting raw biometric features of a neural network into a cryptographic private key. The proposed algorithm is based on leveraging the properties of neural networks to generate unique cryptographic keys that can be used for user authentication. The article describes the process of converting raw features into keys and conducts an analysis of the resilience and security of the generated keys. The results show that the proposed algorithm has a high level of protection and can be used to enhance the security of authentication systems.

23.04.2023 View more Download

ГРУППА СИММЕТРИЙ УРАВНЕНИЯ ТЕПЛОПРОВОДНОСТИ

Нарманов Отабек Абдигаппарович , Файзуллаев Шерали Мавруталиевич

In this paper it is found Lie algebra of infinitesimal generators of symmetry group of heat equation and it is found general traveling wave solutions in explicitly form.

23.04.2023 View more Download

АНАЛИЗ УСТОЙЧИВОСТИ К ПЕРЕБОРУ ПАРАМЕТРОВ ПАРОЛЕЙ, КРИПТОГРАФИЧЕСКИХ И БИОМЕТРИЧЕСКИХ ПРОТОКОЛОВ АУТЕНТИФИКАЦИИ

Агзамова М.Ш., Иргашева Д.Я., Рустамова С.

Resilience to password brute-force attacks, cryptographic, and biometric authentication protocols is one of the important aspects in ensuring the security of information systems. This article analyzes the resilience to parameter brute-force attacks of passwords, cryptographic, and biometric authentication protocols. Research has been conducted to identify the most resilient protocols and to uncover vulnerabilities that can be exploited by malicious actors to gain unauthorized access to data.

23.04.2023 View more Download

KATTA TUB SONLARNI GENERATSIYALASH VA ULARNI TUBLIKKA TEKSHIRISH ALGORITMLARI TADQIQI

Salayev Alisher Kuralbayevich

Ushbu maqola assimmetrik kalitli kriptografik algoritmlarida keng qo‘llaniladigan katta tub sonlarni generatsiya qilish va tublikka tekshirish algoritmlarining samaradorligi, afzalliklari va kamchiliklari tadqiqiga bag’ishlangan.

23.04.2023 View more Download

USB SECURITY AND MECHANISM TO ENSURE ITC

Mavlonov Alisher Bagbekovich, Mavlanov Azizbek Bagbekovich, 3Mavlonova Shodmonoy Bogbek qizi

The paper considers aspects of the top risks of using USB devices, practice to protect ourselves from flash drive threats. There are some tips to help using USB device safely.

23.04.2023 View more Download

CYBER SECURITY IN TRAVEL, TOURISM AND HOSPITALITY

Sharipov Shakhriyor Shamsiddin ugli

Today, tourism is popular in many countries around the world. Tourism is usually organized by tourism routes through tourism organizations. There are many types and forms of tourism: domestic, international, amateur tourism, organized tourism, travel somewhere nearby, distant travel, tourism aimed at expanding knowledge, climbing, water tourism, automotive tourism, walking tourism, sports tourism, and so on. Uzbekturism is still operating in the tourism industry in Uzbekistan, formed on July 27, 1992. Today it is called the Ministry of Tourism and Cultural Heritage of the Republic of Uzbekistan. The company's main task is to develop tourism infrastructure, build modern tourist complexes with foreign investment, develop new tourist destinations, expand the range of services, and so on. (motas.uz)

23.04.2023 View more Download

ИССЛЕДОВАНИЕ СПОСОБА ПОСТРОЕНИЯ СЕТИ IP ДЛЯ ПЕРЕДАЧИ ТРАФИКА НА БАЗЕ АТС ASTERISK

Якубова Мубарак Захидовна, Мананкова Ольга, Якубов Баходыр, Садикова Гульнара, Ташев Комил

The article is devoted to the study of the method of organizing an IP network for secure data transmission based on the IP-PBX Asterisk, used as a switching station and gateway for traditional PBXs. The purpose of the study is to analyze and model the parameters of the studied IP network using Opnet Modeller for model time when changing codec types during voice traffic transmission. The results of the study show how the value of the transmitted total load changes when the type of codecs changes, the other parameters change insignificantly.

23.04.2023 View more Download

ВЫБОР МЕТОДА ИЗМЕРЕНИЯ ПОЛЯРИЗАЦИОННОЙ МОДОВОЙ ДИСПЕРСИИ

Нуштаева Озода

The national segment of TAEFOCL of Uzbekistan is constructed with use of standard single-mode fibers. Due to the increase in number of services with high speed and transition to the DWDM technology, PMD becomes a most strongly factor limiting the maximum speed of data transmission which can support fiber. It means, operators need additional methods of testing of existing cable highways for definition of the fibers providing the demanded capacity.

23.04.2023 View more Download

ОБ ОДНОЙ МОДЕЛИ РАСПРЕДЕЛЕНИЯ СЕТЕВЫХ РЕСУРСОВ В МУЛЬТИМЕДИЙНЫХ СЕТЯХ СВЯЗИ

Шержанова Камила , Журабеков Авазбек

In this thesis, we will talk about the problems of multimedia communication networks, the problem of ensuring the quality of services in multimedia communication networks, the scheme of the process of managing the provision of voice communication services and the model of the process of providing voice communication services in multimedia communication networks based on IMS.

23.04.2023 View more Download

TOLALI OPTIK ALOQA LINIYALARIDA DISPERSIYA KOMPENSATORLARINI QO’LLASH SAMARADORLIGINI TAKOMILLASHTIRISH

Mirazimova Gulnora Xasanovna

Further development of modern optical communication systems requires the elimination of factors that limit the capabilities of the system and increase the efficiency and quality of the system's transmission. Dispersion values in long-distance fiber-optic communication lines are significantly high, which requires the use of special technical solutions to compensate for dispersion distortions for an optical signal of any format. The article is devoted to the issues of increasing the efficiency of using dispersion compensators.

23.04.2023 View more Download