This paper discusses an algorithm for converting raw biometric features of a neural network into a cryptographic private key. The proposed algorithm is based on leveraging the properties of neural networks to generate unique cryptographic keys that can be used for user authentication. The article describes the process of converting raw features into keys and conducts an analysis of the resilience and security of the generated keys. The results show that the proposed algorithm has a high level of protection and can be used to enhance the security of authentication systems.
23.04.2023 View more DownloadResilience to password brute-force attacks, cryptographic, and biometric authentication protocols is one of the important aspects in ensuring the security of information systems. This article analyzes the resilience to parameter brute-force attacks of passwords, cryptographic, and biometric authentication protocols. Research has been conducted to identify the most resilient protocols and to uncover vulnerabilities that can be exploited by malicious actors to gain unauthorized access to data.
23.04.2023 View more DownloadToday, tourism is popular in many countries around the world. Tourism is usually organized by tourism routes through tourism organizations. There are many types and forms of tourism: domestic, international, amateur tourism, organized tourism, travel somewhere nearby, distant travel, tourism aimed at expanding knowledge, climbing, water tourism, automotive tourism, walking tourism, sports tourism, and so on. Uzbekturism is still operating in the tourism industry in Uzbekistan, formed on July 27, 1992. Today it is called the Ministry of Tourism and Cultural Heritage of the Republic of Uzbekistan. The company's main task is to develop tourism infrastructure, build modern tourist complexes with foreign investment, develop new tourist destinations, expand the range of services, and so on. (motas.uz)
23.04.2023 View more DownloadThe article is devoted to the study of the method of organizing an IP network for secure data transmission based on the IP-PBX Asterisk, used as a switching station and gateway for traditional PBXs. The purpose of the study is to analyze and model the parameters of the studied IP network using Opnet Modeller for model time when changing codec types during voice traffic transmission. The results of the study show how the value of the transmitted total load changes when the type of codecs changes, the other parameters change insignificantly.
23.04.2023 View more DownloadThe national segment of TAEFOCL of Uzbekistan is constructed with use of standard single-mode fibers. Due to the increase in number of services with high speed and transition to the DWDM technology, PMD becomes a most strongly factor limiting the maximum speed of data transmission which can support fiber. It means, operators need additional methods of testing of existing cable highways for definition of the fibers providing the demanded capacity.
23.04.2023 View more DownloadIn this thesis, we will talk about the problems of multimedia communication networks, the problem of ensuring the quality of services in multimedia communication networks, the scheme of the process of managing the provision of voice communication services and the model of the process of providing voice communication services in multimedia communication networks based on IMS.
23.04.2023 View more DownloadFurther development of modern optical communication systems requires the elimination of factors that limit the capabilities of the system and increase the efficiency and quality of the system's transmission. Dispersion values in long-distance fiber-optic communication lines are significantly high, which requires the use of special technical solutions to compensate for dispersion distortions for an optical signal of any format. The article is devoted to the issues of increasing the efficiency of using dispersion compensators.
23.04.2023 View more Download