Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov Jun 2023

Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov

Chemical Technology, Control and Management

This article analyzes the concept of investigating information security incidents and the processes of responsibility for their commission, checking the place where the incident occurred, collecting and storing their data, as well as organizing the investigation of information security incidents at the enterprise.


Methods And Algorithms For Monitoring And Prediction Of Various Fire Hazardous Situations, Mizaakbar Xakkulmirzayevich Hudayberdiyev, Oybek Zokirovich Koraboshev Apr 2023

Methods And Algorithms For Monitoring And Prediction Of Various Fire Hazardous Situations, Mizaakbar Xakkulmirzayevich Hudayberdiyev, Oybek Zokirovich Koraboshev

Chemical Technology, Control and Management

This article analyzes emergency situations arising from natural disasters (fires, explosions, earthquakes, floods, landslides, etc.) and man-made accidents. The event in which the values of fire risks in the area decrease uniformly and at the same time the amount of fire risks is minimal is considered optimal. Models, methods, and logistic regression algorithm have been used to predict fire hazard situations and identify potential fire safety measures.


Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov Apr 2023

Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov

Chemical Technology, Control and Management

This article discusses the models of the group structure in the investigation of information security incidents, contradictions in the investigation of information security incidents, methods for assessing information security incidents at the enterprise, processes for assessing information security incidents based on its factors.


Procedural Model Of The Monitoring System, Fayzullajon Botirov Feb 2023

Procedural Model Of The Monitoring System, Fayzullajon Botirov

Chemical Technology, Control and Management

This article discusses the process of monitoring information security incidents and factors affecting the effectiveness of monitoring. A procedural model of the functioning of the information security incident monitoring system is constructed, based on the study of its structure, the principles of operation of individual components and literature data, the analysis of individual stages.


A Study Of Static And Dynamic Characteristics Of Multifunctional Signal Converters, Akmal Abdumalikov Aug 2020

A Study Of Static And Dynamic Characteristics Of Multifunctional Signal Converters, Akmal Abdumalikov

Chemical Technology, Control and Management

The issues of continuity, accuracy, speed and reliability of signal conversion, which are the main problems of quality control and management of production processes, remain relevant. Research shows that in practice there are different signal variables, the study of which is highly formalized in a number of modeling tasks and basic classification studies, in particular transients in converters, its sources and elements requires a unified mathematical approach, that is, visual, highly formalized modeling and research based on it. The paper presents a graph model of multifunctional signal converters that provide microprocessor and electronic devices with signals in the form of …


Techniques To Solve Decision-Making Problems, Dilnoz Tulkunovna Muhamediyeva, Bekmuratov Fayzievich Tulkun Feb 2020

Techniques To Solve Decision-Making Problems, Dilnoz Tulkunovna Muhamediyeva, Bekmuratov Fayzievich Tulkun

Chemical Technology, Control and Management

Solving decision-making problems in poorly formalized systems only with the help of deterministic and probabilistic methods is insufficient. To do this, it is necessary to widely apply the methods of hybrid intelligent systems and, especially, the methods of “soft” calculations (SoftCalculation, SoftComputing) and the directions of ComputationalIntelligence — intelligent computing technologies that are emerging on this theoretical and methodological base. An immune - fuzzy algorithm for the synthesis of fuzzy inference systems (FIS) is proposed. A two-stage adaptive FIS synthesis algorithm is described. At the first stage, the initial fuzzy parameters are clustered in order to reduce the number of …