Online ISSN: 2515-8260

Keywords : Network Security

Tashkent state technical university (Uzbekistan)

Anvar Vosilovich Kabulov; Ibrokhimali Holmamatovich Normatov; Anvar Abduvokhidovich Karimov; Erkin Ravshanovich Navruzov

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 2, Pages 758-771

The algorithm for constructing control models of complex systems should be based on the hypothesis that the research and control processes of complex systems are subject to a single technology. A comprehensive study of objects is needed, starting with preliminary study, obtaining adequate models, process algorithms, and ending with the creation of effective control systems. Therefore, the algorithmization of control processes using modern computer technology requires not only improved management at all levels, but also the creation of new effective methods for the rational and adequate description of objects of research, optimization and construction of a control algorithm. The general scheme of such an algorithmic approach is described below. In this paper, we give methods and models of algorithms that are of particular importance in the automation of all stages of system research and the construction of control algorithms. From this point of view, the research process of various objects should be divided into seven consecutive stages, which are a cybernetic chain with feedback. The paper also gives a formalized standard description based on function tables, an algorithmic method for solving the problems of managing complex systems based on algebra over function tables, and methods for synthesizing workplace complexes using production systems as an example.

Quantum cryptography integration

B. Giridhar

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 5, Pages 1985-1993

Today, e-commerce services became more popular on the Internet and the web. Network
security is extremely essential for e-commerce services, and it is always the key to the
success of e-commerce (e-commerce). In this article, we address various security problems
concerning both the conventional and the new generation e-commerce model, such as P2P
authentication, authorization, non-repudiation, and integrity. By examining the key
characteristics of P2P e-commerce, we summaries several trust model design concepts in ecommerce.
We provide a comprehensive overview of network security problems relating to
e-commerce and e-commerce applications, and offer a related e-commerce security
research framework. In contrast with other security approaches, we think that as long as
security concerns are properly handled, P2P e-commerce will achieve tremendous success
on future e-commerce marketplaces.