http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Factors of UTAUT Affecting the Use Behavior: Based on Telegram Application in Uzbekistan
Otabek Karimov,김하균 사단법인 인문사회과학기술융합학회 2017 예술인문사회융합멀티미디어논문지 Vol.7 No.12
Smartphone enables its users to download and install software, games and other programmes provided by third-party providers. The third-party software, that is installed on most Smartphones, are also known as a mobile application. These existing mobile applications run on mobile operations systems. The purpose of this study is to explain the factors affecting the user acceptance of Telegram app in Uzbekistan. In order to comprehend user acceptance of this application, it is necessary to examine the determinants of behavioral intention to use the application. Thus, this study developed a research model, based on the Unified Theory of Acceptance and Use of Technology (UTAUT). This study is aimed to identify the factors that affect the user behavior, proposing a model based on a UTAUT model. Therefore, the result is considered to be valuable in finding the other application in Uzbekistan, as this study focused on Telegram users in Uzbekistan. SPSS 22.0 was used for basic statistics and Smart PLS 2.0 was used for hypothesis testing. The empirical results of this study are summarized as follows. First, performance expectancy, effort expectancy, social influence and facilitating conditions significantly affect behavioral intention. Second, behavioral intention significantly affect use behavior.
Triangle Method for Fast Face Detection on the Wild
Malikovich, Karimov Madjit,Akhmatovich, Tashev Komil,ugli, Islomov Shahboz Zokir,Nizomovich, Mavlonov Obid Korea Multimedia Society 2018 The journal of multimedia information system Vol.5 No.1
There are a lot of problems in the face detection area. One of them is detecting faces by facial features and reducing number of the false negatives and positions. This paper is directed to solve this problem by the proposed triangle method. Also, this paper explans cascades, Haar-like features, AdaBoost, HOG. We propose a scheme using 12-net, 24-net, 48-net to scan images and improve efficiency. Using triangle method for frontal pose, B and B1 methods for other poses in neural networks are proposed.
Analyzing Dog Health Status through Its Own Behavioral Activities
Botirjon Karimov,Azamjon Muminov,Abror Buriboev,Cheol-Won Lee(이철원),Heung Seok Jeon(전흥석) 한국컴퓨터정보학회 2019 한국컴퓨터정보학회 학술발표논문집 Vol.27 No.2
In this paper, we suggest an activity and health monitoring system to observe the status of the dogs in real time. We also propose a k-days algorithm which helps monitoring pet health status using classified activity data from a machine learning approach. One of the best machine learning algorithm is used for the classification activity of dogs. Dog health status is acquired by comparing current activity calculation with passed k-days activities average. It is considered as a good, warning and bad health status for differences between current and k-days summarized moving average (SMA) > 30, SMA between 30 and 50, and SMA < 50, respectively.
About one way of increase of the system effectiveness of detection of intrusions
M.M. Karimov,K.A. Tashev 대한전자공학회 2008 ICEIC:International Conference on Electronics, Inf Vol.1 No.1
In given article questions of classification of attacks and detection of intrusions in computer networks are considered and also the approach of increase of efficiency of systems of detection of intrusions is offered.
Effective Model Of System Of Detection Of Intrusion For Computer Networks
M.M. Karimov,D.Ya.Irgasheva,K.A.Tashev,R.I. Rakhimov 대한전자공학회 2008 ICEIC:International Conference on Electronics, Inf Vol.1 No.1
In given article it is considered approaches of protection of the information for computer networks and multilevel model of detection and reflection of intrusions, protection against not authorized access to the information, providing creation of a hardware-software complex and the analysis of the traffic on the basis of complex application of new methods for computer networks.