This article is the first to carry out a scientific analysis of the study of the history of the Turkic official style, and the division into stages and periodization of the development of the history of the Turkic official style from the ancient period to the Middle Ages. The emergence of the Turkic official style and its historical development until the 16th century can be divided into four successively connected, and at the same time, stages with their own characteristics: I. Office-work of the most ancient period (from the III century BC to the VI century). II. Office work during the reign of the Turkish kaganates (VI-IX centuries). This stage, in turn, can be divided into two periods: 1) Office work during the period of the First and Second Turkish Khaganates (VI-VIII centuries); 2) Office work during the Uyghur Khaganate (VIII-IX centuries). III. Office work in the 9th – 13th centuries. This stage of the Turkic office work is also divided into two periods: 1) Office work during the reign of the Karakhanids (from the second half of the X century to the end of the XII century); 2) Office work during the reign of the Kuchu and Hansu states (IX-XIII centuries). IV. Office work in the XIII-XVI centuries. This stage of Turkic records management is divided into the following periods: 1) Office work among the Chigatai ulus (XIII-XIV centuries). 2) Office work in the state of the Golden Horde and subsequent khanates (from the first half of the XIV century to the second half of the XVI century). 3) Office work in the Timurid state (from the second half of the XIV century to the XVI century). 4) Office work of the early period of the Ottoman Sultanate (from the second half of the 15th to the 16th century In the historical development of the Turkic official style, the office work of the period of the Turkic Khaganates, the period of the Karakhanids and the period of the Temurids are of particular importance.
Topicality and demand of the theme of dissertation. In world practice of informatization, systems of electronic document interchange (EDIS) arc considered and introduced last years not only as systems for automation of manage processes but also as high-grade platforms for creation of uniform information field, so borders of their use, certainly, expands and scientists of the world raises interest to them. In researches of leading scientists of infocommunication technologies the demand of problems of authentic gathering, transfer, analysis, coding of information during formation of office-work documents is allocated for getting of effective technologies raising mobility and productivity of EDIS.
Complex measures undertaken by the Government of Republic of Uzbekistan on development of systems of region-territorial automated management and to creation of uniform information field arc directed on wide introduction of information systems, EDIS, databases (DB) on the basis of modern information-communication technologies. In this connection, working out of new methods to intelligent processing of information resources used for improvement of data transfer quality, allowing effectively to find out and correct errors in structure of electronic document interchange with least material and time expenses, differs a special urgency and, at the same time, remains the unresolved theoretical and applied problem having important economic value.
Requirements to information resources and streams of data transmission as the important factor of efficiency and quality of EDIS functioning arc expressed in providing of stability, integrity, safety and authenticity of the information. One of important among factors is the criterion of authenticity of the information, caused by distortion of transferred messages in infocommunication networks because of failures and refusals of means, any handicaps in communication channels, errors of operators, scanning and recognition systems.
Hence, construction of effective systems to control of information authenticity during transfer and processing represents special scientific interest as priority technology of data processing, characteristic for conditions of automated management and electronic document interchange at the enterprises and organizations.
For existing methods, despite of providing the high level of information transfer authenticity, some unsolved questions is typical, and as basic of them it is possible to allocate the following: at development technologies of electronic documents interchange in structure of modern data transfer packages the significant volume of resource is spent for headings, at the same time the most part of information in headings remains constant from package to package during stream of transfer of the whole frame (redundancy of the information arising at it and mechanisms to provide reliability of deliveries consisting, basically, in sending the appropriate message and repeated transfer of packages, - result to additional time and material expenses while errors detection and elimination); code and hardware methods of information transfer control arc focused, mainly, on elimination the transposition mistakes in managing fields of packages; however, at data transfer there arc also distortions in information fields, which frequently reveal as multiple text mistakes.
In this relation, the decision of tasks for providing of information transfer authenticity is reasonable to consider in two aspects.
Solutions of the first type tasks should taken into account errors of the man-operator, scanning and other devices intended for input of the information. These kinds of mistakes make greatest volume of distortions in text and arise at Applied and Representation levels of OSI model (Open System Interconnection reference model).
Solutions of second type tasks, devoted to control of the information reliability, take into consideration the probability of distortions which occur at stages of Transport, Network, Physical and Line of model OSI.
Demand of the dissertation is characterized by the fact that introduction of a wide range of IP-enabled technologies in electronic document interchange is connected to requiring close attention tasks of detection and correction of errors during preparation and processing of documents.
This research work is focused on providing realization of laws of the Republic of Uzbekistan «On informatization», «On electronic digital signature», «On electronic document», «On electronic commerce», «On electronic payments», Decree of the Cabinet of Ministers of the Republic of Uzbekistan № 126 on 05.04.2011 «About measures on installation and use of a single secured e-mail and system of electronic document interchange in the executive office of cabinet of ministers, bodies of government and economic governance, local government».
Following that, the solution of listed tasks requires carrying out the special researches and development connected to creation of methods and algorithms, capable to control the information authenticity in structure of data transfer packages at the expense of use the enclosed redundancy, and able to function in transport environment, eliminating existing lacks. This fact causes necessity of allocation of a special class algorithms for providing of information authenticity on the basis of new type of PR-rcdundancy (property redundancy), defined by depending on properties of processed object.
Purpose of research is development ol constructive methods, models, algorithms and systems of information authenticity control during transfer and processing of the data on the basis of mechanisms used PR-rcdundancy of various nature, and software and algorithmic realization of results for developing technologies of electronic document interchange.
Scientific novelty of disscrtational research consists in the following:
concept, methodology and software and algorithmic bases to construction methods, models and algorithms for the information authenticity control in systems of electronic document interchange arc developed, classes of objects characterized by PR-rcdundancy, applied to provide accuracy, integrity, efficiency, compression, availability of information resources in EDIS arc allocated;
methods and algorithms arc offered for control of information reliability at the expense of use the artificial redundancy on the basis of linear, modular, plane summing mechanisms and definition of belonging to the coded subsets;
methods and software complexes arc developed for control of information reliability at the expense of use the natural redundancy on the basis of algorithms in which procedures of statistical, arithmetic, parsing coding, n-gram structured description, statistical pattern recognition and hashing of text elements arc realized;
for control and correction of spelling mistakes in texts on Uzbek language methods and algorithms arc offered on the basis of models of multilevel morphological analysis and n-grams Grammatik description;
on the basis of enclosed logic criteria, database and knowledgebase in structure of the built-in expert systems methods and algorithms arc developed for the control of information authenticity at the expense of use the structural-technological PR-rcdundancy;
methods arc offered to synthesis algorithms of text information reliability control in interactive system of errors detection and correction for developing technologies of electronic document interchange.
Conclusion
1. Developed in the dissertation constructive methods, models, software and algorithms complexes to control of information authenticity by principles of using of PR-rcdundancy on the basis of concepts of system analysis, control and information processing allow to increase efficiency and productivity of EDIS.
2. The estimation of current state of the theory and practice of code, hardware and program methods of control of authenticity information transfer had shown insufficiency of existing types of redundancy for providing qualitative functioning of EDIS. Principles of use of PR-rcdundancy at electronic documents for working out applied methods, software and algorithmic complexes to providing of information transfer authenticity have allowed to design toolkit of development of existing technologies.
3. Methods of: linear, plane and modular summation; codings by rules of Haffman, Lempcl-Ziv-Velch, Barrousc-Willcr, arithmetic coding, statistical recognition, logic control form methodical bases of use of PR-rcdundancy for expansion possibilities of algorithms and software complexes to providing of the information authenticity during drawing up, transfer and processing of electronic documents texts.
4. Efficiency of developed algorithms is shown and solutions arc got for tasks of control the information authenticity on the basis of criterion of mistakes undctccting probabilities. It is established, that they find up to 92 % of all kinds of mistakes, capable to correct single, double and adjacent transpositional mistakes, in comparison with existing methods reduce labour content and cost of control in 2-3 times if probability of mistakes is accepted as P«4-10-3, and also raise the information authenticity up to three orders.
5. To solving tasks of control and correction of spelling mistakes in Uzbek texts methods, algorithms and systems arc developed included morphological and n-gram structured models. The developed technique of getting frequency characteristics of n-gram on the basis of distortions probability parameters statistics arc applied during systematization hash-codes for parsing coding.
6. Interpolation and extrapolation methods of construction the logic and arithmetic function of statistical recognition arc used for working out algorithms to control of text elements images authenticity. Methods arc developed to control authenticity of alarm characteristics of text elements images in ncuronctworking system to information processing which includes parts of automatic recognition and control of images signals. Methods and algorithms arc realized in the structure system to control of information authenticity for eases when information in EDIS is represented as metatext on the basis of belonging attributes and classification of metatext on fuzzy semantic hypcrnct.
7. Methods and algorithms of the control of the information authenticity, based on methods of dictionary, statistical and hash-codings provide effective applying of the hardware-software environment of parallel computations NVIDIA with use of standard libraries of numerical analysis, optimized data exchange between CPU and GPU for optimization.
8. It is determined that at realization of the system to control of spelling on the basis of developed ways of description and identification of the software shell, treelike representation of n-gramm grammar and architecture of framework Sfinks-4 focused on various language models used PR-rcdundancy, the number of undetected errors and cost of realization considerably decreases, and labour content in comparison with the spelling control system on the basis of morphological analysis decreases twice.
9. Developed simulating algorithms, complexes of software and systems to control of information authenticity on the basis of using PR-rcdundancy have found practical application in systems of: automated organization of educational environment in high schools; adapted data transfer, processing and analysis in infocommunication networks; EDIS of enterprises.
10. The developed software complexes to control the information authenticity in structure of EDIS and computer system of adapted transfer, handling and data analysis arc implemented in real working conditions in the Samarkand branch «UzTelecom» of the State committee or communication, for informatization and telecommunication technologies of the Republic of Uzbekistan and in Joint Venture «Tasty-Fuit». Appropriate certificates confirm cost of economical efficiency of dissertation results.
This article discusses the provisions of the current legislation of the Republic of Kazakhstan and the Republic of Uzbekistan, regulating the field of electronic document management. The article considered the regulatory legal acts of the Republic of Kazakhstan and the Republic of Uzbekistan, regulating the issues of drawing up an electronic document and implementing electronic document management, such as: the Law of the Republic of Kazakhstan "On electronic documents and electronic digital signature" dated January 7, 2003; The Law of the Republic of Uzbekistan "On Electronic Document Management"; Law of the Republic of Kazakhstan "On Informatization" dated November 24, 2015 No. 418; Law of the Republic of Uzbekistan "On informatization" dated December 11, 2003 No. 560; Law of the Republic of Kazakhstan dated July 26, 2016 No. 11"On payments and payment systems"; Law of the Republic of Uzbekistan dated November 1, 2019 No. 578 "On payments and payment systems". When considering the issue of drawing up an electronic document in electronic document management systems, it is clear that the issue of certifying an electronic document with a seal in the necessary cases has not been settled. For a document to be considered signed and certified with a seal, it is necessary that such a signature and seal be included in the electronic document. Today there is a formal obstacle to the electronic document flow of documents, the creation of which is carried out on special paper forms with coats of arms or emblems. This requirement applies to certain types of statutory, financial documents, notarized documents, etc. In connection with the widespread use of information communications, the problem of information security, the existing systems for storing, transferring and processing information, becomes very important for society. Currently, the prevailing epidemiological situation in the country and in the world has significantly accelerated the exchange of data in electronic form in all spheres of society. Almost all activities of the society have switched to the electronic format of information exchange, including entrepreneurship. We hope that in the Republic of Kazakhstan and in the Republic of
This study presents a novel approach to efficiently monitor electronic equipment loads in ferry ship passenger rooms using Long Range Wireless Communication (LoRA) telemetry technology. The system enables real-time data collection, allowing ship operators to manage and optimize energy consumption effectively. By leveraging LoRA's long-range capabilities, the solution offers a cost-effective and reliable means of monitoring various electrical devices, enhancing passenger safety, comfort, and energy efficiency. This research showcases the potential of LoRA wireless telemetry in maritime applications, particularly in optimizing electronic equipment loads in passenger environments.
Efficient energy management and monitoring in maritime transportation play a crucial role in reducing operational costs and environmental impact. This study presents an innovative approach to monitor electronic equipment loads in passenger rooms aboard ferry ships using Low-Power Wide-Area Network (LoRaWAN) wireless telemetry technology.
The proposed system consists of IoT sensors equipped with LoRa transceivers strategically placed within passenger rooms to collect real-time data on the power consumption of electronic devices such as air conditioning units, lighting, and charging ports. These sensors communicate wirelessly with a central monitoring and control unit, providing ship operators with valuable insights into energy usage patterns.
Key features of this system include low power consumption, long-range communication capabilities, and scalability. By employing LoRaWAN technology, the system achieves reliable data transmission over extended distances, making it suitable for large vessels like ferry ships. Furthermore, the low-power nature of LoRa enables extended battery life for the sensors, reducing maintenance efforts.
The collected data is processed and analyzed to optimize energy usage and improve overall operational efficiency. Operators can remotely monitor and control electronic equipment loads, allowing for immediate adjustments in response to changing passenger demands or energy efficiency goals. Additionally, historical data analysis facilitates predictive maintenance, reducing downtime and repair costs.
This study showcases a successful implementation of the LoRa-based electronic equipment load monitoring system in a real-world ferry ship environment. Preliminary results demonstrate significant reductions in energy consumption and improved operational efficiency. Furthermore, the system contributes to sustainability efforts by lowering greenhouse gas emissions associated with maritime transportation.
This article describes the design of electronic literature and electronic educational program in education, creation of interactive content, management and facilitation of educational activities, methods of creating electronic educational literature for continuous education system, their forms and types, requirements for creating literature, stages and technology of creating electronic textbooks. , is devoted to issues such as the preparation of high-quality modern electronic textbooks only when these requirements are met.
In this article, the study and analysis of types of digital resources in the activities of archives, information about electronic archives and their types, organization of electronic archives is studied. Also, the essence and importance of concepts and knowledge such as the use of electronic archives, creation, regulation, storage of electronic documents, protection of electronic information are revealed.
In the first part, this article analyzes which kind of rules should be applied to electronic communications. It compares advantages and disadvantages of postal and acceptance rules. Then introduces the most appropriate rule for electronic communication. In the second part, the effectiveness incorporation of terms of electronic contracts will be analyzed in the light of UK and EU law. The definition of “durable medium” and UK’s position will be compared with the current legislation of EU. At the end, it discusses the validity of electronic signature in the light of EU and UK law.
As electronic prescribing becomes ubiquitous in primary health care settings, the imperative to ensure patient safety is paramount. This paper delves into the potential hazards associated with electronic prescribing systems and proposes enhanced protocols to mitigate medication errors. The discussion encompasses the intricate landscape of electronic prescription processes, identifying vulnerabilities that may compromise patient welfare. Through an analysis of current practices, this paper outlines proactive measures and improved guidelines aimed at fortifying the electronic prescribing framework. By emphasizing the importance of a comprehensive approach to medication safety, this research contributes to the ongoing dialogue surrounding electronic prescribing in primary health care.
In the article legal questions of regulation of electronic commerce in the Republic of Uzbekistan are analyzed. The author carries out the critical analysis of the legislation of the Republic of Uzbekistan regulating electronic commerce, in particular the Law "On Electronic Commerce" in the new edition. In the conclusion the author gives opinion about prospects of legal regulation of electronic commerce in the country.
Purpose. This article describes the formation of a hybrid form of an electronic textbook in legal education, the essence of online education, theoretical and practical foundations for the correct use of available sources of information for electronic textbooks.
Methodology. The article uses methods of source analysis, pedagogical experiment and comparative analysis to determine the advantages of an electronic textbook integrating search engines and open access sites.
Results. The problems of using electronic textbooks in legal education are analyzed. Studies, scientific works, experiments of foreign scientists have been studied and analyzed, and proposals for implementation in Uzbekistan are given. The existing systems are recommended for the implementation of the virtual environment in the management system of the legal education process.
Conclusion. From these results it is clear that with the help of these systems, students can achieve such qualities as the formation and development of research, information and professional competence.
In this article the procedural aspects of the appointment of forensic examination, the provision of electronic evidence before initiate case, as well as the specific features of the application for the provision of electronic evidence and the court's decision to appoint a forensic expert examination of electronic evidence were covered.
This article analyzes the basis of international and national legislation for the use of electronic digital signature in concluding contracts between business entities. Also, the ways of electronic digital signature and verification of the counterparty are highlighted and proposals are made to improve the legislation in this area.
In the introductory part of the article the author characterizes development of information technologies and enlargement of the electronic transactions. In the basic part the concept of electronic transaction both under the legislation of the Republic of Uzbekistan, and globally is comprehensively considered. In the conclusion the author comes to opinion, that it is necessary to study deeply the relations connected with
electronic transactions, and to develop their legislative base, implementing the international norms and standards.
The article describes the processes of electronic document management of technical documentation in the system of railway automation and telemechanics. Electronic document management is important in enterprises, and this process increases efficiency, saves time, and ensures the security of documents. The electronic document management system includes several criteria in terms of storage capacity. Local and international quality regulatory models the level of construction of information storage is in accordance with certain standards. Types of electronic document management are considered, taking into account several features. Allows employees to receive new documents and automatically track deadlines by directing and monitoring document execution.
This scientific article discusses the development of notaries in the context of digital office work. Along with this, the issues of personnel training and advanced training in the use of modern digital technologies in notarial practice are separately emphasized. The relevance of the study lies in the intensive development of digital technologies and the need to ensure the optimality and speed of the notarial process. The purpose of the study is determined by modern trends in the development of digital document management and digital civil circulation, and is to reveal the key questions posed in a scientific article. The result of the study is conclusions formulated on the basis of a theoretical and legal review of relevant research questions about digital office work in notarial practice. In general, the study allows us to state the need to continue regulatory and law-making work in the field of notaries in the direction of improving its technological foundations and digital office work. In turn, improving the practice of developing digital office work is possible through continuous training of notaries and workers in the notary system.
The aim of the research consists in development of offers and recommendations about further improvement of criminal-legal and criminological measures of fight against crimes in the sphere of information technologies and safety.
The object of the research work is the system of the public relations regulating criminal-legal, criminological and organizational measures for counteraction to crimes in the sphere of information technologies and safety.
The scientific novelty of the research consists of the following:
the expediency of establishment of administrative responsibility for violation of personal privacy at compliance with the law about protection of private life, ensuring protection of the rights of citizens and also completion of legal gaps is proved;
need of establishment of responsibility for infringement of personal privacy in article 1411 Criminal Code of the Republic of Uzbekistan when ensuring criminal legal protection of personal privacy and inevitability of responsibility is proved;
for ensuring the principles of justice and humanity in the criminal legislation the expediency of awarding punishment in the form of restriction of freedom on the persons who have committed crimes in the sphere of information technologies is proved;
high degree of public danger of some crimes (illegal activities for attraction of money and (or) other property (article 1881 of CK), production, storage, distribution or demonstration of the materials containing threat of public safety and to public order (article 2441 of CK)) committed with use of networks of telecommunications and the Internet is explained;
establishment of responsibility for bringing to suicide and inducement to suicide with use of networks of telecommunications and the Internet is proved;
need of introduction of responsibility of the blogger for placement of public negative information of a certain look for the Internet is proved;
inadmissibility of use of personal data of the participants at implementation of electronic commerce for who aren't provided by the contract, need of nondisclosure of the specified data are proved;
establishment of the ban on distribution among children of the information justifying illegal behavior and promoting commission of offense, calling for promotion of the destructive ideas in society and also responsibility for the specified acts is offered;
expediency of application of a method of «confidential dialogue» concerning the persons who have committed information crimes, need of implementation of inquiry, the investigation and preventive measures proceeding from their psychological state are specified;
need of recognition of the actions exerting negative impact to life, health and morality of the personality, made with use of means of information technologies as socially dangerous act is offered.
Implementation of research results. The results of the study are used:
the proposal on establishment of administrative responsibility for violation of personal privacy has found the reflection in article 461 of the Code of the Republic of Uzbekistan about the administrative liability entered by the Law of the Republic of Uzbekistan of September 23, 2016 No. ZRU-411 (the act of Committee on the legislation and the judicial-legal matters of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from September 28, 2016, No. 06/1-05/1148-vkh). This change provides compliance with the law about personal privacy, protection of the rights of citizens and also completion of a legal gap in the legislation;
the proposal on establishment of criminal liability for violation of personal privacy has found the reflection in article 1411 of the Criminal code of the Republic of Uzbekistan entered by the Law of the Republic of Uzbekistan of September 23, 2016 No. ZRU-411 (the act of Committee on the legislation and the judicial-legal matters of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from September 28, 2016, No. 06/1-05/1148-vkh). Establishment of criminal liability for commission of the act breaking personal privacy provides criminal legal protection of private life of the person and inevitability of responsibility;
offers on expediency of awarding punishments in the form of restriction of freedom concerning the persons who have committed crimes in the sphere of information technologies, have found the reflection in articles 2781-2786 Criminal Code of the Republic of Uzbekistan according to the Law of the Republic of Uzbekistan from August 10, 2015 No. ZRU-389 (the act of Committee on the legislation and the judicial-legal matters of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 06/1-05). This offer serves purpose of alternative punishment for crimes in the sphere of information technologies;
high degree of public danger of commission of some types of crimes with use of networks of telecommunications and the Internet has found reflection in article 1881, the «g» point of third part of article 2441 Criminal Code of the Republic of Uzbekistan according to the Law of the Republic of Uzbekistan of April 25, 2016 No. ZRU-405 (the act of Committee on the legislation and the judicial-legal matters of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 06/1-05). According to this offer criminal liability for use of information technologies in criminal intents has been established;
responsibility for bringing to suicide, the inducement to suicide made with use of networks of telecommunications and the Internet have been established in article 103 and 1031 Criminal Code of the Republic of Uzbekistan according to the Law of the Republic of Uzbekistan of June 13, 2017 No. ZRU-436 (the act of Committee on the legislation and the judicial-legal matters of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 06/1-05). This offer has served establishment of criminal liability for the information attacks encroaching on human life;
regulations on responsibility of the blogger for dissemination of public negative information of some look on the Internet are introduced in articles 3 and 121 of the Law of the Republic of Uzbekistan from December 11, 2003 No. 560-II «About informatization» (the act of Committee on questions of innovative development, information policy and information technologies of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 05/2-01-71). This offer serves prevention of various crimes committed with use of the Internet;
offers on inadmissibility of use of personal data of the participants at implementation of electronic commerce for who aren't provided by the contract need of nondisclosure of the specified data have found the reflection in article 18 of the Law of the Republic of Uzbekistan of May 22, 2018 No. ZRU-385 «About electronic commerce» (the act of Committee on questions of innovative development, information policy and information technologies of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 05/2-01-71). This offer became a basis for the ban illegal use of personal data from participants of electronic commerce;
offers on establishment of the ban on distribution among children of the information justifying illegal behavior and promoting commission of offense, calling for promotion of the destructive ideas in society and also responsibility for the specified acts are introduced in article 16 of the Law of the Republic of Uzbekistan of September 8, 2017 No. ZRU-444 «About protection of children from information doing harm to their health» (the act of Committee on questions of innovative development, information policy and information technologies of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 05/2-01-71). This offer has served recognition of dissemination of information among children of information doing harm to their health as illegal behavior;
offers on improvement of criminal liability for crimes in the sphere of information technologies and safety have been used by preparation of analytical notes within the Concept of improvement of the criminal and criminal procedure legislation approved by the resolution of the President of the Republic of Uzbekistan of May 14, 2018 No. PP-3723 (the act of Committee on questions of innovative development, information policy and information technologies of the Legislative Chamber of the Oliy Majlis of the Republic of Uzbekistan from July 2, 2018, No. 05/2-01-71). This offer serves a proving of inevitability of responsibility for crimes in the sphere of information technologies and information security;
offers on expediency of application of a method of «confidential dialogue» concerning the persons who have committed information crimes, need of implementation of inquiry, the investigation and preventive measures proceeding from their psychological state have been introduced in activity of the relevant structural divisions of the Ministry of Internal Affairs of the Republic of Uzbekistan (the act of the Ministry of Internal Affairs of the Republic of Uzbekistan from July 2, 2018 No. 33/1985). This offer has served increase in efficiency of prevention of crimes in the sphere of information technologies and information security;
offers on need of definition of external influence, level of competence and practical skills of employees, motives of offense when studying the reasons of crimes in the sphere of information technologies and information security and also conducting monitoring of social networks have been introduced in activity of the relevant structural divisions of the Ministry of Internal Affairs of the Republic of Uzbekistan (the act of the Ministry of Internal Affairs of the Republic of Uzbekistan from July 2, 2018 No. 33/1985). This offer has served definition of the reasons and early warning of crimes in the sphere of information technologies and information security;
offers that the information security is object of criminal legal protection taking into account its direct connection with the state interests have found the reflection in the Law of the Republic of Uzbekistan «About modification and additions in the Law of the Republic of Uzbekistan «About the principles and guarantees of freedom of information» (the act of the Center of information security and assistance in ensuring public order at the Ministry of information technology development and communications of the Republic of Uzbekistan from November 13, 2017 No. 03-07-02/124). This offer has served protection of information security as object of criminal legal protection;
offers on need of implementation of complex measures from law enforcement agencies for ensuring information security at information security have found the reflection in the Law of the Republic of Uzbekistan «About modification and additions in the Law of the Republic of Uzbekistan «About the principles and guarantees of freedom of information» (the act of the Center of information security and assistance in ensuring public order at the Ministry of information technology development and communications of the Republic of Uzbekistan from November 13, 2017 No. 03-07-02/124). This offer has provided orientation of activity of law enforcement agencies on information security;
offer that threats of information security exert essential harm to the interests of the personality, society and state information have found the reflection in the Law of the Republic of Uzbekistan «About modification and additions in the Law of the Republic of Uzbekistan «About the principles and guarantees of freedom of information» (the act of the Center of information security and assistance in ensuring public order at the Ministry of information technology development and communications of the Republic of Uzbekistan from November 13, 2017 No. 03- 07-02/124). This offer has allowed to estimate high degree of public danger of information threats as a factor of commission of information crimes;
the rule about protection of the personality against illegal information influence taking into account that impact on consciousness of the personality with use of means of information technologies exerts negative impact on life, health and morality of the personality, has found the reflection in the Law of the Republic of Uzbekistan «About modification and additions in the Law of the Republic of Uzbekistan «About the principles and guarantees of freedom of information» (the act of the Center of information security and assistance in ensuring public order at the Ministry of information technology development and communications of the Republic of Uzbekistan from November 13, 2017 No. 03-07-02/124). This offer has served recognition of the specified actions as socially dangerous act.
Structure and volume of the dissertation. The thesis consists of an introduction, four chapters, a conclusion, a list of used literature and applications. The volume of the thesis is 260 pages.
At the department of the Tashkent State Dental Institute on the subject "Ophthalmology", an electronic multimedia textbook has been developed - an educational electronic publication created at a high scientific and methodological level, fully consistent with the program of the subject, ensuring the continuity and completeness of the didactic cycle of the learning process with the implementation of interactive feedback. Our textbook combines text, various types of audio and video effects under the control of interactive software - there is a polysensory effect on the learning process. The practical application of the electronic textbook at our department contributed to the increase in the interest of students, the improvement of the quality of education, a deeper correspondence of the level of preparedness of students to the requirements of the state standard.
This article attempts to analyze the institution of admissibility of evidence, in particular electronic evidence. Some issues of the specifics of such evidence are also considered. As a result, some recommendations were developed to ensure the issue of admissibility of electronic evidence.
Subject of research: the evolution of English Grammars in the framework of information technologies development.
Purpose of work: the influence of information technologies to the constituents characteristics of English grammars in the process of evolution, the analyses of constituents of electronic English Grammars in comparison to traditional ones.
Methods of research: descriptive method, comparative method, expert-analythic method, observation method.
The results obtained and their novelty: the study of English Grammars in the framework of Information Technologies Development allows to clarify the achievements in the sphere of General and Applied Linguistics, the History of Linguistics, Text Linguistics, the Methods of Teaching Languages, allows to form the theoretical prerequisites in creation of electronic English Grammars, and defining the nature of new types of English Grammars.
Practical value: results of the dissertation can be used in creation of interactive electronic resources, in giving courses on Applied Linguistics, Text Linguistics, General Linguistics, the History of Linguistics and the Theory of Grammatical Description.
Degree of embed and economic effectivity. The main results of research and ideas arc reflected in scientific articles published by the candidate as well as her speeches at scientific conferences and arc implemented into teaching process of English language at the Academy of State and Social Construction under the President of the Republic of Uzbekistan and the Higher School of Business.
Field of application: creation of the new types of English Grammars, creation of interactive electronic resources, delivering courses of lectures on General Linguistics, the History of Linguistics, the Theory of Language and the courses on the methods of teaching.
The article deals with the issues of current state and development of the processes of digitalization of judicial and out-of-court alternative dispute resolution, reflection on legislation which regulates this area, information technology capabilities, taking into account the intensive development of information and communication technologies. In addition, the article presents the author's position on goals, objectives, advantages and problems of digitalization of the activities of arbitration courts, as well as suggestions and recommendations for eliminating these problems.