https://conferencepublication.com/index.php/aoc/issue/feed Archive of Conferences 2021-06-13T08:17:34+00:00 Dr. Anjali Sharma editor@conferencepublication.com Open Journal Systems <p>Archive of Conferences (AoC) is a platform created to publish the research papers of the conferences organized worldwide. We are providing the publication support to the conference organizers in order to make the research available online. </p> <p>AIC platform works for the collaboration between the Academic and Scientific Institutions to publish the conference proceedings. We are also providing the services for indexing of the papers in reputed databases.</p> <p>We invite the conference organizers all over the world to publish the special issues of the State, National and International Conferences, Symposium, Events. </p> https://conferencepublication.com/index.php/aoc/article/view/1246 FOOD SAFETY MANAGEMENT SYSTEM AND PRINCIPLES 2021-06-13T07:56:14+00:00 Tukhtasinov Shoxrux Bahodir ogli contact@conferencepublication.com Anvarova Feruzahon Fayzullo qizi contact@conferencepublication.com <p>&nbsp;Food safety involves all necessary measures to eliminate the physical, chemical and biological hazards that occur in food products. Therefore, a safe food product is designed to be consumed and has physical, chemical and microbiological properties for human consumption without losing its nutritional value. In other words, a condition that is not harmful in the sense of a safe diet is important for human health. Otherwise, when unhealthy foods are consumed, unwanted conditions such as the appearance of symptoms or an increase in health problems can occur. Food safety is about consuming food for consumption and determining whether it protects consumers from food-related hazards. So everyone in the food chain has to contribute. Food safety and quality can only be regulated through the application of food safety and quality systems in the food industry.</p> 2021-06-13T00:00:00+00:00 Copyright (c) 2021 https://conferencepublication.com/index.php/aoc/article/view/1247 METHODOLOGY OF LEARNING SORTING ALGORITHMS WITH THE HELP OF VISUALIZATION OF SORTING PROCESS IN CONSOLE MODE 2021-06-13T08:01:07+00:00 Sadullaeva Sh.A contact@conferencepublication.com Beknazarova S.S contact@conferencepublication.com Fozilov F.D contact@conferencepublication.com <p>This article describes in detail the process of implementing a sort using a bubble sort as an example. Sorting was also described in this article. Students studying sorting algorithms will be able to learn sorting algorithms and create their own sorting visualizer</p> 2021-06-13T00:00:00+00:00 Copyright (c) 2021 https://conferencepublication.com/index.php/aoc/article/view/1248 SYSTEMATIZATION OF SECURITY OF MOBILE NETWORKS 2021-06-13T08:08:11+00:00 Fozilov Firdavs Dilshod o’gli contact@conferencepublication.com Beknazarova Saida Safibullayevna contact@conferencepublication.com <p>Although the cryptographic algorithm is the most noticeable weakness of second-generation systems, the GSM security flaws are not limited to this. In particular, it does not provide mutual authentication. In GSM systems, the user was required to authenticate before being allowed access to the network; however, the reverse is not true – the user is not given the option to authenticate the radio station. The technological revolution that took place in the late 90s with the advent of software-defined radio (SDR), made not only possible, but even quite cheap attacks based on "fraudulent base stations", that is, fictitious radio stations controlled by an attacker, who, thus, was able to intercept and interfere with the messages of end users</p> 2021-06-13T00:00:00+00:00 Copyright (c) 2021 https://conferencepublication.com/index.php/aoc/article/view/1249 A PRICELESS MONUMENT 2021-06-13T08:13:40+00:00 Ruzieva Mashhura contact@conferencepublication.com Abdunazarov Khurshid contact@conferencepublication.com <p>In our ancient history, until the independence of the socio-cultural life of the country where our ancestors lived, the way of life and worldview of the people, the principles of the spiritual process, many speculative false and unscientific statements are made, only the findings giving illuminated the dark pages of the past</p> 2021-06-13T00:00:00+00:00 Copyright (c) 2021 https://conferencepublication.com/index.php/aoc/article/view/1250 PROBLEMS OF INFORMATION SECURITY IN 5G NETWORK TECHNOLOGY 2021-06-13T08:17:34+00:00 Makhmudjonov Shokhrukhbek Maksujon o’g’li contact@conferencepublication.com Fozilov Firdavs Dilshod o’gli contact@conferencepublication.com Beknazarova Saida Safibullayevna contact@conferencepublication.com <p>The article describes the new wireless standards inevitably lead to digital transformation. In addition to significantly outperforming previous generations in terms of capacity and bandwidth, 5G networks and systems will provide the infrastructure to support a wide variety of services: industrial Internet of Things and intelligent control systems, autonomous vehicles and drones, vital e-health and remote surgery, virtual and augmented reality, remote diagnostics and preventive maintenance, etc. The number of Internet devices is growing rapidly, so the old standards inevitably have to be upgraded. To work properly, many devices need higher network bandwidth. 5G works on other frequencies, gives Internet access to more devices, has ultra-fast speed and minimizes data transmission delays. Such network improvements require a radically new approach to the security model, unlike that used in cellular systems until the last fourth generation.</p> 2021-06-13T00:00:00+00:00 Copyright (c) 2021