Archive of Conferences <p>Archive of Conferences (AoC) is a platform created to publish the research papers of the conferences organized worldwide. We are providing the publication support to the conference organizers in order to make the research available online. </p> <p>AIC platform works for the collaboration between the Academic and Scientific Institutions to publish the conference proceedings. We are also providing the services for indexing of the papers in reputed databases.</p> <p>We invite the conference organizers all over the world to publish the special issues of the State, National and International Conferences, Symposium, Events. </p> en-US Archive of Conferences FOOD SAFETY MANAGEMENT SYSTEM AND PRINCIPLES <p>&nbsp;Food safety involves all necessary measures to eliminate the physical, chemical and biological hazards that occur in food products. Therefore, a safe food product is designed to be consumed and has physical, chemical and microbiological properties for human consumption without losing its nutritional value. In other words, a condition that is not harmful in the sense of a safe diet is important for human health. Otherwise, when unhealthy foods are consumed, unwanted conditions such as the appearance of symptoms or an increase in health problems can occur. Food safety is about consuming food for consumption and determining whether it protects consumers from food-related hazards. So everyone in the food chain has to contribute. Food safety and quality can only be regulated through the application of food safety and quality systems in the food industry.</p> Tukhtasinov Shoxrux Bahodir ogli Anvarova Feruzahon Fayzullo qizi Copyright (c) 2021 2021-06-13 2021-06-13 1 3 METHODOLOGY OF LEARNING SORTING ALGORITHMS WITH THE HELP OF VISUALIZATION OF SORTING PROCESS IN CONSOLE MODE <p>This article describes in detail the process of implementing a sort using a bubble sort as an example. Sorting was also described in this article. Students studying sorting algorithms will be able to learn sorting algorithms and create their own sorting visualizer</p> Sadullaeva Sh.A Beknazarova S.S Fozilov F.D Copyright (c) 2021 2021-06-13 2021-06-13 4 7 SYSTEMATIZATION OF SECURITY OF MOBILE NETWORKS <p>Although the cryptographic algorithm is the most noticeable weakness of second-generation systems, the GSM security flaws are not limited to this. In particular, it does not provide mutual authentication. In GSM systems, the user was required to authenticate before being allowed access to the network; however, the reverse is not true – the user is not given the option to authenticate the radio station. The technological revolution that took place in the late 90s with the advent of software-defined radio (SDR), made not only possible, but even quite cheap attacks based on "fraudulent base stations", that is, fictitious radio stations controlled by an attacker, who, thus, was able to intercept and interfere with the messages of end users</p> Fozilov Firdavs Dilshod o’gli Beknazarova Saida Safibullayevna Copyright (c) 2021 2021-06-13 2021-06-13 8 10 A PRICELESS MONUMENT <p>In our ancient history, until the independence of the socio-cultural life of the country where our ancestors lived, the way of life and worldview of the people, the principles of the spiritual process, many speculative false and unscientific statements are made, only the findings giving illuminated the dark pages of the past</p> Ruzieva Mashhura Abdunazarov Khurshid Copyright (c) 2021 2021-06-13 2021-06-13 11 13 PROBLEMS OF INFORMATION SECURITY IN 5G NETWORK TECHNOLOGY <p>The article describes the new wireless standards inevitably lead to digital transformation. In addition to significantly outperforming previous generations in terms of capacity and bandwidth, 5G networks and systems will provide the infrastructure to support a wide variety of services: industrial Internet of Things and intelligent control systems, autonomous vehicles and drones, vital e-health and remote surgery, virtual and augmented reality, remote diagnostics and preventive maintenance, etc. The number of Internet devices is growing rapidly, so the old standards inevitably have to be upgraded. To work properly, many devices need higher network bandwidth. 5G works on other frequencies, gives Internet access to more devices, has ultra-fast speed and minimizes data transmission delays. Such network improvements require a radically new approach to the security model, unlike that used in cellular systems until the last fourth generation.</p> Makhmudjonov Shokhrukhbek Maksujon o’g’li Fozilov Firdavs Dilshod o’gli Beknazarova Saida Safibullayevna Copyright (c) 2021 2021-06-13 2021-06-13 14 16