Rasim Alguliyev

Rasim Alguliyev
Institute of Information Technology | ICT · Information Security

Professor

About

278
Publications
97,727
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,694
Citations
Citations since 2017
104 Research Items
2184 Citations
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400

Publications

Publications (278)
Chapter
The article examines the formation of cyber-physical systems in Azerbaijan and some topical problems of their complex security. Moreover, the article highlights the features and problems of digital transformation of state institutions effected by cyber-physical systems. It classifies the main pillars of cyber-physical systems (algorithmic security,...
Article
This paper proposes a novel approach based on deep learning to improve oil reservoirs' history matching problem. Deep autoencoders are widely used to solve the oil industry problems. However, as the input data increases, the autoencoder parameters increase exponentially. Our model is based on a convolutional variational autoencoder using AlexNet an...
Chapter
Full-text available
The rapid development of ICT has a significant impact on the lifestyle of and communication among people. Such impact tendencies alter the human activity as well as government functions and the ways these are implemented. The studies related to Web 2.0, social media, social networks, and their use in the government sector show that the issues such...
Chapter
Nowadays, improvement of governance, ensuring security and timely detection of propaganda against the government are major problems of e-government. The extraction of hidden social networks operating against the state in e-government is one of the key factors to ensure the security in e-government. In this article, a method has been proposed for ex...
Article
This paper proposes a machine learning method for automatically detecting and identifying facies from digital images of the oil well core. The method is based on artificial neural networks, specifically, pre-trained deep convolutional neural networks, improved using histogram of oriented gradients and local binary pattern methods. AlexNet, Inceptio...
Article
Full-text available
Proxy-model is a popular reservoir modeling tool in the oil and gas industry due to its computational efficiency. This paper proposes and evaluates a proxy-model for reservoir history matching using extreme learning machines. The model does not require many computational resources when it is necessary to perform a large number of iterations. The pr...
Article
The processes of terminologization and determinologization are analyzed, the presence of close interaction between these processes is determined. The mathematical modeling of the dynamics of the number of terms is described. Terminological processes occurring in the national terminological information system are formed on the basis of mathematical...
Article
Children and teenagers are among Internet users and they encounter harmful data in the global network. Young users often become the potential victims of pornographic images. Avoiding pornographic images harmful to the child audience is an important research task in the field of detection, computer vision and multimedia. Malicious content can be pre...
Article
The issues related to the geographic information systems and spatial databases play an important role in toponymic research. The interest for this field is due to the expansion of the use of geographic data. This article examines the functions of toponymy, and analyzes the impact of historical events and processes, the change of socio-economic form...
Article
Full-text available
Careful monitoring of plant conditions and their diagnosis are necessary, but a human cannot control a large area of land where the crop grows. This paper proposes the solution of this problem. Early diagnosis and accurate detection of plant leaf diseases can prevent the spread of the disease. In the last decade, machine learning methods and image...
Article
Full-text available
Abstract: The problem of the Internet addiction (IA) arose after the rise of the Internet. Some of the Internet users include children and teenagers and they are active in a virtual environment. Most minor users are not well aware of the dangers posed by information abundance. One of these dangers is the IA. Excessive use of the Internet is addic...
Article
Full-text available
The urgency of solving the problem of ensuring the security of cyber-physical systems is due to ensure their correct functioning. Cyber-physical system applications have a significant impact on different industrial sectors. The number and variety of cyber-attacks are growing, aimed not only at obtaining data from cyber-physical systems but also man...
Article
Full-text available
В статье исследуются сущность и особенности «черного рынка» персональных данных. Рассмотрены являющиеся предметом купли-продажи на «черном рынке» виды информации и услуг, технологии и их ценовая политика, а также цели, для которых используются персональные данные, приобретенные на «черном рынке». Кроме того, отмечены проблемы, связанные с незаконны...
Article
Full-text available
The protection of language diversity has become one of the topical issues in the rapidly globalizing modern world influenced by information technology. The article studies the protection of Azerbaijani language in e-government. The approaches to the impacts of globalization on lingua-cultural space and linguistic processes are explored. The protect...
Article
Full-text available
The modelling is widely used in determining the best strategies for the mitigation of the impact of infectious diseases. Currently, the modelling of a complex system such as the spread of COVID-19 infection is among the topical issues. The aim of this article is graph-based modelling of the COVID-19 infection spread. The article investigates the st...
Article
Full-text available
The modelling is widely used in determining the best strategies for the mitigation of the impact of infectious diseases. Currently, the modelling of a complex system such as the spread of COVID-19 infection is among the topical issues. The aim of this article is graph-based modelling of the COVID-19 infection spread. The article investigates the st...
Article
Full-text available
The modelling is widely used in determining the best strategies for the mitigation of the impact of infectious diseases. Currently, the modelling of a complex system such as the spread of COVID-19 infection is among the topical issues. The aim of this article is graph-based modelling of the COVID-19 infection spread. The article investigates the st...
Chapter
Automatic identification of conversations related to DDoS events in social networking logs helps the organizations act proactively through early detection of negative and positive sentiments in cyberspace. In this article, the authors describe the novel application of a deep learning method to the automatic identification of negative and positive s...
Article
Full-text available
The article proposes a comprehensive method for the multicriteria evaluation of websites. The essence of this method is that using this method we can not only evaluate a website traditionally, but also obtain the following useful results: importance coefficient of each of the criteria, the evaluation of the website for each criterion individually....
Article
The application of clustering algorithms is expanding due to the rapid growth of data volumes. Nevertheless, existing algorithms are not always effective because of high computational complexity. A new parallel batch clustering algorithm based on the k-means algorithm is proposed. The proposed algorithm splits a dataset into equal partitions and re...
Article
Full-text available
Резюме В статье изучены возможности использования фольклора в решении проблем информационной безопасности. Отмечается, что в настоящее время быстрый рост роли Интернета в повседневной жизни помимо преимуществ имеет такие отрицательные стороны, как появление киберпреступлений и кибернасилия, скрытых социальных сетей и процессов, носящих криминальный...
Article
Full-text available
The essence and different approaches to the national security are explored in the article. The article interprets the objectives and provision methods of the national security. Different areas and vital interests that are the objects of the national security are classified. According to this classification, the components of the national security,...
Article
Full-text available
Performance assessment and timely failure detection of the electric submersible pump can reduce operation costs and maintenance in the oil and gas field. Features of equipment malfunction are changes in vibration signals. Evaluation of vibrations based on accelerometer sensors can detect failures and allows assessment of system failures. This paper...
Article
The aim of this study is the development of a weighted consensus clustering that assigns weights to single clustering methods using the purity utility function. In the case of Big data that does not contain labels, the utility function based on the Davies-Bouldin index is proposed in this paper. The Banknote authentication, Phishing, Diabetic, Magi...
Article
Full-text available
Currently, globalization process significantly impacts not only technological, economical, but also social, political and cultural fields. Ongoing social, economic and political processes demonstrate their impacts, and countries are governed by different regimes and government forms. From this standpoint, there is a need for qualified, competent st...
Article
This paper is devoted to the analysis of the multidisciplinary problems of the big data technology in the oil and gas industry. Application capabilities of big data technologies in issues such as reducing the exploitation risks, crude oil price forecasting, optimal management of the oil wells, health and safety ensuring in an organisation, overcomi...
Chapter
E-government expresses the process of utilizing advanced information and communication technologies (ICT) to automate internal activities of government agencies and their external relations with citizens and businesses. All these interactions provide better, faster and more secure public services. In this article, a method for the detection of terr...
Article
Full-text available
In this paper, to control children’s access to malicious information on the Internet, a data sanitisation method based on Deep Generative Adversarial Networks is proposed. According to the proposed approach, an autoencoder inside the generator block by adding some noise implements the transformation of sensitive attributes considered dangerous f...
Article
Full-text available
In this paper, to control children’s access to malicious information on the Internet, a data sanitisation method based on Deep Generative Adversarial Networks is proposed. According to the proposed approach, an autoencoder inside the generator block by adding some noise implements the transformation of sensitive attributes considered dangerous f...
Article
Full-text available
The aim of the study is the application of multi-criteria evaluation methods for ranking of candidates in e-voting. Due to the potential to enhance the electoral efficiency in e-voting multiple criteria, such as personality traits, activity and reputation in social media, opinion followers on election area and so on for the selection of qualified p...
Article
Full-text available
Статья посвящена формированию электронной демографической (э-демографической) системы на основе единого государственного реестра для проведения демографических исследований. В эпоху цифровых технологий возникают новые источники данных для исследования демографического поведения. Данные реестра населения, используемые для демографических исследовани...
Article
Full-text available
Although fiction has created the impression of eternity and the incombustibility of manuscripts, the reality is completely different. As old manuscripts and rare books are made of quickly igniting and quick-burning materials and made of materials subject to accelerated wear, the implementation of preserving, restoring and conserving work of such ma...
Article
Full-text available
Big data analysis requires the presence of large computing powers, which is not always feasible. And so, it became necessary to develop new clustering algorithms capable of such data processing. This study proposes a new parallel clustering algorithm based on the k-means algorithm. It significantly reduces the exponential growth of computations. Th...
Article
Full-text available
nformasiya texnologiyaları problemləri, 2013, №2(8), 3-9 www.jpit.az 3 UOT 004.056 Əliquliyev R.M. 1 , Abdullayeva F.C. 2 AMEA İnformasiya Texnologiyaları İnstitutu, Bakı, Azərbaycan 1 director@iit.ab.az , 2 farqana@iit.ab.az BULUD TEXNOLOGİYALARINDA İNAM MƏSƏLƏLƏRİNİN ANALİZİ Təqdim olunan işdə bulud texnologiyalarının təhlükəsizlik problemləri sı...
Article
Full-text available
E-voting is one of the most important components of e-democracy and includes interesting research topics, such as the mechanisms of participation in elections, technological solutions to e-voting and the efficient application of those in e-voting. Currently, there are numerous voting systems adopted in many countries of the world and each of those...
Article
Nowadays, improvement of governance, ensuring security and timely detection of propaganda against the government are major problems of e-government. The extraction of hidden social networks operating against the state in e-government is one of the key factors to ensure the security in e-government. In this article, a method has been proposed for ex...
Article
For privacy-preserving analysing of big data, a deep learning method is proposed. The method transforms the sensitive part of the personal information into non-sensitive data. To implement this process, two-stage architecture is proposed. The modified sparse denoising autoencoder and CNN models have been used in the architecture. Modified sparse de...
Article
Full-text available
The use of modern information technologies, including the Internet of things, contributes to the effectiveness of industrial production in the oil and gas sector. Solutions in this area are constantly developing and provide great advantages in terms of increasing the speed of exploration and detection of oil and gas, increasing oil production, and...
Article
Full-text available
The use of clustering methods in anomaly detection is considered as an effective approach. The choice of the cluster primary center and the finding of local optimum in the well-known k-means and other classic clustering algorithms are considered as one of the major problems and do not allow to get accurate results in anomaly detection. In this pape...
Article
Full-text available
E-voting is one of the most important components of e-democracy and forms the basis of a democratic governance system. Voting results always lead to a broad debate in terms of candidate selection and whether the candidate elected to a position is suitable for that position. At present, the selection of qualified personnel and their appointment to r...
Article
Full-text available
Abstract—The article presents a conceptual model for the national intellectual system aiming the safety provision of the children in Internet environment. The structucal components and work principles of the proposed model are explained. This model employs webanalytics, data sanitization (cleaning) technology, expert systems, text mining, clusterin...
Article
Full-text available
Recently, data collected from social media enable to analyze social events and make predictions about real events, based on the analysis of sentiments and opinions of users. Most cyber-attacks are carried out by hackers on the basis of discussions on social media. This paper proposes the method that predicts DDoS attacks occurrence by finding relev...
Article
Full-text available
The article explores the international practice regarding the assessment of dissertation works. A method is proposed for automated assessment of dissertation works. In this regard, algorithms are developed for the automation of pre-examination. This method allows to determine the similarity of essential parts of the dissertation (the goal of disser...
Article
Full-text available
With the development of theories on the study of the citizens' behavior and the features of development and formation of knowledge and skills in the e-government environment, are expanding the interests in the concepts as social capital, human capital and the system of social credit. Stimulating development and measuring social capital is one of th...
Article
Full-text available
The social credit system is aimed at the assessment of citizens based on big data representing their daily activities. The social credit score represents the labor activities of citizens and their behavior in society and is important for making the right decisions in e-government in socio-economic and political spheres. The issues such as collectin...
Article
Nowadays, the improvement of governance, ensurance the security and the timely detection of propaganda against the government are major problems of e-government. Extraction of hidden social networks is one of the most actual problems in the term of government security. The extraction of hidden social networks operating against the state in e-govern...
Article
Full-text available
Automatic identification of conversations related to DDoS events in social networking logs helps the organizations act proactively through early detection of negative and positive sentiments in cyberspace. In this article, the authors describe the novel application of a deep learning method to the automatic identification of negative and positive s...
Article
Full-text available
The optimization of task scheduling process in the cloud-computing environment is the multi-criteria NP-hard problem. The paper proposes a PSO based αPSO-TBLB (Task Based Load Balancing) load balancing method. The method provides an optimal migration of tasks causing overload from loaded virtual machines to corresponding virtual machines in the clo...
Article
Full-text available
This article discusses the method of estimating the complexity of textbooks for secondary schools in Azerbaijan using readability formulas modified for the Azerbaijani language. The dynamics of changes in the level of readability of textbooks in the transition from lower grades to older ones, as well as the relevance of the complexity of educationa...
Article
Full-text available
The enhancement of evaluation methods and development of effective public administration mechanisms are crucial for providing effective e-government services. This article explores the international practice in the field of e-service evaluation. The organization and provision of e-services in government entities, as well as the evaluation regarding...
Article
Full-text available
Text summarization is a process of extracting salient information from a source text and presenting that information to the user in a condensed form while preserving its main content. In the text summarization, most of the difficult problems are providing wide topic coverage and diversity in a summary. Research based on clustering, optimization, an...
Article
Full-text available
Context. The task of using the ensemble of classifiers to detect DoS attacks in large arrays of network traffic data is solved to withstand attacks on the network. Objective of this paper is to build an ensemble of classifiers that surpasses single classifiers in terms of accuracy. Method. To achieve the formulated goal an algorithm, that indicates...
Article
Full-text available
E-government expresses the process of utilizing advanced information and communication technologies (ICT) to automate internal activities of government agencies and their external relations with citizens and businesses. All these interactions provide better, faster and more secure public services. In this article, a method for the detection of terr...
Article
Full-text available
The definition of the credit rating of citizens and the calculation of credit scores led to the development of the social credit system. The article examines the role of social capital in the e-government environment, the world experience in connection with the definition and use of credit ratings of citizens. The principle of work, importance and...
Article
The creation of cyber-physical systems posed new challenges for people. Ensuring the information security of cyber-physical systems is one of the most complex problems in a wide range of defenses against cyber-attacks. The aim of this paper is to analyse and classify existing research papers on the security of cyber-physical systems. Philosophical...
Article
The creation of cyber-physical systems posed new challenges for people. Ensuring the information security of cyber-physical systems is one of the most complex problems in a wide range of defenses against cyber-attacks. The aim of this paper is to analyse and classify existing research papers on the security of cyber-physical systems. Philosophical...
Conference Paper
Full-text available
Locating modernized solutions is an urgent task serving to increase the productivity and competitiveness of the oil and gas complex (OGC). The use of modern information technologies in this direction is constantly developing, which provides an increase in the speed of exploration and detection of oil, an increase in oil production and a reduction i...
Article
Full-text available
In this paper, a new method for anomaly detection based on weighted clustering is proposed. The weights that were obtained by summing the weights of each point from the data set are assigned to clusters. The comparison is made using seven datasets (of large dimensions) with the k-means algorithm. The proposed approach increases the reliability of d...
Article
В статье проанализированы аспекты формирования ИКТ-ориентированных инновационных систем, а также экономики информации и знаний. Определены основные направления государственной политики по развитию науки и технологий. Обоснована необходимость создания национальной инновационной системы. Проанализированы инновационные процессы, позволяющие развиват...
Chapter
Personnel evaluation process is aimed at choosing the best alternative to fill the defined vacancy in an organization. It determines the input quality of personnel and thus plays an important role in human resource management. The multi criteria nature and the presence of qualitative factors make it considerably more complex. This paper proposes a...
Article
Full-text available
This study aims to present a bibliometric analysis of the journal titled “Information Processing & Management (IP & M)” for the period from 1980 to 2015. The present study was conducted with an aim to provide a summary of research activity in current journal and characterize its most important aspects. The analysis covers mainly the year-wise distr...
Chapter
Full-text available
The rapid development of ICT has a significant impact on the lifestyle of and communication among people. Such impact tendencies alter the human activity as well as government functions and the ways these are implemented. The studies related to Web 2.0, social media, social networks, and their use in the government sector show that the issues such...
Article
Full-text available
DİL SƏNAYESİ: İMKANLAR, PERSPEKTİVLƏR VƏ PROBLEMLƏR Məqalədə dil sənayesinin mahiyyəti, xüsusiyyətləri, müasir vəziyyəti və perspektivləri araşdırılır. İnformasiya cəmiyyətində dil xidmətlərinin rolu göstərilir. Dil sənayesi biliklər iqtisadiyyatının mühüm sahəsi kimi xarakterizə olunur. Eləcə də, dil sənayesinin əsas seqmentləri təsnifatlandırılır...
Article
Full-text available
At present, an anomaly detection is one of the important problems in many fields. The rapid growth of data volumes requires the availability of a tool for data processing and analysis of a wide variety of data types. The methods for anomaly detection are designed to detect object's deviations from normal behavior. However, it is difficult to select...
Article
Full-text available
Selection of the right tool for anomaly (outlier) detection in Big data is an urgent task. In this paper algorithms for data clustering and outlier detection that take into account the compactness and separation of clusters are provided. We consider the features of their use in this capacity. Numerical experiments on real data of different sizes de...
Conference Paper
Abstract: In this article, comparative analysis of different indicator system in accordance with formation and assessment of development level of information and knowledge economy is given. Main methodological approaches related to their development and analysis are analyzed. Some recommendations about elimination of problems existing in this field...
Article
Plagiarism is the unauthorized use of the ideas, presentation of someone else’s words or work as your own. This paper presents an External Plagiarism Detection System (EPDS), which employs a combination of the Semantic Role Labeling (SRL) technique, the semantic and syntactic information. Most of the available methods fail to capture the meaning in...