
Rasim AlguliyevInstitute of Information Technology | ICT · Information Security
Rasim Alguliyev
Professor
About
278
Publications
97,727
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,694
Citations
Citations since 2017
Publications
Publications (278)
The article examines the formation of cyber-physical systems in Azerbaijan and some topical problems of their complex security. Moreover, the article highlights the features and problems of digital transformation of state institutions effected by cyber-physical systems. It classifies the main pillars of cyber-physical systems (algorithmic security,...
This paper proposes a novel approach based on deep learning to improve oil reservoirs' history matching problem. Deep autoencoders are widely used to solve the oil industry problems. However, as the input data increases, the autoencoder parameters increase exponentially. Our model is based on a convolutional variational autoencoder using AlexNet an...
The rapid development of ICT has a significant impact on the lifestyle of and communication among people. Such impact tendencies alter the human activity as well as government functions and the ways these are implemented. The studies related to Web 2.0, social media, social networks, and their use in the government sector show that the issues such...
Nowadays, improvement of governance, ensuring security and timely detection of propaganda against the government are major problems of e-government. The extraction of hidden social networks operating against the state in e-government is one of the key factors to ensure the security in e-government. In this article, a method has been proposed for ex...
This paper proposes a machine learning method for automatically detecting and identifying facies from digital images of the oil well core. The method is based on artificial neural networks, specifically, pre-trained deep convolutional neural networks, improved using histogram of oriented gradients and local binary pattern methods. AlexNet, Inceptio...
Proxy-model is a popular reservoir modeling tool in the oil and gas industry due to its computational efficiency. This paper proposes and evaluates a proxy-model for reservoir history matching using extreme learning machines. The model does not require many computational resources when it is necessary to perform a large number of iterations. The pr...
The processes of terminologization and determinologization are analyzed, the presence of close interaction between these processes is determined. The mathematical modeling of the dynamics of the number of terms is described. Terminological processes occurring in the national terminological information system are formed on the basis of mathematical...
Children and teenagers are among Internet users and they encounter harmful data in the global network. Young users often become the potential victims of pornographic images. Avoiding pornographic images harmful to the child audience is an important research task in the field of detection, computer vision and multimedia. Malicious content can be pre...
The issues related to the geographic information systems and spatial databases play an important role in toponymic research. The interest for this field is due to the expansion of the use of geographic data. This article examines the functions of toponymy, and analyzes the impact of historical events and processes, the change of socio-economic form...
Careful monitoring of plant conditions and their diagnosis are necessary, but a human cannot control a large area of land where the crop grows. This paper proposes the solution of this problem. Early diagnosis and accurate detection of plant leaf diseases can prevent the spread of the disease. In the last decade, machine learning methods and image...
Abstract: The problem of the Internet addiction (IA) arose after the rise of the Internet. Some of the Internet users
include children and teenagers and they are active in a virtual environment. Most minor users are not well aware of the
dangers posed by information abundance. One of these dangers is the IA. Excessive use of the Internet is addic...
The urgency of solving the problem of ensuring the security of cyber-physical systems is due to ensure their correct functioning. Cyber-physical system applications have a significant impact on different industrial sectors. The number and variety of cyber-attacks are growing, aimed not only at obtaining data from cyber-physical systems but also man...
В статье исследуются сущность и особенности «черного рынка» персональных данных. Рассмотрены являющиеся предметом купли-продажи на «черном рынке» виды информации и услуг, технологии и их ценовая политика, а также цели, для которых используются персональные данные, приобретенные на «черном рынке». Кроме того, отмечены проблемы, связанные с незаконны...
The protection of language diversity has become one of the topical issues in the rapidly globalizing modern world influenced by information technology. The article studies the protection of Azerbaijani language in e-government. The approaches to the impacts of globalization on lingua-cultural space and linguistic processes are explored. The protect...
The modelling is widely used in determining the best strategies for the mitigation of the impact of infectious diseases. Currently, the modelling of a complex system such as the spread of COVID-19 infection is among the topical issues. The aim of this article is graph-based modelling of the COVID-19 infection spread. The article investigates the st...
The modelling is widely used in determining the best strategies for the mitigation of the impact of infectious diseases. Currently, the modelling of a complex system such as the spread of COVID-19 infection is among the topical issues. The aim of this article is graph-based modelling of the COVID-19 infection spread. The article investigates the st...
The modelling is widely used in determining the best strategies for the mitigation of the impact of infectious diseases. Currently, the modelling of a complex system such as the spread of COVID-19 infection is among the topical issues. The aim of this article is graph-based modelling of the COVID-19 infection spread. The article investigates the st...
Automatic identification of conversations related to DDoS events in social networking logs helps the organizations act proactively through early detection of negative and positive sentiments in cyberspace. In this article, the authors describe the novel application of a deep learning method to the automatic identification of negative and positive s...
The article proposes a comprehensive method for the multicriteria evaluation of websites. The essence of this method is that using this method we can not only evaluate a website traditionally, but also obtain the following useful results: importance coefficient of each of the criteria, the evaluation of the website for each criterion individually....
The application of clustering algorithms is expanding due to the rapid growth of data volumes. Nevertheless, existing algorithms are not always effective because of high computational complexity. A new parallel batch clustering algorithm based on the k-means algorithm is proposed. The proposed algorithm splits a dataset into equal partitions and re...
Резюме
В статье изучены возможности использования фольклора в решении проблем информационной безопасности. Отмечается, что в настоящее время быстрый рост роли Интернета в повседневной жизни помимо преимуществ имеет такие отрицательные стороны, как появление киберпреступлений и кибернасилия, скрытых социальных сетей и процессов, носящих криминальный...
The essence and different approaches to the national security are explored in the article. The article interprets the objectives and provision methods of the national security. Different areas and vital interests that are the objects of the national security are classified. According to this classification, the components of the national security,...
Performance assessment and timely failure detection of the electric submersible pump can reduce operation costs and maintenance in the oil and gas field. Features of equipment malfunction are changes in vibration signals. Evaluation of vibrations based on accelerometer sensors can detect failures and allows assessment of system failures. This paper...
The aim of this study is the development of a weighted consensus clustering that assigns weights to single clustering methods using the purity utility function. In the case of Big data that does not contain labels, the utility function based on the Davies-Bouldin index is proposed in this paper. The Banknote authentication, Phishing, Diabetic, Magi...
Currently, globalization process significantly impacts not only technological, economical, but also social, political and cultural fields. Ongoing social, economic and political processes demonstrate their impacts, and countries are governed by different regimes and government forms. From this standpoint, there is a need for qualified, competent st...
This paper is devoted to the analysis of the multidisciplinary problems of the big data technology in the oil and gas industry. Application capabilities of big data technologies in issues such as reducing the exploitation risks, crude oil price forecasting, optimal management of the oil wells, health and safety ensuring in an organisation, overcomi...
E-government expresses the process of utilizing advanced information and communication technologies (ICT) to automate internal activities of government agencies and their external relations with citizens and businesses. All these interactions provide better, faster and more secure public services. In this article, a method for the detection of terr...
In this paper, to control children’s access to malicious information on the Internet, a
data sanitisation method based on Deep Generative Adversarial Networks is proposed. According
to the proposed approach, an autoencoder inside the generator block by adding some noise
implements the transformation of sensitive attributes considered dangerous f...
In this paper, to control children’s access to malicious information on the Internet, a
data sanitisation method based on Deep Generative Adversarial Networks is proposed. According
to the proposed approach, an autoencoder inside the generator block by adding some noise
implements the transformation of sensitive attributes considered dangerous f...
The aim of the study is the application of multi-criteria evaluation methods for ranking of candidates in e-voting. Due to the potential to enhance the electoral efficiency in e-voting multiple criteria, such as personality traits, activity and reputation in social media, opinion followers on election area and so on for the selection of qualified p...
Статья посвящена формированию электронной демографической (э-демографической) системы на основе единого государственного реестра для проведения демографических исследований. В эпоху цифровых технологий возникают новые источники данных для исследования демографического поведения. Данные реестра населения, используемые для демографических исследовани...
Although fiction has created the impression of eternity and the incombustibility of manuscripts, the reality is completely different. As old manuscripts and rare books are made of quickly igniting and quick-burning materials and made of materials subject to accelerated wear, the implementation of preserving, restoring and conserving work of such ma...
Big data analysis requires the presence of large computing powers, which is not always feasible. And so, it became necessary to develop new clustering algorithms capable of such data processing. This study proposes a new parallel clustering algorithm based on the k-means algorithm. It significantly reduces the exponential growth of computations. Th...
nformasiya texnologiyaları problemləri, 2013, №2(8), 3-9 www.jpit.az 3 UOT 004.056 Əliquliyev R.M. 1 , Abdullayeva F.C. 2 AMEA İnformasiya Texnologiyaları İnstitutu, Bakı, Azərbaycan 1 director@iit.ab.az , 2 farqana@iit.ab.az BULUD TEXNOLOGİYALARINDA İNAM MƏSƏLƏLƏRİNİN ANALİZİ Təqdim olunan işdə bulud texnologiyalarının təhlükəsizlik problemləri sı...
E-voting is one of the most important components of e-democracy and includes interesting research topics, such as the mechanisms of participation in elections, technological solutions to e-voting and the efficient application of those in e-voting. Currently, there are numerous voting systems adopted in many countries of the world and each of those...
Nowadays, improvement of governance, ensuring security and timely detection of propaganda against the government are major problems of e-government. The extraction of hidden social networks operating against the state in e-government is one of the key factors to ensure the security in e-government. In this article, a method has been proposed for ex...
For privacy-preserving analysing of big data, a deep learning method is proposed. The method transforms the sensitive part of the personal information into non-sensitive data. To implement this process, two-stage architecture is proposed. The modified sparse denoising autoencoder and CNN models have been used in the architecture. Modified sparse de...
The use of modern information technologies, including the Internet of things, contributes to the effectiveness of industrial production in the oil and gas sector. Solutions in this area are constantly developing and provide great advantages in terms of increasing the speed of exploration and detection of oil and gas, increasing oil production, and...
The use of clustering methods in anomaly detection is considered as an effective approach. The choice of the cluster primary center and the finding of local optimum in the well-known k-means and other classic clustering algorithms are considered as one of the major problems and do not allow to get accurate results in anomaly detection. In this pape...
E-voting is one of the most important components of e-democracy and forms the basis of a democratic governance system. Voting results always lead to a broad debate in terms of candidate selection and whether the candidate elected to a position is suitable for that position. At present, the selection of qualified personnel and their appointment to r...
Abstract—The article presents a conceptual model for
the national intellectual system aiming the safety
provision of the children in Internet environment. The
structucal components and work principles of the
proposed model are explained. This model employs webanalytics, data sanitization (cleaning) technology, expert
systems, text mining, clusterin...
Recently, data collected from social media enable to analyze social events and make predictions about real events, based on the analysis of sentiments and opinions of users. Most cyber-attacks are carried out by hackers on the basis of discussions on social media. This paper proposes the method that predicts DDoS attacks occurrence by finding relev...
The article explores the international practice regarding the assessment of dissertation works. A method is proposed for automated assessment of dissertation works. In this regard, algorithms are developed for the automation of pre-examination. This method allows to determine the similarity of essential parts of the dissertation (the goal of disser...
With the development of theories on the study of the citizens' behavior and the features of development and formation of knowledge and skills in the e-government environment, are expanding the interests in the concepts as social capital, human capital and the system of social credit. Stimulating development and measuring social capital is one of th...
The social credit system is aimed at the assessment of citizens based on big data representing their daily activities. The social credit score represents the labor activities of citizens and their behavior in society and is important for making the right decisions in e-government in socio-economic and political spheres. The issues such as collectin...
Nowadays, the improvement of governance, ensurance the security and the timely detection of propaganda against the government are major problems of e-government. Extraction of hidden social networks is one of the most actual problems in the term of government security. The extraction of hidden social networks operating against the state in e-govern...
Automatic identification of conversations related to DDoS events in social networking logs helps the organizations act proactively through early detection of negative and positive sentiments in cyberspace. In this article, the authors describe the novel application of a deep learning method to the automatic identification of negative and positive s...
The optimization of task scheduling process in the cloud-computing environment is the multi-criteria NP-hard problem. The paper proposes a PSO based αPSO-TBLB (Task Based Load Balancing) load balancing method. The method provides an optimal migration of tasks causing overload from loaded virtual machines to corresponding virtual machines in the clo...
This article discusses the method of estimating the complexity of textbooks for secondary schools in Azerbaijan using readability formulas modified for the Azerbaijani language. The dynamics of changes in the level of readability of textbooks in the transition from lower grades to older ones, as well as the relevance of the complexity of educationa...
The enhancement of evaluation methods and development of effective public administration mechanisms are crucial for providing effective e-government services. This article explores the international practice in the field of e-service evaluation. The organization and provision of e-services in government entities, as well as the evaluation regarding...
Text summarization is a process of extracting salient information from a source text and presenting that information to the user in a condensed form while preserving its main content. In the text summarization, most of the difficult problems are providing wide topic coverage and diversity in a summary. Research based on clustering, optimization, an...
Context. The task of using the ensemble of classifiers to detect DoS attacks in large arrays of network traffic data is solved to withstand
attacks on the network.
Objective of this paper is to build an ensemble of classifiers that surpasses single classifiers in terms of accuracy.
Method. To achieve the formulated goal an algorithm, that indicates...
E-government expresses the process of utilizing advanced information and communication technologies (ICT) to automate internal activities of government agencies and their external relations with citizens and businesses. All these interactions provide better, faster and more secure public services. In this article, a method for the detection of terr...
The definition of the credit rating of citizens and the calculation of credit scores led to the development of the social credit system. The article examines the role of social capital in the e-government environment, the world experience in connection with the definition and use of credit ratings of citizens. The principle of work, importance and...
The creation of cyber-physical systems posed new challenges for people. Ensuring the information security of cyber-physical systems is one of the most complex problems in a wide range of defenses against cyber-attacks. The aim of this paper is to analyse and classify existing research papers on the security of cyber-physical systems. Philosophical...
The creation of cyber-physical systems posed new challenges for people. Ensuring the information security of cyber-physical systems is one of the most complex problems in a wide range of defenses against cyber-attacks. The aim of this paper is to analyse and classify existing research papers on the security of cyber-physical systems. Philosophical...
Locating modernized solutions is an urgent task serving to increase the productivity and competitiveness of the oil and gas complex (OGC). The use of modern information technologies in this direction is constantly developing, which provides an increase in the speed of exploration and detection of oil, an increase in oil production and a reduction i...
In this paper, a new method for anomaly detection based on weighted clustering is proposed. The weights that were obtained by summing the weights of each point from the data set are assigned to clusters. The comparison is made using seven datasets (of large dimensions) with the k-means algorithm. The proposed approach increases the reliability of d...
В статье проанализированы аспекты формирования ИКТ-ориентированных
инновационных систем, а также экономики информации и знаний. Определены
основные направления государственной политики по развитию науки и технологий. Обоснована необходимость создания национальной инновационной системы. Проанализированы инновационные процессы, позволяющие развиват...
Personnel evaluation process is aimed at choosing the best alternative to fill the defined vacancy in an organization. It determines the input quality of personnel and thus plays an important role in human resource management. The multi criteria nature and the presence of qualitative factors make it considerably more complex. This paper proposes a...
This study aims to present a bibliometric analysis of the journal titled “Information Processing & Management (IP & M)” for the period from 1980 to 2015. The present study was conducted with an aim to provide a summary of research activity in current journal and characterize its most important aspects. The analysis covers mainly the year-wise distr...
The rapid development of ICT has a significant impact on the lifestyle of and
communication among people. Such impact tendencies alter the human activity as
well as government functions and the ways these are implemented. The studies related
to Web 2.0, social media, social networks, and their use in the government sector
show that the issues such...
DİL SƏNAYESİ: İMKANLAR, PERSPEKTİVLƏR VƏ PROBLEMLƏR Məqalədə dil sənayesinin mahiyyəti, xüsusiyyətləri, müasir vəziyyəti və perspektivləri araşdırılır. İnformasiya cəmiyyətində dil xidmətlərinin rolu göstərilir. Dil sənayesi biliklər iqtisadiyyatının mühüm sahəsi kimi xarakterizə olunur. Eləcə də, dil sənayesinin əsas seqmentləri təsnifatlandırılır...
At present, an anomaly detection is one of the important problems in many fields. The rapid growth of data volumes requires the availability of a tool for data processing and analysis of a wide variety of data types. The methods for anomaly detection are designed to detect object's deviations from normal behavior. However, it is difficult to select...
Selection of the right tool for anomaly (outlier) detection in Big data is an urgent task. In this paper algorithms for data clustering and outlier detection that take into account the compactness and separation of clusters are provided. We consider the features of their use in this capacity. Numerical experiments on real data of different sizes de...
Abstract: In this article, comparative analysis of different indicator system in accordance with formation and assessment of development level of information and knowledge economy is given. Main methodological approaches related to their development
and analysis are analyzed. Some recommendations about elimination of problems existing in this field...
Plagiarism is the unauthorized use of the ideas, presentation of someone else’s words or work as your
own. This paper presents an External Plagiarism Detection System (EPDS), which employs a combination
of the Semantic Role Labeling (SRL) technique, the semantic and syntactic information. Most of the
available methods fail to capture the meaning in...