Shafagat Mahmudova

Shafagat Mahmudova
Institute of Information Technology, Azebaijan National Academy of Sciences | ITT · Biometric Technology and Software Engineering

PhD degree in Technical sciences, associate Professor

About

136
Publications
726,532
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
121
Citations
Citations since 2016
77 Research Items
87 Citations
201620172018201920202021202205101520
201620172018201920202021202205101520
201620172018201920202021202205101520
201620172018201920202021202205101520
Introduction
Sh. Mahmudova is a head of department at the Institute of Information Technologies. She has PhD degree in technical sciences and asst. professor. She is the author of 95 articles. She was elected deputy editor-in-chief of IJIIP. Sh.J.Mahmudova was elected a reviewer of International Journal of Automation and Power Engineering (USA). Sh.J.Mahmudova was elected a reviewer of Journal of Control Engineering and Technology and British Journal of Applird Science & Technology.
Additional affiliations
September 1998 - May 2012
Baku State University
Position
  • Professor
August 1979 - present
Institute of Information Techology
Position
  • Head of Department
August 1979 - present
Institute of information Technology Azerbaijan National Academy of Sciences
Position
  • Head of Department
Description
  • A local "Network Academy" of CISCO was established at Training The Institute researchers established national Internet infrastructure in Azerbaijan for the first time.

Publications

Publications (136)
Presentation
https://youtu.be/HGbQD4MRbWs Video Presentition The article provides information on the synthesis of software systems. It explores the issue of synthesis in decision-making and highlights its importance. In this article, the development of a conceptual model for the problems of synthesis of intelligent software systems, creation of a model of the...
Chapter
This study reviews software security, etc. It studies the methods for the analysis of software security. The problems of software protection are identified. The risks for software projects, their management, determination and categories are studied. The article describes the ontology of cybersecurity based on standards. The main concepts related to...
Data
2nd International Symposium on Characterization2nd International Symposium on Characterization
Conference Paper
An intelligent software system refers to any software using artificial intelligence to analyze and interpret data or to communicate with systems and people. The article substantiates the relevance of the issue and highlights existing problems. The following factors are taken into consideration when assessing the problems of intelligent software sys...
Chapter
Software efficiency indicators play a key role in its optimization. Various ways are available to ensure software optimization. One of the key indicators of software is its reliability. Software reliability refers to the program features to perform certain functions and they are kept within certain limits under specified conditions. Software reliab...
Article
Full-text available
As computing technology progresses, computer systems and their activity domain are becoming widespread, and software projects are becoming complicated in the current society. Software testing is time-consuming and expensive. It aims at validating software functional and non-functional requirements, including software performance. During the test st...
Data
ХVII International Scientific and Practical Conference Tokyo, Japan May 03 – 06, 2022, pp. 985-989
Article
Full-text available
Article History Keywords Software systems Intelligent software Conceptual model Stages Components Directions. This article provides information on the design of intelligent software systems. An intelligent software system refers to any software using artificial intelligence to analyze and interpret data or to communicate with systems and people. Th...
Data
XIII Международная научно-практическая конференция «Multidisciplinary academic research, innovation and results», 05-08 апреля 2022 г., Прага, Чехия
Conference Paper
Full-text available
Artificial intelligence is a universal field of science. The application areas of artificial intelligence are diverse. They are actively adapting to and changing other sciences when solving any problem. Intelligent System (IS) is a technical or software system that competently solves the problems that are relevant to a particular subject area and t...
Conference Paper
Full-text available
This article provides information about the industrial revolutions and analyzes the Fourth Industrial Revolution. The Fourth Industrial Revolution takes away the potential risks of unsustainable growth and world systems, and its coming is estimated as a challenge. The main technologies of the Fourth Industrial Revolution are identified. Big data te...
Presentation
Full-text available
The fight against terrorism and criminals has sharply increased in modern times. The wave of terrorist acts around the world has created a need for improved detection and preventive security systems and software. One of the main challenges facing the most states is the development of new principles and approaches to the prevention of smuggling and...
Article
Full-text available
Article History Keywords Internet of things Industrial revolution Network Smart devices Platform. This article outlines the Internet of Things (IoT). The Internet of Things describes a network of physical objects, i.e., the "thing" including sensors, software, and other technologies for connection and data sharing with other devices and systems ove...
Presentation
Full-text available
The presentation explores the field of intelligent systems. The structure, types, application and classification of the intelligent system are studied. The intelligent system is a technical or software system that is capable of solving the problems which are specific and creative in a particular subject area, so that knowledge is stored in the memo...
Article
Full-text available
This paper develops a new algorithm by applying the Bayesian method to software using artificial immune systems. An artificial immune system is an adaptive computing system that uses models, principles, mechanisms, and functions used to solve problems in theoretical immunology. Its application to various fields of science is studied. The role that...
Poster
Full-text available
Preprint
Full-text available
This study provides information on artificial immune systems. The artificial immune system is an adaptive computational system that uses models, principles, mechanisms and functions to describe and solve the problems in theoretical immunology. Its application in various fields of science is explored. The theory of natural immune systems and the key...
Data
XXV-й Международной научной конференции «Implementation of modern science and practice», 11-14 мая 2021, Варна, Болгария.
Article
Full-text available
This article provides information about the industrial revolutions and analyzes the Fourth Industrial Revolution. The Fourth Industrial Revolution takes away the potential risks of unsustainable growth and world systems, and its coming is estimated as a challenge. The main technologies of the Fourth Industrial Revolution are identified. Big data te...
Data
This award ceremony is a unique international platform that’s a confluence of all stakeholders of the ecosystem – Industry, Academia, Researchers, Innovators, Regulators – coming together to meet and share your knowledge among them from all around the world.VDGOOD Scientist Awards 2021 strives to offer a professional awards program that encourages...
Presentation
Full-text available
. This article explores the field of artificial intelligence and intellectual systems. The structure, types and classification of the intellectual system are studied. The intellectual system is a technical or software system that is capable of solving the problems which are specific and creative in a particular subject area, so that knowledge is st...
Article
Full-text available
The article develops an algorithm by using the analytic hierarchy process (AHP) method to evaluate the functionality of software. Software functionality is the capacity to perform a number of software product functions. In other words, the software functionality means the ability of software product to perform a number of functions. AHP is a struct...
Article
Full-text available
Different technologies, methods and algorithms are used when developing high-quality software systems. There are various ways to create optimal software. One of them is an ant algorithm. The ant algorithm can be attributed to the field of biomimetic. Ant algorithm is one of the most effective polynomial algorithms for finding approximate solutions,...
Article
The article develops an algorithm by using the analytic hierarchy process (AHP) method to evaluate the functionality of software. Software functionality is the capacity to perform a number of software product functions. In other words, the software functionality means the ability of software product to perform a number of functions. AHP is a struct...
Article
Full-text available
The paper highlights the personal data and the stages of its protection. Some provisions of the Law of the Republic of Azerbaijan on the personal data are reviewed. The protection of personal data through programs is explored. The studies in this area are reviewed. Data protection methods through programs are studied and analyzed. Some recommendati...
Raw Data
This certificate verifies that Shafagat Mahmudova has completed 1 review(s) in 2019 for Journal of Big Data. (Springer Open, Scopus).
Article
Full-text available
Article History Keywords Artificial intelligence Intelligent system Classification Direction Conceptual model. This article explores the field of artificial intelligence and intellectual systems. The structure, types and classification of the intellectual system are studied. The intellectual system is a technical or software system that is capable...
Article
Full-text available
Technique for Order of Prevention by Similarity to Ideal Solution (TOPSİS) method is used for decision-making to improve software efficiency and to optimize its management by using methodological approaches. TOPSIS method is a multi-criteria decision-making analysis method. TOPSIS identifies the best alternative variant based on compromise solution...
Conference Paper
Full-text available
The paper highlights the personal data and the stages of its protection. Some provisions of the Law of the Republic of Azerbaijan on the personal data are reviewed. The protection of personal data through programs is explored. The studies in this area are reviewed. Data protection methods through programs are studied and analyzed. Some recommendati...
Book
Full-text available
ICATES 2019 provides an ideal academic platform for researchers to present the latest research findings and describe emerging technologies, and directions in Engineering and Natural Sciences issues. The conference seeks to contribute to presenting novel research results in all aspects of Engineering, Technology and Natural Sciences. The conference...
Article
Full-text available
Biomimetics is an rntrtation moclel <lf systems and elements in the nature to solve complex hurnan problems' Living organisms have well-adapted structures and materials for natural selection and have evolved over many y"urrlfn! study of biomimetics lechnologies and their application in different areas can play an important role in the perfect eiono...
Conference Paper
Full-text available
The study machine learning for software based on Soft Computing technology. It analyzes Soft Computing components. Their use in software, their advantages and challenges are studied. Machine learning and its features are highlighted. The functions and features of neural networks are clarified, and recommendations were given
Poster
: http://www.conscientiabeam.com/journal/76/editorial-board.html
Article
Full-text available
This paper examines the methods of increasing software efficiency based on soft computing technology by analyzing the benefits and challenges of the components used in software development. The functions and features of machine learning, comprising neural networks, perceptron, support vector machines, and fuzzy logic are highlighted and explained,...
Book
The book reviews the basics of the theory of programming and programming languages. The specifics of algebraic thinking and formation are highlighted and the mechanism of their usage in programming is explained. The criteria for the evaluation of programming languages are identified and the algorithm is developed to estimate the effectiveness. Soft...
Conference Paper
Full-text available
Nowadays cloud computing is widely used in various fields. Ensuring security of users in clouds is one of the main problems. In this study, one of the biometric authentication methods, that is human face recognition methods for providing security in clouds are analyzed. Problems in this field are studied.
Conference Paper
Full-text available
Nowadays cloud computing is widely used in various fields. Ensuring security of users in clouds is one of the main problems. In this study, one of the biometric authentication methods, that is human face recognition methods for providing security in clouds are analyzed. Problems in this field are studied.
Article
Full-text available
This study reviews software security, etc. It studies the methods for the analysis of software security. The problems of software protection are identified. The risks for software projects, their management, determination and categories are studied. Software development process includes the construction of an agreed structure for software developme...
Conference Paper
Full-text available
Human Phase Intelligence Communication Cyberspahe: Human Communication in Computer Interface Design of Human Phase in the phical intellengence humanist
Data
Published Paper Certificates
Article
Full-text available
The article provides information about software performance. The software performance is analyzed and problems are explored. Mathematical and engineering approaches and models for solving performance issues are highlighted. The ways to increase software performance are explained. Importance of considering a number of factors in this area is emphasi...
Article
Full-text available
The study machine learning for software based on Soft Computing technology. It analyzes Soft Computing components. Their use in software, their advantages and challenges are studied. Machine learning and its features are highlighted. The functions and features of neural networks are clarified, and recommendations were given.
Conference Paper
Full-text available
This paper provides information about software security. Methods of analysis of software security have been studied. The problems that are important to protect software have been identified. Risks for software projects, their management, assignment, categories and so on. studied.
Article
Full-text available
The article provides information on the basics of software engineering, programming and programming languages. Software engineering is also defined as a systematic approach to the analysis, scheduling, design, evaluation, implementation, testing, service and software upgrading. Thinking and the peculiarities of the algorithmic peculiarities are cla...
Article
Full-text available
The article provides information on the methods of organizing the technological process of software development. The key point is that if information is processed, it must be used for these three elements It explores the interaction of people, technology and process. Types of technological processes and software development models are analyzed. Tec...
Conference Paper
Full-text available
In the work information about biometric technologies is given. The advantages of databases based on the unified platform in biometric network environment are shown. The effective ways of recognition are investigated and their comparative analysis is implemented. The human recognition in biometric network is studied and new method is suggested.
Article
Full-text available
A survey was carried out on the awareness and willingness of the consumers in Yambol, Bulgaria to use the mass customization tools when purchasing clothing on-line. The results show that they do not have enough information to use mass personalization when ordering clothes online. This low awareness leads to indecision for the design and purchase of...
Article
Full-text available
The study presents the information on software engineering (SE) and the knowledge spheres covered by SE. The development stages of programming and the problems encountered in this field are explored. Various programming languages are used to create software for problems. Programming is the process of developing software for a computer. One of the m...
Article
Full-text available
Nowadays cloud computing is widely used in various fields. Ensuring security of users in clouds is one of the main problems. In this study, one of the biometric authentication methods, that is human face recognition methods for providing security in clouds are analyzed. Problems in this field are studied.
Conference Paper
Full-text available
In modern age cloud computing are widely used in various fields. Ensuring users' security in cloud computing is one of the main problems. In this study, methods of recognition of human face by one of the biometric authentication methods in ensuring security users in cloud computing have been explained. Problems in this field have been investigated.
Book
One of the fields of social science is anthropology. Anthropology is the science of the origin of human, the development allaws, etc. The material provides information about the history of anthropology, the stages of development, problems, anthropometry, its dimensions, and so on. Cyberanthropology is analyzed as a field of science that explores th...
Article
Full-text available
In the paper general information about biometric technologies is given. The advantages of databases based on the unified platform in biometric network environment are shown. The ways of ensuring security in biometric network are clarified. The effective ways of recognition are investigated and their comparative analysis is implemented. The ways of...
Article
Full-text available
Particular problems encountered by programmers are reviewed in this study. Some indicators of statistical data on programmers working in the programming sector are analyzed. Distinctive characteristics of programmers working in the software engineering sector are explored. The information about modern technologies (big data, cloud computing, etc.)...
Conference Paper
Full-text available
The study presents the information on software engineering (SE) and the knowledge spheres covered by SE. The development stages of programming and the problems encountered in this field are explored. The information on programming languages are presented, the comparative analysis of those is carried out, and the advantages and drawbacks of each are...
Conference Paper
Full-text available
Particular problems encountered by programmers are reviewed in this study. Some indicators of statistical data on programmers working in the programming sector are analyzed. Distinctive characteristics of programmers working in the software engineering sectorare explored. The information about modern technologies (big data, cloud computing, etc.) e...
Article
Full-text available
In the article, a new algorithm is proposed for finding coefficients that determine significance extent of the values of geometric characteristics that are used for determination of racial and ethnic identity of human. It is explained that the calculation of coefficients which determine the importance extent of the values of geometric characteristi...
Presentation
Full-text available
One of the goals of software engineering development of software products. Software products must meet the technical, economic and social demands.
Conference Paper
Full-text available
In the article, a new algorithm for finding coefficients that determine significance extent of the values of geometric characteristics that are used for determination of racial and ethnic identity of human is proposed. It is explained that the calculation of coefficients which determine the importance extent of the values of geometric characteristi...
Article
Full-text available
This article aimed to analyze biometric technologies, opportunities and prospects of using those in electronic medicine. The ways of increasing reliability of medical service in health by using biometric technologies are embodied. Identification issues according to the image of skull and head of human corpse shot while he was alive are touched upon...
Article
Full-text available
In the article, a new algorithm for finding coefficients that determine significance extent of the values of geometric characteristics that are used for determination of racial and ethnic identity of human is proposed. It is explained that the calculation of coefficients which determine the importance extent of the values of geometric characteristi...
Article
Full-text available
This study is devoted to Big Data problems in biometric technologies. It highlights the importance of the use of Big Data technologies in solution of a wide range of issues facing the national security, law enforcement system and defense authorities. The study provides information about Big Data and advanced cloud technologies in the field of biome...
Article
Full-text available
The paper provides information about biometric technologies, traditional and electronic libraries. Opportunities and prospects of the use of biometric technologies in libraries are analyzed. When using traditional methods data loss or theft may occur, whereas emergence of such threats is not possible in biometric identification/ Application of biom...
Conference Paper
Full-text available
In the article, study of the use of biometric technologies and their possibilities and prospects of electron medicine were analyzed. The use of biometric technology in medicine increases the reliability of health and medical services. Touched identification based on photos of human head and his skull. Investigated the possibility introducing of bio...
Presentation
Full-text available
In the work, study of the use of biometric technologies and their possibilities and prospects of electron medicine were analyzed. The use of biometric technology in medicine increases the reliability of health and medical services. Touched identification based on photos of human head and his skull. Investigated the possibility introducing of biomet...
Conference Paper
Full-text available
In this an article submitted information about biometric technologies, traditional and electronic libraries. The use of biometric technology in libraries opportunities and prospects has been analyzed. Explained the advantages and disadvantages of introduction of biometric technologies in libraries.
Article
Full-text available
Ethnic belonging of any person is one of his groups of signs. Hence, the need for its study may be due to a variety of reasons, such as the recognition of a person’s face, preparation of identity card, describing the image of an unknown person, or creating photo portrait of the missing or the offender basing on the oral description, and so on. The...
Presentation
Full-text available
Bu iş biometrik texnologiyalarda Big Data problemlərinə həsr olunmuşdur. Milli təhlükəsizlik, hüquq-mühafizə sisteminin və müdafiə orqanlarının qarşısında duran məsələlərin geniş spektrinin həllində Big Data texnologiyalarının istifadə edilməsinin əhəmiyyəti göstərilmişdir. Biometrik texnologiyalar sahəsində Big Data və buludların müasir texnologiy...
Presentation
Full-text available
The article describes the approaches for the racial and ethnic determination of a person. Ethnic belonging of any person is one of his groups of signs; hence, the need for its study may be due to a variety of reasons, such as the recognition of a person's face, creating identification card, making up the image of an unknown person, or of a missing...
Article
Full-text available
In this article, we propose about biometric network, the essence of the problem and identification. The system finds facial images in auto mode via video camera, encodes them, and identifies them using the images available in a database. The joint use of integrated or distributed biometric database is one of the main goals. For this purpose, the us...
Research
Full-text available
Clustering - the majority of any similar elements to divide the groups, which groups elements that not intersect with each other. The majority of the elements, dots, etc. The characteristics of the vector. can be. Each group is divided into cluster.
Article
Full-text available
The article is about the role of biometric technology in information security. The increased terrorist threat in the world has urged the biometric identification systems to be established in order to improve the safety systems. The advantages of biometric technology are shown to address the issues facing the authorities of law enforcement system, t...
Article
Full-text available
This article is devoted to developing a recognition method of race and ethnicity of individual based on portrait photographs. The reference image is formed based on selected geometric points of the face and a special algorithm for calculating the characteristic parameters of the images available in the database. Next, the original image is compared...
Article
Full-text available
The paper provides statistical analysis of the characteristic features used to determine racial and ethnic identity of a person basing on the images. Standard characteristic features of the persons of each ethnic group have been set accordingly. Characteristic features of random image have been compared with the characteristic features of standard...
Conference Paper
Full-text available
The article is about the role of biometric technology in ensuring information safety. In connection with the increased terrorist threats around the world, biometric identification systems is necessary to be developed in order to improve the safety systems. The article indicates advantages of the use of biometric technology to address the issues fac...
Conference Paper
Full-text available
Работа посвящена разработке метода по определению обобщенных геометрических характеристик лица на основе фотопортретов людей. На основе выбранных геометрических точек лица и специального алгоритма вычисления характеристических параметров изображений имеющихся в базе, формируется эталонное изображение. Задача идентификации сводится к сравнению исход...
Conference Paper
Full-text available
Bu məqalə insanın tanınması üçün biometrik şəəbəkədən istifadə edilməsi məsələsinə həsr olunmuşdur. Biometrik verilənlər bazalarının şəbəkə mühitində istifadəsi əsas məsələlərdən biridir. Biometrik verilənlər bazalarının birgə istifadəsində biometrik şəbəkədən istifadə edilir. Məqalədə həmçinin neyron şəbəkələr, təhlükəsizlik və digər məsələlərə to...
Conference Paper
Full-text available
Məqalə fotoportretlər əsasında insan sifətinin irqi və etnik mənsubiyyətə görə tanınması üçün alqoritmin işlənməsinə həsr olunmuşdur. Sifətin seçilmiş həndəsi nöqtələri və bazada olan fotoportretlərin xarakteristik əlamətlərinin hesablanması alqoritmi əsasında etalon təsvirin xarakteristik əlamətləri formalaşdırılır. Sonra ixtiyari təsvirin xarakte...
Presentation
Full-text available
In this article, we propose about biometric network, the essence of the problem and identification. The system finds facial images in auto mode via video camera, encodes them, and identifies them using the images available in a database. The joint use of integrated or distributed biometric database is one of the main goals. For this purpose, the us...
Presentation
Full-text available
Şəxsin üzünün təsviri, barmaq izləri və göz bəbəyi kimi vacib biometrik parametrlərdən istifadə etməklə yüksək keyfiyyətli identifikasiyaya, maksimum dəqiqliyə nail olmaq olar. Verilənlər bazalarının ölçüləri və onlarda saxlanılan informasiyanın keyfiyyəti biometrik sistemlər üçün çox önəmlidir. İnteqrasiyanın vacibliyi və ya paylanmış biometrik ve...
Article
Full-text available
— The establishment and development stages of program engineering in Azerbaijan are provided. As a result of continuing and sustainable development policy of Azerbaijan in current stage, information-communication systems development are described. The works to be carried out for program engineering to gain a specific importance in the economy and t...
Conference Paper
Full-text available
this article is devoted to developing a recognition method of race and ethnicity of individual based on portrait photographs. The reference image is formed based on selected geometric points of the face and a special algorithm for calculating the characteristic parameters of the images available in the database. Next, the original image is compared...
Conference Paper
Full-text available
This article is devoted to developing a recognition method of race and ethnicity of individual based on portrait photographs. The reference image is formed based on selected geometric points of the face and a special algorithm for calculating the characteristic parameters of the images available in the database. Next, the original image is compared...
Conference Paper
Full-text available
This article is devoted to developing a recognition method of race and ethnicity of individual based on portrait photographs. The reference image is formed based on selected geometric points of the face and a special algorithm for calculating the characteristic parameters of the images available in the database. Next, the original image is compared...
Thesis
Full-text available
Mürəkkəb proqram sistemlərinin həyat dövrü sistemin yaradılması ideyasından başlayır, layihələndirmə, proqramlaşdırma, tətbiq və sistemin müşayiət edilməsi ilə sona çatır. Sistemin həyat dövrü modelini ardıcıl yerinə yetirilən mərhələlərə bölürlər. Hər mərhələdə yerinə yetiriləcək proseslər, məsələlər və işlər göstərilir, həmin işlərin sona çatması...
Conference Paper
Full-text available
Each year, the increasing role of women in the development of ICT. Turing Award, the most prestigious in the field of computer science and information technology have been awarded to her for the first time - a 75-year-old Francis Allen, the famous IBM computer corporation employee.

Questions

Questions (111)

Network

Cited By

Projects

Projects (26)
Project
Sharing of achievements and accomplishments by all members. Support everyone by recommending, commenting, and following their research and achievements. We should promote each other's work as researchers and keep motivating everyone for further research work. (If you want to add as collaborator in this project request any collaborator by adding comments on their updates, they'll surely add you)
Project
PROVIDE OPEN ACCES TO RESEARCHGATE MEMBERS: articles, projects, scientific databases, journals, conferences, research, tests, models and mathematical modeling and other scientific resources. FREE ACCESS. THE CONDITION IS THE CITATION OF THE AUTHORS.
Project
Create an interactive environment through new electronic devices and technologies, and the presence of a variety of sources of information and experience. Not to attend the same location through distance learning, and this is one of the most important goals of e-learning. In times of corona virus isolation, the educational process should not "suffer" and we should not lack contacts with students and colleagues.