O‘ZGARUVCHAN MUHITDA SHAXS YUZINI TANIB OLISH TIZIMINING DASTURIY-TEXNIK TA’MINOTI
Keywords:
tizim arxitekturasi, ma’lumotlar bazasi, mikroservislar, edge computing, biometrik identifikatsiya, RBAC, APIAbstract
Maqolada manzil-koloniyalarda mahkumlarni masofaviy nazorat qilish tizimining dasturiy-texnik ta’minotini taqdim etilgan. Taqsimlangan hisoblash muhitida ishlaydigan uch darajali arxitektura (edge-fog-cloud) ishlab chiqilgan. Ma’lumotlar bazasi modeli, dasturiy modullar tuzilishi, foydalanuvchi rollari va huquqlar tizimi batafsil tavsiflangan. Tizim xavfsizligi, autentifikatsiya mexanizmlari va tashqi tizimlar bilan integratsiya masalalari ko‘rib chiqilgan. Taklif etilgan arxitektura cheklangan tarmoq ulanishi sharoitida ishonchli ishlash, ma’lumotlar yaxlitligini ta’minlash va kengaytiriluvchanlikni ta’minlaydi.
References
1. O'zgaruvchan muhitda shaxs yuzini tanib olishning gibrid usuli. Jurnal nomi, 2024. (Ushbu maqolaning 1-qismi – preprocessing va MobileFaceNet asosidagi gibrid usul)
2. O'zbekiston Respublikasi Ichki ishlar vazirligi. Jazoni ijro etish bosh boshqarmasi statistikasi. https://iiv.uz (2024 yil holati)
3. O'zbekiston Respublikasi. Shaxsga doir ma'lumotlar to'g'risidagi Qonun. O'RQ-547-son, 2019 yil 2 iyul.
4. Bass, L., Clements, P., & Kazman, R. (2021). Software Architecture in Practice (4th ed.). Addison-Wesley. (Monolit va taqsimlangan arxitekturalar asoslari)
5. Cockcroft, A., & Sheahan, D. (2011). Benchmarking Cassandra Scalability on AWS. Netflix Tech Blog. https://netflixtechblog.com (Netflix mikroservis o'tish tajribasi)
6. Newman, S. (2021). Building Microservices: Designing Fine-Grained Systems (2nd ed.). O'Reilly Media. (Mikroservis arxitekturasi to'liq qo'llanma)
7. Fowler, M., & Lewis, J. (2014). Microservices: A Definition of This New Architectural Term. martinfowler.com. https://martinfowler.com/articles/microservices.html
8. Vogels, W. (2006). A Word on Scalability. All Things Distributed. https://www.allthingsdistributed.com (Amazon two-pizza teams konseptsiyasi)
9. Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge Computing: Vision and Challenges. IEEE Internet of Things Journal, 3(5), 637-646. doi:10.1109/JIOT.2016.2579198
10. Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog Computing and Its Role in the Internet of Things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 13-16. ACM. doi:10.1145/2342509.2342513 (Fog computing asosiy maqola – Cisco tomonidan)
14. Johnson, J., Douze, M., & Jégou, H. (2019). Billion-scale similarity search with GPUs.
IEEE Transactions on Big Data, 7(3), 535-547. (FAISS – Facebook vektor qidirish kutubxonasi)
15. NIST. (2020). Security and Privacy Controls for Information Systems and Organizations. NIST Special Publication 800-53, Revision 5. (Xavfsizlik nazorati standartlari)
16. Jones, M., Bradley, J., & Sakimura, N. (2015). JSON Web Token (JWT). RFC 7519, Internet Engineering Task Force. https://tools.ietf.org/html/rfc7519
17. Sandhu, R., Coyne, E.J., Feinstein, H.L., & Youman, C.E. (1996). Role-Based Access Control Models. IEEE Computer, 29(2), 38-47. doi:10.1109/2.485845 (RBAC asosiy maqola)
18. Ramírez, S. (2023). FastAPI Documentation. https://fastapi.tiangolo.com/ (FastAPI rasmiy dokumentatsiyasi)
19. ONNX Runtime contributors. (2023). ONNX Runtime: Cross-platform, high performance ML inferencing and training. https://onnxruntime.ai/
20. Merkel, D. (2014). Docker: Lightweight Linux Containers for Consistent Development and Deployment. Linux Journal, 2014(239), Article 2.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Nishanov Akram Hasanovich, Babadjanov Elmurod Satimbayevich, Narziyev Narzullo Baxshilloyevich

This work is licensed under a Creative Commons Attribution 4.0 International License.







