<Repository logo
  • English
  • Қазақ
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
  • English
  • Қазақ
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of SDU repository
  • GuideRegulations
  1. Home
  2. Browse by Author

Browsing by Author "Baimuratov O."

Now showing 1 - 7 of 7
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    ItemOpen Access
    ANALYSIS OF QUANTUM CRYPTOGRAPHY AND TECHNOLOGIES IN INDUSTRIES
    (СДУ хабаршысы - 2020, 2020) Habiburahman Sh.; Baimuratov O. ; Abdinurova N.
    Abstract. In today’s connected world it’s crucial to make sure telecommunication is not a risk. Eavesdroppers will always find a way to attack and harm big companies systems or governmental databases. It’s very important to find the best possible way to keep our services safe. Quantum cryptography is one the best way since it’s based on rules of quantum physics. In this paper we are going to analyse the best solutions, protocols and different aspects of encryption. Real life implementations by different IT companies and investors will also be included in this paper. Weakness and pros always exist in every system and it’s impossible to indicate the system we are proposing is not breakable but it’s going to be the best possible solution for now. Why? It’s going to be discussed in later sections.
  • Loading...
    Thumbnail Image
    ItemOpen Access
    ANALYZE AND DEVELOPMENT SYSTEM WITH MULTIPLE BIOMETRIC IDENTIFICATION
    (СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Dadakhanov Sh.
    Abstract. Cause of a rapid increase in technological development, increasing identity theft, consumer fraud, the threat to personal data is also increasing every day. Methods developed earlier to ensure personal the information from the thefts was not effective and safe. Biometrics were introduced when it was needed technology for more efficient security of personal information. Old-fashioned traditional approaches like Personal identification number (PIN), passwords, keys, login ID can be forgotten, stolen or lost. In biometric authentication system, user may not remember any passwords or carry any keys. As people they recognize each other by the physical appearance and behavioral characteristics that biometric systems use physical characteristics, such as fingerprints, facial recognition, voice recognition, in order to distinguish between the actual user and scammer. In order to increase safety in 2005, biometric identification methods were developed government and business sectors, but today it has reached almost all private sectors as Banking, Finance, home security and protection, healthcare, business security and security etc. Since biometric samples and templates of a biometric system having one biometric character to detect and the user can be replaced and duplicated, the new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.
  • Loading...
    Thumbnail Image
    ItemOpen Access
    COMPARATIVE ANALYSIS BETWEEN TELEGRAM AND WHATSAPP
    (SDU University, 2017) Baimuratov O. ; Ziyat B.
    Absrtact. This paper presents the results of a comparative analysis between Telegram and WhatsApp. The main attention was paid to their application, which determines their relevance to users, security, MTProto mobile protocol access, end-to-end encryption, data security and functionality. The leading social networks are usually available in multiple languages and enable users to connect with friends or people across geographical, political or economic borders. Approximately 2 billion internet users are using social networks and these figures are still expected to grow as mobile device usage and mobile social networks increasingly gain traction.
  • Loading...
    Thumbnail Image
    ItemOpen Access
    DEVELOPMENT OF MOBILE APPLICATION FOR HEALTHY MATERNAL BEHAVIOR IN ORDER TO REDUCE FETAL MORTALITY
    (2021 International Young Scholars' Conference, 2021) Baimuratov O.; Salykbayeva T.
    Abstract Pregnant women are not sufficiently analyzed in scientific studies, which leads to deficiencies in evidence-based treatment guidelines. There are more than two billion smartphone users in the world, which allows researchers to easily and inexpensively conduct large-scale studies using mobile applications, especially among pregnant women, whose use is extremely high, especially as an information channel. This is the first application for pregnancy research, that is, a popular application for them, for self-monitoring and training of expectant mothers. Due to the large-scale and simplified collection of data obtained through surveys, using the application, we strive to improve our understanding of the factors contributing to a healthy pregnancy, both for the mother and the developing fetus. In Kazakhstan, there are many mobile applications that provide only basic data, such as a reminder of a meeting with a doctor, a list of medical institutions, nearest pharmacies, surveys of consumers of medical services, etc. And our application is different in that pregnant women will receive useful information in addition to monitoring, as well as answers to their questions, that is, recommendations on their questions. And also this application will be sent for our country, namely for our mentality, but in the future we are considering, by improving this application, to try to launch them abroad.
  • Loading...
    Thumbnail Image
    ItemOpen Access
    RFID TECHNOLOGY AS A PART OF MONITORING SYSTEMS
    (СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Mamatnabiyev Zh. ; Dadakhanov Sh. ; Berlikozha B.
    Abstract. The Internet of Things (IoT) technologies are getting more popular and being implemented as a solution for many relevant problems in information technology purposing low-costed, secure, and controlled remotely systems. Radio Frequency Identification (RFID) system is used as a type of IoT technology, which has three basic parts: tags, reader and system that manages tag identification (ID) number and its real time location. RFID systems are used in financial institutions, healthcare industry, mobile phones, cars, supply chain management, smart retails, smart house, object localization, security systems and various types of applications for positioning, managing people, assets, and inventory. This paper discusses performances of RFID technologies that use passive tags. Role of RFID technologies in monitoring systems and system architecture are reviewed and compared. Significance of RFID technologies and challenges are also considered for future works.
  • Loading...
    Thumbnail Image
    ItemOpen Access
    STRUCTURE AND CAPABILITIES OF SMART HOME SYSTEM USING CLOUD
    (SDU University, 2017) Tleuli R. Zh. ; Baimuratov O.
    Abstract. This work proposes an exceptional structure of low cost smart home system, based on IOS app linked to the cloud service, which is used for monitoring and controlling. It meets various kinds of requirements of technical and economic perspective and fulfills them all. In addition to that, tools like temperature and humidity sensor, motion sensor, distance sensor, gas sensor, sound sensor etc. will increase effectiveness of the data analysis and changes indication. Moreover, this home automation system could be used not only in industrial and governmental needs, but could also be useful in private sector. In addition to that, gathering and storing data in cloud services guaranty safety and remote access. In this article are shown results of development of SHS (Smart Home System), integrated with the cloud environment and interacting with NodeMCU, which can be used by students, engineers and other users for studying and applying SHS and sensors.
  • Loading...
    Thumbnail Image
    ItemOpen Access
    The Automation of Course Scheduling in Higher Education Institutions: Mathematical methods and software products
    (2020 International Young Scholars Workshop, 2020) Aitchanov B.; Baimuratov O.; Rustauletov B.
    Abstract. The formation and management of schedules is repetitive and troublesome for any class, university and organization. Limited resources in terms of people, time and locations. Institutions needs solutions that will meet all of these constraints of scheduling. That system for scheduling should take in control the scheduling process which takes time by automatically allocating time slots for teaching and creating course schedule. And easily can be integrated with their systems without need to do some extra work like adding data for scheduling or exporting them, reducing the time spend on creating schedules and minimizing errors that made by people. Today, there are various types of systems and services designed to create schedules, reserve classrooms, assign classrooms for course teachers at specific times. The use of modern technologies, methods and models makes it easy to use open applications and services, as well as services at the local level. This paper presents the results of the analysis of systems. Their structures, algorithms, models, and also functional capabilities. The aim of this work is to determine the types of applications and systems, analysis of various options for the implementation of algorithms for the formation of schedules in educational institutions.

Find us

  • SDU Scientific Library Office B203,
  • Abylaikhana St. 1/1 Kaskelen, Kazakhstan

Call us

Phone: +7 (727) 307 9565 (Int. 183)

Mail us

E-mail: repository@sdu.edu.kz
logo

Useful Links

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback

Follow us

Springshare
ROAR
OpenDOAR

Copyright © 2023, All Right Reserved SDU University