3. Articles and Papers
Permanent URI for this collection
Browse
Browsing 3. Articles and Papers by Title
Now showing 1 - 20 of 275
Results Per Page
Sort Options
Item Open Access 1929-1940 ЖЫЛДАРДАҒЫ ЛАТЫН ГРАФИКАЛЫ ҚАЗАҚ ЖАЗУЫНЫҢ ТАРИХИ ТАҒЫЛЫМЫ(СДУ хабаршысы - 2018, 2018) Күдеринова Қ.Б.; Абдиева М.Аңдатпа: Бұл мақалада 1929-1940 жылдардағы латын графикалы қазақ жазуының тарихи тағылымы сөз болады. Зерттеу нәтижесі латын графикасымен басылған қазақ кітаптары туралы еңбектердің жоқ екендігін көрсетеді. 1929-1940 жылдары латын графикасымен Қазақстанда жарық көрген кітаптардың тізбесі жасалынып, кестемен көрсетілген. Кітаптардың авторлары, редакторлары, қай қалаларда басылғандығы да көрсетілген. Мақалада латын графикасындағы қазақ әліпбиімен 1929 жылдан емес, 1928 жылдан бастап шыға бастағаны айтылады. 1928 жылы 5000 тиражбен жарық көрген Байділдаұлы Ә. «Жаңа әліппе туралы» еңбегі талданады. Кітаптағы орфографиялық және пунктуациялық ерекшеліктер айтылады. Мәселен, «бас әріпке байланысты қиындықтар», «/в/-ның үлкен әріп нұсқасы», «қысаң езуліктердің емлесі», «и, у дыбыстарының жазылуы», «кейбір дауыссыз дыбыстардың жазылуы», «сөздерді бірге, бөлек жазудағы өзгерістер»,«кейбір тыныс белгілердің қолданылуы» секілді ерекшеліктер талданады.Item Open Access 2D face recognition using PCA and triplet similarity embedding(Bulletin of Electrical Engineering and Informatics, 2023) Bazatbekov B.; Turan C.; Kadyrov Sh.; Aitimov A.The aim of this study is to propose a new robust face recognition algorithm by combining principal component analysis (PCA), Triplet Similarity Embedding based technique and Projection as a similarity metric at the different stages of the recognition processes. The main idea is to use PCA for feature extraction and dimensionality reduction, then train the triplet similarity embedding to accommodate changes in the facial poses, and finally use orthogonal projection as a similarity metric for classification. We use the open source ORL dataset to conduct the experiments to find the recognition rates of the proposed algorithm and compare them to the performance of one of the very well-known machine learning algorithms k-Nearest Neighbor classifier. Our experimental results show that the proposed model outperforms the kNN. Moreover, when the training set is smaller than the test set, the performance contribution of triplet similarity embedding during the learning phase becomes more visible compared to without it.Item Open Access 3D MODELING OF THE OFFSHORE WIND TURBINES INTEGRATED STRUCTURE FOR KAZAKHSTAN REGION(SDU University, 2017) Amirgaliyev Y. ; Khassanov D. ; Meraliyev M.Abstract. In this scientific paper we examine meteorological characteristics of the field “Kashagan” located in the north Caspian Sea, the types of offshore oil and gas constructers, offshore wind turbine structure integrated for the middle depths of the Caspian shelf, and the load acting on them during operation on a shelf. Dimensional solid 3D model and 3D animation presentation of offshore wind turbine is built in the program Autodesk Maya 2012. Created the design scheme of supporting jacket for offshore wind turbine. Jacket designed for the field in the middle depths of the Caspian Sea. Carried out joint account of supporting columns and turbine structure on the static load—own weight of construction and the wind turbine weight of the structure, and the wind load by finite-elements. Also the calculations studied the stress-strain state of the structure. The finite element method are mastered and calculated by using a software package Autodesk Inventor Professional 2014. The calculation results can be used in the design of offshore wind turbine structures for oil and gas platforms. Also, the thesis presents the basic calculation of the estimated cost of construction and installation works supporting truss design and offshore wind turbine, its payback period. Sections health and the environment are considered potential risks to personnel and possible threats to the environment, and provide measures for their prevention and reduction.Item Open Access 3D ПРИНТЕРГЕ АРНАЛҒАН ПЛАСТИКТІ ӨҢДЕЙТІН МАШИНАНЫ ҚҰРУ(Suleyman Demirel University, 2016) Инкаров Б.Ә.; Алиманова М.О.Әртүрлі салаларда, әсіресе мектептерда және жоғары оқұ орындардың зертханаларында 3D принтермен жұмыс істеу үшін арнайы пластик сатып алу қажет. 3D принтерінен шыққан бұйымдар жасалу бойынша пайдаланылғаннан кейін жарамсыздыққа келеді. Оларды қайта өңдеу мумкіндігі жоқтығынан казіргі заманда экономиялық дағдарыс себебінен сатып алатын мүмкіндігі төмендейді. Осы мәселені толық шешу мақсатымен 3D принтерге арналған пластикті өңдейтін машина құрастырылды. ABS пластикті жасау үшін шредер үгіткішін пайдалану, үгітілген пластикті белгілі бір бұрғыға салып, оның жан-жағынан арнайы қыздырғыштар болады. Қыздырғыштар пластикалық заттарды жоғарғы температурада ерітіп оны сопло арқылы шығарады. Жобаның макеті 3D принтерде, Arduino-да жасалынған.Item Open Access A DECENTRALIZED, LOW COMPUTATIONAL COST STRATEGY FOR COORDINATION AND SEARCH WITH A ROBOT FLOCK(Journal of Theoretical and Applied Information Technology, 2021) FREDY H.; MARTÍNEZ S.The coordination of a flock of robots is a high demand application in applications such as motion planning, navigation, herding (tracking and/or tracing), area coverage (exploration, search and rescue, etc.), object transportation (surrounding and moving together), and compound tasks, all of which are currently heavily researched in robotics. Many approaches have been proposed to solve this problem, but they largely compromise system characteristics such as fault tolerance, capacity, efficiency, and in particular cost, since real implementations require special hardware. This paper proposes a coordination strategy for a system composed of small robots of minimalist design under the condition of minimum processing and sensing capacity. The communication requirements have been limited to a local communication strategy sufficient to achieve the relative orientation of each swarm member. The usefulness of the scheme is evaluated by simulation in specialized search tasks in an unknown region. The results show the high capability of the scheme and the ease of implementation on real prototypes.Item Open Access A novel recommender system for adapting single machine problems to distributed systems within MapReduce(Bulletin of Electrical Engineering and Informatics, 2024) Orynbekova K.; Kadyrov Sh.; Bogdanchikov A.; Oktamov S.This research introduces a novel recommender system for adapting singlemachine problems to distributed systems within the MapReduce (MR) framework, integrating knowledge and text-based approaches. Categorizing common problems by five MR categories, the study develops and tests a tutorial with promising results. Expanding the dataset, machine learning models recommend solutions for distributed systems. Results demonstrate the logistic regression model's effectiveness, with a hybrid approach showing adaptability. The study contributes to advancing the adaptation of single-machine problems to distributed systems MR, presenting a novel framework for tailored recommendations, thereby enhancing scalability and efficiency in data processing workflows. Additionally, it fosters innovation in distributed computing paradigms.Item Open Access A PROFESSION RECOMMENDER SYSTEM BASED ON DEEP LEARNING AND MACHINE LEARNING APPROACHES(СДУ хабаршысы - 2023, 2023) Iskalinov F.Abstract. The issue of uncertain career path choice among modern schoolchildren has become increasingly prominent, resulting in a substantial decrease in the number of university students. This uncertainty has become a major concern as students and their parents are often unfamiliar with the wide range of available professions, particularly those that have emerged in the last decade. A modern solution is proposed in the form of a web application that uses Deep Learning, Machine Learning, and NLP to recommend suitable specialties based on the competencies required for the profession. The system will analyze and extract implicit features through a supervised classification approach, providing a comprehensive solution for profession search in the Kazakhstan market.Item Open Access A Survey on Multimodal Approaches for Lung Disease Diagnosis using Deep Learning(SDU University, 2025) Zhaniya MedeuovaLung disorders are a major global health issue. A quick and accurate diagnosis is essential for proper treatment. In order to increase diagnostic accuracy, recent multimodal techniques are gaining popularity. This study carried out a comprehensive analysis of research articles on multimodal approaches that were published between 2020 and 2024 in Scopus and Google Scholar. The results show that there is limited study on the multimodal approach and on a variety of lung disorders such as asthma, TB, pneumonia, and chronic obstructive pulmonary disease. Several studies concentrated mainly on the detection and binary classification of COVID-19. The field has several challenges, including limited datasets, high computing costs, difficulties in integrating multiple modalities, and lack of accessibility of the models. Future studies should look at a wider range of lung diseases, increase the accessibility of datasets, improve fusion methods for merging data from many sources, and create models that are easier to understand and use fewer resources. Resolving these issues will improve patient outcomes by advancing the real-world use of deep learning in medical diagnosis.Item Open Access ADAPTATION OF GAMING PROCESS TO IMPROVE HAND REHABILITATION(Suleyman Demirel University, 2016) Alimanova M.O.; Kozhamzharova D.Kh.; Zholdygarayev A.O.; Meraliyev M.M.Hands, as the most dexterous part of our body, are of vital importance to our everyday life. However, since hands are extensively used in nearly all tasks, they are exposed in more dangerous environment than any other parts. Overwork, injury and geratic complications, such as stroke can all cause hand function, totally or partially, which directly diminish the q uality of life. Unpleasant effects caused by trauma and overwork to hands results with immediate hand rehabilitation. Trainings for patients’ rehabilitations are normally goes in rehabilitation center in hospitals, with getting some physiotherapy for han ds, making some exercises and etc. However all this may bore patients and not to motivate to sooner recovery. The Leap Motion controller is a small device that senses consumer gestures and is aimed to enlarge a user’s interactive experience with their computer. Using infrared sensors, it is able to collect data about the position and motions of a user’s hands. This allows to use leap motion in different purposes like development of children’s intellect, having fun with playing virtual reality games and etc. One more example for effective usage of such device is in the purpose of medicine.Item Open Access Algebraic numbers, hyperbolicity, and density modulo one(Journal of Number Theory, 2012) Gorodnik A.; Kadyrov S.We prove the density of the sets of the form λm 1 μn 1ξ1 +···+ λm k μn k ξk: m,n ∈ N modulo one, where λi and μi are multiplicatively independent algebraic numbers satisfying some additional assumptions. The proof is based on analysing dynamics of higher-rank actions on compact abelian groups.Item Open Access AN EVALUATION OF UNSUPERVISED OUTLIER DETECTION METHODS FOR UNIVARIATE TIME SERIES DATA IN FINANCIAL TRANSACTIONS(СДУ хабаршысы - 2023, 2023) Amankossova A.; Turan C.Abstract. An essential problem in finance application areas is identifying abnormal subsequences in time series data. Despite the wide range of outlier detection algorithms, no substantial research has been conducted to thoroughly investigate and assess the various methodologies, particularly in the financial industry. This study focuses on comparing and contrasting the outcomes of various unsupervised algorithms. The findings reveal that the Local Outlier Factor technique outperforms the other methods in terms of precision, recall, and Fl-score. The research provides valuable insights for financial institutions and businesses looking to improve their identification of abnormalities systems and highlights the importance of choosing the appropriate unsupervised outlier detection method for financial transaction data. The outcomes of this study can be used to inform future research and development in the area of financial unusual case detection.Item Open Access ANALYSIS OF PROGRAMMING EDUCATION AT THE PRIMARY EDUCATION LEVEL(СДУ хабаршысы - 2023, 2023) Saimassay G. ; Zhaparov M. ; Mukhiyayeva A. ; Zhalgassova Zh.Abstract. Programming education has traditionally been provided at the undergraduate level worldwide. However, in recent years, there has been a growing trend in developed countries to introduce programming education at earlier ages with the aim of promoting software literacy, improving programming skills, and making programming education accessible to a wider audience. While some countries are updating their informatics lessons to include programming, others are incorporating programming lessons into their primary education curriculum for the first time. The level at which programming training is offered also differs between countries. The objective of this research is to explore how countries have integrated programming education into their curricula and to identify the differences between countries in terms of programming education. The study aims to answer the question of how programming education is provided at the primary education level both domestically and abroad. The research has found that programming education is increasingly recognized as important and many countries are now allowing programming lessons in their education curriculum, with some countries even introducing programming education in kindergarten. However, there are variations in the programming languages used and the skills taught to students across different countries.Item Open Access ANALYSIS OF QUANTUM CRYPTOGRAPHY AND TECHNOLOGIES IN INDUSTRIES(СДУ хабаршысы - 2020, 2020) Habiburahman Sh.; Baimuratov O. ; Abdinurova N.Abstract. In today’s connected world it’s crucial to make sure telecommunication is not a risk. Eavesdroppers will always find a way to attack and harm big companies systems or governmental databases. It’s very important to find the best possible way to keep our services safe. Quantum cryptography is one the best way since it’s based on rules of quantum physics. In this paper we are going to analyse the best solutions, protocols and different aspects of encryption. Real life implementations by different IT companies and investors will also be included in this paper. Weakness and pros always exist in every system and it’s impossible to indicate the system we are proposing is not breakable but it’s going to be the best possible solution for now. Why? It’s going to be discussed in later sections.Item Open Access ANALYSIS OF THE KAZAKH CYBER TOURNAMENTS PLATFORM “PINGER.KZ”(СДУ хабаршысы - 2023, 2023) Alimanova M.; Karazhar B. ; Alseitova A. ; Orynbekova K.Abstract. Worldwide experts presume further growth of videogames field and suggest solutions according to the actual statistics. Despite the remarkable successes of the e-athletes from Kazakhstan in a worldwide arena, there is a lack of statistical data on the local cybersport. Therefore, the research was conducted to provide prospective researchers in fields like gamification, eSport and media with actual data. The given scientific paper uses the data collected and analysed from the largest cyber tournament platform in Kazakhstan “Pinger.kz”. The analysed information is about tournaments that took place since the website launched in 2019 to 2021. The libraries of Python for data analysis as BeautifulSoup, requests, matplotlib and Apache tools were used. The aim of the work is to collect and make data analysis for future research. The paper identifies the most popular games among kazakh players in order to use this data in the research on gamification. Parsed data results show the development of the local cybersport and confirm worldwide trends.Item Open Access ANALYZE AND DEVELOPMENT SYSTEM WITH MULTIPLE BIOMETRIC IDENTIFICATION(СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Dadakhanov Sh.Abstract. Cause of a rapid increase in technological development, increasing identity theft, consumer fraud, the threat to personal data is also increasing every day. Methods developed earlier to ensure personal the information from the thefts was not effective and safe. Biometrics were introduced when it was needed technology for more efficient security of personal information. Old-fashioned traditional approaches like Personal identification number (PIN), passwords, keys, login ID can be forgotten, stolen or lost. In biometric authentication system, user may not remember any passwords or carry any keys. As people they recognize each other by the physical appearance and behavioral characteristics that biometric systems use physical characteristics, such as fingerprints, facial recognition, voice recognition, in order to distinguish between the actual user and scammer. In order to increase safety in 2005, biometric identification methods were developed government and business sectors, but today it has reached almost all private sectors as Banking, Finance, home security and protection, healthcare, business security and security etc. Since biometric samples and templates of a biometric system having one biometric character to detect and the user can be replaced and duplicated, the new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.Item Open Access ANDROID SECURITY ISSUES(СДУ хабаршысы - 2018, 2018) Amirgaliev Y. ; Sayazhan B. ; Bakbergen Y.Abstract. The smart phones usage has been increased rapidly over the last decade. Android provides third-party applications with an extensive API that uses the permission-based model, which allows Android applications to access user information, system information, device information and external resources of Smartphone. The developer needs to declare the permissions in Android Manifest file for the Android application. Then the user needs to accept that permission for successful installation of an Android application. These permissions are declarations. After installation, if the user allows the permission, the app can access resources and information anytime. Android OS is susceptible to various security attacks due to its weakness in security. In this paper, a number of vulnerabilities are explored in Android permission level and provide an approach for better security in Android Platform. An Attack Scenario is developed successfully for permission-based attacks in the android platform and provides the countermeasures for it.Item Open Access Application of ROC Curve Analysis for Predicting Students’ Passing Grade in a Course Based on Prerequisite Grades(MDPI Mathematics, 2022) Orynbassar A.; Sapazhanov Y.; Kadyrov Sh.; Lyublinskaya I.Determining prerequisite requirements is vital for successful curriculum development and student on-schedule completion of the course of study. This study adapts the Receiver Operating Characteristic (ROC) curve analysis to determine a threshold grade in a prerequisite course necessary for passing the next course in a sequence. This method was tested on a dataset of Calculus 1 and Calculus 2 grades of 164 undergraduate students majoring in mathematics at a private university in Kazakhstan. The results showed that while the currently used practice of setting prerequisite grade requirements is accurately identifying successful completions of Calculus 2, the ROC method is more accurate in identifying possible failures in Calculus 2. The findings also indicate that prior completion of Calculus 1 is positively associated with success in a Calculus 2 course. Thus, this study contributes to the field of mathematics education by providing a new data-driven methodology for determining the optimal threshold grade for mathematics prerequisite courses.Item Open Access Application of TPB on the Saving Intention among the Students of Community Colleges: Moderating Effect of Mobile Applications(Global Business and Management Research: An International Journal, 2021) Nizar N.; Choban U.; Mohd H.A.The main objective of this study is to examine the saving intention among the Community College students from the Planned Behavior Theory (TPB) perspective and to investigate whether the proposed relationships are contingent upon their perceptions towards mobile applications. In order to achieve the objectives, a survey study was conducted among 117 community college students in Kedah, Selangor, Perak in Malaysia. PLS test results revealed that attitude, subjective norms, and perceived behavior control 'have' significantly influence students' intention to saving. However, mobile applications do not has moderate direct relationships. In conclusion, this study is significant as the understanding of saving behavior is essential not only for future retirement and investment plans of younger generations but also for their financial resilience when exposed to adverse shocks such as COVID-19.Item Open Access APPLICATION OF VISIBLE LIGHT COMMUNICATION (VLC) IN VARIOUS AREAS: SURVEY(СДУ хабаршысы - 2021, 2021) Mamatnabivev Zh. ; Galiyev M.Abstract. Optical wireless communication allows communication of ultraviolet, infrared, or visible light to carry a signal. Visible light communication (VLC) is a member of optical wireless communication that operates in visible band from 390 nm to 750 nm range. VLC uses light emitting diodes (LED) that is pulsed at very high speed. VLC is known as next potential communication tool that has made tremendous improvement in wireless communication technologies. Possible applications areas of VLC are underwater communication, Li-Fi, vehicle to vehicle communication, in-house applications, etc. use features of VLC that allows to make an attractive area of research. In this work, due to features that VLC offers, possible application areas are presented and discussed.Item Open Access Applying machine learning models for predicting forest fires in Australia and the influence of weather on the spread of fires based on satellite and weather forecast data(2020 International Young Scholars Workshop, 2020) Meraliyev B.; Kongratbayev K.Abstract What shall we expect from the year 2020? The coronavirus pandemic is not the worst thing that humanity can face in the near future. According to the observations of the scientists, in March, 2020, the planet temperature warmed up to the record-high level. Also, the temperature of the world’s oceans exceeded its average temperatures by 80%, and prognosis of the meteorological observations is not good. The warming seas had already led to catastrophic disaster. The average temperature increase can also lead to hurricanes, drought, invasion of locusts and, the worst, to forest fires. Natural disasters lead to loss of life, destruction of properties and infrastructure, loss of animal natural habitats, displacement of humans. And the results of these all lead to humanitarian catastrophes, including social and economic. The situations related to the nature are always very serious, as the whole world is involved. This is like butterfly effect, i.e., the natural disaster in Australia affect the economic and ecologic situation in USA and England. Taking the Australia, they faced problem that cannot be avoided. Nevertheless, the world can be prepared and prevent from the huge disasters. The forecasting of forest fires can really be helpful, as well as the inquiry of the weather impact on fires. The current paper is focused on the study of fire forecasting and weather influence on fire. The relevance of the study is important, as the global warming and human caused fires are increasing and there is a trend that Australia’s fires became more dangerous and longer lasting. The artificial intelligence, particularly machine learning algorithms, can help to make appropriate calculations and predictions to safe the ecosystem and human lives. According to the preliminary research results we acquire; in-depth multidimensional analysis confirms almost 100 percent dependence of bushfires on the weather conditions. Using the machine learning algorithms, it would be possible to predict the time and positioning of inflammation source.