01. Faculty of Engineering & Natural Sciences
Permanent URI for this community
Browse
Browsing 01. Faculty of Engineering & Natural Sciences by Title
Now showing 1 - 20 of 353
Results Per Page
Sort Options
Item Open Access 1929-1940 ЖЫЛДАРДАҒЫ ЛАТЫН ГРАФИКАЛЫ ҚАЗАҚ ЖАЗУЫНЫҢ ТАРИХИ ТАҒЫЛЫМЫ(СДУ хабаршысы - 2018, 2018) Күдеринова Қ.Б.; Абдиева М.Аңдатпа: Бұл мақалада 1929-1940 жылдардағы латын графикалы қазақ жазуының тарихи тағылымы сөз болады. Зерттеу нәтижесі латын графикасымен басылған қазақ кітаптары туралы еңбектердің жоқ екендігін көрсетеді. 1929-1940 жылдары латын графикасымен Қазақстанда жарық көрген кітаптардың тізбесі жасалынып, кестемен көрсетілген. Кітаптардың авторлары, редакторлары, қай қалаларда басылғандығы да көрсетілген. Мақалада латын графикасындағы қазақ әліпбиімен 1929 жылдан емес, 1928 жылдан бастап шыға бастағаны айтылады. 1928 жылы 5000 тиражбен жарық көрген Байділдаұлы Ә. «Жаңа әліппе туралы» еңбегі талданады. Кітаптағы орфографиялық және пунктуациялық ерекшеліктер айтылады. Мәселен, «бас әріпке байланысты қиындықтар», «/в/-ның үлкен әріп нұсқасы», «қысаң езуліктердің емлесі», «и, у дыбыстарының жазылуы», «кейбір дауыссыз дыбыстардың жазылуы», «сөздерді бірге, бөлек жазудағы өзгерістер»,«кейбір тыныс белгілердің қолданылуы» секілді ерекшеліктер талданады.Item Open Access 3D modeling of the offshore wind turbines integrated structure for Kazakhstan Region(2017) Khassanov D.In this thesis project examined meteorological characteristics of the field “Kashagan” located in the north Caspian Sea, the types of offshore oil and gas constructers, offshore wind turbine structure integrated for the middle depths of the Caspian shelf, and the load acting on them during operation on a shelf. Dimensional solid 3D model and 3D animation presentation of offshore wind turbine is built in the program Autodesk Maya 2012. Created the design scheme of supporting jacket for offshore wind turbine.Jacket designed for the field in the middle depths of the Caspian Sea. Carried out joint account of supporting columns and turbine structure on the static load - own weight of construction and the wind turbine weight of the structure, and the wind load by finite-elements. Also the calculations studied the stress-strain state of the structure. The finite element method are mastered and calculated by using a software package Autodesk Inventor Professional 2014. The calculation results can be used in the design of offshore wind turbine structures for oil and gas platforms.Also, the thesis presents the basic calculation of the estimated cost of construction and installation works supporting truss design and offshore wind turbine, its payback period. Sections health and the environment are considered potential risks to personnel and possible threats to the environment, and provide measures for their prevention and reduction.Item Open Access 3D MODELING OF THE OFFSHORE WIND TURBINES INTEGRATED STRUCTURE FOR KAZAKHSTAN REGION(SDU University, 2017) Amirgaliyev Y. ; Khassanov D. ; Meraliyev M.Abstract. In this scientific paper we examine meteorological characteristics of the field “Kashagan” located in the north Caspian Sea, the types of offshore oil and gas constructers, offshore wind turbine structure integrated for the middle depths of the Caspian shelf, and the load acting on them during operation on a shelf. Dimensional solid 3D model and 3D animation presentation of offshore wind turbine is built in the program Autodesk Maya 2012. Created the design scheme of supporting jacket for offshore wind turbine. Jacket designed for the field in the middle depths of the Caspian Sea. Carried out joint account of supporting columns and turbine structure on the static load—own weight of construction and the wind turbine weight of the structure, and the wind load by finite-elements. Also the calculations studied the stress-strain state of the structure. The finite element method are mastered and calculated by using a software package Autodesk Inventor Professional 2014. The calculation results can be used in the design of offshore wind turbine structures for oil and gas platforms. Also, the thesis presents the basic calculation of the estimated cost of construction and installation works supporting truss design and offshore wind turbine, its payback period. Sections health and the environment are considered potential risks to personnel and possible threats to the environment, and provide measures for their prevention and reduction.Item Open Access 3D ПРИНТЕРГЕ АРНАЛҒАН ПЛАСТИКТІ ӨҢДЕЙТІН МАШИНАНЫ ҚҰРУ(Suleyman Demirel University, 2016) Инкаров Б.Ә.; Алиманова М.О.Әртүрлі салаларда, әсіресе мектептерда және жоғары оқұ орындардың зертханаларында 3D принтермен жұмыс істеу үшін арнайы пластик сатып алу қажет. 3D принтерінен шыққан бұйымдар жасалу бойынша пайдаланылғаннан кейін жарамсыздыққа келеді. Оларды қайта өңдеу мумкіндігі жоқтығынан казіргі заманда экономиялық дағдарыс себебінен сатып алатын мүмкіндігі төмендейді. Осы мәселені толық шешу мақсатымен 3D принтерге арналған пластикті өңдейтін машина құрастырылды. ABS пластикті жасау үшін шредер үгіткішін пайдалану, үгітілген пластикті белгілі бір бұрғыға салып, оның жан-жағынан арнайы қыздырғыштар болады. Қыздырғыштар пластикалық заттарды жоғарғы температурада ерітіп оны сопло арқылы шығарады. Жобаның макеті 3D принтерде, Arduino-да жасалынған.Item Open Access A course in information theory(Almaty, Suleyman demirel university-2009, 2009) Arslanov M.Z.Abstract. Information Theory is a fundamental field of study that plays a pivotal role in various aspects of modern technology, communication, and data science. This abstract provides an overview of a course in Information Theory, which covers the core principles and applications of this field.This course aims to introduce students to the foundational concepts of Information Theory, including entropy, information content, and coding theory. It explores the mathematical foundations of information and communication, enabling students to quantify and manipulate information in a systematic manner. Topics covered include Shannon's entropy, data compression, channel capacity, and error-correcting codes. Through a combination of theoretical lectures, practical exercises, and real-world applications, students will gain a comprehensive understanding of the principles that underlie the transmission and storage of information in various communication systems. They will also learn how these principles are applied in fields such as data compression, cryptography, and error detection and correction.The course is designed to cater to a diverse range of students, from those with a strong mathematical background to those with a more practical interest in communication and information technology. By the end of the course, students will not only be equipped with a solid theoretical foundation but will also have the skills to apply Information Theory to solve real-world problems, making it an essential part of the curriculum for anyone interested in the intersection of mathematics, computer science, and communication technology.Item Open Access A PROFESSION RECOMMENDER SYSTEM BASED ON DEEP LEARNING AND MACHINE LEARNING APPROACHES(СДУ хабаршысы - 2023, 2023) Iskalinov F.Abstract. The issue of uncertain career path choice among modern schoolchildren has become increasingly prominent, resulting in a substantial decrease in the number of university students. This uncertainty has become a major concern as students and their parents are often unfamiliar with the wide range of available professions, particularly those that have emerged in the last decade. A modern solution is proposed in the form of a web application that uses Deep Learning, Machine Learning, and NLP to recommend suitable specialties based on the competencies required for the profession. The system will analyze and extract implicit features through a supervised classification approach, providing a comprehensive solution for profession search in the Kazakhstan market.Item Open Access ADAPTATION OF GAMING PROCESS TO IMPROVE HAND REHABILITATION(Suleyman Demirel University, 2016) Alimanova M.O.; Kozhamzharova D.Kh.; Zholdygarayev A.O.; Meraliyev M.M.Hands, as the most dexterous part of our body, are of vital importance to our everyday life. However, since hands are extensively used in nearly all tasks, they are exposed in more dangerous environment than any other parts. Overwork, injury and geratic complications, such as stroke can all cause hand function, totally or partially, which directly diminish the q uality of life. Unpleasant effects caused by trauma and overwork to hands results with immediate hand rehabilitation. Trainings for patients’ rehabilitations are normally goes in rehabilitation center in hospitals, with getting some physiotherapy for han ds, making some exercises and etc. However all this may bore patients and not to motivate to sooner recovery. The Leap Motion controller is a small device that senses consumer gestures and is aimed to enlarge a user’s interactive experience with their computer. Using infrared sensors, it is able to collect data about the position and motions of a user’s hands. This allows to use leap motion in different purposes like development of children’s intellect, having fun with playing virtual reality games and etc. One more example for effective usage of such device is in the purpose of medicine.Item Open Access Advisory system for adapting a single machine problem to a distributed solution(SDU University, 2024) Orynbekova KamilaGeneral characteristics of the work. The work encompasses developing an advisory system to recommend solutions for single-machine problems adaptable to distributed systems, mainly focusing on implementation within the MapReduce platform. Methodologically, an experiment evaluated learning effectiveness, while extensive data collection informed model development. Predictive models, including Naive Bayes and Logistic Regression, were optimized and integrated into a recommendation system validated through rigorous evaluation. The aim of the research is to develop an advisory system that recommends single-machine problem solutions that adapt to distributed systems and are suitable for implementation on the MapReduce platform.Item Open Access AN EVALUATION OF UNSUPERVISED OUTLIER DETECTION METHODS FOR UNIVARIATE TIME SERIES DATA IN FINANCIAL TRANSACTIONS(СДУ хабаршысы - 2023, 2023) Amankossova A.; Turan C.Abstract. An essential problem in finance application areas is identifying abnormal subsequences in time series data. Despite the wide range of outlier detection algorithms, no substantial research has been conducted to thoroughly investigate and assess the various methodologies, particularly in the financial industry. This study focuses on comparing and contrasting the outcomes of various unsupervised algorithms. The findings reveal that the Local Outlier Factor technique outperforms the other methods in terms of precision, recall, and Fl-score. The research provides valuable insights for financial institutions and businesses looking to improve their identification of abnormalities systems and highlights the importance of choosing the appropriate unsupervised outlier detection method for financial transaction data. The outcomes of this study can be used to inform future research and development in the area of financial unusual case detection.Item Open Access Analysis and development of system for predict psychological portrait of a person(2020) Atanbekov A.Text content is one of the widespread media types. A question which we are trying to find out in this study is the following: can we identify a psychological portrait or psychological type of a person by given a short text document written by that person? There are different techniques to identify personality types by given text. In this study, the model has been developed to predict the psychological type of the person based on XGBoost. This study is going to explore machine learning algorithms to predict the psychological portrait of a person based on a given text. The psychological portrait will be described by Myers-Briggs Type Indicators (MBTI) which is the most reliable and popular method. This question ‘5 motivated by essays of students at the beginning of their courses to understand their psychological portrait and how it can be met with the profession they choose. The results of this study will help HR specialists and teachers to better understand their students.Item Open Access Analysis of Creation Scientific Library System with MARC21(2021) Abubakirova A.Automation solutions come to centralization and internalization in every part of processes in different spheres. The reason is that the philosophy of humanity changed to “win to win”, assist each other, be a team and develop systems that give effectiveness, focus and open source. In this research work analyzed CIS Library systems and their formats, advantages and disadvantages from the development part. In the result identified 4 criterias in the development of the corresponding software in the creation of the Library System. For a more detailed analysis of problems between different formats, we used OCLC WSKey and found authority tags. Analyzed timeline of creation of basic modules of library system and influence in each other, accent was in analyzing and implementing cataloging modules with comparing desktop and web software and the additional task possibility of transferring metadata with XML files between different formats. In future work was testing and comparison of analysis.Item Open Access Analysis of data to improve system of an educational organization(2020) Serek A.In this thesis, there was done a set of computational experiments on the datasets of educational organizations. In the first part of the work, there were executed lots of experiments with decision tree ID3 algorithm on the educational camp dataset (”Educon”) that automatically predicts a participant’s feedback using Scikit-learn library and extrapolatory data analysis of that was done using Pandas library and Python programming language. The experimental results showed that the most optimal maximum depth (which is the number of edges starting from the root till the leaf) for the decision tree is 3 and the most optimal minimum number of splits (which is the minimum amount of samples of the dataset that are required to split an internal node of the decision tree) is 192. Based on that, there was achieved optimum results of precision, recall, and f1 score machine learning metrics that vary between 75 to 98 depending on the change of tunable variables of the ID3 algorithm. In the subsequent parts of the thesis, the information extraction system was built based on an educational camp dataset and recommendations for hackathon improvement were derived. The datasets are not open-source and were collected manually through the use of surveys.Item Open Access Analysis of effective machine learning techniques for improvement of student performance(2023) Tolbassy B.It is advantageous to use machine learning (ML) algorithms to assess student performance based on their prior performances and current behaviour because they can project both positive and negative outcomes at different educational levels. Learning outcomes can be improved by early performance prediction for students. The prediction of a student’s academic performance is important because it shapes changes in university academic policies, guides instructional strategies, evaluates the efficacy and efficiency of learning, provides teachers and students with pertinent feedback, and modifies learning environments. All of these elements support higher graduation rates. There is currently no clear winner among the various machine learning techniques for predicting student performance while enhancing learning outcomes. Therefore, this study is going to present the most effective machine learning techniques using and analysing open-source data from the Kaggle platform.Item Open Access ANALYSIS OF PROGRAMMING EDUCATION AT THE PRIMARY EDUCATION LEVEL(СДУ хабаршысы - 2023, 2023) Saimassay G. ; Zhaparov M. ; Mukhiyayeva A. ; Zhalgassova Zh.Abstract. Programming education has traditionally been provided at the undergraduate level worldwide. However, in recent years, there has been a growing trend in developed countries to introduce programming education at earlier ages with the aim of promoting software literacy, improving programming skills, and making programming education accessible to a wider audience. While some countries are updating their informatics lessons to include programming, others are incorporating programming lessons into their primary education curriculum for the first time. The level at which programming training is offered also differs between countries. The objective of this research is to explore how countries have integrated programming education into their curricula and to identify the differences between countries in terms of programming education. The study aims to answer the question of how programming education is provided at the primary education level both domestically and abroad. The research has found that programming education is increasingly recognized as important and many countries are now allowing programming lessons in their education curriculum, with some countries even introducing programming education in kindergarten. However, there are variations in the programming languages used and the skills taught to students across different countries.Item Open Access ANALYSIS OF QUANTUM CRYPTOGRAPHY AND TECHNOLOGIES IN INDUSTRIES(СДУ хабаршысы - 2020, 2020) Habiburahman Sh.; Baimuratov O. ; Abdinurova N.Abstract. In today’s connected world it’s crucial to make sure telecommunication is not a risk. Eavesdroppers will always find a way to attack and harm big companies systems or governmental databases. It’s very important to find the best possible way to keep our services safe. Quantum cryptography is one the best way since it’s based on rules of quantum physics. In this paper we are going to analyse the best solutions, protocols and different aspects of encryption. Real life implementations by different IT companies and investors will also be included in this paper. Weakness and pros always exist in every system and it’s impossible to indicate the system we are proposing is not breakable but it’s going to be the best possible solution for now. Why? It’s going to be discussed in later sections.Item Open Access Analysis of students’ interest in programming(2023) Saimassay G.The proportion of women working in and studying computer science (CS) remains much lower than that of men. Young women’s perceptions of computer science as a career are highly impacted by their sense of self and identity. We believe that if young girls are introduced to software programming in a way that enables them to explore their identities early on, they will be more likely to pursue careers in CS. This research looks at the role of gender diversity and cultural stereotypes in affecting girls’ job choices outside of information technology (IT). The study attempts to explore the underlying causes of this trend by investigating gender inequalities and identifying the primary factors impacting girls’ views and attitudes about computers and ICT education. Furthermore, the research intends to establish an optimum atmosphere that fosters girls’ interest in IT and encourages women’s engagement in IT careers. The study looks at the relationship between confidence and satisfaction levels using a case study technique using before and post questionnaires. The obtained data is evaluated to identify the influence of these elements on the vision and interest of females in IT. The results help to explain gender discrepancies in job choices and provide suggestions for developing a supportive and inclusive atmosphere to enhance girls’ interest in IT. The report emphasizes the necessity of tackling cultural preconceptions and encouraging gender diversity in order to create an atmosphere that encourages girls to pursue careers in IT and promotes women’s participation in IT occupations.Item Open Access ANALYSIS OF SYSTEMS PYTHON VS. RUBY(2013) Kopbayeva Zh.Nowadays web development programming is very popular. Using object- oriented programming (OOP) languages in it made it fun to design overall architectures, functionality and ease of usability. As the scripting languages did not lose their popularity in this process, on their own field they also were making progress for making web development interesting for a programmer. Also scripting languages’ popularity is stable because of their compatibility and ease of use with the other languages. Considering these in this paper the comparison of basic items is made, that exist in Ruby and Python. Python itself was already popular, but coming of Ruby into the world of developers made them to begin many discussions. This work will give you basic view to make yourself a conclusion which one to choose and here it’s assumed that you already know one of the OOP languages or at least have some basic understanding of it. It won’t be just the basic interview with Python and Ruby, but from the introduction part the main concepts for language differences like dynamic versus static typing, strong and weak typing, compiled versus interpreted properties’ overview will be made. At the end developers will be able to conclude for themselves how to start and continue, while making clear reasoning. Because the work was made to do a rational overview of both Ruby and Python so that there won’t be any prejudice of a particular individual.Item Open Access ANALYSIS OF THE KAZAKH CYBER TOURNAMENTS PLATFORM “PINGER.KZ”(СДУ хабаршысы - 2023, 2023) Alimanova M.; Karazhar B. ; Alseitova A. ; Orynbekova K.Abstract. Worldwide experts presume further growth of videogames field and suggest solutions according to the actual statistics. Despite the remarkable successes of the e-athletes from Kazakhstan in a worldwide arena, there is a lack of statistical data on the local cybersport. Therefore, the research was conducted to provide prospective researchers in fields like gamification, eSport and media with actual data. The given scientific paper uses the data collected and analysed from the largest cyber tournament platform in Kazakhstan “Pinger.kz”. The analysed information is about tournaments that took place since the website launched in 2019 to 2021. The libraries of Python for data analysis as BeautifulSoup, requests, matplotlib and Apache tools were used. The aim of the work is to collect and make data analysis for future research. The paper identifies the most popular games among kazakh players in order to use this data in the research on gamification. Parsed data results show the development of the local cybersport and confirm worldwide trends.Item Open Access ANALYZE AND DEVELOPMENT SYSTEM WITH MULTIPLE BIOMETRIC IDENTIFICATION(СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Dadakhanov Sh.Abstract. Cause of a rapid increase in technological development, increasing identity theft, consumer fraud, the threat to personal data is also increasing every day. Methods developed earlier to ensure personal the information from the thefts was not effective and safe. Biometrics were introduced when it was needed technology for more efficient security of personal information. Old-fashioned traditional approaches like Personal identification number (PIN), passwords, keys, login ID can be forgotten, stolen or lost. In biometric authentication system, user may not remember any passwords or carry any keys. As people they recognize each other by the physical appearance and behavioral characteristics that biometric systems use physical characteristics, such as fingerprints, facial recognition, voice recognition, in order to distinguish between the actual user and scammer. In order to increase safety in 2005, biometric identification methods were developed government and business sectors, but today it has reached almost all private sectors as Banking, Finance, home security and protection, healthcare, business security and security etc. Since biometric samples and templates of a biometric system having one biometric character to detect and the user can be replaced and duplicated, the new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.Item Open Access Analyze and Development System with Multiple Biometric Identification(2020) Dadakhanov Sh.In the case of quick progress in technological improvement, growing shopper cheating, fraud, the threat to private knowledge is additionally increasing daily. Ways developed earlier to confirm personal info from the crimes weren't effective and safe. Statistics were introduced once it had been needed technology for more practical security of personal info. Recent ancient procedures like Personal identification number, keys, passwords, login ID may be forgotten, stolen, or lost. During a biometric identification system, the user might not get any keys or transfer any keys. In biometric authentication system, user may not remember any passwords or carry any keys. As people they recognize each other by the physical appearance and behavioral characteristics that biometric systems use physical characteristics, such as fingerprints, facial recognition, voice recognition, in order to distinguish between the actual user and scammer. In order to increase safety in 2005, biometric identification methods were developed government and business sectors, but today it has reached almost all private sectors as Banking, Finance, home security and protection, healthcare, business security and security etc. Since biometric samples and templates of a biometric system having one biometric character to detect and the user can be replaced and duplicated, the new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.