Search Results

Now showing 1 - 3 of 3
  • ItemOpen Access
    RFID TECHNOLOGY AS A PART OF MONITORING SYSTEMS
    (СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Mamatnabiyev Zh. ; Dadakhanov Sh. ; Berlikozha B.
    Abstract. The Internet of Things (IoT) technologies are getting more popular and being implemented as a solution for many relevant problems in information technology purposing low-costed, secure, and controlled remotely systems. Radio Frequency Identification (RFID) system is used as a type of IoT technology, which has three basic parts: tags, reader and system that manages tag identification (ID) number and its real time location. RFID systems are used in financial institutions, healthcare industry, mobile phones, cars, supply chain management, smart retails, smart house, object localization, security systems and various types of applications for positioning, managing people, assets, and inventory. This paper discusses performances of RFID technologies that use passive tags. Role of RFID technologies in monitoring systems and system architecture are reviewed and compared. Significance of RFID technologies and challenges are also considered for future works.
  • ItemOpen Access
    ANALYZE AND DEVELOPMENT SYSTEM WITH MULTIPLE BIOMETRIC IDENTIFICATION
    (СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Dadakhanov Sh.
    Abstract. Cause of a rapid increase in technological development, increasing identity theft, consumer fraud, the threat to personal data is also increasing every day. Methods developed earlier to ensure personal the information from the thefts was not effective and safe. Biometrics were introduced when it was needed technology for more efficient security of personal information. Old-fashioned traditional approaches like Personal identification number (PIN), passwords, keys, login ID can be forgotten, stolen or lost. In biometric authentication system, user may not remember any passwords or carry any keys. As people they recognize each other by the physical appearance and behavioral characteristics that biometric systems use physical characteristics, such as fingerprints, facial recognition, voice recognition, in order to distinguish between the actual user and scammer. In order to increase safety in 2005, biometric identification methods were developed government and business sectors, but today it has reached almost all private sectors as Banking, Finance, home security and protection, healthcare, business security and security etc. Since biometric samples and templates of a biometric system having one biometric character to detect and the user can be replaced and duplicated, the new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.
  • ItemOpen Access
    ANALYSIS OF QUANTUM CRYPTOGRAPHY AND TECHNOLOGIES IN INDUSTRIES
    (СДУ хабаршысы - 2020, 2020) Habiburahman Sh.; Baimuratov O. ; Abdinurova N.
    Abstract. In today’s connected world it’s crucial to make sure telecommunication is not a risk. Eavesdroppers will always find a way to attack and harm big companies systems or governmental databases. It’s very important to find the best possible way to keep our services safe. Quantum cryptography is one the best way since it’s based on rules of quantum physics. In this paper we are going to analyse the best solutions, protocols and different aspects of encryption. Real life implementations by different IT companies and investors will also be included in this paper. Weakness and pros always exist in every system and it’s impossible to indicate the system we are proposing is not breakable but it’s going to be the best possible solution for now. Why? It’s going to be discussed in later sections.