5 results
Search Results
Now showing 1 - 5 of 5
Item Open Access RFID TECHNOLOGY AS A PART OF MONITORING SYSTEMS(СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Mamatnabiyev Zh. ; Dadakhanov Sh. ; Berlikozha B.Abstract. The Internet of Things (IoT) technologies are getting more popular and being implemented as a solution for many relevant problems in information technology purposing low-costed, secure, and controlled remotely systems. Radio Frequency Identification (RFID) system is used as a type of IoT technology, which has three basic parts: tags, reader and system that manages tag identification (ID) number and its real time location. RFID systems are used in financial institutions, healthcare industry, mobile phones, cars, supply chain management, smart retails, smart house, object localization, security systems and various types of applications for positioning, managing people, assets, and inventory. This paper discusses performances of RFID technologies that use passive tags. Role of RFID technologies in monitoring systems and system architecture are reviewed and compared. Significance of RFID technologies and challenges are also considered for future works.Item Open Access ANALYZE AND DEVELOPMENT SYSTEM WITH MULTIPLE BIOMETRIC IDENTIFICATION(СДУ хабаршысы - 2020, 2020) Baimuratov O. ; Dadakhanov Sh.Abstract. Cause of a rapid increase in technological development, increasing identity theft, consumer fraud, the threat to personal data is also increasing every day. Methods developed earlier to ensure personal the information from the thefts was not effective and safe. Biometrics were introduced when it was needed technology for more efficient security of personal information. Old-fashioned traditional approaches like Personal identification number (PIN), passwords, keys, login ID can be forgotten, stolen or lost. In biometric authentication system, user may not remember any passwords or carry any keys. As people they recognize each other by the physical appearance and behavioral characteristics that biometric systems use physical characteristics, such as fingerprints, facial recognition, voice recognition, in order to distinguish between the actual user and scammer. In order to increase safety in 2005, biometric identification methods were developed government and business sectors, but today it has reached almost all private sectors as Banking, Finance, home security and protection, healthcare, business security and security etc. Since biometric samples and templates of a biometric system having one biometric character to detect and the user can be replaced and duplicated, the new idea of merging multiple biometric identification technologies has so-called multimodal biometric recognition systems have been introduced that use two or more biometric data characteristics of the individual that can be identified as a real user or not.Item Open Access ANALYSIS OF QUANTUM CRYPTOGRAPHY AND TECHNOLOGIES IN INDUSTRIES(СДУ хабаршысы - 2020, 2020) Habiburahman Sh.; Baimuratov O. ; Abdinurova N.Abstract. In today’s connected world it’s crucial to make sure telecommunication is not a risk. Eavesdroppers will always find a way to attack and harm big companies systems or governmental databases. It’s very important to find the best possible way to keep our services safe. Quantum cryptography is one the best way since it’s based on rules of quantum physics. In this paper we are going to analyse the best solutions, protocols and different aspects of encryption. Real life implementations by different IT companies and investors will also be included in this paper. Weakness and pros always exist in every system and it’s impossible to indicate the system we are proposing is not breakable but it’s going to be the best possible solution for now. Why? It’s going to be discussed in later sections.Item Open Access STRUCTURE AND CAPABILITIES OF SMART HOME SYSTEM USING CLOUD(SDU University, 2017) Tleuli R. Zh. ; Baimuratov O.Abstract. This work proposes an exceptional structure of low cost smart home system, based on IOS app linked to the cloud service, which is used for monitoring and controlling. It meets various kinds of requirements of technical and economic perspective and fulfills them all. In addition to that, tools like temperature and humidity sensor, motion sensor, distance sensor, gas sensor, sound sensor etc. will increase effectiveness of the data analysis and changes indication. Moreover, this home automation system could be used not only in industrial and governmental needs, but could also be useful in private sector. In addition to that, gathering and storing data in cloud services guaranty safety and remote access. In this article are shown results of development of SHS (Smart Home System), integrated with the cloud environment and interacting with NodeMCU, which can be used by students, engineers and other users for studying and applying SHS and sensors.Item Open Access COMPARATIVE ANALYSIS BETWEEN TELEGRAM AND WHATSAPP(SDU University, 2017) Baimuratov O. ; Ziyat B.Absrtact. This paper presents the results of a comparative analysis between Telegram and WhatsApp. The main attention was paid to their application, which determines their relevance to users, security, MTProto mobile protocol access, end-to-end encryption, data security and functionality. The leading social networks are usually available in multiple languages and enable users to connect with friends or people across geographical, political or economic borders. Approximately 2 billion internet users are using social networks and these figures are still expected to grow as mobile device usage and mobile social networks increasingly gain traction.