Preview

Herald of the Kazakh-British Technical University

Advanced search
Vol 16, No 3 (2019)
View or download the full issue PDF (Russian)

SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING

14-19 350
Abstract

The problem of increasing and processing the volume of archival documents today is relevant for many organizations and institutions. Archives accumulate for years, tens of years, for which huge volumes are collected. This leads to significant difficulties in the organization of modern archives. A modern and effective solution to this problem is the creation of an electronic archive (EA). Moreover, the development of modern technology suggests a gradual, increasing importance of electronic archival systems. The system can help to spend less resources and upgrade data storage efficiency. Compared to traditional storage systems with simple algorithms, archival data storage has more advantages. In this article we have presented a new approach to the storage and processing of archival data with minimal expenditure of resources of the Institute.

20-25 428
Abstract

Nowadays the distance education becomes more widespread due to propagation of network technologies and the Internet. Distant education provides many advantages like ability to attend classes off the institution, low cost and high flexibility on teacher and students. The universities have already implemented distant education for bachelor’s degree. However, the classical distant education does not suit for the high-degree education, because the high-level degree requires full-time classes. There are many education platforms developed like Moodle, aTutor for the distance education but none of them are applicable for the full-time network education. The article discusses the process and recommendations for the development of the full-time network education platfo  rm also known as learning management system or e-learning platform. The major parts of the platform such as the website, the database, the storage of education materials and the software for conducting the webinars were reviewed.

26-32 871
Abstract

The article is devoted to the improvement of the university management system in the conditions of the development of an innovative economy. The integration management system of the university is proposed, which includes strategic planning, a balanced scorecard, universal quality management, reengineering of the university’s business processes. The developed information system reflects the main quality indicators affecting the management of the business process of the university.

33-38 384
Abstract

The article discusses the issue of developing a program in the MATLAB-GUI environment for calculating the energy parameters of a satellite communication line. A calculation procedure for low-orbit communications satellites is given, the calculation is based on ITU Recommendations for accounting for attenuation in free space, rain and atmosphere. It describes the construction of the program and the interface of the program, notes the advantages of the software-mathematical product being created, such as the possibility of calculation for low-orbit and geostationary transponders, a user-friendly interface, the ability to display the results in a graph. The program takes into account the influence of both external factors and the internal characteristics of the receiver, antenna, antenna-feeder path. The program can be used in the educational process by students studying radio engineering.

39-45 338
Abstract

Modern Oil and Gas facilities are requiring control systems applications, upon which exclusive standards of quality, and reliable work of hardware and software are imposed. Gas and steam turbines, high-pressure boilers, oil and gas handling, storage and refining systems refer to such facilities. The main objectives of this article are the description of the software designed to simulate of multistage gas compressor operation modes with associated equipment. A check is made of the adequacy of software to real data, checking the response of the system to external influences and changes in system parameters also performed.

46-54 418
Abstract

Many car drivers are inattentive to traffic signs which result in unfortunate or even dramatic accidents, so in order to prevent such things this article proposes using machine learning technique convolutional neural networks with max-pool and dropout reqularization algorithms. Recently, a dropout regularization technique has seen increasing use in deep learning. For deep convolutional neural networks, dropout is known to work well in fully-connected layers. However, its effect in convolutional and pooling layers is still not clear. This article illustrates in pythonic manner that max-pooling dropout is equivalent to randomly picking activation based on a multinomial distribution at training time. Training set is implemented upon a famous German traffic sign dataset and to see the difference between two regularization methods. Since, dropout regularizer is very efficient in minimizing the overfitting o f the training set by randomly discarding inbound and outbound neurons. Plus, in mix with max-pooling a dropout regularization might require more epochs to converge more accurately. Feeding the algorithm with traffic sign dataset makes it useful for adaptive cruise control systems in cars to avoid nasty and awkward car accidents. Two methods can be used in tandem or separately but in either case performance can be tuned by changing hyperparameters.

55-60 499
Abstract

In the last century, scientists discovered several visual neurological features. The optic nerve has a local receptive field. The recognition of a whole picture is composed of multiple local recognition points. Different neurons have the ability to recognize different shapes, and the optic nerve has superposition ability. The pattern can be composed of low-level simple lines. Later, people found that after the operation of the concatenation, the process of optic nerve processing calculation can be well reflected. The LeNet-5, which was invented by LeCun in 1998 [1], can greatly enhance the recognition effect. This article mainly focuses on the neural network evaluation, from neural networks to convolutional neural networks, convolutional layer, the pooling layer, and the overall CNN structure.

61-66 339
Abstract

The article shows the use of object-oriented modeling in mining in the open pit, given examples of creating models using block modeling. One of the main requirements for the development of mineral deposits is to increase the completeness and quality of extraction of marketable products. Therefore, making optimal decisions based on these requirements in modeling and career development is an important task. The order of mining operations during the formation of working sites was determined in the process of preparing the work, a graphical model of mining operations wascreated using the parameters of the blocks and the working area of the open-pit. According to the above formulas, calculations were made, the results are reflected in the graph of dependence of the volume of recoverable blocks by year. The given model of the working area of the field allows us to consider various optimization tasks for the annual and landmark mining positions. The methods discussed in the article are applied to solving problems of commensurate movement in the working area of the quarry, which ensures a continuous increase in the reliability and efficiency of the design of mining enterprises.

67-75 450
Abstract

In applied mathematics, the Laplace transform is very relevant. Thus, in mathematics, mechanics and engineering, the operational method based on the Laplace transform is widely and very successfully used to solve entire class ofproblems. The object of the study is the integral from the Riemann-Mellin formula for inverting the Laplace transform and approximating it with the help of Fourier series of a numerical aggregate. In this paper we study the method of inversion of the Laplace transform by expanding the original function into a Fourier series with respect to the sines of odd multiple arcs. Also an analogous method based on the expansion of the function in the Fourier series of Legendre polynomials is developed, during which examples were considered that helped to carry out a comparative analysis of the convergence rates of canonical and developed methods. A numerical apparatus was developed and implemented in the programming language Python, which clearly demonstrates the predicted hypotheses.

76-82 367
Abstract

The description of the current results on the “Development of Software for atmosphere-lithosphere coupling research based on regional and global lightning detection networks data” project is given. The purposes and tasks of the project, the main technical and software solutions on development of the database of regional and global lightning detection networks and the user interface for data using for science and applied purposes are provided. The short description of the incoming and outcoming data frames and tools for their processing and visualization are provided. The examples of lightning data visualization using developed Software are shown.

83-87 431
Abstract

This article discusses the basic methods of creating integrated circuits with high radiation resistance. The factors of radiation effects of outer space and their characteristic effects on the elements of the spacecraft electronic equipment are listed. Various approaches to increasing the reliability of integrated circuits resistant to ionizing radiation are considered. Various architectures of the construction of radiation-resistant processor channels in the “systems on crystals” (SoC) are shown.

88-94 381
Abstract

Monitoring of the climatic and ecological state of Almaty and the Almaty region is currently an important area of research, as weather forecasting, micro-climatic zoning, the influence of environmental factors on environmental pollution, data collection and analysis methods require modern software solutions and software packages. It is supposed to solve the problem of visualizing data of changes in the climatic and ecological state on the example of Almaty and Almaty region, taking into account the features of the terrain, and also to ensure the transfer of data from sensors based on modern radio access technologies. The experience of recent decades testifies to an increase in the number of natural and anthropogenic catastrophes, carrying serious environmental and socio-economic consequences. A prerequisite for the occurrence of disasters is the environmental risks associated with the presence of dangerous natural and anthropogenic actors. Identification of the main environmental risks that have an impact on the economy of Kazakhstan, makes it possible to develop and conduct more effective government policies in the field of greening the economy, production, and the development of environmentally friendly technologies, especially in leading industries. For strategic planning ofpollutant emissions, an assessment of the current state of the atmosphere is necessary. Specialists use mathematical apparatus, specialized software and high-performance computing clusters. Natural phenomena can not be localized only by one region. Scientists in a particular region can use information that is freely available on a number of Internet sources to make regional changes and refine their models and estimates based on data obtained from regional measuring stations. To study the automatic collection of environmental information data, it is necessary to develop a network fragment diagram. This article solves the problem of studying modern methods of monitoring meteorological and environmental indicators, as well as monitoring of water resources; study of modern methods of data analysis in climatology, ecology and meteorology.

95-102 358
Abstract

The article presents the main goals and objectives of environmental monitoring, describes the process of developing an infological model for a selected subject area. The ways of modeling the system using the means of a   unified modeling language are characterized. The problem of weather forecasting has been and will always be relevant. But another serious problem is how many people have easy access to weather information. Today there are many resources in the world, but not all of these resources are well adapted to achieve the situation of Kazakhstan in its functions. These functions are very limited, the maximum that they can provide is the real weather. Although users of other countries can be happy with their applications using a map of winds, clouds, pollution levels, etc. Today, there are many different mobile and desktop applications for checking weather forecasts and other meteorological data. Each of them tries to stand out from the others with its versatility, convenience and beautiful interface. But not all of them are well adapted for users of Kazakhstan, namely, to predict the weather in our area. Object of study: ground-level air layer over Almaty. The aim of the study is the analysis, modeling and development of IP, which calculates the concentration ofpollutants in the atmosphere of the city, coming from stationary sources ofpollution, as well as the calculation of the complex index of air pollution. The following research methods were used: collection, systematization of data on air pollution of the city of Almaty by the main pollutants. The main characteristics of the work are the Information System “Atmospheric Monitoring” created to monitor the state of the atmosphere of the settlement, by calculating the atmospheric pollution indices. The information system also stores the recorded data in a database, which provides an overview of the complex index of air pollution over the past 6 and 12 months. Analyzing the data obtained, it is possible to build forecasts for the near future, as well as make environmentally important decisions for improving the state of the atmosphere. The results of the study can be applied in the interests of ensuring an environmentally safe population.

103-108 427
Abstract

Energy saving and energy efficiency improvement of all sectors of the Republic of Kazakhstan is currently a priority task, which will allow solving a set of topical issues: energy, economic and environmental. The main goal of energy conservation and energy efficiency is the implementation of a strategy for the integrated efficient use of energy resources and the introduction of innovations and energy-saving technologies with sustainable economic growth and a steady improvement in the quality of life and the preservation of a healthy environment. And today, a special role is assigned to the issues of promoting energy saving and energy efficiency, since it is awareness, the high energy saving culture of people that determines, in the majority, the level of efficiency of energy resources use. The introduction of the international energy management standard ISO 50001 is determined by one of the objectives of state regulation. In this article, the author examines the issue of insecurity and technical imperfections of metering devices used in the Republic of Kazakhstan, analyzes the prospects for using intelligent metering systems (devices) in other countries (USA, Russia and European Union countries) and proves the need for their introduction into the energy sector of the Republic of Kazakhstan. The proposed actions for the implementation of smart electricity metering systems are a set of measures to improve the energy efficiency of the country’s power supply system. This is due to the fact that the true period of operation of the energy system of the Republic of Kazakhstan is characterized by the need to constantly increase the active power transmitted through the lines to meet the rapidly growing needs of utilities and the national economy. The increased level of reliability, manufacturability, energy efficiency, energy security of the energy system is indicators of the level of economic development of the country.

109-115 398
Abstract

Modern education is impossible to imagine without information and communication technologies, which are developing at an enormous pace. Currently, the perception of students can be improved through the use of new technologies. The results of the development of the software application “Electronic laboratory (E-lab)”, implemented as an application with a set of practical tasks, laboratory works, animations and theoretical tasks for the study of physics using augmented and virtual reality technologies. Unity 3D cross-platform environment was chosen as the development platform. The main functionality was written in C#. Graphic models were created using Substance Painter. The article describes the development process of the presented application, its functionality, as well as the user interface.

116-121 327
Abstract

This paper discusses methods for identifying and selecting features when processing scientific information resources of a university. The procedure for processing unstructured information resources consists of several stages: the extraction of terminological collocations, the selection of features, classification, thematic annotation, clustering of documents and analytical information retrieval. Methods for automatic extraction of terminological collocations are used to form a subset of domain terms. The set of terminological collocations allocated on a given collection of scientific texts characterizes the narrow subject area of this collection. The automatic extraction of keywords and terminological collocations is the main stage in the tasks of processing natural language. For automatic extraction of terminological collocations from scientific texts in this paper the C-value method is considered. Setting a C-value value limit will only allow for terms longer than one word. The candidate terms thus obtained form a list of n-grams (bigrams, trigrams). The main modification of the method based on the statistical approach is the preliminary use of morphological filter patterns. Phrase-like phrases are extracted from the text using the C-value method: the text is divided; phrases that meet the established conditions are extracted from the text; for all candidate terms selected by the established restriction, records are created in the database. Methods of feature selection are used to reduce the dimension of feature space in order to form the most informative composition. The choice of traits contributes to improving the efficiency of learning by reducing the size of the lexicon and the accuracy of classification due to the elimination of noise signs. To remove non-informative terms, i. e. To assess the importance of the terms, the criterion was chosen. The body of documents for processing is assembled from articles published in journals in various fields.

122-128 336
Abstract

This paper describes the ontologically-oriented approach of text processing of information resources of the university associated with scientific activities. An ontology is used as an information model of scientific knowledge. The information model of the scientific resources of the university, methods for the classification of texts in scientific fields and thematic annotation of texts are described. The ontologically-oriented approach allows you to organize, structure information resources of the university associated with scientific activities, and develop methods for finding knowledge. The general model of knowledge of the university is described with the help of ontology. OWL DL (Web Ontology Language) is used as the ontology description language. When developing an ontology for describing various characteristics of classes and properties, OWL axioms of classes and relations were compiled, and attributes were established. For the classification of scientific resources used kNN-classification. The task of classification in machine learning is the assignment of an object to one of the predefined classes on the basis of its formalized features. The kNN method (k nearest neighbors method) is a vector classification model. The kNN classifier refers the document to the prevailing class of nearest neighbors. The k parameter in the kNN method is preset based on knowledge of the classification task being solved. In this paper, the kNN method is used for the multivalued classification problem. Classification for classes that are not mutually exclusive, are called multi-valued (English Multilabel Classification) classification. Document classification consists of the following actions: linguistic analysis, extraction of terms and formation of the document vector space, calculation of k nearest neighbors, ranking of classes. For subject annotation of texts, domain ontology classes are used. In the ontological dictionary, terms are grouped by domain class.

INFOCOMMUNICATION NETWORKS AND CYBERSECURITY

129-135 383
Abstract

The article focuses on the analysis and research on the use of the frequency resource for new-generation of 5G mobile networks. Currently, almost all mobile telecommunication systems operate in the frequency range from 300 MHz to 3 GHz. In order to avoid the depletion of the limited frequency-time radio resources available to modern mobile access technologies, international standardization organizations are working hard to adopt new specifications by 2020 that define the operation of 5G telecommunication networks. The assessment of the allocation offrequency bands for the introduction and development of 5G networks, the plans of ITU WRC-19, as well as the features of the use of the millimeter-frequency range for 5G networks are considered in the article.

136-143 430
Abstract

The article provides a block diagram of a closed non-linear system “frequency converter - asyn chronous motor” in the MATLAB environment with a description of the transfer functions of the system. A mathematical description of transient processes of a closed system with a nonlinear link in feedback is given, a program for solving a system of differential equations describing the dynamics of transients of a closed system is given. Comparisons of transients of a linearized system with transients of a nonlinear closed-loop “frequency converter - asynchronous motor” system are given. The algorithms for determining the stability of a nonlinear system using the phase trajectory method, the harmonic linearization method, and the method of solving nonlinear equations in symbolic form have been broken. For each method, system stability determination programs are given. The source data for the open-loop system “frequency converter - asynchronous motor” is the same, for a non-linear feedback system different. The results of the stability study of a closed system “frequency converter - asynchronous motor”, the study of the transient characteristics of the system using the software environment MATLAB are given.

144-149 390
Abstract

The questions of grant of М2М of services are considered in the systems of safety, using for cooperation elements modern mobile communication networks. At functioning of the systems of the guard signaling there is a row of problems, requiring operative intervention of company rendering necessary technical support. At the receipt of beyond measure plenty of requests on service a company have problems of organizational and technical character, that renders the negative affecting quality of her work and reliability of grant of M2M of services. Offered approach calculation of the expected loading, that an analysis of stream of acting requests on service and development of adaptive mathematical models of prognostication are the basis of. The best results were got at the use of method of the exponential smoothing out and construction of model of Brown. Models offer for prognostication of incurrence of requests on service and requests acting on separate reasons of refuse in-process systems of signaling. Development and approbation of models was conducted on results work of successfully functioning in Алматы guard company. The executed design of number of requests allowed with sufficient exactness to count a short-term prognosis on the forthcoming periods of work. For providing of efficiency of control system by activity of company prognosis estimations are regularly counted at the receipt of new data for exhaust periods of time. Introduction of design results in the process of organization of work of attendant company assists stabilizing of her work and quality grant of M2M of services.

150-156 461
Abstract

The number of machine-to-machine (M2M) connections in the mobile network is increasing rapidly. The growing M2M traffic has a significant impact on the quality of user service in mobile networks and on the processes of their operation. In addition, in extreme cases (natural disasters, fires), simultaneous operation of active M2M devices leads to a surge of traffic in the network. To determine the effective characteristics of the network, assess the quality of service (QoS) parameters in the mobile network, and assess the use of network resources, you must apply mathematical modeling. An important role is played by the development of a mathematical model of M2M traffic. The paper presents a comparative analysis of the developed traffic models. Two approaches to modeling M2M traffic are considered: the development of a model of aggregated traffic from all M2M devices and the development of a traffic model of M2M devices taking into account its type, characteristics and functions. Traffic models developed for specific mobile networks (LTE, 5G) are considered. When modeling M2M traffic, methods of Queuing theory are used. In the considered works, the flow of applications to the Queuing system (QS) is considered as MMPP (Markov Modulated Poisson Process), a Poisson flow in which applications form “clusters”. For a visual interpretation of the features of the behavior of traffic in packet networks in some works, the modeling of traffic type ON/OFF, which is used in the description of the pulsating traffic structure, is chosen. The advantages and disadvantages of each of the considered methods of modeling M2M traffic are revealed.

157-161 366
Abstract

Cloud computing is the result of the natural development of our everyday use of technology as a concept. Cloud computing has resulted in uplifting achievements in virtualization (eg. VMWare), increased computing with clusters of servers (eg. Google) and increased Internet access. Industry Leaders describe cloud computing as a supply of applications or IT services offered by a third-party (Rackspace, Microsoft, IBM) over the Internet. Recently, global economic downturn has provoked cloud computations, as organizations have sought to reduce their IT budget, which has allowed them to maintain productivity and profitability.

162-167 526
Abstract

In this article, the most relevant to date antennas are considered - phased antenna arrays (PAA), which constructively consist of a system of a large number of individual emitters connected via a feeder line to phase shifters. The phase shifter is one of the main nodes in the PAA, forming the necessary phase shift. Further development of the PAA led to the creation of active phased antenna arrays (A PAA), where a power amplifier, generator or frequency converter is connected to each antenna array antenna (AA) or to their group. The advantages of A PAA: high level of radiated power, high reliability, work in a wide operating frequency band, the main disadvantages are the construction complexity and high cost of the antenna system. There are two main types ofphase shifters: analog and discrete. The paper discusses the process of developing a switching phase shifter for the layout of a four-element active phased array antenna. Switching phase shifters are discrete type phase shifters. Antenna beam control is reduced to the simplest operations of switching on or off delay lines. The main advantages of this type of switch are high efficiency, high reliability, simplicity of design, and stability of characteristics. In the circuit of each radiator antenna layout contains 2 switches. A switch with the HMC241AQS16 marking was selected in operation, which switches to 4 directions. The switching module is made using stripline technology. The topology of the switching module is made in the «Sprint-Lay-Out» circuit tracing program. This program allows you to design printed circuit boards of small and medium complexity, and is also easy to use.

168-173 338
Abstract

This article is a continuation of the research work [1,2]. With the development of Big Data based on semantic technologies, the problem of protecting data from unauthorized use becomes very important. The existing set of models, methods and algorithms for ensuring the security of operating systems [4,5] and relational databases [6-8] cannot be applied to semantic databases, since semantic databases (SBS) have a strong hierarchical connection between the elements and the possibility obtaining new information by users on the basis of known facts through the use of logical rules [3]. This article discusses the well-known methods and algorithms, and based on the review, it proposes the development of algorithms to ensure the security of semantic databases.

174-178 415
Abstract

In this articles, the technological aspects of the evolution of 5G networks were examined, based on new types of signal-code constructions and allowing to increase the spectral efficiency in comparison with 4G networks. To date, work is underway to establish the future look of mobile 5G networks. The main objectives of 5G networks are: expanding the range offrequencies used, increasing the capacity of networks and improving the efficiency of the network infrastructure based on the use of cloud technologies. One of the main conditions for future generation 5G systems will be an increase in the spectral efficiency (SE) of the transmitted signals through the use of new signal-code constructions (SCC). Analysis of recent studies and publications shows that the reserves for improving the OFDM (Orthogonal Frequency Division Multiplexing) method of modulation with the aim of increasing the SC are almost exhausted. It is necessary to identify replacement approaches that use non-orthogonal in frequency signals, which will increase the spectral efficiency of the 5G network. Today, various methods of multiple access for 5G systems are being investigated, which are not systematized, and in many cases duplicate each other but having different names. Also, not fully revealed the specific features of the new SCC, acceptable for 5G networks. The purpose of this paper is to analyze some of the possibilities for increasing the 5G SE system by using new SCCs.

179-192 338
Abstract

A Virtual Private Network (VPN) provides the data encryption and checks security in order to provide privacy authorized users. The VPN restricts the unauthorized person to gain the access to server. This paper presents a detailed information and provides classification on different types of VPN. The detail concept of an encrypted tunnel and data encryption processes are discussed. Furthermore, Internet Protocol Security (IPsec) and layer-based VPN are deliberated. As, the Virtual Network Service (VNS) provides management capabilities and performance properties is also included in this review. Finally, the router’s virtualization is obtained by conducting the experiments.

193-199 307
Abstract

Object tracking is very vital task in many application of computer vision such as surveillance, vehicle navigation, autonomous robot navigation, etc. It contains detection of amusing moving objects and tracking of such objects from frame to frame. Its main task is to find and follow a moving object or multiple objects in image sequences. This paper present a brief survey of various video object tracking techniques like radar, sensor networks and wireless tracking algorithms. Also it presents Comparative study of all the techniques.

200-211 797
Abstract

In the 1990s, when the active development of the World Wide Web began, the popularity of anonymizers did not reach such a peak as it is today. The reason for the sharp increase in the demand for anonymity tools is the numerous scandals related to the violation of the privacy of personal user data: changing the privacy policy of Telegram messenger, according to which the company can now disclose the personal data of users suspected of terrorism to foreign government intelligence agencies; Facebook’s participation in Cambridge Analytica’s data collection for 50 million Americans; total surveillance of US intelligence services for information communications between citizens of many countries around the world, using existing information networks, disclosed by Edward Snowden. These and many other high-profile scandals about the violation of the privacy of users of the World Wide Web have led to the fact that they began to create various ways to anonymize the Internet. Today, Tor, VPN and proxy servers are considered the most popular representatives. There is a widespread belief that these methods are capable of ensuring the complete anonymity of the network user. But is it? Is it possible at all complete anonymity on the Internet? To answer these questions that are relevant today, you need to clearly understand what anonymization and de-anonymization are, as well as their division into species. In the case of anonymization, we consider the types of anonymizers, the algorithms of their work, as well as the pros and cons of each of them. When considering deanonimization, we will study its division into two categories, then we will focus on the most common methods of committing cyber-attacks.

212-218 317
Abstract

With emergence of new technology, the influence exerted by telephone communication gadgets on our daily lives is increasing. Due to the fact that the information contained on such small gadgets is becoming highly confidential and sensitive. In United States of America alone, over 2012 there were more than 1.6 million thefts of smartphones. And, every year, this number continues to grow. In this situation, the first question that comes to mind about the protection of the personal information. One of the better solutions is the creation of new, or the improvement of the existing blocking systems of smartphones. In this paper, we introduce the keyboared saftety algorithm for improving the static unlock systems for smartphones. The proposed keyboad safety algorithm randomly allocates number in the keyboard that helps protect safety of the keyboard. The proposed algorithm is implented by using real device. Based on the testing result, we confirm the validity of the proposed algorithm.

219-230 572
Abstract

The growing dependence of human needs on the Internet has pleased the need for secure and confidential processing of data on the World Wide Web. Therefore, the safe processing of information entails the needfor speed and availability ofsystems. Improving the reliability and privacy ofsystems directly depends on a fully protected authentication method. There are various authentication and protection methods that have been developed to ensure confidentiality and security. Their main part is based on an alphanumeric password, and only a small part is classified as two-factor authentication. In this article, we offer an improved graphical authentication method based on Twofish Encryption algorithm and Visual Cryptography (TEVC). The proposed TEVC is organized in such a way that it is impossible to predict the correct graphic password, and is further complicated by the fact that for authentication it is necessary to present its correct order, which makes it safer than an alphanumeric password. TEVC was developed and tested in the programming language JAVA. After testing, we can argue that the proposed authentication method satisfies the necessary security requirements. TEVC has been identified as a convenient and secure authentication method with less time complexity compared to other known authentication methods.

231-237 330
Abstract

We design a phone-based translation application to translate Chinese text into English. As, this application should recognize the most signs. However, there would be a challenge of maintaining the higher accuracy because one wordpossessesseveral meanings. In addition, longer text translation and connecting the application with phone's camera would be problematic andrequires proper attention. To handle these issues, Rule-based machine translation (RMT) method is implemented. Finally, the proposed RMT is compared with Google translation and Kingsoft PowerWord from accuracy perspective. The results demonstrate the higher accuracy of RMT.

238-243 942
Abstract

This article represents an equitable comparison between the most popular and frequently used algorithms in the data encryption area. There are some main characteristics that distinguish encryption algorithms: elapsed time and efficiency of data encryption and ability to protect data from various attacks. This document presents the comparison between the most common symmetric encryption algorithms: DES, 3DES, Blowfish, and AES. The comparison was done by processing data blocks of different sizes to estimate the encryption and decryption speed. Since our main task is to perform these algorithms with different settings, the presented comparison takes into account the behavior and performance of the algorithm when using different data loads. This paper also analyzes parameters such as flexibility, key extension option, possible attacks and security vulnerability of the algorithms, which determines the efficiency of the cryptosystem.

244-248 928
Abstract

While many of us are looking closely at Kubernetes and assessing its capabilities and maturity, oth­ers have time to move forward, test and run in production (fully or partially) and to receive their first “adult” operating experience. [4] Some architects define Kubernetes as “A platform providing a level of abstraction that takes away any problem from you, so that you can create on top of it (not thinking about it).” For example: The Linux platform allows you to make system calls regardless of the computer hardware, and the Java platform allows you to run applications regardless of the operating system. What the platform for launching applications which is based on microservice architecture should be like? This conversation will continue in the article, affecting the overview of the possibilities and goals of using Kubernetes as a platform for orchestrating containers.

249-252 361
Abstract

The main problem that is being explored in this article is to consider complex data transfer solutions in an automated accounting system ofenergy resources using Heterogenic Networks. As a result of the research are taken, the solutions used by systems in the internal market and the basic technical solutions used in their development.

SMART SYSTEMS

253-258 516
Abstract

The article shows the use of visualization of three-dimensional objects, gives examples of creating models, using lighting realistic images using rendering with improved lighting. Computer graphics are of practical interest, as there is the possibility of obtaining realistic images. In computer graphics, a sufficiently fast “rasterization” technique was used, allowing displaying three-dimensional objects on a two-dimensional screen. In normal rasterization, objects in the scene are most often created from a special grid of triangles -polygons that intersect with each other. Despite the simpler technology compared to ray tracing, rasterization is difficult from a computer-processing point of view. Therefore, the most effective is the use of raytracing in the processing of models. Raytracing works differently. Tracing tracks the path of each light beam through all the pixels on a two-dimensional display to 3D models. Thanks to this, developers can achieve better lighting quality and different lighting effects. The basic principles ofthis theory are reflected in the article and a specific example of application is given. The difference of the processed image of a fragment of video material with respect to the original one is demonstrated. The practical use of the ray tracing method, its principles of construction and implementation are shown. In the process ofpreparing the work, a model of the room design was created, using the principles of constructing shadows and ray tracing. The study of the technological capabilities of computer graphics involves the use of raytracing and scenes with better lighting in modern cinema and animation. At the same time, the beam is reflectedfrom the surfaces ог passes through several objects before reaching the light source. This material is of interest to users, as researchers have the opportunity to obtain realistic images, build and run a 3D model of the object.

259-263 352
Abstract

Blockchain, the foundation of Bitcoin, has received extensive attentions recently. Blockchain serves as an immutable ledger, which allows transactions take place in a decentralized manner. Blockchain-based applications are springing up, covering numerous fields including financial services, reputation system and Internet of Things (IoT), and so on. However, there are still many challenges of blockchain technology such as scalability and security problems waiting to be overcome. Blockchain has numerous benefits such as decentralization, persistency, anonymity and auditability. This paper presents a comprehensive overview on blockchain technology. We provide an overview of blockchain architecture firstly and compare some typical consensus algorithms used in different blockchains. Furthermore, technical challenges and security issues are briefly listed. We also lay out possible future trends for blockchain. In general, everything that can be written down on paper can be written in a blockchain with only one difference in a blockchain it is simply impossible to substitute or forge records. In contrast to computer security taken in a traditional sense, the notion of identification is as important here as that of authentication. Every time a transaction or block of data is added to the chain a majority of the network must verify its validity. In the case of a contractual blockchain, the identification must take into account the complete person-identity-proof sequence to create legal effects. This article reviewed challenges that might arise on every step of integrating decentralized peer-to-peer cryptocurrency into our daily lives. It discussed implementation details and problems and challenges that might arise during the cryptocurrency adoption phase. Despite the possible challenges, cryptocurrencies might still shape the future of digital payments and create their own niche.

264-269 497
Abstract

Logistics in modern conditions is one of the most effective factors to improve the efficiency of the economy. Like other traditional management functions, it focuses on promising information technology, economic and mathematical methods and models to ensure compliance of management decisions constantly changing internal and external business conditions. To a greater extent, this is relevant for the theory of organization and functioning of logistics systems (processes) involved in the management of material flows and stocks, which tend to constant growth. Currently, due to the increase in freight traffic, an urgent problem is the development and development of methods for solving routing problems, the main purpose of which is to reduce the cost of transportation and delivery of various goods to consumers «just in time». In recent years, with the development of trade networks, the growth of the population of large cities, the development of transport infrastructure in Kazakhstan, the development of new effective information and computing technologies to optimize the structure of regional transport is becoming more widespread. Vehicle Routing Problem (VRP) is one of the most widely known questions in a class of combinatorial optimization problems. It is concerned with the optimal design of routes to be used by a fleet of vehicles to serve a set of customers. VRP is directly related to Logistics transportation problem and it is meant to be a generalization of the Travelling Salesman Problem (TSP).

270-276 441
Abstract

This review paper presents a comprehensive study of medical expert systems for diagnosis ofdiseases of internal organs. It provides a briefoverview of medical diagnostic expert systems and presents an analysis of already existing studies. Automated systems today play a very important role in the development of medicine, and provide assistance to medical personnel in the event of controversial and problematic situations in the treatment ofpatients. Moreover, medical diagnostic systems can solve not only the problems of diagnosis, but also help in predicting the course of diseases. Modern automated diagnostic systems are computer programs that can analyze on the basis of symptoms and clinical data and can help professionals in problem situations. To date, there are very few computer programs are based on clinical examination data for the diagnosis of diseases of internal organs. Thus, it seems relevant to develop an automated system for diagnosing diseases of internal organs. The purpose of the study as a whole is the development of a computer advisory diagnostic automated system for the diagnosis of diseases of internal organs. Finally, this article provides an overview and analysis of existing medical systems for diagnosis and methods for diagnosing diseases of internal organs basically in Kazakhstan.

277-281 389
Abstract

This paper approaches the development of classifications of the types of project outcome and re­quirements, as well as the calculation of the estimated time limit for the project phases: initiation, preparation, planning, vendor selection, implementation, execution, monitoring and benefits management. The novelty of the study aims to develop the benefits and requirements model depending on the type of project outcome. The essence of the model is to determine the type ofproject result, which determines the types of requirements that are at the same and below levels of the type of project result. Types of project benefits are determined by the level above the type of project result. Thus, by defining the type of project result, one can without erroneously determine the requirements and benefits of the project. This research results are applicable for the effective IT project management methodology.

282-291 446
Abstract

The first step in calculating the developer's work is to estimate the size of the information system software. Software development is always associated with certain risks and consequences. The formalized methods ofclassification and software development effort estimation are practically not presented in traditional methods. There is currently no uniform methodology for estimating the cost of software development. The main difference in the method used to estimate labor costs is the type of quality assessment criteria used (quantitative or qualitative). The procedure for determining the size ofthe software may differ by calculation methods. Presented CETIN method is compliance with both core IT standards and life cycles stages of software. The Rational Unified Process (RUP) technology was used, as part of the technological complexity of the SMM model, to estimate the labor costs, to provide an iterative and incremental approach for software development, as well as for planning and managing the projects based on the functional requirements of the system. The paper proposed easy-to-use indicators that allow the adjustment and automation of labour cost calculations for developing software application. Special correction factors are proposed to take into account non-functional requirements, such as fault tolerance, recoverability, safety.

292-300 494
Abstract

This article discusses the impact of suspended particles on human health, as well as the analysis of the level ofpollution in Almaty over the past 2 years using descriptive statistics. Pollution of the environment by industrial enterprises and vehicles, causing degradation of the environment and causing damage to public health, remains the most acute environmental problem ofpriority social and economic importance. The problem of pollution of the environment of large cities is very significant and complex, requiring first of all long-term monitoring, then a deep and competent analysis of the assessment of the situation on the data obtained, for the subsequent prevention, localization and investigation of environmental disasters and incidents, making management decisions for further work on the development of improving the quality of atmospheric air, as well as forecasting the state of the environment. In this paper, we consider a specific case, namely particles PM 2.5 —  air pollutant, which consists of solid particles and liquid droplets ranging in size from 10 nm to 2.5 microns. The fact that air pollution by small particles is a global killer is already widely known, but these statements have not yet been confirmed by specific figures. The authors have identified certain patterns, such as dependence on the time ofyear, weather, and the location of certain industrial facilities near the observed zone. The indicators with the values in the form of graphs And revealed that the concentration of suspended particles in the air exceeds the norm by 2 times most of the observed period of time, and considered the possible consequences of this.

301-308 360
Abstract

This article from the analysis of the necessity of the development of the logistics system. Analyzes the problems of disorder in the development of logistics enterprises, information platform needs, logistics information standard lag. Today it is impossible to imagine a production or trading company that is not engaged in solving logistics problems. The logistics system is a relatively stable set of links (structural /functional divisions of the company, as well as suppliers, consumers and logistics intermediaries) interconnected and united by a single management of the corporate strategy of business organization. Logistics systems allow to optimize the functioning of commodity, information and financial flows, “significantly reduce the time interval between the acquisition of raw materials and semi-finished products and the delivery of the finished product to the consumer, contributes to a sharp reduction in inventories”. In the context of globalization, given the vastness of the territory of Kazakhstan, the competitiveness of the economy and the state will largely depend on the efficient operation of the transport and communications complex. The key to the competitiveness of domestic goods, services, and the economy as a whole is a high-tech transport infrastructure corresponding to the state transport and transit policy. Thus, the solution to the problem of improving the efficiency of the transport sector is impossible without strengthening research to determine the future directions for the development of motor vehicles based on a systematic analysis of its state at the present stage.

309-317 329
Abstract

The goal is to form an educational resource that allows to organize an effective learning process through adaptive learning. The development of an information management algorithm (training content), taking into account the features of the learning path for each student, is relevant. The planned novelty of the developed algorithm for the formation of content, which is adapted for each student, taking into account his type of perception. Main objectives: 1. To conduct a survey among respondents about the intelligent adaptive information and training system; 2. Determine the type of perception of the user; 3. Determination of the level of knowledge in the chosen discipline; 4. Formation of the sequence of content for the selected course. As a result of the study, it is planned to obtain an algorithm for the formation of content for an educational system for distance learning, which is adapted for each student, taking into account its features. The adaptive system assumes: learning flexibility in an interactive educational environment; personalization and adaptation of learning; diverse content by type of perception; free access to content regardless of geography. It is an intelligent adaptive system that allows users to develop revolutionary educational and methodical materials, as well as to form individual learning paths. The adaptability of the system is that each user will have their own learning path. Users log on to the system pass 2 tests that will determine the type ofperception and level of knowledge for a particular course. The system will provide a variety of content each time. On the basis of the developed algorithm, an adaptive online educational process is being developed, according to which the forms of education for people with disabilities and persons with disabilities will be developed and alternative forms of content presentation will be created for them. The development and implementation of an online process will make it possible to abandon expensive foreign training systems. As a result, the principle of managedinteractive self-education will be implemented, which leads to a  decrease in the destructive effects of ICT on students ’ cognitive and social activities.

318-323 454
Abstract

The paper deals with methodology of modeling hybrid administrative business processes. Literature review shows that there are many definitions and interpretations of the concept of “business process”. However, among researchers there is no clear definition of the hybrid business process approach in modeling of administrative activities. There was given definition to hybrid administrative business process, principles of modeling hybrid administrative business process. Business process modeling describes the logical relationship of all elements of a process from its beginning to its completion within an organization. The proposed methodology is based on the Casewise Framework methodology and ARIS House methodology. According to this methodology it is planned to describe and formalize public administrative processes. It was considered a formalized representation of the enterprise in the form of a matrix, which built on the basis of the model of Professor Zachman. Changes in the processes of a modern enterprise are carried out continuously. The same need makes it necessary to change the processes of functioning of state bodies. Therefore, “business engineering” should be viewed not as a technology for describing and re-engineering business processes during the preparation of a company or government agency for automation, but as a regular management technology based on its electronic business model. Modeling of hybrid administrative business process is explored on the case of licensing of providing scientific and research activities of universities.

324-328 453
Abstract

Today, big data affects almost all branches of the engineering infrastructure. With the advent of the Internet of Things (IoT) devices, their growth is accelerating more and more. But without analytics there is no use for them. Immense results are presented by the capability to analyze and utilize huge amounts of IoT data, including applications in smart cities, smart transport and grid systems, energy smart meters, and remote patient healthcare monitoring devices. Collecting and analyzing smart meter data in IoT environment assist the decision maker in predicting electricity consumption. Furthermore, the analytics of a smart meter can also be used to forecast demands to prevent crises and satisfy strategic objectives through specific pricing plans. Thus, utility companies must be capable of high-volume data management and advanced analytics designed to transform data into actionable insights. Big data analytics allows you to predict, find hidden relationships and make optimal decisions based on them. Big data collected from smart cities offer new opportunities in which efficiency gains can be achieved through an appropriate analytics platform/infrastructure to analyze big IoT data. MATLAB tools allow you to process and analyze data, build machine learning models. This article discusses the possibilities of using the methods of modeling, forecasting for energy efficiency of buildings. MATLAB is the best tool for prototyping algorithms and performing modern mathematical calculations.

329-334 353
Abstract

In order to ensure high-precision positioning of the user in Kazakhstan, a system for managing the network infrastructure of the reference global navigation satellite systems (GNSS) stations using cloud technologies is being developed. Improving the accuracy of determining geographic coordinates can significantly expand navigation systems to solve a variety of applied problems, from the use of ultra-high-precision satellite navigation for precision farming to the automatic control of unmanned aerial vehicles. The purpose of creating a network infrastructure management system for reference GNSS stations using cloud technologies is to improve the accuracy of determining the geographical coordinates of terrain points using satellite navigation and the differential correction method, reducing the cost of creating and operating the system through the use of cloud technologies. The development of a software system for managing a network of reference GNSS stations is carried out using modern design, programming and modeling tools. The article presents the structure and main components of the system for managing the network ofreference GNSS stations using cloud technologies. The functional characteristics of the control center of the network of reference GNSS stations using cloud technologies are presented. The technical support of the control center of the network of reference GNSS stations using cloud technologies is described, which includes a set of technical means, such as automated workstations for personnel, information display facilities, telecommunications facilities and auxiliary facilities. Information exchange in the management system of the network infrastructure of the reference GNSS stations using cloud technologies is described by the network model of the interaction of open systems OSI / ISO.

335-342 294
Abstract

The article is devoted to one of the priorities of the implementation of the digital agenda of the Eurasian Economic Union until 2025 - the introduction of a product traceability system in the Eurasian Eco­nomic Union (EEU). The purpose of introducing a system of transport traceability of goods is to improve the efficiency of transit traffic through the territory of the EAEU by reducing the time it takes to travel through the territory of the EAEU, ensuring the safety of goods being moved, reducing operating costs when moving goods and preventing smuggling during export, import and transit ofgoods. This ensures an increase in the reliability and attractiveness of transit traffic through the territory of the EAEU. The goods traceability system combines three types of traceability: information about goods and reliable identification ofgoods using a labeling code, traceability of electronic documents for goods and transport traceability of goods, which provides control over the safety of goods and monitoring movement of goods along the route. The regulatory documents of the Eurasian Economic Commission, which define the goals and requirements for the introduction of a mechanism or traceability of goods in the EAEU member states, are considered. The article presents the main tasks of the traceability system, which determine the technical appearance of the system. The architecture of the national goods traceability system in the EAEU member states is presented in the form of a generalized structural scheme. The architecture diagram contains the main components of the system, communication channels, system users, and interaction with external systems. The results of the pilot project of the system of transport traceability of customs goods “EVAC Transit” are presented, which confirmed the correctness of engineering solutions and the possibility of their use for the implementation of the national system of traceability of goods in the Republic of Kazakhstan.

343-348 394
Abstract

The article is devoted to one of the extremely dangerous natural phenomena in the mountainous regions, namely, a natural hydrological phenomenon like mudflow. Each mountain region is characterized by certain statistics of the causes of mudflows. The article describes the causes of mudflows in the territory of Kazakhstan, as well as methods for preventing mudflows or minimizing their consequences with the possibility of near-continuous monitoring and warning of mudflow danger in real time. Monitoring the level of mountain (obstruction, glacial, moraine) lakes will allow to calculate the overflow time and take preventive measures based on the accumulations of the required amount of environmental parameter measurement data. However, the existing need to monitor the behavior and condition of these objects is complicated by the lack of land and cellular communication systems and the lack of a power source in the mountainous areas of the country. The article describes the principle of operation of a system for monitoring the state of moraine lakes using space communication technologies. The main components of the monitoring system of moraine lakes are the data collection and transmission station, which is the source of the input telemetry and meteorological data, as well as the subsystem of monitoring and data display, which studies the potential danger of moraine lakes breaking through. The basic functions of each subsystem are described, as well as the structure of the output information and the failure criteria of each basic component. Technical solutions for the interrelationships of the monitoring system of moraine lakes with adjacent systems and to ensure its compatibility are given.

349-352 541
Abstract

Determining the location of the aircraft in space is one of the main tasks of navigation, that a significant part of onboard and ground navigation equipment is designed to solve this problem. The need to monitor air objects arose from the moment the air objects appeared and at the initial stages were solved using tools such as radio communications, radio direction finding, radiolocation, and others. The increasing needfor air travel requires continuous improvement of the security system, ultra-precise control of aircraft movement and the elimination of errors based on a misunderstanding of the pilot and controller. However, there is a category of small civilian aircraft, which is not equipped with such devices, and whose number is increasing every day, including the widespread increase in the number of large unmanned aircraft weighing more than 10 kg, whose uncontrolled flights pose a real threat to the safety ofpeople, communication facilities and air traffic in general. The article describes the principle of operation of the developed system for monitoring small civilian aircraft in real time under all weather conditions. The structure of the monitoring system for small civilian aircraft using global navigation satellite systems and mobile satellite communications, which consists of subsystems such as a terminal, a data processing center and a control center, is presented. The functional tasks of each subsystem of the small civilian aircraft monitoring system are described.

353-359 337
Abstract

In order to protect information in railway automation and telemechanics systems, joint application of legislative, organizational and program-technical measures is required. Identification of the main threats to information security, the development of its policies, guidelines, the system ofprovision and organizational and legal measures, the selection and adaptation of information protection technologies are the main stages of ensuring information security of railway automation and telemechanics systems. The ways of achieving the set goals are realized through a set of measures and means aimed at identifying various threats to information security, countering them and eliminating them. In the article the questions of information protection in the systems of railway automatics and telemechanics are considered, the types of threats to information security are given, the methods of increasing noise immunity and information security are considered, the variants of providing the necessary level of noise immunity.

DIGITAL TECHNOLOGIES IN ECONOMICS AND MANAGEMENT

360-364 697
Abstract

Financial technology is rapidly developing area in the world. Developed countries are aware of its potential trying their best to catch the pace of changes in this area. Country governments are trying to support their domestic developers. Regulators are trying to adapt to the rapid character of the industry. Kazakhstan's government is also investing time and resources to catch the wave. Unfortunately, Kazakhstan is losing its domestic, fintech developers. Part of the developers seeks better conditions for product development and other part better markets to monetise technologies. Research focuses on main problems developers and specialists in finance area encounter and count as impediments in developing financial technologies development. Survey was made to define most critical problems and analysed along with current financial market condition.

365-369 707
Abstract

The urgency of the problem of improving the quality of education of students with disabilities is associated with a strategy aimed at the use of digital technologies in the education system. This determines the need to create conditions for obtaining high-quality higher education by this group of the population. The article discusses ways to promote the solution of such problems as education and employment of disabled people through the creation of social conditions with the means of modern information technologies. The scientific and practical significance of the work consists in specifying ways to improve the system of inclusive education. The methodological basis of the study was the works of the classics of psychology and modern researchers of inclusive education. The main directions of work on the introduction of inclusion based on the model of David Mitchell.

370-376 628
Abstract

The purpose of the study is to develop and explain more deeply types of the methods of digital and information technologies in Risk Management in Kazakh organizations with help of international experience. The article presents analysis of risk management methods in innovative and international companies and will clarified the concept of risk-management system as a set of elements designed to identify, analyse and assess risks. Methods and types ofproblem solving associated with risks are universal for any business and organization that are conducted in the Republic of Kazakhstan. As a result, foreign experience of using digital technologies can improve the efficiency and quality of risk management solutions in any Kazakh organizations.

377-382 347
Abstract

The article discusses the risk management specifics during IT projects implementation based on the analysis of the stated problem. The main methodologies and standards of risk management were studied in the context of their application to a specific situation in the field of the IT industry in Kazakhstan. Risk identification has been conducted in accordance with the values applied to their methodological developments and supplemented with conclusions related to the preparation of a risk management plan for the implementation of an IT project. Recommendations that can be used in risk management are presented.

383-387 472
Abstract

The level of competitiveness of economic entities today depends largely on the level ofimplementation of digital technologies in them. The process of digital transformation is becoming an important and necessary condition for successful economic development. In this article, the authors explore the issue of the role of human capital in the process of digital transformation. In particular, the question of the need to train human capital in the basics of digital transformation is being considered.

388-392 1595
Abstract

Digital technologies are becoming an increasing component of organization’ s various functional areas. Wide using of digital technologies allows for the networking interaction between members of innovational process, implements the formation of competitive advantages, and optimizes using of economical and other types of resources. The President of the Republic ofKazakhstan initiated the state program “Digital Kazakhstan”, which serves as the foundation for the digital transformation of the country’ s economy. The main goal of the program is to improve the population life quality through the progressive development of the digital ecosystem and the competitiveness of the Kazakhstan economy. For the implementation of this program, the state plans to allocate about $ 400 million until 2022. One of the primary issues in the implementation of the Digital Kazakhstan Program is to consider issues of its financing.

393-396 335
Abstract

A distinctive feature of the investment analysis of high-tech projects is the differentiation of the stages of analysis for different levels of stakeholders and concerned parties. Introduction of software products, start-ups and other IT-projects should meet the interests of not only the customer, but also explore the prospects for expanding the functionality in the process ofproject implementation. Therefore, the formation of documentation and study of the investment and technological attractiveness of the project should be carried out in the form of a functional solution at the levels: the end user of the software product, the customer, the administrator and the product support group and at the level of the potential investor in the event of functional expansion. Such an approach will provide a comprehensive analysis of the possibilities of introducing high-tech products, which is quite relevant in the process of digitization of the national economy.

DIGITAL MEDIA TECHNOLOGIES

397-403 335
Abstract

The article considers political, economic relations between Azerbaijan and the British Kingdom based on the press materials of the two countries; exploring the main directions of BP in our country. Special attention is paid to the issues of the “Contract of the Century” signed in September 1994 and the “Contract of the New Century” signed on September 14, 2017, ensuring the successful implementation of Azerbaijan’s oil strategy. The author also draws attention to the materials of some of the press organs of Great Britain, including the newspaper “The Guardian”, which are biased in nature. The author of the article, based on convincing facts, exposes the actions of such journalists.

404-411 470
Abstract

An overview of information on digital transformation - digitalization of Kazakhstan. World experience and Kazakhstan in the digitalization ranking, advantages and barriers in the implementation of the program. The main objective of the new state program is the progressive development of the digital ecosystem to achieve sustainable economic growth, increase the competitiveness of the economy and the nation, and improve the quality of life of the population. The implementation of the state program is carried out in four key areas: the implementation of the digital Silk Road, which implies the development of a reliable, affordable, high-speed and protected digital infrastructure; the development of a creative society, including the development of competencies and skills for the digital economy, work to improve the digital literacy of the population, training ICT specialists for industries; digital transformations in sectors of the economy - the widespread introduction of digital technologies to increase the competitiveness of various sectors of the economy; transition to a proactive state, that is, it is an improvement of the electronic and mobile government system, optimization of the provision ofpublic services. The state can provide a “digital leap” in the country due to the accelerated development of specific technologies. In such cases, the state assumes the role of an investor, defining key, most promising areas of financing, based on an assessment of a long-term return on investment, competitive position, trends, and also invests in fundamental success conditions, such as education and retraining. Digitalization has an impact on all sectors and will lead to a change in the structure of the economy of Kazakhstan as a whole by diversifying and unlocking the potential of non-primary industries, encouraging start-up activities and  opening “new industries”.

412-417 397
Abstract

Necessity of reformation of economy of Kazakhstan, taken by the government of country course on innovativeness in economic development demanded the technological retooling of the system of education. It already not only processes of computerization or informatization. The modern tendencies ofglobalization and modernisation affect all levels of the system of education - from kindergarten to institution of higher learning/Digital revolution that is interpreted as a transition from an analog to the digital devices and technologies of transmission of signals, in the XXI century went out on the new, higher level of introduction, and embraces the all more spheres of activity, including education. Not only replacement of printed train aid electronic educational квестом but also alteration of all educational content became investigation of digitalization. An aim of the article is a study of questions of training ofjournalistic personnels for work in digital mass-media. Scientific meaningfulness of the article is determined by research of new standards ofjournalistic education. Research methodology envisages the system and disciplinary approaches, methods of analysis, synthesis. A research result consists in actualization of new model ofjournalistic education and competenses of specialists of digital mass-media. Modern journalistic education requires the new going near educational trajectories, herein there is a scientific and practical value of the real article. In addition, a practical value consists in the real possibility of introduction of research results in the process of educating on the faculties of journalism of institutions of higher learning of Kazakhtan.

DIGITAL GENERATION: LANGUAGE, EDUCATION, CULTURE

418-422 532
Abstract

This article describes the significance of the development of an appropriate relationship between writers and their readers “as the demonstration of absolute truth, empirical evidence, or flawless logic” (Hyland, 2001). According to a number of studies, in order to create an academically convincing identity, writers use a variety of devices in their discourse such as self-mention, hedges and boosters, evaluative commentary, interpersonal meta-discourse, theme selections and stance markers. One of the ways to maintain reader-writer interaction is referring to readers as the participants of the discourse by using inclusive or second person pronouns, interjections, questions, directives and references to shared knowledge. According to Hyland (2001), the usage of inclusive pronouns in the 240 research articles investigated by him comprises 36.5 % of the total features leaving behind imperatives, obligation modal verbs, indefinite pronouns, knowledge references, rhetorical questions, second person pronouns, asides, real questions, and the structure “it is (adjective) to do”. First person pronoun weperforms a number of important functions in academic prose, for example, it can help the writer to engage readers in academic discourse, address the reader “from a position of confidence”, guide readers “through an argument”, and structure the information within a written text. Nevertheless, first person exclusive pronoun I rather than inclusive we would be more appropriate in some cases in order to leave an opportunity to the readers to decide whether or not they agree with the view. Hence, it is crucial to choose a pronoun with the appropriate function in each particular case.

423-429 521
Abstract

This article examines the didactic possibilities of modern information-communication technologies in the formation of educational and cognitive component of cognitive-communicative competence of students studying English. Pedagogical technology is a scientifically-based choice of the nature of the impact on the learning process, which is made in order to maximize the development of the individual as a subject of the surrounding reality. In the framework of this study, ofparticular interest are technologies such as: technology of student-centered learning, game technology, active teaching methods, problem-based learning, debate technology, blog technology, wiki technology, podcasts, as in the process of implementing the methodology for teaching a foreign language on the basis of each of the selected technologies, students develop educational skills, cognitive-communicative competence and abilities.

430-436 660
Abstract

The article substantiates the need to use active forms and methods of teaching for a successful learning process within the framework of updated curriculum. It also argues the transition from traditional teaching methods to active teaching methods. Various methods of teaching are indicated, which are applied at different stages of the educational process. The article is based on the theory of D. Bruner “Learning through discoveries”, where four groups of conditions for the realization of learning success are distinguished. This topic is relevant in accordance with the innovations in Kazakhstan education. The concepts of “pedagogical innovation”, “active teaching methods”, “smart-goal”, “feedback” are revealed. The article also covers the process of mutual learning, which develops such competence as adapting to others. This article discusses in detail some of the active teaching methods that help make the lesson more productive and interesting, and also help to achieve the goal, thanks to the stated learning outcomes. The tasks of the “Russian language” discipline are described in detail, which require implementation with the use of active teaching methods. The link between active teaching methods and the “Taxonomy ofpedagogical goals” by Benjamin Bloom is traced and established. The use of active forms and methods will allow each student to engage in the learning process. The specificity of using active methods in different types of studies has been determined. In this article given information about the role of the teacher and the student in the educational process. The necessity of using active methods has been identified and substantiated, since it provides the condition for successful study in
higher educational institutions of Kazakhstan.

437-442 574
Abstract

The article is devoted to the study of national- specific features of non-verbal forms of communication of the Kazakhs, an important part of which is proxemics - the science of communication, its structure and functions. The Kazakh non-verbal culture retains specific features, being an important part of the mentality of the nation in modern unified forms of communication. The article deals with some features of ritualized communicative situations in which the ethno cultural context is traced. In addition to the established concepts - proxemical distance, organization of communication, personal communication space, the concepts that reflect the specifics of Kazakh proxemics are explored: Ter, Bosaga, Zhol. At the same time, emphasis was placed on the traditional norms of behavior of the Kazakh people, which are largely predetermined by the opposition: “senior - junior”, “man - woman”. The article shows some features of ritualized situations, such as condolence, blessing. It is noted that modern proxemics still retains traditional traits.

443-447 2467
Abstract

The article dwells upon translation features of terms in the field of information technology. ICT terminology has been evolved and developed due to advent of modern computers, telecommunications and digital audio / video technologies. According to linguists, ten years ago, Russian terminology in computing and programming consisted of about 3,000 lexical items. The need to translate foreign terms in the field of ICT has appeared due to the fact that development of scientific technologies, computers, telecommunications and audio / video technologies seriously affected the change and replenishment of Russian language vocabulary. Colloquial speech was greatly changed due to appearance of special vocabulary and new terms. This phenomenon has its own negative sides - unfortunately, many words clog up our speech and make it incomprehensible to the majority of the population. Now, few people can argue about the fact that computers, phones and DVD - players are very much embedded in our lives. But sooner or later everyone will face them. Therefore, it is very important to investigate translation features of this terminology. The relevance of the study is also determined by the fact that identification ofpatterns and peculiarities of existence and updating terminology in the field of computer, telecommunications and home audio / video equipment allows us to solve theoretical and applied issues of translation and study of modern English.

448-452 302
Abstract

This article deals with problems of moral and spiritual development of technical university students. The main task of a higher school is to prepare the students for a future creative work. To do this, it is neces­ sary to clearly define what innovations should be introduced into educational process, as it causes the need to improve the entire system of educational and research activities. The importance of this problem is especially increasing with adoption of the State Program for the Development of Education in the Republic of Kazakh­ stan for 2011-2020. University staff and the students need to solve three major sets of tasks: 1. Stable tasks of social order (long-term). 2. New and updated tasks 3. Tasks of improving teaching and research activities by development ofpedagogical skills. These tasks also include the restructuring of student activities on the basis of its individualization, creative activity and independence. The base for solving these sets of tasks consists of three main components of higher education:
- fundamentalization and continuity of education;
- reliability of professional training;
- scientific, moral and ideological culture of an intelligent person.
The complex of stable tasks includes the following:
- improvement of educational, scientific, and research activities of teachers and students;
- the steady development of ideological and educational work on the basis of a national policy of the Republic of Kazakhstan;
- development of students ’ interest for future professional work;
- intensification of independent search work, development of skills and acquiring knowledge;
- formation of an active life position of students as well as their dignity, commitment and discipline by hard work;
- formation and development of active irreconcilability towards a hostile ideology and any manifestation of antisocial actions.

CHEMICAL TECHNOLOGY AND ECOLOGY. OIL AND GAS ENGINEERING

453-459 378
Abstract

Mixtures of light alkanes simulate associated gas of oil production, the problem of processing of which remains relevant both in the world and in Kazakhstan. New supported catalysts based on platinum metals have been proposed for the dehydrogenation reaction of a mixture of light alkanes to the corresponding olefins prepared by the impregnation method according to moisture capacity. The structure of freshly prepared and spent catalysts 3 % Pt, Pd, Ru on у - Al2O3 were prepared by physicochemical methods TEM, SEM, BET. The particle size distribution curves were made up to determine the distribution of particles on the surface of the catalysts. The conversion of a mixture of light alkanes in a reducing environment was carried out in a laboratory flow-type installation on a stationary catalyst bed at atmospheric pressure. The conversion of a mixture of light alkanes on platinum metals supported on у - Al2O3 in four modes is presented on comparative tables in the temperature range of 350-600 °C. The highest yield was observed at 3 % Ru / у - Al2O3 with the joint feeding of a light alkanes mixture with water at 500 °C. Water does not participate in the composition of the final reaction products but shifts the equilibrium in the system, forming dissipative structures on the catalyst surface.

460-464 325
Abstract

A literature review on the catalysts, used in the hydrocarbons conversion to produce a-olefins, is given in the article. The catalysts derived from natural raw materials are considered as the most accessible ones. Methods of decationization and modification of dinoptiUolite, the main component of natural zeolites of Russia and Kazakhstan, are described. Montmorillonite clay is used as a carrier. The most attention in the cracking catalysts review was drawn in the direction of the paraffin cracking with obtainment of long-chain a-olefins. The production of long-chain a-olefins by the oligomerization of ethylene and propylene, where Bronsted and Lewis acids are used as catalysts, is shown along with cracking. In addition to natural and synthetic zeolites, heteropoly acid (HPA) is also used in the catalysts production.

465-468 368
Abstract

This article analyzes the conditions in Kazakhstan and other developed countries to separate wool from drainage water. Electrocoagulation technology has been developed to remove wool from drainage water. Currently, the state pays great attention to agriculture in Kazakhstan. The main issue here is to increase livestock production and improve the quality of its products. In this direction, the production of sheep products is an effective way of manufacturing qualitative products.

DATA SCIENCE AND MACHINE LEARNING

469-477 352
Abstract

The possibility of increasing the efficiency of learning of the neural network that recognizes images is being investigated. Network configuration is made so that all learning examples are recognized. Uses a uniform criterionfor the quality of education. Levenberg-Marquardt algorithm has been chosen as an algorithm to teach the neural network, and Bayesian regularization was applied to improve Levenberg-Marquardt algorithm and make it better usable for practical tasks. In the experimental part, we improve quality of the modified LM algorithm using Bayesian regularization and determine appropriate number of hidden layers to prevent overfitting. The considered algorithms allow not only to speed up the learning process, but also to reduce the number of adjustments of the neural network parameters. The latter property is important when parallelizing the learning process on cluster computing systems.

478-484 439
Abstract

According to the latest WHO data published in 2017 Suicide Deaths in Kazakhstan reached 4,855 or 3.55 % of total deaths. The age adjusted Death Rate is 27.74 per 100,000 ofpopulation ranks Kazakhstan #4 in the world. This article shows the comparison of supervised and unsupervised machine learning algorithms, for detecting of depressive content in posts in social networks with emphasis on hopelessness and psych-ache for semantic analysis as the key reasons for suicide. Suicide is not an impulsive act and preparation for suicide can last about a year, during which a person will show signs of his condition in our case posting depressive content on his social network profile. This algorithm helps in detections of depressive content which can cause suicide, to help founded persons reach confident help from psychologists of national suicide preventing center in Kazakhstan. Obtaining highest result for 95 % of f 1-score for Random Forest(supervised) with tf-idf vectorization model, in conclusion of comparison we may say that K-means (Unsupervised) using tf-idf shows impressive results, which is only 4 % lower in f 1-score and precision.

485-489 410
Abstract

In Big Time, Big Data is a key element in functional information systems of the city scale. They are all digitized in digital technology. The idea is formulated by the idea that digital processing technology is the most populous city in the breakaway region of the hopes of the future generation of multitudinous.

490-497 393
Abstract

Due to the anonymity of the Internet and social networking sites, people are stalking in their senses and in the Internet community. For those who do not want to be self-reported, they have to report on cyberbullying in cyberspace and to represent users in cyberspace methods. We focus on the social networking site “VKontakte” and classify users with potential suicidal and suicidal behaviors, with the help of text processing and techniques, based on machine learning.

498-503 455
Abstract

Face recognition is the main task of the problem that the developers solve, and it also attracts ordinary users, since this area is called intervention biometric modality. In this article, we proposed a new method for identification, that is, the detection (recognition) of faces with different emotions of faces. This approach consists of two elements: the first is facial expression recognition and the second is facial recognition. The method reflects two more important steps to improve the quality of face recognition when changing facial expressions. The first step to choose is specially selected characteristics that decide for the formation of the emotions of individuals, applying the approach (method) of mutual information. This action helps to effectively improve the accuracy of the classification offacial expressions, as well as reduce the size of the feature vector. In the second stage, we used the basic component analysis (PCA) to build EigenFaces for each class of facial expressions. Then, face recognition is performed by projecting the face onto the corresponding Eigen Faces facial expression. The PCA technique significantly reduces the dimension of the original spaces, since face recognition is performed in the reduced EigenFaces space. An experimental study was conducted to evaluate the effectiveness of the proposed approach in terms of the accuracy offace recognition and space-time complexity.

504-509 353
Abstract

Nowadays, artificial intelligence is used in many areas of activity. In this article we will present the advantage of using AI in the gaming industry. Game development is a complex and time-consuming effort. The game environment, storylines, and character behaviors are carefully thought out, so graphic artists, storytellers, and software developers need to work in unison. Often games end with a delicate combination of hardware behavior in the form of traditional code and a slightly more responsive behavior in the form of a large set of rules. Everywhere around us, our perception of learning and intelligence is challenged daily with the advent of new and emerging technologies. From self-driving cars, go games and Chess to computers capable of defeating people in classic Atari games, the emergence of a group of technologies we colloquially call “Machine learning” has come to dominate a new era of technological growth - a new era of growth that has been matched with the same meaning as the discovery of electricity, and has already been categorized as the next technological age of man. Machine learning is the realization of artificial intelligence. It is a way for a computer to assimilate data or state and provide a learned solution or response. Now we often think of AI as a broader term that reflects a “smart” system.

510-517 371
Abstract

The duty of a citizen, as you know, is considered to serve in the army, but it does not end only with it. A citizen is obliged to report violations of the law and to adhere to the rules and laws of the country. We are talking about the broad responsibilities of the citizen, which form the society, civil society. Kazakhstan as a developing country requires the improvement of civil society, increasing the responsibility of each citizen to raise the importance of the laws of the country. To do this, there are many tools and institutions that require large investments, and they have many flaws. The application can also help spend fewer resources and to modernize civil society effectively. Compared to traditional applications with simple algorithms, a machine learning application has more advantages, it helps to recognize the violation of the law without an intermediary such as human and is more effective in data processing and further analysis. In this article, we presented a new approach to the education of citizens with minimal expenditure of resources of the country, effective encouragement of users of the program “PhotoFact” and punishment of violators of the laws. The application “PhotoFact” registers several types of violation of the rules of Parking SDA RK, and only the smartphone of the user who downloaded this application is needed. An important role is played by the network of users of this application and their civil liability. The model “Faster R-CNN Inception v 2” is used for recognition of transport, road signs, transport number, location features. This model facilitates the recognition of objects due to the large database and the speed of recognition.

518-524 386
Abstract

The prevalence of obesity among children has increased last years, and there are many reasons causes for this tendency. We examined the parents by survey to determine the reasons of obesity at the age of less than 5 years. We did survey data analysis based on parents ’ answers to our survey andfound some factors to cause obesity of children. As the standards of weight and height of children, we considered Weight-for-Height Standards of World Health Organization.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6688 (Print)
ISSN 2959-8109 (Online)