A. T. Toleushova, D. M. Uypalakova, A. B. Imansakipova
{"title":"SIGNATURE RECOGNITION ALGORITHMS. BEZIER ALGORITHM","authors":"A. T. Toleushova, D. M. Uypalakova, A. B. Imansakipova","doi":"10.53360/2788-7995-2022-1(5)-7","DOIUrl":"https://doi.org/10.53360/2788-7995-2022-1(5)-7","url":null,"abstract":"This article focuses on improving the human and machine interface, which should ensure efficient processing of data and knowledge in simple, fast and accessible ways. One of the ways to organize it is the introduction of the manuscript (entering text, drawings, drawings, etc.). Handwritten signatures can be considered as handwritten words, but they are more suitable for drawings, because the signer tries to make his signature unique, using not only his first and last names, but also additional graphic elements. Creating a signature is quite simple, although it is impossible to reproduce the recording speed. The signature has long been used to certify the authenticity of documents and verify (authenticate) an individual. In principle, the signature examination is used during the forensic examination. Signature recognition can be carried out by sequential verification of the signature to each known person. The signature recognition methodology includes a verification methodology and processing of verification results. One of the modern areas of interface improvement is the development and research of software for signature recognition and visualization. The advent of modern computer input tools has led to the emergence of a new type of online signature describing the signature creation process, not the result. Moreover, not only the coordinates of points on the line, but also a sequence of vectors of parameter values for each of the values of pressure, direction and speed of movement, the angle of adaptation of the pen and the signature time.","PeriodicalId":191030,"journal":{"name":"Bulletin of Shakarim University. Technical Sciences","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133357939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALYSIS OF MODELS AND PARAMETERS OF SENSORS BASED ON BREGG GRIDS AND THE INFLUENCE OF PHYSICAL PARAMETERS ON THE SPECTRAL CHARACTERISTICS OF GRIDS","authors":"A. Kalizhanova, S. Seidazimov, Z. Zhilkishbayeva","doi":"10.53360/2788-7995-2022-1(5)-3","DOIUrl":"https://doi.org/10.53360/2788-7995-2022-1(5)-3","url":null,"abstract":"The results of the project have a wide practical application in various industries, such as medical institutions and healthcare facilities, large industrial enterprises, in the automotive industry, food, agricultural and livestock industries, as well as in industrial technology, the metallurgical industry; oil and gas industry. In phase interferometric sensors (PID) based on arrays, the optical element itself acts as a sensitive element, which leads to a significant reduction in cost. The OB segment between two gratings is a Fabry-Perot interferometer. Under the influence of deformation and acoustic vibrations, the phase difference of signals from two adjacent Bragg gratings changes. Interferometric sensors are most sensitive to changes in the length of a fiber segment under the influence of external factors. The principle of operation of distributed fiber-optic measuring complexes based on PID in the simplest case (in the case of one PID) is shown in Figure 3.6 and is as follows [4]. Each of the Bragg gratings RB1 and RB2 of the sensor reflects the pulse coming to it from the pulsed laser at the same Bragg wavelength. In this case, the time delay between the reflected pulses is equal to twice the propagation time of light in the sensitive element of the sensor – a fiber enclosed between the gratings. The reflected pulses enter the compensating interferometer (CI), which, in turn, also bifurcates each of them. The delay introduced into the propagation of pulses by the arm 2 of the CI with respect to arm 1 ensures the overlap in time of the pulse reflected from the grating RB1 at the output of arm 2 and the pulse reflected from the grating RB2 at the output of arm 1 and their phase shift by ϕ 0 =π/2.","PeriodicalId":191030,"journal":{"name":"Bulletin of Shakarim University. Technical Sciences","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEVELOPMENT OF A MATHEMATICAL MODEL FOR BUSINESS PROCESS AUTOMATION","authors":"D. M. Taskara, B. Sinchev","doi":"10.53360/2788-7995-2022-1(5)-5","DOIUrl":"https://doi.org/10.53360/2788-7995-2022-1(5)-5","url":null,"abstract":"The article discusses the main elements of creating an ideal mathematical model of the operating procedure of the budget department for IT enterprises. The main technical problems arising in the context of deteriorating business conditions and economic instability are analyzed from the point of view of strategy. The introduction of information technology and the creation of specialized programs and modules are the primary methods for resolving the issues associated with the automation of business processes. By using such systems in various functional divisions, it is possible to reduce the amount of human factor and unneeded paperwork while also making the information gathered at the organization clear, accessible, and organized. Business process management modeling, which is a numerical optimization synthesis of the structure, components, and parameters of a business process, is incredibly important yet is still in its infancy. The cost of an IT project is the primary concern of the developed principles of mathematical modeling of business process management. The baseline data for the generated model, as well as its structure and the findings obtained, can alter dramatically throughout the simulation depending on the nature and peculiarities of each specific project. The research under discussion is aimed at increasing competitiveness in the market and maximizing the overall strategy of the organization. When constructing a mathematical model, the author pays special attention to the methods of mathematical modeling of a business process based on the principles of queuing theory. The created model will allow budget departments of IT companies to evaluate and improve their activities.","PeriodicalId":191030,"journal":{"name":"Bulletin of Shakarim University. Technical Sciences","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133734930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Akhmetov, V. Lakhno, A. Shaikhanova, S. Tolybayev
{"title":"DECISION SUPPORT IN CYBERSECURITY PROBLEMS BASED ON MATRIX OF SIGNS OF CYBERTHREATS","authors":"B. Akhmetov, V. Lakhno, A. Shaikhanova, S. Tolybayev","doi":"10.53360/2788-7995-2020-4-181-186","DOIUrl":"https://doi.org/10.53360/2788-7995-2020-4-181-186","url":null,"abstract":"Due to the globalization of the use of information technologies and systems, the main problem of ensuring their smooth functioning is the cybersecurity of electronic resources and information security from destructive and unauthorized intrusions. Systems for detecting or recognizing various network intrusions, as well as determining the quality of attacks and anomalies, have their own niche in the market.This paper describes a method and algorithms for the formation of a feature space for the base of an intellectualized decision support system in cybersecurity problems. Intellectualized support system for promoting the protection of information about yourself with complex systems. The described algorithms allow you to dynamically replenish the database when new threats appear, which will reduce the time for their analysis, at the same time for cases of difficult-to-explain symptoms and reduce the number of false positives in the system for detecting threats, anomalies and attacks on information objects","PeriodicalId":191030,"journal":{"name":"Bulletin of Shakarim University. Technical Sciences","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114267170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}