Proceedings of the 5th International Conference on Engineering and MIS最新文献

筛选
英文 中文
Road traffic demand estimation and traffic signal control 道路交通需求估计与交通信号控制
Proceedings of the 5th International Conference on Engineering and MIS Pub Date : 2019-06-06 DOI: 10.1145/3330431.3330433
D. Kurmankhojayev, Gulnur Tolebi, N. S. Dairbekov
{"title":"Road traffic demand estimation and traffic signal control","authors":"D. Kurmankhojayev, Gulnur Tolebi, N. S. Dairbekov","doi":"10.1145/3330431.3330433","DOIUrl":"https://doi.org/10.1145/3330431.3330433","url":null,"abstract":"A transport network is a complex non-stationary open environment with multiple heterogeneous stochastic agents such as intersection controllers and road users. Changes in such a network may occur due to random demand fluctuations, supply degradation, or actions of agents. Thus, it makes the task of adaptive Traffic Light Control (TLC) extremely challenging. This paper is our attempt to analyze the complexity of TLC on a single isolated intersection by considering it from the perspective of supervised learning. We explicitly split the problem into two parts: demand estimation and traffic light control itself. For each task we train offline a model (Neural Network) on synthesized data. Our experiments show that even Shallow Neural Network (SNN) models can estimate and control traffic well on a single intersection. The only bottleneck of this method resides in the process of data generation and annotation - the number of simulations needed for data generation polynomially grows with the increase of number of intersections. This might prevent the current approach from being applied to transport networks with multiple intersections.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116480186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of finite automata in cryptography 有限自动机在密码学中的应用
Proceedings of the 5th International Conference on Engineering and MIS Pub Date : 2019-06-06 DOI: 10.1145/3330431.3330452
A. Sharipbay, Zhanat Saukhanova, G. Shakhmetova, N. Saukhanov
{"title":"Application of finite automata in cryptography","authors":"A. Sharipbay, Zhanat Saukhanova, G. Shakhmetova, N. Saukhanov","doi":"10.1145/3330431.3330452","DOIUrl":"https://doi.org/10.1145/3330431.3330452","url":null,"abstract":"The article describes important concepts of symmetric and asymmetric cryptosystems. The advantages and disadvantages of the finite-automaton model of cryptosystems are studied. The technologies of applying the finite automaton model in information encryption are analyzed.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122245237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An ontology based model for user profile building using social network 基于本体的社交网络用户档案构建模型
Proceedings of the 5th International Conference on Engineering and MIS Pub Date : 2019-06-06 DOI: 10.1145/3330431.3330453
R. Niyazova, A. Aktayeva, L. Davletkireeva
{"title":"An ontology based model for user profile building using social network","authors":"R. Niyazova, A. Aktayeva, L. Davletkireeva","doi":"10.1145/3330431.3330453","DOIUrl":"https://doi.org/10.1145/3330431.3330453","url":null,"abstract":"The structure and basic principles of technology for increasing the probability of identifying subjects of information processes of open Internet resources based on ontology methods are considered. Based on this ontology the knowledge base intended for creation of the program systems supporting ensuring information security has been realized. The developed ontological knowledge base has been used when developing the software complex intended for identification of the user of social networks when ensuring information security, monitoring and preventing threats.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132230616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Nirnayam Nirnayam
Proceedings of the 5th International Conference on Engineering and MIS Pub Date : 2019-06-06 DOI: 10.1145/3330431.3330458
Shadi A. Aljawarneh, V. Radhakrishna, Aravind Cheruvu
{"title":"Nirnayam","authors":"Shadi A. Aljawarneh, V. Radhakrishna, Aravind Cheruvu","doi":"10.1145/3330431.3330458","DOIUrl":"https://doi.org/10.1145/3330431.3330458","url":null,"abstract":"Classification is a supervised learning process which requires the decision labels available for learning process. Decision classifier is a rule based approach for classification. This paper proposes a new approach for classification by proposing a new approach to build the decision tree. The construction of decision tree is based on the principle of distance computation instead of finding Gini index or Information Gain of split attributes. The distance function is the normalized Lp-norm distance function with p=2. The fundamental idea for obtaining decision tree is based on determining the class based probability vectors. The distance is computed for probability vectors computed for attributes and root node of the decision tree. The minimal distance attribute is chosen as the best choice and the dataset records are split based on the choice made. A working example that demonstrates the proposed approach for building decision tree is discussed for understanding the classification process.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117317225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A multilevel index model of labor market dysfunction 劳动力市场功能失调的多层次指数模型
Proceedings of the 5th International Conference on Engineering and MIS Pub Date : 2019-06-06 DOI: 10.1145/3330431.3330448
A. Maltseva, O. Makhnytkina, Natalia E. Shilkina, A. Soshnev, E. Evseev
{"title":"A multilevel index model of labor market dysfunction","authors":"A. Maltseva, O. Makhnytkina, Natalia E. Shilkina, A. Soshnev, E. Evseev","doi":"10.1145/3330431.3330448","DOIUrl":"https://doi.org/10.1145/3330431.3330448","url":null,"abstract":"Index modeling is useful for evaluation of complex objects such as social institute of labor market. This institute associates different levels of the society: demographic, professional, financial and other. Formal approach to the labor market functioning assessment can be done through the calculating of system of indexes - index of possibilities, index of demanded competencies, index of intentions, and final cumulative index of labor market dysfunction. Using of the cumulative index we can outline the indicators of labor market stability and its dynamics in different regions of the country. Index calculation let us to classify three possible conditions of the labor market: normal functioning, functioning with compensation and crisis functioning. Finally, an original program application for the supporting of the indexes calculation was done.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124940977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Features of the representation of the Kazakh sign language with the use of gestural notation: compiling the dictionary of gestures of the KSL based on the notation of L.S. Dimskis 哈萨克手语用手势符号表示的特点:根据迪姆斯基的手势符号编纂哈萨克手语手势词典
Proceedings of the 5th International Conference on Engineering and MIS Pub Date : 2019-06-06 DOI: 10.1145/3330431.3330440
S. Kudubayeva, B. Zhussupova, Gulim Aliyeva
{"title":"Features of the representation of the Kazakh sign language with the use of gestural notation: compiling the dictionary of gestures of the KSL based on the notation of L.S. Dimskis","authors":"S. Kudubayeva, B. Zhussupova, Gulim Aliyeva","doi":"10.1145/3330431.3330440","DOIUrl":"https://doi.org/10.1145/3330431.3330440","url":null,"abstract":"In the article we give the description of the features of the functioning of gestural speech as a specific communicative system. As well we present a brief description of the gestural notations used to record the structure of gestures in writing. The rationale for the choice of gestural notation by L.S. Dimskis in relation to the Kazakh sign language is offered. The dictionary of frequently used gestures of the Kazakh sign language has been compiled using this sign system.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122503244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research of the application of the new cryptographic algorithms: applying the cipher algorithm O'zDSt1105:2009 for MS office document encryption 新型加密算法的应用研究:应用O'zDSt1105:2009加密算法对MS office文档进行加密
Proceedings of the 5th International Conference on Engineering and MIS Pub Date : 2019-06-06 DOI: 10.1145/3330431.3330434
M. Aripov, Ruhillo H. Alaev
{"title":"Research of the application of the new cryptographic algorithms: applying the cipher algorithm O'zDSt1105:2009 for MS office document encryption","authors":"M. Aripov, Ruhillo H. Alaev","doi":"10.1145/3330431.3330434","DOIUrl":"https://doi.org/10.1145/3330431.3330434","url":null,"abstract":"In countries where national cryptographic data protection algorithms are adopted, there is necessary to use these algorithms for cryptographic data protection. This article discusses the method of applying new cipher algorithms to encrypt Microsoft Office documents. The method of implementing document encryption in Microsoft Word 2016, which allows the protection of information from unauthorized access, is offered on the example of the cipher algorithm O'zDSt1105:2009 and the first hash algorithm O'zDSt1106:2009. This method allows applying the encryption other documents of the Microsoft Office products. A method is proposed to apply new cipher algorithms and hashing algorithms through the design and implementing of the next generation cryptographic provider, which provides an opportunity to improve the relative crypto stability of encrypted Microsoft Office documents using the O'zDSt1105:2009 cipher algorithm and the O'zDSt1106:2009 hashing algorithm.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114441406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
KPI estimation for the university faculty 大学教员的KPI评估
Proceedings of the 5th International Conference on Engineering and MIS Pub Date : 2019-06-06 DOI: 10.1145/3330431.3330468
A. Omarbekova, Zhanat Saukhanova, Alma Zakirova, Bayan Abduraimova, Magripa S. Saukhanova
{"title":"KPI estimation for the university faculty","authors":"A. Omarbekova, Zhanat Saukhanova, Alma Zakirova, Bayan Abduraimova, Magripa S. Saukhanova","doi":"10.1145/3330431.3330468","DOIUrl":"https://doi.org/10.1145/3330431.3330468","url":null,"abstract":"In this paper, we describe the formatting guidelines for ACM SIG Proceedings. The article describes the system of calculation of key performance indicators (KPI) of the faculty of the L. N. Gumilyov Eurasian national University. Moreover, the analysis of the faculty members' data including the performance indicators for the 2017-2018 academic year was conducted.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontological model for student's knowledge assessment 学生知识评价的本体模型
Proceedings of the 5th International Conference on Engineering and MIS Pub Date : 2019-06-06 DOI: 10.1145/3330431.3330449
Kaderkeyeva Zulfiya, Bekmanova Gulmira, Sharipbay Altynbek
{"title":"Ontological model for student's knowledge assessment","authors":"Kaderkeyeva Zulfiya, Bekmanova Gulmira, Sharipbay Altynbek","doi":"10.1145/3330431.3330449","DOIUrl":"https://doi.org/10.1145/3330431.3330449","url":null,"abstract":"This article considers the ontological model for knowledge representation on the example of the discipline \"Database Theory\". Depending on the chosen intelligent system development environment, knowledge must be represented by certain data structures. In this paper, the ontological model is chosen as a model for knowledge representation.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127662930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Discovery of time profiled temporal patterns 发现时间分布的时间模式
Proceedings of the 5th International Conference on Engineering and MIS Pub Date : 2019-06-06 DOI: 10.1145/3330431.3330459
V. Radhakrishna, Shadi A. Aljawarneh, P. Kumar, V. Janaki, Aravind Cheruvu
{"title":"Discovery of time profiled temporal patterns","authors":"V. Radhakrishna, Shadi A. Aljawarneh, P. Kumar, V. Janaki, Aravind Cheruvu","doi":"10.1145/3330431.3330459","DOIUrl":"https://doi.org/10.1145/3330431.3330459","url":null,"abstract":"Finding temporal association patterns from temporal dataset is addressed in a wider perspective in the existing literature. Discovering time profiled temporal patterns is addressed in our previous research works which includes proposing new support estimation techniques, similarity measures for computing similarity between temporal patterns. Most measures proposed in our previous research are for Gaussian space. Our previous research proposed z-space dissimilarity measures SRIHASS and KRISHNA SUDARSANA. Following these two measures, there have been no z-space measures that are proposed in literature. This paper proposes a new similarity measure for determining similarity between temporal patterns in z-space.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131708645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信