{"title":"Road traffic demand estimation and traffic signal control","authors":"D. Kurmankhojayev, Gulnur Tolebi, N. S. Dairbekov","doi":"10.1145/3330431.3330433","DOIUrl":"https://doi.org/10.1145/3330431.3330433","url":null,"abstract":"A transport network is a complex non-stationary open environment with multiple heterogeneous stochastic agents such as intersection controllers and road users. Changes in such a network may occur due to random demand fluctuations, supply degradation, or actions of agents. Thus, it makes the task of adaptive Traffic Light Control (TLC) extremely challenging. This paper is our attempt to analyze the complexity of TLC on a single isolated intersection by considering it from the perspective of supervised learning. We explicitly split the problem into two parts: demand estimation and traffic light control itself. For each task we train offline a model (Neural Network) on synthesized data. Our experiments show that even Shallow Neural Network (SNN) models can estimate and control traffic well on a single intersection. The only bottleneck of this method resides in the process of data generation and annotation - the number of simulations needed for data generation polynomially grows with the increase of number of intersections. This might prevent the current approach from being applied to transport networks with multiple intersections.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116480186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sharipbay, Zhanat Saukhanova, G. Shakhmetova, N. Saukhanov
{"title":"Application of finite automata in cryptography","authors":"A. Sharipbay, Zhanat Saukhanova, G. Shakhmetova, N. Saukhanov","doi":"10.1145/3330431.3330452","DOIUrl":"https://doi.org/10.1145/3330431.3330452","url":null,"abstract":"The article describes important concepts of symmetric and asymmetric cryptosystems. The advantages and disadvantages of the finite-automaton model of cryptosystems are studied. The technologies of applying the finite automaton model in information encryption are analyzed.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122245237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ontology based model for user profile building using social network","authors":"R. Niyazova, A. Aktayeva, L. Davletkireeva","doi":"10.1145/3330431.3330453","DOIUrl":"https://doi.org/10.1145/3330431.3330453","url":null,"abstract":"The structure and basic principles of technology for increasing the probability of identifying subjects of information processes of open Internet resources based on ontology methods are considered. Based on this ontology the knowledge base intended for creation of the program systems supporting ensuring information security has been realized. The developed ontological knowledge base has been used when developing the software complex intended for identification of the user of social networks when ensuring information security, monitoring and preventing threats.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132230616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shadi A. Aljawarneh, V. Radhakrishna, Aravind Cheruvu
{"title":"Nirnayam","authors":"Shadi A. Aljawarneh, V. Radhakrishna, Aravind Cheruvu","doi":"10.1145/3330431.3330458","DOIUrl":"https://doi.org/10.1145/3330431.3330458","url":null,"abstract":"Classification is a supervised learning process which requires the decision labels available for learning process. Decision classifier is a rule based approach for classification. This paper proposes a new approach for classification by proposing a new approach to build the decision tree. The construction of decision tree is based on the principle of distance computation instead of finding Gini index or Information Gain of split attributes. The distance function is the normalized Lp-norm distance function with p=2. The fundamental idea for obtaining decision tree is based on determining the class based probability vectors. The distance is computed for probability vectors computed for attributes and root node of the decision tree. The minimal distance attribute is chosen as the best choice and the dataset records are split based on the choice made. A working example that demonstrates the proposed approach for building decision tree is discussed for understanding the classification process.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117317225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Maltseva, O. Makhnytkina, Natalia E. Shilkina, A. Soshnev, E. Evseev
{"title":"A multilevel index model of labor market dysfunction","authors":"A. Maltseva, O. Makhnytkina, Natalia E. Shilkina, A. Soshnev, E. Evseev","doi":"10.1145/3330431.3330448","DOIUrl":"https://doi.org/10.1145/3330431.3330448","url":null,"abstract":"Index modeling is useful for evaluation of complex objects such as social institute of labor market. This institute associates different levels of the society: demographic, professional, financial and other. Formal approach to the labor market functioning assessment can be done through the calculating of system of indexes - index of possibilities, index of demanded competencies, index of intentions, and final cumulative index of labor market dysfunction. Using of the cumulative index we can outline the indicators of labor market stability and its dynamics in different regions of the country. Index calculation let us to classify three possible conditions of the labor market: normal functioning, functioning with compensation and crisis functioning. Finally, an original program application for the supporting of the indexes calculation was done.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124940977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Features of the representation of the Kazakh sign language with the use of gestural notation: compiling the dictionary of gestures of the KSL based on the notation of L.S. Dimskis","authors":"S. Kudubayeva, B. Zhussupova, Gulim Aliyeva","doi":"10.1145/3330431.3330440","DOIUrl":"https://doi.org/10.1145/3330431.3330440","url":null,"abstract":"In the article we give the description of the features of the functioning of gestural speech as a specific communicative system. As well we present a brief description of the gestural notations used to record the structure of gestures in writing. The rationale for the choice of gestural notation by L.S. Dimskis in relation to the Kazakh sign language is offered. The dictionary of frequently used gestures of the Kazakh sign language has been compiled using this sign system.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122503244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of the application of the new cryptographic algorithms: applying the cipher algorithm O'zDSt1105:2009 for MS office document encryption","authors":"M. Aripov, Ruhillo H. Alaev","doi":"10.1145/3330431.3330434","DOIUrl":"https://doi.org/10.1145/3330431.3330434","url":null,"abstract":"In countries where national cryptographic data protection algorithms are adopted, there is necessary to use these algorithms for cryptographic data protection. This article discusses the method of applying new cipher algorithms to encrypt Microsoft Office documents. The method of implementing document encryption in Microsoft Word 2016, which allows the protection of information from unauthorized access, is offered on the example of the cipher algorithm O'zDSt1105:2009 and the first hash algorithm O'zDSt1106:2009. This method allows applying the encryption other documents of the Microsoft Office products. A method is proposed to apply new cipher algorithms and hashing algorithms through the design and implementing of the next generation cryptographic provider, which provides an opportunity to improve the relative crypto stability of encrypted Microsoft Office documents using the O'zDSt1105:2009 cipher algorithm and the O'zDSt1106:2009 hashing algorithm.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114441406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Omarbekova, Zhanat Saukhanova, Alma Zakirova, Bayan Abduraimova, Magripa S. Saukhanova
{"title":"KPI estimation for the university faculty","authors":"A. Omarbekova, Zhanat Saukhanova, Alma Zakirova, Bayan Abduraimova, Magripa S. Saukhanova","doi":"10.1145/3330431.3330468","DOIUrl":"https://doi.org/10.1145/3330431.3330468","url":null,"abstract":"In this paper, we describe the formatting guidelines for ACM SIG Proceedings. The article describes the system of calculation of key performance indicators (KPI) of the faculty of the L. N. Gumilyov Eurasian national University. Moreover, the analysis of the faculty members' data including the performance indicators for the 2017-2018 academic year was conducted.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontological model for student's knowledge assessment","authors":"Kaderkeyeva Zulfiya, Bekmanova Gulmira, Sharipbay Altynbek","doi":"10.1145/3330431.3330449","DOIUrl":"https://doi.org/10.1145/3330431.3330449","url":null,"abstract":"This article considers the ontological model for knowledge representation on the example of the discipline \"Database Theory\". Depending on the chosen intelligent system development environment, knowledge must be represented by certain data structures. In this paper, the ontological model is chosen as a model for knowledge representation.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127662930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Radhakrishna, Shadi A. Aljawarneh, P. Kumar, V. Janaki, Aravind Cheruvu
{"title":"Discovery of time profiled temporal patterns","authors":"V. Radhakrishna, Shadi A. Aljawarneh, P. Kumar, V. Janaki, Aravind Cheruvu","doi":"10.1145/3330431.3330459","DOIUrl":"https://doi.org/10.1145/3330431.3330459","url":null,"abstract":"Finding temporal association patterns from temporal dataset is addressed in a wider perspective in the existing literature. Discovering time profiled temporal patterns is addressed in our previous research works which includes proposing new support estimation techniques, similarity measures for computing similarity between temporal patterns. Most measures proposed in our previous research are for Gaussian space. Our previous research proposed z-space dissimilarity measures SRIHASS and KRISHNA SUDARSANA. Following these two measures, there have been no z-space measures that are proposed in literature. This paper proposes a new similarity measure for determining similarity between temporal patterns in z-space.","PeriodicalId":196960,"journal":{"name":"Proceedings of the 5th International Conference on Engineering and MIS","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131708645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}