BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series最新文献

筛选
英文 中文
Efficient reduction of Computed Tomography problems to the developed problem of recovery functions in the form of a finite convolution in the norms of "flexible" Hilbert Sobolev and Sobolev-Radon spaces according to the scheme of the Computational (numerical) diameter 根据计算(数值)直径格式,将计算机断层扫描问题有效地简化为在“柔性”Hilbert Sobolev和Sobolev- radon空间的范数中以有限卷积形式的恢复函数的发展问题
N. Temirgaliyev, Sh. K. Abikenova, Sh.U. Azhgaliyev, Y. Y. Nurmoldin, G.Y. Taugynbayeva, A. Zhubanysheva
{"title":"Efficient reduction of Computed Tomography problems to the developed problem of recovery functions in the form of a finite convolution in the norms of \"flexible\" Hilbert Sobolev and Sobolev-Radon spaces according to the scheme of the Computational (numerical) diameter","authors":"N. Temirgaliyev, Sh. K. Abikenova, Sh.U. Azhgaliyev, Y. Y. Nurmoldin, G.Y. Taugynbayeva, A. Zhubanysheva","doi":"10.32523/2616-7182/bulmathenu.2023/1.3","DOIUrl":"https://doi.org/10.32523/2616-7182/bulmathenu.2023/1.3","url":null,"abstract":"Computed tomography is a vital need to know the structure of the inside of the body from the information obtained from its transillumination without destroying the shell. The format presented here forsolving this massively understandable problem, which can only be theoretical and mathematical with subsequent engineering implementation, is fundamentally expressed in the approximate formula established by the authors in 2019 in approximate formula on a plane with a two-dimensional Cartesian coordinate system. In this article,this breakthrough is brought to a complete surprise in the equivalence of the fundamental problems of Computed Tomography and both widely known and developed in new content continuations of the problems of recovery functions by operators of the form of finite convolution of values approximated at the grid nodes with specially constructed kernels: [supleft{{left|fleft(xright)-sum^N_{k=1}{{left(R^2right)}^{-1}Rfleft({xi }_kright)}Rleft(textrm{Ф}left(y-{xi }_kright)right)(x)right|}_{W^{{left|yright|}^{frac{s-1}{2}}}_2left(S^{s-1}times R^1right)}: fin W^{әlpha left(yright) cdot{left|yright|}^{frac{s-1}{2}}}_2left(S^{s-1}times R^1right)right}әsymp ] [әsymp supleft{{left|f(x)-sum^N_{k=1}{fleft({xi }_kright)}textrm{Ф}(x-{xi }_k)right|}_{L^2left(E_sright)}: fin W^{әlpha left(yright)}_2left(E_sright)right},] As is customary in Mathematics (in other sciences too), any claim for a breakthrough must be demonstratedin results of fundamental importance. In the resulting equivalence, the working part turned out to be in astate of enough for illustrative and, necessary, fundamental conclusions readiness according to the ComputerScience offered by the first author (according to the list) in 1996 and filled in Kazakhstan with far from trivialcontent of the Computational (numerical) diameter (C(N)D). Namely, a wide range of developments in thetheory of C(N)D instantly automatically leads to new theoretical and direct practical applications of advances in Computed Tomography, including analytic expressibility in explicit formulas of the computational aggregates of Tomography in terms of scanned quantities. Among them is also the conclusion that in Computed Tomographythere is no better scanning method than the Radon transform.","PeriodicalId":286555,"journal":{"name":"BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124928167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting and classifying network attacks with Splunk Machine Learning Toolkit 使用Splunk机器学习工具包检测和分类网络攻击
D. Satybaldina, N.K. Bisenbaeva, Y. Seitkulov, A.K. Seksenbaeva
{"title":"Detecting and classifying network attacks with Splunk Machine Learning Toolkit","authors":"D. Satybaldina, N.K. Bisenbaeva, Y. Seitkulov, A.K. Seksenbaeva","doi":"10.32523/2616-7182/bulmathenu.2023/1.2","DOIUrl":"https://doi.org/10.32523/2616-7182/bulmathenu.2023/1.2","url":null,"abstract":"In modern conditions of digital technologies implementation in various sectors of the economy, the digitalization of public administration, healthcare, education, and science, the growth in the number of Internet services and mobile devices the issues of ensuring the security of cellular communication systems are becoming increasingly relevant. It is becoming increasingly difficult to detect multiple and complex cyber security threats as the sources and methods ofcyber-attacks evolve and expand. Classic network attack detection approaches that rely heavily on static matching, such as signature analysis, blacklisting, or regular expression patterns, are limited in flexibility and are ineffective for early anomaly detection and rapid response to information security incidents. To solve this problem, the use of machine learning (ML) algorithms is proposed. ML methods can provide new approaches and higher rates of detection of malicious activity on the network. In this work, the Splunk Enterprise data analysis platform and the Splunk Machine Learning Toolkit for creating, training, testing, and validating a network attack classifier are used. The performance of the proposed model was evaluatedby applying four machine learning algorithms such as a decision tree, a support vector machine, a random forest, and adouble random forest. Experimental results show that all used ML algorithms can be effectively used to detect network attacks, and the double random forest method has the best accuracy in detecting distributed denial-of-service attacks.","PeriodicalId":286555,"journal":{"name":"BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127129948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reletions between partial moduli of smoothness of functions with monotone Fourier coefficients 单调傅立叶系数函数的平滑偏模之间的关系
I. Simonova, B. Simonov
{"title":"Reletions between partial moduli of smoothness of functions with monotone Fourier coefficients","authors":"I. Simonova, B. Simonov","doi":"10.32523/2616-7182/bulmathenu.2023/1.1","DOIUrl":"https://doi.org/10.32523/2616-7182/bulmathenu.2023/1.1","url":null,"abstract":"The problem of estimating the moduli of smoothness of functions from Lqin terms of moduli of smoothness from the broader Lebesgue class Lph as been known for a long time. At the initial stage, in the works of Titchmarsh, Hardy, Littlewood, Nikolsky, the properties of functions from Lipschitz classes were studied and the corresponding embeddings were obtained. For moduli of continuity of functions of one variable P.L. Ulyanov proved an inequality later named after him - \"Ulyanov’s inequality\". The classical Hardy-Littlewood embedding for Lipschitz spaces is a consequence of Ulyanov’s inequality. As V.A. Andrienko showed, Ulyanov’s inequality is exact in the scale of classes Hωp. Further development of this direction is connected with the works of V.A. Andrienko, E.A. Storozhenko, M.K.Potapov, L. Leindler, V.I. Kolyada, P. Oswald, N. Temirgaliev, S.V. Lapin and other mathematicians. Kolyada proved that Ulyanov’s inequality can be strengthened and proved the corresponding \"Kolyada’s inequality\". Kolyada’s inequality is exact in the sense that there exists a function in Lp with any given order of the modulus of continuity for which this estimate cannot be improved for any value of δ .Yu.V. Netrusov, M.L. Goldman and W. Trebelz extended Kolyada’s inequality to the moduli of smoothness of higher orders. Another direction of research was the study of fractional moduli of smoothness in the works of M.K. Potapov, B.V. Simonov, S.Yu. Tikhonov. This made it possible to strengthen the Ulyanov inequality and showed the specificity and special significance of using fractional moduli of smoothness, without which, as it turned out, it was impossible to obtain final results. In this article, we study partial moduli of smoothness of functions of two variables. Inequalities are obtained that extend Kolyada’s inequality to partial moduli of smoothness for functions with monotone Fourier coefficients. Estimates are also obtained for the partial moduli of smoothness of the derivative ofa function with monotone Fourier coefficients in terms of the partial moduli of smoothness of the original function.","PeriodicalId":286555,"journal":{"name":"BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126521066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trees of Dot Products in Thin Subsets of Rd Rd的细子集中的点积树
A. Nadjimzadah
{"title":"Trees of Dot Products in Thin Subsets of Rd","authors":"A. Nadjimzadah","doi":"10.32523/2616-7182/bulmathenu.2022/2.2","DOIUrl":"https://doi.org/10.32523/2616-7182/bulmathenu.2022/2.2","url":null,"abstract":"A. Iosevich and K. Taylor showed that compact subsets of Rd with Hausdorff dimension greater than (d+1)/2 contain trees with gaps in an open interval. Under the same dimensional threshold, we prove the analogous result where distance is replaced by the dot product. We additionally show that the gaps of embedded trees of dot products are prevalentin a set of positive Lebesgue measure, and for Ahlfors-David regular sets, the number of treeswith given gaps agrees with the regular value theorem.","PeriodicalId":286555,"journal":{"name":"BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About one Problematic Moment in Textbooks on Probability Theory 概率论教材中的一个问题
A. Zhubanysheva, G.E. Taugynbayeva, N. Nauryzbayev, N. Temirgaliyev
{"title":"About one Problematic Moment in Textbooks on Probability Theory","authors":"A. Zhubanysheva, G.E. Taugynbayeva, N. Nauryzbayev, N. Temirgaliyev","doi":"10.32523/2616-7182/bulmathenu.2022/3.2","DOIUrl":"https://doi.org/10.32523/2616-7182/bulmathenu.2022/3.2","url":null,"abstract":"In the article is studied, according to our opinion, the problematic moment \"An experiment was performed,the outcome is known. Did the event occur?\" and the associated calculations of the frequencies of the occurrence of thisevent in the context of determining the probability. Namely, theoretical and practical detailed discussions of these topicsare justificated.","PeriodicalId":286555,"journal":{"name":"BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On some properties of quasivarieties generated by specific finite modular lattices 特定有限模格生成的拟变量的一些性质
S. Lutsak, O. Voronina
{"title":"On some properties of quasivarieties generated by specific finite modular lattices","authors":"S. Lutsak, O. Voronina","doi":"10.32523/2616-7182/bulmathenu.2022/3.1","DOIUrl":"https://doi.org/10.32523/2616-7182/bulmathenu.2022/3.1","url":null,"abstract":"A finite algebra A with discrete topology generates a topological quasivarietyconsisting of all topologically closed subalgebras of non-zero direct powers of A endowed withthe product topology. This topological quasivariety is standard if every Boolean topologicalalgebra with the algebraic reduct in Q(A) is profinite. In the article it is constructed the specificfinite modular lattice T that does not satisfy one of Tumanov’s conditions but quasivarietyQ(T) generated by this lattice is not finitely based. We investigate the topological quasivarietygenerated by the lattice T and prove that it is not standard. And we also would like to notethat there is an infinite number of lattices similar to the lattice T.","PeriodicalId":286555,"journal":{"name":"BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115982784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Architecture for enduring knowledge-extraction from online social networks 从在线社交网络中持久提取知识的架构
A. Mussina, S. Aubakirov, P. Trigo
{"title":"Architecture for enduring knowledge-extraction from online social networks","authors":"A. Mussina, S. Aubakirov, P. Trigo","doi":"10.32523/2616-7182/bulmathenu.2022/3.3","DOIUrl":"https://doi.org/10.32523/2616-7182/bulmathenu.2022/3.3","url":null,"abstract":"Nowadays social networks and media play significant role in daily life. All our life in the real world is recorded in the digital space as well. Scientists have enormous potential in researching issues such as social influence ontop news and top news influence on society. Its impact on daily life spans such diverse areas as digital marketing, publicopinion analysis, political monitoring and disaster notification. Any task of processing such a large data stream needs acoherent architecture that will fit the analyzed resource. In the presented work, we set ourselves the task of creating ahighly loaded, fault-tolerant, scalable system for extracting and processing data from various social networks and analyzing data in real time. The solution is architecture in the form of a set of modules. Modules have their own characteristics depending on the work performed, from collecting textual data to direct processing and extraction of knowledge.","PeriodicalId":286555,"journal":{"name":"BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122324551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-precision satellite orbit propagation with estimation of the covariance matrix 基于协方差矩阵估计的高精度卫星轨道传播
A.G. Yessengaliyev, A. Mukanov
{"title":"High-precision satellite orbit propagation with estimation of the covariance matrix","authors":"A.G. Yessengaliyev, A. Mukanov","doi":"10.32523/2616-7182/bulmathenu.2022/4.1","DOIUrl":"https://doi.org/10.32523/2616-7182/bulmathenu.2022/4.1","url":null,"abstract":"In this paper is proposed to use a model of high-precision propagation of the satellite position, in which the disturbing accelerations are determined, and the obtained numerical results are presented. All disturbing forces acting on the satellite are modeled, the up-to-date data of the parameters of the atmospheric drag model, as well as the parameters IERS, EOP are used. The developed software for satellite orbit propagation is applicable to support the flight control of the satellite, while ensuring the accuracy of the level of 10-15 meters along the position vector of the satellite over a weekly time interval. With a given model of satellite motion and known statistical characteristics of orbit determination errors, the covariance matrix is predicted along with the state vector, which has found application in many applied tasks for support of Flight dynamics activities.","PeriodicalId":286555,"journal":{"name":"BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128749018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Numerical calculation of the hydrodynamics of heat carriers, taking into account the dependence ofviscosity on temperature 考虑黏度随温度变化的热载体流体力学数值计算
D.Y. Кurmanova, N.Dzh. Jaichibekov, К.N. Volkov, А.G. Каrpenko
{"title":"Numerical calculation of the hydrodynamics of heat carriers, taking into account the dependence ofviscosity on temperature","authors":"D.Y. Кurmanova, N.Dzh. Jaichibekov, К.N. Volkov, А.G. Каrpenko","doi":"10.32523/2616-7182/bulmathenu.2022/4.2","DOIUrl":"https://doi.org/10.32523/2616-7182/bulmathenu.2022/4.2","url":null,"abstract":"The article is devoted to the study of the hydrodynamics of heat carriers in heat exchangers. Giventhe widespread use of this device, increasing its thermal and hydraulic characteristics has become so important for theirdesigners. In the work, the calculation of non-stationary flows of liquids through the heat exchanger tubes is carried out.Water (\"hot\" coolant) and oil (\"cold\" coolant) are used as heat carriers, between which heat exchange occurs through thesolid surface of the pipeline, which is the boundary between the heat carriers. When calculating the movement of oil, thefact was taken into account that the dynamic viscosity depends very much on temperature and, depending on temperature,the Reynolds numbers also change. And, as a consequence, when flowing through a sufficiently thin channel, the flow regimechanges, namely, the transition from the laminar flow regime to the turbulent one is manifested, while this effect is notobserved with the analytical calculation method for constant viscosity. The Reynolds-averaged Navier-Stokes equations,closed using the turbulence model, were used for numerical modeling of fluid dynamics of heat carriers. Verification of theheat exchanger calculations was carried out in the software package \"Ansys Fluent\".","PeriodicalId":286555,"journal":{"name":"BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124125772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of teaching numbers and the operations of addition and multiplication applied to them in elementary school and the general problems related to them 小学数学教学方法、加法和乘法运算以及与之相关的一般问题
G.E. Taugynbayeva, A. Zhubanysheva, Zh.K. Tabyldiyeva, N. Temirgaliyev
{"title":"Methods of teaching numbers and the operations of addition and multiplication applied to them in elementary school and the general problems related to them","authors":"G.E. Taugynbayeva, A. Zhubanysheva, Zh.K. Tabyldiyeva, N. Temirgaliyev","doi":"10.32523/2616-7182/bulmathenu.2022/1.4","DOIUrl":"https://doi.org/10.32523/2616-7182/bulmathenu.2022/1.4","url":null,"abstract":"What is the methodology of reaching the level of \"mathematical perfection\" in primary school,including the number, arithmetic operations used for them, the multiplication table, the displacement law ofaddition and multiplication operations, what principles should be taken as a basis during the education of thechild and their place in the field of modern science is widely stated.","PeriodicalId":286555,"journal":{"name":"BULLETIN of the L N Gumilyov Eurasian National University MATHEMATICS COMPUTER SCIENCE MECHANICS Series","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133130103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信