2nd IC ITS&I 2016, May 19-20, Almaty, Kazakhstan

Science and Industry in Kazakhstan Trends and Possibilities

Sandybeck Kunakov

International IT University, and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The main trends of science and technologies are discussed and proposed from the point of view in which information technologies are presented as a strong and obligatory bridge between the academic science and its application in industry

Gas dynamics and global atmospheric It should be noted that in order to create three- phenomena dimensional hydrodynamic mathematical model Three-dimensional turbulent flow of air in the of the sand and salt storms based on the program presence of suspended particles will provide FLOW VISION and GAS DINAMIC TOOLS theoretical estimates of mass removal and should be supplemented by a database of climatic deposition of sand and salt spray from the dried and meteorological regimes of the region. bottom of Aral Sea, to study the direction of The programs for calculating three- transport of sand in the 200-mile zone of the Aral dimensional turbulent flow of air in the presence Sea and to obtain statistically valid direction of of suspended particles will provide theoretical movement of shifting sands in the region. There estimates of mass removal and deposition of sand are two main factors affecting the rate and extent and salt spray from the dried bottom of Aral Sea, of desertification: climate change and land to study the direction of transport of sand in the degradation due to unsustainable economic 200-mile zone of the Aral Sea and to obtain activities. The first factor has an impact on a statistically valid direction of movement of global scale. The changes are relatively slow and, shifting sands in the region. especially, should take the form of zonal There are two main factors affecting the rate (latitudinal) changes in vegetation cover, which and extent of desertification: climate change and can be identified from space. Confirmation or land degradation due to unsustainable economic refutation of hypotheses about climate change is activities. The first factor has an impact on a of undoubted scientific and practical interest. The global scale. The changes are relatively slow and, second factor acts more locally and is manifested especially, should take the form of zonal in two to three years in the form of spots of (latitudinal) changes in vegetation cover, which various sizes. In some cases, as in the desiccation can be identified from space. Confirmation or of the Aral Sea, these spots may take quite a refutation of hypotheses about climate change is large area and be a powerful centers of the of undoubted scientific and practical interest. removal of salt and sand. As the experience of The second factor acts more locally and is previous studies, remote sensing data can greatly manifested in two to three years in the form of simplify the detection and localization of lesions spots of various sizes. In some cases, as in the in the territory of Kazakhstan. desiccation of the Aral Sea, these spots may take Until now, remote sensing data were used for quite a large area and be a powerful centers of the analysis of local areas of desertification. In the removal of salt and sand. As the experience this project the first time in Kazakhstan, an of previous studies, remote sensing data can attempt to explore the real trend of global climate greatly simplify the detection and localization of change and provide evidence-based assessment lesions in the territory of Kazakhstan. As part of of its impact on the ecosystem of the Aral Sea this project is provided to develop methods for region. automatic recognition of scenes and settings of The integration of remote sensing data and dust storms in satellite imagery and implement mathematical models will provide new, more operational transfer (integration) interpretation accurate and reasonable origin and results in a mathematical model for numerical hydrodynamics of dust storms of the Aral Sea. calculations distance and mass discharged by aerosol. This will significantly clarify the amount

5

2nd IC ITS&I 2016, May 19-20, Almaty, Kazakhstan of salt removal of the Aral Sea in different substrates based on the jet of plasma chemical directions and increase the reliability of these method ratings. The trend aims to evidence-based guidelines The scientific novelty is determined by new for the selection of efficient and cost-effective methods of research, based on the use of satellite solar modules of small capacity for the Republic monitoring data. Until now, remote sensing data of Kazakhstan, on the basis of which it will be were used for the analysis of local areas of possible to create an innovative and energy-self- desertification. In this project the first time in sufficient, environmentally friendly industrial Kazakhstan, an attempt to explore the real trend zone, the creation of a group of national, certified of global climate change and provide evidence- to international standards, experts in the field of based assessment of its impact on the ecosystems solar energy and technical design of low-power of Kazakhstan. solar modulesDevelopment and serial production The integration of remote sensing data and of safe solar modules and solar modules on the mathematical models will provide new, more basis of units of a new class of potential accurate and informed assessment of the amount consumers that previously was not available to of salt, handed down from the dried bottom of solar energy: Aral sea in different directions. • developing countries with poorly developed power grid, poor infrastructure, and / or limited financial resources • remote settlements and industrial enterprises • Use in production processes - desalination, hydrogen production, petrochemicals and others.

IT in nuclear energy production In Kazakhstan and East Kazakhstan region, in particular, has considerable reserves of mineral monazite, which contains about 44 percent of the rare earth elements. It should be noted that the demand for rare metals has increased markedly in recent years due to their widespread use in manufacturing. So, one of the rare earth metals - neodymium - widely used in the manufacture of magnets for environmentally friendly electric motors, which release increased annually. Not inferior position in its increased popularity and cerium, which are made of glass to protect human eyes from ultraviolet radiation, and, in addition, polished glass solar panels. These two elements are also contained in the monazite, rock rare earth elements. In monazite contains another important component in terms of energy resources. It thorium. Many scientists believe that it was with him in the future will involve the future of the energy sector. The reasons for which today thorium assign such an important place - a few. Chief among them is the fact that this is where they see an alternative source of fuel. Thus thorium it has several advantages compared with uranium. If it turns out less production of radioactive waste, and most importantly - it is environmentally safe. IT in solar energetics The main requirements are now imposed on Research of physical and chemical processes nuclear energy - safety and security. The of thin-film silicon solar modules on flexible accident at Chernobyl and Fukushima in Japan, we have witnessed, must not be repeated. Scientists around the world want to create a

6

2nd IC ITS&I 2016, May 19-20, Almaty, Kazakhstan reactor that would guarantee security. That meets systems should be fully automated and their the requirements of liquid-salt reactor. It does not triggering should not dependent on the judgment explode like an ordinary nuclear reactor, so the of hesitant or panicked operators. In order for likelihood of accidents is minimal. Molten salt this to happen, operators must have full fuel cools rapidly in the air and radioactive confidence in the reliability of these systems. materials retained therein. Therefore they must be well maintained and It is important to take into account the fact completely reliable, which requires multiple that the thorium fuel cycle is formed of backup sensors. plutonium, which is used in the manufacture of In order to make sure that cooling can not be nuclear weapons. This is very important, given lost, a “last resort” backup system should have the widespread limitation of strategic weapons. been provided, which does not depend on the In this recycle plutonium in the need for the availability of any interruptible energy source above reasons, which decreased at times, it is (electricity, steam, etc.) and does not contain any currently problematic. Out of this situation is moving parts. Such uninterruptible energy possible thanks to the possibility of using source is gravity. Therefore, cooling water tanks plutonium in the course of work of the thorium should be placed on top of the reactor buildings. reactor. An additional advantage is the fact that These tanks should be sized to remove all the the world's thorium reserves will last for heat that is released during a normal reactor shut hundreds, even thousands of years. down. If faster heat removal is needed, the However, this trend in the energy sector is not cooling rate can be increased by air new. Developments thorium program started pressurization of the water tanks and if increased back in the 50s of the last century. But as the cooling capacity is needed, the tanks can be so technology of uranium in those years have been designed that they can be conveniently refilled used throughout, thorium development felt by water cannons, fire engines or helicopters. hopeless, and interest in them quickly Prior to activating the above described “last extinguished. Now the modern conditions of life resort” backup system, first a diesel generators have put forward a number of requirements, should be automatically started and if they fail, which forced scientists to search for alternative the system should be automatically switched to sources of energy. No wonder they say that all battery backup that is sized large enough to new - it is well forgotten old. Many see only supply all electricity needed during the shut acceptable in every way - a return to thorium down. energy. In case of pressure buildup, neither hydrogen, This step can be decisive and crucial for nor steam should be allowed to be released into Kazakhstan. Development of thorium nuclear the atmosphere. Therefore, fully enclosed energy is the best direction for the development external condensers should be provided outside of nuclear technology in our country. Currently, the reactor building. If regular power is nuclear reactor thorium molten salt is being unavailable, the coolant for these external developed in collaboration with the East condensers should come from the gravity flow Kazakhstan State Technical University and the system on the roof. National Nuclear Center of Kazakhstan as a Kazakhstan has a low population density and peaceful and safe nuclear energy. limited the possibility of large investments, the Automation Could Have Prevented the construction of nuclear power plants of high Nuclear Accident in Chernobyl and Japan power can be not so reasonable. And it is Listed below are specific design and control reasonable considering the desire of our country errors, which if corrected, could have prevented have greater independence from external the Fukushima accident: resources, both material and intellectual. As to automation errors, the lack reliable Energy production technology of HTGR sensors were obvious. It is hard to believe that (High Temperature Gaseous Reactor) the fourth level sensors were not provided in the reactors, generation reactor has a number of advantages, suppression chambers, storage ponds and namely: therefore the operators did not know if fuel rods • reliability of the workflow, were uncovered and to what extent. It is also •economical consumption of energy inconsistent with present automation practices resources, that means were not provided for wireless remote • flexibility in the use of energy resources, monitoring of plant conditions. • receiving a combination of high-temperature Another major error was the lack of heat and electricity. automation. In future designs all safety shutdown

7

2nd IC ITS&I 2016, May 19-20, Almaty, Kazakhstan

•Creation of efficient low-power nuclear increased savings of neutrons in the reactor power plants and their integration into the MMC compared with the fuel cycle, using 235U and (modular-multi-core, ie, the "modular 239Pu. Thorium cycle more energy intensive multizone"). than the cycle 238U/239Pu. In this case, the HTGR reactors possess important advantages lifetime of the reactor HTGR fourth generation in terms of resistance to corrosion. In the reactor with thorium fuel produced meager amounts of core HTGR not all construction materials have a plutonium and other transuranic elements that weak neutron absorption and resistance to high create the greatest difficulty in the SNF temperatures. This part of the research is the traditional uranium reactors. basis of this project. HTGR advantage - high operating temperature and, consequently, high Conclusion thermal efficiency Fundamentally important Currently, regardless of the level of aspect of the strategy flexible approach to development and society, the problem in consumption of raw materials is the possibility of providing low-cost, clean source of electricity using thorium. How much and what proportions still exists everywhere, so the attention of the and how this change in operating characteristics scientific community continually focused on HGTR - this is the second objective of the solving this problem - it's energy sources. present project. As is well known world reserves Scientific and specialized direction of IT in of thorium, uranium reserves are far superior. science and industry is it’s aplication in nuclear Humanity can expect to use up to 1 million tons and hydrogen energy, without a doubt, the of thorium. The high thermal conductivity of proposed study area is attractive not only in thorium oxide (10% higher than the thermal terms of economy and ecology, but also in the conductivity of uranium oxide) can improve the development of this research area in Kazakhstan heat transfer process in the reactor, as well as an . Arguments in favor of maximizing the use of additional benefit in terms of safety in the event thorium in nuclear reactors are well known, some of problems in the cooling system of the reactor. of which are their safety and no pollution. Accumulating in thorium isotope 233U provides

Наука и промышленность в Казахстане Тренды и возможности

Сандыбек Кунаков

Международный Университет Информационных Технологий, Кафедра компьютерной инженерии и телекоммуникаций, 34 «А»/8 «А» ул.Манаса./Жандосова, Алматы 050040, Казахстан

Основные направления науки и технологий предлагаются с точки зрения представления информационных технологии в качестве сильного и обязательного звена между академической наукой и ее применение в промышленности.

Қазақстандағы ғылым мен өндірістің мүмкіндіктері мен тренді

Сандыбек Кунаков

Халықаралық Ақпараттық ТехнологияларУниверситеті, Компьютерлік инженерия және телекоммуникация кафедрасы, 34 «А»/8 «А» Манаск./Жандос к., Алматы 050040, Қазақстан

Осы мақалада ғылым мен технологияның негізгі бағыттары академиялық ғылым мен оның өндірістегі қолданысы көзқарасы тұрғысы сипатталған.

Optimizing the data access based on indexes A. Amriyeva International IT University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty050040, Kazakhstan

8

2nd IC ITS&I 2016, May 19-20, Almaty, Kazakhstan

Modern databases allow to solve a wide range of tasks such as collection, processing and storage of large data arrays. The increase in volumes of processed information eventually leads to performance problems. To resolve these problems, we use the mechanisms of query optimization based on the index.Oracle includes many new indexing algorithms that dramatically increase the speed with which Oracle queries are serviced. Indexes are usedto solve this problems. Effeсtive indexеs are one of the bеst wаys to imprоveperfоrmаnce in a database application.

1. General simple indexes are located and in the lower level A database index is a data structure that there secondary indexes are located. improves the speed of data retrieval operations A hashtable is oneof the mostusedindex on a database table at the cost of additional structures. As theindexis commonly usedrow writes and storage space to maintain the index identifierthat appliesthe hashfunction. A data structure. Indexes are used to quickly locate hashtableis widely useddue to the factthat it data without having to search every row in a reduces the numberof diskoperations, andensures database table every time a database table is data security.If you maintain the accessed. Indexes can be created using one or optimumnumber of blocks in the hash table, it more columns of a database table, providing the may reduce to one the number of disk operations basis for both rapid random lookups and efficient when you search data, if you add or delete to access of ordered records[1]. Without an index, two. the SQL Server engine is like a reader trying to A significant drawback ofhash tablesis if you find a word in a book by examining each page. do notmaintainoptimal number ofblocks,the By using the index at the back of a book, a reader addedinformationwillfill overflowunits,and the can complete the task in a much shorter time. In number ofdisk operationswillincrease in database terms, a table scan happens when there proportionto the number ofblockoverflows. B- is no index available to help a query. SQL Server trees. Thisdata structurehas recently examines every row in the table to satisfy the becomeincreasingly common. query results. Table scans are sometimes The main features ofB-trees: unavoidable, but on large tables, scans have a -supportindexinglevels; terrific impact on performance. - efficient management ofthe size ofthe The indexcontains records, which consist freeareaswithout the use ofoverflowblocksthat from keyvaluesand addresses oflogical record, are used inall the aboveindexstructures. containinga keyvalue. The file containing Advantages ofB-trees: thelogical recordsis a data file, and the -The number ofdisk operationswhenthe filecontaining theindex records is called- elementorganizationis not more than logtn, indexfile. The valuesin the index filein order where n-the height ofthe tree, t - the number of ofthe indexfield thatis usually builtonthe basis of elementsin the nodetree. Ifit is possible oneattribute(sometimesmore). The amount of tostoreroot nodein memory, the number of disk memoryoccupied by theindex filemuch smaller operationsis reducedby one. thanthe volume occupied bythe data file. B-tree is a self-regulatedand Consequently, itreduces the number ofdisk input- efficientstructure, whichis constantly output operations and reducesresponse time tothe maintainedby a balanceof verticesandordering user's query. If the access to the data from [2]. indexed columns would be frequent. At the design stage it is necessary to take In the majority of cases the following index- some important decisions about what and how to structures are used for indexation in the index, and what kind of method of optimizing database:simple indexes; secondary indexes; should we use. In addition, at the design stage it hash table and B-trees. is important to formulate the indexing rules. If Simpleindexes couldbe thick (the index generating scripts for creating database use we corresponds to onerow of the table), sparse(the CASE-resources, there is a chance, that it will index corresponds to a groupof lines) andmulti- generate alimitedprimary andunique keysfor dimensional (indexcorresponds to oneor more allunique identifiers, as well as the otherindices). usualindicesfor allforeign keys, whichwill bein Secondaryindexesare costlyfor disk space. We itsrepository. use secondaryindexes with simpleindexto reduce thecost of memory, thereby forming amulti- 2. Indexing rules dimensionalindex wherein the upper levelthere For each project you need to create rules of creatingindexesfor Oracletables and formalize it

9

2nd IC ITS&I 2016, May 19-20, Almaty, Kazakhstan in written form. If there are no such rules, then blocks. Unfortunately, despite the fact thatwe theproject couldresult inthe creation ofan usea leadingportion ofthe compositeindex, the arbitrary set ofindicesthatwill be optimalfor some base sequence willmatch the wholekey. As a applicationsand processes, andless optimal result,it can be expectedthat the searchoperation forothers. Moreover, theprograms for whichthese will beless effectivethan usingone columnindex. indexesare optimizedcannot be includedinthe The index alsowill be longer, which increases the number ofcriticalsystem performanceas a whole. scanvolume. However, these factorsdo not 3. How doesthe index work? significantlyinfluence andjustifythe creation ofan In order tounderstand the work principles index onENAME,if you already ofthe index, consider the following simpleSQL- haveandneedindexfor ENAME, INITIAL. query: 4)There isa composite indexformultiple columns butENAMEcolumnis not the firstof them. This index is notused, so a full table scanis performed(like in section 1). 5) There is ahashkey for Picture 1 – Simple SQL query theENAMEcolumn(the table is in The way in whichthis theENAMEcolumnfora hashcluster). queryselectsdatadepends onwhether the column SMITHapplieshashingalgorithmandthis ENAME in the table EMPLOYEES is indexed or encrypted valueis used to read theclustereddata not, as well ason whatversion ofOracleit is and block. If the algorithmis goodand the size ofthe what type of optimizermode is used. Here are clusteris set up correctly, this unit mustcontainthe somepossible options. search string. Otherwise, we should read one or 1)The table is notindexed .Oraclereads moreconnectedblocksbeforeour datawill be everyblock of datafrom the EMPLOYEES table foundorit is found that there is no employeeswith and searches on each lineof each surname SMITH. In anycase, we haveto searchin blockSMITHrecord. Thismethod is known asa allthe encodedvaluesrelatedblocks, whichmay be full table scan, andit usesmoreprocessor cycles several. than that many people offered[3]. One of the 6)ENAMEis the key of indexcluster. The index knowndisadvantages of Oraclecostoptimizeris is usedin much thesame manner asin step thatwhen comparing thevaluesitdoes not assignan 2,exceptthat it eitherdoes not containanyelement appropriateproportion to this parameter CPU forSMITH,orwill containone such element. If usage, and therefore it is too interested in a full there is some item,itpoints to the firstblock ofthe table scan. chainlinkedunits, which may bethe desiredline. 2)There isa regularindex for ENAMEcolumn. Withgood qualitydesign anda certain degree Oraclesequentiallyreadsindexlevelstodownwardu ofluck, this chain will consist of onlyone block. ntilit reaches theblock-sheet in 7)Tableclustered, but the ENAME columnis whichSMITHvalueis either present ornot present. neitherclusteredkey, orpart of an other leading If findone or more instances index. The Clusters cannedal most the same asin ofSMITHkey,theseinstancesshould bea section1, except that therows stringidentifierthatallowsthe query processorto ofdirectoryheaderblockclusteris used to find the find thedata blockscontainingthe valueSMITH, block of rows included in theEMPLOYEEStable. andgostraight intotheline. With this information, Each of these linesis testedfor the presence the query processorcan directlyaccess the data. ofSMITHsurname. 3) It isa composite indexformultiple columns, 8)ENAMEcolumnis an objectbitmap-index. the firstof which is theENAME. This case The value SMITH issimilar to that describedin section 2, exceptthat extractedbitmap, which is disclosed in thelist of foran indexedsearchonlythe leadingportion ofthe identifiersof rowsthat match the querycondition. index keyto be used. There is oneattractive Then carried areadingthese linesto fulfill the feature in non-unique indexes of Oracle: request. Ifthe keyvalues are several, the creation identifier of the lines with different keys(for of a bitmapfor eachkey valueis rational,in terms example there are a lot of people who have ofmemory usageand providesa fairlyefficient surname Smith)are stored inthe order they search. However,indexnamesmay needa large appear.This featureprovidesthe following numberofbitmaps, and for most ofthe advantage. If thelinefor the twoSmithsare inthe namesarelikelyto be verysparse. samephysicaldatabaseblock, we turn tohimin So, which one outof the eightaccess methods order.In almost all cases, this leads to minimize should we prefer? It all depends on the the number ofdisk headmovementsbetween the circumstances. Fulltable scanis the best

10

2nd IC ITS&I 2016, May 19-20, Almaty, Kazakhstan

solutionfor the casewhen theEMPLOYEEStable number of indexes will require testing and containsfew rowsora large proportion ofour monitoring of your database to see where the employeeshave thesurnameSMITH, although it is best balance lies. Static systems, where databases possiblethatin the second caseworkswellbitmap- are heavily used for reporting, can afford more index. Ifwe have alarge number ofemployeeswith indexes to support the read only queries[4]. A a fairlyuniform distributionof names, then the database with a heavy number of transactions to bestoption is to use hashkey, especially if there modify data will need fewer indexes to allow are nonamesthat occurmore than a higher throughput. Indexes also use disk space. fewtimes.Naturally, forthe names ofemployeesit The exact size will depend on the number of is hardly possible. Suppose that, not always the records in the table as well as the number and queryis executed with comparison for equality(as size of the columns in the index. Generally this is in our example), and we have toissue requests, not a major concern as disk space is easy to trade for example, like this: for better performance. Finally, despite some disadvantages of indexes, nowadays it is a very useful tool to optimize your SQL queries. Determining of the correct indexes to use in a database, requires Picture 2 – SQL Query with using “like” function careful analysis, benchmarking, and testing. The rules of thumb presented in this article are In this case,we probablywould choosethe index general guidelines. After applying these which has a structurelike Btree, ora full table principals you need to retest your specific scan. Asthe desired expressionwill be reducedto application in your specific environment of the"S%",a fulltable scanwill look hardware, memory, and concurrent activity. moreacceptable. Proper indexes are crucial for good performance Why not to indexevery columnin the table, by in large databases. Sometimes you can make up whichyou can search? If there are multipleunique for a poorly written query with a good index, but indexes, which can be used, then the optimizer it can be hard to make up for poor indexing with according to the rulesdoes not havean even the best queries. acceptablealgorithm of choice one of them. The cost optimizer has suchan algorithm, butin 5. References versions prior to Oracle 7.3only evaluatedthe [1]https://en.wikipedia.org/wiki/Database_index selectivity ofthe index, rather thanthe value ofthe [2].Automatic Performance Diagnostics 11g key. Release 2 [3].Microsoft SQL Server 2014 Query Tuning & 4. Index Drawbacks Optimization1st Edition Indexes are a performance drag when the time [4].Oracle Database 11g Release 2 Performance comes to modify records. Any time a query Tuning Tips & Techniques (Oracle Press)1st modifies the data in a table the indexes on the data must change also. Achieving the right

Оптимизация доступа к данным на основе индексов

Амриева А.

Международный Университет Информационных Технологий, Кафедра иинформационных Систем, 34 «А»/8 «А» ул.Манаса./Жандосова, Алматы 050040, Казахстан

Современные базы данных позволяют решать широкий круг задач, таких как сбор, обработку и хранение больших массивов данных. Увеличение объемов обрабатываемой информации в конечном счете, приводит к проблемам с производительностью. Для решения этих проблем, мы используем механизмы оптимизации запросов на основе индекса. Oracle включает в себя множество новых алгоритмов индексации, которые значительно увеличивают скорость, с которой запросы Oracle обрабатываются. Индексы используются для решения данной проблемы. Эффективные алгоритмы индексов являются одним из лучших способов для улучшения производительности базы данных.

11

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Индекстернегізіндедеректергеқолжеткізудi оңтайландыру

Амриева А.

Халықаралық АқпараттықТехнологияларУниверситеті, Ақпараттық жүйелер кафедрасы, 34 «А»/8 «А» Манаск./Жандос к., Алматы050040, Қазақстан

Қазіргізаманғыдеректербазасыкеңауқымдымәселелерді шешугемүмкіндікбереді, мысалы, үлкендеректербазасынжинау, өңдеужәнесақтаусияқты мәселелер. Өңделетінақпараттың көлемінұлғайту, соңында өнімділік проблемаларына әкеледі. Осы проблемаларды шешу үшін біз сауалдарды оңтайландыру механизмін жақсарту ушін индекстерді пайдаланамыз. Oracle көптеген жаңа индекстеу алгоритмдерін қамтиды олар айтарлықтай сұраулардың жылдамдығын арттырады. Индекстер осы проблеманы шешу үшін пайдаланылады. Индекстердің тиімді алгоритмдері деректер базасының өнімділігін жақсарту үшін үздік әдістердің бірі болып табылады.

Lightning Detection Network for Kazakhstan and its possible application for Electric Power Industry

A. Inchin, A. Lozbin, Yu. Shpadi, P. Inchin, M. Shpadi, G. Ayazbayev, R. Bykayev, L. Mailibayeva

Institute of Space Techniques and Technologies 34,Kislovodskaya Str., Almaty 050063, Kazakhstan

In this paper the major aims and results of the project of Lightning Detection Network creation for Kazakhstan is given. The main steps of the project development including hardware, and math algorithms are shown.Also, the lightning data main usersand its features is given.

1. General The proposed project of the creation of the In the frame of grant financing of the scientific Kazakhstan system of thunderstorm detection for the research on in 2015-2017the project "To Develop North Tien-Shan region will provide detailed Electromagnetic System for lightning detection and information on thunderstorm activity and, in general, atmosphere-lithosphere coupling research" was the electromagnetic situation in the low frequency found. The project was start in March, 2015 and range in mountain seismic regions of Kazakhstan, should be done to the end of 2017. and subsequently in the entire Republic. Nowadays, most of the leading countries in the The proposed project have great economic world have their own thunderstorm detection impact on national economy. Data on thunderstorm systems which are included in the global networks activity is necessary for meteorological services, or stand-alone [1-4]. Such systems are not only prevention of natural disasters, disaster risk practically significant for the national economy as reduction, monitoring of drought and floods, food part of the weather forecast, but also have a great security, agriculture, energy security, hydropower scientific interest related to the study of atmospheric and stability of power systems for industrial oil, gas electricity and atmosphere-lithosphere coupling. and mining industries, aviation to ensure safety of Currently, there are separate thunderstorm flights. detection devices in Kazakhstan, however, one such device allowstodetect thunderstorms up to tens 2. The Network features kilometers, but it cannot cover the entire mountain The project purpose isto create a system of region of Northern Tien-Shan. Also, one unit is not electromagnetic measurements for lightning enough to accurately determine the direction of the detection and atmosphere-lithosphere coupling arrival of thunderstorm front, and the force of impact research consisting of a network of electromagnetic of each flash. Thus, to solve these problems it is sensors and the complex for data processing and necessary to develop a network of thunderstorm transfer to the end user. detectors. The main tasks of the project:

12

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

 to develop a network of electromagnetic the figure 2 and 3, the assembling process for sensors with a VLF range of measurements, electric and magnetic field antennas respectively is located at a distance of hundreds of kilometers shown. away from each other;  to develop algorithms for lightning and other natural and man-made sources identification and signals processing;  to develop software for data processing and

end user access to this information;  to study spatial and temporal distribution of thunderstorm activity in the North Tien-Shan region. Planned network will include:  8 workstation with 100-300 km distance between them;  central and reserve servers; Figure 2 - Electricantennas assembling process  website;  all necessary methods and techniques.

2.1. Detectors positions

On the Figure 1 the map of planned stations positions is presented. Stations positions can be changed on the installation stage. The necessary conditions for the detectors installation is an accessto the Internet, electricity, security and electromagnetic cleanliness. Electromagnetic Figure 3 - Magnetic antennas assembling process cleanliness means that there is no any electric 2.3 Time of arrival method devices like electric motors and other equipment The main technique for lightning detection in this with huge electromagnetic noises is not allowed. project is a Time of Arrival (TOA) method based on

time of incoming VLF EM signal difference from several detectors. Let the . N≥3- points on the Earth's surface (stations), and - latitude and longitude of the i-station. Points on the Earth surface are free, but know and stable for each measuring time This task was solve. For finding of 3 variable values: latitude, longitude and time of lightning we have a set of equations N (as a Figure 1 - Map of planned stations positions quantity of stations):

2.2. The equipment , (1) In the 2015 the technical specificationfor the equipment for lightning detection network was done. Here, the , Technical documentation was done for: Where R - Earth's radius ,c - speed of light.  Magnetic field antennas; e For the solve this system we should have 3 equations  Electric field antenna; - as a number of unknown values. Because of system  Controller board; nonlinearity the number of solves can be not a  GPS receiver with GPS antenna; single. If the stations quantity will be too much and  Internet connection technology in locations. because of the uncertainty in measuring, the system From the beginning of 2016,accordingly with this can be inconsistent. In this case, for approximate specification,the devices assembling was started. On

13

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan system solving we can use nonnegative definite functional:

, (2)

In solving practice the time moment is excluding from system to compose system of difference all kind of equations couples. As result, we get a system of equations:

, (3)

Figure 4 - Test station on the "Orbita" base Where, , i=1,2,...,N-1; j=i+1, i+2,...,N The deviation of this stroke given by lightningmaps.org [6] is 3.6 km.

The equations quantity is . 4. Network application for electric power systems As known, electric power systems are of the high For approximate system solving we used other dependence from the weather.Also, the lightning discharges make problems for electric power nonnegative definite functional in spherical infrastructure. For example, United States lost a coordinate system : $1 billion every year due to electric power turning

off and half of this because of lightning.

(4)

where, , .

On the assumption of the certain measurements of the geometrical and physical values the functional minimum will be zero. If the zero is not reached, then for the approximate solving we take a point

. Here, functional have a global minimum. As far coordinate was found, time moment is determine as:

(5)

3.First results

The first experimental equipment was installed at the Figure 5 - The magnetic signal from lightning discharge "Orbita" base, near the Big Almaty Lake. On the (waveform and spectrogram) figure 4 the some pictures from that place are presented. At this moment, in Kazakhstan we have only 40- First results of station working in the frame of years old map of lightning distribution as a quantity Blitzortung.org [5] system were received. As we can of lightning hours in year (Figure 6). But, this see on the figure 5, the "Orbita" station is working information is not sufficient for full power security. properly and here is the example of real registered Furthermore, the climate is change and old data need magnetic signal from lightning discharge near to be renew. theShardara reservoir (South Kazakhstan). Taking to account these factors, there was a double-sided workshop in Astana in 2015 between Institute of space Techniques and Technologies (ISTT) and Kazakhstan Company for Power Electric System Management (KEGOC JSC). The

14

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

ISTTpresented the capabilities of the feature discharges, blue line is a 220 kW power electric line Network and KEGOC expressed a view concerning and green - 110 kW. The yellow and green dot's it's data application for electric power system security. a substations. So, as you can see this front can After that, noncommercial agreement concerning happened to possible looses because of lightning. scientific collaboration in this field was signed.

5. Conclusion Therefore, the first stage of the project concerning technical projects, test equipment is done. According to timetable, from the beginning of 2016, the hardware assembling was started. The connection with users as KazHydroMet, KEGOC and scientific institutes was established.

6. References [1] Abarca, S.F., K.L. Corbosiero and T.J. Galarneau Jr.: An evaluation of the Worldwide Figure 6 - Map of average lightning distribution in Lightning LocationNetwork (WWLLN) using the Kazakhstan National Lightning Detection Network (NLDN) as

ground truth, J.Geophys. Res., 2010, 115 On the figure 7 just one of the example of the real (D18206,doi:10.1029/2009JD013411). storm. [2] Betz, H.‐D.,K.Schmidt and W.P. Oettinger: LINET—An internationalVLF/LF lightning detection network in Europe, in Lightning: Principles,Instruments and Applications (H.‐D. Betz, U. Schumann, and P. Laroche, eds). Dordrecht, NL: Springer‐Verlag, 2008. [3] Biagi, C.J., K.L. Cummins, K.E. Kehoe and E.P. Krider: NLDN performance in Southern Arizona, Texas and Oklahoma in 2003–2004,J. Geophys. Res., 112, D05208, 2007. DOI: 1029/2006JD007341. [4] Cummins, K.L. and M.J. Murphy: An Overview of Lightning Locating Systems: History, Figure 7 - Lightning in West Kazakhstan 15.09.2015 Techniques, and Data Uses, With an In‐Depth Look The front was on 15.09.2015 under 220 kW and at the U.S. NLDN, IEEE Trans. OnEMC, 2009, 110 kW power lines in the West Kazakhstan. The 51(3): 499‐518. yellow signs shows the place of the lightning [5] www.blitzortung.org [6] www.lightningmaps.org

Казахстанская система грозопеленгации и ее возможное применение для целей обеспечения безопасности электрических сетей

А.С. Инчин, А.Ю. Лозбин, Ю.Р. Шпади, П.А. Инчин, М.Ю. Шпади, Г.М. Аязбаев, Р.Ж. Быкаев, Л.И. Майлибаева

Институт космической техники и технологии, Республика Казахстан, 050063, г.Алматы, ул.Кисловодская, 34

В статье рассматриваются основные задачи и результаты про проекту "Создать систему электромагнитных измерений для грозопеленгации и исследования атмосферно-литосферных связей". Рассматриваются основные этапы создания сети измерений, включая разработку оборудования, программного обеспечения и математических алгоритмов. Также, дана информация по основным потребителям информации о грозовой активности.

15

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Қазақстандық найзағай пеленгілеужүйесі және оны электржелілерініңқа уіпсіздігін қамтамасыз етмақсатындақолдану мүмкіндіктері

А.С. Инчин, А.Ю. Лозбин, Ю.Р. Шпади, П.А. Инчин, М.Ю. Шпади, Г.М. Аязбаев, Р.Ж. Быкаев, Л.И. Майлибаева

Ғарыштық техника және технологиялар институты, Қазақстан Республикасы, 050063, Алматы қаласы, Кисловодская көшесі, 34

Мақалада «атмосфералық-литосфералық байланыстар дызерттеу және найзағай пеленгілеуүшін электромагниттік өлшемдер жүйесінқұру» жобасы бойынша негізгі міндеттер мен нәтижелер қарастырылады. Жабдықтарды, бағдарламалық жабдықтамаларды және матиматикалық алгоритмдерді әзірлеумен қоса, өлшемдер желісінқұрудың негізгі кезеңдері қарастырылады. Сондайақ, найзағай белсенділігі туралы ақпараттардың негізгі тұтынушылары жөнінде ақпарат берілген.

Synthetic model based on different resolution three-dimensional images of core samples

A. Abdenbayeva1, G.V. Reshetova1, A.P. Dmitriyeva1, T.S. Khachkova2, V.V. Lisitsa2

1Kazakh-British Technical University, Department of Higher Mathematics and Cybernetics, Tole bi St. 59, 050000, Almaty city Republic of Kazakhstan 2Trofimuk Institute of Petroleum Geology and Geophysics of Siberian Branch of Russian Academy of Sciences, Koptug ave. 3, 630090, Novosibirsk, Russia

Microtomographic 3D representations of reservoir rocks allow to recover the microstructure of the core sample. Computer generated rocks are used to determine the properties of the studied reservoir. However, in view of the technical limitations, the size of images does not exceed 10003voxels. Extensively increased level of detail leads to reduction in the size of the test sample, which as a result may be less than the representative data. Thus, there is a problem of choosing the optimal scale for studying the physical properties of the existing sample and its subsequent reference to predict the macroscopic characteristics of the reservoir. It should be taken into account that changing the resolution has different effect on the various geometric and physical characteristics. Therefore, different image sizes have to be used for accurate reconstruction. In this paper we will look at four 3D representations of sandstone sample, obtained with different resolutions. We build the corresponding synthetic models of the pore space to circumvent the restrictions on the 3D image.

1. Introduction methods. Thirdly, not all experiments are physically Modern methods of seismic data processing implemented, such as evaluating only shearing enable image acquisition of the object with high deformation. Therefore, application of numerical detalization. Scattered wave-field component modeling to rock properties is becoming more processing extracts sub-seismic objects such as popular. crack and cranny in the rock. Furthermore, there are Two main factors take place: up-to-date techniques of computing wave seismic • wide usage of high-performance computing data for obtaining impedance preserving seismic systems true-amplitude imaging [1]. • improving equipment of X-ray tomography: Physical properties of core sample are usually nowadays high resolution X-ray microtomography laboratory measured by direct computation of provide images of 0.5 microns per voxel and physical fields (mechanical, acoustic, electric, etc.) medical X-ray tomography with a resolution of under certain external conditions (constant pressure, >mm on per voxel [2]. temperature, fluid saturation, etc.). Such experiments X-ray tomography provides two-dimensional lead to the number of disadvantages. First of all, cross-sections of three-dimensional micro-CT preparation and conduction extremely time images of different samples. These are grey scale consuming and complex. For instance, water images where the pore space is shown dark [3]. saturation of the shale can take several months. Images were segmented into two phases: pore and Secondly, some experiments involve destructive mineral facies [4]. After image processing the 3D

16

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

representation is built (digital model of the sample on rectangular grid sells with step size equal to the resolution of image). Detailed 3D representations of the pore structure of reservoir rocks are used to derive physical fields and its analysis. In this paper, the method of the truncated Gaussian field is used for describing statistical model of samples from outcrops of Bessemer.

2. Image processing 2.1. Imaging techniques X-ray computer tomography – a modern non- a destructive method of studying rocks by acquiring high-resolution images of pore geometries. Three- dimensional images are reconstructed from a large number radiographs, i.e. projections of the imaged object, obtained at different projection angles. The result of the reconstruction is a grayscale image, where the brightness is proportional to the CT- number of the material within the object [5]. Edge effects and high frequency noises come as a disadvantage of CT. Therefore, the pre-segmentation processing is required step in obtaining digital model of sample. Pre-segmentation processing of the b images involves removing noise and edge effects [6]. 2.2. Image segmentation The next important step is segmentation of the image, which is performed based on a determination of mineral content of geological samples. During this step we divide the image into several mineral facies and pore space, which can also be regarded as a facies. As a result we obtain digital model of rock sample for conducting numerical experiments. In our studies, non-local means filter is used to filter high frequency noises [7]. Unlike "local c mean" filters, non-local means filtering takes a mean Fig.1.Image processing a) original image, b) of all pixels in the image, weighted by not individual filtration using non-local means filter, c) pixels, but the entire blocks. This allows us segmentation using Otsu’s algorithm effectively denoise the image without affecting contrast of the boundaries. Image segmentation is 3. Statistical analysis of core samples. Modelling conducted using Otsu’s algorithm [8]. This is one of of discrete random fields. the global thresholding techniques, which provides Nontrivial spatial distribution of pores and reasonable results [9]. Otsu’s algorithm is based on skeleton, which describes the internal structure of minimization of an interclass dispersion, which is the core, requires the use of a statistical approach to defined as the weigh total of dispersions of two build the correct model of studied rock. Construction classes: background voxels and the main image. of the synthetic realizations of random fields Fig.1 illustrates results of filtration and segmentation indicator with the same statistical properties as the steps. original sample allows to estimate the effective properties of a real environment by averaging in the field with arbitrary dimensions and specify its’ intervals. We use truncated Gaussian distribution method proposed in [10] to build statistical model of realizations of random fields indicator. As a result of segmentation structure of mutual distribution of

17

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

pores and a rigid matrix is completely determined by 4. 3D image analysis the function J(x). Function is determined by One of the main goals of this study is to define appropriate level of truncation Y0 and auxiliary random field Y(x) as written in Eq.(1): ì ì 1, if Y(x) > Yo J(x) = ì (1) ì 0, otherwise The input parameters for modeling of random field J are mathematical expectation and centerless indicator function of covariance as given by Eq.(2): a b mJ = E{J(x)}; KJ (h) = E{J(x) J(x+h)}(2) Fig.4. Examples of 2D cross-sections of original (a) and model(b) samples.

Estimation of KJ is obtained by windowing method designed in [11]. Centerless indicator function of covariance calculated in X, Y and Z directions shown in Fig.2 In the considered case, function J(x) takes the value one if the point x is located in the skeleton and zero if it is located in the pore space. It can be seen from a b Fig.2 that all three curves practically coincide. Fig.5. Examples of pore spaces of original (a) and model (b) samples. representative volume for describing properties of

sample. The paper [13] introduced the concept of a statistically representative volume (SREV). The sample is statistically representative, if the standard deviation of current property is less than 10% of its average value derived for all implementations.

Fig.2. Function of covariance calculated in X, Y and Z directions

Therefore, sample can be considered statistically isotropic. Simulation methods of auxiliary continuous Gaussian random field Y described in [12]. Comparison of covariance functions KJ h Fig.3. Function of covariance , obtained obtained by statistical analysis of the original core by statistical analysis of the original core samples and the results of statistical model shown in samples (solid line) and the results of statistical Fig.3. model (dashed line). From Fig.4 and Fig.5 it can be seen that truncated Gaussian distribution method provides acceptably reasonable description of pore distribution by size, To study initial representative images of rock but generates smooth boundaries of the pore space. samples and statistically generated ones there were several experiments conducted on different image sizes.

18

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

A B C D Fig. 6. 2D images with different resolutions (number of voxels): A - 24 microns, B - 5.58 microns, C - 3.43 microns, and D - 0.9 microns. Black color - pores, white/blue color – skeleton.

Fig. 7. 3D image decomposition for statistical analysis. We consider four images obtained at different of the skeleton-pore space and porosity for samples resolutions, ranging from 24 microns voxel size and B and C we construct set of synthetic samples B1 ending at 0.9 microns voxel size. Physical size of and C1 respectively. Each of them includes a group each sample is proportional to the resolution. (Fig.6) of images with the size of 403, 803, 1653, 3003 and The primary interest is image of samples B and C 5003 with 30 images in each group. with resolutions voxel size of 5.58 microns and 3.44 microns, respectively. Image size is 5003 voxels. For 5. Summary conducting statistical analysis and determination of We provide inquiry of four microtomographic representative volume these images can be studied 3D representations of samples from outcrops of as sub-sets of the smaller images. (Fig.7) Therefore, Bessemer obtained at different resolutions. For evaluation of physical and geometrical parameters studying physical properties of the sandstone sample were performed for sets of 24 sample size of 403 optimal scale is 3 microns. Resolution of 3-5 voxels, 24 sample size of 803 voxels, 27 samples of microns voxel size provides sufficiently detailed size 1653 voxels and 1 full sample size of 5003 images for evaluating a relative distribution of voxels. skeleton and pore space. Full sample size of 5003 Dimensions of sample A with resolution 24 voxels is representative for estimating the porosity. microns are 100x100x500 voxels is insufficient for Truncated Gaussian distribution method is used to further segmentation and statistical analysis. build a statistical model and provides acceptably Dimensions of sample D with resolution 0.98 reasonable description of pore distribution by size, microns - 5003 voxels, which is formally sufficient but generates smooth boundaries of a pore space. for further division and statistical analysis. But the physical size of the image is less than 0.5 mm, 6. References which is not representative even for the evaluation [1] M.P. Kutovenko, M.I. Protasov, D.M. the relative distribution of the skeleton and the pore Vishnevskiy, Gaussian beams based true-amplitude space. Therefore, for samples A and D imaging: multi-component surface data (2010). measurements of physical properties and geometry [2] Madonna C., Quintal B., Frehner M., Almqvist of the pore space are not considered. According to B.S.G., Tisato N., Pistone M., Marone F. and the correlation functions of the relative distribution Saenger E.H., Synchrotron-based X-ray

19

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

tomographic microscopy for rock physics [7] Buades A., Coll B. and Morel J.-M., A non-local investigations (2013). algorithm for image denoising (2005). [3] Martin J. Blunt, Branko Bijeljic, Hu Dong, [8] Otsu N., Thresholds selection method form grey- Oussama Gharbi, Stefan Iglauer, Peyman level histograms (1979). Mostaghimi, Adriana Paluszny, Christopher [9] Iassonov P., Gebrenegus T. and Tuller M., Pentland, Pore-scale imaging and modeling (2013). Segmentation of X-ray computed tomography [4] Andra H., Digital rock physics benchmarks images of porous materials: A crucial step for (2013). characterization and quantitative analysis of pore structures (2009). [5] Heiko Andra, Nicolas Combaret, Jack Dvorki, [10] Kyriakidis P. C., Deutsch C. V. and Grant M. Erik Glatt, Junehee Han, Matthias Kabel, L., Calculation of the normal scores variogram used Youngseuk Keehm, Fabian Krzikalla, Minhui Lee, for truncated Gaussian lithofacies simulation: Claudio Madonna, Mike Marsh, Tapan Mukerji, theory and FORTRAN code (1999). Erik H. Saenger, Ratnanabha Sain, Nishank Saxena, [11] Li D., Lake L. W., A moving window Sarah Ricker, Andreas Wiegmann, Xin Zhan, semivariance estimator (1994). Digital rock physics benchmarks—Part I: Imaging [12] Sabelfeld K. K., Monte Carlo Methods in and segmentation (2013). Boundary Value Problems (1991). [6] Kaestner A., Lehmann E., and Stampanoni M., [13] Zhang D., Zhang R., Chen S. and Soll W. E., Imaging and image processing in porous media Pore scale study of flow in porous media: Scale research (2008). dependency, REV, and statistical REV (2000).

Построение синтетических моделей на основе трехмерных изображений керна различного расширения

Абденбаева А.Е.1, РешетоваP Г.В.1, Дмитриева А.П.1, Хачкова Т.С.2, Лисица В.В.2

1Казахстанско-Британский технический университет, кафедра Высшей Математики и Кибернетики, ул. Толе би 59, 050000, Алматы, Республика Казахстан 2Институт нефтегазовой геологии и геофизики Сибирского отделения Российской академии наук, проспект Академика Коптюга 3, 630090, Новосибирск, Российская Федерация

Микротомографические трёхмерные изображения образцов горных пород позволяют моделирование тонкой структуры керна. На основе восстановленной модели можно описать свойства изучаемого резервуара. Однако технические ограничения накладывают ограничения на размеры таких изображений, т.е они не превосходят 1000 вокселей в каждом направлении. В статье рассматриваются четыре трёхмерных изображения образца песчаника различного разрешения, и на их основе строятся синтетические модели порового пространства для избежания ограничений на размер трехмерного изображения.

Түрлі көлемдегі құм тас үлгісінің үш-өлшемді бейнесі негізінде синтетикалық моделдері құрылуы

Абденбаева А.Е.1, Решетова P Г.В.1, Дмитриева А.П.1, Хачкова Т.С.2, Лисица В.В.2

1Казахстанско-Британский технический университет, кафедра Высшей Математики и Кибернетики, ул. Толе би 59, 050000, Алматы, Республика Казахстан 2Институт нефтегазовой геологии и геофизики Сибирского отделения Российской академии наук, проспект Академика Коптюга 3, 630090, Новосибирск, Российская Федерация

Микротомографиялық үш өлшемді суреттер тау жыныстарының үлгілерін жұқа керн құрылымын модельдеуге мүмкіндік береді. Қалпына келтірілген модель негізінде зерттелетін резервуардың қасиеттерін сипаттауға болады. Алайда, техникалық шектеулер мөлшері осындай суреттердің көлеміне шектеу жасайды, яғни олар әр бағытта 1000 вокселден аспайды. Мақалада түрлі көлемдегі құм тас үлгісінің төрт үш-өлшемді бейнесі қарастырылады, солардың негізінде үш өлшемді суреттердің көлеміне шектеулер болдырмау үшін бу кеңістігінің синтетикалық моделдері құрылады.

20

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Numerical methods ofreflection calculating of terrestrial radio-electronic means radiation from low-orbit satellites of Earth

Ahmedov D.Sh., Eremin D.I., Kemesheva D.G.

Institute of Space Technique and Technology, Laboratory of Space Information Technologies 34, Kislovodskaya Str, AlmatyA01P5P1, Kazakhstan

The article presents numerical methods ofcalculating reflected radiation of terrestrial radio-electronic means fromartificial objects in Earth orbit. It describes 3 stages of receiving and processing of reflected signals, considering the use of basic criteria of optimality, the best method to restore reflected radiation is coherent integration.

1. Introduction –plausibility function (conditional The main task of reflected signal processing is probability to accept function f(t) in presence of reduced to restoration of useful information on desired signals(t); signal distorted in dissemination and processing – prior probability to take function f(t); jointly with interference. Processing and optimum – posterior probability of presence of conditioning of reflected radiation of terrestrial desired signal s(t) in taken fucntion f(t). radio-electronic means from low-orbit satellites of Provided that the main parameter of reflected Earth consists of three stages: detection, recognition signal priori is known, consider the case of a simple and extraction of reflected signals [1]. In the first detection of desired signal on noise background. stage of detection of reflected radiation is necessary Function of reflected light f(t) can have a double to identify whether there is a signaland noise at the origin: input of the receiver or just noise. The step of а) function f(t) is formed by one noise f(t) = ξ(t); recognition of reflected signals is determined a б) function f(t) is mixture of desired signal and signal from a plurality of known signals available at noise, f (t) = s (t) + ξ (t). Then the probability of the receiver input. The complexity of decision complex event f can be written as: problem of signals recognitionis not determined by the properties of the individual signals and noise, but , (3) is the difference of signals in the presence of noise and distortion. The essence of the problem of the third stage signal extraction is necessary on the base Р(0) – prior probability of desired signal absence; of analysis of reflected signal to obtain a signal that – conditional probabilityfin absence ofs. differs least from the direct transmitted signal [2]. Commonformula (2)can be rewritten taking into account (3) as follows: 2. Detection of reflected radiation of terrestrial radio-electronic means from low-orbit satellites , (4) of Earth Optimal receiver reflects circumstance of input function f(t) in the presence of random noise on the Where value – likelihood ratio: presence of useful signal s(t) or that it has some parameters but with certain probabilities [3]. . (5)

f(t) = s(t) + ξ(t). (1) To calculate the posterior probability of presence Likelihoodratioalsodetermines posterior of useful signal s(t) in reflected f(t) is applied probability of desired signal absence probability theory. Posterior probability . (6)

, (2)

– posterior probability of desired signal Restricting by detection task, we must take into (probability before processing); account that the probability of desired signal presence (4) is a monotone likelihood ratio function

21

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

. It is natural to assume that signal s is present, if In sequential observation is continuous analysis the probability is high enough, i.e. sufficiently of likelihood ratio and comparing it with to two close to 1 and that desired signal is not present, if the thresholders probability is low enough.

So the solution has the form , .(7)

Р If likelihood ratio is smaller than the decision is Р that there is only noise. If likelihood ratio is larger

than , the decision is there is a signal. In the case – a threshold value of probability. when the likelihood ratio is between lower level and Consider more complex rule with two upper, available data is not sufficient for a decision thresholders test should be continued. Thisprocedureisrepeateduntildefinitedecisionismade.

Observer advantage is that can set independently Р probabilities and , and it gives a certain signal Р of energy savings in time due to the relatively quick decision on signal absence. However set of serial In analysis of signal antijamming ability signal requires more complicated work of following fidelity criteria are applied [4]: equipment. mediumrisk (Bayesiancriterion), The function of maximum likelihood criterion is totalprobabilityofcorrectreception called distribution density . Optimal is (criterionofoptimumobserver), method of transmitting messages where algorithm is prioriprobabilityofcorrectreception, implemented minimaxcriterionNeyman- Pearson,informationcriterion, . (8) maximumlikelihoodcriterion, andsoon. Consider nature and characteristics of fixed The criterion of maximum likelihood is most optimality criteria which are most often used when prevalent due to the fact that is relatively simple, designing and evaluating performance of radio does not require a large amount of raw data, reflects systems for detection and recognition of signals. most real-world messaging environment, hardware Neyman-Pearson criterion is used to detect a implementation of maximum likelihood algorithm is signal with unknown prior probabilities. According relatively simple, the results of application of these to this criterion optimum receiving device should algorithms are very similar to those obtained using maximize probability of correct detection for a other criteria. given probability of false alarm . The decision about presence or absence of signal is received on 3. Recognition of reflected radiation of the basis of a comparison with certain threshold , terrestrial radio-electronic means from low-orbit which at a given probability of false alarm can be satellites of Earth detected with desired probability of correct The problem of detection of reflected light on detection. noise background is a particular case of the problem The conclusion of Neyman-Pearson criterion is of recognition of two reflected signals. For the that the ability to detect the deterministic signal at purpose of recognition of reflected radiation applied the optimal processing with given probability and the criterion of optimum observer. [5] does not depend on signal form and is The transmitter in time interval [0, ] transmits determined only by the peak signal power ratio to one of mdeterministic signals si(t) with a duration the noise spectral density. with probability . In the propagation of signal s(t) The criterion of optimum observer is used in is subjected to distorting effect of additive noise as a radio systems when known prior probabilities. white Gaussian noise ξ (t). Input fluctuation has According to the criterion of optimum observer following form threshold value is set so that the probability of common errors is minimized and probability of , (9) correct decision has been maximized.

22

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

It is required to define a rule and corresponding кн. (12) structure of recognition which let according to results of processing of reflected signal f(t) to decide During coherent accumulation of signals which of the signals transmitted. throughout the monitoring interval maximum Let us assume that all signals have equal prior efficiency of the coherent accumulation is equal to probability of occurrence pm. The totality of such the number of single signal sequence events is a complete group . (13)

, (10) Indeed, the amplitude of the coherently summed As a result of each experiment on signals signal is increased at this N times and power N2 recognition arises one of M events of Pf(s), which is times. The power of the noise, which midamerica a posteriori and corresponds to the decision that correlation is the result of accumulation is increased signal is transferred si(t). in N times (equivalent to the variance of the sum of In accordance with the criterion of optimum independent variables). Finally, the signal-to-noise observer in recognition of optimum solution Pf(si) power increases in proportion to the number of received in case when prior events are implemented accumulated signals N. P(si) is the most likely provided that there is a set of The signal-to-noise power in the coherent samples being processed to implementation . accumulation result of a sequence of single signals may also be represented by the ratio of the energy of 4. Extraction of reflected radiation of terrestrial the sequence of signal-to-noise spectral density. radio-electronic means from low-orbit satellites of Earth 5. References Better integrated signal processing procedure [1]Ahmedov D. Sh., Eremin D.I., with a view to highlight it on the background of KemeshevaD.G..Haracteristikiobnaruzheniya I uncorrelated noise and clutter is the coherent obrabotkiinformatsiiotrazhennogoizluzheniyanazem integration of signals on the entire time interval of nyhradioelectronnyhsredtstvotnizkoorbitalnyhsputni observation. Coherent integration is a linear signal kovZemli // Materialymezhdunarodnoynauchno- processing operation. Therefore, the criterion of practicheskoykonferentsii «Innovatsionnyeprotsessy efficiency of coherent integration can be as a gain in v Rossiii mire». – RF, Soschi. – 2015. – 17-19 signal-to-noise ratio provided by the store terminal sentyabrya 2015 - S. 143-147. [6]. [2]YereminD.I., KemeshevaD.G. During coherent accumulation of signal perform StudyofPotentialUseofSpacecraftasReflectingObject following operations: s // InternationalConference on Mechanical and  Doppler correction, progression phase signal of Aerospace Engineering (ICMAE-2015) – Indonesia, the repetition period; Bali. – 18 October 2015. – p. 17-19 combination in time a single signal; [3]PhinkelshteinM.I..Osnovyradiolakatsii: coherent accumulation of N signals in a time Uchebnikdlyavuzov. – M.: Radio I svyaz, 1983 interval of observation. [4]IgnatovВ.А. Teoriyainformatsii I The signal-to-noise at power at the output drive peredachisignalov – М.:Sovetskoe radio – 1979 increases in the number of times equal to the [5]IssakovВ.N. effective number of coherently accumulated signal Statisticheskayateriyaradiotehnicheskihsistem [Elektronnyiressurs]. – Rezhimdostupa: http://strts- online.narod.ru/. – Data dostupa 14.08.2015g кн кн. (11) [6]Ohrimenko A.E.Osnovyizvlecheniya, Thus, the efficiency of the coherent accumulation obrabotki I peredachiinformatsii. (V 6 chastyah). – is determined by the effective number of coherently Minsk: MRTI, 2004 accumulated signal

Численные методы расчета отражения излучения наземных радиоэлектронных средств от низкоорбитальных спутников Земли

Ахмедов Д.Ш., Еремин Д.И., Кемешева Д.Г.

Институт космической техники и технологии, Лаборатория космических информационных технологий

23

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

34, ул.Кисловодская, г.Алматы , Казахстан

В статье приводятся численные методы расчета отраженного излучения наземных радиоэлектронных средств от искусственных объектов на околоземной орбите. Описываются 3 этапа приема и обработки отраженных сигналов, рассматриваются особенности использования основных критериев оптимальности, оптимальным методом для восстановления отраженных излучений рассматривается когерентное накопление.

Жерүсті радиоэлектронды құралдардың Жердің төменгі орбиталық спутниктерінен шағылысу сәулеленулерін есептеудің сандық әдістері

Ахмедов Д.Ш., Еремин Д.И., Кемешева Д.Г.

Ғарыштық техника және технологиялар институты, Ғарыштық ақпараттық технологиялар зертханасы 34, Кисловодская к., Алматы қ., Қазақстан

Мақалада жерүсті радиоэлектронды құралдардың Жер маңындағы орбитадағы жасанды нысандардан шағылысу сәулеленулерін есептеудің сандық әдістері келтірілген.Шағылысқан сигналдарды қабылдау және өңдеудің 3 кезеңі сипатталады, оңтайлылықтың негізгі өлшемдерін пайдалану ерекшеліктері қарастырылады, шағылысқан сәулеленулерді қалпына келтіру үшін оңтайлы әдісі -когерентті жинақтау қарастырылған.

On the communication and processing of big financial data with using fast structuring protocols

B. Umurzakov, A. Makhanbetova, O. Ayash, E. Tulbaeva

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

In this work a method of fast communication of large volumes of financial data with using simple binary encoding (SBE) protocol is presented . Comparison with JSON gives result that SBE allows faster to do data processing and transmission.

1. Introduction encoding/decoding messages to/from binary It is well known that XML and JSON can be format. The SBE include compiler that can take considered additionally as a data structuring message schema and then generates stubs for protocols, but recently its applications for transfer encoding and decoding messages. The result of of large volumes of informations are decreased, applying this approach is a codec with ~ 20 because new fast methods and protocols were times greater throughput than protobuf [2]. Also the created, for example, Google’s protocol buffer latency will be very low [2} . (protobuf) [1] and others. The main goal of this work is to develop a 2. Implementations method and an application for communication of 2.1. SBE message schema large volume of financial data and to show that data According to standard for using Simple Binary in graphical format. Major approach for fast Encoding, first of all we need to define a XML transferring of data is simple binary encoding. based schema for the messages. SBE adheres data According to Martin Thompson [2] simple binary types as integers, floating point numbers, characters, encoding (SBE) is a codec, mostly used for arrays, constants, enums, bitsets, composites, processing market financial data. SBE works on 6th grouped structures that repeat, variable length strings layer of OSI model and it devoted to and blobs [3]. SBE is a method of encoding and

24

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

decoding message schemes based on the binary schema is used to produce stubs in programming format. Messages - a unit of information for data language Java. Using of Simple Binary Encoding exchange between systems created via FIX / SBE compiler due to following command [3,4]: protocol and uses an XML format to define the message, title, and other elements [4]. The system java [-Doption=value] -jar sbe.jar SBE message schema: Listing 2 – Compiler of SBE 2.2. Programming with stubs that are declared in the schema. But the whole algorithm is in special libraries of Simple Binary public ForexDataDecoder wrap( int actingBlockLength, final int actingVersion) this.buffer = buffer; this.offset = offset; this.actingVersion = actingVersion; limit(offset + actingBlockLength); return this; } This lines shows that stubs wrap data to buffer Java, using the class DirectBuffer, working with buffers that Byte []. process of messages from buffers which consists of implementation we have generated stub files, and connection with client, when client confirms connection , it takes data from database , encoded by SBE and send to client. For the encoding process, firstly, write the header of message and get data Listing 1 – Simple Binary Encoding from database. Listing 3 describes the encoding message schema process. It is necessary to encode the header first, then process of obtaining data from the database. SBE tool - it is a command line utility that can The stubs wrap the data in a buffer that is be used to create codecs and check posts schemes. provided by the SBE. In addition, the SBE provides The tool is written in Java and can run as an an abstraction for the Java, using DirectBuffer class, executable JAR-file. Driving the message can be put working with buffers that are byte [] [5]. The stubs into SBE tool and compiled to create stubs in wrap buffer offset, and then reads it from the different languages, in our case the Java beginning and consistently. After receiving the data programming language. Compilation of message

25

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

from the database, firstly, it is needed to encode the connected with server using TCP connection, header of message then the body of message. deserialize market data, store them in database and After confirmation, client takes data from buffer, represents data graphically. For connection between decodes financial data and store in database. In client and server libraries as JAVA New I/O, for decoding, the first process is decoding the header of implementation of processes Joda- Time, JDBC message, after that lookup which template can be driver, JavaFX libraries are used. used for decoding process of the message body. The basic process begins with a server that awaits SBE tool is used to decode financial information and confirmation of connections from the client. When a prepared statement object allows passing of input positive response, the server takes the financial data parameters to the SQL statement before sending for from the database, encodes using Simple Binary execution process to the database server. Encoding and sends to the client. The same process After completion of storing data in the database, is operated with JSON. The client that receives a the client provides graphical output of financial data. large amount of information, decodes and stores The output data are presented as a linear graphic. them in the database. In addition, the graphical For the implementation library JavaFX is used. output provides financial data. The results indicated Figure 1. shows a linear graph of financial data. The that the SBE is faster than JSON. X axis presents the time, the Y-axis presents the price at closing. Table 1 – Results of transmission data speed 2.3. Comparative analysis between different servers Nowadays, there is no protocol, which would be Quantity of data SBE JSON a complete analog of Simple Binary Encoding. But 1000 ~10523ms ~16319ms there are exist similar data transmission protocols. For a comparative analysis of the data transmission 10000 ~107224ms ~113125 ms method JSON was chosen. JSON is considered as the most convenient and widely used data exchange format for transmission over the network. 3. Conclusion Methods of application of SBE protocol for transferring of market or stock Exchange financial data was developed. Comparative analysis shows that SBE messages is faster than JSON. SBE transmits 10000 data in 1998ms, JSON in 2412ms. Developed application allows fast communication of large volumes of data.

4. References [1] Google Developers, Protoloc Buffers, Jan.2015. [2] M. Thompson, Mechanical Sympathy, May 2014. [3]M.Thompson,Real-logic/simple-binary encoding,Jan.2014.

Figure 1. - Linear output of financial data [4] Diary of programmer , JSON and Google In this part of the project, client - server protobuf,Nov.2012. application is written. Server side of the application [5] Kenton Varda , Cap'n Proto, FlatBuffers, and gets financial data from database by JDBC API, SBE,Jun.2014. serialize by JSON and transmits it to client. Client is

О передаче и обработке больших объемов финансовой информации с использованием быстрых протоколов структурирования данных

Б. Умурзаков, А Маханбетова, О. Аяш, Е. Тулбаева

Международный Университет Информационных Технологий, Кафедра Компьютерной Инженерии и Телекоммуникации, ул. Манаса / Жандосова 34 «А»/8 «А», Алматы 050040, Казахстан

26

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Представлено описание метода для ускоренной передачи больших объемов финансовой информации с применением протокола simple binary encoding (SBE). Сравнение с протоколом Json показало , что SBE позволяет осуществить более быструю обработку и передачу данных.

Деректерді тез құрылымдайтын хаттамаларды үлкен қаржы деректер көлемін жіберу және өңдеу үшін пайдаланатын әдісі туралы

Б. Умурзаков, А Маханбетова, О. Аяш, Е. Тулбаева

Халықаралық ақпараттық технологиялар университеті, Компьютерлік инженерия және телекоммуникация кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. 05004., Алматы 050040, Қазақстан

Үлкен көлемдiк қаржы ақпараттарын мәліметтер қорына SBE хаттамасын пайдалануымен жеделдетiлген жіберу әдісі сипатталды. Салыстыру нәтижесi, JSONға қарағанда SBE жылдам өңдеу және жеделдету процесiне мүмкіндік береді.

Factors affecting the development strategy B2B segment of e-business in Kazakhstan

Davletova М.Т. 1, Karimzhan Е.B.1, Karimzhan N.B.2

1Almaty Management University, Finance and Management department Rozybakieva ST 227, Almaty, zip 050060, Kazakhstan 2International IT university, Information systems department 34 «А»/8 «А» Manasa St/ Zhandosova St, Almaty, zip 050040, Kazakhstan

Abstract: Electronic commerce in the last decade, are actively developing in all countries of the world. In Kazakhstan, the pace of e-business and e-commerce growth is lower than in Western European countries, due to the complex problems which are the subject of this article. The author's definition of e-business from the perspective of the process approach, the scheme of the formation of the value chain in the B2B segment. The study presents a typology of the following groups of macro factors: economic, political, socio-demographic, technical and technological. Data collection took place through interviews with experts working in the field of e-business in Kazakhstan.

1. Introduction the emergence of a business model of e-business, The ubiquity of the global Internet, the which was introduced in the early 1990s. and based emergence of the information society and contribute on virtual communication between participants in to the digital transformation of the relations of value chains, in itself, an alternative communication production and the improvement of corporate to combine the business processes of virtual and real governance practices, as well as cause the creation format or respectively «online» and «offline» of the legal infrastructure of "electronic" business. It formats. e-business concept involves embodied in became apparent in recent years, significant growth the life of the economic model of pure competition. in the online mode of the sales transactions, Presumably, the architecture of electronic trading marketing planning, advertising, product platforms (ETP) for the type of market structure that development and promotion of services, logistics, meets the following criteria of perfect competition: a outsourcing and many other activities. Internet plurality equivalent of buyers and sellers; uniformity economy as a step in the development of the and standardization of products, the lack of barriers productive forces of society, characterized by an to entry or exit from the market, equal and full increase in the proportion of Internet products and access to information of all participants. services in GDP, the creation of the global Internet space, satisfaction of social and personal needs of 2. E-business as a business model the online products and online services. E-business uses the information provided in One of the key moments of a paradigm shift electronic form, for the production of value-added in the field of business relations can be regarded as products, improve performance and perfect-tence of

27

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan relations between the seller and the consumer [1, p. 3. Electronic business in the Republic of 88]. Transition to the new electronic control Kazakhstan technology value chain and value added - is not only The growth of the Internet economy in technological innovation, but also a fundamental Kazakhstan is due to the influence of several factors change in the management and evaluation of the - legislation, infrastructure, access to the Internet, organization of corporate business processes. Proper training, e-commerce and open data. A number of organization of control "electronic" business allows researchers have noted that in the sphere of the company to achieve a strategic advantage over legislation is necessary to eliminate the practice of the competition, strengthen relationships with rapid passage of legislative initiatives without partners, improve production efficiency, reducing discussion with the expert community, to harmonize costs and optimizing the use of human resources. existing legislation with the support of industry Schematically, the chain formation stoimo¬sti added experts, as well as to develop a long-term strategy of in the "electronic" business is reflected in Figure 1. development of the Russian Internet and its According to the author, "electronic" business is a individual segments. business model in which business processes are Develop Internet access infrastructure in carried out on the basis of the Internet and Kazakhstan is necessary due to the public-private integration aimed at creating customer value to partnership in the field of construction and operation customers through the use of new market of highways and data centers. Also, the state should opportunities. For organizations the advantages of participate in stimulating competition among "electronic" business is a global format scaling providers and simplify the access to electricity and activities; improving supply chains; Business engineering and utilities infrastructure of the city. To transparency; personalization; rapid withdrawal of address the staffing issue in the IT industry is goods on the market; Online sales of services and a necessary to involve the regions and create a decrease in output thresholds on the market and for comfortable environment for Internet specialists in consumers - the widespread use; breadth of choice Kazakhstan, to open specialized technical schools of goods and services; The ability to easily find and and colleges, to encourage teleworking market and choose the better offers; delivery efficiency; introduce tax incentives. There is also an urgent improving living standards; reduction of the "digital" need for some changes in the area of e-commerce. divide [2, p. 117].

Creating Formation of Customer value value added value

Chain Management seller / buyer Dynamic Capabilities Changes in the value Strategic The acquisition of chain and the competitiveness competences distribution of value Customer focus Outsourcing between the parties - expansion Alliance, integration Structural differences in the value added

Fig.1. The chain of value creation and value-added e-business

Among them - the promotion of mobile purchases, business experts was received a number of expansion in the regions, improvement of the characteristics that describe the pattern of behavior delivery services, market incentives online characteristic of e-business party in Kazakhstan. The payments, and others. Stimulate the growth of the proposal to the respondents' assessment of factors of Internet economy can also open the data in a political nature (state legislation regulating Kazakhstan. To do this, they propose to identify relations in the field of online, the activity of priorities for the opening of the data to shape the authorities in the field of Internet regulation, the use market of applications and services based on open of ICT for administrative functions and provision of data, encourage start-ups in this area. According to public services, the state of "open data policy", the results of the authors of the survey study of e- level of penetration of Internet technologies in 28

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan policy regions of Kazakhstan) have the most the market, according to respondents, are the seal of significant effect (Figure 2). state legislation the competitive environment, clustering market. regulating relations in the sphere of «online», the use Among the proposed respondents factors socio- of ICT for management functions and provide public demographic data (education and training of people; services. information literacy; level of professional competence of the personnel, the degree of public 4. Factors affecting e-business confidence in the transactions on the Internet, and Separately, the respondents were isolated on their increase public access to information), the most own factors beneficial effects and risks. The most significant positive effects are: increased public high risk of political regulation of the respondents access to information of various character and cited the Internet and including information sites and electronic trading platforms. The factors of a purpose, including advertising and spam, thanks to political nature, a positive effect on the market, new information and communication technologies. according to respondents, is the legal regulation of Negative impact of the proposed survey to factors electronic commerce, the creation of information were noted by respondents. Risk socio-demographic and statistical resources, active promotion of Internet nature, as defined in the open issues are: low level of resources. information literacy of the population living in Among the factors suggested by the respondents remote villages of megacities. Factors socio- of an economic nature (the dynamics of GDP, demographic nature, a positive effect on e-business, purchasing power of the population, the availability according to the respondents are: the growth of of resources for business in the regions; information literacy of the population as a whole, infrastructure development level of business in mainly due to the residents of cities and young Kazakhstan; competition from other business players people; availability / openness of Internet in Kazakhstan), the most significant impact are: the communications for the residents of Kazakhstan. purchasing power of the population, competition Among the proposed respondents to factors of from by other e-business players, including foreign technical and technological nature (the state of companies. These factors are, in the opinion of information security in Kazakhstan, the number of respondents, favorable for the development of hardware connected to the Internet, integration of character. Factors negative character the respondents information systems of organizations with did not choose in their responses (Fig. 3). information counterparty systems, access When assessing the risks of economic ha¬raktera organizations to services for software development, who independently identified in open questions, the state of technical and technological structure) is respondents were - the relative underdevelopment of the most significant It has a positive impact factor electronic payment systems and logistics, lack of "number of means, podklyuchen¬nyh to the Internet, government investment in the development of e- including mobile devices." Negative impact of the business, the weak development of the economy in proposed survey to factors were noted by Kazakhstan. Economic factors favorably influencing respondents. 0,8 0,7 0,7 0,6 0,5 0,5 0,4 0,4 0,3 0,2 0,1 0,1 0 -0,05 -0,1 Деятельность Использование Состояние Уровень органов власти в ИКТ для "политики проникновения сфере осуществления открытых данных" интернет- регулирования управл.функций и технологий в Интернет предост.госуслуг регионы РК

Fig.2. Evaluation of the impact of political factors on e-business in Kazakhstan

29

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

1,2 1 1 0,8 0,8 0,7 0,6 0,6 0,4 0,4

0,2

0 Динамика показателя Покупательская Доступность ресурсов Уровень развития Конкуренция со ВВП способность населения для ведения бизнеса инфраструктуры стороны других бизнеса игроков электронного бизнеса

Figure 3. Evaluation of the impact of economic factors on e-business in Kazakhstan

Risk of technical and technological nature that demographic data is the lack of internet literacy in self-identified open issues, respondents are: the regions with a growing network access the Internet absence of full coverage of the Internet, a weak and is its active development of the inhabitants of system of information security, the weak cities, and experts say it is a growth factor for e- development of the terminal network in a small business. Key risks of technical and technological business environment. The factor of technical and infrastructure are the problems and the state in the technological nature, a positive effect on the market, field of information security in Kazakhstan. In turn, according to respondents, is "active development of the catalysts of e-business development in Internet technology" [3, p. 44]. Kazakhstan, experts believe the accelerated As a general conclusion on the group of factors development of technologies and techniques in the of a political nature should be noted as a selection of field of information and communication the main risk imperfection of the legislative technologies. framework regulating Internet activity in Kazakhstan. A positive public policy achievement 6. References: was the participation in the creation of sites that [1] PV Trifonov Consumer values as key provide information and transaction services to the preconditions for the formation of a new approach to population, as well as promoting the propaganda of operating the product management strategy // Internet resources, ie State plays the role of an active Transport business. - 2012. - № 6. - S. 88-91. participant in the electronic business, in addition to [2] OV Kozhevina Management of development and the implementation of the regulatory function [4, p. organizational changes in the company's 68]. management system // Bulletin of the University (State University of Management). - 2012. - № 11. - 5. Conclusion S. 117-120. Summarizing assessment of the respondents, it [3] OV Kakimzhanov The dynamics of the growth should be noted that the main risk they believe the segments and "electronic" business in Kazakhstan // existing systemic problems of the economy - a low Effective crisis management. - 2014. - № 3 (84). - S. level of investment income due to high inflation 44-51. prevailing Kazakhstan relations with trading [4] E. Kozlov pay by mobile: the new technologies partners, e-business economic driver in this country in the market of electronic payments // Business is the clustering market, due to the existing Excellence. - 2014. - № 1. - S. 68-70 infrastructure of relations. The leading risk socio-

Факторы, влияющие на стратегию развития сегмента B2B в электронном бизнесе Казахстана

Давлетова М.Т.1, Каримжан Е.Б.1, Каримжан Н.Б.2

1Алматы Менеджмент Университет, кафедра финансов и менеджмента пр. Розыбакиева 227, Алматы, 050060, Казахстан 2Международный университет информационных технологий, каф. ИС 34 «А»/8 «А» ул. Манаса/ ул. Джандосова, Алматы 050040, Казахстан

30

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Аннотация: Электронная торговля в последнее десятилетие активно развивается во всех странах мира. В Казахстане темпы роста электронного бизнеса и электронной коммерции ниже, чем в западноевропейских странах, что обусловлено комплексом проблем, исследованию которых посвящена данная статья. Предложено авторское определение электронного бизнеса с позиции процессного подхода, предложена схема формирования цепочки создания ценности в сегменте В2В. В рамках исследования представлена типология по следующим группам факторов макросреды: экономические, политические, социально- демографические, технико-технологические. Сбор данных происходил посредством проведения интервью среди экспертов, занятых в сфере электронного бизнеса в Казахстане.

Даму стратегиясын әсер ететін факторлар Қазақстандағы электрондық бизнес B2B сегменті

Давлетова М.Т. 1, Каримжан Е.Б.1, Каримжан Н.Б.2

1Алматы Менеджмент университеті, Қаржы және басқару департаменті көш. Розыбакиева 227, Алматы, 050060, Қазақстан 2Халықаралық ақпараттық технологиялар университеті, каф. ИС Манас 34 «А»// Жандосов 8 «А» көш. қиылысы, Алматы 050040, Қазақстан

Аннотация: Соңғы онжылдықта Электрондық коммерция, белсенді әлемнің барлық елдерінде дамып келеді. Қазақстанда е-бизнес және электрондық коммерция өсу қарқыны осы баптың жатады күрделі ақауларға байланысты Батыс Еуропа елдерінде, қарағанда төмен. үдерістік тәсіл тұрғысынан электрондық бизнес авторлық анықтамасы, В2В сегментінде құн тізбегінің қалыптастыру схемасы. экономикалық, саяси, әлеуметтік-демографиялық, техникалық және технологиялық: зерттеу макро факторлардың мынадай топтарға типологиясын ұсынады. Деректер жинау Қазақстандағы электрондық бизнес саласында жұмыс істейтін сарапшылармен сұхбат арқылы өтті.

Prospects and problems of solar energy adoption in Kazakhstan

D. Eryomin1, N. Yagfarova2, A. Zheldirov2

1Kazakh national research technical university after K.I.Satpayev, 2Institute of space technique and technology, 34 Kislovodskaya Str., Almaty 050061, Kazakhstan

This article reflects relevance of renewable energy sources and essence of adoption of this type of energy. Also examines experience of energy use of sun on the example of other countries. As well as examined main prerequisites, prospects and problems of renewable energy sources development in the Republic of Kazakhstan, particularly solar energy.

Current situation in the world According to Association of Russian solar Currently many countries of the world facing energy, at the beginning of 2030, oil consumption the problem of energy saving and increase of worldwide will start to decline and solar energy on energy efficiency. This is a consequence of many contrast shows active leap. It is expected that in the factors, such as exhaustion of natural resources, second half of XXI century sun can be a major environmental pollution, aging and equipment source of energy on Earth. According to one of the deterioration, loss of power in transmission power representatives of the largest manufacturer of solar lines and many other factors. panels in Russia, at the end of 2012 the volume of solar generation will reach 105 GWh and annually Relevance of solar energy use market is growing by 20 percent. It can be assumed The relevance of solar energy use is its resource that by 2020 world can be entered more than 600 intensity i.e. Earth gets more energy from Sun in GW of solar generation. just 9 minutes than humankind produces in a whole Solar energy is an affordable way of providing year. Solar energy is non-polluting source; mankind with necessary energy. However, its therefore the relevance of solar energy is potential at the moment is not enough so that to constantly growing. Solar energy is an important replace all fossil fuels worldwide, according to field of investment in the face of declining oil and calculations is needed: 50 thousand solar power gas reserves [1]. plants at 300 MW, as well as 3.8 million wind 31

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan turbines at 5mW. According to the International Kazakhstan has huge reserves of quartz raw energy Agency by 2050 solar energy can provide materials for the production of silicon metal in turn only 20-25% of mankind needs. its it needed for the production of semiconductor However first significant experience in silicon from which are collected solar battery. The construction of solar power plants was in 2008- presence of rich mineral resource base, well- 2009 so successful that it began to announce new developed metallurgical and chemical industry, projects with huge capacity comparable with high energy capacities of some regions of the capacity of atomic electrical station. The largest country, appropriate scientific and technical energy consumers in the world are: USA — 21%, potential and a certain science in the field of China -16%, India -6%, Russia — 5%. The USA silicon technology creates good opportunities for and China in recent years diligently building up Kazakhstan in organization of silicon industry and “solar-energy” potential about building of giant occupation of appropriate niche in global market of solar power plant stated in India [2]. silicon materials [4]. The realization of optimistic predictions in The importance of alternative energy sources reality is largely due to the level of technological development is also mentioned in monograph of development. At the moment there is a President of the Republic of Kazakhstan Nursultan technological possibility of extracting from Abishevich Nazarbayev "Strategy of radical sunlight only a small part of energy, but even this renewal of global community and partnership of amount is already significant for the European civilizations", published in 2009. This book energy infrastructure where renewable sources, examines prospects of modern energy sources and including solar power is given not less than 20% ways to improve their effectiveness, author calls by 2020 [3]. for the maximum use of opportunities to reduce energy environmental load [6]. Situation in Kazakhstan Figure 2 presents a map of solar radiation in Kazakhstan is located at latitudes between 42 Kazakhstan. and 55 degrees in north in so-called "sun belt" (figure 1) this country has a huge chance to succeed in the field of solar energy. Potential of solar radiation on the territory of the Republic is significant and is 1300-1800 kW per 1m twice a year. Due to continental climate annual sunlight duration is 2200 - 3000 hours a year. Thus, according to "Kazgidromet" number of sunny days is 200 - 250 a year [4].

Figure 2 -Map of solar radiation in Kazakhstan

Problems of the Republic of Kazakhstan transition to alternative energy sources (either solar energy). The main limiting factor in the development of the PV market in Kazakhstan is the limited production capacities of semiconductor silicon and high cost of "solar silicon" - from $40 per kg. [4] Figure 1 – Sunny map of Kazakhstan The main problem for further development and implementation of solar energy projects in In addition to high potential of solar radiation Kazakhstan is the lack of funds and equipment. the Republic has a unique mineral resource base. Foreign manufacturers of solar panels have great For the development of solar power is very experience and good quality of its products important to ensure the mineral resource base of however cost is fairly high in contrast to the rare earth and other types of mining-metallurgical Kazakh counterparts. complex. On the territory of Kazakhstan are A large territory (2.7 mln. sq. km) and low deposits of various elements such as flint, quartz, population of density (5,5 people/sq. km.) are often quartzite, etc. necessary in production of solar cells limiting factor in regions development when many and modules [5]. settlements are located at a considerable distance from major power plants, concentrated mostly near 32

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan coal and gas fields. This leads to considerable loss field of renewable energy. of energy during transport through transmission One of the initiating factors in development of lines. As a result of large reserves presence of alternative energy is also international exhibition traditional energy resources (0.5% of world "EXPO-2017: Future Energy". reserves of fuel, approximately 30 billion tons of For participation in EXPO-2017 the project is conditional fuel) consumers experience power considered "Development of highly efficient solar shortages in remote areas of Kazakhstan [4]. thermal system" implemented by Institute. The object of research and development is process of Ways to solve energy supply on the basis of heliopower station in There are more than 5 thousand villages and a various capacities for households and consumers in large number of farms, wintering cattle without rural areas. The aim of this work is to develop a access to electricity (data from UNESCO of 2009) solar power plant, collecting energy from the sun in Kazakhstan. One of the solution is using of into electricity. alternative energy sources such as SP (solar During work simulation model heliopower power), WPP (wind power plant) or hybrid station was developed in various capacities for systems [5]. households and consumers in rural areas, created Also an important step for the development of an experimental model of heliopower station of solar energy in Kazakhstan was the launch of a low power for this category of consumers. The plant for the production of photovoltaic modules prototype allows reducing costs on electricity LLP "Astana Solar" - a subsidiary of JSC "NAC providing to areas distant from public sources of "Kazatomprom". The plant produces solar batteries supply. on the basis of 100% Kazakhstani silicon. The The novelty of the research is to create production of photovoltaic elements involved in simulation models to determine the optimal the French company on the basis of Kazakhstani configuration of the energy supply system on the silicon. In plans of JSC "NAC "Kazatomprom" to basis of heliopower station of low power under a produce their own photovoltaic elements on the specific point of consumer placement. The system plant LLP "Kazakhstan Solar Silicon" in Ust- uses various algorithms of the battery allowing Kamenogorsk. After that Kazakhstan will complete extending the lifetime of the battery. the production cycle of photovoltaic cells from The introduction of autonomous power supply common quartz to the finished product in the form systems based on renewable energy sources on the of solar panels. The design capacity of the basis of heliopower station of low power in places scheduled photovoltaic plates will be 50 MW with without regular electricity supply will significantly the expansion in the run up to 100 MW. The plant's improve the quality of life of residents of the areas products are focused on the domestic and foreign where will be implemented this project. market [4]. The Republic of Kazakhstan has a high References potential of renewable energy resources, especially [1] Solnechnaya energiya i budushchee wind and sun. To provide legislative support for solnechnoy energetiki. [Online resource] – Access renewable energy and to attract investment on 4 mode URL: http://nacep.ru/novosti- July 2009 President signed and enacted law "On energetiki/alternativnaya-energetika/ solnechnaya- support of using renewable sources of energy" and energiya-i-budushhee-solnechnoj-energetiki.html "On amendments and additions to some legislative [Date : 16.02.2016] acts of the Republic of Kazakhstan on support of [2] Perspektivy razvitiya solnechnoi use of renewable sources of energy." The law energetiki. [Online resource] – Access mode URL: provides state measures on support of renewable http://topsa.kz/index.php/site/poleznye-stati/pro- energy sources in common electricity market of the solnechnuyu-energetiku/[Date: 16.02.2016] Republic, also it has support from the state in [3] Obshchemirovye perspektivy razvitiya construction and connection of renewable energy solnechnoy energetiki. [Online resource] – Access sources to network, transport of electricity mode URL: networks and sale of electricity to regional electric http://pronedra.ru/alternative/2012/09/04/ transport companies and JSC "KEGOC" [7]. solnechnaya-energetika [Date: 16.02.2016] There are huge prospects and unique mineral [4] 4 Tokmoldin S., Razvitie fotoenergetiki i raw material base in Kazakhstan that let to develop energosberegayushchikh tekhnologiy v its own production of solar cells and modules. Kazakhstane [Tekst] /S. Tokmoldin // Element. - Exploration and development in the direction of 2011. - №2. - p. 47-50. alternative energy would definitely be able to bring [5] 5 Bishimbayev V.K., Lepessov К.К., Kazakhstan to a new level of development in the Seitbatkalov S.К., Shingissova P.К., Lepessov S.К. 33

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

//Vyzovy i riski razvitiya solnechno-vodorodny [7] 7 Trofimov G., Aktualnye problemy energetiki v Kazakhstane//Zh. Energetika i energeticheskoy otrasli Respubliki Kazakhstan. toplivnye resursy Kazakhstana, № 11, 2012, p. 47- Online resource/Kolupayev N.V., Zadkovskaya 50 M.D., Morozova N.М. // Zhurnal «Energetika» - [6] 6 Nazarbayev N. А. Strategiya radikalnogo №3(34), august 2010 г. - URL: obnovleniya globalnogo soobshestva i partnerstvo http://www.kazenergy.kz/arhiv/34/6.htm [Date: tsivilizatsiy. - Astana: ТОО АRKO, 2009. - 264 s. 11.02.2016] Bibliograf.: 18 - ISBN 978-601-258009-9, p. 68- 69.

Перспективы и проблемы перехода на солнечную энергетику в Казахстане

Ерёмин Д. 1, Ягфарова Н.2, Желдиров А.2

1Казахский национальный исследовательский технический университет имени К.И.Сатпаева, 2Институт космической техники и технологий, Кисловодская 34, Алматы, Казахстан 050061

В данной статье рассматриваются вопросы актуальности возобновляемых источников энергии и необходимости перехода на данный вид энергетики. Рассматривается опыт использования энергии солнца на примере других стран. Рассмотрены основные предпосылки, перспективы и проблемы развития возобновляемых источников энергии в Республике Казахстан, в частности солнечной энергетики.

Қазақстанда күн энергиясына көшу мәселелері мен перспективалары

Ерёмин Д. 1, Ягфарова Н.2, Желдиров А.2

1К.И. Сәтпаев атындағы Қазақ ұлттық техникалық зерттеу университеті, 2Ғарыштық техника және технологиялар институты, Кисловодская 34, Алматы, Казахстан 050061

Бұл мақалада жаңғыртылатын энергия көздерінің маңыздылығы мен аталған энергетика түріне көшу қажеттілігі мәселелері қарастырылады. Күн энергиясын пайдаланудағы басқа елдердің тәжірибесі қарастырылыпҚазақстанға оңтайлы әдістері ұсынылады.

The analysis of efficiency of wind power plants on the territory of Kazakhstan

D. Eryomin1, N. Yagfarova2, M. Turarbekov2

1Kazakh national research technical university after K.I.Satpayev, 2Institute of space technique and technology, 34 Kislovodskaya Str., Almaty 050061, Kazakhstan

This article reflects the basic concepts of wind energy, as well as the necessary conditions for the development of wind energy. Also examines wind power plants and efficiency of energy conversion of of wind turbine. As well as analised the potential of wind energy of Kazakhstan. Presented the economic aspect of development the wind energy in Kazakhstan.

1 Introduction equipment at power plants, high energy consumption Wind energy as one of the main types of and limited non-renewable energy sources. alternative energy has broad application worldwide. Kazakhstan has an extensive renewable energy Wind energy development in Kazakhstan allows potential, and the use of wind turbines on the finding answers to questions such as: system of territory of the Republic will contribute to the transmission of electrical energy, deterioration of expansion of energy industry of state. [1]. However, 34

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan it is essential to give a definition of wind energy, to Geographical conditions and nature of the earth's determine the conditions for its successful surface have a significant influence to the wind development, to assess wind potential of the country. speed including various natural and artificial obstacles such as hills, etc., as well as trees and 2 Definition of wind energy and the necessary buildings. Therefore wind turbines if possible are conditions for the development of wind energy located on high hills distant from tall trees, houses Wind energy is the power sector, specializing in and other structures places since such obstacles converting kinetic energy of air masses in reduce wind speed and cause turbulence of flow that atmosphere to electrical, mechanical, thermal or any impedes the conversion of wind energy. [3] other form of energy. Having defined main properties and For successful development of wind energy characteristics of wind, it is possible to define the needed so that wind potential of territory satisfies average speed and dependence of wind speed. basic requirements, responsible for the efficiency of 2.2 Average velocity and dependence of wind wind turbines. speed It is necessary to analyze main characteristics and The average annual wind speed describes wind properties of wind to assess wind potential on the potential of territory. This is wind speed which is territory of Kazakhstan, to determine effectiveness defined as arithmetic mean of all observed wind of wind turbines in natural conditions of speeds during a year. Average wind speed can be Kazakhstan. calculated for other periods, e.g. monthly, daily and 2.1 Main properties of wind, wind speed hourly. A basic property of wind is that it is not constant The energy contained in wind is a cubic and varies over time, there are considerable seasonal dependence on wind speed. Doubling wind speed changes of wind streams. In winter months, wind gives an increase in energy by 8 times. Thus, speed is usually above than in summer. The daily average wind speed is 5 m/s can give approximately change of wind speed observed usually near seas 2 times more energy than a wind with average and large lakes. In the morning, sun heats land velocity 4 m/s [4]. However, it is important to note faster than water, so wind blows towards the coast. that wind power unit (WPU) is not fully converting At night, land cools faster than water, therefore wind energy of wind and need to assess effectiveness of blows from the coast. [2] wind turbines. The changing of wind also depends on height, if 2.3 Wind power plant and energy conversion wind is close to the ground it is slowed by friction efficiency of wind turbine on earth's surface. Thus winds are stronger at higher Modern wind turbines are able to convert not altitudes relative to the earth. For agricultural fields above 45% of wind energy reason for low efficiency and deserted territories with increasing height above is preservation of stability of wind turbine. Based on earth's surface is observed twice increase in wind Betz law, it identifies that maximum value of speed by approximately 12%. coefficient of utilization of wind energy (CUWE) is To assess changes of the wind speed at height are  0.59 . various models – Ekman's spiral, logarithmic law, This law can be explained, considering that if all power law. These models allow us to estimate wind energy getting from movement of wind in turbine speed V at height h, if known wind speed V0 at was converted into useful energy, so wind speed afterwards would be zero. But, if wind stopped at the height h0 . As an example we consider power-law exit of turbine so fresh wind cannot get to the variation of wind speed at altitude in this paper [3]: turbine — it will be locked. In order wind continues  h to move through turbine and as a result to get VV 0  (1) energy, you need some movement in wind turbine. h0 Thus there should be a limit of wind turbine Where: efficiency — Betz law [5]. Consequently, considering law of Betz, it can be  - exponent that depends on the type of terrain and concluded that average annual wind speed is main set experimentally. For open terrain or conditions of parameter characterizing wind potential of area. In suburb is considered   0.2 . perspective, application of wind turbines regions This formula will be useful in later sections of the annual average wind speed should be 4 - 6 m/s and article. more. To determine whether natural conditions are required to Kazakhstan requirements of successful

35

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan application of wind turbines, let’s consider analysis 10 3.95-4.95 m/s of wind energy potential of Kazakhstan. 20 4.55-5.68 m/s 3 Analysis of wind energy potential of 30 4.93-6.16 m/s Kazakhstan 40 5.22-6.52 m/s For analysis of wind potential of Kazakhstan it is 50 5.46-6.83 m/s necessary to determine average annual wind speed. 60 5.66-7.08 m/s As main source of data average speed were taken 70 5.85-7.3 m/s data of weather stations provided by website http://atlas.windenergy.kz/. Web version of site was According to the results of table 2 shows that developed by PROON project “Kazakhstan is height of wind turbines for efficient operation should initiative of wind energy market development”. This be above 10 meters, it is also important to pay program was implemented for development of attention to start-up wind speed wind power alternative energy in Kazakhstan and meets goals installation, which needs to be above 3 m/s. Average and objectives of state documents, where use of annual wind speed on territory of Kazakhstan meets renewable energy sources is recognized as a priority: the conditions of future use of wind turbines. “Strategy of industrial-innovative development of Kazakhstan for 2003-2015”, “Concept of 4 Economic aspect of wind energy development Kazakhstan transition to sustainable development for in Kazakhstan 2007-2024”, "Concept of further development of Based on results of average speed on the territory market relations in power industry of the Republic of Kazakhstan, we can conclude that a large part of of Kazakhstan", etc. the territory of a state is effective to use wind Wind map is a map of area with long-term turbines. The cost of electricity from the wind farm distribution of wind speed at a height of 80 meters can be 5-7 cents per kWh, taking into account above earth's surface in accordance with the table of investment component. wind speed (table 1). Wind map for all territory of Thus, potential of using wind energy for electricity Kazakhstan prepared with degree of resolution 9km. production to a greater extent will be determined by For a number of areas of regions of the Republic of balancing capabilities of power system and economy Kazakhstan prepared wind map with a resolution of of electricity production on wind farms. Given 100m. The degree of resolution of wind maps is size overall generation capacity in Kazakhstan is 18,400 of square areas, which determined for one value of MW of wind power stations in limit may be around wind speed. [6]. 3 500 MW with an annual power generation of about Table 1 – Categories of wind speed 8-9 billion kWh. Category Low Average Good High Exceptional Traditionally, many regions of Kazakhstan Values depend on supply of electricity from Central part of of Kazakhstan. Transmission of electricity over long long- term < 6 6 - 7 7 - 8 8 - 9 > 9 distances leads to significant power losses, including speed those due to aging infrastructure. In order to meet wind, growing demand for electricity in regions of country m/s required increase in supply of electricity, which Based on data of weather station was determined would entail significant capital investments to that the average annual wind speed on the territory upgrade and expand generating capacity and of Kazakhstan ranges from 6-7.5 m/s. However, it is infrastructure of electric grids. The use of wind necessary to pay attention to the fact that turbines reduces overall costs of meeting energy calculations of meteorological stations are at an needs by reducing capital investments in altitude of 80 meters above the earth's surface, as infrastructure development of electrical network, wind turbines operate at a height below 80 meters. electricity losses during transportation. [7] Therefore you need to calculate the range of speeds, for different heights using formula (1). The table Conclusion below shows values of average annual wind speed The need for development of wind energy in depending on height (table 2). Kazakhstan is that transmission of electricity over long distances leads to significant power losses, and Table 2 – Meaning of average wind speed supply of electricity in country comes from the depending on height. Central part of Kazakhstan. The territory has Height, m Average wind speed, m/s appropriate conditions for wide use of wind turbines. An important condition for efficient use of wind

36

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan turbines is availability of sufficient average annual resource] – Access mode URL: wind speed on-site terrain (4-6 m/s). http://www.abok.ru/for_spec/articles.php?nid=2662, Based on analysis of data of average annual wind (date 05.04.2016 time 15.03). speed in country, it can be concluded that [4] Vetroenergetika, Rukovodstvo po Kazakhstan has sufficient wind energy potential for primineniyu vetroustanovok maloi i srednei efficient use of wind turbines. The use of wind moshchnosti, InterSolarTsentr, Kargiev V. М., turbines will help to meet consumers located far Martirovos S. N., Moscow 2001, (paper 10). from the Central part of Kazakhstan and to reduce [5] Zakon Betsa, Wikipedia [Online resource] the cost of improvements to electrical equipment. – Access mode URL: https://ru.wikipedia.org/wiki/Закон_Беца, (date References 05.04.2016, time 16.15). [1] Energetika Kazakhstana, Wikipedia [6] Kazakhstanskaya elektroenergeticheskaya [Online resource] – Access mode URL: assotsiatsiya, [Online resource] – Access mode https://ru.wikipedia.org/wiki/Энергетика_Казахста URL: на, (date 01.04.2016 time 11.33). http://www.windenergy.kz/rus/pages/vetroenergetik [2] Vetroenergetika, Rukovodstvo po a.html, (date 06.04.2016, time 09.25). primineniyu vetroustanovok maloi i srednei [7] Perspektivy ispolzovaniya vetroenergetiki moshchnosti, InterSolarTsentr, Kargiev V. М., v Kazakhstane, PROON.GEF «Kazakhstan – Martirovos S. N., Moscow 2001, (page 7). initsiativa razvitiya rynka vetroenergetiki», Doroshin [3] Aerodinamika vysotnykh zdaniy, G.А., Almaty (paper 9-10). Tabunshchikov Yu. А., Shilkin N.V., [Online

Анализ эффективности использования ветроэнергетических установок на территории Казахстана

Ерёмин Д. 1, Ягфарова Н.2, Турарбеков М.2

1Казахский национальный исследовательский технический университет имени К.И.Сатпаева, 2Институт космической техники и технологий, Кисловодская 34, Алматы, Казахстан 050061

В данной статье рассматриваются основные понятие в ветроэнергетике, а также необходимые условия для развития ветроэнергетики. Рассмотрены ветроэнергетические установки и эффективность преобразования энергии ветра ВЭУ. Проведен анализ ветроэнергетического потенциала Казахстана. Представлен экономический аспект развития ветроэнергетики в Казахстане.

Қазақстан аумағында жел энергетикалық қондырғыларын қолдану тиімділігіне талдау

Ерёмин Д. 1, Ягфарова Н.2, Турарбеков М.2

1К.И.Сәтпаев атындағы Қазақ ұлттық техникалық зерттеу университеті, 2Ғарыштық техника және технологиялар институты, Кисловодская 34, Алматы, Казахстан 050061

Бұл мақалада жел энергетикасының негізгі ұғымы, сондай-ақ жел энергетикасын дамыту үшін қажетті жағдайлар қарастырылады. Жел энергетикалық қондырғылары және жел энергиясының ЖЭҚ түрлену тиімділігі қарастырылған. Қазақстанның жел энергетикасы әлеуетіне талдау жүргізілді. Қазақстанда жел энергетикасын дамыту экономикалық аспектісі ұсынылған.

The use of information and communication technologies in education

Dilmagambetova A.S.

International IT University, Department of Information Systems, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

37

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

The article touched on the use of information and communication technologies (ICT) in teaching and learning, which are crucial to the information society. The development of ICT creates an environment which is characterized by rapid and continuous change. In the scopes of such changes is necessary to develop a fundamentally new approach to the educational process. ICTs are a means of access to training and the way to ensure its continuity, it is necessary for a successful involvement of all population groups in the information society. After the analysis of the world experience in the use of ICT in education have been offered advice and the necessary steps to improve the effectiveness of the implementation of ICT in the educational system.

1. Introduction Computer equipment in schools often remains a The use of ICT in education is one of the most dream because the price of this is big, and the important directions of development of the majority of higher educational institutions, despite information society. The educational system is the external declarative uphold innovation, all the developing in a "shock of the future" situation - a forces resisting and widespread implementation of person is born and learns in one world, and he would online learning as zealously as their students, in have to act on their own in another. In these contrast, is rapidly immersed in it. circumstances, the school must form the students' In this connection it is necessary to develop a new skills - the ability to adapt and find yourself in systematic approach to the application of ICT to this world, the ability to independently gather improve the efficiency and quality of the educational information, analyze, synthesize and transmit it to process and its results at all levels of education other people, to learn new technologies. An adequate through ICT and pedagogy integration, which will response to the challenges of our time is the meet all the expectations of modern society, moving implementation of a new model of the learning towards its new stage of development - Global process, based on the independent work of students, knowledge society. the collective form of training, the formation of the necessary skills. A major role in this transformation 2. Role of ICT: the engine and the coordinator can and should play an active application in the for students educational process of information and ICT is both the engine and the coordinator of the communication technologies (ICT) as: growing globalization of education environment. • the study and use of ICT in the educational ICT is the driving force, as the teachers understand process allows students to obtain the skills and that the combination of digital technology and qualifications needed for life and work in modern resources gives more opportunities to expand society; horizons and improve the quality of learning, • ICTs are an effective tool for the teaching and training than any previous educational development of new forms and methods of training, technology from the school board to the TV. Much improving the quality of education; of the teaching and learning is verbal, whether • extensive use of ICT creates conditions for words, numbers, formulas, or image. Digital improving access to education, the transition from learning materials are qualitatively different from education to lifelong learning through life (LLL- traditional study materials for its ability to manage paradigm), which ensures constant adaptation to the them. ICTs are a coordinator, as the Internet - is a conditions of the development of the information unique tool for wide accessible dissemination of society and economy based on knowledge. educational material. As the Internet has also Despite a definite potential of ICT, long standby become a means of interaction, its potential for transition of global, national and regional education teaching and learning has become even more systems to a new level, unfortunately, are often not significant. Most importantly, that the students have met. ICTs have powerful tools for working with text, a tremendous impact on the implementation of ICT numeric and graphic information that forms the basis at all levels of education. School systems understand of the educational environment; combined with to adapt to the digital generation of children and communications technology and the Internet, they university students they must choose online in have created a phenomenal by the opportunities greater numbers than ever. global learning environment. Yet, despite these advantages, the desire to improve the quality of 3. The technological revolution in education education through the introduction of innovation The introduction of ICT in the educational based on the widespread use of ICT is still process should take into account the characteristics unrealized. of each technology. Many uses of ICT in education

38

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

fail or show the results below expectations, as the 5. Conceptualization of curriculum with ICT fundamental features of the technology are lost The curriculum is related to the purpose, the because of the attention focused on the individual content and the organization of education at several devices, rather than the system as a whole. First, the levels of the education. Evaluation system is also technology must take action to meet human needs - seen as an integral part of the curriculum. The in this case in education. Secondly, the technology integration of ICT into the curriculum requires a relies not only on scientific knowledge, but also comprehensive approach, in which all components includes the value of innovative practices, "know- of the curriculum are well matched. For a long time how". Third, the technology includes the organized the introduction of ICT perceived leadership way of implementation of the system to ensure the education just as the introduction of hardware and planned result. This applies to automatic and non- software. More recently, attention has focused on the automatic set of interactions between the machines, results of the use of ICT in the curriculum, student people and the systems for various processes. The activities, at the teacher's role in the implementation last point is the most important. Multiple attempts to of such programs on the methods of assessment of introduce ICT disappointed their initiators, as they learning outcomes with the use of ICT, etc. One of paid insufficient attention to the use of the system, the main problems in the implementation of the people and how they interact. sustainable curriculum change is to create a balance Finally, technology has revamped daily life, from between the curriculum and learning outcomes. the time of the industrial revolution, making the Different stakeholders (governing bodies, agencies most of us use products and services cheaper and in curriculum development and review, inspection, higher quality. New approaches to national equipment manufacturers and software publishers of education informatization policy. These principles textbooks, schools dealers, etc.) responsible for the are also a key to the use of ICT in education, where implementation of ICT in education, should be the aim should be to improve the quality, identified and involved in policy development from effectiveness and accessibility of education for the outset. Plan integration of ICT in education must everyone. In order to realize the potential of new be comprehensive. Investments in equipment and ICT and to define the strategy of informatization of software should be accompanied by investment in education, first of all, we note that the authorities the professional development of teachers, and be share the three objectives for their educational linked to the curriculum and evaluation methods. systems. They seek to expand access to education at This means that the content of training programs and all levels, they want to improve the quality of objectives need to be reviewed, as well as educational outcomes, and thus required to leave examinations of the program. lower costs in order to maximize the value of 6. The key issues and policy problems of the use investments of public funds. of ICT The essence of ICT can be reduced to five 4. ICT to change the curriculum questions for the implementation of ICT Due to the evolution of society is changing the management in the educational environment. concept of learning, as well as the concept 6.1. Why introduce ICT? curriculum. These changes require the development You need to have a clear idea of what goals are of strategies for the introduction of ICT into the pursued through the introduction of ICT in the curriculum of the XXI century, including the use of educational system. For example, training for all ICT as a tool for learning and learning objectives. citizens computer literacy is a common purpose in The use of computers in daily life, as well as various the world. But there are better ways to achieve this forms of digital technology (eg, tablets, goal than the equipment of school systems smartphones, robots) requires researchers, policy- computers. Devoid of purpose simply filling schools makers and experts to rethink the educational with ICT equipment can be a costly distraction from potential of ICT. ICT includes all technologies used the really important goals. for the information processing and the 6.2. In what segments of the educational communication. Understanding ICT is very wide. system implement ICT? Their impact on the curriculum, the pedagogy and The technology should be part of a system to be the student learning should be discussed for the effective. Main existing segments of the education specific ICT applications, the hardware or the system - this is the educational programs and software, which are used in the teaching and the curricula, teacher qualifications, education learning process. management and supporting infrastructure. The

39

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

introduction of ICT in the installed system requires teachers is not enough for changes in education. careful planning of the system. Changing the teachers should be part of the system 6.3. Whether ICT is designed to increase the changes. The integration of ICT into the curriculum profitability of the educational system? is a systemic change. Factors contributing to the Supporters expect the introduction of ICT, they system-wide ICT integration should be included in will change the situation for the better, or by the part of the government reform the educational improving the quality of educational performance, or system. making the system more cost-effective, or due to Analyzing the problem of the use of ICT in both actions. This means that the reflection of ICT in education, should, first of all, to note the process of education reform is a major and independent introduction of ICT in the educational system to problem. ensure educational institutions, schools and 6.4. Whether ICT are intended to improve the universities with computer equipment, cost-effectiveness of the educational system? telecommunications development, global and local This goal will require careful planning the educational networks. replacement of certain activities automated work A new trend of increase of efficiency of ICT with ICT. Without such replacement there will implementation is the integration of information and increase total system costs, the ICT investment will communication technologies and training simply be additional costs. technologies. As the first and necessary steps to 6.5. Is there a strategy for transition to the ICT facilitate the accelerated implementation of this environment? process in the educational system, we can Educational system will be longer than any recommend: computer or network of computing devices. • organization of seminars and training Undoubtedly, suppliers of ICT equipment and courses for the administration and staff of services will try to bring the institution into its universities, teachers, schools and training centers proprietary ICT systems that would cause for use in the training of new ITE; difficulties when changing techniques or supplier. • creation of conditions for stimulating the Senior officials should be aware of this. At that time, development of Internet services related to the use of as the harmonization of choice of suppliers may not new ITE; be the biggest problem, ICT systems are becoming • developing proposals for funding the more and more cooperating, careful planning should implementation of integrated information and include changing strategy of ICT-systems. communication technology in education by the 7. Justification of the use of ICT in education international community; Social justification: the need to train key skills of • development of appropriate systems of ICT, in order to prepare young students to their different level of education learning platforms and place in society and the profession. programs; Professional justification: the importance of ICT • creation of inter-state fund to support joint to provide students with the appropriate skills for projects to develop educational resources for ICT; future jobs. • implementation of multilateral programs in Pedagogical justification: improving education the field of ICT students sharing on mutually through ICTs. agreeable terms; Justification of the information technology • systematic international comparative ICT industry: a promotion of the ICT industry in the field implementation status reports using agreed criteria; of education. • establishment and maintenance of Economic justification: the expectation that ICT information resources for public use, as well as a will reduce spending on education. single information-educational portal. While all of these arguments can be found in the Computerization is an essential component and information of programs in many countries, three prerequisite general education modernization, studies occupy a very prominent place in the updating the content and forms of educational integration of ICTs into the reasoning in the activities, all school structure, management curriculum: social justification, pedagogical education. Without information and implementation justification and, most importantly, ICT in of the necessary reforms to fully implement the vocational education - vocational justification. program of modernization of the educational system 8. Conclusion is not possible. Research on the implementation of the education 9. References reform clearly show that the changing only the [1] Varis T., ICT in vocational education (2011).

40

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

[2] Kinelev V., Kommers P., Koscik B., The use http://emag.iis.ru/arc/infosoc/emag.nsf/BPA/f24ccb0 of ICT in secondary education (2005). 63b93c3bdc3257166004963d1 [3] Bulin-Sokolova E., Verzhbitsky V., The use [4] Yakovlev A., Information and of ICT in education (2004). URL: communication technologies in education (2001). URL: ttp://emag.iis.ru/arc/infosoc/emag.nsf/BPA/bc

Применение информационно-коммуникационных технологий в образовании

Дильмагамбетова А.С.

Международный Университет Информационных Технологий, Кафедра «Информационные системы», 050040 г. Алматы, ул. Манаса/ Жандосова, 34 «А»/8 «А»

В статье затронуты вопросы использования информационных и коммуникационных технологий (ИКТ) в преподавании и обучении, которые имеют огромное значение для информационного общества. Развитие ИКТ порождает среду, для которой характерны стремительные и непрерывные изменения. В условиях таких изменений необходимо разработать принципиально новый подход к процессу образования. ИКТ служат средством доступа к обучению и способом обеспечения его непрерывности, что необходимо для успешного вовлечения всех групп населения в информационное общество. После проведенного анализа мирового опыта использования ИКТ в сфере образования были предложены рекомендации и необходимые шаги для повышения эффективности внедрения ИКТ в систему образования.

Білім беру саласындағы ақпараттық және коммуникациялық технологияларды пайдалану

Дильмагамбетова А.С.

Халықаралық ақпараттық технологиялар университеті, Ақпараттық жүйелер кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. 05004., Алматы 050040, Қазақстан

Мақалада ақпараттық қоғамға аса маңызды болып табылатын оқу және оқытудағы ақпараттық және коммуникациялық технологиялардың (АКТ) қолданылуына тоқталған,. АКТ- ны дамыту жылдам және үздіксіз өзгерумен сипатталатын ортаны тудырады. Осындай өзгерістер нәтижесінде білім беру процесіне жаңа көзқарас дамыту қажет. АКТ оқыту және оның сабақтастығын үздіксіз қамтамасыз ету халықтың барлық топтарын ақпараттық қоғамға табысты тарту жолындағы құрал болып табылады Білім беру саласында ақпараттық-коммуникациялық технологияларды пайдалану деген әлемдік тәжірибені талдаудан кейін, білім беру жүйесіне АКТ енгізу тиімділігін арттыру үшін қажетті қадамдар ұсынылды.

Pan-Tompkins algorithm in electrocardiograph "Komeksy"

Duzbaev Nurzhan, Ayazbayev Dauren

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The article starts with the definition of electrocardiogram and its part – QRS-complex. Authors make overview to algorithms for defining QRS-complex. After that, Pan-Tompkins algorithm was described specifically, which was chosen as algorithm for identifying QRS-complex in system of electrocardiograph “Komekshy”. To evaluate Pan- Tompkins algorithm performance authors use sensitivity, specification indicators. Conclusion of article contains statements about application of Pan-Tompkins algorithm.

1. Introduction In our first article [1], we have reviewed portable electrocardiographs. In Heart works in our bodies under the guidance particular, we have shown the characteristics of of his own pacemaker, which produces electrical electrocardiographs: Medilog AR 12 plus, Medilog impulses and sends them to the conducting system nano, HeartOne, CardioJet and “Komekshy”. [2]. Electrocardiogram - is graphical representation

41

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan (registration) of an electrical pulse of the will be second value of ECG, x(n–6) will be 8th conducting system of the heart [2]. value. At electrocardiograph sampling rate 200 Electrocardiogram consists of waves and intervals. records per second low- pass filter adds delay 5 These ECG waves and intervals are usually samples or 25ms [4]. denoted by Latin letters - P, Q, R, S and T. In algorithm outputs of low- pass filter are have “Komekshy” is the electrocardiograph with to pass through high- pass filter. High- pass filter is specialized QRS-complex analysis system. QRS - describes by equation 2. describes complex ventricular excitation. With the help of QRS-complex it is possible to detect the (2) heart rate, presence of infarction, presence of cardiac arrhythmias, the presence of complete Equation 2 is also recursive equation. In blockage of the left and right bundle branch block. equation 2 x(n) is output of low-pass filter and For the analysis of QRS-complex, we need an p(n–1) is previous value of equation 2. High-pass algorithm that can distinguish the QRS-complex of filter equivalent to all pass filter minus low- pass an electrocardiogram from its other parts. There filter. Then outputs of high-pass filter have be are a number of algorithms designed to identify transformed by differential operation. Differential QRS-complex. For example, an algorithm based on operation describes by equation 3. the derivative [3], an algorithm for determining QRS - complex using lead electrocardiogram [4] (3) (the algorithm is a modified version of the Pan- In equation 3 x(n) represents output of high- Tompkins algorithm) convolutional-correlation pass filter. Differential operation approximately algorithm [5], a method based on counting the computes slope of signal. In addition, differential number of zero crossings [3] and the Pan- operation removes low frequency components like Tompkins algorithm [3]. For “Komekshy” P and T waves. electrocardiograph system for detecting QRS- The next step of algorithm is finding square of complex we have chosen Pan-Tompkins algorithm. output of differential operation. In other The main reason of this choice is the lack of any implementation of this algorithm this step preliminary information regarding ECG values. In composed of taking module of output of [3] it is shown that this algorithm is highly differential operation. sensitive and can recognize QRS- complex in the Then squared values have to pass integrating presence of noise in the ECG. filter of sliding window. The filter describes by

equation 4. 2. Pan-Tompkins algorithm

A Pan-Tompkins algorithm is designed to define QRS complex in ECG. QRS complex (4) usually has high amplitude relatively other ECG Where N is width of window. N does not have waves, its slope is also high, width of QRS constant value. In our implementation of this complex is varied up to 0.12s [6]. In algorithm window width was equal 100ms for implementation of this algorithm these features are sampling rate 1000 records per second of taken into account. Implementation of Pan- electrocardiogram. Window width should be Tompkins algorithm consists of the following approximately equal to QRS complex width. In steps: low-pass filter, high-pass filter, differential order to evaluate window width value – the transformation, squaring operation, integrating following consideration should be taken into filter of sliding window. ECG values in first step account: if window width too wide, then the have to pass through low-pass filter. Low-pass algorithm will classify other parts of ECG (like ST filter is described in the equation 1. segment, T wave) as QRS complex. If window width too small, then algorithm will incorrectly

identify QRS complex, because in one cardiac 2 6+ (1) cycle will be registered multiple peaks. Equation 1 is recursive: to evaluate new value it Then among integrating filter of sliding uses its previous values. In equation 1 y(n–1), y(n– window values peak value has to be identified. 2) are represent the last two values of output of Peak registration time is corresponds to QRS equation 1. x(n), x(n–6), x(n–12) are values of complex registration time. Peak has to be identified ECG. x(n–12) is the first value, x(n–6) is the for each cardiac cycle. seventh value, x(n) is 13th value in first iteration, but they have to move to one value at next 3. Researching Pan-Tompkins algorithm iteration. For example, in second iteration x(n–12) 42

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan In our implementation of Pan-Tompkins complex ranges and QRS-complex ranges algorithm we assumed the first 12 values of y(n) identified by algorithm. and p(0) to be zero. Table 1 shows real QRS- Table 1, Sensitivity and specification of QRS- complex

QRS- 833- 1827- 2821- 3815- 4809- 5803- 6797- 7791- 8785- 9779- complex(ms) 935 1929 2923 3917 4911 5905 6899 7893 8887 9881 Defined by 900- 1900- 2900- 3900- 4900- 5900- 6900- 7800- 8800- 9800- algorithm QRS- 1000 2000 3000 4000 5000 6000 7000 7900 8900 9900 complex (ms) Sensitivity(%) 35.64 29.7 23.76 17.48 11.88 5.94 0 93.1 87.13 81.19

Specification(%) 92.55 91.92 91.33 90.73 89.56 89.56 88.98 98.93 98.23 97.54 Sensitivity and specification of algorithm are respectively calculated electrocardiograph “Komekshy” as means of heart according to equations 5 and 6. vascular system monitoring. Абай атындағы

(5) Қазақ ұлттық педагогикалық университеті,

Хабаршы. – 2016. – №2. – Б. 144-147. (6) [2] Ю.И. Зудбинов, Азбука ЭКГ. – третье Where TP is quantity of true detection of издание. Ростов н/Д. 2003. 160с. ISBN 5-222- positive example, FN is quantity of false detection 02964-6. of negative example. In our case, positive example [3] А.В. Рослякова, П.Г. Чупраков, is QRS time and negative example will be not QRS Сравнительный анализ алгоритмов time. TN is quantity of true detection of negative обнаружения R-зубца электрокардиосигнала. example. FP is quantity of false detection of Вятский медицинский вестник. 2012. №2. С. 29- positive example. 35. [4] J.C. Moraes, M.M. Freitas, F.N. Vilani, 4.Conclusion E.V. Costa. A QRS Complex Detection Algorithm As said above, Pan-Tompkins algorithm can be using Electrocardiogram Leads. Computers in used when ECG values are not known beforehand. cardiology. 2002; 29. C.205-208. Test showed sensitivity of algorithm which is [5] А.В. Крамаренко, Ю.А. Крамаренко. being varied at each cardiac cycle, but Сверточно-корреляционный алгоритм specification was more stable. Window width of выделения QRS комплекса: публикация. integrating filter of sliding window influence to http://tredex-company.com/ru/svertochno- sensitivity of algorithm. In our implementation korrelyatsionnyj-algoritm-vydeleniya-qrs- window width was 100ms, because it is normal kompleksa QRS-complex width. [6] Джон Р.Хэмптон, перевод с английского Ф.И. Плешкова. Основы ЭКГ. Медицинская 5.References литература. М. 2006. 224с. ISB [1] I.M.Ualiyeva, D.A.Ayazbayev, A.T.Mansharipova. The portable 5-89677-052-9.

”Көмекші” электрокардиограф жүйесінде Пан-Томпкинс алгоритмі

Дузбаев Нұржан, Аязбаев Дәурен

Халықаралық ақпараттық технологиялар университеті, Компьютерлік инженерия және телекоммуникация кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. 05004., Алматы 050040, Қазақстан

Мақаланың кіріспе бөлімі электрокардиограмманың не екенінен түсіндіруден басталады. Содан кейін, QRS жиынтықты анықтайтын алгоритмдерге шолу жасалынады. Авторлар “Көмекші” электрокардиографының жүйесінде QRS жиынтығын анықтау үшін Пан-Томпкинс алгоритмін қолданды. Пан-Томпкинс алгоритмнің өнімділігін анықтау үшін мақалада сезімталдық, ерекшелік(специфичность) көрсеткіштер пайдаланылды. Мақаланың қорытынды бөлімінде Пан-Томпкинс алгоритмнің берген жауабы жайлы жазылған.

43

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Алгоритм Пан-Томпкинс в системе электрокардиографа ”Комекши”

Дузбаев Нуржан, Аязбаев Даурен

Международный Университет Информационных Технологий, Кафедра Компьютерной Инженерии и Телекоммуникации, ул. Манаса / Жандосова 34 «А»/8 «А», Алматы 050040, Казахстан

Введение статьи начинается объяснением что такое электрокардиограмма. Далее, авторы делают обзор к алгоритмам определения QRS комплекса. Алгоритм Пан-Томпкинс использовался в системе электрокардиографа “Комекши”. Показатели, как чувствительность и специфичность были рассчитаны авторами, чтоб оценить производительность алгоритма. Заключение статьи содержит выводы по алгоритму Пан-Томпкинс.

Analysis of firewalls as the systems of information protection

Dzhursumbekov S.E.

International IT University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

This scientific article acquaints the reader with the situation of information security of modern digital world. Information security is the most important element in any organization. The article points on necessity of information protection in local and corporative networks, as well as describes the modern means of information protection. The goal of this article is to examine and study of data protection means such as firewalls, their functionalities and types, and also reveal their advantages and drawbacks by comparative analysis. In the conclusion, there is a summary by firewall types, the best type of firewall for protecting an information in modern networks is revealed, and the scientific novelty of our research work is shown in order to develop own firewall.

1.Introduction provides much more possibilities for intruders in The intensive development of global computer comparison with traditional information systems. networks, the emergence of new information Thus, the issue of securing the networks and their retrieval technologies is attracting more attention to components becomes very important and actual at the Internet by private individuals and various this time, time of progress and computer organizations. Many organizations decide to technologies. integrate own local and corporative networks into the global network. The usage of global networks for 2. The goal of the research commercial purposes as well as the transfer of The goal of our research work is to investigate, information containing confidential data entails the examine and study of one of the means of network need to build an effective information protection security such as firewall, its functionality, types, system. It is hardly need to enumerate all the reveal pros and cons of each type and finally, design benefits that received by the modern enterprise due and develop a firewall program which will defend a to the access to the global Internet. But use of computer with its all important information on it Internet has also negative consequences as many from malicious attacks. other new technologies. The development of global networks led to multiple increase of number of users 3.Firewalls, their types, functionality, and at the same time, increase of number of attacks comparative analysis on the computers connected to the Internet. Annual Firewalls are often the first line of defense of a losses can be estimated up to millions of dollars if computer and used in securing computer networks. there is insufficient level of computer security [1]. Firewall monitors and controls the incoming and We need to take care of ensuring information outgoing network traffic based on predetermined security of local or corporative network when security rules [2]. A firewall typically establishes a connecting it to the Internet. Internet initially created barrier between a trusted, secure internal network as open system, designed for free interchange of and another outside network, such as the Internet, information. Therefore, due to its openness, Internet

44

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan that is assumed not to be secure or trusted. (See numbers and flags. On application layer, analysis of figure 1) application protocols such as FTP, HTTP, SMTP and etc. can be accomplished as well as control over contents of data streams (For instance, prohibition of accessing some types of files, executable program modules and etc). It is also possible to create expert system, which analyzes traffic, monitors events, which can be a security threat for internal network, and notifies administrator. Expert system also can toughen filtration conditions in case of danger (e.g. spam). Firewalls are divided into hardware-based and software-based firewalls. Hardware based firewalls represents a device, which is physically connected to

the network. This device monitors all aspects of Figure 1 – Firewall illustration incoming and outgoing network traffic as well as

checks addresses of source and destination of each Also it can be used as protection from “attacks” handled packet. This ensures security, helps to coming from corporative intranet. Firewall prevent unwanted entry into the network or to a appliances may also offer other functionality to the computer. Software based firewall performs the internal network they protect such as acting as a same set of functions using installed software on the DHCP or VPN server for that network. The work of computer not external device. Both hardware-based firewalls is to analyze the structure and content of and software-based firewalls can be used on the data packets, coming from outside networks, and same computer. depending on the results of analysis, it allows to pass Firewalls by functionality divided into four type or completely filters out the packets. The categories, where each one having specific effectiveness of work of firewall, which works on advantages and drawbacks. Each style of firewalls Windows OS, is due to that it replaces the TCP/IP uses a different method of protection, but the main stack of protocols completely, and therefore, the aim is the same: each follows a specific set of rules violation of its work by external network protocol to filter out inbound and outbound network traffic to distortion (it is often done by hackers) is impossible. secure the network where it is installed. Which one Firewalls usually perform next functions: will be used depends on the user's requirements of  Physical dividing of work stations and the firewall and the available system resources. internal subnetwork servers from external These categories are: connection links  Packet Filters  Multistage identification requests, coming to  Application-Gateway Firewalls the network (server identification, connection nodes and other components of outside network)  Circuit-Gateway firewalls  Inspection of authorities and user’s access  Hybrid Firewalls rights to the network of internal resources The most basic type of firewall is a packet filter.  Registration of all requests to components of It receives packets and evaluates them according to a internal subnetwork from outside set of rules that are usually in the form of access  Control of integrity of software and data control lists. These packets may be forwarded to their destinations, dropped, or dropped with a return  Economy of network address space message to the originator describing what happened.  Hiding of IP addresses of internal servers The types of filtering rules vary from one vendor's from hackers. product to another, but those most frequently applied Firewalls can operate on different protocol levels are: of OSI model.  Source and destination IP address (e.g., all On network level, there is a filtration of incoming packets, based on IP addresses (for example, not to packets from source address 128.44.9.0 through allow packets from Internet to pass to the servers, 128.44.9.255 might be accepted, but all other access to which is blocked for outside, drop the fake packets might be rejected). packets with inverse addresses, packets with IP  Source and destination port (e.g., all TCP addresses in the “black list”, and so on). On packets originating from or destined to port 25—the Transport layer, filtration can be done by TCP port simple mail transfer protocol, or SMTP, port—

45

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan might be accepted, but all TCP packets destined for They also tend to be the most transparent to port 79—the finger port—might be dropped). legitimate users. If the filtering rules are set up  Direction of traffic (e.g., inbound or appropriately, users obtain their required access with outbound). little interference from the firewall. However,  Type of protocol (e.g., IP, TCP, user datagram simplicity has its disadvantages. The rules that protocol, or internetwork packet exchange). packet-filtering firewalls implement are based on  The packet's state (i.e., SYN, meaning port conventions. If an organization wants to stop synchronize, or ACK, which is the certain service requests (e.g., telnet) from reaching acknowledgement that a connection between hosts internal or external hosts, the most logical rule is to has already been established). block the port (e.g., port 23) that by convention is Packet-filtering firewalls provide a reasonable used for telnet traffic. Blocking this port, however, amount of protection for a network with minimum does not prevent someone inside the network from complications [2]. On the figures 2 and 3 we can see allowing telnet requests on a different port that the operation of packet filter firewall and the work of firewall's rules leave open. In addition, blocking packet filters in accordance with OSI model some kinds of traffic causes a number of practical respectively. problems. Blocking X-Windows traffic (which is Packet-filtering rules can be extremely intuitive typically sent to ports 6000 to 6013), on the surface, and thus easy to set up. One simple, but surprisingly seems to provide an effective security solution effective, rule is to allow all packets that are sent because of the many known vulnerabilities in this from a specific, known set of Internet protocol (IP) protocol. Many types of remote log-on requests and addresses, such as hosts within another network graphical applications depend on X-Windows, owned by the same organization or corporation. however. Blocking X-Windows traffic may thus Packet-filtering firewalls also tend to have the least restrict functionality, leading to the decision to allow negative effect on the throughput rate at the gateway all X-Windows traffic (which makes the firewall a compared with other types of firewalls. less than effective security barrier). In short, firewalling schemes based on ports do not provide the precise control that many organizations require. Moreover, packet-filtering firewalls are often deficient in logging capabilities, particularly in providing logging that can be configured to an organization's needs (e.g., to capture only certain events in some cases and, in others, to capture all events). They may also lack remote administration facilities that can save considerable time and effort. Finally, the process of creating and updating filtering rules is prone to logic Figure 2 – packet filter operation errors that could result in easy conduits of unauthorized access to a network. Like most other security-related tools, over time, many packet-filtering firewalls have become more sophisticated. Some vendors of packet-filtering firewalls offer programs that check the logic of filtering rules to discover any contradictions and errors. Packet-filtering firewalls also exist that offer strong authentication mechanisms, such as token- based authentication. Many products defend against previously successful methods to defeat packet- filtering firewalls. However, network attackers can send packets to or from a disallowed address or disallowed port by fragmenting the contents. Fragmented packets cannot be analyzed by a conventional packet-filtering firewall, so the firewall allows them through, where they are assembled at the destination host [1]. In this manner, the network Figure 3 – OSI model layers where packet filters work attackers can bypass firewall defenses.

46

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

4.Application-Gateway firewalls packet-filtering firewalls. If used in connection with A second type of firewall handles the choke appropriate host-level controls (e.g., proper file function of a firewall differently—by determining permissions and ownerships), application-gateway not only whether but how each connection through it firewalls make externally originated attacks on is made. This type of firewall stops each incoming applications difficult. Another important function of (or outgoing) connection at the firewall, and, if the application-gateway firewalls is hiding information connection is permitted, initiates its connection to about hosts within the internal network from the rest the destination host on behalf of whoever created the of the world. Finally, a number of commercial initial connection. This type of connection is called a application-gateway firewalls are available that proxy connection. By using its database, which support strong authentication methods, such as defines the types of connections allowed, the token-based methods (e.g., use of handheld firewall either establishes another connection (i.e., authentication devices). Figure 4 illustrates the work permitting the originating and destination host to of application gateway firewalls according to OSI communicate) or drops the original connection. If model. the firewall is programmed appropriately, the process can be transparent to users. An application-gateway firewall is simply a type of proxy server that provides proxies for specific applications. The most common implementations of application-gateway firewalls provide proxy services, such as mail, file transfer protocol (FTP), and telnet, so that they do not run on the actual firewall, which increases security. Each connection is subject to a set of specific rules and conditions similar to those in packet-filtering firewalls, except that the selectivity rules application-gateway firewalls use are not based on ports, but on the to-be- accessed programs or services (regardless of which port is used to access these programs). Criteria, such Figure 4-Work of application level gateway firewall as the source or destination Internet protocol(IP) address, however, can be used to accept or reject Application-gateway firewalls are the best-selling incoming connections. Application-level firewalls of all types of firewalls. Nevertheless, they have also determine permissible conditions and events some notable limitations. Most significant, for every when a proxy connection has been established. An TCP/IP client for which the firewall provides FTP proxy can restrict FTP access to one or more proxies, the client must be aware of the proxy that hosts by allowing the get command, for example, the firewall runs on its behalf. Therefore, each client and, at the same time, preventing the put command. must be modified accordingly. A second limitation A telnet proxy can terminate a connection if the user is that, unless one uses a generic proxy mechanism, attempts to perform a shell escape or to gain root every application needs its access. Application-gateway firewalls are not own custom proxy. In the case of proxies for widely limited only to applications that support TCP/IP used services, such as telnet, FTP, and hypertext services, however. These tools can similarly govern transfer protocol (HTTP), this limitation is not conditions of usage for a variety of applications, formidable because a variety of proxy such as financial or process control applications. implementations is available. Proxies for many other The two basic types of application-gateway services are not available at the present time, firewalls are: application-generic firewalls and however, and must be custom-written. Although application-specific firewalls. The application- some application-gateway firewall implementations generic type provides a uniform method of are more transparent to users than others, none are connection for every application, regardless of type. completely transparent. Some require users, who The application-specific firewall determines the have initiated connections, to make selections from nature of connections to applications on an menus before they reach their destinations. Third application-by-application basis. Regardless of the limitation is that because this type of firewall type of application-gateway firewall, if properly examines the whole application data of the packet, it configured, the resulting security control can be decreases network throughput and use large amount precise considerably more than is possible with of processor time. Finally, most application-gateway

47

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan firewalls are not easy to initially configure and for each client to connect to the application. Each update correctly. To use an application-gateway client then invokes a set of commands to the firewall to its maximum advantage, network gateway [3]. The circuit-gateway firewall imposes administrators should set up a new proxy for every all predefined restrictions, such as the particular new application accessible from outside a network. commands that can be executed, and establishes a Furthermore, network administrators should work connection to the destination on the client's behalf. with application owners to ensure that specific To users, this process appears transparent. restrictions on usage are placed on every remote As with application-gateway firewalls, circuit- connection to each critical application from outside gateway firewall clients must generally be modified the network. Seldom, however, are such practices to be able to interface with the proxy mechanism observed because of the time, effort, and complexity that is used [4]. Making each client aware of involved. SOCKS is not an overwhelming task, because a variety of SOCKS libraries are available for 5.Circuit-Gateway firewalls different platforms. The client must simply be As discussed previously, application-gateway compiled with the appropriate set of SOCKS firewalls receive connections from clients, dropping libraries for the particular platform (e.g., UNIX or some and accepting others, but always creating a Windows) on which the client runs. new connection with whatever restrictions exist Circuit-gateway firewalls also have limitations. whenever a connection is accepted. Although, in First and foremost, the task of modifying all clients theory, this process should be transparent to users, in to make them aware of the proxy mechanism is practice, the transparency is less than ideal. A third potentially costly and time-consuming. Having a type of firewall, the circuit-gateway firewall, has common interface to the proxy server so that each been designed to remedy this limitation by client would not have to be changed would greatly producing a more seamless, transparent connection improve usability. Second, circuit-gateway firewalls between clients and destinations using routines in tend to provide a generic access mechanism that is special libraries. The connection is often described independent of the semantics of destination as a virtual circuit, because the proxy creates an end- applications. Because, in many instances, the danger to-end connection between the client and the associated with specific user actions is dependent on destination application. A circuit-gateway firewall is each application, offering proxies that take into also advantageous because, rather than simply account application semantics would be more relaying packets by creating a second connection for advantageous. (Invoking the delete command to each allowed incoming connection, it allows delete data in an application that reinitializes all multiple clients to connect to multiple applications parameter values by retrieving values from a within an internal network. Figure 5 shows the work database that is not accessible to users every time it of circuit gateway firewall on the appropriate level is invoked, for example, is potentially not of OSI model. catastrophic. In other applications, however, being able to delete data is potentially hazardous.) In addition, SOCKS has several limitations. Most implementations of SOCKS are deficient in their ability to log events. Furthermore, SOCKS neither supports strong access authentication methods nor provides an interface to authentication services that could provide this function.

6. Hybrid firewalls or Stateful Packet Inspection (SPI) Figure 5 - work of circuit gateway firewall on the A hybrid or SPI firewall is a firewall that appropriate level of OSI model. combines features and functions from other types of firewalls that is, the elements of packet filtering and Most circuit-gateway firewalls are implemented proxy services [5]. Hybrid firewalls use a using SOCKS, a tool that includes a set of client combination of features from the other three libraries for proxy interfaces with clients. SOCKS methods, and in practice, most popular firewalls on receives an incoming connection from clients, and if the market fall into this category, since they use the connections are allowed, it provides the data multiple approaches within the same device. necessary

48

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Now, let’s compare the mentioned firewall styles, solution, although it is also generally the easiest to consider their advantages and drawbacks, and defeat. Proxy-based firewalls, such as circuit- summarize them in Table 1: gateway firewalls, are generally more difficult to defeat, and the resulting virtual circuit connection is Table1- comparative analysis of firewall styles for relatively transparent to users. However, circuit- Firewall type Advantages Disadvantages gateway firewalls do not understand the semantics of Packet Filters Minimum Vulnerable to IP applications and thus lack a certain amount of complications, spoofing attack granularity of control. Application-gateway firewalls fast operation, are also proxy-based, but connect a specific client to don’t decrease a specific application. Application-gateway firewalls network can provide more granularity of control, but require throughput, don’t significantly that every application that proxies reach be impact on modified, and they are generally less transparent to computer speed users than circuit-gateway firewalls. Hybrid Application- Provides severely firewalls performing stateful packet inspection is the Gateway “proxy”, do not slows down most suitable security solution, in comparison with firewalls require specific network traffic other firewall styles, that is why, nowadays most source and and use a lot of vendors massively develop this type of firewalls. destination processor time. addresses, more Not transparent 8. Scientific novelty of the research. granularity of to users. Nowadays, there are a rich variety of firewalls control, effective at protecting available to install on the computer, the firewalls computers from which provide good security are paid unfortunately, potentially and cost significant money. Therefore, as a result of damaging our analysis of firewalls we have done so far, we services. come to the decision to develop hybrid firewall for Circuit-Gateway Provides do not us to protect our information on the network. firewalls “proxy”, offer a understand the Almost all firewalls of third party vendors require wider variety of semantics of to disable standard Windows firewall, in order to not possible rules applications. conflict and operate correctly. Scientific novelty of than other Vulnerable to my research work is that my developed firewall will firewalls. Virtual attack associated work instead of third party firewalls, will not circuit with connection is modification of conflict with Microsoft Windows Defender and transparent to flags in the Windows Firewall. My firewall should be able to users. packet. filter packets based on IP address metadata, ports Hybrid Firewalls Use a No disadvantages and application, the packets is designated for. And combination of combined with them, implements hybrid SPI features of other firewall styled security system. firewall styles. The best type of 9. References firewalls, which [1] Business Wire. MacAfee, Inc. report reveals is developed cyber cold war, with critical infrastructure under massively by many vendors. constant cyberattack causing widespread damage. Electronic, 2010. [2] K.Strasberg, R. Gondek, and G.Rollie. 7.Conclusion To sum up all of the above, we can say that the Firewalls: The Complete Reference. McGraw- successful use of a firewall is dependent on the user Hill/Osborne, 2012 requirements, resources available and selection of an [3] Michael T. Simpson. Hands-on Ethical appropriate product. Each of firewall types has its Hacking and Network Defense. Thomson, 2011. advantages and disadvantages. Packet-filtering [4] A.Silberschatz, P.BGalvin, and G.Gagne. firewalls accept or deny packets based on numerous Operating System Concepts. John Wiley and Sons, rules that depend on the source and destination ports 9-th edition, 2013. of packets and other criteria. This type of firewall is [5] K.Gattine. Types of firewalls: An the closest option to a plug-and-play firewall introduction to firewalls. Electronic, 2015

49

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Анализ брандмауэров как систем защиты информации

Джурсумбеков С.Э

Международный Университет Информационных Технологий, Кафедра «Информационные системы», 050040 г. Алматы, ул. Манаса/ Жандосова, 34 «А»/8 «А»

Эта научная статья знакомит читателя с ситуацией по информационной безопасности современного цифрового мира. Информационная безопасность — это самый важный элемент в любой организации. Статья указывает на необходимость защиты информации в локальных и корпоративных сетях, а также описывает современные средства защиты информации. Целью данной статьи является рассмотрение и изучение таких средств как брандмауэры или межсетевые экраны, их видов, функциональность, а также выявление их преимуществ и недостатков путем сравнительного анализа. В заключении приводится итог по видам брандмауэров, выявляется их наилучшая схема для защиты информации в современных сетях и приводится научная новизна нашего исследования для разработки собственного брандмауэра.

Брандмауэрларды талдау ақпаратты қорғау жүйелері ретінде

Джурсумбеков С.Э

Халықаралық ақпараттық технологиялар университеті, Ақпараттық жүйелер кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. 05004., Алматы 050040, Қазақстан

Бұл ғылыми мақала оқырманды қазіргі цифрлік заманның акпараттық қауіпсіздігінің жағдайымен таныстырады. Ақпараттық кауіпсіздік — бұл кез келген мекемеде ең маңызды элемент. Мақала корпоративтік және локал желілердегі ақпараттық қауіпсіздігінің кажеттілігіне көрсетеді, және де қазіргі ақпараттық қауіпсіздігінін құралдарын сипаттайды. Бұл мақаланың мақсаты брандмауэр немесе басқаша айтқанда фаервол құралдарын, олардың түрлерін, функционалдық қасиеттерін зерттеп, қарастыру болып табылады. Сонымен қатар, олардың артықшылықтарын мен кемшіліктерін сипаттау талдауы арқылы ашып көрсету да мақаланың мақсаты болып табылады. Мақаланың қорытындысында, фаерволдардың түрлері бойынша нәтижелері келтіріледі, олардың қазіргі желілердегі ақпаратты қорғау үшін ен жақсы түрі ашып көрсетіледі, және жеке фаерволды құрастыру үшін біздің зерттеуінің ғылыми жаңалығы келтіріледі.

Computer modeling of thermodynamic properties of ICF plasma

Gabdullin M.T.1, Ismagambetova T.N.2

1NNLOT, al-Farabi Kazakh National University, Almaty, 050040, Kazakhstan 2IETP, al-Farabi Kazakh National University, Almaty, 050040, Kazakhstan

In this work interaction potentials taking into account quantum-mechanical effects of diffraction and symmetry were used [1]. The pair correlation functions have been obtained in the solution of the integral equation of the Ornstein-Zernike [2] in HNC approximation. Thermodynamic properties were calculated through these potentials and pair correlation functions.

1. Introduction 22 2 thab 22 Interaction potentials taking into account eea b ab ()a0  br uab ( r ) 1 th 2 e quantum-mechanical effects of diffraction and r a22 br symmetry were obtained in [1]: 0

1 r 2 1er /ab  k T ln 1  exp  . (1) (6)   ae be B 2 2 ee

where eeab, are electrical charges of particles a and b;

50

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

m m m/ m m ; 3 ab a b a b  E Nk T is internal energy of an ideal gas; id2 B ab 2 m ab k B T is thermal de- Pid nk B T is pressure of an ideal gas. Broglie wavelength; The results of calculations of the present work are 1/ 2  shown in figures (1-3). r k T4 e22 n Z is Debye radius. D B j j j Dimensionless parameters such as coupling ()Ze 2 parameter Г  and density parameter akB T 1/3 rsB a/ a , where an (3/(4 e )) is the average distance between electrons, were used. The following formula was used to account for different electron spin directions instead of the second term in (1):

r 2 UST()( r )  k T ln 1  exp  , (2) ee,0 B 2 ee where S=1 corresponds to parallel spins, S=0 – to antiparallel spins. Figure 1 Results to the pair correlation functions of The pair correlation functions have been obtained in Figure 1 A fully ionized hydrogen plasma for the solution of the integral equation of the Ornstein- Zernike [2]: different potentials for Г=0.3, rs=2. Black line – potential (1), red line – potential (1) with antiparallel spins, green line – potential (1) with hr()()()(), Cr  nCr  rhr  rdr  3 1 3 2 3 parallel spins, yellow line – Deutsch theory, blue (3) line – Debye theory. where h( r ) g ( r ) 1 is full correlation function, Cr() is direct correlation function. In hyper netted-chain approximation:

Фr(), (4) CГПЦ ( r ) h ( r )  ln g ( r )  kTB where ()r is potential of interaction between particles. Thermodynamic properties were calculated on the basis of interaction potentials and obtained pair correlation functions:

 E E  n n g r   r r2 dr id      , (5) i,, e i e 0 Figure 2 Internal energy for rs=2. 1 – [3, 4], 2 –  2 ()r Debye limit, 3 - [5], red line – partially ionized P P n n g() r r3 dr , (6) id     plasma, blue line – fully ionized plasma. 3 i,, e i e 0 r where is potential of interaction between particles, g(r) is pair correlation function, N is number of particles in the systems;

51

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Figure 3 Equation of state for rs=2. 1 – [6], 2 – Debye limit, 3 – [5], 4 – [3, 4], red line – partially ionized plasma, blue line – fully ionized plasma.

3. References [1] Zh.A. Moldabekov, T.S. Ramazanov, K.N. Dzhumagulova Contrib.Plasma Phys. 52 (2012) 3. [2] David L. Goodstein States of Matter Dover publications, Inc. (2002) 500. [3] C. Pierleoni, W.R. Magro, D.M. Ceperley, B. Bernu Physics of Strongly Coupled Plasma, World Scientific. NJ.London (1996) 11-26. [4] W.R. Magro, C. Pierleoni, D.M. Ceperley, B. Bernu Phys. Rev. Letters 76 (1996) 1240-1243. [5] N.N. Izteleuov, M.A. Bekenov Abstracts of the 2nd International conference «Modern problems of physics and fundamental physical education» (2001) 84. [6] S. Ichimaru, H. Iyetomi, S. Tanaka Statistical, Physics Reports 149 (1987) 91-205. Компьютерное моделирование термодинамическихъ свойств плазмы ИТС

Габдуллин М.Т.1, Исмагамбетова Т.Н.2

1ННЛОТ, КазНУ им. аль-Фараби, Алматы, Казахстан 2НИИЭТФ, КазНУ им. аль-Фараби, Алматы, Казахстан

В данной работе были использованы потенциалы взаимодействия, учитывающие квантово-механические эффекты дифракции и симметрии [1]. Парные корреляционные функции были получены решением интегрального уравнения Орнштейна-Цернике [2] в гипперцепном приближении. Термодинамические свойства были рассчитаны через данные потенциалы и парные корреляционные функции.

ИТС плазмасының термодинамикалық қасиеттерін компьютерлі модельдеу

Габдуллин М.Т.1, Исмагамбетова Т.Н.2

1АТҒҰУ, әл-Фараби атындағы ҚазҰУ, Алматы, Казахстан 2ЭТФҒЗИ, әл-Фараби атындағы ҚазҰУ, Алматы, Казахстан

Бұл жұмыста квант-механикалық дифракция және симметрия эффектілерін ескеретін әсерлесу потенциалдары қолданылған [1]. Жұп корреляциялы функциялар Орнштейн-Церник интегралды теңдеуін гипертізбекті жуықтап шешу нәтижесінде алынды [2]. Термодинамикалық қасиеттер берілген потенциалдар мен жұп корреляциялық функциялар арқылы есептелген.

Computer modeling of D-T plasma composition

Gabdullin M.T.1, Otarbay Zh.Y.2, Mamatova M.B.2

1NNLOT, al-Farabi Kazakh National University, Almaty, 050040, Kazakhstan 2IETP, al-Farabi Kazakh National University, Almaty, 050040, Kazakhstan

In this work, the composition of non-ideal deuterium and tritium plasma was calculated using Saha equation taking into account lowering of ionization potential. The composition of dense nonideal plasma was calculated using numerical methods. The degree of ionization was determined as the ratio of the number of free electrons to the total number of nuclei in the plasma. Composition of the ionized plasma was calculated in the system in the

52

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

framework of the chemical model of plasma. System of Saha nonlinear equations solved by numerical methods was obtained. In this work the atoms of deuterium and tritium were examined in a ratio of 60%-40%, 50%-50%, and 70%-30%, respectively. The resulting degree of ionization of ionized atoms of deuterium and tritium with increasing temperature increased to maximum value.

1. Introduction Currently physics of nonideal plasma attract the 2. The composition of partially ionized plasma attention of scientists from different countries. First To review the composition of the deuterium- of all it is connected with the study of astronomical tritium plasma chemical plasma model was used. It objects found in nature, such as the bowels of the is known that with increasing temperature and giant planets, white dwarves, etc. In terms of decreasing density degree of ionization increases. In practical application nonideal plasma is a working considered temperature and density of such plasma body of various plasma reactors, in particular, in structure will change from the atomic to the singly creating installations of controlled thermonuclear ionized. The interaction between the particles gives fusion with inertial confinement. a decrease in the ionization potential in the Debye Nonideal plasma is interesting in relation to the approximation. Consideration of the chemical practical applications, and for the study of the equilibrium traditionally begins with the definition fundamental nature of the phenomena, properties of the reactions in the system. Within the chemical and structure of matter. Coupled plasma is model of plasma there are recombination and determined by the parameter which characterizes the ionization reactions D and T in the system [1]: ratio of the potential energy of interaction between two particles at an average distance to their thermal energy. For non-ideal plasma, this parameter is of (1) the order of unity. There are many different theoretical approaches to describe the nonideal plasma. The first one is The relations between the concentrations of often used by computer simulation methods such as deuterium and tritium in the ratio of 60%-40% are: Monte Carlo method, molecular dynamics method. In case of a weakly system various theoretical approaches, such as the Green's function method, the theory of linear dielectric response, the method of (2) integral equations of Bogolyubov-Born-Green- Kirkwood-Yvon and Ornstein-Zernike in various approximations are widely used. In this paper, the Saha system of equations was obtained to system of Saha equations for different ratios of calculate the composition of the DT plasma with deuterium and tritium was solved by numerical maximum ionization multiplicity: methods. For the convenience of description, an unstable system, which is plasma, it is convenient to use dimensionless parameters characterizing its state with specific densities and temperatures. The (3) average distance between the particles is

. Communication parameter is In these equations

is the total concentration of particles; is the Г= . The parameter is defined as В concentration of singly-ionized ions of deuterium; density , where is is the concentration of singly-ionized ions of Bohr radius. Density parameter decreases with tritium; increasing density. In this work we investigated plasma in the region of densities and temperatures: ,

-3 n = cm , . Composition of deuterium and tritium plasma , (4) consisting of electrons, ions, atoms and nuclei was counted.

53

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

where is the thermal de Broglie wavelength; is the ionization potential of the deuterium atom; is the ionization potential of the tritium atom, is lowering of ionization potential. To solve such a system it is necessary to complement the two other equations with the law of conservation of nuclei:

(5) and the law of conservation of the total charge in the system:

Figure 2 The curve of degree of ionization

(6) depending on temperature for 60%-40% D-T plasma. The relations between plasma concentrations of This system of equations was solved by the components of such plasma give us the degree of numerical methods. As a result the curves of degree of ionization depending on concentration and ionization and relative shares of the components in the system. These relations can be expressed as temperature have been obtained. [2]: The results of calculations of equations deuterium- tritium plasma at the ratios of 60%-40%, 50%-50% and 70%-30% are shown in figures (1-3).

, ,

, . (7)

Figure 3 The curve of degree of ionization depending on temperature for 50%-50% D-T plasma.

3. References [1] Gabdullin M.T., Ramazanov T.S., Redmer R., Figure 1 The curve of degree of ionization Akhtanova G. Ionization equilibrium and depending on temperature for 70%-30% D-T composition of a dense beryllium, boron and carbon plasma. plasmas // Contrib. Plasma Phys., Vol. 53, No. 4-5, P. 311 – 316 (2013) [2] Габдуллин М.Т., Рамазанов Т.С., Ахтанова Г.Б., Редмер Р. Состав плазмы бериллия // Вестник КазНУ. Серия физическая, Т. 46, № 3 (2013).

Компьютерное моделирование состава D-T плазмы

Габдуллин М.Т.1, Отарбай Ж.Е.2, Маматова М.Б.2

54

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

1ННЛОТ, КазНУ им. аль-Фараби, Алматы, Казахстан 2НИИЭТФ, КазНУ им. аль-Фараби, Алматы, Казахстан

В данной работе был исследован состав плотной неидеальной дейтерий-тритиевой плазмы с помощью уравнения Саха с учетом снижения потенциала ионизации. Состав плотной неидеальной плазмы был посчитан с помощью численных методов. Степень ионизации была определена как отношение числа свободных электронов к полному числу ядер в плазме. При вычислении состава ионизованной плазмы применялась химическая модель . Была получена система нелинейных уравнений Саха, которая решалась численными методами. В данной работы были рассмотрены атомы дейтерия и трития в соотношении 60%-40%, 50%-50% и 70%-30%, соответственно. Полученные степени ионизации для дейтерия и трития с повышением температуры увеличивались до максимального значения.

D-T плазмасының құрамын компьютерлі модельдеу

Габдуллин М.Т.1, Отарбай Ж.Е.2, Маматова М.Б.2

1 АТҒҰУ, әл-Фараби атындағы ҚазҰУ, Алматы, Казахстан 2 ЭТФҒЗИ, әл-Фараби атындағы ҚазҰУ, Алматы, Казахстан Бұл жұмыста иондалу потенциалының төмендетілуі ескерілетін Саха теңдеуінің көмегімен, тығыз идеал емес дейтерий-тритий потенциалының құрамы зерттелген. Тығыз идеал емес плазманың құрамы сандық әдіс арқылы шешілді. Иондалу дәрежесі плазмадағы бос электрондар санының толық ядролар санына қатынасымен анықталды. Иондалған плазманың құрамын анықтауда химиялық модель қолданылды. Нәтижесінде сызықты емес Саха теңдеулер жүйесі алынып, сандық әдіспен шешілді. Бұл жұмыста дейтерий және тритий атомдарының қатынастары сәйкесінше: 60%-40%, 50%-50% және 70%-30%. Дейтерий және тритий атомдары үшін иондалу дәрежесі температураны жоғарылатқанда шектік мәніне дейін өсті.

Comparison of Java Web Frameworks: Spring MVC, Stripes and Apache Tapestry

Jalmukhambetov K.S.

International IT University, Information System Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The article compares three web application development frameworks on Java platform: Spring MVC, Stripes and Apache Tapestry. The comparison was made on the basis of the implementation of the same application with each of the frameworks, and used property tables for the analysis. Descriptions of the frameworks were reviewed, their functionality and performance were compared, also their strengths and weaknesses. Some consideration was given to the difficulty of application development and availability of the documentation. Since this comparison of three frameworks intended to assist in the selection of technology, a brief description on each of frameworks which is the most suitable for long-term projects is given in conclusion.

1. Introduction because the market is flooded with products that For the successful design of the project, promise only the best. developers must choose technology and tools that Wrong choice of technologies, in particular will maximally solve their task. The choice is easier frameworks to create a worksite application, can if the planner knows the technologies that are lead to poor quality of the final product, costly available. This also applies in the case of web maintenance and upgrades, and other problems. An frameworks in the Java platform, where the important criterion in the choice of technology is knowledge of good and bad features of frameworks also how difficult it will be long-term maintenance is crucial. It is difficult to choose a technology of applications.

55

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Several web frameworks were compared from object with feedback; you do not need to implement the world of Java: Spring MVC, Stripes and Apache any special interface framework or base class. Tapestry. The comparison takes into account the Spring Binding data is very flexible, for example, it information obtained in the development of the same considers some validation type mismatch errors, and app with all three shells. In all three applications therefore it can be processed in the application and compared the following characteristics: stealth and not as a system error. Thus, you do not need to unforeseen difficulties which may arise during the duplicate the properties of business objects, as development and performance in relation to the simple untyped strings for your objects forms [1]. response time and load time. An important criterion for comparison frameworks is their documentation 2.2. Stripes status or documentation, which is essential for the Stripes is inspired by the famous Apache Struts development of applications. framework, which was one of the first in the world The aim of the article is to simplify the selection JavaEE frameworks. Struts has a rich history and of the most appropriate of the three frameworks after 15 years of widespread support. Stripes through scrutiny and comparison of the features. For framework is formed as a simpler alternative to the developer, it is important to know the advantages Struts Framework, which has a very complex and disadvantages of the technologies that are structure. Stripes uses annotations and generics, available when designing projects. For consideration brought about by the Java 1.5. The main feature of would be given more factors such as: the impact of the framework is the rule that the agreement the framework on the quality of the projects, their override settings, which reduces the amount of maintenance, upgrades and personnel training. The adjustment in the project. The settings are in the file application used for comparison, is a web portal that web.xml as start-up parameters [2]. allows users to add and filtering conferences 2.3. Apache Tapestry regardless of the date, and their labels. By Apache Tapestry simplifies and accelerates web registering on the portal to create a new account, log development on Java platform, and by introducing in to the portal, adding the conference and reviews. an abstraction of the different elements of a Through the implementation of all three applications traditional development. Default components enable we recognize the course of development of easy execution of asynchronous calls which can be frameworks, their complexity, their characteristics of parameterized freely. The framework provides functionality and state documents. In comparison, application suitable concept deployment that also included functionality for integration and accelerates development [3]. verification data for multilingualism and the making of modern approaches to development. 3. Comparison of frameworks To begin with I would like to point out the work 2. Description of frameworks with the frameworks, the whole process of creating a 2.1. Spring MVC web application is much easier than without them. Spring MVC is built around a DispatcherServlet, When working with each of them, there are certain which distributes requests to handlers. As it is questions, misunderstandings, and therefore finding customizable mapping queries, locale, time zones, a solution or an answer has a different level of and more. The default handler is based on complexity. Described frameworks have similar annotations @Controller and @RequestMapping, features, as they all support the majority of them. which provide a wide range of flexible methods to The differences become apparent only in the process requests. After release Spring 3.0. application. Table 1 shows the differences between @Controller mechanism also allows you to create the frameworks, which can not be seen from the RESTful web sites and applications using documentation. @PathVariable annotation and other features. In Spring MVC you can use any object as command or Table 1. Comparison of functionality Functionality Spring MVC Stripes Tapestry Drives proposal Integrated drive a proposal    With a variety of drives proposal    The presence of the component library and    utilities

56

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Support the allocation    Integration and verification Verification and conversion formats    Checking on the client side    Integrating data in nested Java beans    Connectivity error checking a field and the   values The ability to display validation errors for    each field Following the MVC concept Strict dividing line between view and model    Strict dividing line between controller and    model Strict dividing line between controller and    view Informing view amending model    IoC Support for the IOC    Integrated possibility of developing an    application service Localization Use bundles of messages    Automatically connect fields with the    translated form Barbecue translation for a particular type of    error in multiple fields Infiltration value in the error message    Web services and asynchronous calls Integrated support for REST services    Integrated support for AJAX components    Possibility of implementation of SOAP    interface Integrated JavaScript libraries    Ways of learning and work Open source framework    Agreement before the configuration    The use of standard technologies    Gentle learning curve    Understandable and sufficient documentation    Table 2 shows the good and bad characteristics of described frameworks.

Table 2. Table of pros and cons

Framework Positive (+) and negative qualities (-) + Generality Spring MVC + Options for extending + Many existing modules + Strong backbone for the development of business logic + The classic and simple concept of MVC + Good support integration with other systems + Great Community + Lots of good documentation - Steep Learning Curve

57

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

- Functionality JSR-303 is not suitable - Integration of data is cumbersome + Simplicity Stripes + Enables rapid development of server-side logic + Good support localization + Business logic surrendered Spring framework + Gentle learning curve + Good documentation - Support the implementation of a web application works - Small community - Stagnation of development + Many components Tapestry + Many advanced functionalities + Good basic concept + Simple refresh rate does not work side - Very steep learning curve - Complexity complicates maintenance and learning - Limited parameterization components - Instability and errors in API - Frequent changes API - Poor documentation

4. Conclusion Tapestry framework does not have sufficient In this section, we compare the features of literature, Spring MVC boasts more documentation frameworks Spring MVC, Stripes and Tapestry whereas it is also more present on the market [4]. according to various criteria. Compared frameworks Stripes framework satisfactory documentation, are similar and differ only in certain points. Stripes although not much. For these reasons, it is framework in exchange for a clean and easy recommended to use Spring and Stripes framework programming interface offers only the bare for all sizes of projects, because they are faster, more minimum of functionality for the development stable and have the best documentation. server part of a web application. Stripes specific functionalities left to others frameworks. Spring 5. Reference MVC Framework offers a classic interface and a full [1] Rod Johnson. (March 15, 2016). Spring MVC range of solutions for the development of the Framework Reference Documentation. server portion of the web and other applications. Available at: Tapestry brings functionality, enabling the http://docs.spring.io/spring/docs/current/spring- development of advanced dynamic applications with framework-reference/pdf/spring-framework- asynchronous components, ability to back-office reference.pdf services and other solution, but due to this [2] Frederic Daoud, Stripes: ... and Java web framework is complex. Tapestry is difficult for development is fun again. developing, maintaining, and learning. The problem Raleigh, ZDA: Pragmatic Bookshelf, 2008. is the stability of the API, which changes often. [3] Alexander Kolesnikov, Tapestry 5: Building There has been only the difference in loading the Web Applications, Birmingham, entire page by Tapestry framework, which on VB: Packt Publishing, 2008. average requires about 200 ms more than the other [4] InfoQ. (March 19, 2016). Top 20 Web two. Load times is probably due a larger number of Frameworks for the JVM. Available at: static resources that must download the client from http://www.infoq.com/research/jvm-web- the server and delays. frameworks

58

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Сравнение Java веб фреймворков: Spring MVC, Stripes и Apache Tapestry

Джалмухамбетов К.С.

Международный Университет Информационных Технологий., Кафедра Информационных Систем, Казахстан, 050040 г. Алматы, ул. Манаса/ Жандосова, 34 «А»/8 «А»

В статье ведется сравнение трех фреймворков для разработки веб-приложений на платформе Java: Spring MVC, Stripes и Apache Tapestry. Сравнение проводилось на основе реализации одного и того же приложения с помощью каждого фреймворка и анализом их свойств выявленных при разработке. Были описаны свойства фреймворков, сравнены их функциональность и производительность, а также их сильные и слабые стороны. Некоторое внимание было уделено к сложности разработки приложении и наличии документации. Так как сравнение предназначалось для оказания помощи в выборе фреймворка, в заключении дается краткое описание для каждого из них, выявляющий наиболее подходящего для разработки долгосрочных проектов.

Java веб фреймворктарын салыстыру: Spring MVC, Stripes және Apache Tapestry

Джалмухамбетов К.С.

Халықаралық ақпараттық технологиялар университеті, Ақпараттық Жүйелер Кафедрасы, Қазақстан, 050040 Алматы қ., Манас 34 «А»/ Жандосов 8 «А» көш. қиылысы

Мақалада Java платформасында веб-бағдарламаларды жасайтын үш фреймворктың салыстырмасы жүргізіледі: Spring MVC, Stripes және Apache Tapestry. Салыстыру бір бағдарламаны әрбір фреймворктың көмегімен жүзеге асыру негізінде жасалынды және оларды жобалау кезінде анықталған қасиеттері талданды. Фреймворктар қасиеттері сипатталынады, олардың функционалы және өнімділігі салыстырылады, сондай-ақ олардың күшті және әлсіз жақтары көрсетіледі. Кейбір назар бағдарламаны дамыту күрделілігіне және құжаттама қолжетімділігіне берілді. Салыстырулар фреймворк таңдауға көмек көрсету үшін арналған болғандықтан, ұзақ мерзімді жобаларды дамытуда олардың ең қолайлысын анықтауға әрқайсысына қысқаша сипаттамасы қорытындыда беріледі.

Development of methods and algorithms of search solutions for the interoperability system

Jalmukhambetov K.S, Serbin V.V.

International IT University, Information System Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

Search of decisions that is applicable for the information system on interchangeability of teachers during an educational process on the basis of curriculum of teachers and pedagogical loading engines are worked out in this article, differ multicriterion approach of search of decisions.

1. Introduction Library for reading data from excel, used Stripes To export data from excel to database information of framework for design of an application, and uses the teachers, groups of students and schedule of excel MySQL-connector as connection technology to format into the target Java list of objects, there were database[1]. The system defines a structure of excel developed the information system which makes spreadsheets and gives all the missing features that a decision by mutual substitution of teachers on the database has, realizes exporting the massive data of basis of teachers schedules, taking into account the excel into the database format that convenient for teaching load. The system uses NetBeans as the integrating and managing the multiple data required development tool, object-oriented language Java as for regular lecturing process in the International IT the programming language, MySQL as the University(IITU). background database, POI-HSSF as the apache

59

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

2. Database development The data is defined in a grid structure. Where A spreadsheet document is meant to store small each cell of the grid is defined by its corresponding scale of data in comparison to a database. unique row and column number. Each grid Spreadsheets enable an end user with no application represents what is called a Worksheet in Excel. programming experience to store and manage a There can be many such worksheets included in a dataset of limited size. The data is normally single Workbook. A workbook represents a folder represented in the standard numeric or text data type like wrapper to hold the different worksheets that for each column [2]. might be related to each other. Each column in the A database has the same structure as a spreadsheet can hold data of a different data type. spreadsheet in terms of rows and columns but is The most common data types defined in Microsoft designed to provide storage for large scale data. It Excel are number, text, date, currency. also provides better data integrity and consistency. A database is designed to process high level queries on the stored tabular data. This is done using high level query languages like SQL.

Picture 1 – Database of the information system of interchangeability

Spreadsheet documents lack a definite structure. For example, consider a spreadsheet for storing teacher information, the spreadsheet has columns that specify the teacher id, name and salary. The id and salary are numeric fields as you would expect while the name stores data in the form of characters. A spreadsheet document however does not explicitly force these rules, the name field could be populated with a numeric value and the id or salary fields could hold characters. When trying to convert a spreadsheet into a database this rule is of critical importance since a database strictly enforces data type rules for its columns. This article describes extracting data from a spreadsheet and converting it Pic. 2 – Algorithm of work on method 1 into a database table by determining the data types of the columns and in the process defining a In order to define a structure for the spreadsheet structure to the spreadsheet data [3]. the project will use MySQL database. The data needs to be pre-processed before it is fit for

60

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan conversion into a database table. The pre-processing includes cleaning of data and its validation. Cleaning of data here refers to removal of bad data, for example a column ID that stores values about an employee’s ID cannot contain special characters in it. Such data has to be removed from the spreadsheet. The cleaning phase will check for such inconsistent values in the spreadsheet and warn the user about their presence. The pre-processing phase is also responsible for dealing with the missing values in the file. These values can either be imputed and replaced with appropriate data or be considered as blank when converting into a table. The design for the project includes a standalone JAVA based application used to convert a given spreadsheet into a database table. The application is designed to take as input the file locations for the spreadsheet along with the database details to open the database connection. The details include the database name, the username and password to make a database connection. When importing the excel spreadsheet the application uses a path to the Excel file that a user can input on the file to import field [5,6]. Before the user can import the spreadsheet into the database, the spreadsheet has to be examined for missing and invalid data. The missing values pose a data consistency problem. The problem however with imputing values is that the there is data loss associated with it, the original data will loose meaning since imputation of values is done using either the mode and mean for numeric values or by using the values with the most occurrences in the case of nominal or string values. The data loss depends on the type of dataset that is being used. A dataset that has a high number of numeric columns representing static data like prices for an item for example can be imputed while a numeric column that stores the ID for an employer cannot Pic. 3 – Algorithm of work on method 2 [7]. The database of the system on the decision- Block diagram of algorithm is presented on making of interchangeability is presented on picture picture 2. 1. Method 2. Essence of method consists in the 3. Development of methods and algorithms of search of teacher that can replace other teacher on work of the system condition that a replacing teacher is free at that time, In the system 2 methods of search of decision are that requires to be replaced and a replacing teacher used: potentially can conduct replacing discipline on the Method 1. Essence of method consists in the basis of base of knowledge of the before entered search of teacher that can replace other teacher on disciplines on loading. condition that a replacing teacher is free at that time, Block diagram of algorithm is presented on that requires to be replaced and they conduct picture 3. different disciplines in one group (thread), and also a teacher that is replaced can conduct class of 4. Conclusion replacing teacher in the same group (thread).

61

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Search of decisions that is applicable for the Shafer decision model/ K.-M. Osei-Bryson// informative system on interchangeability of teachers International Journal of Intelligent Systems, 2003, during an educational process on the basis of Vol. 18, p. 129-148. curriculum of teachers and pedagogical loading [5] Ringuest J., Rinks D. Interactive solutions for engines are worked out in this article, differ the linear multiobjective transportation problem// multicriterion approach of search of decisions. European Journal of Operational Research, 1987, Vol. 32(1), p. 96-106. 5. Reference [6] Schubert, J. On p in a decision-theoretic [1]. Айзерман М.А., Алескеров Ф.Т. Выбор apparatus of Dempster-Shafer theory/ J. Shubert// вариантов: основы теории. -М.: Наука, 1990. 240 International Journal of Approximate Reasoning, с. 1995, Vol.13, p. 185-200. [2]. Ахо А., Хопкофт Дж., Ульман Дж. [7] Shafer G.A. Mathematical theory of evidence. Построение и анализ вычислительных Princeton University Press, 1976, p. 182. алгоритмов. М.: Мир, 1979. 536 с. [8] Stanciulescu C., Fortemps Ph., Installe [3] Moore R.E. Interval analysis. Englewood M.,Wertz V. Multiobjective fuzzy linear Cliffs. N.J.: Prentice-Hall, 1966, p. 250 programming problems with fuzzy decision [4] Osei-Bryson, K.-M. Supporting knowledge variables. European Journal of Operational elicitatiton and consensus building for Dempster- Research, Vol. 149, Issue 3, 2003, p. 654-675.

Разработка методов и алгоритмов поиска решений для системы взаимозаменяемости

Джалмухамбетов К.С., Сербин В.В.

Международный Университет Информационных Технологий., Кафедра Информационных Систем, Казахстан, 050040 г. Алматы, ул. Манаса/ Жандосова, 34 «А»/8 «А»

В данной статье разработаны алгоритмы поиска решений, которые применимы для информационной системы по взаимозаменяемости преподавателей во время учебного процесса на основе расписания преподавателей и педагогической нагрузки, отличающиеся многокритериальным подходом поиска решений.

Жүйенің өзара іздеу шешімдер әдістері мен алгоритмдерін дамыту

Джалмухамбетов К.С., Сербин В.В.

Халықаралық ақпараттық технологиялар университеті, Ақпараттық Жүйелер Кафедрасы, Қазақстан, 050040 Алматы қ., Манас 34 «А»/ Жандосов 8 «А» көш. қиылысы

Бұл мақалада, көп критериалдық әдіспен шешімдерді іздеумен ерекшеленетін, оқытушылар кестесі мен оқу жүктемесі негізінде оқыту процесі кезінде ақпараттық жүйенің мұғалімдердің өзара алмасу шешімдерін іздеу алгоритмдері жобаланған.

Hierarchical description of the basic model of software

Khasenova G.I, Khaimuldin N.G.

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The article deals with the description of the software model as a description of a complex hierarchical system. Permission for the definition of the basic system and basic levels of description. Hierarchical description of the software is considered as the processes included in the software life cycle, called stages. Are considered and defined the concept of phases requirements definition software, , software construction, . On the basis of the hierarchical description of the software models constructed a basic model software.

62

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Introduction throughout software lifecycle. Under lifecycle Any complex system can not be described fully understand the entire period of its development and and in detail, which essentially follows from the operation (use), starting from the moment of its definition of such a system [1], since it is necessary design and ending with the termination of all types to find a compromise between ease of description, of use. The life cycle includes all the processes of and the need to consider the many behavioral creating and using software. characteristics of complex systems. Resolution of Stages of the software lifecycle: this problem is sought in a hierarchical description.  Development planning A complex system is given by the family of models,  Determination of requirements for each of which describes the behavior of the system development from the point of view of different levels of  Program design abstraction. For each level there are a number of  Engineering program characteristics and variables, laws and principles by  Testing program which the described systems and behavior. Efficacy  Exploitation program is determined by a hierarchical description of Each stage has its own specific methods and tools independent models for different levels of the for monitoring and ensuring the reliability of the system. To distinguish the concept from other software, as well as descriptions of the stages of the hierarchy, the term basic system, or the basic program. description. Levels of abstraction basic description The step of determining software requirements of the system are called phases. Each software tool is a specific inverter data, the At each step in the hierarchy of structures has its behavior and properties of which are determined in own set of variables, which allow a large extent limit the process of creating this tool, based on the solution the study of only one phase. of some problems. To the program are requirements General characteristics of the base system in the form of agreements between the customer and description: supplier. 1. Selection of steps in terms of which is Under the requirements of the program to described by the system depends on the observer, his understand the properties that must have this program knowledge and interest in the activities of the for the adequate performance of the functions system, although for many systems, some steps seem assigned to it [2]. natural. According to the international terminology [3] 2. Aspects of the description of the system The requirements include the following descriptions: functioning at different stages in the general case are • description of the conditions or capabilities not linked, so the principles and laws that are used necessary for the user to solve problems or achieve for system performance at any level. set objectives; 3. There is an asymmetrical relationship • description of the conditions or features that between the conditions of functioning of the system should have a system or system components to at various stages. Requirements for the system at any perform the contract or to meet the standards, stage, act as conditions or restrictions on the specifications or other formal documents; activities of subordinate stages. It also means the • documented representation of the conditions or presence of feedback in hierarchical systems to capacity of the system design. outcomes. Basic requirements can be divided into the 4. At each stage has its own set of terms, following groups: concepts and principles. 1. A group of functional requirements 5. An understanding of the system increases Functional requirements define functionality with the gradual transition from one to the other: the (behavior) of the program, which must be created by lower down the hierarchy, the more detailed developers to allow users perform their duties within disclosure of the system becomes, the higher the the framework of business requirements and in the climb, the clearer it becomes the meaning and context of user requirements; significance of the whole system. 2. A group of non-functional requirements is a Thus, for a proper understanding of a complex requirement due to some excl conditions developed system plays a fundamental role hierarchical software: approach to describe the system.  Business rules;

 External interfaces; Analysis of the stages of the software life cycle  Quality attributes; Evaluation of the quality and reliability made

63

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

 Restrictions. The main type of test used to verify compliance System requirements describe the high-level with the actual behavior of the working copy of the requirements for software containing a few or program to the expected behavior in accordance with many interrelated subsystems and applications. At the specification and requirements of starting a the same time, the system can be either entirely functional testing [5]. software and composed of software and hardware Functional tests should cover all functions parts. [4]. implemented in view of the most likely types of Requirements gathering is the primary and errors. Test scripts that combine individual tests, indispensable step in the software development focused on checking the quality of the functional process. It is to identify a set of functions to be tasks. implemented in the product. The problem of functional testing consists of: At the stage of determining the basic • identification of the set of functional requirements of activities to ensure the reliability of requirements; the software is the validation and verification of the • Identification of external functions and the generated requirements. construction of sequences of functions in accordance Let si- i- requirement specification program with their use in the MS; formulated at the stage of determining the • identification of a plurality of input data of each requirements for the software. Then the set function and the identification of areas of change; • construction of test suites and test cases S = {si :i = } (1) the set of all program requirements specification functions; stage of defining software requirements. • Identification and representation of all the functional requirements using test kits and conduct Stage design software. testing errors in the program and in the interaction Designing describes architecture definitions, with the environment. components, interfaces, and other characteristics of We denote by ci ' many opportunities working the system or its components. The result of the copy of the program to execute i-oe requirement design process - design. according to its specifications. Then the set At the design stage on primary activity is the C' = {ci' : i = } (4) analysis and evaluation of the quality of software There are many functions of the working copy of design: the software, implementing all the requirements of • analysis of the design quality attributes the specifications of the program.Based on the • equipment design quality assessment above-described basic moded consider software as a • dimensions (metric) set of requirements that it must implement.At each Let si '- i program requirement specifications defined stage of the life cycle of these requirements will be at the design stage software. Then the set represented as follows(Figure1.) Figure 1 - Basic model program S'={si':i = } (2) the set of all program requirements specification si - i specification requirements at the stage of stage of defining software requirements. determining the requirements of the program; Stage design software si '- i specification requirements at the design stage; Designing describes architecture definitions, ci - the set of code blocks realizing i-oe a components, interfaces, and other characteristics of requirement of the program; the system or its components. The result of the ci'- opportunity ready instance of the program design process - design. comply with the requirement i according to its At the design stage on primary activity is the specifications. analysis and evaluation of the quality of software Thus, the life cycle of software - P is a set of sets: design: Р = ( S , S', С,C'), where (5)  analysis of the design quality attributes S = {si:i = } - many requirements to the  equipment design quality assessment program at the stage of determination;  Dimensions (metric) S'={si':i = } - set of software requirements Let ci '- i program requirement specifications at the design stage; defined at the design stage software. Then the set С = {сi : i = } - a plurality of code blocks;

С = {сi : i = } (3) C' = {ci': i = }- many functions of the It is the union of sets of code blocks that implement working copy of the program, implementing the all the requirements of the program specification. requirements of the specifications of the program.

64

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

On the basis requirements is under construction the 4. Khassenova G.I., Amanzholova S.T., base Model representing the program at a functional Khaimuldin N.G.// Testing of the information level. system for quality.//Work References books of the Third Internatoinal scientific-practical 1. M.Mesarovich, D.Mako, I.Takakhara // The conference “Status, problems and challenges of theory of hierarchical systems // — Mir, 1973. information in Kazakhstan”, 2014 UDK 004-075.8, 2. K.I.Wigers, // Development of software p. 256. requirements // — Russian edition, 2004 — 340 с. 5. Khassenova G.I., Amanzholova S.T., 3. V.G. Volkov// A systematic approach to Khaimuldin N.G.// Models and algorithms of testing quality assurance software // Tr. XII Mezhdunar. software.// Management and Society The 13th nauch.-prakt. konferencii «Sistemnyj analiz v International Scientific Conference Information proektirovanii i upravlenii» Saint-Peterburg, 24-26 Technologies and Management 2015 April 16 – 17, june 2008. Riga, Latvia

Иерархическое описание базовой модели программного обеспечения

Хасенова Г.И, Хаймульдин Н.Г

Международный Университет Информационных технологий, кафедра Компьютерной Инженерии и Телекоммуникаций, 34 «А»/8 «А» пересечение ул. Манаса./Жандосова ., Алматы 050040, Казахстан

В статье рассматривается описание моделей программного обеспечения как описание сложной иерархической системы. Введено определение термина базовой системы и уровней базового описания. Иерархическое описание программного обеспечения рассматривается как процессы, включенные в жизненный цикл программного обеспечения, называемые этапами. Рассмотрены и определены понятия этапов определения требований ПО, проектирования ПО, конструирования ПО, тестирования ПО. На оснований иерархического описания моделей ПО построена базавая модель ПО.

Бағдарламалық қамтамасыз ету негізгі моделін иерархиялық сипаттамасы

Хасенова Г.И, Хаймульдин Н.Г

Халықаралық ақпараттық технологиялар университеті, Компьютерлік Инженерия және Телекоммуникация кафедрасы, 34 «А»/8 «А» Манас./Жандосов көшелерінің қиылысы., Алматы 050040, Қазақстан

Мақала күрделі иерархиялық жүйесінің сипаттамасы ретінде бағдарламалық қамтамасыз модельдер сипаттамасы қарастырылады. Негізгі жүйенің және негізгі деңгейдің сипаттамасының анықтамасы берілді.

Analysing the process of the company

Khasenova G.I, Khaimuldina G.M.

International IT University, Economics And Management Departement, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The article provides an overview of risk analysis, including risk assessment methods and risk mitigation or reduction of its adverse consequences. Selection of a particular method of analysis of investment risk depends on the knowledge base, the requirements for the final results (indicators) and the level of reliability of investment planning. A general risk management process. The results of applying different methods to the same project

65

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

complement each other. It is shown that at present the most effective is a comprehensive approach to risk analysis. On the one hand, this approach allows you to get a better idea of the possible outcome of the project, ie, all positive and negative surprises prospective investors, and on the other hand, it makes possible a wide application of mathematical methods (especially probabilistic and statistical) analysis of risks.

Introduction Final results of the qualitative risk analysis, in Any company is exposed to various types of risks turn, serve as a source of information for - internal, that arise in the management of the quantitative analysis. However, implementation of company and external, risk exposure to the external quantitative assessment and meets the greatest environment surrounding the organization. The large difficulties related to the fact that the relevant number of species of risk situations, makes it background information needed to quantify risk. necessary to take them into account, analysis and Qualitative risk analysis allows to detect and management. At the risk companies face is always in identify the possible types of risks inherent in the addressing both current and long-term objectives. project, also in the qualitative analysis identifies and There are certain types of risks, which are subjected describes the causes of and factors affecting the to the action of every single business organizations. level of risk. In addition, it is necessary to describe But along with common types of risk are specific and give a valuation of all the possible consequences types of risk specific to certain types of activity: of a hypothetical implementation of the identified banking risks different from risks in the insurance risks and propose measures to minimize and / or operations, and they, in turn, risks in the compensate for these effects by calculating the manufacturing business. Species diversity of the valuation of these activities. In a qualitative analysis risks enormous - from fires and natural disasters to of detected and identified possible types of ethnic conflicts, changes in legislation regulating investment project risks. entrepreneurial activity and inflation fluctuations. In consideration of the qualitative risk analysis as An imminent challenge of modern controlling the study of the processes, the risk analysis can be becomes systematic analysis of opportunities and divided into the following stages: risks relevant to the company. The purpose of the 1. identification (determination) the possible risk management system is to increase the intra- risks; transparency, the development of risk-based 2. description of the possible consequences thinking and self-responsibility of all employees. (damage) the implementation of identified risks and The main stages of building an integrated system their valuation; of operational risk management are: 3. a description of possible measures aimed at  Risk Analysis reducing the negative impact of the risks identified,  Risk Planning with an indication of their value;  Risk Management 4. Research on the qualitative level of the  Risk Tracking investment project risk management capabilities:  Documenting risks risk diversification, risk aversion, risk compensation, This article provides an overview of risk analysis the localization of the risk. stage - a procedure to identify risk factors and assess Qualitative analysis of investment risks is their significance, ie, an analysis of the likelihood conducted at the stage of developing a business plan that there will be some adverse events negatively and a mandatory complex examination of affect the achievement of the objectives of the investment project allows you to prepare a wealth of project. Risk analysis includes risk assessment and information to get started on the risk analysis. The risk mitigation techniques or reduce related adverse main results of the qualitative risk analysis are: the effects. identification of the specific risks of the investment Risk analysis can be divided into two mutually project and their causes, the analysis and the value complementary type of qualitative and quantitative equivalent to the hypothetical consequences of a [1]: possible implementation of the mentioned risks, the  Qualitative analysis determines that identify proposal of measures to minimize the damage and factors region and types of risks. their valuation. Additional, but also very important  Quantitative Risk Analysis should enable qualitative analysis of the results should include the definition of the boundary values of a possible numerically determine the size of the individual change of all factors (variables) of the project to be risks and the risk of the enterprise as a whole.

66

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

checked for risk. require more information - in the final justification Selection of a particular method of analysis of of the investment. For smaller projects, you can investment risk depends on the knowledge base, the restrict the methods of sensitivity analysis and requirements for the final results (indicators) and to adjusting the discount rate, for large projects - to the level of reliability of investment planning. conduct simulations and build probability In the process of qualitative risk analysis distribution curves, and in the case of project results investigates the causes and risk factors contributing depending on the occurrence of certain events or the to their dynamics, and then describes the possible adoption of certain decisions and to build decision damage caused by manifestations of risk and tree. Methods of expert estimates include a set of valuation. Since the project's effectiveness logical and mathematical-statistical methods and calculations are based on the construction of its cash procedures related to the activities of the expert flow, the value of which may change as a result of processing necessary for analysis and decision- the implementation of each of the mentioned risks, it making information. Central "figure" expert is important for the analyst quantitative impact procedure is himself an expert - a specialist, using assessment carried out at this stage, expressed in his abilities (knowledge, skill, experience, intuition, value terms. In addition, the analyst also important etc.) to find the most effective solutions. evaluation foreseen for the next step of measures For risk analysis the following main methods of aimed at reducing the negative impact of the expert estimates [3]: identified risks. It is necessary to choose the right  SWOT-analysis ways to reduce investment risks, as well as proper  Rose and spiral risks risk management will allow us to minimize the  The risk assessment phase of the project losses that may arise in the implementation of the  Delphi Method project and reduce the overall riskiness of the project The results of applying different methods to the [2]. same project complement each other. Currently, the Final results of the qualitative risk analysis, in most effective is a comprehensive approach to risk turn, serve as a source of information for analysis. On the one hand, this approach allows you quantitative analysis. However, implementation of to get a better idea of the possible outcome of the quantitative assessment and meets the greatest project, ie, all positive and negative surprises difficulties related to the fact that the relevant waiting investor and on the other hand, makes background information needed to quantify risk. possible a wide application of mathematical methods Quantitative analysis of the investment risks of (especially probabilistic and statistical) analysis of the project involves a numerical definition of the risks. quantities of certain risks and risks - of the whole In the context of the action of various external project. The quantitative analysis is based on the and internal risk factors can be used various ways to theory of probability, mathematical statistics, theory reduce the risk of acting on one or another aspect of of operations research. the enterprise. The challenge of the quantitative analysis is a 1. Identification of risks. numerical measurement of the impact of the project The identification process can be constructed as risk factors, changes in the behavior of the criteria for a complete list of risks, which occur in a particular project performance. In practice, most of the project, most of the parameters are specified for all following methods for the quantitative analysis of selected risks in the list of their properties. investment projects risks apply: 2. Categorization of risks in the course of which  adjust the discount rate method; each risk is attributed to one of three categories,  sensitivity analysis of performance affecting the method of monitoring, preventing and indicators (net present value, internal rate of responding to risk. return, profitability index, etc.). 3. Plan monitoring, preventing and responding to  method of scenarios; risks. The result of this phase will be plans for  decision trees; monitoring, prevention and response to various  simulation - Monte-Carlo method. categories of risks. In these plans the specific person These methods for the quantitative analysis of responsible for monitoring, describes the rules of investment risk based on the concept of time value work, given the specific actions to prevent or of money and probabilistic approaches. respond to the risk will have to be spelled out. Methods of risk analysis should be applied 4. Stage monitor, prevent and respond to risks is comprehensively, using the most simple of them on iterative and is performed in accordance with the the preliminary assessment stage, and complex and planned regulations.

67

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

As part of this process on a periodic basis, 2. Попов, Ю.И. Управление проектами. there is a return to the previous process, since it is Учебное пособие / Ю.И. Попов, О.В. necessary to constantly reschedule a flexible risk Яковенко.- М.: ИНФРА-М, 2011.- 208с.- management in connection with the changing (Учебники для программы МВА). conditions. 3. Jack, R.Meredith. . A 5. The procedure for analyzing the effectiveness Managerial Approach / R.Meredith Jack, of risk management. J.Mantel Samuel.- Eighth edition.- Printedin The result of which it becomes an analytical note Asia: Wiley, 2012.- 586р. from the findings on the success of risk 1. Kulikova E.E. Upravlenie riskami. management, estimates earnings / expenses in Innovacionnyj aspekt. M.: Berator-Pablishing, connection with the implementation of risk 2008. - 112 s. management procedures, recommendations to 2. Popov, Ju.I. Upravlenie proektami. Uchebnoe change the base of known risks. posobie / Ju.I. Popov, O.V. Jakovenko.- M.: 6. Update databases of known risks. INFRA-M, 2011.- 208s.- (Uchebniki dlja At this point, the database is brought new programmy MVA). information and new knowledge gained in the course 3. Jack, R.Meredith. Project management. A of the project. Managerial Approach / R.Meredith Jack, J.Mantel Samuel.- Eighth edition.- Printedin References Asia: Wiley, 2012.- 586р. 1. Куликова Е.Е. Управление рисками. Инновационный аспект. М.: Бератор- Паблишинг, 2008. - 112 с.

Анализ процесса управления рисками компании

Хасенова Г.И, Хаймульдина Г.М.

Международный Университет Информационных технологий, кафедра Экономики и Бизнеса, 34 «А»/8 «А» пересечение ул. Манаса./Жандосова ., Алматы 050040, Казахстан

В статье дан обзор анализу рисков, включая оценку рисков и методы снижения рисков или уменьшения связанных с ним неблагоприятных последствий. Выбор конкретного метода анализа инвестиционного риска зависит от информационной базы, требований к конечным результатам (показателям) и к уровню надежности планирования инвестиций. Представлен общий процесс управления рисками. Результаты применения различных методов к одному и тому же проекту дополняют друг друга. Показано, что в настоящее время наиболее эффективным является комплексный подход к анализу рисков. С одной стороны, такой подход позволяет получать более полное представление о возможных результатах реализации проекта, т.е. обо всех позитивных и негативных неожиданностях, ожидающих инвестора, а с другой стороны, делает возможным широкое применение математических методов (в особенности вероятностно- статистических) для анализа рисков.

Компанияның тәуекелдер үрдісін талдау

Хасенова Г.И, Хаймульдина Г.М.

Халықаралық ақпараттық технологиялар университеті, Экономика және Бизнес кафедрасы, 34 «А»/8 «А» Манас./Жандосов көшелерінің қиылысы., Алматы 050040, Қазақстан

Мақалада тәуекелдерді бағалау әдістері және тәуекелдердің деңгейін төмендету немесе оның қолайсыз зардаптарын азайту, соның ішінде тәуекелді талдау шолуын ұсынады. Инвестициялық тәуекел талдау нақты әдісін таңдау, білім базасында қорытынды нәтижелері (көрсеткіштері) және инвестициялық жоспарлау сенімділік деңгейіне қойылатын талаптарына байланысты. Сол жобаға әр түрлі әдістерін қолдану нәтижелері бір-бірін толықтырады. Ол қазіргі уақытта ең тиімді тәуекел талдау кешенді көзқарас екенін көрсетілген. Бір жағынан, бұл тәсіл, яғни, жобаның ықтимал нәтиже жақсы идеясын алуға мүмкіндік береді, барлық оң және теріс тосын әлеуетті инвесторлар, ал екінші жағынан, ол математикалық әдістерін ықтимал кең қолдану тәуекелдерді (әсіресе ықтималды-статистикалық) талдау жасайды.

68

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Usage of re-engineering in higher education institution

Khassenova G.I., Auelbekova B.A., Turgambayev M.K.

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan The article deals with improving the higher education management system. In accordance with changes in social and economic life of society have changed requirements for the level and quality of education of other stakeholders. The increased demands of society in the quality of education have made it a fundamental characteristic in the evaluation of higher education institutions as a whole. The changes occurring in the external environment of a higher educational institution, require an adequate response of universities and, above all, the introduction of organizational and managerial innovations, including strategic planning; scorecard; Total Quality Management; Performance-based budgeting; project management; business process reengineering and other management innovations.

1. General . Nonconformity of structures and management Improving of the higher education management methods for issues to solve; system in the context of innovative knowledge- . Incoordination of goals and objectives on the based economy, innovative projects and high-tech different management levels; technologies is one the most important socio- . Dominance of problems of operational economic problems. The improving necessity of management over strategic; higher education management system in modern . Inefficiency of implementation of managerial times is determined by constant and rapidly innovations as a result of parallel implementation. changing organizational and economic conditions of Solution of described problems in the process of higher education institutions activity, fierce implementation of innovational management competition in the education services market, methods considers integration of different methods slippery and unstable position of the government in based on process management, and business relation to higher education institutions. Higher processes re-engineering (primarily managerial education institutions, after became the full-fledged business processes). It allows including the subjects of the market economy, independently structural units and personnel of higher education determine the directions of development, goals and institution in the higher education institution achieving methods coordinating them with the management, increase their interests and government policy objectives in the field of responsibility for results, evaluate the contribution to education. The requirements for the level and quality the achievement of the strategic objectives and of the education of others interested individuals have performance indicators. been changed in accordance with the changes in the In spite of works presence describing the social and economic life. The increased demands of structure and features of re-engineering tools the society on the quality of the higher education application in a modern economy, not enough made it like a fundamental criterion in evaluating of attention for study of re-engineering usage in higher education institutions’ activity. organization management system is paid in All changes occurring in external environment of economic literature. Most of works are focused on higher education institution require and adequate the re-engineering carrying out for industrial response of higher education institution as well as enterprises; questions of possibilities of re- implementation of organizational and managerial engineering usage in education as well as usage innovations, including strategic planning; balance features are highlighted extremely rare. score card; general quality management; result Solving the problem of modernization of oriented budgeting; project management; business education by the way of improving the quality and processes re-engineering and other managerial effectiveness activity, higher education institutions innovations. use innovative management techniques. Researches Nowadays, implementation of the managerial have shown that quality management system (QMS) innovations in university management meets with and balance score card (BSC) are the most some problems, the most important of which include productive for universities nowadays. the following:

69

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Today, the main tool for the effective objectives. However, it can be seen as a means to management of all university activity’s processes is assess the impact and effectiveness of individual the QMS, implementation of which is a mandatory business processes involved in achieving this goal. requirement of the Ministry of Education and Building the new innovational management system, Science of the Republic of Kazakhstan during the BSC is used as a system of indicators and state accreditation of university. However, university assessment criteria. Methods of BSC, strategic business processes re-engineering can be carried out management and business processes re-engineering by a smooth improvement in QMS or by radical can be combined (Picture 1). improvement for achieving dramatic improvements The integration of the considered methods allow: in critical performance metrics. There is a need to . move from strategy to aggregate business transition to a strategy based on reasonable processes that require attention, and reasonably combination of both approaches. After realization apply to these processes, innovative methods to and selection of organization’s business processes, it improve performance; must be determined which processes run more or . link the quality policy with the strategy; less effectively (it is enough for them to undertake . determine the causal set of targets for processes gradual improvements) and which run so bad (it is and performance indicators these objectives; easier to build them again, and only after they will . identify activities, resources, timeframes and start working, you can talk about their responsibility required for the attainment of improvement). Re-engineering is directed for such objectives. processes. Objective prerequisites of application reengineering management system innovation of the University are the problems of education that require urgent solutions, scrupulously offer reengineering, rather than gradual improvement. Justification application of reengineering in the higher education institution develops on the basis of both external and internal factors of the existence of higher educational institutions today. By the assumptions of the environment include effects of government reforms in the education system and the demands of the market, and internal prerequisites shall be derived from the characteristic of the modern higher education institution. Picture 1 – Integration of innovative management With an integrated approach to the use of practices innovative management methods application reengineering lead to a redesign of processes and Thus, business processes re-engineering means introduction of new processes, ensuring their restructuring of existing and creation of absolutely implementation and the achievement of common new and more effective business processes in order goals. to improvement of higher education institution Implementation of re-engineering in the management system for achieving socially introduction of innovative methods of management significant results as: 1) independent method and 2) in the higher education institution is conducted in method providing in case of implementing the form of a draft, which is provided by three innovative managerial methods, such as the QMS groups of resources: main, infrastructure and and the MTSP. management resources. As core resources should be It is proposed to use the balanced score card considered the staff of the Faculty departments as (BSC) for the evaluation of innovative changes in well as the structural subdivisions of the staff of the the work. BSC is a system of company’s strategic educational institution, because understanding and management based on measurement and evaluation interest of each employee of the organization of its effectiveness to recruit optimally selected depends on the success of the ongoing indicators that reflect all aspects of the organization's transformations. For reengineering of each business activities, both financial and non-financial. Feature unit should be created the project team of workers of BSC usage related to an educational institution is units, because they themselves must come to a the presence of additional indicator. BSC indicator is decision on its future development strategy. a meter that indicates the degree of attainment of Determining incentive at this stage is to offset the

70

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

authority to lower levels of the organizational 2 References hierarchy that leads to the freedom of action and 1. Каплан Р.С. , Нортон Д.П. Сбалансированная understanding of the responsibility of each employee система показателей. От стратегии к действию. – for formulated goals and objectives, as well as the М.: ЗАО «Олимп-Бизнес», 2003 ongoing changes. 2. Бедрина С.Л., Богданова О.Б. Развитие To control resources should be considered as информационной системы управления functional units, which are aimed at the development деятельностью кафедры вуза на основе of the goals and objectives of the University, the реинжиниринга в условиях внедрения кредитной BSC and their normative values. The University системы / Инфокоммуникационные системы и Administration Department carries out the monitors технологии: проблемы и перспективы / Под ред. of implementation, monitoring and review of current Канд. Техн. Наук, проф. А.В. Бабкина. СПб.: results, as well as makes a decision on the Изд-во Политехн. Ун-та, 2007. С.498-542 adjustment of the aims and objectives of the University. The University as a whole presented the draft University top management provides overall direction.

Применение реинжиниринга в вузе

Хасенова Г.И. , Ауельбекова Б.А., Тургамбаев М.К.

Международный Университет Информационных технологий, кафедра Компьютерной Инженерии и Телекоммуникаций, 34 «А»/8 «А» пересечение ул. Манаса./Жандосова ., Алматы 050040, Казахстан

В статье рассматриваются совершенствования системы управления высшего образования. В соответствии с изменениями в общественной и экономической жизни общества изменились требования к уровню и качеству образования других заинтересованных сторон. Возросшие требования общества к качеству образования сделали его основополагающей характеристикой при оценке деятельности высших учебных заведений в целом. Изменения, происходящие во внешней среде высшего учебного заведения, требуют адекватной реакции вузов и, прежде всего, внедрения организационно-управленческих инноваций, включающих стратегическое планирование; систему сбалансированных показателей; всеобщий менеджмент качества; бюджетирование, ориентированное на результат; управление проектами; реинжиниринг бизнес-процессов и другие управленческие инновации.

Жоғары оқу орындарында кері-инженерияны пайдалану

Хасенова Г.И. , Ауельбекова Б.А., Тургамбаев М.К.

Халықаралық ақпараттық технологиялар университеті, Компьютерлік Инженерия және Телекоммуникация кафедрасы, 34 «А»/8 «А» Манас./Жандосов көшелерінің қиылысы., Алматы 050040, Қазақстан

Мақалада жоғары білім беруді басқару жүйесін жетілдіру мәселелерімен айналысады. қоғамның әлеуметтік және экономикалық өмірінде өзгерістер сәйкес басқа да мүдделі тараптардың білім деңгейі мен сапасына қойылатын талаптар өзгерді. білім беру сапасын қоғамның өсті талаптар ол тұтастай жоғары оқу орындарының бағалау іргелі тән жасады. жоғары оқу орнының сыртқы ортада болып жатқан өзгерістер, стратегиялық жоспарлау, соның ішінде тиісті жоғары оқу орындарының жауап және, ең алдымен, ұйымдастырушылық және басқарушылық инновацияларды енгізу, талап етуге; көрсеткіштер жүйесі; Total Quality Management; Нәтижеге бағдарланған бюджеттеу; жобаларды басқару; Business Process Reengineering және басқа да басқару инновациялар.

71

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

The model of information system in balance of currency exchange rates L. Kalymbetova, V.Serbin International IT University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The paper objective is the development of information system, which allows analyzing exchange operations and presenting information necessary for decision-making aiming at rate alteration. Develop an information decision support system under the currency operations, which can be used to obtain the necessary information for adjusting the exchange rates and making decisions. The author uses theory of decision-making, economic and mathematical method and graph theory. Applied value due to the application oriented research results in the activities of banks and other financial institutions.

1. Introduction exchange rate reduces the real debt in the national The world economy is now entered a very currency, increases the severity of external debt difficult economic period. At the center of this denominated in foreign currency. The export of global crisis is the US financial system. The reason profits and dividends, which received by foreign was the innovation in the field of mortgage lending. investors in the currency of the host countries, Among the global financial crisis, the state quite becomes unprofitable. These profits are reinvested often have to manipulate the value of the exchange or used to purchase goods on the domestic prices rate in order to change the terms of trade of the and their subsequent export. country, using such methods of currency regulation, In a market free-convertible currency is urgent as a dual foreign exchange market, devaluation and task of determining the balance of exchange rates. revaluation. Exchange rates will be balanced, if we exclude the Exchange rates have a significant impact on possibility of speculative profit on closed sequences foreign trade in different countries, speaking buying currency transactions. In the case of communication tool among values of national and imbalance problem arises of determining the world market, influencing the price ratios of exports sequence of operations leading to the production of and imports and causing a change in domestic speculative profits. economic situation and changing the behavior of This requires information decision support firms in the export or compete with imports. system containing a database, mathematical models Currently, large widespread digital (electronic) and interactive graphical interfaces, media analysis, currencies, which are used mainly as additional etc. So the purpose of research is to develop currency whose value is tied to national currencies. methods and mathematical models to analyze the As a result, to track the dynamics and forecast of operations of purchase and sale of currencies, interest rates, there is a need to develop and establish predict, detect speculative cycles, giving the an information system supporting decision-making necessary information for a decision to benefit. in the foreign exchange market. Formulated goal required the following tasks: In general, depreciation of the national currency - Analysis of the main directions of economic provides an opportunity for exporters in this country development in the field of monetary relations in to reduce the prices of their products in foreign times of crisis; currency, received the award in the exchange - develop new mathematical models that can help proceeds the appreciated foreign exchange on you get the information you need to adjust exchange cheapened national and have the ability to sell rates and decision-making; products at prices below the world average, which - the identification of developed mathematical leads to their enrichment at the expense of material models; losses its countries. Exporters increase their profits - to design and develop an information system by mass export of goods. Although at the same time supporting decision-making in foreign exchange reduction of the national currency increases the cost transactions solutions. of imports, as for the same amount in its currency, The object of research is international and foreign exporters are forced to raise prices, which regional currency markets. In recent decades, the stimulates the growth of prices in the country, foreign exchange market has changed the nature of reduction of import of goods and the use or trade with the transfer of emphasis on the change in development of the national production of goods trade of urgency; there has been a significant instead of imported ones. The decline of the increase in transactions, the execution of which

72

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

takes place in the future. Using the exchange rate, purchase and sale is taken into account by the the owner compares its own cost of production with equation: world market prices. This makes it possible to reveal a(i, j) α(j, i)<1, i ≠ j (fees). We assume that graph G the results of foreign trade operations of individual has all edges and vertexes, it means (i, j)  E, and companies and the country as a whole. On the basis α(j, i)=1, i=1,..,n. Circuit K =((i1, i2), (i2, i3), ..., (ip, of the ratio of currency exchange rate, taking into i1)) defines a sequence of operations on purchase account the proportion of the country in world trade (exchange) rates. Let: | K | = P - number of edges in is calculated effective exchange rate. The exchange the loop: rate has a definite influence on the ratio of export and import prices, the competitiveness of firms, and α(K) =((i1, i2), (i2, i3), ..., (ip, i1)) (2) profits of enterprises. Contour K will be called profitable, if α (K)> 1. The subject of the study is to develop an Profitable circuit determines the sequence of information system decision support for the operations leading to speculative profit. A graph G purchase and sale of foreign exchange transactions. will be balanced, if it does not exist profitable The professor of doctor science Mr. Kurmashev circuits. A balanced graph corresponds to a balanced and Mr. Mutanov dedicated their research in given exchange rate. It is noticeable that, if K - lucrative area. Some parts of research work have been used at circuit that | K | ≥ 3. scheduling of departments РКО on currency The problem of the balance of exchange rates transactions in following branches of banks: formulate as follows manner. For a given graph «KaspiBank» and "BTA-BANK"[1]. G=(N,E) and specify the number of α (i, j), This work is dedicated to the application and the satisfying the above conditions, it is necessary to design and development of information systems and determine whether a graph G is balanced; if the support decision-making in the field of foreign graph G is not balanced, it is necessary to find at exchange transactions. For planning in the foreign least one circuit profitable. The general problem is exchange market is defined model of balanced that to find all the lucrative circuit (for which α(K)> exchange rate, according to which it is necessary to 1). For this, conversion factors are replaced by their design and implement software IP designed for the logarithms, which are called the lengths (or weights) operation, forecasting and decision-making in arcs. And then, this problem is reduced to currency operations, which it maintains information. determining the contours of positive length. The main goal of the design and creation of Let β(i, j)=lgα(i, j), β(K)=lgα(K). From (2) information system decision support is to provide follows β(K)= β (i1, i2) +…+ β (ip, i1). Each vertex comprehensive information support of processes (i, j) of graph G assign the number of β (i, j), which occurring in the currency market with the use of the is called the length of the vertex (i, j). The contour K power of information and telecommunication is profitable if and only if the length of β (K) of this technologies. circuit will be a positive number [2]. A simple task was posed and solved, and invented 2. Mathematical model of the system an algorithm for determining whether there is a 2.1 Statement and solution of the problem of the profitable path or not. balance of exchange rates For solutions offered a simple polynomial To making real this system it is necessary to algorithm to solve the problem of appointments - realize mathematical algorithm of the project. For simple polynomial problem. In order to determine that, the term of graph theory should be taken into the contours of positive long formulate the following consideration. problem. Graph theory is the study of graphs, which are n n (3) mathematical structures, used to model pair wise f ( x )  max( i, j ) xi j relations between objects. A graph in this context is i1 j1 made up of vertices, nodes, or points, which are n connected by edges, lines. [1] (4)  xi j  1, i  1, , n , Let’s consider n as a currency types. For each j1 type of currency it is associated a vertex of a directed graph: n (5) G=(N, E), (1)  xi j  1, j  1, , n , N={1,…,n}. Each edge (i, j)  E assign the positive i1 number α (i, j) - Currency conversion factor of type i xi j 0, i, j 1,, n. (6) in the currency type j. The difference in the rate of

73

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

The problem (3) – (6) – a task assignment. Consider a specific example for the solution of the The components x0 of the optimal angle of the problem of the balance of exchange rates (data are i j taken from the bank's exchange points). According vector x0  (x0 ,, x0 ,, x0 , , x0 ) of this 11 1n n1 nn to these data constructed a directed graph G and a 0 problem is either 0 or 1. The vector x defines a set table of currency exchange rates (Figure 1, Table 1). of K1 , K 2 ,, K r  disjoint paths in the graph G [1]. In this case the exchange rates rigidly attached to a Equality x0 1 means that edge (i, j) belongs to one base currency (the US dollar) and the conversion i j factor is not the main one currency to another is not of these circuits. Any vertex of G belongs to one of uniquely determined by the ratio of the basic the circuits. 0 conversion factors of the currency in the primary. Let x – the best corner vector problem (3) – (6), The challenge is that you need to determine whether K1, K2 ,, Kr  – a plurality of contours defined by the exchange rates balanced and excluded any the vector x0. Then: possibility of making a speculative profit on closed 1) f (x0) ≥ 0; sequences buying currency transactions. 2) if f (x0) = 0, the graph G balanced; 0 3) if f(x ) > 0, one of the graph K1,  , K r is TABLE 1 Table representation of graph profitable. To continue research in this area formulated the Curr. USD EUR RUB KZT task of determining in the digraph with given USD 1 0,747 33,5 151 weights (lengths) circuit arcs with maximum arc EUR 1,29 1 45,08 196 weight average value (maximum density contour). RUB 0,029 0,022 1 4,42 The need to address this problem arises in the study 0,0066 0,0049 0,223 1 of mathematical models of the balance of exchange KZT rates. Solution of the problem is reduced to solving a number of tasks assignments. We solve the problem of simple search options. The basic calculation when making a purchase of Let us now consider the contours on 4 vertices of the a currency is the calculation that for a certain period graph: of time, its rate will rise to calculated value. If this period of time will be stretched or rate increase by a 12341 K = ((1,2),(2,3),(3,4),(4,1)) smaller amount, the transaction can not only bring profits, but also create losses as the implementation (K) = 0,747  45,08  4,42  0,0066 = 0,982 of arbitrage, there are certain commission expenses 12431 K = ((1,2),(2,4),(4,3),(3,1)) on conversion.[2] (K) = 0,747  196  0,223  0,029 = 0,946 If we establish that there is no profitable circuits, 13421 K = ((1,3),(3,4),(4,2),(2,1)) it means the graph is balanced. If we get some (K) = 33,5  4,42  0,0049  1,29 = 0,936 lucrative circuits (not all), then the graph is 13241 K = ((1,3),(3,2),(2,4),(4,1)) unbalanced. (K) = 33,5  0,022  196  0,0066 = 0,953 The problem of determining the closed sequence 14231 K = ((1,4),(4,2),(2,3),(3,1)) of operations leading to speculative profit, reduced (K) = 151  0,0049  45,08  0,029 = 0,967 to the assignment, which is the task of polynomial 14321 K = ((1,4),(4,3),(3,2),(2,1)) complexity, that is, can be solved within a (K) = 151  0,223  0,022  1,29 = 0,955 reasonable time on a computer with a large number Conclusion: among the circuits built on the 4 of variables. vertices of the graph is not profitable because the circuit  (K) <1. Then in the end we find that the circuit is not profitable, the graph is balanced, which means that there is no buying and selling transactions of currencies, bringing speculative profit [3].

3. Project management 3.1. Functional requirements for IS For planning in the foreign exchange market is defined model of balanced exchange rate, according FIGURE 1 Oriented graph representation of the system to which it is necessary to design and implement

74

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

software IP designed to ensure effective program This diagram is basically a flow chart to management, operation, forecasting and decision- represent the flow form one activity to another making in operations with currency, which it activity. The activity can be described as an maintains information. operation of the system (Figure 3). The main goal of the design and creation of IP The given system is focused for the staff of decision support is to provide comprehensive banks or staff of destined organization. It means information support of processes taking place in the this program will not be public. Additionally, only currency market with the use of information and a few amounts of staff will have access on checking communications technology capabilities. system balance. To achieve the main objectives of the following Moreover, it will be possible to see currency main problems should be solved: exchange rates at current moment and do online - formation of a unified data bank, reflecting converter of exchange rate from one currency to the state of the currency market, as well as another. It can be possible to gain sight of analysis providing timely and speedy deployment for chosen period. complete, objective, accurate, consistent The following diagram is drawn with the four information on exchange rates; main activities: - to ensure the same for all users of the - Login to the system information environment, common standards - See charts of exchange rate for the preparation of information materials - Convert one currency to another and regulatory reference resources; - Check system is balanced or not

Context diagram is shown in Figure 2. It describes the purpose of the developed IP - providing integrated information support for decision-making when buying and selling currencies.

Exchange market

Result Input data The information system supporting decision-making in foreign exchange transactions

The participants of currency operations

FIGURE 2 Diagram of functional model of system

3.2. Information system planning The peculiarity of the present period is the use of computer-based information decision support systems that allow to simulate the situation and to decide the best course of action. The most effective systems are decision support systems based on the ideology and methods of mathematical modeling is a powerful tool for the study of complex systems. So it is important of establishing an information system decision support for planning activities of financial institutions in the field of foreign exchange transactions. It is important to basically planning each step of project development. So the captures of dynamic FIGURE 3 Activity diagram of the system behavior of the system should be taken into consideration. Activity diagram is diagram in UML After showing the main page, user should login, to describe dynamic aspects of the system. after authorization user has select option of menu.

75

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Therefore, user can continue using system without The unit testing will be done at the end to check authorization, but if it is necessary to check system the project for bugs and errors. The unit test checks balance, it is important to authorize, because not all the system by each module. of the staff has accessibility to check system The unit testing will be done at the end to check balanced or not. the project for bugs and errors. The unit test checks 3.3. Features of used tools and technologies the system by each module. The main goal of the realization and creation of As a tool for designing a database, has been Information systems decision support to provide selected database MS SQL Server. Unlike all the comprehensive information to support the processes other best-known databases, MS SQL Server has a occurring in the currency market with the use of the number of advantages. Foremost of these is that it power of information and telecommunication provides information systems with "client-server" in technologies. To achieve the main objectives, there which it plays the role of database server. One of the should be resolved tasks as creation of a single important properties of Microsoft SQL Server is the database, reflecting the state of the currency market, ability to control the integrity of the data. as well as providing timely and speedy updating, You can also say that it satisfies the requirements objective, reliable, consistent information on of distributed processing systems. This database exchange rates. Furthermore, the aspect of design support: data replication, parallel processing, should be taken into consideration, so creation of a creation and handling of large databases on common design style, providing centralized access inexpensive hardware platforms, feature simple to reporting information is important part of controls and use. application.[5] In Figure 2.2 the architecture of the system is TABLE 2 The comparison table of databases shown. Characteris tics / MS SQL PostgreS MySQ DBMS 2012 R2 QL L FireBird Oracle API & Graphical GUI & GUI & GUI & interface SQL SQL SQL SQL SQL accordan ce ACID Yes Yes Yes Yes Yes Local settings Yes Yes Yes Yes Yes

524258 T Limitation B/ UL/от FIGURE 3 The architecture of the system s (DB 524258 T 64 to UL/32TB UL/32 size/tables B/ UL/ 256TB / TB/ /rows) UL 4GB/8 kB /64kB 65536 B 1.6 TB The whole system includes the database, ORM, Temporar Unit Testing, web system, mvc. All the connections y tables, to the database will be done by the ORMs like Entity materiali Framework, NHibernate or other ORMs and all of zed them will store the data in IRepository to make the represent Yes Yes / ation Yes / Yes Yes/ Yes /No Yes /No Yes database system centralized. This type of architecture for database will make easy to connect support any healthcare’s database to the IRepository. Index supports majorit In our system we will use the Entity framework support majority Full Weak Weak y to get the access to the database. In addition there will be used the method Code First, which will make easy to create the database by creating its models Support inside the system. The code first method will be the UNION, Supports link to communicate database with the system. The JOIN etc. Full majority Partly Full Full system is realized on the MVC pattern. So all the Ability of Windows Windows All system, except databases, will be in unit testing. authentic All , no , no possibl ation possible audition Week audition e

76

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Sectionin Week Week At the result, the basic concepts of the g support Full Full support Full information systems which lead a great interests in future analyzing. They also discussed the optimal The most important characteristics of the tools and features for given application. Other database are: important aspects are the technical analysis, where - ease of administration the resembling system described, and system - the ability to connect to the Web architecture, which is a powerful tool and that its - performance and functional capabilities of the possession allows the analyst to obtain reliable database server predictions of movement of the currency market. It - the availability of remote access was given a detailed analysis and study of the There are compared the databases like PostgreSQL, foreign exchange market that the further MySQL, FireBird and Oracle (Table 2). development will be used. HTML5 is the latest version of Hypertext In particular, based on the proposed model can Markup Language, the code that describes web deliver courses currency adjustment problem in pages. It's actually three kinds of code: HTML, order to eliminate the possibility of making a which provides the structure; Cascading Style Sheets speculative profit. This task can be used in central (CSS), which take care of presentation; and banks can influence exchange rates. The results are JavaScript, which makes things happen. new and may find practical application in the CSS. (English Cascading Style Sheets - analysis of the markets freely convertible currency. Cascading Style Sheets) - Technology describe the The proposed model allows for further development appearance of a document written in a markup in order to improve its adequacy to real processes. language. Mostly used as a means of registration of web 4. References pages in HTML and XHTML, but can be used with [1] Kurmashev I G, “Information decision all types of documents in XML, including SVG and support system for the purchase and sale of XUL. currencies (for example, bank level 2)”. Almaty, Python is an interpreter, object-oriented, high- 2005 level programming language with dynamic [2] Mutanov G M, Kurmashev I G 2009, semantics. Its high-level built in data structures, “Information support system a decision on the combined with dynamic typing and dynamic purchase and sale of currency transactions.”, Ust- binding; make it very attractive for Rapid Kamenogorsk: EKSTU. - 130 p. Application Development, as well as for use as a [3] Kurmashev I G 1999, “The problem of scripting or glue language to connect existing balance of currency exchange”, № 4 -5. components together. [4] Trygve Reenskaug and James Coplien, Django is a high-level Python Web framework "More deeply, the framework exists to separate the that encourages rapid development and clean, representation of information from user pragmatic design. Built by experienced developers, interaction." The DCI Architecture: A New Vision it takes care of much of the hassle of Web of Object-Oriented Programming (2009) development, so you can focus on writing your app [5] Graham, Tim. "Django bugfix releases without needing to reinvent the wheel. It’s free and issued: 1.9.5 and 1.8.12". Django Weblog (1 April open source. 2016)

4. Conclusion

Модель информационной системы сбалансированности курсы валют Л. Калымбетова, V.Serbin Международный Университет Информационных Технологий, Информационные Системы, 34 «А»/8 «А» ул. Жандосова, Алматы 050040, Казахстан

Цель исследования заключается в разработке информационной системы, позволяющей анализировать операции купли-продажи валют, давать необходимую информацию для принятия решения в целях корректировки валютных курсов. Разработана модель информационной системы поддержки принятия решений при операциях с валютой, с помощью которой можно получать необходимую информацию для корректировки курсов валют. В работе используется аппарат теории принятия решений, теории экономико-математических методов и моделей.

77

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Прикладное значение обусловлено направленностью исследований на применение результатов в деятельности банков и других финансовых учреждений.

Айырбас бағамдарының ақпараттық жүйедегі тепе-теңдігінің моделі Л. Калымбетова, V.Serbin Халықаралық Ақпараттық Технологиялар Университеті, Ақпараттық Жүйе, 34 «А»/8 «А» ул. Жандосов, Алматы 050040, Қазақстан

Зерттеудің мақсаты айырбастау бағамын реттеу үшін, оның сатып алу және сату операцияларын талдау тұрғысында ақпараттық жүйені дамыту болып табылады. Айырбастау бағамын реттеу үшін қажетті ақпаратты алуға болатын ақпаратты жүйенің моделі құрылды. Жұмыста шешім теориясы, экономикалық және математикалық әдістер мен модельдер теориясы пайдаланылды. Ғылыми-зерттеу нәтижелері қолданбалы маңыздылығы банктер мен басқа да қаржы институттарына бағдарланған.

Automated information system for teacher’s accounting control

M.Tleppaev

International IT University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

Article is devoted to the research of existing Information systems of the accounting and management control. As the result of research, it was chosen an Automated information system in ITMO university. In the article given recommendations about solution of the problems, time management, optimize database.

1. General Nowadays the information technology developing 2. Information system analysis of ITMO is very dynamic. The automation is the most relevant university dilemma to any enterprise. The automation using AIS structure is divided into two parts: security modern technologies lead directly to increasing of and functional. A set of subsystems, depending on competitiveness. the characteristics of the ACS is a functional part. An automated information system is simply a These subsystems are separated by a certain system by which information is processed for character (functional or structural) and combine the collection and distribution through a series of respective complexes control problems. automated processes Those using these types of Security part - a set of information, software, systems include governments, libraries, and private mathematical, technical, legal, organizational, businesses. methodological. The use of an automated information system can Development and introduction of any information be of great benefit both to government institutions system in the organization, at least midrange - is and private companies. a task of enormous complexity. This is due to the However, the automation process systems at complex structure and complex business - processes university level are undergoing rapid growth and it organization. Data analysis was prepared on the goes without saying that this tendency will be one of basis of the university model of Internet technology. the dominating trends for the development of the System efficiency is determined using its own field of education. products and technologies; reference to the most The main problem in departments is time massive program - technical platforms (Microsoft); management and usability. This kind of system low cost of implementation. dramatically reduces the time of university However, it must be emphasized that the IS - a employees to fill all kinds of securities. tool for efficient, high-quality management of the Also system is aimed at improving the efficiency organization, and in fact, the final decisions are of the implementation of the automation system in taken only LPR. And the quality of university the educational institutions.

78

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan management depends primarily on the quality of Thus, the main advantage is a fully automated professional managers and the entire team. control of the workstation to the database in real It should be noted that the development team of time. the university IS - Information Department. Their selection is based on the fact that they are well 5. References aware of their particular business processes, their [1] Novikov, 2009 . Theory of management of work on the development of cost quite inexpensive educational systems, Moscow: Education and guaranteed security. Publishing, 452. [2] Umarov, A. (2010). Designing information 4. Conclusion system of university management. Proceedings of the The use of the system does not require I International Scientific-Practical Conference, acquisition of third-party commercial software or Novosibirsk, 132 technologies, which will significantly reduce the [3] Chair of and Control cost of implementing the education information Systems.URL:http://en.ifmo.ru/en/department/79/Ch system. It is concluded that the project has positive air_of_Computer_Science_and_Control_Systems.ht economic efficiency and pays back for the costs m connected with production of the automated [4] Automated Information Systems (AIS) information system. URL:http://csrc.nist.gov/nissc/1997/proceedings/394 .pdf

Автоматизированная информационная система для учета результативности учителей

M.Tleppaev

Международный университет информационных технологий, Кафедра Информационных систем, 34 «А»/8 «А» Манаса/Джандосова., Алматы 050040, Казахстан

Статья посвящена исследованию существующих информационных систем управления и учета. В результате исследований, была выбрана автоматизированная информационная система в ИТМО университете. В статье даны рекомендации по решению проблем, распределение временем, оптимизирование базы данных.

Мұғалімдердің орындау ескеруі автоматтандырылған ақпараттық жүйесі

M.Tleppaev

Халықаралық ақпараттық технологиялар университеті, Ақпараттық жүйелер кафедрасы, Манас 34 «А» / Жандосов 8 «А» көш. қиылысы., 050040 Алматы қ, Қазақстан

Мақала есепке алу мен бақылаудың қолданыстағы басқару ақпараттық жүйелерді зерттейді. Зерттеулер нәтижесінде, ол автоматтандырылған ақпараттық жүйесі ИТМО университеті сайланды. Мақала деректер базасын оңтайландыруға, проблемаларды, уақытты басқару шешу үшін ұсынымдар береді.

Research of load testing of systems with massive parallel architecture on Big Data

Mukazhanova M.N., Serbin V.V.

International IT University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

In this work there are the analysis of load of the systems Greenplum, Nettezza, Exadata, Oracle at tests of campaigns are carried out. Testing was held by start of "packs" on 7 campaigns.

79

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

1.Introduction for the mode close to real time increases. The new At the beginning the analytical specialized type of the device had to be designed for needs of machines was some kind of technological exotic business analytics. AA have to combine the best available to limited number of large consumers, qualities of SMP and MPP (massive parallel but five – seven years ago rapid growth of volumes processing - "mass overlapping"), to exclude any of data in combination with the technologies based bottlenecks on the way of data flows and at the on the principles of mass overlapping and MPP has same time to be capable to support analytical ON, considerably changed a situation. Today the the created such companies as MicroStrategy, number of already realized machines is estimated Business Objects, Cognos, SAS and SPSS. Their in thousands, they were introduced about 40% of architecture has to provide necessary flexibility, the enterprises. The largest producers which have scalability and reliability. The Teradata company bought up all most perspective startups became the by 2000 when Hinshou together with Dzhit main players in this area and among them there is Saksena was created by Netezza, more than ten first of all EMC (Greenplum), HP (Vertica), IBM years let out products in which a lot of things from (Netezza), Microsoft, Oracle Exadata, SAP this what he spoke about, have been already HANA, Teradata (Aster Data). Players of the realized. However it were extremely expensive and second plan - Cloudera, DataStax, Northscale, unique systems, and Hinshou has found a way how Splunk, Palantir, Factual, Kognitio, Datameer, to do almost the same, but on widespread standard TellApart, Paraccel, Hortonworks. components. He has indirectly offered Teradata an Now in IT the following great transition which alternative way of development and today it is is externally shown in growth of volumes of data, close to refuse iron and become a software increase of speed of operation of devices of storage company [2]. (SSD approach on speed random access memory) Any machine of AA represents (see drawing) is observed, but these are superficial signs - the the hardware-software integrated stack more often main thing that the computer stops being the called by convergent infrastructure consisting calculating device, and becomes the tool for from: the processor with memory, the systems of knowledge, the chain is developed further: from storage, OS and specialized DBMS allowing the account to extraction of information and process data directly in own structure on a disk or knowledge. There comes the time of cognitive in random access memory. As integration it is computer systems. Traditional computers serve for understood that AA simplifies expansion, scaling the fast account, and cognitive systems — for and management of DBMS and infrastructure of extraction of useful data, but at the same time it is data storage, providing such qualities as self- not some "the thinking cars" allocated with government (self-managing), independent control intelligence. The most striking example — (self-tuning) and availability for service from the Watson, in him doesn't have traditional extraction moment of inclusion (plug-and-play). Usually AA of data from files, they are processed in the place united all components in one rack that is of their stay, it also is work model during an era of economically effective [3]. Big Data. We became witnesses of the next "shift of a paradigm" to the computer systems focused 2. Research part not on calculations, and on data where processors In this research the analysis of load of the are built in directly systems of data storage. What systems Greenplum, Nettezza, Exadata, Oracle at we call analytical platforms today is no other than tests of campaigns is carried out. Testing was held the first steps towards the cognitive, understanding by start of "packs" on 7 campaigns and represented computer [1]. start of sets of test campaigns ("packs"): The idea of the specialized car as separate - the first pack ("odd") – start of 7 test perspective type of systems for work with data has campaigns in a parallel. Campaigns are started at been offered by Foster Hinshou, the founder of the the same time in the Execute mode with previously Netezza and Dataupia companies it is called the chosen option "Test". Then completion of all 7 father of this direction. Hinshou one of the first has campaigns is expected. paid attention to the growth of volumes of data - the second pack ("even") – start of the advancing Moore's law on growth rates and that remained 7 test campaigns in a parallel. A way of the classical infrastructures existing at that time start of campaigns is similar to the first round. won't be able to cope with him anymore. Besides Production schedules on the systems used in the he has paid attention also that with increase in analysis are given below. Schedules contain number of data also the need for their processing identical temporary scales across that at an 80

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan opportunity to compare schedules with each other. Statistics at tests I gathered on servers with 30 second intervals. Schedule of Running Task "Task" is the settlement task started in system: either SQL inquiry, or the stored process of SAS (Figure 1,2,3). The schedule of Netezza CPU Aggregate – are constructed on data of Excel of the utility of monitoring. The green schedule is the maximum load on one of knots (Figure 4). The schedule of Greenplum Segment Node – Figure 4 - Netezza CPU Aggregate are constructed with use of means of NMON Analyser on the basis of the data collected by the The schedule of Exadata Storage Sell Node – utility of nmon on one of segment knots (Figure 5). are constructed with use of means of NMON Analyser, on the basis of the data collected by the utility of nmon on one of Storage of servers and on one of Database of servers [6] (Figure 6). Oracle Production – load of CPU and Disks constructed by means of the utility of nmon from the AIX server on which the DB settles down (Figure 7).

Figure 1 - Graphic Running Task. Netezza

Figure 5 – Greenplum Segment Node

Figure 2 - Graphic Running Task. Greenplum

Figure 6 - Exadata Storage Sell Node

Figure 3 - Graphic Running Task. Exadata

81

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Figure 7 - Oracle Production – load of CPU and of huge data flows and to provide necessary Disks flexibility, scalability and reliability. This analysis of load of the systems Greenplum, The schedules shown above from first "pack" Nettezza, Exadata, Oracle at tests of campaigns, second "pack" is rather similar. "Average" has yielded positive result in favor of Exadata. acceleration of packs of campaigns, we count on a Based on time of performance of campaigns in formula: schedules it is possible to tell, Exadata has shown 57.6%, in the accelerated results by 3 times. In (1) conclusion possible to say Oracle Database with S - the sum of all duration of calculation of the option Real Application Cluster Exadata is the campaigns from a pack on the tested contour most effective in internal models at an assessment T - the sum of all times of campaigns from a pack of credit risks, control of their adequacy, on the "optimized" Oracle AIX. monitoring of a loan portfolio and the most faster of analyzing databases. Table 1 - Summary comparative results Netezza Greenplum Exadata Oracle 4. Reference Pack 1 -1.2% -25.1% -57.6% 138.0% [1] Kyuseok Shim. MapReduce Algorithms (odd) for Big Data Analysis, 2012. Pack 2 9.3% -38.6% -54.0% 171.8% [2] Ponniah, Paulraj. Data Warehousing (even) Fundamentals for It Professionals. — Hoboken, N. The less negative number is higher acceleration. J.: John Wiley and Sons, 2010. — P. 189-200. — Positive percent - delay. 571 p. — (Fundamentals for IT professionals). [3] Oracle Engineered Systems Price List. – 3. Conclusion Oracle, October 2012. The idea of the specialized analytical car has [4] Donald Feinberg. New X5 Generation Will captured many leading players of the IT industry Bring Pricing Improvements to Oracle Exadata. - today — for a solution of the problem of Big Data, Gartner, январь 2015. in particular a possibility of the solution of [5] Greenwald, Rick; Stackowiak, Robert; analytical tasks in real time, traditional Alam, Maqsood; Bhuller, Mans. Achieving infrastructures are no good any more. New devices Extreme Performance with Oracle Exadata. — are specially designed under needs of business N. Y.: McGraw-Hill, 2011. — 432 p. — (Oracle analytics and combine the best qualities of modern press). equipment rooms and program architecture to [6] Osborne, Kerry; Johnsn, Randy and Põder exclude emergence of any bottlenecks on the way Tanel. Expert Oracle Exadata. — N. Y.: Apress, 2011. — 500 p.

Исследование нагрузочного тестирования систем с массивно-параллельной архитектурой на больших данных

Мукажанова М.Н., Сербин В.В.

Международный университет информационных технологий, Кафедра Информационных Систем, 34 «А»/8 «А» ул. Манаса/Жандосова, Алматы 050040, Казахстан

В работе проведен анализ нагрузки на систему Greenplum, Nettezza, Exadata, Oracle при тестах кампаний. Тестирование проводилось путем запуска 2-ух «пачек» по 7 кампаний.

82

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Solution For Kazakhstan Open-government Analytical Processing System

Nurzhan Mukazhanov, Kaster Nurmukan, Didar Edilhan

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

This article give an extension solution for the existing platform e-government service in Kazakhstan, it is not provide yet (when we writing the article ),but should provide in the future. In this article we will discuss how to create the online analytical processing service (SaaS) and data processing platform (been called in industry SaaP) in cloud. If we expected this service should available for all Kazakhstan citizen. it is time to consider how to find way extend or reviewing the existing system architecture. And this article gives the solution to this problem.

1. General Today, in public sector accumulated a wide range of data, analytical processing is one of the main trends. Based on data to monitoring and analysis the current situation, with data processing help to decision-making in real time for government impossible in most cases. The main reasons for the unavailable the service, because even data stored centralized server but no relationship between the different source of database. Or need to domain knowledge analyze to link together. Also the most Figure_1 Open Data portal presentation formats important case that hard to automated the process because, the information quality, reliability and In recent years, the increase in the volume of operational knowledge those problems encountered . information in the new development of storage Many public institutions while doing urgent public driven by the a new trending technologies -Big Data. report the critical analyze instead of showing the The Big Data technologies very actively welcoming simple statically number report, there is no more in the public sector, which are the good example of useful further analyze. The reason is that they didn’t the e-government applying electronic processes. used any analytic tools help them organize the data Big Data technologies as a way to use the together fixable and fast way. possibilities that open all government departments data horizontally scalable in distributed database 2.Analytical processing data in the public sector (NoSQL-databases, Hadoop) [3,4]. Further, Any Transparency of government administration is new government service or public service self- one of the main principles in the development of the driving by citizenship itself. Use Open data country. Kazakhstan government order to get the analytical results are not only for leaders of the local goal, including government agencies to ensure the government, as well as for all citizens of the openness and transparency through the e- Republic Kazakhstan. government system emphasizing the "open government" mechanism [1]. Now , government 3.The Open architecture for analytical processing agencies has very large amounts of data stored in the system. e-government platform. Kazak Government public Nowadays, the information-analytical tools opened it again to all citizen by “Open Data” has many platforms. Aster MapReduce appliance by approach , let them all available those data , use the Teradata, Oracle Big Data appliance, Greenplum data, even let them involving analyzing processes appliance by EMC, SAP HANA appliance etc. And . Thus the open data platform proposed for citizens At the same time SAS OLAP Server, Hyperion, self-processing, analysis are possible now Oracle Exadata, Microsoft Analysis Services, etc (https://data.egov.kz/, access time: many commercial software products and also 14.05.2016). Open government data portal provide Mondrian, Pentahon Community, Jedox, olap4j, following type of machine-readable and human- etc. open code software products are offered [1,2]. readable data format . Figure 1.

83

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Almost all of the above commercial software  Pre-aggregated Data products to meet the basic requirements of analytical  Full aggregated data. data processing. However, those closed source code Integration Layer: to end user and system development contributor.  SQL inquiries;  Map Reduce-designed model, in addition to a single data structure. Initial sources layer:  The applications for manual data entry;  The relational database model (PosgreSQL)  MongoDB-DB  Cassandra -DB

4.Conclusion In the article, the expectation that give a way of solving this potential task by online analytical processing platform which is a new system based on open system architecture. Open government "open data" analytical processing devoted to the architecture of the system and the demands of the analytical processing. This idea using Big data technologies which is not try to criticizing the existing system functions instead of keep the investment, extending the system, try to avoiding Figure.2 Open data Analytical processing system reinvent the wheel. architecture 5. References This article shows that the analytical system [1] Barbara Ubaldi Open Government Data. architecture is based on open-source. The Open Government Data: Towards Empirical Pentaho Community open source product quite Analysis of Open Government Data Initiatives // suitable our solution, it provide open source product OECD Working Papers on Public Governance. - based on java runtime environment . OECD Publishing, 2013. – №22. – P. 61. The Online analytical processing system [2]Codd E.F., Codd S.B., and Salley C.T. architecture, consisting the following components Providing OLAP (On-line Analytical Processing) to (Figure 2): User-Analists: An IT Mandate. - 1993. Analytical data presentation Layer: [3] Vatika Sharma and Meenu Dave. SQL and  Pentaho Analyzer; NoSQL Databases // International Journal of  MS Office Excel; Advanced Research in Computer Science and  pdf, .csv, .xls and other formats replacement Software Engineering. – 2012, аugust. – Vol. 2, applications. issue 8. - P. 21-27. Analytical Hyper Cube module: [4] Ralph Kimball and Richard Merz. The Data  OLAP server; Webhouse Toolkit: Building the Web-Enabled Data  Individual Hyper cubes; Warehouse. - New York: John Wiley & Sons, 2000.  General Hyper cubes. - 417 p. Storage: [5] Uskenbayeva R.K., Kurmangaliyeva B., Mukazhanov N.K. Development of MySQL DBMS data warehouse. Data warehouse is multidimensional model of data for information and divided into the following categories; analytical decision-making support system //  metadata; Computer modelling and new technologies. - 2014.  special data; – №2(18). – P. 170-175.

Решения аналитических процессов для системы открытого правительства Казахстана

Нуржан Мукажанов, Кастер Нурмахан, Дидар Едилхан

84

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Международный Университет Информационных технологий, кафедра Компьютерной Инженерии и Телекоммуникаций, 34 «А»/8 «А» пересечение ул. Манаса./Жандосова, Алматы 050040, Казахстан

В данной статье рассматриваются решение для расширения существующей платформы электронной государственной службы Республики Казахстан (РК). В этой статье мы рассматривали, как создать интернет-аналитическую службу обработки (SaaS) и обработки данных инструментов платформы (называют в промышленности SAAP) как в облаке. Мы ожидаем, данная услуга должно быть доступными для всех граждан РК настало время рассмотреть вопрос о том, как найти способ расширить или пересмотра существующей архитектуры системы. И в данной статье мы пытаемся дать решение.

Қазақстанның ашық үкімет жүйелеріне аналитикалық үрдіс түріндегі шешімдер Нуржан Мукажанов, Кастер НурмаханP, Дидар Едилхан

Халықаралық ақпараттық технологиялар университеті, Компьютерлік Инженерия және Телекоммуникация кафедрасы, 34 «А»/8 «А» Манас./Жандосов көшелерінің қиылысы., Алматы 050040, Қазақстан

Бұл мақалада Қазақстан Республикасының мемлекеттік электронды үкімет қызметі платформасын кеңейтуге арналған шешім ұсынылған. Мақалада деректерді өңдеудің интернет-аналитикалық қызметі (SaaS) және деректерді өңдеуге арналған платформа инструменттерін (SAAP) жабық бұлтқа ұқсас әзірлеу қарастырылады. Біздің күтуіміз бойынша бұл қызымет Қазақстан Республикасының барлық азаматтарына қол жетімді болуы тиіс және бұл уақыт әдеқашан келіп жеткен. Сол себепті, электронды үкімет жүйесіне қосымша аналитикалық қызметті қосу қажеттігіне толық негіз бар және мақалада аталған тапсырма шешімін беруге қадам жасалынбақ.

Development of information system for small businesses

Pachshenko G.N., Kabulov B.M.

International IT University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

Small business is an integral part of any developed state. At the present time, the use of information technologies in small business management is an objective necessity. The diversity and specificity of the subject fields of small businesses in most cases do not allow using off-the-shelf solutions for the resolution of its tasks. This determines the relevance of their own information systems development.

Principal distinctive features of small businesses are determined by a "small" scale of each particular 1.Introduction company activity in this sector and the limited Small business is a prime sector of the modern nature of disposable material, labor and financial market economy. Small business enterprises in the resources (‘poverty resource ') [1]. world’s economically developed countries produce Information technologies belong to the expensive more than 50% of the gross domestic product and enterprise assets category, not only in terms of provide from 50% to 70% of the total number of acquisition but also possession. The limited financial jobs. resources of small businesses create difficulties in By virtue of its mass character, small business is establishing a full-fledged IT infrastructure (more one of the major consumers of computer than 70% of the IT budget is spent specifically on environment and technologies. High potential infrastructure support - servers, operating systems, market capacity of information technology sales (IT) storage devices, network equipment): Population of encourages producers to develop special-purpose hardware and software tools is typically formed products tailored to specificity of activities and during a long time as needs arise to the detriment of peculiarities of using information technologies by its integrity and complexity. The high cost of this category of economic actors. hardware and software tools compels to be content

85

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan with the minimal means for automation of the most cost of maintaining the IT infrastructure become critical business processes. The implementation of significantly important in the company's budget. important individual projects for the small business A further increase in size of the enterprise and the segment is more the exception rather than the rule. growth of informational saturation of business The maturity of the small businesses’ IT require an even higher degree of organization in the infrastructure to a large extent depends on the IT infrastructure management process. Enterprises informational saturation of business, number of of the group have developed an organizational employees occupied with the extension work, the structure, clearly differentiated functional tasks of population of computers and office equipment, the divisions, departments and services, staff formalization degree of management processes [2]. responsibilities. Administration clearly understands Microenterprises (meaning a certain "average the relevance of IT assets for the business statistical enterprise", for which information functioning, the cost of maintaining the IT technology is not the main activity category) with a infrastructure take a significant place in the small number of information officers for the most corporate budget of the company. Much attention is part do not have a developed organizational structure paid to IT asset management matters, IT and a clear-cut segregation of duties. Duties of infrastructure development and information security. maintenance and operability assurance of hardware The chosen topic is relevant because that and software tools are performed by a temporary company managers comprehended the fact that employee, or one of the enterprise workers in the under present-day conditions it is not possible to occurring problems response-ready mode. Decisions manage as of old has led to the widespread use of on the purchase and modernization of software, information systems (IS) in the activities of any hardware are spontaneous and unsystematic, scale enterprises. A wide range of tasks requiring the accepted by the head without a clear justification of use of IS and a high degree of relevance have led to needs and cost-effectiveness calculation. IT the emergence of a wide variety of software infrastructure management as a conscious business products and methods that to a certain degree help to process is absent, there is no standardization of resolve a set of applied problems. The consequence management processes, IT infrastructure is not is ambiguity and vagueness faced by the customer effective, is not scalable, unreliable, there is a poor and designer of the new IS. Understanding this and a level of IT security. Owing to the low dependence lot of failures in the IS design have led to the between efficiency of business and extension work, emergence of new methodologies and design financial losses due to malfunction of computer standards, as well as computer-aided design software equipment are small. tools (CASE-technologies). Large replicable More large-scale business requires regular software developing companies created the management process establishment, more accurate appropriate basic software products that provide data regulation of duties and division of labor. A larger storage and access to them at the low physical layer. number of employees and the number of computers Recently there has been an intensive mean a higher degree of dependence between IT development of integrated systems that perform a usage efficiency and a business itself. Typically, in a multitude of functions of planning and management company of such scale a network based on the business processes. Such information systems, dedicated entry-level servers is deployed, entitled generally as ERP-systems, besides the basic centralization of information resources and resource resource planning functions, sales and production sharing are beginning to emerge. IT infrastructure management, replenished with functional modules maintenance is carried out by regular IT specialists of demand forecasting, project management, cost or outsourced. More attention is paid to information management, the production composition control, security, cost planning and license management. The manufacturing information management, as well as management Integrated information systems had been of human resources and financial activity of the implemented and successfully applied in large enterprise. Naturally, such information systems are companies quite long ago. In small businesses there unique, expensive, and its design and development is no comprehensive approach to the accounting can be afforded by very large companies only. The system containing a systematized information, fully world's leading software developing companies like satisfying the needs of accounting, tax and Oracle, SAP, Microsoft and others are carefully management accounting in a reliable and live data monitoring these trends and offer their services of with minimal time and labor costs. At the same time, development of systems based on their own client- small businesses oriented on a long and successful server database management systems (DBMS).

86

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan work, also need to create a so-called ERP-system or Let us define a generalized functional structure of an integrated management information system. the IS, irrespective of its size and complexity, as a ERP (Enterprise Resource Planning) - the set of the following components: organizational strategy of integration of production - informational base (first of all - the and operations, human resource management, database); financial management and asset management - storage and data management system, user focused on continuous balancing and optimization of interface (application software); enterprise resources through a dedicated integrated - system software; suite of applied software that provides a general data - hardware; and processes model for all scopes of activity. ERP- - a person as a user and/or decision maker. system - a specific software package that Reflection of the company activity’s subject field implements the ERP strategy. concentrated in the informational database, which is At the same time, any complex product, the IS core. All the remaining components are especially ERP-system cannot be delivered in the needed to ensure effective use of information by a form of retail version. The main reason for this is person. Let us now estimate the current moment that each customer is unique and there can only be condition of other components for use in the project individual approach. Using standard solutions can in terms of their elaboration and the critical factor reduce costs on the individual customization, but proximity degree. does not exclude them to the full extent. A rather Hardware is developing intensely, it has very wide variety and specificity of subject fields of a wide fields not only for speed, but the volume of small business also do not allow the use 'out of the data stored in it. Its broad spectrum presented on the box' solution for their tasks. In this case, small market and allows any necessary hardware businesses can either use information systems based configuration. System software is characterized by on replicated DBMS, such as “1C” with a limited set similar conditions. of strictly regulated functions, or develop or order a Application software is divided into a low-level unique information system based on a file server or (hardware-dependent) and, in essence, an application client-server replicated DBMS. Heterogeneity of that provides users with ability to work with data - small businesses and their business functions user interface. Low-level DBMS are developed by determine the relevance their own information large-scale software manufacturers, are well systems development. presented on the market and are the basis for In this work, the main aim is to develop an developing IS appropriate to a company’s needs. information system and its implementation on small Often IS developers as a base DBMS use the businesses, as well as improving the level of factory products of leading manufacturers (Oracle, automation. Microsoft, etc.) The most efficient approach to What is meant by the term “design” is usually a develop IS for a small business is designing based certain unified approach, which defines the ways to on a low-cost replicated DBMS, for example, Fox accomplish the assigned task. The design objective Pro, Paradox, or other suitable system. It is is to create a project of such a system that will necessary to take into account a number of features satisfy the specified (possibly informal) that should ensure the necessary quality of the requirements, which implies the need to have the project. requirements specification for the design of IS. In Realization of this goal has led to the need to essence, the designing itself should begin with address the following tasks: preparation of the requirements specification for the - subject field analysis and the IS project. None the less, it is clear that there is no such requirements formation; universal method that allow the developer to pass a - design; well-defined sequential path from complex system - development; requirements to the point having all of them - software testing and implementation. accomplished. Сomplex system design is by no The object of the work is a model of small means confined to the blind adherence to a certain businesses in which the process is implemented set of actions. It is typically gradual and iterative information system implementation. The subject of process, but using the design methodology still this work are the processes, work carried out during brings in a certain orderliness to the process of the selection of an effective system of accounting development. and enterprise management. Methods of research - is to collect the necessary information to create software that by automation

87

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan will increase the efficiency of accounting and widely (albeit with some modifications) as a tool in management of small businesses. many modern DBMS. The scientific novelty of the development is to Consider the set of models construction create an information system to automate the peculiarities in terms of their effective use with production activities of small businesses, improve reference to our task. the quality of information processing. Modelling approaches are divided into object- oriented and structural ("algorithmic approach" 2.Problem statementTo develop an information according to the terminology of G. Booch [3]). system, which should keep records and to manage Although both schemes solve the same task, they do by following resources of companies: it in different ways. Regardless of the fact that the - Funds, which include cash and non-cash money, conceptual level of modelling is hardware- who are on the company's accounts or in its offices, independent, type and properties of the conceptual while they accounted for its value; model still depend on the specified modelling - Liabilities, reflecting the company's debts to method. Development of an other economic entities or debt of these entities to based on the description of the domain objects along the enterprise, which are also taken into account in with their properties leads to the terms of value; implementation. Description of objects as entities - Inventories, including raw materials, goods and and attributes separately from the properties’ finished products, which are (or may be) in description is implemented in the structural model. warehouses and businesses are accounted for in The choice of modeling approach also provides value and volume terms; further orientation towards the use of a particular - Property of company, or tangible and intangible design approach and the possibility of using a objects that are used for business enterprises, are variety of corresponding software tools. The object- taken into account in value and volume terms. This oriented approach allows us not to stick to a strict category includes fixed assets and intangible assets; succession of designing stages and implies the - Personnel, which is a special type of resource, iterative nature of working on the project. It has not formally having value. It is taken into account in doubtless advantages for large-scale projects on a special way. which work is carried out by large teams of IS design stage itself consists of several stages programmers. In this case, the project is divided into and carried out by constructing a hierarchy of parts, each of which is performed by a separate models, starting with the conceptual model of a group of developers. subject field and ending with the physical model of It is logical to assume that the informational the informational base. Further let us follow this needs of the small scale enterprises in most cases approach, bearing in mind that for its can be represented in a relational database form. It implementation there is a wide range of instrumental determines the choice of a structural method for methods known collectively as CASE-technologies. modeling a small business substantive activity. In the general case, the CASE-technologies Corresponding model obtained after each of the implementation methods are oriented towards the above mentioned levels elaboration must be design of integrated enterprise systems, but using represented as a scheme based on use of a particular them for the design of small and even local IS is also selected notation. quite efficient. Let us consider some methodical studies and It is generally accepted that before the project corresponding toolset needed to implement each implementation it is required to have a full stage of the IS design. Such consideration is conception of the subject field, i.e., to have a certain expedient to start from the end, i.e. physical model, describing model. Ideas and approaches to the as in this case goals that comply with objectives and analysis and design of IS based on semantic each stage’s characteristic features are manifested modelling proved to be very productive and are used more clearly. The physical model of a relational database is represented as a set of interrelated tables specificity, so it is suitable for any scale IS. It is which typically comply with the third normal form, reasonably well formalized and elaborated, which is or Boyce-Codd form requirements. This model is the reflected in many sources. Database physical model last design step and oriented towards the construction toolset is a software part of almost any implementation in a specific DBMS. replicated DBMS. Commercially available The methodology and the technical aspect of a replicated DBMS - Access, Fox Pro, and others relational database construction does not have

88

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

- provide a good toolset for the physical database Role of Environment, Organizational and Leader model formation. Determinant // International Journal of Business, The planned IS takes into account for the Humanities and Technology Vol. 2 number 4; June following features: 2012 ¾ P. 60-66. - a wide variety of subject field’s specificities; [2] Provalov V.S., Efimova E.V. Information - future functional expandability; technologies in small business // Topical problems - a tight budget; of regional economy. National scientific-practical. - integrity and project completeness, the conf. materials Kirov: VyatGGU. 2011. minimum of risk; [3] G. Booch Object-oriented analysis and - adherence to the time limits; design. M .: Binom, 1998. - iterations elimination whenever possible; [4] Maklakov S.V. Information systems - simplicity of operation; development with AllFusion Modeling Suite. M .: - minimal user training costs. Dialog_MIFI 2003. [5] Karpova T. Databases. SPb .: St. Petersburg, 3.Conclusion 2002. For developed project its labor intensity, cost and [6] Petrov V.N. Information Systems. Textbook duration of the execution were evaluated. Also, for colleges. SPb .: St. Petersburg, 2003. assess the risks, that is, the uncertainty of bringing [7] Rob P., Coronel C. Database systems: design, the project to completion. For large companies risks implementation and management. SPb .: lead to additional expenses and implementation "BHV_Petersburg ", 2004. delays, whereas for the small companies - it is a [8] Cheremnykh S.V., Semyonov I.O., Ruchkin matter of survival. To reduce the risk expedient a V.S. Structural analysis of systems: IDEF - preliminary study evaluating the complexity of the technologies. M .: Finance and Statistics, 2003. project was conducted. An important factor in [9] S.M. Digo Databases: design and use. ensuring the IS effectiveness, in the developed Textbook. M .: Finance and Statistics, 2005. project was the simplicity of implementation and 10. Marca D.A., C. McGowan Methodology of operation. structural system analysis and SADT design / Trans. 4.References from English. M .: Metatehnologiya 1993. [1] Rahab, Jogiyanto Hartono Adoption of Information Technology on Small Businesses: The

Разработка информационной системы для предприятия малого бизнеса

Пащенко Г.Н., Кабулов Б.М.

Международный Университет Информационных Технологии, Кафедра Информационных Систем, Казахстан, Алматы 050040, Ул. Манаса/ул. Джандосова 34 «А»/8

Малый бизнес — неотъемлемая часть любого развитого государства. В настоящее время использование информационных технологий в управлении малым бизнесом - объективная необходимость. Разнообразие и специфика предметных областей малого бизнеса часто не позволяют использовать для их задач полностью готовые решения. Это обусловливает актуальность разработки для них собственных информационных систем.

Шағын бизнес кәсіпорны үшін ақпараттық жүйе құру

Пащенко Г.Н., Кабулов Б.М.

Халықаралық Ақпараттық Технологиялар Университеті, Ақпараттық жүйелер кафедрасы, Қазақстан, Алматы 050040, Манас көш./Жандосов қиыл. 34 «А»/8

Шағын бизнес – кез келген мемлекеттің ажырамас бір бөлшегі. Қазіргі уақытта шағын бизнесті басқаруда ақпараттық технологияны пайдалану – объективті қажеттілікке айналып отыр. Шағын бизнестің сан – салалығы олардың мақсат – міндеттері үшін дайын шешімдерді қолдануға көп жағдайда мүмкіндік бермейді. Бұл жағдай олардың жеке – дара ақпарат жүйесін жасақтаудың өзектілігін туындатуда.

89

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Development of information and training system for online courses of Information Technology

R.Uskenbayeva, V. Serbin, K.Duisebekova, А. AltaibekP, A. Syrymbayeva

International IT University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The project aims to improve the quality of training and retraining of specialists and teachers in the field of modern information and communication technologies at the expense of information and training system, comprising interactive services online courses developed by the best teachers of Kazakhstan IT-specialties; Transformation of the best content for information and communication technologies, as well as the collection, systematization and centralization of the best courses in Kazakhstan ICT technologies on a single platform. As a result, the project solved complex multi-step problem of training / re-training of specialists in information and communication technologies, not only within the walls of the International University of Information Technologies, but also far beyond.

1.Introduction By analyzing the social significance of information Information technology is central to the process technology, it seems appropriate to state the of intellectualization of society, the development of following: its education system and culture. In addition, the use - Modern information and communication of educational information media has been very technologies make it possible to strengthen and effective method for self-education systems, as well effectively use information resources of society, as for training and retraining systems. which are the most important strategic factor in its The processes of informatization of modern development. society and is closely related processes of - The development of civilization is in the informatization of all forms of educational activities direction of the information society in which the are characterized by the processes of improvement majority of the employed population targets and the and mass distribution of modern information and results of labor are not tangible assets, but mainly communication technologies (ICT). Such information and scientific knowledge. At the same technologies are actively used for information time, information technologies allow to optimize and transfer and interaction of the teacher and the in many cases to automate information processes student in the current system of open and distance taking place in society. education. Modern teacher must have not only - Information processes are important elements knowledge in the field of ICT, but also to be an of other more complex production and social expert on their application in their professional processes. In this regard, information technology activity. technology concept involves the application components considered as relevant public or of scientific and engineering knowledge to solve industrial technologies. practical problems. Then, information technology - Telecommunication technologies, as part of the can be considered a process of transformation of information technology, play a crucial role in knowledge into information resource. The purpose providing information interaction between people of information technology is the production of and organizations, as well as in the systems of information for subsequent analysis and decision on production and dissemination of media [1]. the basis of its decisions on the implementation of World experience shows that the competitiveness any action. Information and communication of the national economy as a whole is associated technologies (ICT) - is an generalizing term that with the development of information technologies. describes a variety of devices, mechanisms, According to the World Economic Forum methods, information processing algorithms. Using Competitiveness Index States economy has a high the networking tools of ICT it is possible to access correlation with the index of development in to educational and methodical and scientific information and communication technologies. information, the organization of operational advice, According to the rating of competitiveness of 142 modeling research activities, conduct virtual training countries for the 2012 year, prepared by the World sessions (seminars, lectures) in real time. Economic Forum, the country is actively developing information technology, ahead of Kazakhstan on

90

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

most of the indicators in terms of creating a demand - the provision of educational services to for information technology - 51 th place (US - 13, improve the qualifications of teachers in the field of Germany - 19, India - 63 Egypt - 96), the business information technologies; environment in information technology - 104 th - development of educational programs in the place (US - 21, Germany - 38, India - 72). field of information technologies in the training of One of the main reasons for the backlog of IT teachers of different categories; innovation is the lack of research centers and - creation of informational and methodological development centers and educational centers. environment; All the above factors determine the need for - providing scientific and methodological undertaking development in Kazakhstan own assistance in the preparation of educational and development of software for the operation of methodological materials for filling storage telecommunications infrastructure and its methodical, in the formation of the school server, components in the educational environment. In storage of information, its updating, etc. addition, initiated a process in this direction will Subject quality training IT professionals, teachers bring the IT-industry of the Republic of Kazakhstan and teachers of informatics in general, deserves to a qualitatively new level. special attention. For educational programs in this In the long term, with government support in the area quickly becomes obsolete, which will inevitably sector of research and development of information affect the quality of training of graduates (according technologies the project will create a high-quality to a survey, conducted in the fall of this year, only platform for the training of highly qualified 13% of graduates find that for them is enough professionals, to use the human potential in research knowledge obtained at the university). and develop their own educational software products The rapid development of computer technology in the field of telecommunications and information has opened up before mankind unprecedented technologies, as well as to establish serial production opportunities for the automation of mental labor and for the domestic and the external market. led to the creation of a large number of different kinds of automated information and control systems, 2. Characteristics of the problem to be solved by to the emergence of fundamentally new information the project aims, rationale compliance problem to technologies. Therefore, the idea of re-organization be solved and the objectives of the project of professionals in the field of world-class priorities of socio-economic development information technology is an urgent problem, caused For the Kazakh economy experts, who are ready by the modern requirements to the quality of to create new technologies and implement complex training. That is why the need to develop projects require systematic work based on the best cooperation with different educational institutions, practices of education and training: which train specialists in the IT field. Such - Preparation of the various actors of the cooperation between universities, schools and education system to the use of information production allows to expand the basic system of technology capabilities in the educational process. higher education and introduce modern practical - The implement of Internet technologies in the methods and technologies in the learning process training system. and the process of training [2]. - Optimization of the system of information and methodological support of education on the basis of 3. Objectives of the project modern information technologies. Especially: To implement the objectives of the project - professional development of teachers of expected following tasks: educational institutions in the field of Internet- - to audit compliance training programs at education using multimedia learning tools; universities and teachers of computer programs in - creation of a unified ICT-based information schools; space; - to audit compliance training programs in - scientific and methodological support of schools MES with the actual program in computer educational institutions on the problems of Internet science in schools; Education; - analysis of existing educational programs of - promotion of information technologies in training / retraining of specialists in the field of educational institutions; information technology for computer science - learning needs of teachers in educational teachers, professors of universities and colleges on services in the field of information technologies; the subject of aging;

91

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

- development of courses for students of IT 5. The results of the testing and validation professions in the context of competences and topics platform on real users. in educational programs; 6. Sertificate of implementation of information - the development of training courses of teachers systems. of computer strictly in accordance with the training program in schools on the basis of freely available 5. Preliminary evaluation of the expected open-source software; effectiveness and efficiency of the project - platform development (information system) for Using a single platform for online training in training / retraining of students, teachers and modern information and communication specialists in modern information technology: the technologies will improve the quality of training and choice of implementation technology; architecture retraining of specialists and ICT teachers. [6] development; software development, technical and Development and implementation of an information support; database structure etc..; information system would eliminate the expensive - development policy for the transition to object- overseas training systems. language integrated learning CLIL, a method based The introduction of our own scientific and on the study of the subject of computer science technological developments in ICT will allow through the English language and the English Kazakhstan to become one of the developed language through teaching subject; countries in the field of education. - reprinting textbooks and manuals in English; The effectiveness of the project is determined by - organize educational process of training / re- the quality and originality of applied research, training of students / teachers through online courses performers composition formed reachability goals based IITU, but not only as an object of obtaining and objectives and the discipline of project. trained / retrained staff, but also in the provision of innovative development [3]. 6. References - implementation of information and [1] Сербин В.В. Технология создания development of training system for training and информационно-обучающих систем: retraining of specialists and teachers in the field of концептуальное проектирование. Монография modern information and communication (научное издание). – Saarbrucken, Germany: LAP technologies in the education system of Kazakhstan. Lambert Academic Publishing GmbH & Co. KG,. 2013. – 120 с. - ISSN: 978-3-659-32055-2. 4. Expected outcomes of the project and the [2] Сербин В.В. Технология, методология indicators of socio-economic efficiency создания и разработка информационно- 1. The complex of educational programs of обучающих систем: монография. - Алматы: training and professional development of teachers of АИЭС, 2010. - 198 с. higher education, as well as employees of IT-sphere [3] 19. Сербин В.В. Обучающая электронно- of the audit compliance programs and analytical информационная система в дополнительном review of existing educational programs for образовании // Учебно-методический журнал professionals in the field of information «Внешкольник Казахстана», выпуск №1[17]. – technologies. Алматы: РУМЦДО, 2007. 2. Educational complex on information and [4] Ускенбаева Р.К., Сербин В.В. Разработка communication technologies, including the матрицы агента идентификации пользователя в methodology, training, teaching materials, lectures, информационно-обучающей системе. // Вестник presentations, control measures and accompanying АИЭС. – 2009. – №2. – С.49-53. material, etc. [5] Ускенбаева Р.К., Сербин В.В., Принятие 3. Development of the process of training and решений организации процесса обучения в retraining of students / teachers and specialists in the информационно-обучающей системе. // Труды IT sphere of information and training system to международной научно-практической attract the best staff of highly qualified teachers [4], конференции «Информационно-инновационные [5]. технологии: интеграция науки, образования и 4. Multilingual platform (Information System) бизнеса». – Алматы, 2008. - С.203-208. with the use of modern tools and software [6] Сербин В.В. Инновационный подход к development experience to accommodate online диагностике знаний на основе метода измерения courses and implementation of advanced training in уровня сомнений тестируемого для E-learning modern information technologies with the //Исследования по экономике информационных organization distributed access. систем: Материалы научно-практической

92

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

конференции «Экономическая эффективность М.: Экономический факультет МГУ имени М. В. информационных бизнес-систем» / Под ред. В. Ломоносова, 2015. – С. 224-231. Л. Макарова, М. И. Лугачева, К. Г. Скрипкина. –

Разработка информационно-обучающей системы онлайн курсов по информационным технологиям

Р.Ускенбаева, UВ. Сербин, К.Дуйсебекова, А. АлтайбекP, A. Сырымбаева

Международный Университет Информационных Технологий, Кафедра «Информационные системы», 34 «А»/8 «А» ул.Манаса/Жандосова, Алматы 050040, Казахстан

Целью проекта является улучшения качества подготовки и переподготовки специалистов и преподавателей в области современных информационно-коммуникационных технологий за счет информационно-обучающей системы, содержащей интерактивные сервисы онлайн курсов, разработанных лучшими преподавателями IT- специальностей Казахстана; трансформация лучшего контента по информационным и коммуникационным технологиям, а также сбор, систематизация и централизация лучших курсов Казахстана по ИКТ технологиям на единой платформе. В результате выполнения проекта решается многоэтапная комплексная проблема подготовки/переподготовка специалистов по информационным и коммуникационным технологиям, не только в стенах Международного университета информационных технологий, но и далеко за его пределами.

Ақпараттық технологиялар бойынша желіде тікелей оқытуға арналған ақпараттық-жаттықтырушы жүйені құру

Р.Ускенбаева, UВ. Сербин, К.Дуйсебекова, А. АлтайбекP, A. Сырымбаева

Халықаралық Ақпараттық Технологиялар Университеті, Ақпараттық жүйелер кафедрасы, 34 «А»/8 «А» Манас көш., / Жандосов көш., Алматы 050040, Казахстан

Жұмыстың мақсаты мамандарды ақпараттық технологиялар бойынша Қазақстанның IT саласының үздік оқытушылары даярлаған интерактивті сервисті қолдана отырып, тікелей желідегі ақпараттық- жаттықтырушы жүйе арқылы даярлау және қайта даярлау сапасын жақсарту; ақпараттық және байланыс технологияларының таңдаулы құрамының өзгеруі тек мамандандырылған құзыреттілік орталығы – Халыкаралық Ақпараттық Технология Университетінде ғана емес, басқа да одан тыс жерлерде және Қазақстанның ең таңдаулы бірыңғай тұғырнамада ақпараттық технологияға оқыту жүйесін жүйелендіру, жинақтау, орталықтандыру болып табылады. Жұмыстың барысында мамандарды ақпараттық технологиялар жетістіктерін пайдалана отырып даярлау және қайта даярлау туралы көп кезеңді кешенді мәселе Халыкаралық Ақпараттық Технология Университетінде ғана емес, одан тыс жерлерде де шешіледі.

Information system analysis of the underground pipeline

S.Dairbayeva, A.Dairbayev, B.Rysbaiuly

International Information Technology University, Information SystemsDepartment, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty050040, Kazakhstan

Article is devoted to the research of existing Information systems of the underground pipeline and analysis of automation of oil delivery process. As the result of research, it was chosen Supervisory Control and Data Acquisition system – SCADA. In the article given recommendations about solution of the problem of oil transportation by hot pumping method and Information system (IS) development that allows to optimize the continuous working process of oil pipeline. Keywords: Information system(IS), automation, oil delivery and pumping processes, Main pipelines (MP), Monitoring and supervisory control system (MSCS), Automated workstation (AWS), Control station (CS), Supervisory Control and Data Acquisition (SCADA) system.

1. General in a year. A larger volume of oilis transported Kazakhstan is one of the largest oil producer and through the pipeline, the total length of which on the exporter. Itrecovers and transports million tons of oil territory of Kazakhstan is 5495 km. Transportation

93

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan of oil by main pipelines provided by 39 pump control of pumping oil quantity and quality, and stations, 64 heater treaters and reservoir storage, dispatcher decision support. where volume is about 1259 thousand m3. The Specific aspects of modern management system pipeline crosses the entire country with varied of oil transporting is that system is disunion from geography [1]. methods and options to handling type. Each However,oil, which is produced in Kazakhstan, programmer works independently, and has own contains high amount of waxes. It is called high- input format. Only SCS work in real time, others viscosity and thickening oil. The purpose to prevent from time to time (if requested). Primary target of the waxing problem and energy losses is SCS is operating control of oil flow process, which usingheating stations. But when oil transferred from accomplished by: one station to another, may have issues related with − automatic control, monitoring and changing transportation process. indication in hardware, and identifying abnormal The main problem in oil transportation is the situations; changes of temperature requirements in oil pumping − planning of oil pumping volumes based on oil process that affected by different factors. One of resources information; them is thermal shock of environment, particularly − calculating acceptable and optimal operating during thewintertime. conditions of processing equipment; During heating oil movement process the heat − remote control of process; exchangeis occurred with environment, like − report generation. aprecoatfor undergroundpipelining or air for As concerns, Settlement-analytical and directory aboveground pipelining. Consequently, the oil assistance system (SADA)is based on Structured temperature and oil viscosityaredecreased and Query Language (SQL) technology and includes pressure losses isincreased. current oil accounting, calculation-working As a result, the changes of temperature conditions of oil pipeline, clearing transaction and requirements in pipeline lead to the waxing problem reporting. and complete half of oil pipeline. Restarting of oil Summarized functional structure of Monitoring pipeline accompanied with many difficulties. By this and supervisory control system (MSCS) and their reason, the development of heat condition of high- subsystems shown in Figure 1. viscosity and thickening oil Information system is Finally, it should be mentioned that now because the highly relevant objective [2]. of rapid growth of information technologies occurs 2. Information system analysis of the main oil necessity to change the automation systems. By this pipeline reason, development of Information systems (IS) Information systemsare widely used in gas and and databases for controlling oil thermal regime oil industry. Among them, there are two classes: become particularly topical [3]. Information Management Systems (IMS) and Analysis Information System (AIS). Integration of these systems can significantly increase efficiency and safety maintenance of oil fuel. The using of IS in the field of oil pipeline execution depends on the issues which the developer sets up. For example: technological task means planning, monitoring and controlling oil delivery through Main pipelines (MP). Maintenance operations are rework processes of equipment or MP constructions, and ensuring by material and technical resources. Modern main pipelines are equipped by Monitoring and supervisory control system (MSCS). It consists of subsystems – Supervisory control Figure 1 – Functional structure of MSCS system (SCS) and Settlement-analytical and directory assistance system (SADA). Primary 3. Automation of oil delivery process objectives of them are oil delivery controlling, asset Technological process automationassumes condition monitoring of Pumping/Heating Stations, accomplishing the following activities: reservoirs and linear parts. Then identification of − alteration of technological characteristics various emergencies as equipment breakdown, (temperature, pressure, oil flow rate etc.);

94

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

− inherent regulation of technological process − cases when parameter isexceeded minimum or parameters and processing equipment; maximum boundaries. − deviation alarm: valve status (open/close), Database and historical journal are represented equipment (device on/off); like collection of tables, which include current, − emergency shut-down system [4]. historical and referenced data. As Data Base In the process of parameters measuring, the Management System (DBMS) is used Microsoft sensing unit sends the signal to controller. In this SQL Server 2014.Human-computed interface can be step, data undergoes initial processing, such as realized in any SCADA system like MasterScada analogue-to-digital conversion and noise 3.6. Distinctive feature of system is using filtering.Second step, over network and from theadditional database for temporary storage of controller, the Automated workstation (AWS) is got parameters. the digital code. On the AWS displayed the parameter values (Figure 2).Last step, controller 4. Conclusion responsible to give appropriate feedback. In this It was established analytically that the case, operator decide the suitable mode (manual or automation of Information system for controlling oil automatic).Figure 2 demonstrates simplified diagram thermal regime can realized in any Monitoring and of this process. supervisory control system like SCADA.In summary, main advantage is fully-automated control workstation with database and in real-time.

5. References Figure 2 – Simplified diagram of the passage of [1] Fundamental facts of Kazakhstan oil and gas information signal during measurement process industry // URL: http://www.kmgep.kz/ar/2010/neftagaz_rus.php One of the general function of controllers is [2] Dairbayeva S.A., Rysbaiuly B.R., Dairbayev initial data gathering that stored as array in main A.M. Information system of thermal mode of oil memory. Controller for information interchanging pumping in non-isometric main pipelines// between it and server forms messages. Messages are Proceedings of the Seventh International Scientific stored in memory buffer and demonstrates: & Practical Conference “Innovative development − when discrete parameter is changed; problems in oil & gas industry”, Kazakh-British − timing deadline; Technical University, Almaty, Kazakhstan, 9-11 April 2015, p. 564. [3] Андреев Е.Б., Ключников А.И., Кротов пособие для вузов. -М.: ООО «Недра- А.В., Попадько В.Е., Шарова И.Я. Бизнесцентр», 2008. -399с. Автоматизация технологических процессов [4] Zholymbetova Z.Z. Process automated добычи и подготовки нефти и газа: Учебное control system development of cooling device// Master's thesis, Almaty, 2014.

Анализинформационныхсистемподземноготрубопровода

С.Даирбаев, А.Даирбаев, Б.Рысбайулы

Международный университет информационных технологий, Кафедра Информационных систем, 34 «А»/8 «А» Манаса/Джандосова., Алматы050040, Казахстан

Статья посвящена исследованию существующих информационных систем подземного трубопровода и анализу автоматизации процесса перекачивания нефти. В результате исследования выбрана система диспетчерского управления и сбора данных – SCADA. В статье даны рекомендации по решению проблем транспортировки нефти методом горячей перекачки и созданию Информационной системы (ИС) позволяющей оптимизировать процесс бесперебойной работы нефтепровода.

Жер астындағы құбырының ақпараттық жүйелерін талдау

С.Даирбаева, А.Даирбаев, Б.Рысбайұлы

95

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Халықаралық ақпараттық технологияларуниверситеті, Ақпараттық жүйелер кафедрасы, Манас 34 «А»/Жандосов 8 «А» көш. қиылысы.,050040Алматық, Қазақстан

Мақала қолданыстағы ақпараттық жүйелерді және мұнай автоматтандыру процесін айдау жер асты құбырын талдау зерттеуге арналған. SCADA – зерттеу жүйесі бақылауды және деректерді диспетчерлік басқармасының таңдалуы. Мақала ыстық ауыстыру және құбыр процесі апатсыз жұмысын оңтайландыруға мүмкіндік береді ақпараттық жүйе (АЖ), оңтайландыру үшін мұнай құбырының үздіксіз жумыс процесін береді.

Communication patterns in MPI

Seitbekova Y., Erzhanova T., Illaletdinov F., Sabitov K.

Kazakh National University named after al-Farabi, Timiriazev 70, Almaty, Kazakhstan

An objective of the research is to identify the importance of communication in the message passing model of parallel programming. There given one of the possible solutions to the problems of communication protocols and assesses to current model in this article.

1. Introduction processors communicate with each other via We already know that a traditional model of networks of some kind. programming is sequential model. A programmer Here one has a set of commodity PCs and working in the framework of this model considers networks them for use as a parallel processing that it has an abstract computer within one CPU and system. The PCs are of course individual machines, memory. capable of the usual uniprocessor (or now In message passing model, this is the one of the multiprocessor) applications, but by networking type of parallel programming model, architecture of them together and using parallel-processing computer is different. In this case we assume that software environments, we can form very powerful computer is made by connecting several computers parallel systems. with own memory. CPU and its random access One factor which can be key to the success of a memory are connected to the communication cluster is the use of a fast network, fast both in network and named as a “host”. Parallel terms of hardware and network protocol. Ordinary programming in message passing model is a Ethernet and TCP/IP are fine for the applications collection of simple sequential programs running at envisioned by the original designers of the Internet, one time in different CPU [1]. e.g. e-mail and file transfer, but is slow in the Message Passing Interface (MPI) - application cluster context. A good network for a cluster is programming interface (API) for the transmission of Infiniband [2]. information, which allows you to exchange Even just sending information takes a time. This messages between processes that perform a single is illustrated in picture “Figure 1”. task. MPI is the most common interface standard for data exchange in the parallel programming of its implementation, there are a large number of computer platforms. It is used in the development of programs for clusters and supercomputers. The primary means of communication between processes in the MPI is to transfer messages to each other.

2. Message passing Here we have a number of independent CPUs, each with its own independent memory. The various

96

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

There are two types of network channels: two- Figure1: Blocking and non blocking message point and broadcast. The two-point communication passing link comprises a transmitter at one end of the line and the receiver at the other end. For two-point lines As illustrated in picture that every message developed many link-layer protocols. Later in this sending takes a time. So engineers should work on chapter you will learn about two of these protocols: reducing message transmitting time. PPP (Point-to-Point Protocol - transmission protocol from point to point) and HDLC (High-level Data 3. Performance Issues Link Control - high-Link Control Protocol) [3]. The Clusters have become so popular that there are second type of channel, the broadcast channel may now “recipes” on how to build them for the specific have several transmitting and receiving units purpose of parallel processing. connected to the same shared broadcast channel. Mere usage of a parallel language on a parallel The term "broadcast" is used herein because, when platform does not guarantee a performance one node transmits a frame, this frame is received improvement over a serial version of your program. by all other nodes attached to the channel. Examples The central issue here is the overhead involved in of the use of broadcast technology link layer are inter node communication. Ethernet-network and wireless local area networks. Infiniband, one of the fastest cluster networks In this section, we will make a small digression link commercially available, has a latency of about 1.0- layer protocols and the first look at a very important 3.0 microseconds, meaning that it takes the first bit channel for the level of the problem, is to coordinate of a packet that long to get from one node on an the access of the set of transmitting and receiving Infiniband switch to another [4]. Comparing that to nodes to a common broadcast channel - so-called the nanosecond time scale of CPU speeds, one can problem of multiple access. Broadcast channels are see that the communications overhead can destroy a often used in LANs, i.e. networks geographically program's performance. And Ethernet is quite a bit concentrated in the same building (or building slower than Infiniband. complex belonging to the same organization, such Latency is quite different from bandwidth, which as universities or companies). At the end of this is the number of bits sent per second. Say the section, we look at how the use of multiple access latency is 1.0 microsecond and the bandwidth is 1 channels in local area networks. gigabit, i.e. 1000000000 bits per second or 1000bits We all know the concept of broadcasting, so to per microsecond. Say the message is 2000 bits long. number the data transmission technology used in Then the first bit of the message arrives after 1 television since its invention. But in the traditional microsecond, and the last bit arrives after an television broadcast of a one-sided, as there is one additional 2 microseconds. In other words,the fixed node transmits information to a plurality of message is does not arrive fully at the destination receiving nodes. Meanwhile, units of computer until 3 microseconds after it is sent. networks can broadcast as the second to receive data In the same setting, say bandwidth is 10 gigabits. and transmit them. Perhaps closer to the broadcast Now the message would need 1.2 seconds to arrive network computer analogy is a cocktail party, where fully, in spite of a 10-fold increase in bandwidth. So many people gather in a large room (including the latency is a major problem even if the band width is broadcast channel in this case is air) to speak and high. listen. The second good analogy is familiar to many For this reason, the MPI applications that run readers - the classroom, where teachers and students well on networks tend to be of the “embarrassingly share a common broadcast media. The central parallel” type, with very little communication problem of both scenarios is to decide when and between the processes. who gets the right to speak (transmit channel). Of course, if your platform is a shared-memory People have developed a complex set of rules for multiprocessor (especially a multi core one, where collective use of the channel: communication between cores is particularly fast)  «give everyone an opportunity to speak»; and you are running all your MPI processes on that  «Do not tell until you do not speak»; machine, the problem is less severe. In fact, some  «Not monopolize the conversation»; implementations of MPI communicate directly  «If you have a question, raise your hand»; through shared memory in that case, rather than  «Do not interrupt the speaker's loud snoring » using the TCP/IP or other network protocol. Exchange of data on computer networks also 4. Network channels manages a set of rules that make up the so-called multiple access protocols. As shown in Figure 2,

97

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan multiple access protocols used in the networks of protocols, we can fall into one of three categories: various configurations, including wired and wireless the separation channel protocols, protocols, random local area networks and satellite networks. Although access and sequential access protocols. We will technically, each node has access to the broadcast discuss these categories of public access protocols channel via the adapter, in this section and the in the following three subsections. transmitting and receiving device will be called the The conclusion of this review, we note that in an node. In practice, one broadcast channel can ideal case, the protocol for multiple access communicate with hundreds or even thousands of broadcast channel with a data rate R bit / s must nodes. Because the frames can pass all the nodes it have the following characteristics. is possible that both will begin transmitting multiple  When data for transmission is only at one node, nodes. When this happens, each of the nodes this node has a bandwidth of R bits / s. simultaneously receives multiple frames, that is, the  When data for transmission have M nodes, each host node has a choice between the transmitted of these nodes has a capacity of R / M bit / s. This frames. As a rule, in case of conflict receiving nodes does not mean that each of M nodes at each time cannot correctly process received frames, such as point may transmit data at a rate R / M bit / s, - the the frame signals are superimposed on each other. average speed data of each of the nodes. Thus, all parties involved in a collision frames are  The protocol is decentralized; it means that there lost, and all the time they were transferred, is is no control nodes, failure of which can stop the wasted. Obviously, the presence of the plurality of operation of the entire network. nodes requiring frequent data transmission has a  The protocol is simple and inexpensive to high probability of collisions and low utilization of implement. the channel. To ensure high performance of the channel with 6. References a large number of active nodes must somehow [1]Немнюгин С. А. Параллельное coordinate transfer of frames. For this coordination программирование для многопроцессорных protocol meets multiple access. Over the past 30 вычислительных систем. – БХВ-Петербург, years on multiple access protocols were written 2002. thousands of articles and protected hundreds of [2] Matloff N. Programming on parallel machines doctoral theses. Moreover, active research multiple //University of California, Davis. – 2011. access protocols continues until now, which is [3] Martini L. et al. Encapsulation Methods for caused by the emergence of new types of Transport of PPP/High-Level Data Link Control communication lines, for example the new wireless (HDLC) over MPLS Networks. – RFC 4618, channels. September, 2006. [4]Liu J., Wu J., Panda D. K. High performance 5. Conclusion RDMA-based MPI implementation over Infiniband Over the years with a wide range of technologies //International Journal of Parallel Programming. – link layer protocols are implemented dozens of 2004. – Т. 32. – №. 3. – С. 167-198. community access. However, almost any of these

Паттерны коммуникации в MPI

Сейтбекова И., Ержанова Т., Илялетдинов А., Сабитов К.

КазНУ им. аль-Фараби, Алматы, Казахстан

Важной исследовательской задачей является выявление важности коммуникации в передачи сообщения в модели паралельного програмирования. В данной статье расматривается одно из возможных решений проблем протоколов коммуникации и дается оценка к дейсвующей модели.

MPI қатынасу паттерні

Сейтбекова И., Ержанова Т., Илялетдинов А., Сабитов К.

Аль-Фараби атындағы ҚазҰУ, Алматы, Қазақстан

98

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan Зерттеудің негізгі міндеті – кеңінен қолданылып отырған паралельді программалаудың мәлімет алмасу моделінің қарым-қатынас құралының маңыздылығын көрсету. Бұл мақалада осы аталған моделге баға беріліде және қарым-қатынас протоколына енгізуге болатын өзгертулер келтіріледі.

Analysis of encryption algorithms RSA, DES, 3DES and AES

Serbin V.V., Kuanyshbekova M.B.

International IT University, Department of Information Systems, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

With the rapid progression of the digital exchange of data in electronic way, information security is becoming more important in the data storage and transfer. Encryption is the process of permutation elements message so that only the intended recipient can read it. With the development of human intelligence, cryptography, the art has become more complex in order to make information more secure. Many encryption systems are deployed worldwide by various organizations information systems. This article provides an overview of the different encryption algorithms.

1. Introduction encryption with an open key [2]. The key can be a In recent years there were many applications as numerical, alphanumeric or special symbol. The online store, exchange trade, Internet banking and choice of a key in cryptography is very important as electronic payment of accounts, etc. Such safety of algorithm of encryption directly depends transactions for the protected connections, on a wire on him. Power of algorithm of encryption depends or wireless network have to be confidential for on privacy of a key, length of a key, an initialization providing data of authentication, confidentiality, vector and as all of them work together [3]. integrity and availability, also known as a triad of Asymmetric methods of encryption by about 1000 CIA [1]. ]. The NIST Computer Security Handbook times more slowly, than symmetric encryption that [NIST 95] defines the term of computer safety as does it impractical in attempt to cipher large "the protection provided in the automated volumes of data. Besides, to receive the same quality information system for achievement of preservation of safety as symmetric, asymmetric algorithms have of integrity, availability and confidentiality of to use stronger keys, than keys of symmetric information (includes hardware, the software, encryption [4]. Classification of the main methods of hardware-software information / data and encryption it is shown on Figure 1. telecommunications)”.Safety is the mechanism by means of which information and services are protected from inadvertent or unauthorized access, change or destruction. Safety in a network is based on cryptography (the word from the Greek origin means «hidden, secret"), science and art of transformation of messages to make them safe and steady against influence [1]. The algorithm of encryption carries out various substitutions and transformations on a clear text (the initial message before encryption) and will transform him in encoded (coded the message after encryption). Many algorithms of encryption are widely available and are used in the field of information security. Algorithms of encryption are divided into two groups: Symmetric (also called by a confidential key) and asymmetric (also called by an open key) encryption. The symmetric key of encryption is a form of cryptosystem in which encryption and interpretation are carried out with use of the same key. Asymmetric encryption is one of forms of cryptosystem in which encryption and interpretation Figure 1. Encryption algorithms are carried out with use of various keys - one open key and one closed key. He is also known as 99

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan Generation, modification and transportation of cryptosystem on the basis of the theory of numbers keys have been made by means of algorithm of which represents system of the block code. He uses encryption. He is also called as cryptographic two prime numbers for generation of the opened and algorithm. There are many cryptographic algorithms closed keys. These two various keys are used for available in the market to cipher data. Power of encryption and decoding of the purpose. The sender algorithm of encryption substantially depends on the ciphers the message by means of an open key of the computer system used for generation of keys. sender and the recipient and when the message comes to the receiver, the receiver can decrypt it by 2. Review of algorithms of encryption means of his personal confidential key. The 2. 1 Rivest-Shamir-Adleman (RSA) operations RSA can be broken into three big steps: RSA is designed by Ronald Rivest (R.Rivest), generation of a key, encryption and decoding. RSA Adie Shamir (A.Shamir) and Leonardo Adleman have many shortcomings of his design therefore isn't (L.Adleman) in 1978. It is one of the most known preferable to commercial use. When length of value public cryptosystems for an exchange of keys, p and q for design of a key are chosen small, process digital signatures or encryption of blocks of data. of encryption becomes too weak, and it is possible to decipher data with the help of casual probability theory and attacks from the channel. On the other hand, if length of P and Q big, then it consumes more time, and productivity worsens in comparison with DES. Besides, the algorithm also demands identical length for р and q, is practically very severe conditions for satisfaction. Such methods in such cases increase overhead costs of system, spending more time for processing [5]. Procedure of generation of keys [1] 1. Choose two various large random prime numbers р & q such that р ≠ q. 2. To calculate n = р × q. 3. To calculate: phi(n) = (r-1) (q-1). 4. Choose number е it that 1<е

3. Data Encryption Standard (DES) DES is one of the most widely recognized, public cryptographic systems. She has been designed by IBM in 1970 but later has been accepted by National institute of technologies (Introduction of norms of NIST) as Federal Information Processing Standard 46. Data Encryption Standard (DES) represents the block of the code which is intended for encryption and decoding of blocks of the data consisting of the 64th bit by means of 64-bit keys. Though entrance data for DES has length of 64 bits, actual the used keys on DES are made by only 56 bits in length. The least significant (most right) bit in each byte of bits

of parity, has to be established in such a way that Figure 2. The flowchart of algorithm of creation of there is always an odd number 1s in each byte. an open and confidential key in the RSA These bits of parity are ignored so only seven most cryptosystem on significant bits of each byte therefore length of a key an elliptic curve of 56 bits are used. The algorithm passes through 16 RSA uses the changeable size of the block of iterations. The algorithm will transform a 64-bit encryption and a key. It is asymmetric (an open key) entrance to series of steps to a 64-bit exit. The same 100

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan steps, with the same key are used for interpretation. 4. Triple DES (3DES) There are many attacks and methods which still 3DES or Triple Data Encryption Algorithm operate those shortcomings of DES which have (TDEA) have been designed for the purpose of made it the unsafe block code. Despite the growing elimination of obvious shortcomings of DES without concern about the vulnerability, DES online of design absolutely new cryptosystems. Encryption of appendices [3] is still widely used in financial data of DES uses a 56-bit key and it isn't considered spheres and other industries for protection sensitive sufficient for encryption of confidential data. 3-DES worldwide. The stream of algorithm of encryption of just expands DES key size by application of DES is shown in figure 3. algorithm three times in a row with three various keys. The combined key size thus will turn out 168 Bits (3 times 56). TDEA assumes use of three 64- digit keys of DEA (K1, K2, K3) in the Encrypt- Decrypt-Encrypt (EDE) mode that means that the usual text is ciphered by means of K1, and then is deciphered K2, and then again ciphered with K3 [6]. Standards to define three back projections of option: Option 1, preferable option, uses three mutually independent keys (K1 ≠ K2 ≠ K3 ≠ K1). It gives space of keys from 3 × 56 = 168 bits. Option 2 uses two keys independent from each other and the third key which is same as the first key (K1 ≠ K2 and K3 = K1). It gives space of keys from 2 × 56 = 112 bits. Option 3 is one of key sheaves of three identical keys (K1 = K2 = K3). This option is equivalent to algorithm DES. In 3-DES iterations 3 times are applied to increase in level of encryption and average time. It is the known fact that 3DES more slowly, than other methods of the block code [7].

5. Advanced Encryption Standard (AES) AES is the new standard of encryption of the recommended NIST in 2001 for replacement of DES. The algorithm of AES can support any combination of data with the size of block of 128 bits and key long 128, 192 and 256 bits. The algorithm is called AES-128, AES-192 or AES-256, depending on key length. At the same time, the initial algorithm of AES allows the size of the block and length of a key from 128 to 256 bits with a step 32 bits. During encryption/decoding process, the AES system passes through 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for 256-bit keys to put final шифротекст or to receive the original usual text. AES allows to divide length of these 128 bits into four the main operating rooms of blocks. These blocks are considered as the massif of bytes and Nb = 4 for Input (Entrance data) both State (State) and Nk=4, 6, 8 for CipherKey respectively for different lengths of keys is organized in the form of a matrix about 4 × 4. Before achievement of a final round, this conclusion goes, nine main rounds, during each of these rounds are carried out four transformations: Figure 3. Detailed scheme of encryption of 1. SubBytes () - replacement of bytes - byte algorithm of DES nonlinear substitution in State-blocks (S-Vokh) with

101

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan use of the fixed table of replacements with 2. InvShiftRows () — the return shift of the lines dimension of 8x256 (affain map table); ShiftRows () — cyclic shift of lines of the State 2. ShiftRows () - shift of lines - cyclic shift of lines array on various number of bytes; of the State array on various number of bytes; 3.InvMixColumns () - restoration of values of 3. MixColumns () - hashing of columns - columns - multiplication of the columns of a state multiplication of the columns of a state considered considered as polynomials over GF(28)[7]; as polynomials over GF(28); Main features of AES 4. AddRoundKey () - addition with a round key - In the conclusion we will formulate the main digit-by-digit XOR of contents State the current features of AES: fragment of the designed key. - the new architecture "Square" providing fast dispersion and hashing of information at the same time for one round is exposed to transformation all entrance block; - the byte-oriented structure convenient for realization on 8-digit micro controllers; - all round transformations are an essence of operation in final fields, the allowing effective equipment room and program realization on various platforms [6].

6. Comparative analysis of algorithms of encryption Etc. [8] have made by Seth the comparative analysis of three algorithms of RSA, DES and AES. In the analysis have considered such parameters as calculation time, use of memory and output byte. These parameters are the main subject of concern in any algorithm of encryption. Experimental results show that the algorithm of DES consumes the smallest amount of time of encryption and AES algorithm has use of the smallest memory. RSA consume the greatest time of encryption, memory use also very high, but output byte the smallest. Etc. [9] have made by Alanazi the comparative analysis of three algorithms of encryption of DES, 3DES and AES. In the analysis have considered Figure 4. Algorithm of encryption of AES such parameters as key length, key type, block length, cryptofirmness, possible keys, a possibility In final 10 round, there is no MixColumns of ASCII of symbols for the press and time transformation (). Deshifrirovaniye is the return necessary for check of all possible 50 billion keys in process of encryption, with use of inverse function: a second, etc. Research shows that AES is better, 1. InvSubBytes () — the return SubBytes () than DES and 3DES. replacement of bytes - byte nonlinear substitution in Table 1 shows that asymmetric algorithms, such SWe-blocks with use of the fixed table of as RSA, etc. more slowly, than symmetric replacements with dimension of 8x256 (inverse algorithms and RSA is the least safe algorithm in affain map); comparison with DES, 3DES and AES.

Table 1,Comparison of RSA, DES, 3DES and AES

Criterion RSA DES 3DES AES Key type Asymmetric Symmetric Symmetric Symmetric Key length, bit Depending on the 56 168(k1,k2 ,k3 ) 128, 192, 256 number of bits in 112 (k1,k2) module n, where n = р * q Number of rounds 1 16 48 10,12,14 Block length, bit Key size 64 64 128

102

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan Main operations Decomposition of Substitution, shift, Substitution, shift, Bit-by-bit number on simple ring sum ring sum summation on the multipliers module 2 and indexed extraction from memory Encryption speed Slow Medium Very slow Fast Crypto sustainable The least sustainable Not rather Rather sustainable Absolutely sustainable sustainable

7. Summary [2] Pilidi V. S. Cryptography. Introductory This article represents detailed studying of chapters. — Rostov-on-Don: SFU, 2009. popular algorithms of encryption, such as RSA, [3] Panasenko S.P. Interesting encryption DES, 3DES and AES. Use of the Internet and algorithms, part 2. // BYTE/ Russia, 2006 network promptly grows. Thus, there are more [4] Behrouz A Forouzan, “Data Communications requirements for data protection transferred on and Networking”, cGraw-Hill various networks with use of various services. For [5] William Stallings, “Cryptography and safety in a network and data various methods of Network Security: Principles and Practice”, Pearson encryption are used. In this work the review of the Education/Prentice Hall, 5 th Edition existing works on technology of encryption has been [6] http: //revon.allbest.ru/programing/0063.html made. Summing up the result, all methods can be [7] B. Schneier Applied Cryptography. Protocols, used in real time encryption. Each method is unique algorithms, source code in C. M .: Triumph, 2002. in own way which can be suitable for various 816 p. applications, and has own pros and cons. According [8] Shashi Mehrotra Seth, Rajan ishra, to results of the conducted research, the algorithm of “Comparative Analysis of Encryption Algorithms AES is the most effective from the point of view of for Data Communication”, International Journal of speed, time, capacity. Data security can be also Computer Science and Technology, Vol. 2, Issue 2, increased if than one algorithm is applied to data pp. 292-294, June 2011. more. [9] Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani, 8.References "New Comparative Study Between DES, 3DES and [1] Panasenko S.P. Encryption algortihm. AES within Nine Factors", Journal Of Computing, Special catalog. — St.P.: BHV-Petersburg, 2009.. Volume 2, ISSUE 3, pp. 152-157, MARCH 2010.

Анализ алгоритмов шифрования RSA, DES, 3 DES и AES

Сербин В.В., Куанышбекова М.Б.

Международный Университет Информационных Технологии, Кафедра Информационных Систем, Казахстан, Алматы 050040, Ул. Манаса/ул. Джандосова 34 «А»/8

С быстрым прогрессированием цифрового обмена данными в электронном виде, информационная безопасность становится гораздо более важным в области хранения и передачи данных. Шифрование представляет собой процесс перестановки элементов сообщение так, что только предполагаемый получатель может прочитать его. С развитием человеческого интеллекта, криптография стала более сложной для того, чтобы сделать информацию более безопасным. Множество систем шифрования развертываются в мире информационных систем различными организациями. Эта статья представляет собой подробное исследование популярных алгоритмов шифрования, такие как RSA, DES, 3DES и AES.

RSA, DES, 3DES және AES шифрлау алгоритмдерін талдау

Сербин В.В., Куанышбекова М.Б.

Халықаралық Ақпараттық Технологиялар Университеті, Ақпараттық жүйелер кафедрасы, Қазақстан, Алматы 050040, Манас көш./Жандосов қиыл. 34 «А»/8

103

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Деректердің электронды түрде сандық алмасу тез өсуімен бірге, ақпараттық қауіпсіздік жүйесінде деректерді сақтау және алмасу аса маңызды болып отыр. Хабарламаны тек адресат қана оқи алатындай етіп элементтерді алмастыру, шифрлеу процесі болып табылады. Адам ақылы дамуымен бірге, криптографияда ақпаратты қауіпсіз ету күрделі болды. Көптеген шифрлау жүйелері дүние жүзі бойынша әр түрлі ұйымдар арқылы дүние жүзі бойынша жайылған. Бұл мақалада түрлі RSA, DES, 3DES, AES шифрлау алгоритмдеріне толық зерттеу ұсынады.

Analysis of the portal gr.iitu.kz for improvement of information system’s tracking of vypuskniki.kz for the university graduates

Sergazin A.D., Serbin V.V.

International IT University, Department of Information Systems, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

In this article there is made an analysis of the portal gr.iitu.kz for development and improvement of graduate tracking information system vypuskniki.kz. The purpose of this portal vypuskniki.kz is that it solves the problems of student's unemployment, gives an automated report on Universities for the MES of RK, also enables the employers to select the right specialist from any University of Republic Kazakhstan.

1. Introduction institutions and the absence of proposals in this field Currently, the employment of graduates in their guarantee high demand for this product. field of specialization is most important task of all This system is intended for university students universities, because each university needs to prove use in searching job and also students search for its reputation, obligation to the Ministry of employers and university administration for Education and Science of Republic Kazakhstan. receiving certain information as a report. The system Despite the development of IT among the society, in was made in electronic form which is stored in the the field of education there is still no sufficient server for remote access and also for ease of making means to automate the whole process of control and university graduates reference lists and the reduction tracking graduates with advanced functions. of paperwork. [1] A specific task was to develop a database of university graduates with advanced features, and this 2.Design system and functional software means that is created architecture which could vypuskniki.kz realize the work of search engines for the university This system consists of specific databases called staff and other departments of this institution. Also, db_graduate. Db_graduate database consists of the formation of output information which is several tables where stored all the information, that necessary for the functioning of the task is displayed in the system, as well as data which are management subsystem of the graduate data and the necessary for the implementation of several information to guide the institution. operations. These operations consist of login, the Despite the increasing computerization of the content of web pages, sorting, searching. Below society, in education there is still no means which there is built ER diagram (entity-relationship) this allows to automate the process of documentation and is a set of concepts that describe the reporting in sufficient measures. database structure and its associated update One of the main tasks we can consider is the transaction and retrieve (extract) data. The problem of making a list of employed graduates and individual properties of entities are called attributes. those who can’t find work. All these criteria’s affect Entity attributes contain values that describe each to the universities status. So, in case of necessity entity of the portal vypuskniki.kz. Values of there is created a database of the university attributes represent the bulk (part) of the information graduates with advanced features. which is stored in the database db_graduate (Fig. 1). The relevance of this issue is the fact that most 3. Description of information systems gr.iitu.kz their time administrators of institutions and teachers and vypuskniki.kz spend on designing various kind of documentations Table 1 describes the main differences between and reports. A huge number of educational the characteristics of two systems. That is, the first

104

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan system (gr.iitu.kz) works at the one university (JSC system, its functionality will be completed and will IITU), accordingly as vypuskniki.kz High education be different than others.

Stud_data_tb University_tb Login_tb ID (Auto increment) PK ID ID (Auto increment) FK Part_id_st (varchar) Name(varchar) PK Part_ID (varchar) 10 photo_st (varchar) City(ID) password_lgn (text) 16 university()

type_user_lgn (int)>>>(ID) name_st (varchar) 20

name_lgn (varchar) 20 second_name_st (varchar) 20

icon_lgn (text) fatherland_st (varchar) 20

date_of_birth_st (int)>>>unix

fatherland_st (varchar) 20 Country_tb Type_user_tb country_st (int)>>>(ID) PK ID Languages_tb PK ID (int) city_st (int)>>>(ID) Country PK ID type_user (text) (20) degree_st (int)>>>(ID) language

rank_st (int)>>>(ID) Cities_all_tb type_zanyaosty_tb faculty_st (int)>>>(ID) PK ID Additional_info_st_tb Degree_tb PK ID specialty_st (int)>>>(ID) City_kaz PK ID (11) PK ID Type group_st (int)>>>(ID) Country(ID) about_st (text) 600 degree_name gender_st (boolean) qualities_st (varchar) 250 gpa_st (int)>>>(ID) skills_st (varchar) 250 enter_year_st languages_st (int)>>>ID GPA_tb grad_year_st (int)>>>(ID) Rank_tb additional_edu (varchar) PK ID workplace_st (varchar) PK ID Wish_timetable_tb knowledge_cert (varchar) Interval work_by_spec (varchar) rank_name PK ID worked_companies_st (text) 500 Grade yesornoneed_st (varchar) 5 Timetable Position_worked_company Faculty_tb email_st (varchar) 20 (varchar)

phone_st (varchar) 10 PK ID work_experience_st (varchar)

magistracy_yn_st (varchar) 5 Faculty_name desired_position_st (varchar)

magistracy_wtyn_st (varchar) 5 possibility_comandirovka_st (boolean) Specialty_tb type_zanyatosty_st (int)>>>ID PK ID wish_timetable_st (int)>>>ID Specialty_name additional information_st (text) Faculty grad_year_tb

PK ID Group_tb Year PK ID

Group_name enter_year_tb Specialty_name (ID) PK ID Grad_year (ID) Year Enter_year (ID)

Figure 1 - ER diagram portal of vypuskniki.kz

Table 1 - System characteristics № Characteristics Gr.iitu.kz Vypuskniki.kz 1 Registration Registration is held via a unique link Registration will take place by filling a for each student, there is no sign up particular form, there will be moderator button in every university for checking the accuracy (valid) of the information. 2 Access levels System administrator, other users The system administrator, (student, teacher, news moderator, administrator of each university, other employer, university management) users of each university (student, teacher, news moderator, employer, university management) 3 Mailing and notification Sending letters to the email address Sending letters to the email address, and notification through the personal account of each student 4 Sorting filter and students Displaying the results by particular Displaying the results by particular selection fields, the option of viewing fields and also there is also the additional information only about one opportunity of sorting by columns, student viewing multiple students by using comparison tools 5 Search The search is performed on the entire Searching with opportunity to select

105

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

content of the website the website sections (News, Vacancies, Students, Employer Companies)

4. Comparative analysis of gr.iitu.kz and advantages and disadvantages of the both systems. vypuskniki.kz In the given below table there are presented the For making comparative analysis there is results of the comparison which considers formulated a list of criteria which describe the information systems. (Table 2)

Table 2 - Comparative analysis Gr.iitu.kz Vypuskiniki.kz Advantages 1. The system has simplified the search of 1. Added all the universities of Republic candidates for specific vacancies. Kazakhstan (unique system) Possibility to automatically export CV 2. Be interactive, then there will be a forum for (resume) facilitated the work of the HR each university where students can share department, minimizing time of selection information, communicate each other 2. The employer will also have an 3. Tags for section “New vacancies” possibility to register for participation in 4. Will be developed the element for students events (Job Fair, guest lectures, seminars, comparison (a function of add to compare), a master classes etc.) very useful tool for employers. 3. Developed a personal account for the 5. Will be improved the elements of search, employer, i.e. he can select his candidate authorization, registration and speed to himself (performance) of the system. 4. The system records information about the 6. The user interface will be adaptive design (for employer’s companies who can applied to all devices: PC, tablet, smartphone) the site. (creates the database with 7. There will be developed control panel for each contacts) university (administration) 5. Осуществляется рекламная поддержка 8. Will be developed a new plan of service for компаний выпускников (в разработке). each university (technical support) The will be accomplished advertisings 9. Will be developed a news feed with control support of the companies graduates (in panel for each university development) 10. Will be developed a control panels mailing 6. Companies which placed their logo and and notifications by email to the students for banner pay for advertisement (in each university development) 7. Students information support (information about new vacancies, the correctness of the documentations and etc.) 8. Automated mailing by email addresses. Disadvantages 1. “Revival site” and students and graduates ----/-----/----- motivation to permanent enter of his account, in case of changing workplace the students do not indicate this in the personal account (cabinet) 2. Изначально некорректное заполнения формы о себе. Указание неполной информации. (решение: вручную проверка информации заполненной каждым выпускником. (затратно по времени)) Initially, incorrectly filling the form about yourself. Indication of incomplete information. (solution: manually check the information filled by each graduate (time-consuming)) 3. Not all graduates take a responsible approach to fill the proposed form, then there is a unique function which gives the system while uploading data on employment and that can’t be fully utilized, because students can work and

106

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

this information not indicated in the personal account (cabinet), statistics will incorrect, as it does not reflect the true state of things. 4. Students can mark the letter of mailing as spam. (the solution to this problem is the notification via WhatsApp)

5. Conclusion [1] Gagarin LG, Kiselev DV, Fedotova EL The Information system which is capable of development and operation of automated solving the problem of graduate’s employment, information systems. - M .: Forum, Infra-M, 2009. communication with employers, the relationship [2] VA Gvozdev, Lavrenteva IY Fundamentals of the university with graduates, centralization of of automated information systems. - M .: Forum, report about graduates for universities and MES Infra-M, 2009. of RK. [3] Yemelyanov NC, Partyka TL, Popov II This system will be improved and will be able Fundamentals of automated information systems. to bring an additional income while receiving - M .: Forum, Infra-M, 2007. support from the universities and sponsors, as [4] The use of information technology in the well as MES of RK which is interested in field of social communications // Herald. - 2006. - specialists of a certain university. № 11. - S. 10-11. [5] AV Mogilev, LV Listrova Information and 6. References information processes. Social Informatics. - M .: BHV-Petersburg,

Анализ портала gr.iitu.kz для совершенствования информационной системы учета выпускников ВУЗов vypuskniki.kz

Сергазин А.Д., Сербин В.В.

Международный Университет Информационных Технологий, Кафедра Информационных Систем, 34 «А»/8 «А» ул. Манаса, / ул. Жандосова, Алматы 050040, Казахстан

В статье проведен анализ портала gr.iitu.kz для совершенствования и улучшение информационной системы учета выпускников ВУЗов vypuskniki.kz. Цель данного портала vypuskniki.kz заключается в том, что он решает вопросы трудоустройства студентов, дает автоматизированный отчет по ВУЗам для МОН РК, также дает возможность работодателям отобрать себе нужного специалиста с любого ВУЗа РК.

Vypuskniki.kz ЖООның түлектерін есепке алу ақпараттық жүйесін жетілдіру үшін gr.iitu.kz порталын талдау

Сергазин А.Д. , Сербин В.В.

Халықаралық Ақпараттық Технологиялар Университеті, Ақпараттық жүйелер кафедрасы, 34 «А»/8 «А» Манас көш., / Жандосов көш., Алматы 050040, Казахстан

Осы мақалада vypuskniki.kz түлектерді есепке алу ақпарттық жүйесін жетілдіру және жақсарту үшін gr.iitu.kz порталының талдауы жүргізілді. Vypuskniki.kz порталының мақсаты түлектердің жұмыспен қамту мәселелерін шешу, ЖООның ҚР БҒМне автоматтандырылған есеп беру, сондай-ақ жұмыс берушілерге өзіне керек мамандарды іріктеп таңдап алу болып табылады.

107

2nd IC ITSI 2016, May 19, Almaty, Kazakhstan

Big Sinchev B., Orazbekov S.

International IT University, Department of Information Systems, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The paper discusses the definition and parameters of big data. The main analytical queries highlighted in terms of formalization. Modeling the Big Data is offered basing on the science of data and the latest achievements of applied mathematics.

1. Introduction Definition 2. Big data is the interaction of space Big Data is one of the few terms that have the and time. accurate date of its birth — September 3, 2008, Definition 3. This is the state of the object space when it was released the special issue of the (in particular, a subject of public space) at a specific scientific journal Nature devoted to the search for point in time. the answer to the question: "How future of science Thus, the data can be continuous and time technology may be affected, opening opportunities discrete. In turn, these data are easily converted to to work with large amounts of data?". Due to the digital for the purpose of computer processing. scale of current and future changes the editor of The problems associated with big data, is often Nature Clifford Lynch, has proposed for a new divided into three main groups: volume - volume "from quantity to quality" paradigm special names mean size of the physical volume, velocity - velocity like Big Data, chosen by analogy with such in the senses as the rate of growth and the need for metaphors like Big Oil, Big Ore, etc. rapid processing, variety - in the sense that the Initially, the idea was that the volume of simultaneous conversion of different types of information has grown so[1] that the amount has not structured and unstructured data into information. actually placed in the computer's memory used for 3. Analysis of the main parameters of Big Data processing, so engineers had to modernize tools for In fact, big data is intended to predict. Usually the analysis of all data. So new treatment they are described as part of computer science called technologies, such as MapReduce of Google and its "artificial intelligence". This characterization is equivalent open source — Hadoop from Yahoo misleading, because it is not about trying to "teach" appeared. They were given the opportunity to handle the computer "think" like humans. Instead, considers a much larger amount of data than before. It is the application of mathematical techniques to large important that they don't have to line up in neat rows amounts of data to predict. As a result, we can or classic database tables. Also, other features of access the implicit, hidden value of information. data processing technologies appeared on horizon, Characteristics introduced at the present time are which was still without a rigid hierarchy and key parameters in the analysis of big data. However, uniformity. these settings do not effectively describe the 2. Basic definitions and parameters of Big Data properties of big data. According to the new For a deep understanding of the entered term lets definitions introduced time acts as a basic parameter give some definitions of big data of Big Data. Definition 1. Michael Franklin’s definition from Example 1. Consider a set of data that was University of California-Berkeley enjoys wide collected from 1000 sensors for 10 years with 15- popularity. It says that “Big data is any data that second intervals. For each sensor there are more than requires significant investment and from which it is 20 million records. Since in a typical analysis the difficult to extract information”. calculations are made over a time series (for Thus, the strict definition does not exist. example, are searched for values that are unusual in However, there are objects that need to work. These relation to the moving average and mean standard include "big data" that are stored on the servers of deviation), we decide to store the data for each Google, Amazon and Facebook. The faster and sensor in the order of time and distribute them to 10 better will be the processing of data, the more compute nodes that each of them contained all the effective will these systems work and the more they data from 100 sensors (a total of 2 billion records will have opportunities. Therefore, we introduce per node). Unfortunately, this means that in all cases new definitions. when we are interested in the results of only one or several sensors, a large portion of the computing

108

2nd IC ITSI 2016, May 19, Almaty, Kazakhstan

nodes will be completely idle. The choice of the When applying to everything a billion rows a method of clustering the sensors or time leads to a query was performed more than 24 hours, it says large difference in the level of parallelism, which that PostgreSQL is not applicable enough to this can execute different queries. Another important "big" data set, apparently due to poor choice of problem of parallel systems is reliability. Similarly, algorithms for processing the request for these data as the aircraft with four engines the probability of stored in traditional databases. failure of one engine is higher than a plane with two Example 5. Now consider the parameter speed. engines. A sharp decrease in the number of records The movement of many objects in space is described is possible, if unusual values of a time series to by system of differential equations with the initial describe the functions derived using methods of conditions at a given period of time. In particular, interpolation and extrapolation[2]. Taking into the solution of this system allows to determine the account the much greater volume of data, we can coordinates and the velocity of the car at all period reduce their claims to accuracy (the paradox of of time. And the speed of growth and processing of precision). But in the world of big data, strict data is directly related to the vehicle speed at a accuracy is impossible and sometimes undesirable. specified period of time. Therefore, there were Example 2. Data analysis in Finance has been "smart" cars and planes. Finally, smart public successfully applied. For example, exchange. Of transport, understanding the volume of passenger course, there are only few of those heroic people traffic at different times in different parts of the city who carefully look at the charts, and then, as in the and adapting to the situation of their routes. This has movie "a Good year", yelling "Buy!" into the phone led to the rapid development of mathematical control at the right time. The algorithm developed for this theory and optimization methods[4]. The task, sells faster, it is not prone to stress, isn't a management process is an information process that distraction and, in General, in all respects looks includes gathering of information, its processing and more promising. In the world of big data, we don't analysis, decision making, development of control always need to know the reasons behind certain actions and bringing them to control objects. Each phenomena. Better to allow the data to speak for phase of the management process occurs in themselves. interaction with the environment when exposed to Example 3. Until the latest version of the size of various interferences. Therefore, the management the table in Microsoft Excel was limited to 65536 process is an information process, and all people rows and 256 columns, and now Excel can work engaged in governance, only deal with the with tables of dimension h. Is that enough for information. everyone? Excel probably will sooner or later face Example 6. The volume is set. The emergence of the need to handle larger dimension tables. It is big data in the public space (YouTube, Facebook) possible if to use the theory of matrices[3]. Here it is was due to the fact that these data are used virtually assumed that the table entries are known functions by all people in the world. The huge flow of data of time. directly affects the volume parameter. This case Example 4 is based on research by Adam Jacobs. considers only a certain category of people. For This request for small subsets of the data were example, spy listening to the first persons of other carried out in a matter of seconds, but the execution States by the United States of America. So, the time is increased rapidly when the number of rows Google search engine determines the spread of the exceeded one million (Fig. 1). flu is not worse than the official statistics, based on real patient visits to the doctor

4. The main modeling approaches for big data During the time flow, the above-discussed data applications with heterogeneous data become closer to the real world in all of its diversity, hence the growth in the volume of input data and hence the need for their Analytics, and in the mode, as close to real time. Therefore there was Big Data Analytics (Big Data Analytics). Winning of Watson’s computer was a brilliant demonstration of the Figure 1 - Performance of PostgreSQL on the query capabilities of Big Data Analytics. In other words, “SELECT country,age,sex,count(*) FROM people it's an assistant that expand human possibilities in GROUP BY country,age,sex”. the choice of information and decision making.

109

2nd IC ITSI 2016, May 19, Almaty, Kazakhstan

Therefore, the main analytical queries can be Custom function number can be written as: attributed the so-called processes of "extract, y(t)=∑_(i=0)^∞▒〖x_i (t)〗. transform, load" ("extract, transform, load" – ETL), It is known that many of the continuous functions and sometimes - "extract, load, transform"). Storage described by this row. For example, a sine or cosine type key-value or NoSQL SCBD recognized today, is expressed by harmonic (power) series. In turn, the main Big Data and optimized for fast execution members of the power series can be found on the of ETL processes. basis of the interpolation formulas like Lagrange’s, The formalization of these processes led to the Newton’s and others. emergence of data science - data science and The formalization process "extraction, loading, scientists working with data (data scientist). In the transformation," is different from the above late twentieth century began to appear new terms: mentioned process. In most cases, these requests data products (data product); tools for working with need to determine a transform function with known data (data tool); application implemented by the input and output data based on the method of least relevant organization (data application). squares, and others. Here are the possible ways of formalizing the Thus, the above mentioned input and output data process of "extract, transform, load" in terms of can be computed for a specified time and no need to applied mathematics. Initially, consider the widely store them entirely digitally. used type of functional dependencies For the basic operation of text data is to extract y(t)=f(x(t),t), useful information without converting the raw data where x, y, f- dimensional vectors nx1, mx1, for the index terms template or mask. mx1, f- known vector function, t -time. As recoverable input data, time-dependent, appears 5. Conclusion variable x, the conversion process - the function f, On the basis of conducted research we can the process downloads- the output y. conclude that the perspective of the development of Next, consider the system of differential data science and Big Data Analytics lies in the direct equations use of modern achievements of applied mathematics x =f(x(t),u(x,t),t) for data modeling to make the processing of Big data with initial conditions x(t_0 )=x_0 and correct at of any volume faster. time interval [t_0 〖,t〗_1]. Here are the input data x(t_0 ), output - x , x. In this system the 6. References management of u(x,t) is produced by the host [1] Mayer-shonberger V. Kukier K., Big data - computer or a control unit included in the original Oxford: Oxford University, 2013 system. [2] Korn G., Korn T. Handbook of mathematics. The equilibrium state of the system can be –M.: Science, 1973 described by linear and nonlinear algebraic [3] Gantmakher F. R. Theory of matrixes –M.: equations Science, 1966. f(x(t),t)=0. [4] Vasil'ev F. P. Numerical methods for solving In other words, they are the working modes of extremal problems. -M.: Science, 1980. the control objects (system).

Моделирование больших данных

Синчев Б., Оразбеков С

Международный Университет Информационных Технологий, Кафедра Информационных Систем, 34 «А»/8 «А» ул. Манаса, / ул. Жандосова, Алматы 050040, Казахстан

В работе рассмотрены определения и параметры больших данных. Для формализации выделены основные аналитические запросы. Предложено моделирование больших данных на основе науки о данных и современных достижений прикладной математики.

Ірі Деректерді Модельдеу

Синчев Б., Оразбеков С.

110

2nd IC ITSI 2016, May 19, Almaty, Kazakhstan

Халықаралық Ақпараттық Технологиялар Университеті, Ақпараттық жүйелер кафедрасы, 34 «А»/8 «А» Манас көш., / Жандосов көш., Алматы 050040, Казахстан

Бұл жұмыста ірі деректердің анықтамасы және параметрлерә талқыланады. Формализация үшін, негізгі аналитикалық сұраныстар оқшауланған. Қолданбалы математика жетістіктерін қолдана отырып, ірі деректерді модельдеу ұсынылған.

An Interactive Framework for Visualizing Foreign Currency Exchange Options

T. Baltassov

International IT University, Department of Information Systems, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

Examining options is a multiplex process. Option conduct relies upon a multiplicity of economic situations, which changes over the time. The objective of this article is to give an interactive visualization, which helps to the experts to investigate these multiplex interactions, and to choose and develop visualization framework to non-experts. In this article we depict a situation for investigating 2-and 3-dimensional representations of options information, progressively changing parameters, analyzing how multi-variant connections create after some time, and investigating the probability of the improvement of various results over the life of the option.

1. Introduction between the market rate and the strike since the Foreign currency exchange options are financial agreement can be used to purchase at the strike cost concepts which are broadly used by capitalists to then sell at the market rate cost in the open market. speculate on the cost of foreign currencies and to The higher the market rate value, the relatively more give assurance against unfavorable variances in the the option price. For the holder of the short position, financial marketplace. Option conduct is a multiplex these increases rather decrease, since the currency process, where important features and interactions must be acquired at the spot price to sell it to the develop over the time. Option conduct, therefore, exercise of the option. gives a good model for investigating how This basic, omnipresent, graph, but it does not visualization can improve our understanding, show multiplicity of the fundamental circumstance, choosing, and convey about multiplex process. One and does not give a sufficient representation for fundamental type of foreign currency option [1] is a making decisions. First, this demonstrates the value call. A (long) call is the proper, but not the of the option at a specific time, more often at commitment, to purchase a specific currency and expiration date, and does not indicate how this value sell a second currency at an agreed cost proportion at changes over the life of the option. At times before an agreed time. The worth capacity of a call is the expiration date, the hypothetical value of the visualized (see, e.g., [2; 4]) with line charts to option can be processed taking into account the compare the value of the option at expiration with "expected payoff," using the historical volatility of the value at some point till the expiration. (See also the spot cost. Starting here on we will allude to this [3].) Figure 1 demonstrates charts of the value of a price as TV, for "hypothetical value," and will use long and short call as an element of the economic TV as a sensible appraisal of both where the option situation at the expiration date. At expiration the would exchange in the marketplace and as a fair value of a call is the payoff (or lost on account of a price for the expected payoff. It is conceivable to short call) if the conditional contract is summoned. introduce a group of bends, each showing TV at a For example, if the market rate is lower than the different time step on the way to expiration. But it strike value the long call has zero price, mirroring can be hard to separate these curves. Figure 2 is a the way that it wouldn't be practiced to purchase case. currency at a higher rate than it could be purchased Second, decision-making about options in the open market. If the market rate is higher than additionally relies on upon other determined option the strike, the payoff is basically the difference practices, including, e.g., delta and decay. These

111

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

derivatives are additionally most commonly We have made a visual environment which represented as basic line-drawings, plotting permits the expert to interactively choose variables, individual parameters of the option as value of spot and to investigate them using showed 2-and 3-D or time. An expert might need to look at how two representations. In our application, the expert uses different parameters interact. For example, it may the 3-d visualization to give a worldwide framework hold any importance to look at price and delta as a for examining the option, and uses the showed 2-d value of a spot for an arrangement of time steps over projections to improve that understanding, by giving the life of the option. It may make a series of line a reference back to more recognizable, conventional drawings for every parameter, except to distinguish visual representations of option conduct. The point relating time ventures in the two diagrams can be of convergence is the three-dimensional plot hard. Besides, the expert might need to know the delineating an option parameter as a value of spot price of delta at a specific point on the TV bend, or over the time. The expert interactively chooses how TV and delta co-fluctuate after some time. which option parameter to show, and can easily Third, the expert might need to look at this cycle through different parameters, e.g., price, delta, information as for computed criteria, for example, to or decay, and perceive how these parameters play gauge which locales of the curves are more or less out over the time course of the option. The user can likely to be visited over the lifetime of the option. likewise interactively pick whether or not to color Surely locales nearer to the present spot value are the canonical 3-d surface with a color map. A price more probable than locales extremely far away, but a surface, for example, can be shaded by delta, or by quantitative estimate is unimaginable without the price of the likelihood value at each point. The expressly incorporating this computation in the user can choose which kind of the color map to use, representation. interactively select whether or not to represent the likelihood bends, and can interactively choose which 2. Improving the standard line drawings sections of the likelihood space to represent. For A portion of the disadvantages of the standard example, the expert can look at the section of the view can be mitigated by joining interactivity and surface which falls inside 1 standard deviation of the colors into the visualization. For example, the issue expected price or just those sections which are of recognizing which line shows which time steps unrealistic to happen. can be tended to by using a different color for every 4. Discussion time step. Interpreting this sort of chart, nevertheless We have depicted an interactive environment is not quick or "pre-mindful," especially if there are which permits the viewer to analyze a different many bends. Interactive brushing can give help, variable describing option conduct over the time where selecting a bend in one chart automatically staying until expiration, while likewise permitting highlights the relating bend in another chart. estimation of the probability of various regimes. The Other variables can also be displayed in line same visualization develop can be used to analyze drawings by, for example, coloring the lines with portfolios of options. As an example, consider the respect to another variable, or as per likelihood of multinational firm interested in protecting itself the event. Some examples are displayed in Figures 3 against a large exchange rate fluctuation. The firm and 4. There are constraints to this methodology, in can buy both a call and a put on a specific currency any case. It is hard to recognize the development of and rely on offsetting income should politics, war, or conduct after some time, it is hard to show a second a natural catastrophe fundamentally changes the character variable alongside likelihood, and it is value of the currency. Besides, the firm can pick the difficult to show two attributes in addition to strike values of the call and put to reflect either its likelihood over the time in basic line drawings. faith in the probability of such an event or its ability to pay for the coverage. Figure 4 demonstrates a 3. An interactive visual exploration environment portfolio of options, termed "bottom vertical Having the capacity to examine option combination." The strike values of the call and put parameters in a 3-d context, in any case, is not are 1.45 and 1.5 respectively. The firm will ingest adequate to support the decision-making necessity little scale exchange rate fluctuations yet is ensured an expert faces. The 3-d develops gives a rich against swings which may some way a significant investigation similitude, yet it doesn't permit "what- issue. The flat horizontal region of the 3D if" experiments. To understand interaction between representation demonstrates the range of exchange variables, and how these communications change rates over which the firm will ingest value changes. after some time requires an interactive UI. The visualization develops likewise handles other

112

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

common combinations like spreads, butterflies, and the state of the price or decay bend as a value of barrier options. both spot value and date demonstrated Also to using this framework to develop effective straightforwardly, however also, two different methods for visually interacting certain types of variables can be indicated at the same time. These options conduct, we have additionally made a variables are important in interacting and measuring mechanism to automatically make sets of the characteristics of the option given current visualizations based on a database of client option economic situations. Furthermore, the application portfolios, and send these over the web. This kind of can easily teach the viewer not only about options, framework could be used by options advertising but also about how to view 3D, by animating the agents whose obligation it is to monitor client standard view into the 3D view. This instruction has portfolios and sending recommendations to their been observed to be extremely valuable to clients at clients. In this framework, corresponding viewing first new to 3D representations. By using the model parameters are automatically made based on the application, we have built up, an expert can description of the option and the sort of conduct to interactively investigate the options using an be highlighted, and website pages joining content extensive variety of conceivable visualizations. In and pictures are automatically generated and put on this article, we have demonstrated how an expert a server. could show a couple of the classic scenarios which a client may need to rebuild. 5. Conclusions In this article, we have considered the visualization of foreign currency options as a method for picking up knowledge into the representation of multiplex practices. We have built up an interactive framework which permits the expert to investigate numerous variables and their interactions, and to outline visual representations which make it simple to perceive, comprehend, and convey those parts of the circumstance which are significant for decision making. One application of these representations would be to help advertising managers quickly communicate why a specific option is no more acting as desired, and to help Figure 2: Curves of theoretical value (TV) vs. spot customers make better informed decisions about price for a short call. Bright white curve with what they should do. discontinuous slope represents the expiration date of the option; dimmer gray curves represent progressively earlier dates. Vertical red line indicates current spot price.

Figure 1: The payoff functions of a long and short call, showing option value as a function of the spot value at expiration, with the strike value at 1.0. A short call is basically a call that has been sold, thus the payoff function is the inverse of that of a long call.

The main objective of this article has been to make understanding initially: The ability to see Figure 3: Curves of TV vs. spot for a short call, colored multi-variate dependencies over time, set apart by by delta. Blue represents low delta, green represents likelihood limits. Use of the 3-D permit the addition intermediate delta, while yellow represents high delta. Red vertical line indicates current spot price. of critical extra data to the bends, without obscuring the data contained in the original lines. Not just is

113

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

options, in this way, and post the subsequent visualizations on a server for web access. At last, the adaptable application permits simple experimentation to investigate the types of representations, which best serve the objective of teaching the end viewer.

6.References [1] John C. Cox and Mark Rubinstein. Options Markets. Prentice-Hall, Englewood Cliffs, NJ, 1985. [2] John Hull. Options, Futures, and other derivative securites. Prentice Hall, New York, 1993. [3] Stephen W. Piche. Trend visualization. In Proceedings of IEEE/IAFE Conference on Computational Intelligence for Financial Engineering, 1995. [4] Paul Wilmott, Jeff Dewynne, and Sam Figure 4: 3D surface representing a portfolio Howison. Option pricing: mathematical models and consisting of a put at 1.5 and a call at 1.45. computation. Oxford Financial Press, Oxford, 1993.

When this clarifying representation is chosen, the model can automatically show these, and similar

Интерактивный Фреймворк для Визуализации Опциона Курса Иностранных Валют

Т. Балтасов

Международный Университет Информационных Технологии, Кафедра « Информационные Системы», Ул. Манаса/Ул. Жандосова 34 «А»/8 «А», Алматы 050040, Казахстан

Анализ опционов — это сложный процесс. Поведение опционов зависит от множества экономических ситуаций, которая меняется с течением времени. Цель данной статьи состоит в том, чтобы разработать интерактивный фреймворк, которая помогает экспертам исследовать сложные взаимодействия и визуализировать их для не экспертов. В этой статье мы описываем ситуацию для исследования 2-х и 3- мерные представления информации опционов, динамический изменяя параметры, изучая как многовариантные соединения развиваются со временем, и исследуя вероятность улучшения различных результатов в течение всего срока опциона.

Шетелдік валюта бағамының опционын визуализациялауга арналган интерактивтік фреймворк Т. Балтасов

Халықаралық Ақпараттық Технологиялар Университеті, Ақпараттық Жүйелер Департаменті, Манас көш./Жандосов көш. 34 «А»/8 «А», Алматы 050040, Казақстан

Опциондарды талдау — бұл өте күрделі процесс. Опциондардың өзгеруі уақыт өте келе өзгеретін әртүрлі экономикалық жағдайларға байланысты. Бұл мақаланың мақсаты мамандарға күрделі өзара арақатынасты зерттеуге көмектесетін және оны маман емес адамдарға визуалиялау үшін интерактивтік фреймворк құру. Осы мақалада біз параметрлерді динамикалық түрде өзгерте отырып, уақыт өте келе көпварианттық қарым-қатынастың дамуын зерттей отырып және опционның өмір бойында әртүрлі нәтиженің жақсаруының мүмкіншілігің зерттей отырып 2 және 3 өлшемдегі жағдайды сипаттаймыз.

114

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

The method of extracting semantic meta descriptions of databases

U.Temirbolatova2, T.Temirbolatova1, Y. Jarmukhanbetov1

1 International IT University, Computer Engineering and Telecommunication Department,, 34 «А»/8 «А» Manas Str./Zhandosov Str., 2 Kazakh national research technical university after K.Satpayev, Almaty 050040, Kazakhstan

The article presents a method of extracting semantic meta descriptions of databases to form a common ontological model integrable information systems, this described method is aimed at solving the most urgent task of extracting information from a relational database using heterogeneous information systems as interfaces.

1. Introduction complete structural information meta-model that can The method of extracting semantic meta combine all the elements of systems and their descriptions of the databases for the automated relationships, by basing on it we can extract the extraction of metadata from integrable data sources required metadata resources themselves are stored in and presenting them in the form of a general the systems. So, the developed method consists of ontological model. It is mainly based on the standard four steps: of ontological study IDEF5, however, it is not aimed • Structural ontology of application. at manual creation of a model, and automated data Retrieving information about the structure of presentation in the form of an ontology. Initially, the each of the integrable IS in ontological format; standard consists of five steps outlined in the second • General structure ontology of application. chapter: Merging derived ontologies of structure to the 1. The organization and delimitation; general structural ontological information model; 2. Data collection; • 3. Global metamodel of integrable 3. Data analysis; systems. Creation on the basis of a top-level 4. Development of the initial ontology; ontology, domain ontology and overall structural 5. Enrichment of the ontology and ontology global metamodel describing the verification. semantic relationships between integrable IS; An important advantage of the standard is that it 4. Ontology of integrable data. Extract from the assumes the incremental development of the database of semantic meta descriptions of ontological model by adding new semantic information resources stored in them by means of a connections. However, steps such as the delimitation global metamodel and automated logical decision- of ontology and data collection do not make sense in making mechanisms. the context of IS integration, as the boundaries are In the context of a relational database, the first already defined by subject area functioning of step is to convert the IS infrastructure from a tabular integrable systems, and the data already stored in the kind used in DB schemes, in view for describing database. ontology. According to the IDEF5 standard, the ontology should model in two stages: an initial 2. Ontology modeling based on IDEF5 standard creation of the proto-ontology entities and the A feature of ontology modeling with integration subsequent addition of semantic relationships. of IS is that the data used for analysis and modeling In the beginning, the first stage is the primary physically stored in different places. Moreover, due translation of database table structures in the proto- to fact that there is no unified standard for database entity in RDF format, table names become classes development, various conflicts which can prevent and the fields of the table - properties. Each class the data analysis and the construction of semantic and property have unique identifiers, the Council of relationships. In particular, we can distinguish the primary key table. Next, the resulting initial groups of conflicts as naming conflicts, semantic ontological model is enriching by binding together and structural conflicts. To solve these conflicts classes and properties, by RDFs expansion means. when using automated extraction of semantic The output is an ontological model of the structure metadata resources from the database, in the of one of the integrated applications. developed method is proposed mainly to The next step in the method involves the union of automatically simulate the structural ontology of disparate meta models in a single common IS each of integrated applications. By building a infrastructure ontological model. For this purpose it

115

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

is necessary to prepare the application ontology. where G - the global ontological metamodel, First, you must create a unique prefix integrable {X} - a set of terms and terms of integrable system, using a namespace mechanism. Listing 1 systems domain, {R} - a set of relationships shows an example of such a prefix. between the terms in the systems. @prefix sys1: In turn, a plurality of IS terms is defined as: sys1:department rdf:type rdf:Class; Listing 1. Prefix of integrable system where Tn – terms and concepts of integrable systems. The use of prefixes and namespaces, can significantly extend the descriptive features and store multiple ontological models within a single where Rk – relations between the concepts in RDF document. the model. Secondly, you need to make an automatic As in any ontological model, each concept is analysis of all elements within the extracted uniquely determined by an identifier name, a set ontology in order to find the connections between of attributes, a variety of child and parent them. This will add semantic properties that connect concepts: various IS ontology structure with each other. The output is a common metamodel structure of all wher I – the concept identifier, {А} – a set of integrable systems, but it is not sufficient for an attributes, {P} – a set of parental concepts, {C} - automatic logical analysis of the extraction of a set of subsidiary terms. semantic metadata information resources. The general scheme of the process of creating To do this, the third stage of the model should be a single global metamodel is shown in Figure 3.3. further expanded and turned into a global meta- This metamodel plays in fact the role of the model that uses information about the subject area dictionary, which stores information about a and the world outside it. For this purpose, you must structure of integrable systems. On the basis of import the concept, concepts and attitudes of pre- the dictionary in the fourth step is necessary to arranged domain ontology, as well as of the common obtain from the data sources themselves semantic top-level ontologies. Moreover, one should resort to meta descriptions stored resources. Thanks software editors ontological models and expert spelled out in general metamodel properties, services in the subject area. With their help it is binding the various tables and fields in the possible to further enrich the model semantic database, making it much easier with the help of relationships and create an ontology is semantically logical reasoning mechanisms. Such describing all the structural elements of integrable mechanisms, using first-order logic and common IS, taking into account the subject area in which they ontological model of the structure, are building operate. arguments and add the desired semantic links to The figure shows how the extracted from the retrieve metadata. The syntax and semantics of database table properties and entities are compared the DL are constructed in such a way that the with the properties and entities of the FOAF basic logical problems are solvable, so the output ontology of a higher-level, describing relationships of new knowledge can be carried out by means of between people. In other words, we can say that the computer, automatically. application ontology describes the general top-level ontology terms. In the formal form, such model can 3.Conclusion be represented as a deuce: As a result, the output is a complete ontology, which contains information about the IS struct Sure, or in other words, part of the conceptual and California, 2008. meta descriptions resources stored in the system, the [2] Uschold M. King M. Towards a Methodology for content part. Building Ontologies // Workshop on Basic Ontological Issues in Knowledge Sharing. – 1995. [3] IDEF5. [Электронный ресурс] // IDEF5 4. References Ontology Description Capture Method URL: [1] Sangsoo S. Ontology-based semantic http://www.idef.com/IDEF5.htm (дата обращения integration of heterogeneous information sources: 25.01.2014). диссертация д.т.н. – University of Southern

116

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Метод извлечения семантических метаописаний из баз данных

У. Teмірболатова2, T. Teмірболатова1, E. Джармухамбетов1

1 Международный университет информационных технологий, Кафедра Kомпьютерной Инженерии и Tелекоммуникации, 34 «А»/8 «А» Манаса/Джандосова., 2Казахский национальный исследовательский технический университет имени К.И.Сатпаева Алматы 050040, Казахстан

В статье представлен метод извлечения семантических метаописаний из баз данных для формирования общей онтологической модели интегрируемых информационных систем, Этот описанный метод направлен на решение наиболее актуальной задачи извлечения информации из реляционных СУБД, использующих гетерогенные информационные системы как интерфейсы.

Семантикалық метажазбаны дерекқордан алу

У. Teмірболатова2, T. Teмірболатова1, E. Джармухамбетов1

1 Халықаралық ақпараттық технологиялар университеті, Компьютерлік Инженерия және Телекоммуникация кафедрасы, Манас 34 «А» / Жандосов 8 «А» көш. қиылысы., 2 К.И.Сәтпаев атындағы Қазақ ұлттық техникалық зерттеу университеті, 050040 Алматы қ, Қазақстан

Бұл мақалада ортақ онтологиялық моделі интеграцияланатын ақпараттық жүйелерді қалыптастыру үшін деректер базасынан семантикалық метасипаттау алу әдісін ұсынады. Бұл сипатталған әдіс интерфейстер ретінде гетерогенді ақпараттық жүйелерді пайдалана отыратын, реляциялық ДҚБЖ ең өзекті міндетін шешуге бағытталған.

The architecture of modern information-analytical system

Talgatova Z.

International IT University, Department of Information Systems, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

In today's business world in all areas the volume of information with which the organizations face is enormous. The success depends on the extent to which an organization is able to make the most of the available information at its disposal. The key to success is to build an effective information-analytical system (IAS). This article discusses the architecture of the modern information-analytical system in terms of processes. The recommendations on the implementation of this architecture are given on the example of various approaches and tools. There are several reasons of using the infrastructure of the enterprise information analysis system: the desire for a total reorganization of business processes, the desire to improve the quality of business information, the need to support strategic planning and achieving high-performance solutions. 1.The composition of modern architecture IAS The architecture of modern information-analytical The objectives of any information and analytical system of the organization is summarized in Fig. 1. systems are efficient storage, processing and The table shows the architecture of a long path analysis of data. Currently, considerable experience that pass data before you get to the table analysis. in this field is accumulated. A variety of data sources and the need for their Effective data storage is achieved by the presence use in each case is explained by the need to store in the information-analytical system of a number of different information, depending on the tasks facing data sources. Processing and integration of the organization. If you try to classify the data information is achieved by using tools to extract, sources by type and purpose, that each of them could transform and load data. Data analysis is performed be related to one of three groups: transactional data using the modern tools of business analysis. sources, data warehouse, data marts.

117

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

The data in the system can be entered both processing of information in the so-called manually and automatically. At the initial stage of transactional database. Transactional databases in an fixing the data comes through the collection and organization can be several.

Figure 1. Architecture of modern information-analytical system of the organization

Since transactional data sources are usually not that are part of the so-called OLTP-systems (online consistent with each other, for the analysis of such transactional processing). Transactional databases data requires their union and transformation. include data sources, focused on fixing the results of Therefore, the next step to solve the problem of the daily activities of the organization. Requirements consolidation of data transformation and for transactional databases, determine their purification, whereby the data is sent to the so-called following features: the ability to quickly process the analytical database. Analytical database, whether it data and to maintain a high rate of change, focus is is a data warehouse or data mart, and there are the usually on the service of process, and not all the main sources from which the analyst draws activities of the organization as a whole. information from the relevant business analysis Examples of this could be the databases that are tools. used in the billing systems of mobile operators in In this information-analytical system of medium automated banking systems, commercial and state and large enterprises and organizations should banks, online stores. provide users with access to analytical information The information in these databases is focused on protected from unauthorized use and open both the specific application, and to manage transactions, through the organization's internal network and users it is highly detailed and often corrected. on the network intranets and the Internet. Thus, the Transactional database excellent job with the architecture of the modern information-analytical shaft of daily information, which should be routinely system comprises the following levels: handled every day, but do not provide an overall 1) collection and primary processing of data; picture of the state of affairs in the organization as a 2) extract, transform and load data; whole, and rarely can serve as sources for a 3) storage of data; comprehensive analysis. 4) presentation of data in data marts; Thus, a set of transactional data sources, forms 5) data analysis; the lower link architecture of information-analytical 6) Web-portal. system of any organization. In the future, we will Consider the listed levels of architecture and proceed from the fact that the IAS enterprise is focus on examples of the types of tools that can based on the existing armed systems for collecting serve as a basis for the construction of each of them. and processing data including transactional data sources. 1.1 Collection and primary processing of data The first level architecture of the IAS are already 1.2 Extract, transform and load data mentioned data sources, usually referred to as The process of extraction, transformation and transactional or operational sources (databases) data loading of data is supported by the so-called ETL-

118

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan tools (extraction, transformation, loading), designed indicators. The information in multidimensional data to extract data from various transactional sources of mart is represented in terms of business in the form low-level transformation and consolidation, as well of the maximum available to end-users that can as downloading to the target analytical database - significantly reduce the time to obtain the required data warehouse and shop windows data. At the stage information for decision-making. of transformation eliminates data redundancy, the From a user perspective, the difference between necessary computations and aggregation. A three- data marts from the data warehouse is a data step process of extraction, transformation and warehouse that corresponds to the entire loading should be based on established rules. organization and each cabinet is usually served by the level of not higher than a separate entity, and 1.3 Data Warehousing sometimes can be created for personal use, differing The third level architecture of the IAS are the quite narrow specialization of the target. sources of data are called data stores (from the The difference between data marts from English. Data Warehouse). Data warehouses include transactional databases is that the former are used to data sources, focused on the storage and analysis of meet the needs of end-users who are not professional information. Such sources may combine information programmers: analysts, managers of different levels, from multiple transactional systems and allow you to solving different business problems. Transactional analyze it in conjunction with the use of modern database is used primarily by operators responsible software tools of business analysis. for the entry and processing of primary information, By definition, the founder of the idea of B. Inmon but not for its analysis, aimed at supporting decision- Data warehousing, data warehouse is a subject- making. oriented, integrated, uncorrectable, dependent on the The use of data marts, multi-dimensional and time of collection of data designed to support relational, in combination with the modern tools of management decisions. business analysis of the data allows you to turn The characteristic features of storage are simple data into useful information on which to relatively rare corrected most of the data, updatable make effective decisions. data on a periodic basis, a unified approach to naming and storage, regardless of their organization 1.5 Data analysis in the original sources. To the next level architecture IAS organizations Storage of data, as one of the main parts of IAS include modern software, referred to as intelligent architecture any medium or large organization, tools and business data analysis (Business serves as the primary data source for comprehensive Intelligence Tools), or BI-tools. analysis of all available information in the BI-managerial tools allow organizations to carry organization. out a comprehensive analysis of information, helping to successfully navigate the large amounts of 1.4Presentation of data in data marts data, analyze data, do the analysis on the basis of By the fourth level of the architecture of IAS data objective conclusions and to make informed sources are called data marts (data marts), designed decisions, build forecasts, reducing the risks of for the analysis of the target business. Data marts are taking wrong decisions to an acceptable minimum. usually based on information from a data warehouse, Data mining tools used by end users to access the but can also be formed from data taken directly from information, its visualization, multidimensional the transactional systems that store data in the analysis and formation as a pre-defined shape and organization for any reason is not implemented. composition and any reports generated a manager or By type of information storage showcases analyst (without programmer). As already divided into relational and multidimensional. mentioned, as input for the business analysis is not Showcases of the first type are organized in the form so much "raw" data from transactional systems as of a relational database with the scheme "star", pre-processed data from the repository, or presented where the central table, fact table, designed mainly in data marts. for storage of quantitative information, linked to the catalog tables. 1.6 Web-portal Multidimensional showcases organized as At present, Russian companies, followed by multidimensional database OLAP (Online Western counterparts, are increasingly beginning to Analytical Processing), where the reference deploy to a variety of Internet-based technologies. information is presented in the form of Already today, more and more experts, working not measurement, and quantitative - in the form of only in the field of information technology, are

119

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan starting to realize the benefits of using these integration is not related to each other tooling solutions to improve the efficiency of their business. solutions. In addition, the administration of the Carrying data mining using software solutions not system is a daunting task, given the inconsistency of only in the local environment, but in the Internet and data and metadata, manage individual, unrelated to an intranet environment, opens new analysts data each other modules platforms from different features. manufacturers. Current trends in the architecture of information- We consider two approaches to the analytical system based on the use of Internet implementation of the IAS architecture: based on a technology. The traditional view of the architecture platform-based solution presented by the same of IAS in the recent past was supplemented by Web- manufacturer, and based on a mixed decision, portal, is gradually becoming more and more submitted by several manufacturers. important role in the architecture of the IAS. The ability to access information through a familiar 2.1 Implementation of the IAS architecture based Web-browser allows you to save on costs associated on platform-based solutions with the purchase and support of desktop analytic First, consider the embodiment of the IAS applications for a large number of client locations. architecture when using components of one Implementation of Web-portal allows you to provide manufacturer - supplier platform. If you use the analytical information as the users within the office terminology of the research center Gartner, a and mobile users and analysts worldwide are platform-based solution must be sought among the connected to the portal via the Internet. firms - manufacturers of so-called BI-platform (Business Intelligence Platforms). This segment of 2. Implementation of the IAS architecture the IT market represented by 16 companies, given Today information technology market offers a here in alphabetical order: AlphaBlox, Arcplan, CA, wide range of tools designed for rapid Comshare, Crystal, Hyperion, Info Builders, implementation of the components of the Microsoft, Microstrategy, Oracle, PeopleSoft, architecture of IAS. The use of these tools allows ProClarity, Sagent, SAP, SAS, Whitelight. Among you not to develop analytical applications again, and them are the following seven leaders and contenders ready to take advantage of modern technology and, for leadership in this area: Microsoft, SAS, Oracle, consequently, reduce the time and cost of creating SAP, PeopleSoft, Info Builders, Hyperion. Two of them. these producers, Microsoft and Oracle, in a position Achieving user information in the IAS is mainly to implement all levels of the IAS on its own determined by the selection of the best tools of without resorting to third-party tools. The decisive business analysis. But important is the choice of criterion that distinguishes these manufacturers, - the tools to support extract, transform, load and store presence of its own database. data. Consider the example of the implementation of When implementing IAS enterprise may be used IAS organization tools Oracle. The corresponding as the software solutions of different manufacturers - list of products is shown in Table. 1. mixed solution, and one producer - platform-based Briefly explain the purpose mentioned in the table of solutions. And in the first and in the second case, software products in terms of their use for the there are both advantages and disadvantages. implementation of IAS. Therefore, the choice of tools for architecture, ISS, Tools to extract, transform, load and store data despite their diversity, is not an easy task. (ETL) In the market there is no single vendor that offers Oracle Warehouse Builder - a framework for the the best of all solutions required to build the IAS development and implementation of data software components. Therefore, sharing the most warehouses and marts. Built on an open architecture appropriate solutions from different vendors can Common Warehouse Model, Warehouse Builder improve the functional capacity of the IAS. The provides a solution to a number of problems. These criteria for assessment tools can act as their technical include the design, creation and administration of and cost performance, and speed of implementation, the data warehouse, the development of procedures as well as the appropriateness of the use in each and the generation of extract, transform and load case. data from a variety of sources, metadata However, the use of products from different management and integration tools access. manufacturers leads to considerable complication of Oracle Database, database management system, - the the system architecture of the heterogeneity of the basis of platform solutions of Oracle. Oracle tool making. This complication is due to the need for

120

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Database is used as a database for the storage and forms, build ad hoc queries and analysis. It provides relational data marts. access to the information contained in relational data For multidimensional data marts use Oracle marts and warehouses, as well as transactional OLAP, inextricably linked with the Oracle Database. systems, including those not necessarily running the Develop until recently, the range of OLAP-product DBMS Oracle. To the end user, a non-programmer called Express in the moment corresponds to the could own view its interesting sections of program level for the new platform Oracie9i and information in the software product used metadata become part of Oracle OLAP. For the first time it layer described by the developer, which allows users was announced at the conference, Oracle to hide the complexity of working with data at the OpenWorld 2000. program level, providing information on business Business Analysis Tools language. The platform of Oracle in terms of tools for Multivariate Data Analysis business analysis of the data does not differ much Oracle OLAP is designed for building analytical ready desktop tools with a predefined interface and systems based on the principles of multi- feature set, as the presence of a powerful tool for the dimensional technology. This feature allows you to development of end-user client sites. It lets you store and handle in the same database, relational and create finely tuned analytical applications for each multidimensional data. Tools Oracle9i Java OLAP end-user basis. API allows to maintain a multi-dimensional model, Custom Query and regulated forms of reports providing a set of mathematical, statistical and For regulatory reporting to the Oracle platform financial functions to meet the challenges of product meets the Oracle Reports - a visual tool for forecasting, planning, assess the situation and developing and publishing the standard reporting identify trends. Essentially, OLAP API is created in forms. The presence of the visual interface and built- Java object-oriented programming interface for in wizards (wizards) can reduce the development OLAP-queries. Developers OLAP-Web time of complex forms of reporting. Forms of applications, Oracle offers its software module with reports based on Oracle Reports prepared by qualified personnel, and have generated reports can Oracle JDeveloper component of Oracle Business be run end-user non-programmers. Intelligence Beans. For ad-hoc reporting product meets the Oracle Discoverer - a tool for generating arbitrary report Table 1.List of products that used for implementation IAS IAS components Product appointment Product Name Data Internet and Intranet Web portal Jracle Portal Anlysis Regulated Reporting in Web Oracle Reports Services Arbitrary queries in Web Oracle Discoverer Multidimensional analysis Oracle JDeveloper with (OLAP) in Web component Oracle Business Inteligence Beans In local web (LAN) Oracle Reports Oracle Discoverer Multidimensional analysis Oracle JDeveloper with (OLAP), development tool component Oracle Business Inteligence Beans Data mining Oracle Data Mining Suite Extract, Data mart multidimensional The control system of Oracle OLAP conversion multidimensional data marts loading and (OLAP) data storage Design and creation of multidimensional data marts (OLAP) relational RDBMS relational data marts Oracle Database Design and development of Oracle Warehouse Builder relational data marts Data warehouse ETL – component for datamarts Oracle Warehouse Builder

121

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan DBMS data warehouse Oracle Database Design and creation of a data Oracle Warehouse Builder warehouse In addition, a complete solution of one Exploration data manufacturer to date database-dependent. This is Instrumental environment Oracle Data Mining due to the fact that the major software vendors to (formerly known as Darwin) is used for data IAS seek to maximize integration of their proposed analysis methods related to technology intelligence solutions. Therefore, the desire to use one or several data. Oracle Data Mining supports the steps of the tools organization makes use of other products technology of extraction of knowledge as production supplier, which is not always the customer's request. tasks, data preparation, automatic model building, For example, the business data analysis tools can be analysis and test results, the use of models in real inextricably integrated with the database. applications. Do not forget about the risks: a complete solution Web-portal from a single source increases the risk associated The software product Oracle Portal allows us to with long-term development prospects of the IAS. represent the individual components of a business As you know, bet on one horse may be too risky. analysis of data in Web-based environment as a 2.2 Implementation of the IAS, based on the whole. Oracle Portal is designed for rapid architecture of the mixed solution deployment of the information portal of the Given the problem we mentioned corporate organization and is used as a ready-made solution. information-analytical system - combining, storing The main purpose of its use - reduce the amount of and analyzing information in order to avoid time- manual programming by using ready-made consuming process of integrating separate products components information portal and interactive visual for the mixed solution, try to isolate a group of development tools (wizards). As part of Oracle software products that can realize the architecture of Portal has the ability to create and maintain portals the IAS in large blocks. without engaging Web-designers. As such groups for mixed solutions may make Despite the seemingly obvious advantages of the the tools of business analysis and database. In the implementation of the IAS on the basis of platform- terminology of Gartner integrated tools of business based solutions, it is necessary to recall some analysis of data related to the so-called BI-packages restrictions when creating an approach to IAS is not (Enterprise BI Suites), forms a separate segment of entirely applicable. the IT market. This segment represented 14 Very rarely, the organization begins to build from manufacturing companies: Actuate, AlphaBlox, the ground up IAS. In the wild desire to use the Business Objects, Brio, CA, Cognos, Crystal, complete solution of one of the manufacturer comes Hummingbird, Information Builders, Microsoft, up against the desire to preserve existing MicroStrategy, Oracle, Sagent, Viador. Two achievements presented in the form of separate companies - Cognos and Business Objects - in the systems, performed at different times and in lead for a number of years (materials Gartner different environments. This rejection of the existing Research, BI Magic Quadrants: A 'Recession-Proof' systems is often impossible, and translate them to Market Challenged, 17.07.2001). the platform chosen manufacturer leads to For example, the implementation of the mixed significant costs. solutions using the tools of business data analysis firm Cognos and database company Oracle. It should be noted that the BI-Cognos package Transformer. To use data mining tools generate includes a set of integrated together BI-tools. The reports Impromptu, multi-dimensional analysis tool - tight integration of software components into a PowerPlay, data intelligence tools - Scenario and single platform packet is achieved by the fact that 4Thought, data visualization tool Visualizer. As a BI-tools modules share common metadata software module for describing metadata module descriptions, allocation of access rights, as well as acts Architect - the same for all data analysis tools. through Web-portal - a single point of entry of Internet portal that helps mobile users to connect to Internet users in the environment for corporate the analysis of corporate information is organized information. Completeness of solutions that allows a using the tools Upfront. claim to be significant in comparison to the market Tools to extract, transform, load and store data occupied by BI-platform, achieved by using ETL- (ETL) tool for creating data marts (relational and Analysts rarely work with "raw" data from multidimensional). transactional databases, preferring to extract Data marts, multi-dimensional and relational information from data warehouses and marts. From tools are DecisionStream and PowerPlay this batch Cognos platform also includes tool 122

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan preprocessing information for later, which ensures graphics, and so on. D.), And analysts have the the completeness of the proposed solutions. opportunity to view information on almost any level Using the tool DecisionStream comes pre- of complexity, including the creation of queries, the treatment data, ie extraction, transformation and study Information and navigation on the Web. Thus, loading of data into analytical data sources depending on the challenges faced by the end-user, (relational and multidimensional) for effective work selecting the appropriate tools. The key product for tool OLAP-analysis, report generators, tools, data regulatory reporting acts Cognos Impromptu, for ad- exploration, visualization, and identify priorities. hoc queries - Cognos Query. DecisionStream able to connect to multiple data Multivariate Data Analysis sources relational and non-relational format, The company Cognos has at its disposal is integrate and transform data and on their basis to actually one of the best OLAP-solutions available create data marts in a relational schema "star" (for today in the market of analytical processing tools. example, in a database Oracle), and in addition to According to market research OLAP-tools report data in a multivariate model, where (www.olapreport.com), the company with a tool Information is represented as measurements and Cognos PowerPlay confidently holds the second metrics. The ability to automate the creation, along largest share of the world market of OLAP-systems with a relational database, its multivariate model after Hyperion. distinguishes software from Cognos DecisionStream The main feature of OLAP-tools of Cognos is the common tools to extract, transform and load data. efficient automation of the process of creating The ability to consolidate disparate data into a OLAP-applications that can significantly reduce single source of information storage, processing and development time for systems of any complexity, associated with all of this increase in the speed of using only internal human resources organization. access to data do DecisionStream an indispensable The complexity of the task and the selected tool for the information and analytical systems that configuration tool determines the scale generated require a fast system response to user requests to PowerPlay OLAP-systems. With PowerPlay tools obtain data for research and analysis. can be developed for a single user system, user Description Metadata groups within the department, several departments, Tool description metadata Cognos Architect as well as the scale of the organization, which users meets the requirements of the centralized metadata may even be a third-party person or organization management tool that provides integration of authorized for information. Cognos. Architect is the central nucleus of the Cognos solutions based on OLAP-technology creation and management of all metadata and opens Windows-, Excel- and Web-based users business rules of the organization. Thus, as convenient access to submitted their business described in a model tool Architect metadata are language multidimensional information for viewing, available in any BI-tool Cognos. Architect Tool reporting and conduct of OLAP-analysis. Cognos module allows to describe access to sources of PowerPlay tool allows you to explore the data from information, logical representation of the business, different angles, providing multivariate data the extent of each analytic applications. analysis. The result of a unified description of the metadata By integrating BI-TOOLS of Cognos becomes correct and consistent view of data across multidimensional data can be used for further study the organization. tools intelligence data visualization and Business Analysis Tools identification of priorities. Tools Business data analysis of Cognos allow the Exploration data whole range of business analysis: build queries and Cognos solutions in the field of intelligence data generate reports in the form of relational data, to (data mining) to help explore the important conduct analysis on OLAP-dimensional data, to correlations in the data, discover hidden trends and carry out exploration of data (data mining), as well make forecasts. as visualize the information and identify priorities. Data Intelligence Tools Scenario and 4Thought help Custom Query and regulated forms of reports easily identify what factors influence key business Cognos solutions in building queries and work with indicators such as income, sales, customer loyalty to reports allow for user records in the required format the target group and others. and the required platform (Windows, Excel, Web). Scenario Tool intelligence data to evaluate the For decision-makers, agents Cognos provide access impact of various factors on the process selected in to information in the form convenient to them the analysis target. The analysis results are presented (tables, charts, bar graphs, three-dimensional in the form of a classification and regression trees,

123

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan also referred to as decision trees. This searches for available to users without the services of exceptions, aimed at identifying elements that are programmers. not statistically satisfying detected characteristic Tool to create and configure an Internet portal for relationships in the data. Cognos platform is module Upfront. Created by Tool intelligence data 4Thought, using neural using Upfront portal can be integrated into an network technology allows you to build complex existing organization from the portal, intranet and / nonlinear models, stable with respect to inaccurate, or extranet solutions (B2B), and used separately. "noisy" and incomplete data. 4Thought available Creating a Web-portal is an adjustment publishing even to those managers who are not familiar with the environment and does not require programming. details of statistical methods to assess the data, and Thus, the module Upfront provides administrators allows them to carry on the analysis of the available centralized management through a customizable data samples, "what - if" build forecasts. interface, and end-users who are inside or outside One of the advantages of tools Scenario and the firewall (firewall), - a single point of entry 4Thought is that as input for the exploration of the through which the access to information of different data, these tools are capable of recovering data from presentation formats. Thus anyone with an internet virtually any analytical multidimensional database: browser and access to corporate information, is able Cognos PowerCubes, Oracle Express, SAP BW, to work with a pre-prepared form of reports on Hyperion Essbase, IBM DB2 OLAP Server, relational or multidimensional data, as well as self- Microsoft SQL Server OLAP Services, NCR build and publish reports for personal use or sharing. TeraCube. In addition to the possibility of manipulating Discovered through the use of tools of relational data and OLAP-analysis, user access data intelligence hidden data trends could serve as a basis visualization tool and identify priorities. Upfront for making qualified management decisions and, integrated with OLAP-tool PowerPlay, report consequently, is a prerequisite for the success of the generator Impromptu Web Reports, Cognos Query strategic planning. generator and visualization tool and identify Information Visualization priorities Visualizer Web. In addition, the portal It is known that graphic information is a text, without additional configuration may be possible to unlike much faster perceived by a human. work with documents in formats familiar to users of Presentation of data in an intuitive form allows for Excel, Word, PDF. the head to be guided in large volumes of data, filtering out the unnecessary. 3.Conclusion Cognos solutions in the field of data visualization Thus, the implementation of the IAS on the and identification of priorities in the process allow basis of the mixed solution, often used in practice, viewing and analysis to allocate large amounts of watershed suppliers can serve the division of data from a key information and make her accent. products according to the principle of belonging to Cognos main tool for data visualization and identify the architecture level of IAS. This group of data priorities for Windows and the Web is a Visualizer. analysis tools can be independent from the group of Advanced set of visual patterns of information - tools to extract, transform, load and storage, that is, from the two-dimensional and three-dimensional each of these groups can be represented by a charts and graphs for quantitative indicators to maps separate manufacturer. Tools of the second group it to display the regional dependencies and special is advisable to select from database vendors, and semaphores and visual elements used to identify business analysis tools - from suppliers specializing priorities, can reduce the time searching for the in the spectrum of business data analysis tools. required information. Obviously, when choosing software for The results obtained in the process of data implementation of IAS in each case need to seek visualization and identification of priorities are the some kind of a balanced solution, a compromise. basis for effective decision-making. When the final decision, which of the two Web-portal approaches to use, platform-based or mixed, is for Cognos tools for the Internet allows users to CIOs and are usually carried out with the assistance produce reports and create database queries, build of consultants based on the evaluation of technical forecasts working with information on forms of and economic indicators. reports already prepared to carry out a full analysis of OLAP-dimensional data, visualize information 4.References and identify priorities (scorecarding). And all of [1] Inmon W. H. Building the Data Warehouse. these opportunities to work with the information New York: John Wiley & Sons, Inc. ,2005

124

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

[2] E. F. Codd, S.B.Codd. Providing OLAP. On- [3] R. Kimball, J. Caserta, 2004. The Data line Analytical Processing to User-Analists: An IT Warehouse ETL Toolkit. Practical Techniques for Mandate. C. T. Salley, E. F. Codd & Associates, Extracting, Cleaning, Conforming and Delivering 1993 Data Wiley

Архитектура современной информационно-аналитической системы

Talgatova Z.

International Information Technology University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

В нынешнее время объемы информации используемые различных отраслях экономики и промышленности просто колоссальны. Залогом успеха организации есть информационно-аналитическая система (ИАС). Использование ИАС возможно объяснить рядом причин: общая реорганизации бизнес-процессов, повышение качества информации, принятие выскокэффетивных решений. В данной статье рассматривается архитектура современной информационно-аналитической системы с точки зрения технологических процессов. Приводятся рекомендации по реализации этой архитектуры на примере различных подходов и инструментальных средств.

Қазіргі ақпараттық-талдамалы жүйесінің құрылысы

Talgatova Z.

International Information Technology University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

Қазіргі бизнес әлемінде, оны әр жақтан қарағанда, ұйымдар зор ақпараттың көлемімен кездеседі. Табыс ұйымының өз қарамағында бар ақпаратты қаншалықты мүмкін болғанша қолдануда тұрады. Табысқа нәтижелі ақпараттық-талдамалы жүйені (АТЖ) құру жол ашады. Осы мақала қазіргі ақпараттық-талдамалы жүйесінің құрылысын жұмыс барысындағы көз қараспен талқылайды. Осы құрылыстың жүзеге асыру ұсыныстары әр түрлі тәсілдеме мен әдіс бойынша келтірілген. Ақпараттық-талдау кәсібіндегі жүйеде инфрақұрылымды қолдануға міне бірнеше себеп: бизнес жұмысына ұмтылудағы толық қайта ұйымдасуда, іскерлік ақпараттың сапасын жақсартуда, стратегиялық жоспарды қолдау мен жоғары өнімдік шешімдердегі жетістікке қажет.

Complexity of design and control the robotic arm

Turdiyev A.P.

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

Robots are ideal for work in hard or harmful to the human field. Robots have one significant problem; they cannot adapt to the changing environment. With the current state of technology to develop robots that properly respond to changing external factors very challenging. It takes a comprehensive programming for that would enable the robot to make decisions based on the environment. However, where the environment may be structure easier and cheaper use none adaptive robots. One solution to overcome the lack of adaptability - a human operator, who will control the robot remotely, but here is another problem. Firstly, ease robot control depends on the correct design of the controller, and secondly, it is difficult to manipulate the robot without any feedback.

1.Introduction Today, the robotic arm is available in a variety of In recent years, robotic arms and hands are variations of industrial types, with varying degrees getting more and more attention in the industrial of freedom, speed and strength far exceeding the sector (Fig. 1). Also significant advances have been human anthropomorphic to partially or almost made in medicine, military, marine exploration, completely reproduce the capabilities of the human space exploration, and even entertainment. hand.

125

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

2.The robotic arm. Design complexity. human operator for emergency operations. Some of the basic characteristics that determine Programmed movement sets can be stored in the performance of a robotic arm is: memory for use in relevant tasks. Managing human - The number of limbs and joints operator means that a person remotely controlling - Degree of freedom the hand. - Force Idea of remote controll came about in 1970, - Speed when it was impossible to program adaptive robots, - Accuracy instead, it was easier to control it from a distance. The main advantage was that the person is relatively easy to adapt and so it will be easier to manage in adverse conditions. However, such systems difficult to use if the controller is not well designed. [2] [3]

3.Master-Slave technology Robotic system with remote control use different forms Master-Slave control. Master-slave is a model of communication where one device or one process has unidirectional control over another. In the methodology of Master-slave robot (slave) closely follows the master's movement. Master-slave control method can be divided into 2 categories unilateral and bilateral control systems (Fig. 2). The

Fig.1 Production manipulator one-way control system is not available for feedback from the robot (slave). Master have only vision At the end of a robotic arm mounted manipulator feedback. The advantage of this system is the that is specifically designed to interact with the simplicity of the mechanism and controller. environment and its exact nature depends on the However, this system is not suitable for applications, application. Typically, the manipulator consists of a which require a more flexible manipulation. [4] gripping device, and in some cases anthropomorphic arm. The manipulator is used for different purposes, such as spot welding in the assembly, uniform spray- painting or for other purposes, where working conditions are dangerous to humans. The manipulator as anthropomorphic hand, is very useful where the need humanlike dexterity, replacing the man in a hazardous environment, hard to reach places or where there is a risk to life. [1] The difficulty in designing a robotic anthropomorphic hand begins to simulate the natural smoothness of movement of the human hand. Other typical constraints arise when playing / implementation of the hand of the feedback data to the artificial. It would be very useful in monitoring Fig. 2. Master-Slave Control System the hand to have information about the tactile information, temperature, position, and pressing the Traditional robotic limb control method with the power to make the right decision, but even the most controller - is the control using the joystick or modern sensors can not cover the entire spectrum of keyboard. This is the most difficult technique natural sensory feedback. requires special training for the operator, since the Another important task is the control of an operator movement and the desired movement of the anthropomorphic hand. Dynamics and dexterity of robot significantly different. Therefore, no force or the human hand can be modeled only partially and pressure cannot be transmitted directly to the involves brain-like computing power which today operator. Another method is more intuitive - is a does not. duplicate of the remote control robotic arms, which The best choice for the control of the robotic arm are physically controlled by an operator. All the is automated procedures for limited fixed tasks or a

126

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan movements of the operator is recorded and [2] S. Goto, Industrial Robotics: Theory, reproduced accurately in real time. [5] Modeling and Control (Force-free control for flexible motion of industrial articulated robot arm), 4.Conclusion Advanced Robotic Systems International, Chapter This article reviewed the method of robotic arm 30, pp. 813-840, Proliteratur Verlag, 2007. control, scope, complexity and constraints that may [3] P. Arbeille, J. Ruiz, M. Chevillot, F. Perrotin, be encountered during its development. Currently, P.H. Herve, P. Vieyres, G. Poisson, “Teleoperated scientists from around the world are trying to create robotic arm for echographic diagnosis in obstetrics a robotic arm capable of moving as smoothly and and gynecology”, Ultrasound in Obstetrics and rapidly as human. Many of them achieved good Gynecology, Vol 24, No. 3, pp. 242-242(1), August results. 2004 [4] D. Kim, J. Kim, K. Lee, C. Park, J. Song, D. 5.References Kang. “Excavator teleoperation system using a [1] C. Kemp, L. Aryananda, A. Edsinger, P. human arm”, Elsevier Automation in Construction, Fitzpatrick, L. Natale, and E. Torres-Jara, eds. Proc. p. 173-182 RSS Workshop: Manipulation for Human [5] Lee, H.S., “Teleoperator control system Environments design with human in control loop and telemonitoring force feedback, p. 2674 – 2679, vol.3

Сложность разработки и управления роботизированной рукой

Турдиев А.П.

Компьютерлік инженерия және телекоммуникация кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. 05004., Алматы 050040, Қазақстан

Роботы идеально подходят для выполнения работ в труднодоступных или вредных для человека местах. Роботы имеют одну существенную проблему, они не умеют приспосабливаться к изменяющейся окружающей среде. При нынешнем состоянии технологий разработка роботов, которые правильно реагируют на изменяющейся внешние факторы очень сложная задача. Потребуется комплексное программирование для того что бы дать возможность роботу принимать решения, основанные на окружающей среде. Однако там, где среду можно структурировать легче и дешевле использовать не адаптивных роботов. Одно из решений преодолеть недостаток адаптивности — это человек-оператор, которые будет управлять роботом удалено, но это вызывает другую проблему. Во-первых, легкость управления роботом напрямую зависит от правильного дизайна контроллера и во-вторых, сложно манипулировать роботом, не имея с ним какой-нибудь обратной связи.

Күрделілігі жобалау және басқармасы роботизированная рукой

Турдиев А.П.

Международный Университет Информационных Технологий, Кафедра Компьютерной Инженерии и Телекоммуникации, ул. Манаса / Жандосова 34 «А»/8 «А», Алматы 050040, Казахстан

Роботтар адам қолы жетпейтін немесе адам денсаулығыны зиянды жерлерде жұмыс атқаруға қолайлы болып табылады. Роботтарда бір елеулі жағдай бар, олар өзгеріп отырған ортаға бейімделе алмайды. Кәзіргі кезде роботтарды дамыту технологиясы, ағымдағы жағдайға және сыртқы факторлардын өзгерісіне дұрыс шешім қабылдау өте күрделі тапсырма. Роботқа шешим қабылдау мүмкіндігін беру үшін, жан-жақты бағдарламалауды қажет етеді, бұл қоршаған ортаға негізделген.Алайда, егер орта құрылымын структурировать етілсе онда жеңіл және арзан беймделмеген роботтарды қолдану.Шешімдердің бірі бейімделу кемістігің жеңу - ол адам оператор, роботты сырттай басқарады, бірақ бұл басқа мәселені қозғайды.Біріншіден, роботты оңай бақылау тікелей контроллерді дұрыс жобалаудан байланысты, екіншіден, роботпен іс әрекет жасау қыйын, онымен кері байланыс болмай.

127

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Development of algorithms for group decisions in pattern recognition problems

Y. Aitbayev

International Information Technology University, Department of Information Systems, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The article is devoted to the topic of collective decision-making models in automated intellectual systems. The application of such models for pattern recognition problems is being considered. What is meant by the term “collective recognition” is the task of using multiple classifiers, each of which will decide on the class of one entity with the subsequent coordination of their decisions with the help of a certain algorithm.

1. Introduction mathematical tools of recognition emerges. There is In recent years there has been growing interest in a need for algorithms that are adapted for use in non- pattern recognition tasks. This is determined by the standard (in terms of the theory developed earlier) prevalence of the problems that is being solved in conditions [3]. recognizing images and characters, scene analysis, An important requirement for the classification technical and medical diagnostics, signal algorithms is resilience to changes in the classified identification, analysis of expert data, speech set of objects. Nowadays, among specialists, recognition, creation of expert and artificial collective classifiers are becoming more popular as a intelligence systems. tool to improve the efficiency of pattern recognition Basic theoretical and practical issues of this area [4]. Its essence consists in the fact that the final are reflected in scientific and practical works of decision is taken on the basis of individual domestic and foreign experts, such as M.Z. classifiers’ partial decisions "integration". In Zgurovsky, G.S. Osipov, V.P. Gladun, V.I. classification problems, the group method is the Donskoy, O.P. Kuznetsov, V.F. Khoroshevsky et al synthesis of the results obtained from different [1]. algorithms applied to a given initial information, or The present level of scientific and technological selecting the optimal algorithms of the given set [5]. progress requires a focused development of When solving practical recognition problems, a user computer vision systems as an important mechanism is interested in algorithms, providing near-optimal of providing effective interaction between solution of applied problem. Given a set of different machinery and humans. One of the most important recognition models and means for collective areas of computer vision is pattern recognition. decision-making, certain guarantees of success can Successful solution of pattern recognition tasks is be obtained [6]. necessary to develop systems capable of intelligently evaluating the environment and doing certain 2. Collective recognition actions. What is meant by the term “collective Fundamental work in the theory of pattern recognition” is the task of using multiple classifiers recognition and classification associated with the (committee, ensemble, etc.), each of which will names of such foreign scientists as J. von Neumann, decide on the class of one entity with the subsequent K. Pearson, A. Wald, F. Rosenblatt. A great coordination of their decisions with the help of a contribution to the development of recognition and certain algorithm. An important condition for the classification theory was made by Soviet scientists efficient formation of the committee is to comply Yzerman M.A., Braverman E.M., Rozonoer L.I. (the with the necessary balance between accuracy and method of potential functions), Vapnik V.N., diversity of committee members. Committee Chervonenkis A.Y. (statistical pattern recognition diversity is the degree of errors noncorrelatedness theory, "generalized portrait" approach), Ivakhnenko between committee members, which demonstrated a A.G. (group method of data handling), Zhuravlev significant impact (including experimentally). In J.I., Galushkin A.I. [2] particular, the advantage of combining 3 classifiers, Studies related to the development of pattern each of which had an accuracy at the rate of 67% recognition theory, retain their relevance for over and a low rate of errors correlation, compared with half a century. With the development of new the same association with the accuracy of members application areas of science, the need for new ≈ 95% had been demonstrated.

128

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

An important factor in the efficiency of a classifiers may provide different information about committee is members' votes combining scheme. the classified object, which may be essential for There are various voting schemes, the choice of improving the system properties [10]. which depends on the feature space, classifiers As different recognition algorithms manifest models, etc. In this study, the most universal themselves in different ways on the same sample of schemes are shown, for which the winner is the objects, then the question arises about the synthetic class: decision rule that adaptively uses the strengths of 1) the maximum - with a maximum response of these algorithms. This decision rule is based on two- the committee members; level recognition scheme. On the 1st level, partial 2) averaging - with the highest average response recognition algorithms work, the results of which are of the committee members; combined on the 2nd level in synthesis unit. The most 3) a majority - with the largest number of votes common ways of such union based on assigning of the members [7]. areas of competence of a certain partial algorithm. The following algorithms for constructing The easiest way to find the areas of competence is to collective decisions exist: Bayesian method, partition the feature space. Then, for each of the competence areas, decision-making patterns, selected areas its own recognition algorithm is Woods’ dynamic method, complex committee developed. Another method is based on the use of methods, logical correction, convex stabilizer, and a formal analysis to determine local regions of feature generalized polynomial and algebraic corrector. spaces as a surrounding area of recognizable objects, Generally, using collective algorithms strategy can for which successful functioning of any partial improve the prediction accuracy due to mutual recognition algorithm is proved. compensation of an algorithm’s disadvantages for The general approach to the construction of the the benefits of others [8]. synthesis unit considers the resulting performance of There are different approaches of partial partial algorithms as initial indications for the decisions integration. In some cases, it is proposed construction of a new generalized decision rule. In to use the majority vote method or label ranking this case, all of the above methods with intensional method. In others – use schemes based on averaging and extensional trends in pattern recognition can be or linear combination of the posterior probabilities used. that are estimated by individual classifiers, or fuzzy Consider the collective decision-making block rules algorithms can be used. It is also proposed to diagram (Fig. 1). The decision rules collective is carry out independent fitting of the combined some finite subset {R} of all possible decision rules classifier, considering the partial decisions as the set C, {R}, where C, {R} = {Rl}; l = 1, 2, …, L, new complex features. Approaches based on formed to develop collective decision where Rl - l-th allocation of local areas in observation space, in decision rule, Yl - the decision on the output of l-th each of which only one partial classifier is rule, C - a collective decision. Type of collective "competent" to make a decision, are also developing decision concretized by the type of a problem to be [4]. solved by the collective. Since this is a pattern The essence of the collective decision-making recognition problem, both collective and individual task is to develop an agreed collective decision on decisions made by members of this collective, the order of preference of the observable objects consist in classifying a certain situation or object X based on individual assessments of group members. to one of the classes or sets Kk, k = 1, 2, ..., K. The need to use multiple classifiers and then The situation X is characterized by the vector of combining their decisions explained in different parameters or features: ways, depending on the problem definition. The P = {p1, p2, ..., pm, ..., pM}. (1) main reasons of using multiple classifiers’ Formally, the task of making a collective coordinated combination of decisions are the decision is stated as follows: if the Yl, l = 1, 2, …, L following two ideas [9]: – the individual decisions made by members of the - reducing complexity of a problem being solved collective – by the decision rules Rn = 1, 2, ..., n, (increasing computational efficiency of a procedure) then the collective decision is determined as a - increasing the decision-making competence function of individual decisions: (increasing classification accuracy rate) C = F (Y1, Y2, ..., YL, X), (2) Despite the fact that one of the classifiers have where F - a collective decision making superior properties compared to other, sets of algorithm misclassified objects from different classifiers would not necessarily overlap. For this reason, different

129

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Here is the diagram: 2) fusion of classifiers decisions (assuming that all classifiers are equally competent in all feature space); 3) a combination of the above strategies [11]. Recognition methods using not one, but several concurrent decision rules have already been mentioned. Each rule provides a partial decision. Figure 1. Collective decision-making block diagram The final decision is taken on the basis of these options with the help of a certain generalization Decision C in the recognition task consists in procedure. It is expedient to extend this approach to choosing the number of one of the classes Kk, k = 1, the case when more than one group of decision rules 2, ..., K, for each particular situation X, for which used, i.e. "collective" of groups. The hierarchy of rules Rl make different decisions: groups or collectives can be arbitrarily large. At each Rl: X∈Kk, then Yl (X); l = 1, 2, ..., L; k = 1, 2, ..., level, partial decisions produced, according to them - K. the generalized decisions of current level, which A voting algorithm when the final decision is play the role of partial for the next level, etc. On the determined by the majority of algorithms can serve basis of the foregoing, the following general scheme as the most obvious approach. In practice, such of the class of efficient algorithms for solving methods of decisions associations do not always pattern recognition problems with the help of the show high quality results, because the collective collective decision rules is proposed. Algorithms of majority error may occur. The weights of individual the class consists in performing four consecutive algorithms are fixed, i.e. the peculiarities of some steps [12]: specific situation are not taken into account when 1) generating groups of decision rules; determining the final decision. 2) obtaining partial decisions and evaluating There are decision combining algorithms based competences of groups; on probabilistic approaches, when selecting among 3) formation of a generalized decision; the decisions of different algorithms, the one that has 4) expected error estimation. the highest probability is selected. There are also For the rational use of the characteristics of matching algorithms based on metaclassification, different algorithms in solving recognition problems, when generalization of decisions is performed by it is possible to combine different in nature special metaсlassifier. The input data for it is the recognition algorithms into groups that make the decisions of base classifiers, which are interpreted as classification decision on the basis of rules adopted a set of features of the new feature space. in the collective decision-making theory. Suppose Collective recognition is effective in the that in some situation X the decision taken is S. following cases: Then S = R(X), where R - decision making - decision is to be made by different algorithms; algorithm in situation X. Suppose that there are L - algorithms use different feature spaces or different algorithms for solving the problem, i.e., Sl different data sources; = Rl (X), l = 1, 2, ..., L, where Sl - solution obtained - algorithms trained with different training data by the algorithm Rl. We define the set of algorithms (selected randomly from a large data sample or {R} = {R1, R2, ..., Ri} as collective of algorithms for constructed on the basis of pre-clustering); solving a problem (collective of decision rules), if on - dimension of the feature space is too large the set of decisions Sl in any situation X a decision and/or it comprises the features measured at rule F is determined, i.e. S = F (S1, S2, ..., SL, X). different scales; Algorithms Rl are called group members, Sl - the - feature space comprises the features of different solution of l-th member of the group, and S - levels of abstraction (aggregation); collective decision. The function F defines the - specific requirements are set for the type I and method of generalization of individual decisions into type II errors (false alarm and signal pass). the collective S decisions. Therefore, the synthesis There are three collective recognition strategies: of F function, or a method of generalization, is the 1) selection of the classifier, whose result central point in organization of a collective. determines the solution of a recognition task In the recognition tasks a situation X is a (assuming that each classifier is an expert in a description of the object X, i.e. its image, and the certain area of feature space); decision S - the pattern number that corresponds to the image. Individual and collective decisions in the recognition task consist in assigning a certain picture

130

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

to one of the patterns. The most interesting groups of theory," MS thesis, Saint-Petersburg State recognition algorithms are those in which there is a University, SPB, 2004. dependence between weight (influence rate) of each [4] L. S. Fainzilberg, "Bayesian scheme of decision rule Rl and the recognizable image. For collective decision-making in conditions of example, the weight of the decision rule Rl may be contradictions," (in Russian), Management and determined by the relation: Informatics Problems, no. 3, pp. 112–122, 2002. ∈ (3) [5] M. B. Aidarkhanov, "On the stability of the

group classification algorithms," in The 9th National where Bl - competence area of Rl. Conference, presented at the Mathematical methods of pattern recognition, Moscow, 1991, Moscow, 1st The weights of decision rules are chosen so that: Basmanny lane.: «ALEV-V», 1991, pp. 3–4. (4) [6] Y. I. Zhuravlev, A. S. Biryukov, V. P. Bogomolov, V. A. Voronchihin, N.N. Katerinochkina, and V. V. Ryazanov, "Some for all possible values of X. Equation (3) means practical algorithms of recognition by precedents that the collective decision determined by the and methods of their correction," in The 9th decision of the decision rule Ri, whose areas of National Conference, presented at the Mathematical competence belong to the image of the object X. methods of pattern recognition, Moscow, 1991, This approach represents a two-level recognition Moscow, 1st Basmanny lane: «ALEV-V», 1991, pp. procedure. On the 1st level image belonging to a 190–191. particular area of competence is determined, and on [7] N. N. Kuzmitsky, "Topical issues of using of the 2nd the decision rule, the competence of which is convolutional neural networks and their committees maximum in the found area, comes into force. The in pattern recognition," (in Russian), Vestnik of Brest decision of the rule is identified with the decision of State Technical University, no. 5, pp. 6–10, 2012. the whole group [13]. [8] Y. G. Shmakova, A. Y. Polyakov, and V. A. Dudarev, " Methodology of computer experiment for 3. Conclusion the purpose of finding promising inorganic The rules of integration of partial independent compounds," (in Russian), Technologies of the XXI classifier decisions are examined in the article. Thus, century in the light industry, vol. 1, no. 7, pp. 4–5, the generalization of decisions is a special problem 2013. in the field of pattern recognition and classification, [9] L. A. Rastrigin and R. K. Ehrenstein, which cannot be reduced to a typical classification Collective Recognition Method. Moscow: problem (with one classifier). It is subject to further Energoizdat, 1981. in-depth study, and its use in practice may lead to [10] V. I. Gorodetsky and S. V. Serebryakov, qualitatively better properties of classification "Methods and algorithms of the collective systems that use the concept of a combined set of recognition: a survey," (in Russian), Science, vol. 1, classifiers forming a collective decision. no. 3, 2006. [11] E. A. Shamin and T. V. Istomina, "Fuzzy 4. References modification of collective methods processings of [1] V. E. Glushchenko and Y. V. Glushchenko, biomedical information," (in Russian), XXI century: "Study of the description space structure for the Resumes of the Past and Challenges of the Present, formation of knowledge of pattern recognition pp. 20–26, May 2012. intellectual systems," (in Russian), Shtuchy intelect, [12] N. G. Zagoruiko, Applied methods of data p. 1, May 2005. and knowledge analysis. Novosibirsk: Sobolev [2] M. N. Golubev, " Development and analysis Institute of Mathematics of RAS, 1999, ch. 8, par. 6. of algorithms for detecting and classifying objects [13] The National Open University INTUIT, " on the basis of machine learning methods," MS Design of artificial intelligence systems," in Intuit, Thesis abstract, Yaroslavl State University, ch. 4, sec. Decision rules collectives. Yaroslavl, Sovetskaya str., 14., 2012. [3] O. A. Izmakova, " Recurrent training and self-learning algorithms in pattern recognition Разработка алгоритмов групповых решений в задачах распознавания образов

Е. АйтбаевU

131

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Международный университет информационных технологий, Кафедра информационных систем, 34 «А»/8 «А» ул. Манаса/Жандосова, Алматы 050040, Казахстан

Статья посвящена теме использования моделей коллективного принятия решений в автоматизированных интеллектуальных системах. Рассматривается применение данных моделей для решения задач распознавания образов. Под коллективным распознаванием подразумевается задача использования множества классификаторов, каждый из которых принимает решение о классе одной сущности с последующим согласованием решений с помощью некоторого алгоритма.

Бейне тану есептерінде топтық шешу алгоритмдерін құру

Е. Айтбаев

Халықаралық ақпараттық технологиялар университеті, Ақпараттық жүйелер кафедрасы, Манас 34 «А»//Жандосов 8 «А» көш. қиыл., Алматы 050040, Қазақстан

Мақала автоматтандырылған интеллектуалды жүйелердегі ұжымдық шешім қабылдау үлгісін қолдану тақырыбына арналған. Мақалада бейнені тану мәселелерін шешу үшін қолданатын деректер үлгілері қарастырылады. Ұжымдық бейне тануда классификаторлар жиынын қолдану мәселелері тұспалданады. Кейбір алгоритмедердің көмегімен, классификатолар жиынынын әрқайсысы, келесі шешімдердің келісімі арқылы бір класстың мәні бойынша шешім қабылдайды.

Using game technology to develop virtual physical laboratories

Y.A. Daineko, M.T. Ipalakova, D.D. Tsoy, I.I. Khametov, K.D. Bushmina

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

There are the results of the development of a virtual physical laboratory “Proving of Malus’s law” in the system of higher education in relation to physics problems on the study of optical phenomena are presented. An overview of virtual training systems conducted. The information technologies for the design and development of the virtual laboratory work are described.

1. Introduction using 3D graphics, which helps people to interact, New technology in education, like in any sphere visualize and study the science. Today they have of our life, has a significant effect on the core developed 4 laboratories in two subjects: physics processes, including the interaction of teachers and and biology. In each program, you can conduct students in the context of the transfer of knowledge. experiments to study the object interactively, with In this field, computer training systems used within detailed visualization. lectures or labs are gaining popularity recently. Newton programs are the virtual physical Areas of application of such systems, as well as laboratories, presented in the form of software [2]. courses, where they are used, are varied. In the These developments make it possible to study the process of teaching physics such training systems kinematics, dynamics, thermodynamics, optics and are implemented as virtual physical laboratories for other fields of physics using a single computer. The experiments simulation. The presented article is whole process of experiments is controlled by a user. devoted to the development of such virtual He assembles mechanisms, gradually watching the laboratory on the example of “Proving of Malus’s process on auxiliary video. law” laboratory work. Virtual Star Laboratories – is a project of MIT Among the examples of such computer-based (Massachusetts Institute of Technology), which was training systems the following applications can be created to develop laboratories for research and distinguished. training [3]. Its main function is to develop training LabinApp organization uses modern technology and research applications in biology, genetics, for the benefit of education [1]. They create software hydrology and others.

132

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

need to perform an action repeatedly or press the «E». UML diagram of this process is shown in Figure 2.

Table 1 – Comparative characteristics of the game engines

Engine Advantages Disadvantages Big amount of tutorials Limited set of Cross-platform tools Unity3D Easy to use Figure 1 – General view of the laboratory Popular among developers NASA has used the Unity 3D to simulate the Big amount of Hard to use solar system and the objects within a project Eyes on Unreal tutorials the Earth [4]. There is also a realistic astronomical Engine Cross-platform simulator Universal sandbox, where you can observe Wide set of tools the interaction between the various celestial bodies, based on physical laws [5]. Great graphics Novelty CryEngine 3 Only paid The company FX Palo Alto used Unity3D to Good sound create 3D models of the chocolate factory. A user is version Good technical Only paid able to monitor all the processes occurring in the support version HeroEngine production in real-time [6]. Convenient for Uncomfortable MIT Media group used Unity3D for the similar map creation scripts purpose, as well as to accelerate the visual analysis Convenient for Few tutorials of the information they put into the 3D space created map creation by them [7]. Many styles of Uncomfortable The experimental psychologist and engineer of Rage Engine gameplay interface the human interface developed Virtual Game Lab, Problems with which helps to solve the problems of people with Fast network code keyboard and various mental diseases, to study cognitive abilities, mouse behavior of humans [8]. 2. Technological basis After switching on the light source for observing For the realization of the current virtual the polarization effect, turn the polarizers at a certain laboratory the analysis of the game engines market angle. In order to do this manually, you must click was made to choose the most appropriate for our the mouse on one of the polarizers and click on one aim. The five most popular and relevant game of the rotation keys (arrow left / right). The selected engines were analyzed with their advantages and polarizer is rotated by a certain angle (Figure 3). disadvantages (Table 1). As a result of the analysis, the Unity 3D game engine was chosen, because it meets the requirements of the authors on the availability of information, ease of use and graphics capabilities.

3. Realization of virtual laboratory “Proving of Malus’s law” The application is started when the necessary equipment appears on the desktop (Figure 1). To begin the experiment you must go to the desktop. To turn on the light source, the «E» key must be pressed, if the light source does not turn on, the Figure 2 – UML diagram describing the beginning action needs to be repeated or the «Q» key must be of the work in the laboratory pressed. To turn off the light source, you must press

«Q», if the power does not turn off after this, you

133

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

institutes and laboratories, as well as can be used in the training centers and centers of advanced training of employees of industrial and commercial organizations.

The work was supported by the SC of the MES program grant research funding for 2015, Grant 2622 / ГФ4 , Identification No 20150115РК01145.

5. References [1] LabinApp, “Physics I”, ”Physics II”, Figure 3 – Laboratory, view of the installation http://labinapp.com [2] DesignSoft, “Newton”, If not, you must click on one of the polarizers and http://www.newtonlab.com/English/newton perform the previous steps (perform up until the turn [3] MIT, “STAR”, http://star.mit.edu is not completed successfully). To rotate the [4] Jet Propulsion Laboratory, California polarizers to a certain angle the value of the angle Institute of Technology, “NASA’s Eyes”, can be also entered into the input fields for each of http://eyes.nasa.gov/index.html the polarizers. After rotating polarizers using one of [5] Giant Army, “Universe sandbox”, the methods, it is possible to observe a polarized http://universesandbox.com light on a white screen, and the intensity value of the [6] FXPAL, “The virtual factory”, polarized light will be saved in the table. http://www.fxpal.com/research-projects/the-virtual- factory-industrial-collaboration-environments 4. Conclusion [7] MIT Media Lab, “DoppelLab”, Thus, the virtual physical laboratory to study the http://doppellab.media.mit.edu polarization of light was developed. It is designed [8] Sebastian Koenig, “Virtual Game Lab”, for the students of technical universities to use while http://www.virtualgamelab.com/ studying physics. In addition, the current development can be practically applied in research

Использование игровых технологий для разработки виртуальных физических лабораторий

Е.А. Дайнеко, М.Т. Ипалакова, Д.Д. Цой, И.И. Хаметов, К.Д. Бушмина

Международный Университет Информационных Технологий, Кафедра Компьютерной Инженерии и Телекоммуникации, ул. Манаса / Жандосова 34 «А»/8 «А», Алматы 050040, Казахстан

Представлены результаты разработки виртуальной физической лаборатории «Проверка закона Малюса» в системе высшего образования применительно к задачам физики по изучению оптических явлений. Приведен обзор виртуальных обучающих систем. Описаны информационные технологии проектирования и разработки виртуальной лабораторной работы.

Виртуалды физикалық зертхана әзірлеу үшін ойын технологиясын пайдалану

Е.А. Дайнеко, М.Т. Ипалакова, Д.Д. Цой, И.И. Хаметов, К.Д. Бушмина

Компьютерлік инженерия және телекоммуникация кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. 05004., Алматы 050040, Қазақстан

Жоғары бiлiм жүйесiнде, физика мәселелеріне қатысты оптикалық құбылыстарды зерттеу бойынша “Малюс заңын тексеру” виртуалды физикалық зертхананың әзірлеу қорытындылары ұсынылған. Виртуалды оқыту жүйелеріне шолу жүргізілген. Ақпараттық технологияның жобалауы мен виртуалды зертханалық жұмыстың әзірленуі сипатталған.

134

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Application of Augmented Reality technologies in education

Y.A. Daineko, M.T. Ipalakova, S.S. Serikov, I.K. Kassym

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The using of augmented reality technologies in education is considered. The application to study optical properties of a collecting lens is developed. It is shown that the learning process using such technologies can be more interesting and lively.

1. Introduction studying chemical processes has been developed, A few years ago, people didn’t know that after which is very effective in conducting dangerous, five - ten years detach them from the technological explosive, expensive or time-consuming explosion in the field of IT sphere. Development and experiments [7]. Another use of augmented reality - distribution of mobile phones, mobile phones is software application Construct3D [8], which was became focused on them. We had lots of new successfully applied to study of mathematics and programs, games and many applications, which were geometry in high school and universities, aimed for smartphone users. Increased interest in encouraging students to experiment with geometric smartphones sphere was, because of improved constructions. Transparent Earth application allows communication quality. Today speed of exchanging you to see the map of the world under your feet [9]. information through the Internet become so fast, that HistoriQuest- program aimed at visualization of you can simply point the phone's camera and different historical periods and creation of various momentary get need information. The main aim this historical events. application reproduces the events to change perception of the world, make the world of the Civil War in the United States, combining the interactive. Augmented reality is a new sphere of game with the historical facts [10]. computer technology, which is currently one of the So, the augmented reality used for the study of most promising directions of ICT. Usage of various subjects at all levels of education, from Augmented Reality is almost unlimited. At the kindergarten to university. moment there is a fairly wide range of areas, where 2. Program realization augmented reality was used, such as medicine, Using technology of augmented reality we engineering and design, printing and marketing, developed the application, which allows studying the cartography, education, military equipment and so phenomena of optics and train in cognitive game. on. Augmented reality is a technology, which user experience become wider by introducing different virtual objects in real-time [1]. There are several reasons for the growing popularity and demanding of augmented reality:  Interactivity  Availability  Realism  Innovativeness Today, this technology is especially relevant in education, as extraordinary way of presenting information allows users to perceive the process of learning more exciting and intuitive, which helping Figure 1 - Preparation of a thin lens augmented to draw attention of students and better image of the scene memorization studied material [2, 3, 4, 5]. So using augmented reality has been developed for studying NyaARTOOLKIT was used for the development, the application of a magnetic field of physics [6]. a free implementation of the library to create There, the magnetic field lines were visualized as augmented reality and game engine Unity 3D. The real magnetic distribution. Virtual laboratory for

135

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

program developed via a web camera analyzes the education. International scientific-practical conference incoming video stream, recognizes the "Integration of science, education and industry - the corresponding token and adds the desired object. basis of the implementation of the Plan of the nation", Designed physics experiment is to provide a dedicated to the 100th anniversary of the birth of converging lens images (Figure 1). When computer Academician A.S. Saginova. (2015) P. 156-157. webcam, smartphone or tablet direct to the created [3] Su Cai, Feng-Kuang Chiang, Xu Wang. Using markers the app shows a burning candle, a the Augmented Reality 3D Technique for a Convex converging lens and the image on the screen. When Imaging Experiment in a Physics Course. you change the distance between the object and the International Journal of Engineering Education lens or lens and image, the image size is changing. (2013) Vol. 29, No. 4. P. 856–865. In this case, the screen displays the corresponding [4] Shreya Kamani, Neel Vasa, Kriti Srivastava, distances. Virtual trial room using Augmented Reality. User has the opportunity to explore process of International journal of advanced computer building the image, check the thin of the lens, user technology (2014) Vol. 3, No. 6. P. 98-102. can determine the increase of the resulting image. [5] A.M. et al. EcoMOBILE: Integrating 2. Conclusion augmented reality and probeware with So, the augmented reality plays an important role environmental education field trips. Computers & in education sphere. This technology in the segment Education. (2013) Vol. 68. P. 545-556. of education can be regarded as an auxiliary tool for [6] Matsutomo, S., Miyauchi, T., Noguchi, S., & learning specific knowledge, skills and abilities. Yamashita, H. Real-Time Visualization System of Augmented reality is a new way of representing and Magnetic Field Utilizing Augmented Reality presenting information and it can be used across the Technology for Education. IEEE Transactions on full spectrum disciplines. With this technology Magnetics. (2012) P.5 people can make new interactive training aids, [7] Chen, Y.-C. A study of comparing the use of virtual stands. Augmented reality opens up a new augmented reality and physical models in chemistry approach to learning and raise education to a whole education. Proceedings of the 2006 ACM new level. international conference on Virtual reality The work was supported by the “КН МОН РК” continuum and its applications (2006) P.6 program grant funding for research on 2015-2017, [8] Kaufmann H., & Schmalstieg D. Mathematics grant “2622/ГФ4”, reg.№ 20150115РК01145. and geometry education with collaborative augmented reality. Computers and Graphics (2003) 3. References 27 (3), 7. P.6 [1] Milgram P., Kishino A. F. Taxonomy of [9] N.N. Zilberman, V.A. Serbin. Augmented Mixed Reality Visual Displays. IEICE Transactions Reality Applications Possibilities In Education. on Information and Systems. (1994) E77-D(12). P. National Research Tomsk State University. P.6 1321–1329. [10] http://schoolinthepark.net/ p.11 [2] Ye.A. Daineko, G.K. Zhanabay, S. Serikov. Using the Augmented Reality technologies in

Применение технологий дополненной реальности для изучения оптических явлений

ЕА. Дайнеко, М.Т. Ипалакова, С.С. Сериков, И.К. Касым

Международный Университет Информационных Технологий, Кафедра Компьютерной Инженерии и Телекоммуникации, ул. Манаса / Жандосова 34 «А»/8 «А», Алматы 050040, Казахстан

Рассмотрено использование технологий дополненной реальности для изучения оптических явлений. Приводится обзор существующих решений в области разработки программ с использованием технологии дополненной реальности. Представлено разработанное авторами приложение для изучения оптических свойств собирающей линзы. Показано, что процесс обучения с использованием подобных технологий может быть более живыми и интересными.

136

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Оптикалық құбылыстарды уйренуде арнайы технологияларды қолдану

ЕА. Дайнеко, М.Т. Ипалакова, С.С. Сериков, И.К. Касым

Компьютерлік инженерия және телекоммуникация кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. 05004., Алматы 050040, Қазақстан

Оптикалық құбылыстарды уйренуде арнайы технологияларды қолдану мәжелесі қарастылды. Осы мақсатта нақты технологияларды қолданған кәзіргі таңда іске асырылып жүрген бағдарламалардың нәтижелері бойынша шолу жасалды. Жинақтау линзаларынын оптикалық қасиеттерін оқып-үйренү үшін жасалған авторлардың еңбектері ұсынылды. Оқыту үдерісінде аталған, ұсынылып отырған технологияларды қолдану әлдеқайда шынайы әрі қызықты болатындығын көрсетті.

Technique Choice the Reliability Models of Software for Space Applications

Yes. Ismail

Institute of Space Technique and Technology, Laboratory of technical regulation in the field of space activities, 34 Kislovodskaja Str., Almaty 050063, Kazakhstan

The approach the choice of model for estimation the reliability of the software for space applications on the basis of the formation of a core set of models and their aggregation. The criteria and requirements for the choice of the software reliability models grounded. Developed procedures for choice a core set of software reliability models and their aggregation.

1. Introduction - for most models there are no objective, To estimate the performance of software confirmed data on the accuracy and reliability of reliability and predicting their changes over time, the assessment of reliability; it is generally used various models reliability. - existing at a given time models do not Software reliability model (SWRM) should guarantee a reliable assessment of software take into account the characteristics and reliability; properties of both the software and the process of - the actual use of models in practice presents its development and operation. a certain difficulty because of the complexity and Although there are currently a large number cumbersome mathematical calculations of of SWRM, the choice of an adequate model for reliability metrics; the practical estimation of the reliability of - there are no clear and reasonable criteria for particular software is a complex and problematic the comparison of models; task. The main reasons for the problematic - the choice of adequate SWRM is difficult, solution of the problem SWRM choice are as due to the lack of quality data on the statistics of follows: defects, this is particularly true for the unique - the presence of a sufficiently large number software systems or software systems with a of SWRM, for which there are no complete and small circulation, which include critical software clear description of the characteristics and that are important for the safety of nuclear power recommendations on the application, so that there plants, space systems, etc. is a high degree of uncertainty regarding the In this regard, at the moment it is very assumptions, input and output parameters; problematic to solve the problems of choosing - at this time there is no one universal model the optimal SWRM, so we can only speak about that would systematically showed the best results some formalized approaches to the choice of the for a variety of software systems; most suitable models. - the assumption of some models not take sufficient account of the realities of the 2. The approaches, criteria and requirements development process, testing and operation of for the choice of SWRM modern software; Possible approaches to the choice of SWRM:

137

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

1) selection based on expert evaluation When choosing SWRM, consider the method (with the use of these models in other following requirements: projects, expert opinions, etc.); 1) the description of the model and conditions 2) the selection of a fixed number of models of use must be complete and understandable; on the basis of their specific conformity 2) the model should allow to take into assessment criteria and requirements. account the specific conditions of the software The first approach because of its subjectivity operation; and other well-known drawbacks are not 3) the model should allow to assess the acceptable to assess software reliability space reliability at all phases of the software life cycle; applications, which have to meet high demands 4) the model should use the test results and on the reliability and accuracy of its estimation. operating experience; For the second approach to the selection of 5) the model must take into account the suitable models is necessary to define the criteria, possible uncertainty; requirements and procedure of choice. 6) model should be verified and validated; Criteria for choosing the models can be both 7) the model must be able to assess the qualitative and quantitative. parameters that can be used to identify the causes As the qualitative criteria the following can of software failure; be chosen [1]: 8) the model choice should be made from the 1) simplicity of the model use (clarity, original fixed set of SWRM. simplicity, and ease of preparation, and ensure representation of the input data, the use of a 3. The technique SWRM choice priori information, etc.); To ensure the targeted choice of SWRM is 2) the quality of the models assumptions (e.g. necessary to systematize assumptions, input and reasonableness, veracity, clarity and accuracy); output parameters and assumptions to build a 3) validity: capacity of the model to hierarchical tree (classification scheme) for the reasonably estimate software reliability metrics; initial fixed set of models [3]. 4) the degree of applicability of the model: Choice of SWRM should be divided into determined the possibility to obtain the preliminary and final stages. evaluation by a predetermined range of The main objective of the preliminary stage is reliability, the possibility of applying a variety of the choice of the base set of models that can be software products; used to assess the reliability of the specified 5) simplicity of implementation of the model, software. including the possibility to automate the Preselecting SWRM includes the following evaluation process on the basis of known procedures: mathematical packages and libraries, the 1) the formation of criteria, requirements and complexity of the model refinement. initial conditions to choose SWRM; The following can be used as quantitative 2) the choice of the classification scheme criteria: SWRM; 1) performance of the accuracy estimation; 3) the choice of the classification 2) prediction of quality parameters characteristic and subgroups models, meeting the (convergence, stability and prediction accuracy, requirements of claim 1, i.e., which are suitable consistency); SWRM; 3) information criteria comparing the quality 4) the restriction of the number of models of the models (the dimension criteria BIC based on the analysis assumptions, the (Baesian information criterion) / AIC (Akaike mathematical formalism, input and output information criterion) [2]; parameters; 4) combined and integrated parameters, for 5) the choice of a core set of reliability example, estimation models that can be applied to the test K software. IC  max kii, As a rule, the basic set contains a small i1 amount of SWRM. where ki - weighting coefficient of i-th properties At the final stage it is necessary from the of the model, chosen by the expert; χi - basic set SWRM to select one or more models for characteristic function of the i-th property. use in assessing the reliability of the test software.

138

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

In this connection there arises the task of 1) of the basic set of SWRM is necessary to choice from the most appropriate set of models select the model, deviations in the projections (acceptable). To assess the adequacy of the which tend to exclude each other; model can be used the known agreement 2) using a special test to assess the reliability statistical criteria. Moreover, for each specific of the test object with the use of each model case it may be used one or more criteria. separately; The most common and proven in practice they 3) based on the results of the previous step, to are the following consent of the criteria: establish certain criteria for significance - Kolmogorov-Smirnov; (weighting coefficients) for selected models and - criterion 2; their combination to form the basis of models for - the criterion of minimum total square the implementation of the final predictions deviation. reliability. If necessary, the criteria given permission list The weighting coefficients may be static or may be extended. dynamic. By comparison, separately for each of these Calculations based on the reliability of each criteria, models, estimates, included in the basic model included in the combination, are set, it is necessary to determine the rating of each performed independently from each other, SWRM, i.e. the place that it occupies among the therefore they do not become complicated, and at other models of the analyzed set. the same time can improve the prediction For an integrated assessment using several accuracy. criteria consent is needed to calculate the total 4. Conclusions score and choose the SWRM, for which the total The proposed approach makes it possible in value will be the highest rating. the absence of universal SWRM rationally solve The total rating of the i-th SWRM on all the problem of software reliability estimation criteria used will be calculated as follows: based on the formation of a core set of models n and their aggregation. Ri   j Rij , It is possible to make the following j1 recommendations for choosing SWRM: where  - the weighting coefficient j-th - preference should be given to models which j take into account the complexity of the criterion; Rij - rating i-th model at j-th criterion. architecture and software test coverage passed Then, the value of the total rating you need to verification and validation; select one or more SWRM to assess the - to assess the reliability of critical software, reliability of the test software. such as software for space purposes, for nuclear If the initial criteria and requirements not power plants, etc., SWRM should only be used in fully meet the existing model, it is necessary to combination with other methods, such as analyze the assumptions, eliminate or reduce inspections and reviews, of non-essential for some features. analysis software, static analysis code, tools for For example, the model can be compared to modeling and assessment of the reliability of the the same time intervals and data about failures. software and others. Then repeat the model of the choice procedure. 5. References This process can generally be iterative. [1] Software Reliability Theory /Michael Because take into account all features of the Rung-Tsong Lyu, The Chinese University of software, as well as the process of its Hong Kong Encyclopedia of Software development and operation is extremely difficult Engineering. – 2002. in a SWRM, it seems appropriate to use to assess [2] Karanta I. Methods and problems of the reliability of a combination of several models software reliability estimation. - VTT Technical targeted at different stages of software and Research Centre of Finland 1459-7683. - WP 63, different input data lifecycle. It is known that 2006. 57 p. linear combinations of the simulation results, [3] Kharchenko V. S. The Method of even in its simplest form provide more accurate Software Reliability Growth Models Choice predictions than each individually model [4]. Using Assumptions Matrix / V. S. Kharchenko, This approach, which is also called O. M. Tarasyuk, V.V. Sklyar et al. // Proc. of aggregation in models can be implemented by 26th Annual Int. Computer Software and performing the following procedures:

139

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Applications Conference (COMPSAC). – The Equally-Weighted Linear Combination Oxford, England, 2002. – Р. 541-546. Model, Proceedings of the 2nd International [4] M.R. Lyu and A. Nikora, A Heuristic Symposium on Software Reliability Engineering, Approach for Software Reliability Prediction: May 1991, pp.172–181.

Методика выбора моделей оценки надежности для программных средств космического назначения

Е.Е. Исмаил

Институт космической техники и технологий, Лаборатория технического регулирования в сфере космической деятельности, Казахстан, 050063, Алматы, ул. Кисловодская, 34

Предложен подход к выбору модели оценки надежности ПС на основе формирования базового набора моделей и их комплексирования. Обоснованы критерии и требования выбора модели надежности. Разработаны процедуры выбора базового набора моделей надежности и их комплексирования.

Ғарыш саласына арналған бағдарламалық құралдарының сенімділігін бағалау модельдерді тандау әдістемесі

Е.Е. Исмаил

Ғарыш техникасы және технологиялар институты, Ғарыш саласында техникалық реттеу лабораториясы, Қазақстан, 050063, Алматы, Кисловодская көш., 34

Негізгі модельдер жиынтығы және олардың агрегаттық қалыптастыру негізінде бағдарламалық құралдарының сенімділігін бағалау модельдерін таңдау үшін тәсіл ұсынылған. Сенімділік моделін таңдау үшін критерийлері мен талаптар негізделген. Негізгі сенімділік модельдер жиынтығын таңдау және олардың агрегациялау процедуралары әзірленген.

The determination of position and moment of lightning discharge on the base of three stations data

Yu.Shpadi., A.Inchin, P.Inchin , A.Lozbin

Institute of Space Techniques and Technologies 34,Kislovodskaya Str., Almaty050063, Kazakhstan

The problem of calculation of the position and the moment of time of cloud-ground type lightning discharge using sensors of system of three monitoring stations is considered. In the framework of spherical model of the Earth, the conditions of the possibility of solvability of the problems and the complete solution of it were found.

1.Localization of lightning problem statement Let in moment of time ts in the point Ps(,) s s Let Pi(,) i i , i 1,2,3 –three points on the there is a lightning discharge. Supposing that the Earth surface with longitude and latitude , radio signal approaches each of the station by i i shortest pathsalong Earth surface, we get a system of where stations which register moment ti of three equations for the determination of the position reception of LF radio signals from lightning and moment of time of lightning discharge discharges, are located. Let suppose, that all stations PP c() t t , i 1,2,3 (1) are located outside the same circumference of wide i s s i s Earth circle (the central circle).

140

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

i  2,3 (7) where c – the speed of radio wave, PP – the s is From (5) and (7) follows distance of the shortest arc of central circumference 0 ac(8) of Earth sphere which connects points P и P . ii11 i s Under the preceding hypothesis (8), hyperbole on the sphere are closure curves and matches with Let introduce unit vectors rix i,, y i z iand ellipses. Indeed, applying identity law rsx s,, y s z svector hodographs of points arccos(xx )  arccos(  ), 11 x  ,last two equations in (6)can be written as Pi(,) i i and Ps(,) s s . Then arccos(r11 rs )  arccos( rˆ i  r s )   2a i , PPRi s earccos(rr i s ) and the system of equations rrˆii , (9) (1) can be given rise to unit sphere Each equation in (9) satisfies the definition of arccos(rri s ) C R ( t i  t s ) , ellipse on the sphere. Focal lengths of ellipses (9)  CR c s/ R e , i 1,2,3 (2) are equal to ccii11, semi-major axis System of equations (2) has three unknown 2  quantities –coordinates s ,s and time ts of aaii11. lightning discharge and it is fully defined. The 2 solution of the system can be found in the domain  2. Parameterization of spherical hyperbola   s   ,    , 22s Let find parametric equation of hyperbola given by the second equation of the system (6). Let  Re maxti  t s  min t i (3) construct an orthogonal coordinates system which is i1,2,3 c i1,2,3 s connected with vector r and surface  , which where the range of values of time of lightning 1 2 discharge (last inequality) is correct, if registered define through vectors r2 and r1 .Coordinate system moments t fulfil a condition i includes vector r1 and unit vectors  R r r r r e 2 1 2 1 maxttii min (4) rn2  i1,2,3 i1,2,3 rr sin 2c cs 2 1 21 rrcos 2c  For spherical triangle with corners P , P and 1 21 2 i j r 2 rn 2  r 1  (10) sin 2c21 Ps the absolute value of difference of two sides is less than the length of third side. This implies that Vectors r1 , rn2 , r 2 , chosen in the mentioned for solvability of the system (1) the fulfillment of order, define a right-hand system of orthonormal inequality is necessary vectors. Vector rn2 is a normal to the plane 2 C t t arccos(rr  ) , ij (5) R i j i j and vectors r2 , r1 и r 2 belong to this surface.

Let tt12 и tt13 . Let put the system of Let define semiplane 2 , coming out from vector equation (2) in a form (6) r1 and which rotates around it. In every position  arccos(rr11s ) C R ( t  t s ),  has one and only one point of intersection with arccos(r2 rs )  arccos( r 1  r s ) C R ( t 2  t 1 ), hyperbola. Unitradius-vectorofthispoint  arccos(r r )  arccos( r  r ) C ( t  t ). rs2 r 1cos 2 r 2 sin 2  3s 1 s R 3 1 0 2 (11) Geometrically, the second and the third equations (6) define hyperbole on unit sphere with universal Vector r 2 in (11)is a pointing vector of focus P . Focal lengths and semi-transverse axis are 1 semiplane  2 respectively equal to r rcos r sin , 02(12) 1 1 2 2 2n 2 2 2 c arccos(rr ) , a C() t t , ii112 i112 R i

141

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

should be done in order to satisfy equality (18). where – the angle between vectors r 2 and 2 In every combination of and r 2 (the angle between semiplane  2 and plane 2  3  0 (20) 2 ). Parameter 2 defines an angle between r1 and is exactly satisfied, where   arccos(rr  )(21) rs2 and which is r1 -based. 0 2 3 From (11) and (12) we get parametric equation of Sign plus in (21) should be chosen when the triple of r , r и r in this sequence is a right-hand vector rs2 (13), 1 2 3 (mixed product is positive), minus – otherwise. rsn2 r 1cos 2  r 2 sin  2 cos  2  r 2 sin  2 sin  2 Using (14) and (17) we can excludeparameter  3 In order to get a connection of  from , 2 2 from the equation (19) using (20). As a results, we insert (13) into second equation of the system (6). get the equation depending on After the sequence of identity substitutions, we get 2 sin 2ac sin 2 cos( ) sin 2ac21 sin 2 21 cos 2 31 31 2 0 . sin 2ac21 sin 2 21 cos 2  2  arcctg, cos 2a21 cos 2 c 21 cos 2 a 31 cos 2 c 31 cos 2ac cos 2 21 21 (22)

022 (14) After identity substitutions, the equation(22) can The denominator of arctg in (14) is strictly be written as positive, taking into account (8). By calculating (14) ABCsin22 cos , of extremum of arctg, we specify the range of where definition  : sin 2c sin 2 A  31 0 , cos 2ac31 cos 2 31 0cij  a ij     ( c ij  a ij )   (15) sin 2c cos sin 2c B 31 0 21 , cos 2a cos 2 c cos 2 a cos 2 c 3. Solving of the system of equations (6) 31 31 21 21 In the same was, we can write parametric sin 2a sin 2a C 31 21 . equation (16) of the third equation of the system (6) cos 2a31 cos 2 c 31 cos 2 a 21 cos 2 c 21 rsn3 r 1cos 3  r 3 sin  3 cos  3  r 3 sin  3 sin  3 , A Supposing that cos  , 22 Where vector r1 and vectors AB rrcos 2c  rr31 1 31 3 B r  andr 3  n3 sin 2c sin 2c sin  31 31 AB22 makes right-hand coordinates system. Angle 3 we get an equation (23) , C defines the rotation of semiplane  3 , which sin2     AB22 arranges the same way as  2 , from vector r1 . Depending on the value of  , there might be three cases: Angle 3 between and rs3 defines by the equation sin 2ac sin 2 cos 1) 1.Hyperbole of second and third   arcctg 31 31 3 (17) 3 equations (6) intersects in two points cos 2ac31 cos 2 31    (  1)k arcsin   k  2 , k  0,1 In the point of lightning discharge, vectors rs2 2)   1. Hyperbole have one common point and coincide,  rr (18) 2    , ss23 2

The adjustment of semiplanes и  3 and the 3) 1.The problem of determination of equality of angles position of lightning does not have solutions.

23 (19) Moments of discharge of lightning can be found from first equation of the system (6).

142

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

In the test calculation, next physical constants 4. Conclusion were used:speed of radiowave propagation– To the lightning discharge, as to the natural 299792.458 km/s,average Earth radius – 6371.308 phenomenon, only one point from the solution of the km. problem points can match. The second point is a mathematical results of the intersection of two Table 1. Positioning of monitoring stations and closed convex curves, covering each other. moment of the registration of lightning Thus, if the system of monitoring of lightning Area Longitude of Latitude of Time, ns station, ˚ station, ˚ discharges consists of only three station, there is an Almaty 76.92848 43.25654 3236010 redundancy of the solution. For its elimination, there Taldy-Kurgan 78.36667 45.01667 2872390 should be additional stations [1] or the use of Kapchagay 77.06304 43.86681 3049610 equipment for registration of direction to the source of lightning [2], besides the time of reception of the As a result of the solution, two point of lightning radio wave. discharge with different time of discharge were This work was supported by grant 0100/GF4 of found. Ministry of Education and Science of the Republic of Kazakhstan, the development of lightning Table 2. The results of calculation detection system for reseach of atmospheric # of Longitude of Latitude of Moment of solution lightning, ˚ lightning, ˚ lightning currency, lithosphere-ionosphere interconnection, as discharge, sec well applications connected with thunderstorm 1 77.0000030 50.999975 0.0 activity for energetics, meteorologyand emergency 2 78.2293052 44.4711265 0.002666825 services. 6. References 5. Example of calculation [1] Koshak, W.J. and Solakiewicz, R.J. (2001) In demonstration example, three stations of TOA Lightning Location Retrieval on Spherical and monitoring were chosen, which are in Almaty, Oblate Spheroidal Earth Geometries. Journal of Taldy-Kurgan and Kapchagay (The Republic of Atmospheric and Oceanic Technology, 18, 187-199. Kazakhstan) on probation. The moments of [2] Kuterin, F.A., Bulatov, A.A. and Shlyugaev, registration of lightning discharge by the stations Yu.V. (2014) The Development of the Lightning were preliminarily calculated on the hypothesis that Detection Network Based on BoltekStormTracker the lightning discharge occurred in Astana Hardware. XV (longitude 71.0˚, latitude 51.0˚);zero was chosen as International Conference on Atmospheric an initial point of time measurements. Initial data is Electricity, Norman, 15-20 June 2014, pp. 71-74. presented in Table 1. TheresultsofcalculationareintheTable 2.

Метод треугольников для определения положения и времени молниевого разряда в модели сферической Земли

Ю.Р.Шпади, А.С.Инчин, П.А. Инчин, А.Ю.Лозбин

Институт космической техники и технологии, Республика Казахстан, 050063, г.Алматы, ул.Кисловодская, 34

Представлена сферическая модель расчёта местоположения и времени молниевого разряда с помощью регистрации радиосигналов датчиками распределённой сети наблюдательных станций. Построено полное решение задачи локации молниевых разрядов типа облако-земля для трёх станций. На основе этой задачи разработан метод локации молнии для сети станций. С помощью вычислительных экспериментов выполнен анализ точности модели в зависимости от точности фиксации радиосигналов наблюдательными станциями.

Cфералық Жер үлгісінде найзағай разрядының уақыты мен орнын анықтау үшін үшбұрыштар әдісі

Ю.Р.Шпади, А.С.Инчин, П.А. Инчин, А.Ю.Лозбин

143

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Ғарыштық техника және технологиялар институты, Қазақстан Республикасы, 050063, Алматы қаласы, Кисловодская көшесі, 34

Бақылау станциялар желілеріне датчиктермен бөлінген радиосигналдарды тіркеу арқылы найзағай разрядының уақыты мен тұрған орны есебінің сфералық үлгісі ұсынылады. Үш станцияға арналған бұлт- жер түріндегі найзағай разрядтарын локациялау міндеттерінің толықтай шешімі құрылған. Осы шешімдер негізінде станция желілері үшін найзағай локация әдісі құрылды. Есептеу эксперименттері арқылы бақылау станцияларының радиосигналдарды тіркеу дәлдігіне байланысты үлгінің дәлдік талдамасы орындалды.

The use of virtual laboratories in the study of physics

Zh.Zh. Bolatov, M.A. Brodyagina, Ye.A. Daineko, M.T. Ipalakova, B.S. Omarov, M.V. Yunnikova

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

In the article application of information technologies in educational process by the example of virtual laboratory works is considered. The virtual physical laboratory is developed by authors taking into account requirements of the education system of the Republic of Kazakhstan. It is shown that the introduction of modern information technologies along with traditional forms of education, will improve the training of graduates of higher educational institutions. Keywords: virtual laboratory work, innovative methods of education, information technology, physics.

1. Introduction application for the solution of various Nowadays the rapid development of information computational, qualitative and experimental technology leads to the fact that they steadily problems. If on lectures students are introduced with penetrate into all spheres of our lives, cardinally theoretical questions, the laboratory studies allow influencing the processes and changing them. applying theory, and, moreover, form the practical Education in general and the higher education in skills in conducting physical measurements in the particular are not an exception. Introduction of new processing and presentation of results. information technologies, along with a High-quality performance and successful defense computerization of educational institutions and of results of students’ laboratory works are innovative activity of teaching staff of higher impossible without independent preliminary educational institutions, are the main directions of preparation for laboratory classes. In the process of complex modernization of education to which the preparation for the next lesson, first of all, it is special attention not only in Kazakhstan, but also necessary to study the description of the performed around the world is paid [1, 2]. work using manual. However, it cannot be limited The use of innovative teaching methods and new only as a theoretical introduction to each work, approaches of interaction between students and because it cannot be considered as a sufficient teachers leads to updating of the educational minimum for deep understanding of physical bases process. There is a great interest in the use of the of work. Therefore, it is necessary to read computer training systems, which according to [3] supplementary materials to each laboratory work should help to master new materials, to carry out using books. It is impossible to get to the laboratory control of knowledge and to help preparing training work without mastering of its basic theoretical materials. Among them, it is possible to name the positions, without having realized logic of the automated manuals, library systems, the multimedia measurement procedures, without being able to use training systems or training simulators, and others. the measuring devices related to this work. Getting started, students have to understand firmly the 2. Virtual Physical Laboratory purpose of the work, the general plan of the work, Deep mastering of physics is possible by i.e. sequence of actions during the measurements. It studying the theory and in the process of its is the main basis to approach the work during

144

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

interview with the teacher at the beginning of consider its small details. At the end of each classes. laboratory work the questions for self-testing and To provide a high quality and mobile education training on the passed material with short comments at the International Information Technology are provided. The feature with questions allows University the innovative project on training of intensifying the process of mastering the educational students – a virtual computer laboratory on physics material, making it interactive and helping with is developed and implemented (Fig. 1). The project preparation for exams, midterms and end terms. consists of six main parts from such sections of The results of measurements students make in the physics like “Mechanics”, “Molecular Physics”, form of a brief report. The virtual laboratory “Electricity and Magnetism” and “Atomic physics”. provides samples of the report. The samples show exactly which tables, graphs and calculations are required in the report. Reports must contain the conclusions that students can do based on the obtained results. If necessary, students have privileges to change the form of the report, for maximum clarity of presentation of the results. During processing of the measurements results, it is necessary to pay attention to the calculation of measurement uncertainty and critical analysis of the received results, which has to be presented in conclusions. The reports representation and their defense are the basis to evaluate each laboratory work on the Figure 1 – Fragment of virtual computer laboratory “Physics” subject. on discipline of “Physics” 3. Conclusion The virtual computer laboratory provides Thus, during introduction of modern multimedia instructions and guidelines for the implementation of tools in educational process, along with development the laboratory works that are constructed in the of new technologies by future experts, it is necessary following form: the aim of the work, theoretical by means of information and telecommunication material, experimental installation, the order of the technologies to strengthen training of specialists of work performance and report. Moreover, laboratory the natural-science majors, based on knowledge and works contain the tests that include the assessment understanding of the fundamental physical of the basic knowledge required for the successful processes. execution of the works. The final test in the The work was supported by the SC for the MES computer laboratory allows controlling the residual program grant research funding for 2015, Grant knowledge of the results of the laboratory work 2622 / ГФ4, Identification No 20150115РК01145 performance. The theoretical material in this virtual laboratory 4. References is presented in electronic textbook form. Thus, the [1] Daineko Ye.A., Ipalakova M.T., Dmitriyev material is provided in the form of hypertext that V.G., Rakhimzhanova N.K., Giyenko A.D. The contains visual and dynamic graphic objects, links application of virtual instrumentation to study and tips, animation tools, reference data. This form physics // The 13th International Conference of representation helps students to extend the «Information Technologies and Management», April capabilities for answering on different questions. 16-17, 2015, Riga, Latvia. – P. 118-119. The structure of the virtual laboratory work [2] Yevgeniya A. Daineko, Madina T. includes a structured description of the technical Ipalakova, Viktor G. Dmitriyev Andrey D. Giyenko, facilities, which are located inside the graphic and Nazgul K. Rakhimzhanova. The use of virtual illustrations (photographs, diagrams and pictures), laboratory works at the teaching of natural sciences th hyperlinks with graphic illustration of a similar type, subjects // Proceedings of the 19 International video, audio clips and animations. To increase the Conference on Computers, July 16-20, 2015, efficiency of educational material perception the Zakynthos Island, Greece. – P. 340-342. special processing methods, such as flash-animation [3] Yevgeniya Daineko, Madina Ipalakova, are used, which allows observing the experimental Viktor Dmitriyev, Andrey Giyenko, Nazgul installation in general and having an opportunity to Rakhimzhanova. 3D Physics Virtual Laboratory as

145

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

a Teaching Platform // Second International 2015, Lecce, Italy. Proceedings. P. 458-466 Conference, AVR 2015, August 31 - September 3,

Применение виртуальных лабораторных работ в изучении физики

Ж.Ж. Болатов, М.А. Бродягина, Е.А. Дайнеко, М.Т. Ипалакова, Б.С. Омаров, М.В. Юнникова

Международный Университет Информационных Технологий, Кафедра «Компьютерной инженерии и Телекоммуникаций», 34 «А»/8 «А» ул. Манаса./Жандосова., Алматы 050040, Казахстан

В статье рассматривается применение информационных технологий в образовательном процессе на примере виртуальных лабораторных работ. Представлена виртуальная физическая лаборатория, разработанная авторами с учетом требований системы образования Республики Казахстан. Показано, что внедрение современных информационных технологий наряду с традиционными формами обучения, позволит повысить подготовку выпускников высших учебных заведений. Ключевые слова: виртуальные лабораторные работы, инновационные методы обучения, информационные технологии, физика.

Виртуалды зертханалық жұмыстарды физика пәнін оқытуда қолдану

Ж.Ж. Болатов, М.А. Бродягина, Е.А. Дайнеко, М.Т. Ипалакова, Б.С. Омаров, М.В. Юнникова

Халықаралык ақпараттық технологиялар университеті, Компьютерлік инженерия және телекоммуникация кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. қиылысы, Алматы, 050040, Қазақстан

Мақалада ақпараттық технологияларды білім беру үрдісінде қолдану қарастырылады. Мысал ретінде виртуалды зертханалық жұмыс алында. Жұмыста, авторлардың ҚР білім беру жүйесі талаптарын ескере отырып әзірлеген виртуалды физикалық зертханасы ұсынылған. Тәжірибелер көрсеткендей, білім берудің дәстүрлі формаларымен қатар заманауи ақпараттық технологияларды ендіру жоғары оқу орнын бітірушілердің білім деңгейін жоғарылатыуға мүмкіндік береді.

Application and functional capabilities of GIS technology

Ordabekova A. Zh., Imanbekova T.D.

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

The article presents the analysis and functionality of using the Geographic Information Systems (GIS). Using these systems user can optimize the experience with a jig attached information and allows to monitor the changes in the state of the objects under study. tools to work with geographically linked information, in 1. Introduction example, any coordinate-bound information. Currently, an objective necessity in many industrial Using a spatial reference the restrictions can be enterprises is to work with spatial data, which require removed, imposed on the spatial model of "normal" the use of special processing technologies. databases in solving information systems problems. At Geographical Information System (GIS) – the same time managing objects linked to the map is at information system, including data bases and analytical the level of imitation modeling.

146

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan Any GIS is based on the use of digital maps. For the GIS has a relationship with many types of software. exchange of graphical information between the graphics Such systems include ARC / INFO, MINE-SCAPE, modules of the system requires a single format SPANS, Genamap, Surpac2, TerraSoft and others. exchange standard. If necessary, the use of spatial data To use GIS when working with large data necessary that was created in another system, there is possibility to create the necessary modules. So, currently to transfer information from one format to another. distributed version GeoDraw / GeoGraf contain module One of the advantages of GIS is a map visualization for building curved surface on a regular grid measuring feature of research results and conducting spatial its coordinates. analysis. To carry out these functions requires a digital GIS software packages have been successfully used basis. The e-card can be used as a base. It is a tool of in the preparation of various land registries, making modern GIS, which allows you to create, maintain and economic decisions on environmental management, expand the number of objects that are anchored to the nature conservation, for the analysis of various map. In many systems, it also allows you to control the geographically-referenced information. "spatial" situation and analyze it. Figure 2 shows the characteristics of the input A distinctive feature of the GIS standard graphics information during the formation of the urban cadastre. packages are improved graphics capabilities. This is an intelligent interface that allows you to place objects on maps and plans. This facilitates the work with records and database references. When working with GIS, there are two approaches of processing image information:  Formation of requests for objects with certain properties.  Highlight the on-screen images of objects. This information is organized in a database (DB). Thus, the basic GIS functions include: Perform a variety of queries to the database, identification of objects on the spatial position; Ability to update the database; Ability to carry out spatial analysis. Modern GIS allows you to read and store data in standard graphical and character formats. Below is a scheme for the exchange of spatial information [1]. Depending on the structure used by the software are different:  Instrumental GIS;  System of “viewing” graphical information;  Reference mapping systems;  Specialized tools of spatial modeling; Figure 2 – The external environment forming the  Processing means of remote sensing data. urban cadastre

The purpose of GIS software products are: 1. Creating and editing of digital maps, plans, electronic atlases, thematic mapping. 2. Graphical modeling, analysis and representation of surfaces. 3. Creation of digital maps. 4. Creating a GIS background. 5. Forecasting oil and gas and other mineral resources, control of field development. 6. Environmental monitoring, environmental impact assessment. 7. Geoecology, geology, inventory development. 8. Informational computer atlas of a region. These software use the PC platform, DOS, Figure 1. Functional Scheme of GIS Windows. The simplest form of query - receiving

147

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan characteristics of an object by pointing at it with the Thus, the above analysis supports the use of cursor and reverse operation. All GIS include modules geographic information systems data for modeling and convert external data formats, tools of import/ export of analysis of various geographically referenced the most common vector and raster graphics file information. This article describes the basic formats. functionality of GIS technology, the use of which is Thus, when using a GIS in any process control dictated by the need of today's time. system being monitored for change of state of these objects. Also, each object has a static and dynamic References parameters. To work effectively with the graphic [1] Шек В.М. Объектно-ориентированное (spatial) data and rapid adaptation to any algorithm, you моделирование горнопромышленных систем. must create a library of specialized programs that Учебное пособие.-М.:Издательство Московского implement these methods. Used maps, plans, sections, государственного горного университета, 2000.-304с. displaying graphical information may change over time. [2] Ордабекова А.Ж., Габжалилова С.М. Then these documents are filled up, making the Геометрическое моделирование necessary changes for a certain period of time. A new геоинформационныхобъектов. Труды document is made that is bound to a different date. международной научно-практической Further, these documents can be called up at the same конференции: «Информационные и time, to carry out geometric constructions (finding the телекоммуникационные технологии: образование, intersection figures summarize and others.). наука, практика». Алматы 2012. - Стр.390-393. All this indicates rationality of GIS use with dynamically changing objects.

Применение и функциональные возможности ГИС-технологий

Ордабекова А. Ж., Иманбекова Т.Д.

Международный Университет Информационных Технологий, Кафедра Компьютерной Инженерии и Телекоммуникации, ул. Манаса / Жандосова 34 «А»/8 «А», Алматы 050040, Казахстан

В статье приводятся анализ и функциональные возможности применяемых геоинформационных систем (ГИС). Использование данных систем оптимизирует работу пользователей с координатно-привязанной информацией и позволит вести контроль за изменением состояния этих исследуемых объектов.

ГАЖ-технологиялардың қолданылуы және функционалдық мүкіндіктері

Ордабекова А. Ж., Иманбекова Т.Д.

Халықаралык ақпараттық технологиялар университеті, Компьютерлік инженерия және телекоммуникация кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. қиылысы, Алматы, 050040, Қазақстан

Бұл мақалада геоақпараттық жүйені (ГАЖ) талдау және функционалдық мүмкіндіктерін талдау ұсынылады. Жүйеде деректерді пайдалану координанттық-байланыстырылған ақпаратпен пайдаланушылардың жұмысын оңтайландыруға және бұл зерттелетін объектілердің күйлерінің өзгеруіне бақылау жүргізуге мүмкіндік береді.

148

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Numerical implementation of the “k − epsilon" turbulence model in Laval jet with FREEFEM++

1 1 2 NurmukanP Kaster , Bolatov Zhiger , Toleugazy Bankat

1 International Information Technology University, Computer Engemeering Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan 2Al-Farabi Kazakh National University. Faculty of Mechanical Mathematics 71 al-Farabi Ave., Almaty 050040, Kazakhstan

Turbulence plays an important role in many chemical engineering processes (fluid flow, mass and heat transfer, chemical reactions) which are dominated by convective transport technologies. In the present paper k-ε model is numerically solved in FreeFem++ programming complex. The model is based on the Reynolds Averaged Navier-Stokes (RANS) equations, which are commonly employed flow calculations. The numerical implementation of turbulence models involves many algorithmic components all of them may have a decisive influence on the quality of simulation. The numerical solution of gas flow through the Laval jet was realized on the FreeFem++.

1. Basic equations The numerical implementation of the k-ε model is probably the most successful model of the turbulence of the first level circuit. To describe the turbulent variables it uses a system of four nonlinear equations - for a mass density of turbulent energy k and the rate of turbulent energy dissipation ε. The simplest version of this model appeared more than thirty years ago [1]. Since k-ε model is widely used Figure 1 (A). Kinetic energy at 2th second for calculating a large variety of applications, mainly for the description of non-compressible shear turbulence we were pleased to use the packet of FreeFem++ [2] and basic equations are as (Figures 1) follows:

Figure 1 (B). The dissipation energy at 2th second

th ,where K - Figure 1 (C). Vector velocity and pressure at 2 turbulent kinetic energy, ε - dissipation rate of second kinetic energy.

2. Analytical processing with FreeFem++

149

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

describe a sufficiently broad class of incompressible turbulent flows. Estimates are done with empirical constants by examining the analytical solutions of the equations k-ε fashion-whether for a number of specific individual cases.

Figure 2 (A). Kinetic energy at 3th second

Figure 2 (C). Vector velocity and pressure at 3th second

th 4. Acknowledge Figure 2 (B). The dissipation energy at 3 second At this moment we greet thanks for our leader Professor Sandybek Kunakov who has much passion In our case Figure 1 shows at 2th second, Figure 2 th on new technique. He organizing the team and point shows at 3 second of the flows phenomena. We out the new idea. We got great support from him all trying to experiment mainly both the kinetic energy the time, Sometime even he has push us give the (show in figures A) and the energy of dissipation right direction and avoid us losing research target, (show in figures B), which is how influenced to without his support we can’t do this work. pressure and vector velocity (show in figures C) in the dynamic flow. In other word, whatever happen 5. References the place where is has kinetic energy or dissipation [1] D. Kuzmin and O. Mierka. On the energy which is the first place happen eddy flow. implementation of the k-ε turbulence model in incompressible flow solvers based on a finite 3. Conclusion element discretization, IJCSM, 2/3/4, 193-206, 2007. In the article, carried out to discuss the choice of [2] F.Hecht, O.Piro A.Le Hyaric, K.Oh. FreeFem++ empirical constants k-ε model on the bases of Third Edition, p.58- FreeFem++ programming complex and evaluate the possibility and measure of accuracy in attempt to

“K − epsilon" моделін Лавал Түтікшесінде FREEFEM++ пен есептеу

Нұрмұқан Қастер1, Болатов Жигер1, Толеугазы Банкат2

1 Халықаралык ақпараттық технологиялар университеті, Компьютерлік инженерия және телекоммуникация кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. қиылысы, Алматы, 050040, Қазақстан

Толқын заңдылығы химия өнеркәсібінде (сұйықтық ағысы, массасы және жылу энергиясының алмасуы, химиялық реакциялар) өте маңызды рөл атқарады. Әрі осы қасиеттері конвективті өзара алмасу технологиясының басым саласына жатады. Бұл жұмыста k-ε моделін сандық FreeFem++ бағдарламалау кешенінде шешу қарастырылады. Reynolds Averaged Navier-Stokes (RANS) моделі көбіне ағынды есептеулер саласында қолданылады. Толқын заңдылығының матиматикалық есептелуі оны қолдану және визуалды көрсетуде өте шешуші маңызға ие. Мақалада FreeFem++ бағдарламалық шешімдерін қолдана отырып қысымға ұшыраған газ ағысын мысалмен түсіндіреді.

150

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

Численная реализация “k − epsilon" модели турбулентности в сопле Лаваля в FREEFEM++

Нурмухан Кастер1, Болатов Жигер1, ТолеугазыP Банкат 2

1 Международный Университет Информационных Технологий, Кафедра Компьютерной Инженерии и Телекоммуникации, ул. Манаса / Жандосова 34 «А»/8 «А», Алматы 050040, Казахстан 2 Казахский Национальный Университет имени ал-Фарабт, Механико-Математический факультет, пр. Аль-Фараби 71, Алматы 050040, Казахстан.

Турбулентность играет важную роль во многих химико-технологических процессах (течения жидкости, теплообмен, химические реакции), которые в большинстве преобладают в конвективных транспортных технологиях. В настоящей работе, k-ε модель численно решена в программном комплексе FreeFem++. Модель основана системе уравнений Навье-Стокса (усредненные по Рейнольдсу уравнения Навье-Стокса), которые широко используются для расчета течений. Численная реализация моделей турбулентности включает в себя множество компонентов, все из которых могут оказывать существенное влияние на качество модели. Численное решение потока газа через сопло Лаваля было реализовано в программном комплексе FreeFem++.

Numerical implementation of shock waves on FREEFEM++

Bolatov Zhiger, Nurmukan Kaster

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

Shock wave theory was studied in literature by many authors. Scientists and engineers working on shock wave phenomena in experimental analytical and numerical aerodynamics, gas dynamics detonations, explosions physical chemistry, shock waves in condensed matter plasma, physics astro- and geophysics, biology and medicine will find essential and up-to-date results the most recent experimental techniques and a comprehensive overview of the development of the field. This article presents the numerical implementation of shock wave in gas flow through the Laval jet, which was realized on the FreeFem++.

1. Basic equations In the relevant case of the Euler equations for gas Shock Waves provides a forum for presenting dynamics in one space dimension, obtained and discussing new results in all fields where shock considering the conservation of mass, momentum and detonation phenomena play a role. The and energy and neglecting higher order effects such application of shock waves in the industrial sector as viscosity, capillarity, and thermal conductivity, has increased significantly in recent years. For traveling wave solutions propagate with a velocity example, the food processing by using shock dictated by the Rankine–Hugoniot condition. wave [1] and [2] is an interesting alternative to the Moreover, they have piecewise constant profiles usual heat treatment. This high pressure processing with a single jump point, where physical entropy better preserves the food nutrients for a lower cost in increases along the discontinuity. The persistence of energy and time. The explosion welding is another the presence of waves when also considering higher application in the industry [3]. The large energy of order effects has been considered by several authors these blast loads can also alter the physical and in different contexts. Among others, let us quote properties of some materials like the Sugi the classical [6] where the existences of shock layers wood [4] and [5]. The permeability and strength of for a model taking into account both viscosity and the wood have been showed to be improved after heat conductivity. being subjected to an underwater shock wave. These The present article fits into the strand of radiation examples are just a few among many other hydrodynamics. Specifically, we consider the classic applications. Controlling and improving the shock Euler equations and use for calculation the package waves processing has become necessary to meet the FreeFem++ [7]: industrial demands.

151

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

figures 4 seen that the shock wave gaining

momentum by time and affects on wall. By the following numerical solution of shock

wave can estimate geometrical solution of the wall to prevent negative influents on wall by shock One possibility is to couple u, p and then update waves. ρ, i.e.

2. Analytical processing with FreeFem++ Figure 4. Shock wave distribution after 3 second

3. Conclusion This paper has presented a numerical study of a fluid–structure interaction problem with a high pressure. This property is interesting because the applications of shock waves have become increasingly important in the industry field. Also numerical solution of shock waves to determine the critical conditions of initiation of different explosion regimes. To determine the critical conditions is of Figure 1. Velocity distribution after 2 second primary interest both from practical and fundamental point of view, not to mention the fact that following solutions can prevent device failure.

4. Acknowledge At this moment we greet thanks for our leader Professor Sandybek Kunakov who has much passion on new technique. He organizing the team and point out the new idea. We got great support from him all the time, Sometime even he has push us give the Figure 2. Shock wave distribution after 2 second right direction and avoid us losing research target, without his support we can’t do this work .

5. References [1] S. Iwasa, H. Maehara, M. Nishi, S. Tanaka, T. Watanabe, S. Itoh, K. Hokamoto. Food processing trials using underwater shock wave by electrical discharge, Mater. Sci. Forum, 767, 2013, p.223–228 [2] Y. Yamashita, A. Oda, H. Maehara, T. Watanabe, M. Moatamedi, S. Itoh. The numerical analysis of food processing using shock wave, Int. J. Figure 3. Velocity distribution after 3 second Multiphys., 3 (4), 2009, p.337–346.

[3] A. Mori, R. Liqun, K. Shiramoto, M. Fujita. Figure 1 and 3 describe velocity distribution on Explosive welding using underwater shock wave Laval jet after 2 and 3 second. In the same time in generated by the detonation of the detonating code, figure 2 and 4 we can observe numerical solution of Mater. Sci. Forum, 673, 2011, p.265–270. shock wave. On the right corner of picture located [4] S. Itoh. The industrial applications of underwater color map to estimate front of shock wave. On shock wave, Mater. Sci. Forum, 566, 2007, p.361– 372.

152

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

[5] S. Itoh, S. Nagano, M. Fujita, T. Takano, R. the one-dimensional shock layer, Amer. J. Math., 73 Honda, M. Ikeda. The improvement of the (2), 1951, p.256–274. permeability of wood by underwater shock wave, [7] F.Hecht, O.Piro A.Le Hyaric, K.Oh. FreeFem++ Met. Mater. Int., 4 (4), 1998, p.843–846. Third Edition, p.65-67. [6] D. Gilbarg. The existence and limit behavior of

Соққы толқыны FREEFEM++пен есептеу

Болатов Жигер , Нурмухан Кастер Халықаралық ақпараттық технологиялар университеті, Компьютерлік инженерия және телекоммуникация кафедрасы, Манас 34 «А»// Жандосов 8 «А» көш. 05004., Алматы 050040, Қазақстан

Соққы толқыны теориясы ғалымдар мен инженерлер жағынан эксперименталды және нақты көптеп зерттелген тақырып. Бұл құбылыс аэродинамикасы, газ динамикасы, жарылыс, физикалық химия салаларында көптеп кездеседі. Сонымен катар, астрофизика, геофизика, биология және медицина саласынанда да қажетті және ең жаңа эксперименталды композицияларды көптеп кездестіреміз. Бұл қысқаша шолуда соққы толқынының Лавал атымен аталған газ түтікшесінен өткендегі құбылысты FreeFem++ бағдарламалық құралы арқылы бейнелеу беріледі.

Численное решение ударных волн в FREEFEM++

Болатов Жигер, Нурмухан Кастер

Международный Университет Информационных Технологий, Кафедра Компьютерной Инженерии и Телекоммуникации, ул. Манаса / Жандосова 34 «А»/8 «А», Алматы 050040, Казахстан

Теория ударной волны была изучена многими авторами. Ученые и инженеры, работают в изучении ударно- волновых явлений в аналитической и численной аэродинамики, газовой динамики взрыва, взрывы физической химии, ударные волны в конденсированных средах плазмы, астрофизике и геофизике биологии и медицине, были изучены необходимые и современные результаты экспериментальных методов и проведен всесторонний обзор развития отрасли. В данной статье представлены численной реализации ударной волны в потоке газа через сопло Лаваля, который был реализован на FreeFem ++.

Defining a method for calculation of the score of implementation advisability of changes in existing information system

D. Tsybulin

1 International Information Technology University, Computer Engemeering Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

This article reports about defining method for calculation of the score of implementation advisability of changes requests, also there were defined scale for distribution of change requests into 1 out of 4 priority group depending on score of implementation advisability. Information that is given in this article will help experts, that work with the process of defining of implementation advisability. Also it is possible to use defined method for developing of information system with elements of learning information system that will do all the calculations.

1. Introduction information system, that they developed by In companies and in organizations, both large and themselves or that were developed by outsourced small, there is a constant changes process , this is company. Quality of information system and degree due to the fact that progress doesn’t stand still, in of compliance with need of users and tasks solved every sphere new methods and approaches are being by information system, that all impacts on the opened. At the moment most companies using quality of company’s final product. Withal

153

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

company’s success depends on the quality of the implementation advisability of change in existing company’s final product. information system, and this method should take Thereby companies have to pay more attention to into consideration data about effects and labor the change management process and for successful expenses. implementation of changes companies should plan Currently specialist of the company give expert them [1]. opinion and define change request to 1 out of 4 prior The necessity to pay special attention to change group: management process is due to fact that in fast 1. Changes with critical priority; growing companies amount of users’ needs in 2. Changes with high priority; changes are high, but changes in information 3. Changes with medium priority; systems requires resources of IT specialists as a 4. Changes with low priority. result money, that every company definitely should There were a suggestion to define method of use efficiently[2]. calculation of score of implementation advisability In order to increase efficiency it is necessary to that will use experience and knowledge of experts. analyze every change requests including analysis of In other words, now, experts give their opinion using implementation advisability because only certain their personal experience and knowledge, that means changes have to be implemented in order of if experts will leave company then knowledge of importance for company. If in company there are defining implementation advisability will be lost. In several different computer programs that work order to exclude such kind of situations, it is together to create a single information system, then necessary to define algorithm, that is used by experts implementation of change in 1 program could affect for distribution of change requests to prior group and the operation of other programs. Such kind of formalize it. influence have to be identified on the stage of business requirements preparation or on the stage of 2. Defining method for calculation of score of preparation, however on implementation advisability of change these stages analytics mostly couldn’t identify For the purpose of defining method for calculation impact of change on the business. Therefore every of score of implementation advisability of change it change request have to go not only through stage of was necessary to find out, how experts give their technical documentation preparation where will be opinion and what they take into account. identified system impact, but also stage on analysis Experts collect information about expected risks, of implementation advisability when will be effects and labor expenses. They are giving opinion identified business impact. to distribute change request to 1 of 4 prior groups It is necessary to define priority of changes, because based on information about value of effect and some changes could bring profit immediately in this information about preliminary value of labor case it is better to suspend work on some current expenses. changes and make this profitable one. Companies have to be ready for such kind of changes and have 100% to have tools that will help identify priority of every change. 80% For all these reasons when appears need to 60% implement change in existing information system have to be performed analysis of implementation 40% % of advisability and defined score of implementation matches advisability, that will provide opportunity to define 20% priority and degree of importance for company or 0% degree of expected impact of change. 0 50 100 In one large company of Kazakhstan, there is a Change requests process of change management. For this there is structural unit that performs analysis of Figure 1. Graph representation implementation advisability of changes. In the analysis for each change request are defined In the discussion of the problem with experts it was expected risks, effects and labor expenses on defined that to create such kind of method of implementation of change. distribution of change request to prior groups it is The problem that is reviewed in the article, is defining of the method for calculation of score of

154

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

required method that eventually will give 1 value – profit, request that will improve customer experience score of implementation advisability. and requests that will improve internal processes of And for each prior group have to be defined scale of the company. For the company importance of values of the score of implementation advisability. change request depends on category of effects. The In this way have to be performed distribution of most important for company change requests that change requests to prior groups: firstly define score exclude risks of complaints from regulator, after this of implementation advisability and depending on its on the same degree of importance are change value change request have to be distributed to 1 of 4 requests that bring financial profit and that improve prior group according to the scale. customer service, on the last place of this scale are The following scale of values were defined: change requests that improve internal processes of 1. change request with value of the score of the company. implementation advisability from 95 to 100 have to 2. There are change requests which score of be distributed to prior group “critical”; effect is high than usually (more than 100 or even 2. change request with value of the score of 120), for such kind of requests part of effects implementation advisability from 90 to 95 have to impacts on the final decision stronger than for be distributed to prior group “high”; requests which score of effect is from 0 to 100. 3. change request with value of the score of 3. It is clear, that change requests require implementation advisability from 75 to 90 have to resources for implementation, therefore there is a be distributed to prior group “medium”; threshold for value of labor expenses. Values of 4. change request with value of the score of labor expenses till the threshold influence on the implementation advisability from 0 to 75 have to be final decision in positive way. Change request with distributed to prior group “low”. labor expenses from 0 to 25 man-days are small For defining of the method of calculation of score of tasks, from 26 to 50 medium tasks, from 51 to 75 are implementation advisability of change request were large tasks and change requests with labor expenses conducted interviews with experts and identified more than 76 man-days are projects. methods that used by every experts during There were collected and defined 3 methods that are preparation of expert opinion about distribution of used by experts for distribution of change request to change request to one of the prior group. Those were prior group, then, these methods were transformed to following methods: mathematical view in order to define formula for 1. There are 4 existing category of effects: defining of score of implementation of advisability change requests that exclude risks of complaints (Si.a.): from regulator, requests that will bring financial value for request with score of effect less than 100 is 0, for request with score of effect from 101 to 119

value of coefficient is from 0.0025 to 0.0475 and the value defines by following formula: In order to clarify this formula there is description of parts or it in way of description of 3 methods from experts: 1. in order to show in calculation different For request with value of score of effect more than importance of different categories of effects there is 120, value of coefficient defines by the following a coefficient of category of effects k .. For defining c.e formula: its value, values of each score of effects category are compared for this request. The score of the effects category that is higher defined as main effect category. After defining of main category of effect it 3. In order to show in formula dependence on is possible to define value of coefficient of category the positive impact of labor expenses till threshold, of effect. For category of effect that excludes risks there is a constant K and its value is 20, also sum of value is 0.9, for category of effect that brings profit estimations of labor expenses is multiplied with value is 0.8 the same is for category of effect that coefficient of labor expenses (k ), its value is 0.4. improves customer service, for category of effect l.a. Final formula was defined for calculation of that improves internal processes value is 0.7. score of implementation advisability of change 2. In order to show stronger influence of score requests, also there was defined scale of values of effect when its value is higher than 100 and 120, according to it, it is possible to distribute change there is a coefficient of additional value k . This a.v. requests to prior group.

155

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

This formula and method of calculation of score of Information, that is given in the article, will help implementation advisability and method of experts, that work with the process of defining of distribution of change requests to prior group were implementation advisability. Also it is possible to checked on 100 change requests and in 88% use defined method for developing of information decision to distribute change requests to prior group system with elements of learning information matched experts’ opinions (Fig.1). system, that will do all the calculations

3. Conclusion References There was defined method for calculation of the [1] Aleksandr V. Aleksandrov, Промышленное score of implementation advisability of changes обозрение. Фармацевтическая отрасль №1 (12) requests, also there was defined scale for distribution 2009, стр. 24-27 of change requests into 1 out of 4 prior group [2] Grebenyuk Viktor Mikhailovich, Интернет- depending on score of implementation advisability. журнал «НАУКОВЕДЕНИЕ» №1 2013

Определение метода для расчета балла целесообразности внедрения изменения в существующие информационные системы

D. Tsybulin

International Information Technology University, Computer Engemeering Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

В статье описано то, как был определен метод для расчета балла целесообразности внедрения запросов на изменение, а так же определена шкала для распределения запросов в зависимости от значения балла целесообразности внедрения в 1 из 4 категорий приоритетности. Материал, описанный в данной статье, может помочь экспертам, занимающимся определением целесообразности внедрения, а так же используя формулу и логику расчета можно создать информационную систему с использованием элементов обучения информационной системы, которая будет выполнять расчет.

Қолданыстағы ақпараттық жүйелерге өзгерістер жүзеге асыру балл орындылығын есептеу әдісін анықтау

Д. Цыбулин

International Information Technology University, Computer Engemeering Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

Бұл мақала әдісін өзгерту сұрауларын іске асыру балл орындылығын, сондай-ақ басымдық 4 санатқа бірінде ұпай жүзеге асыру өміршеңдігі байланысты сұрау бөлу белгіленген шкаласын есептеу үшін қалай белгіленгенін сипатталған. Осы мақалада сипатталған материалдық есептеу орындайды, ол іске асыру орындылығы анықтау тартылған сарапшылар көмектеседі, сондай-ақ, формуласы және есептеу логикасын пайдаланып жасанды интеллект элементтері бар ақпараттық жүйесін құру болады аласызс.

The theory of electrostatic probe in a plasma generated by the products of nuclear reactions

Shapiyeva A.

International IT University, Computer Engineering and Telecommunication Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

This paper presents the theory of probe for high-pressure plasma, where the hydrodynamic approximation is valid in the presence of negative ions and are given methodological recommendations concentration detection of charged particles

156

2nd IC ITS&I 2016, May 19, Almaty, Kazakhstan

3 3 in the plasma He UF6 generated by the reaction products He n  p  T  0,76 Mev on the basis of numerical calculations.

1. Introduction d dne d The probe method is a simple effective local e( n e )  1  cn e  an e n (3) experimental plasma diagnostics method. But the d d  d  theoretical interpretation of the current-voltage 2 d  e  characteristics (CVC) in a plasma extremely  2 n  n  n , (4) complicated. It is known that the CVC probe allows us d to determine the concentration of particles and the Dn()2 Dne () 2 where   a  , e  a  , electrons temperature. The ionization degree of nuclear- Sr 2 Sr 2 induced plasmas assumed to be small, and the p p 2 frequency of collisions, where the electrons collide with Dn() n r  p   a  , t   ,   ,   , electrons and ions of the plasma, it is assumed to be 2 ion 1 kT Srp S rp e negligible in comparison with the electron collisions e with neutral atoms. Free path length of electrons and 2 2 2 nE rp rp rp ions is assumed to be much smaller than the He3 f 0 S  , t   , t   , t e  , characteristic size of the variation of the charged  D D D D D De particles concentration and the electron temperature, n e r kT  i.e., plasma is assumed collisional, which is described    ,  ()de2 ,   ,  22 kT in the hydrodynamic approximation. n rpp4 e n r e Probe theory for non-self-discharge to probes of e different geometries and fluxes of high pressure weakly T  ()n  2  ()n  2 n  ionized plasma created in [1, 2]. The approximation that   e , a  e  , b  i  , c   . divides space or area on the charged layer and a T S S S diffusion layer, done in [1]. The asymptotic theory of a spherical electrostatic probe in reactive weakly ionized n,, n ne - concentrations of electrons, positive plasma, high-pressure, containing negative ions, as a e small correction, is described in [3] It is assumed that and negative ions, DDD,, - diffusion coefficients the Debye length in comparison with the probe radius is and mobility of electrons, negative and positive ions,  small, the length of the energy relaxation of electrons is - sticking coefficient [4] defining the formation of much smaller than the local macroscopic scale, and the negative ions, r - probe radius, S – ionization rate,  electron distribution function is determined by the local p - neutron flux density,  f - fission cross section of the values of Ne and Т. helium-3 isotope during the absorption thermal 2. The theory of electrostatic probe in nuclear-neutrons, E0 - the energy of the fission fragments,  - induced plasma with negative ions the energy value of the formation of an electron and an 2.1. Basic equations: ion pair, n - the concentration of the isotope helium- We consider the case of steady-state plasma and the He3 probe placed into the plasma, where the probe potential 3 gas. is different from the plasmas potential. Assuming the Boundary conditions are defined on the surface of distance from the probe to any point in the region the probe and on the boundary of perturbed probe: e perturbed by the probe, as the basic coordinate, the nn(1) n (1)  (1)  0, (rpp )  (5) system of equations in the dimensionless form,  e describing the work of the probe in the hydrodynamic nn()1,n()11  1    ,()  1   ,()0   1  , (6) approximation, can be represented as follows: where 1 - boundary of region disturbed by the  d dn  d e   probe. ( n )  1  an n  bn n (1) d d  d  2.2 Charged layer d dn d () n   cne  bn  n  (2) Following [2], we have divided the plasma, d d  d  perturbed by the probe, into two areas: the charged

157

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

layer 1, the layer of ambipolar diffusion section of the electronic branches of the current-voltage 0 characteristics, which corresponds to a small positive 0   1 . potentials of the probe when the main contribution to The equations in the charged layer that form the the total voltage drop probe-plasma makes the charged probe currents of positive and negative particles are as region. The parameter can vary from 01 , and follows: the inequality corresponds to the limiting case when dd only the positive and negative ions are present in the (n ) 1 (7) dd plasma, or only electrons and positive ions. In the case when the voltage drop occurs mainly in the charged dd (n ) 0 (8) layer, the concentration of positive ions and a parameter dd  determined from the ion and electron branches CVC eedd by the following formulas (spherical probe) [5]:  (n ) 1 (9) dd 1 3 I  3 d 2 I  11np  ne  n  n . (10) np 4 eSr 3 2  p d n  2 (17) In this case, the size of the charged layer for probe 3 I  3  r 1 np of plane, cylindrical and spherical shapes are as follows np p 3 from the equations (7-10): 4 eSrp for the plane probe: 1  0.5 I 3 r r1 0.5 r 2    (11) I41 er b  n  np 00p p p  np p pp 3 4eSrp for the cylindrical probe:   1 , (18)  0.5 2 0.5 3  e  Inp r00 rp12  r p  p    (12) 41erp b b  pp 3  4eSr for the spherical probe: p 0.5  0.5 2 where Inp np - probe current and potential on the r00 rp13  r p  p    , (13)   ion branch, I pp  pp - probe current and potential on 4eS 1 2 the electron branch. where   (). b 2.2. Ambipolar diffusion layer In particular, the equations for the current of plane, 2.3. The basic equations in the diffusion layer arez cylindrical and spherical probe with negative potential  d dn e   are presented in the following form: a ( )  1 an n  bn n (19) for plane probe: dd  Ip  eSAr0 (14) d dn e   a () cn  bn n (20) for the cylindrical probe: dd  e p 0 ed dn e e  Ip  eS L (15) a ( )  1 cn  an n (21)  dd 2 for the spherical probe: d  e  3  2 n  n  n , (22) 2 d 433 p  0 Ipp eSr 1 , (16) t t t 3  r 2 where ion ione ion .  p a,,  a   a  t t t e DDDa a a where А – plane probe square, L – length of cylindrical probe, and the charged layer length for the At all points from the probe to the counterprobe probes of different geometries are equal, respectively. works the relation: If the potential drop in space-charge layer is JJJ e  0 (23) dominant, then, according to [1], the most simple J eJ  eJ  eJ e (24) method of determining the concentration of charged p particles is the method based on the use of the linear

158

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

dd DDD1   e ln(n ) 21 e (25)  dx b1  b  b dx 2    ()n0 dn  3  rp 2  ()n0 JD a , (26) ( )nn  1    dx 00 (35) rd 33 dn  JD , (27) 1 a (1 (n )2 ) dx  0 e n0 eedn  JD a , (28) dx 21 where DDD,,e - ambipolar diffusion ee2 a a a  ()n0 coefficients: e 3 rp  ()n D bee D b  1  D  b   D  b  ()2 nnee    0 (36)       00 D  (29) rd 33 a bb(1  ) b  e  1     ee  e 2 D b D b  D b  D b e (1 (n0 ) )       n0 Da  (30)  bb(1  ) b  e If the main voltage drop occurs mainly in the D bee D b diffusion layer, respectively, then e   1 Da  e . (31) 1 bb(1  ) b  3 3    1  n0  21   (37) In diffusion layer the equations for the current of  3 plane, cylindrical and spherical probe with negative     potential are presented in the following form: 1 1  3  1  3 for the plane probe: e , (38) n0 e 21   1 1   3  ì ì2 ì ì ìì2 j -j e 1 + + -1 2 r p 0 DDD1   I = ec D n r 1- ì1+ ì (32)   kTe p a ì p ì + ì ìì where ()  , ìw ì 3 ìì ì k r 2 ì e  ì p ì b1  b  b e for the cylindrical probe: 22 a( n ) b( n ) 1   (1   ) . 1 æ ö2 SS é 2 æ r öù2 j -j I = 2pec D +n + L ê ç1- ÷ú ç1+ p 0 ÷ (33) Numerical solutions of equations (1-4), by finite p a ¥ w + è 3 ø ç 2 ÷ difference method are given in figures (1-4) based on ë û è k r p ø ComSol, FreeFem++ software systems. for the spherical probe: 1 1 2 2 2  p  0 Ip e D a n r p  1  1  ,  3 2 rp (34) b where  1 . e b1  b  b

The value n0 on the boundary for negative and positive probes is determined by the appropriate expressions: Fig. 1. Electrons distribution Ne around the probe in 3 plasma He UF6

159

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

3. Conclusion The analytical and numerical solutions of the equations of electrostatic probe in nuclear-induced plasmas allow to determine the concentration of positive ions, electrons and negative ions in the given conditions of ionization rate and gas mixture composition. 4. References [1] Бенилов М.С., Теория электрических зондов в потоках слабоионизированной плазмы высокого Fig. 2. Positive ions distribution around the probe in plasma давления, Теплофизика высоких температур, Том 3 He UF . 26, в.№ 5, 1988. 6 [2] Ульянов К.Н., Теория электрических зондов в плотной плазме, Журнал технической физики, Том . XL, в. №4, 1970, стр. 790. [3] Бектурсунова Р.М., С.К. Кунаков. Асимптотическая теория сферического электростатического зонда в столкновительной плазме, образованной продуктами ядерных реакций, Теплофизика высоких температур, Том 30, в. №2, 1992. [4] Compton R.N., On the formation of positive and negative ions in gaseous UF6. The Journal of Chemical Physics, vol.66, No.10, 1977, pp.4478-4486. [5] Kunakov S.K., Son E.E., Shapiyeva A. Probe diagnostics of 3He+UF6 plasma, generated in the core Fig. 3. Potential distribution around the probe in plasma of nuclear reactor WWW-K/International Journal of . Mathematics and Physics, Vol.6, No1., 2015, pp.69-74.

Fig. 4. Potential distribution around the probe in plasma .

Теория электростатического зонда в плазме, образованной продуктами ядерных реакций

Шапиева А.Е.

Международный университет информационных технологий, Кафедра компьютерной инженерии и телекоммуникаций, 34 «А»/8 «А» ул. Манаса./ул. Жандосова., Алматы, 050040, Казахстан

В данной работе представлена зондовая теория для плазмы высокого давления, где справедливо гидродинамическое приближение в присутствии отрицательных ионов и даны методические

160

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

3 рекомендации для определения концентрации заряженных частиц в плазме He UF6 , образованной 3 продуктами реакции He n  p  T  0,76 Mev на основе численных расчетов.

Ядролық-индукцияланған плазмалықтағы электростатикалық зонд теориясы

Шапиева А.Е.

Халықаралық Ақпараттық ТехнологияларУниверситеті, Компьютерлік инженерия және телекоммуникация кафедрасы, 34 «А»/8 «А» Манас к./Жандос к., Алматы 050040, Қазақстан

Осы мақала жоғары қысымды плазма зонд теориясын ұсынады. Теріс иондар қатысуымен гидродинамикалық жуықтау берілген. реакция өнімдерінен қалыптасқан плазмадағы зарядталған бөлшектердің концентрациясың анықтау үшін сандық методикалық нұсқаулар есептеулер негізінде берілген.

Methods of data processing in banking using OLAP

A. ZhanibekP, UA. Moldagulova

International Information Technology University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

Nowadays many huge companies collect and store data to make use of them. Just a few years ago the majority of the enterprises, where there are enormous data warehouses, kept the data without analyzing them. Later, people realized they can benefit from the stored raw information and today there even exist exponentially developing companies that offer their own methodologies and tools for data analysis. However, this domain is not fully developed yet. There are very few corporations, namely banks, trying to analyze the data using Online Analytical Processing (OLAP). This article considers methods of analyzing big volumes of data in the sphere of banking, how developed the OLAP methods are in the banks, what we should propose to the banks in order to increase their success in the market and what kind of instruments there are that help the banks analyze and arrange big data and construct immense databases in a right way.

1. Introduction channels. The number of competitors is doubled and During the decision making process, user the huge volumes of information are stored generates some hypotheses. In order to be fully uselessly. It is time to change financial efficiency completed these hypotheses must be verified. The and offer new and interesting ideas for customers. hypotheses verification is carried out based on the The banks need to increase efficiency by means of information about the domain that is being analyzed. using idly existing data in their warehouses. Usually, the most convenient way for human to Figure 1.1 shows data collection process. conceive such information is the relationship All the data are now stored in a data warehouse between parameters, for example, the dependence of after transactional collecting operations or On-Line the amount of sales on region, time and category of Transaction Processing (OLTP). It is time to make goods. Another example can be the dependence of use of the collected data [1]. the number of recovering patients on the applied During data analysis and finding the decision, it measures of treatment, age, etc. is often necessary to build the relationship between Concerning banking system, today the market is diverse parameters. Moreover, the number of such overfilled with the customer communication parameters can vary widely.

161

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

Figure 1.1 Figure 2.1.1

As it was mentioned before, the traditional Thus, the multidimensional data model can be analysis tools that operate on data, which are represented as an OLAP hypercube (Figure 2.1.1). presented in the form of a relational database table, The edges of the hypercube are dimensions and the cannot fully accomplish such requirements. The task cells are measures. is to find a way of effective data analysis The following operations can be performed on organization. such a hypercube: • Slice 2. OLAP-systems • Rotate 2.1. Literature review • Roll-Up and Drill-Down (Figure 2.1.2) In 1993 the founder of the relational database model (Edgar F. Codd) considered its drawbacks. He pointed to the impossibility to "reunite, view and analyze data regarding multiplicity of dimensions, i.e. the most understandable way for analysts" [6]. Dimension is a sequence of values of one of the analyzed parameters. For instance, the "time" parameter is a sequence of calendar days, for the "region" parameter can be a list of cities. Multiplicity of dimensions involves data representation in the multivariate model form. On each dimension of the multivariate model there are parameters that are related to the domain of analysis [2].

According to Codd, multi-dimensional Figure 2.1.2 conceptual view is a multiple perspective, which consists of several independent dimensions, along 2.2. Methodology which certain datasets can be analyzed. What are the OLAP-systems? Online analysis, Simultaneous analysis of several independent which is performed with the use of OLAP-systems, dimensions is defined as the multivariate analysis. is associated with the concept of multi-dimensional Each dimension can be represented in a data analysis [4]. hierarchical structure. E.g., the "handler" dimension OLAP (On-Line Analytical Processing) is a can have following hierarchical levels: "enterprise technology of online analytical data processing — direction —department — branch — employee". using methods and tools for collection, storage and Furthermore, some dimensions can have several analysis of multi-dimensional data to support types of hierarchical representation. For example, decision making processes. the "time" dimension can include two hierarchies The main purpose of OLAP-systems is to support with the following levels: "year — quarter — month analytical activities, arbitrary analyst —user queries — day" and "week — day". (the term ad-hoc is often used). The purpose of At the intersection of the dimension axes there OLAP-analysis is verification emerging hypotheses are data (measures) which characterize [5]. quantitatively the analyzed facts [3]. It might be Banking system has the following stages of data sales expressed in product units or amount of analysis that can be reached using OLAP-systems money, remains in the warehouse, costs and so on. (Figure 2.2.1):

162

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

o Support of all OLAP-analysis models (rule 14) o Client-server architecture (rule 5) o Transparency (rule 2) o Multi-user mode support (rule 8) Special features (S): Figure 2.2.1 o Processing of non-normalized data (rule 15) As it was written above, the founder of relational o Saving OLAP results: storing them databases is E. Codd. Due to his theory, OLAP separately from the original data (rule 16) technology was offered and it is highly developing o Excluding missing values (rule 17) nowadays. In 1993, he published the article titled o Missing values processing (rule 18) "OLAP for analyst-users: how it should be". This Reporting features (R): paper presents main concepts of online analytical o Flexibility of reports receiving (rule 11) processing and defines following 12 requirements for products to be respected. The products let o Permanent productivity of developing perform online analytical processing. reports (rule 4) Here are twelve rules claimed by Codd that o Automatic adjustment of the physical layer define OLAP: (changed original rule 7) 1. Multi-dimensionality Dimensions control (D): 2. Transparency o Equality of dimensions (rule 6) 3. Availability o Unlimited dimensionality and number of 4. Permanent productivity of developing aggregation levels (rule 12) reports o Unlimited operations number (rule 9) 5. Client-server architecture 2.3. Using in banks 6. Equality of dimensions The integration of On-Line Analytical Processing 7. Dynamic management of sparse matrices system lets systemize the data to be able to use them 8. Multi-user mode support instantaneously. It is very helpful to impress and 9. Unlimited cross operations attract customers who urgently need to obtain a 10. Intuitive data manipulation credit. Moreover, accountants make RPT-files to 11. Flexibility of reports receiving create and represent reports using Cristal Reports 12. Unlimited dimensionality and number of framework, which also can have OLAP data aggregation levels structure. Codd's rules serving as de facto OLAP definition are quite frequently criticized, because, for example, rules 1, 2, 3 and 6 are the requirements and rules 10 and 11 are unformalized wishes. Thus, Codd's twelve listed rules do not define OLAP accurately. In 1995, Codd added to the above list the following six rules: 1. Batch extraction against interpretation 2. Support of all OLAP-analysis models 3. Processing of non-normalized data 4. Saving OLAP results 5. Excluding missing values 6. Missing values processing In addition, E. Codd grouped up all the 18 rules Table 2.3.1 to the following four parts, so-called features. These As it is well known almost every company has groups were named B, S, R and D. the products of Microsoft Office, which consists of Basic features (B) include the following rules: Microsoft Word, Microsoft Excel, Microsoft Power o Multi-dimensional conceptual data view Point, etc. So in Microsoft Excel there is a capacity (rule 1); to load data from the OLAP databases, so is there in o Intuitive data manipulation (rule 10) Microsoft Access which, in fact, deals with o Accessibility (rule 3) databases. Additionally, there is such a capacity in o Batch extraction against interpretation (rule Business Objects platform that is also widely used in 13) the banks to manage reports and other documents,

163

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

Hadoop platform, SAS Tools and many other which is a set of applications designed to collect, business intelligence instruments. Therefore, it is not store and analyze multi-dimensional data for expensive to integrate the OLAP data structure, it is decision support systems. much more difficult to organize these data and find a In order to define OLAP-systems E. Codd way to construct and keep them in form of an ideal developed twelve rules and added six more later cube. which he eventually grouped up by 4 parts: basic Here are the vendors of OLAP according to the features, special features, reporting features and statistics of 2011 [7]: dimensions control. 3. Conclusion To draw conclusions, this article provides 3. References information about processes and methods of data [1] W.H. Inmon, Building the Data Warehouse. analysis in huge companies. Third Edition (2002) Jhon Wiley & Sons, Inc. For information analysis, the most convenient [2] A. Berson, S.J. Smith, Data Warehousing, way of its representation is a multivariate model or a Data Mining & OLAP (1997) McGraw-Hill. hypercube with dimensions on its edges. It makes [3] E. Thomsen, OLAP Solutions (2002) Jhon possible to analyze data on multiple dimensions, i.e. Wiley & Sons, Inc. to perform multidimensional analysis. [4] Michael J.A. Berry, Gordon Linoff, Data Dimension is a sequence of values of one of the Mining Techniques (1997) Jhon Wiley & Sons, Inc. analyzed parameters. Dimensions can have the [5] M. Negnivitsky, Addison-Wesley, Artificial hierarchical structure. At the intersections of Intelligence — A Guide to Intelligent Systems (2002) dimensions there are data that characterize analyzed Pearson Education Limited. facts, i.e. measures. [6] Codd, E. F.; Codd, S. B.; Salley, C. T. Hypercube is a multivariate model which allows (1993). Providing OLAP to User-Analysts: An IT using the following operations: Slice, Rotate, Roll Mandate. Up and Drill Down. OLAP-systems implement [7] BI Market: OLAP (Vendors and Products) - hypercube and these operations. 2011 OLAP (On-Line Analytical Processing) is a technology of online analytical data processing Методы обработки данных в банковском деле с помощью OLAP

А. Жанибек, А. Молдагулов

Международный Университет Информационных Технологий, Департамент Информационных Систем, 34 «А»/8 «А» ул. Манаса./ул.Жандосова, Алматы 050040, Казахстан

В настоящее время крупные компании собирают и хранят данные в целях их дальнейшего использования. Имея огромные хранилища данных, несколько лет назад большинство предприятий, не проанализировав, просто копили данные. Позже, люди поняли, что можно извлечь выгоду из хранимой сырой информации и сегодня даже существуют экспоненциально развивающиеся компании, предлагающие свои собственные методологии и инструменты для анализа данных. Однако, эта область еще не совсем развита. Существует очень мало компаний, а именно банков, которые пытаются анализировать данные используя Оперативную Аналитическую Обработку данных (OLAP). В данной статье рассматриваются методы анализа больших данных в сфере банковского дела, насколько развиты OLAP методы в банках, что нам стоит предложить банкам для того, чтобы увеличить вероятность их успеха на рынке и какие есть инструменты, позволяющие банкам анализировать и приводить в порядок большие данные, а также мгновенно строить огромные базы данных.

Банк саласындағы мәліметтерді OLAP көмегімен өңдеу әдістері

А. Жәнібек, А. Молдагулова

1 Халықаралық Ақпараттық Технологиялар Университеті, Ақпараттық Жүйесінің Департаменті, 34 «А»/8 «А» Манас к./Жандосов к., Алматы 050040, Қазақстан

Қазіргі кезде, ірі компаниялар деректерді алдағы уақытта пайдалану мақсатында жинайды және сақтайды. Бірнеше жылдар бұрын көптеген кәсіпорындар орасан зор деректер қоймаларын иемденгенімен,оларға талдау жасамай,тек қана жинау шараларын жүзеге асырған. Кейінірек, адамдар

164

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

сақталған шикі ақпараттардан пайда табуға болатындығын түсінген және қазіргі таңда, деректерді талдау үшін өзінің жеке әдістемелері мен құралдарын ұсынатын , экспоненциальді түрде дамып келе жатқан бір қатар компаниялар бар. Дегенмен, мұндай білім саласы әлі онша жақсы дамымаған. Оперативті Аналитикалық Өңдеуді (OLAP) қолдана отырып, деректерге талдау жасауға тырысып жатқан санаулы компаниялар,атап айтқанда,банктер бар. Бұл мақалада банк саласындағы деректерді талдау әдістері, осы салада қаншалықты OLAP әдістері дамығындығы қараластырылады.Осымен қатар, нарықта жетістіктерді арттыру мақсатында банктерге қандай ұсыныстар жасауға болатындығы,үлкен деректерді ретке келтіру үшін және талдау үшін банктерге қандай құралдар қажет екендігі, сондай-ақ қалай лезде улкен деректер базасын салу жолдары зерттеледі.

Research elements of tonality in the semantic web

B.ZhunisP, R.Satybaldiyeva

International Information Technology University, Information Systems Department, 34 «А»/8 «А» Manas Str./Zhandosov Str., Almaty 050040, Kazakhstan

Analyzing emotional coloring of positive and negative posts from social networks, as a result automation can receive an analysis method on determination of sentimentality of posts, their comparison and application further. This article discusses the key concepts and tasks of sentiment analysis and also classification methods. This article is devoted to research of existing texts tone analysis.

1. Introduction called the emotional assessment expressed in the text Currently, social networks give researchers an of the review in relation to some object. opportunity for detailed analysis of users’ opinions. To the analyze tasks of the tonality are related: As posts and comments of social networks - are the  Documents classification on the base of scope where expecting an expression of subjective opinions; evaluation of the author or other phenomena, events,  Proposals classification on the base of a certain group of persons or a particular individual, opinions; the expression of emotions.  Analyze of opinions on the base of object At this moment very important to interest characteristics; government research of elements of a tonality in a  Creation of the opinion vocabulary;; semantic network. The purpose of this work is an  Comparison search; identification of key subjects of information objects,  Spam search in the comments; determination of general and object tonality of the  The usefulness of the analysis of the message, creation of their interrelation in the form of comments. a semantic network. For achievement of the After the above-mentioned problems, it can be specified purposes it is necessary to study material identified, that exploration and appliance of about sentiment analysis. classification techniques to the data, comments on Today, the problem of the analysis of Internet social networks and considering key themes of posts user`s opinions becomes more and more important and comments will give the novelty of this study. both with theoretical, and with applied the points of view. To solve the problems related to the 2. Literature review identification and further analysis of opinions, In the overview the tasks arising in the analysis of methods are used, the common name of which is to a tonality of texts and terminology in which these analyze the tone of the text. tasks are described. Classification types, approaches Analysis of the tone (or sentiment analysis) - is of classification of a tonality and methods of the analysis of text information to identify the classification of a tonality are considered. emotional evaluation of the author. Sentiment- 2.1. Sentiment analysis in social network analysis is one of the directions of computational During several decades, the existing technology linguistics studying opinions and emotions in text of a sentiment analysis became especially actual documents (in reviews of something). Tonality is with development of Web, especially Web 2.0 as the

165

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

instrument of monitoring of million network users represented as a hierarchical tree of components and opinions, who constantly introduce the ideas on sub-components (Fig. 2). Each component is related social networks. Interest in this technology grows as to a set of attributes. In the above definition of an the trust to information from media resourse opinion, aspect means both the components and their increases (it increases much quicker, than to other attributes. In particular case, an aspect is the entity types of information — picture 1). itself. Audience scope with in millions of people and efficiency of extraction of information have allowed to receive results of researches unattainable earlier. If earlier to reveal opinion on any question, it was necessary to conduct surveys, and today statements on a huge number of popular subjects already are in the Network, it is only necessary to reveal them, to distinguish and estimate.

Fig.2 An entity has components and attributes associated with them

An entity aspect has several names: feature, aspect, facet. The term “opinion source” is often used instead of “opinion holder”. These differences in terminology exist because of the specificity of the

Fig.1 The degree of confidence in the information texts analysed in the works of researchers and do not alter the substance of the definition of an In a sentiment analysis it is considered that text opinion. information on the Internet is divided into two classes: facts and opinions [3]. Key concept is 2.1.2 Compare determination of opinion. Opinions are divided into The second type of opinions – comparison – can two types: be divided into three kinds: 1. Comparison of entity 1. Simple opinion aspects in favor of one (non-equal gradable 2. Comparison comparisons). 2. Equating aspects of different entities (equative comparisons). 3. Superiority of 2.1.1 Opinion one entity over the other (superlative comparisons). A simple opinion contains the statement of an Comparisons of the first kind of “entity aspect 1 is in author about one entity. It can be stated directly: “I some way superior to entity aspect 2”, for example: was pleasantly surprised quality of education in IT “The GalaxyTab screen is designed with higher university”, or implicitly: “After additional course, quality than its rivals.” The second type expresses my English language became better”. In both cases, the similarity of aspects of different entities, such as: a simple opinion usually has a positive or negative “Both Android and iOS are equally convenient to sentiment. In the analysis of the tonality of a text, develop applications for them.” An example of the the following formal definition is given for the first third type can be the sentence “The Canon device type of opinion: a tuple of five elements (entity, was the cheapest in that shop.” The opinion of the feature, sentiment_value, holder, time) is called a second type is defined as a tuple (E1, E2, A, po, simple opinion, where entity is the object about holder, time), where E1 and E2 are sets of compared whose aspect (feature) the author (holder) made an entities on the aspect A, po – a set of entities that the opinion at the time (time). There are 3 types of opinion holder preferred, time – the time when the emotions (sentiment_value): positive, negative and opinion was published. neutral. Neutral emotion means that the text does not contain an emotional component. Entity is a person, 2.2 Tasks of the analysis tonality of the text organization, event, product or topic of discussion. In computational linguistics the text in a natural Therefore, in various publications, entity is also language is considered to be unstructured called object or topic. Often, an entity can be information. Having a definite opinion, we define how this information should be structured. In

166

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

problems, combined term "analysis of the emotional The above tasks involve the problem of color of text", it is determined how the text is determining the polarity of opinions, but not the extracted, analyzed and structured information in a problem of identification of objects (in other words, natural language. Analysis of the tone of the text aspects, according to this definition), of which it is includes the following key tasks: expressed. 1. Determination of the polarity of the text. To date, this problem extracting aspects of 2. Extract aspects from emotionally colored text. emotionally colored text devoted fewer jobs than the other tasks included in the sentiment analysis [14]. 2.2.1 Determination of the polarity of the text. Determination of the polarity of the text is usually 2.3 Methods of classification considered on two levels: Text analysis contains the use of one or more 1. At the level of the document. methods, each of which has its advantages and 2. At the level of supply. disadvantages.

2.2.1.1 Determination of the polarity of the 2.3.1 Methods based on the rules and dictionaries document Dictionary-based methods are the most The task is to determine the polarity of the whole straightforward approach to obtaining a sentiment document. Moreover, the text of the document can lexicon. These methods use a seed list of words or simultaneously contain suggestions as to the use them in a bootstrap approach to discover new negative and a positive emotional coloring. words [1]. The strategy is to use a thesaurus or It is assumed that the document contains a review lexical database as a seed list of words [1]. A of the same object at the document level. Reviews of common assumption in such techniques is that goods and services on specialized Internet resources semantic relations transfer sentiment polarity to satisfy this assumption. The problem of determining associated words [5]. For instance, using the the polarity of the document is devoted to a lot of the synonyms’ semantic relation, the sentiment word early work on the analysis of the tone of the text. In “lovely” will transfer its positive polarity to its most modern systems views analysis, this problem is synonyms “adorable”, “pretty” etc.[4]. Others have not considered, because result - the polarity of the chosen to use pre-compiled lists of sentiment words document, on average - is considered uninformative with similar techniques [1]. The former pre- assessment of the opinions expressed in the compiled lists are known as sentiment lexicons. document [4]. Previous work has made available to the research. A sample of generic positive seed of words can be 2.2.1.2 Determination of the polarity of the words such as “good”, “nice” and “excellent” and a sentence negative set contain words such as “bad”, “awful” The problem of determining the polarity of the and “horrible”. Usually dictionary-based methods proposals is solved in an analysis of the subtasks of observe the sentiment word occurrence and weaken the document key, and as an independent task, for its sentiment transfer by observing the words example, in the analysis of short messages and proximity. Furthermore, they take into account comments on social networks. negation and/or neutralization tokens. The scope of Definition polarity proposals often takes place in negation aims at detecting polarity changes and two stages. [3] First, an analysis of proposals for neutralization overrides the sentiment polarity effect. subjectivity. If the proposal contains the information Indications of these tokens are words such as “not”, of a subjective nature, it is likely, it expressed. Next “although”, “never” and “would”, “should” and up is determined by the polarity of subjective “hope” for negation and neutralization respectively. suggestions. Otherwise, the sentence contains the actual data and not considered further. 2.3.2 Methods based on graph-theoretic models Methods for determining the polarity of the In these methods the text is represented as a graph individual proposals are for a more accurate analysis based on the assumption that certain words have a of the opinions in the text: in conjunction with the greater weight and therefore stronger influence on methods of extraction aspect can carry out a detailed tone only text. After ranking of vertices words are analysis of the author's opinions on all aspects of the classified in accordance with the dictionary key, goods covered in the text. where each word is assigned to a particular 2.2.2 Methods of the automatic extraction of the characteristic ("positive", "negative" or "neutral"). aspects The result is calculated as the ratio of words with a

167

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

positive assessment to the number of words with a tone of the text (in the simplest case, it will be negative evaluation [6]. determined as the sum of lexical tones each token). Second, analysis of the tonality can significantly 2.3.3 Machine learning: supervised learning improve the quality of machine translation. It is Big data may provide substantial assistance in the known that the standard of machine translation is a training of neural networks, which are also used in human text translation result - a professional the analysis of the tonality of the text. Moreover, the translator. For more than 50 years of development in accuracy of estimation of the tonality in this manner this area, researchers were convinced that teach the is increased to 85% - at least, this figure was reach machine to "think, as a translator" can only take into scientists from Stanford. Principle of the work of account all the considerations used by professional program is simple: it builds a tree with the translating a particular text. Naturally, the transfer assessment of the tonality of each word, each phrase, cannot do without the initial analysis of the text and and all of the text in its entirety. The program separate words - including pitch analysis as such. realizes that changing the order of words changes Thirdly, the aim of the analysis tonality of the the tonality of the text. We can assume that this fact text can be some views of the author or the author and provides a highly accurate assessment of the himself. This is - the most interesting scope. From text, and allows us to consider neural networks a this perspective, the analysis of tonality, is probably promising tool for this analysis [8]. one of the most important steps towards the The main essence of these methods is that the development of advanced artificial intelligence. machine classifier trained on the first stage on a pre- marked text, and then use the resulting model in the 3. Reference analysis of the new documents. There is a quick 1. Cha, M., Haddadi, H., Benevenuto, F., and algorithm: Gummadi, K.P. Measuring User Influence in 1. Firstly, going to collection of documents Twitter: The Million Follower Fallacy.// based on which is trained the machine Proceedings of the 4th International AAAI classifier; Conference on Weblogs and Social Media 2. Each document is decomposed into a feature (ICWSM), Washington, May 2010. vector (aspects), on which he will be 2. SportSense [HTML] explored; (ec2.compute1.amazonaws.com/sportsense/) 3. Indicate the right type of tone for each 3. Pang B. & Lee L. Opinion Mining and document; Sentiment Analysis // Foundations and Trends in 4. Selects the classification of algorithm and Information Retrieval, v.2 n.1-2, January, 2008 - method for training the classifier; pp.1-135. 5. The model will use to determine the tonality 4. B. Pang, L. Lee, and S. Vaithyanathan, of the new collection of documents. „Thumbs up? Sentiment classification using machine learning techniques‟, in Proceedings of the 2.3.4 Machine learning: unsupervised learning Conference on Empirical Methods in Natural Underlying this approach is the idea that the terms Language Processing, pp. 79–86, (2002). which are more common in this text, and at the same 5. C. Biancalana, F. Gasparetti, A. Micarelli, and time present in a small amount of text in the entire G. Sansonetti. Social semantic query expansion. collection have the greatest weight in the text. ACM Trans. Intell. Syst. Technol., 4(4), 2013. Highlighting these terms, and then determine their 6. B. Liu, M. Hu, and J. Cheng, “Opinion tone, it can be concluded about the tone the entire observer: analyzing and comparing opinions on the text. web," in WWW '05: Proceedings of the 14th international conference on World Wide Web. New 2.4 Conclusion York, NY, USA: ACM, 2005, pp. 342-351. It is possible to draw some conclusions about 7. T. Wilson, J. Wiebe, and P. Hoffman. 2005. where, theoretically and practically, the concept of Recognizing contextual polarity in phrase level text analysis tonality could be applied sentiment analysis. Firstly, until recently, the machine understand the 8. A. Pak and P. Paroubek. Twitter as a corpus for text on an abstract level - mainly through tokens sentiment analysis and opinion mining. Volume (words), which had a form for her (a set of letters) 2010, pages 1320-1326, 2010. and the content (value). This concept proposes to introduce another function - the so-called lexical

168

2st IC ITS&I 2016, May 19, Almaty, Kazakhstan

Исследование элементов тональности в семантической сети

Б.Жунис, Р.Сатыбалдиева

Международный Университет Информационных Технологий, Департамент Информационных Систем, 34 «А»/8 «А» ул. Манаса./ул.Жандосова, Алматы 050040, Казахстан

Анализируя эмоциональную окраску положительных и отрицательных постов из социальных сетей, в результате можно получить метод анализа на определение сентиментальности постов, их сравнение и применение в дальнейшем автоматизации. В данной статье рассматриваются ключевые понятия и задачи анализа тональности текста, а также методы классификации. Предлагаемая статья посвящена исследованию существующих методов анализа тональности текстов.

Семантикалық желіде элементтер үнін ғылыми-зерттеу

Б. Жүніс, Р. Сатыбалдиевa

Халықаралық Ақпараттық Технологиялар Университеті, Ақпараттық Жүйесінің Департаменті, 34 «А»/8 «А» Манас к./Жандосов к., Алматы 050040, Қазақстан

Бұл мақалада мәтіннің элементтер үнін талдаудың негізгі ұғымдары мен міндеттері, сондай-ақ жіктеу әдістері қараластырылады. Ұсынылып отырған мақала мәтіннің элементтер үнін талдаудың қолданыстағы әдістерін зерттеуге арналған.

169