База данных: Статьи
Страница 2, Результатов: 26
Отмеченные записи: 0
11.

Подробнее
65.262.6
B11
Babar , Khan
The role of cryptocurrency mining as source of replenishment of the budget [Текст] / Khan Babar , Zh. S Karabayeva // Транзитная экономика. - 2021. - №2. - с. 19-26
ББК 65.262.6
Рубрики: Денежное обращение
Кл.слова (ненормированные):
cryptocurrency -- bitcoin -- electronic transfers -- international transfers
Аннотация: In this article, we talk about bitcoin and analyze the role of cryptocurrencies in the modern world: a global view of the cryptocurrency, what functions it performs, and what you need to know to be ready for a new worid with a cyber economy. Cryptocurrency technology consists in the fact that by eliminating the need for an intermediary, it supports an infrastructure in which strangers can do business with each other. This is achieved due to the fact that the most important function of maintaining accounting registers is transferred from centralized financial institutions to a network of autonomous ones.
Держатели документа:
ЗКУ им М. Утемисова
Доп.точки доступа:
Karabayeva, Zh. S
B11
Babar , Khan
The role of cryptocurrency mining as source of replenishment of the budget [Текст] / Khan Babar , Zh. S Karabayeva // Транзитная экономика. - 2021. - №2. - с. 19-26
Рубрики: Денежное обращение
Кл.слова (ненормированные):
cryptocurrency -- bitcoin -- electronic transfers -- international transfers
Аннотация: In this article, we talk about bitcoin and analyze the role of cryptocurrencies in the modern world: a global view of the cryptocurrency, what functions it performs, and what you need to know to be ready for a new worid with a cyber economy. Cryptocurrency technology consists in the fact that by eliminating the need for an intermediary, it supports an infrastructure in which strangers can do business with each other. This is achieved due to the fact that the most important function of maintaining accounting registers is transferred from centralized financial institutions to a network of autonomous ones.
Держатели документа:
ЗКУ им М. Утемисова
Доп.точки доступа:
Karabayeva, Zh. S
12.

Подробнее
65.291.3
B69
Bokenchina, L. K.
Social network in personnel marketing [Текст] / L. K. Bokenchina, K. K. Bokenchin, V. Alibekova, G. Amalbekova // Қазақстан Республикасының Ұлттық Ғылыми Академиясының баяндамалары. - 2020. - №1. - P. 154-159
ББК 65.291.3
Рубрики: marketing
Кл.слова (ненормированные):
marketing -- online -- social media -- hiring -- human relations -- маркетинг -- онлайн -- социальные сети -- найм -- человеческие отношения
Аннотация: С современными опциями социальных сетей важно использовать все опции,доступные для целей найма.With modern options of social media it is essential to use all the options available for hiring purposes.
Держатели документа:
WKU
Доп.точки доступа:
Bokenchin, K.K.
Alibekova, V.
Amalbekova, G.
B69
Bokenchina, L. K.
Social network in personnel marketing [Текст] / L. K. Bokenchina, K. K. Bokenchin, V. Alibekova, G. Amalbekova // Қазақстан Республикасының Ұлттық Ғылыми Академиясының баяндамалары. - 2020. - №1. - P. 154-159
Рубрики: marketing
Кл.слова (ненормированные):
marketing -- online -- social media -- hiring -- human relations -- маркетинг -- онлайн -- социальные сети -- найм -- человеческие отношения
Аннотация: С современными опциями социальных сетей важно использовать все опции,доступные для целей найма.With modern options of social media it is essential to use all the options available for hiring purposes.
Держатели документа:
WKU
Доп.точки доступа:
Bokenchin, K.K.
Alibekova, V.
Amalbekova, G.
13.

Подробнее
32.973
K42
Khizirova, M. A.
Using of virtual private network technology for signal transmission in corporate networks. [Текст] / M. A. Khizirova, K. S. Chezhimbayeva, A. D. Mukhamejanova, Zh. D. Manbetova // News of national academy of sciences of the republic of Kazakhstan. - 2021. - №3. - P. 100-103
ББК 32.973
Рубрики: information Technology
Кл.слова (ненормированные):
corporate networks -- VPN -- tunneling traffic -- point-to-point connection -- server -- router
Аннотация: This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN.
Держатели документа:
WKU
Доп.точки доступа:
Chezhimbayeva, K.S.
Mukhamejanova, A.D.
Manbetova, Zh. D.
K42
Khizirova, M. A.
Using of virtual private network technology for signal transmission in corporate networks. [Текст] / M. A. Khizirova, K. S. Chezhimbayeva, A. D. Mukhamejanova, Zh. D. Manbetova // News of national academy of sciences of the republic of Kazakhstan. - 2021. - №3. - P. 100-103
Рубрики: information Technology
Кл.слова (ненормированные):
corporate networks -- VPN -- tunneling traffic -- point-to-point connection -- server -- router
Аннотация: This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN.
Держатели документа:
WKU
Доп.точки доступа:
Chezhimbayeva, K.S.
Mukhamejanova, A.D.
Manbetova, Zh. D.
14.

Подробнее
28
N94
Nurtas, M.
Applying neural network for predicting cardiovascular disease risk [Текст] / M. Nurtas, Zh. Baishemirov [et al.] // News of the National Academy Ofsciences of the Republic of Kazakhstan. - 2020. - №4. - P. 28-34
ББК 28
Рубрики: Biology
Кл.слова (ненормированные):
neural network -- cardiovascular system diseases -- predicting models -- supervised learning -- keras
Аннотация: This aticle concerns the problem of the prevalence of cardiovascular disease in economically developed countries.
Держатели документа:
WKU
Доп.точки доступа:
Baishemirov, Zh.
Tsay, V.
Tastanov, M.
Zhanabekov, Zh.
N94
Nurtas, M.
Applying neural network for predicting cardiovascular disease risk [Текст] / M. Nurtas, Zh. Baishemirov [et al.] // News of the National Academy Ofsciences of the Republic of Kazakhstan. - 2020. - №4. - P. 28-34
Рубрики: Biology
Кл.слова (ненормированные):
neural network -- cardiovascular system diseases -- predicting models -- supervised learning -- keras
Аннотация: This aticle concerns the problem of the prevalence of cardiovascular disease in economically developed countries.
Держатели документа:
WKU
Доп.точки доступа:
Baishemirov, Zh.
Tsay, V.
Tastanov, M.
Zhanabekov, Zh.
15.

Подробнее
34
M23
Mamyrbayev, O.
Modern trends in development of speech recognition systems [Текст] / O. Mamyrbayev, D. Oralbekova // News of the National Academy of sciences of the Republic of Kazakhstan. - 2020. - №4. - P. 42-51
ББК 34
Рубрики: Technics
Кл.слова (ненормированные):
automatic speech recognition -- hidden markov models -- end-to-end -- neural networks -- ctc
Аннотация: This article presents the main ideas, advantages and disadvantages of models based on hidden Markov models - a Gaussian mixture models, end-to-end models and indicates that the end-to-end model is a developing area in the filed of speech recognition.
Держатели документа:
WKU
Доп.точки доступа:
Oralbekova, D.
M23
Mamyrbayev, O.
Modern trends in development of speech recognition systems [Текст] / O. Mamyrbayev, D. Oralbekova // News of the National Academy of sciences of the Republic of Kazakhstan. - 2020. - №4. - P. 42-51
Рубрики: Technics
Кл.слова (ненормированные):
automatic speech recognition -- hidden markov models -- end-to-end -- neural networks -- ctc
Аннотация: This article presents the main ideas, advantages and disadvantages of models based on hidden Markov models - a Gaussian mixture models, end-to-end models and indicates that the end-to-end model is a developing area in the filed of speech recognition.
Держатели документа:
WKU
Доп.точки доступа:
Oralbekova, D.
16.

Подробнее
34
N93
Nurtas, M.
Convulutional neural networks as a method to solve estimation problem of acoustic wave propagation in poroelastic media [Текст] / M. Nurtas, Zh. Baishemirov [et al.] // News of the National Academy of sciences of the Republic of Kazakhstan. - 2020. - №4. - Р. 42-60
ББК 34
Рубрики: Technics
Кл.слова (ненормированные):
newral network -- convolutional neural network -- acoustic wave propagation -- predicting models -- supervised learning -- activation function -- pytorch
Аннотация: This article concerns the problem of the acoustic wave propagation in the 3 layered half-space.
Держатели документа:
WKU
Доп.точки доступа:
Baishemirov, Zh.
Tsay, V.
Tastanov, M.
Zhanabekov, Zh.
N93
Nurtas, M.
Convulutional neural networks as a method to solve estimation problem of acoustic wave propagation in poroelastic media [Текст] / M. Nurtas, Zh. Baishemirov [et al.] // News of the National Academy of sciences of the Republic of Kazakhstan. - 2020. - №4. - Р. 42-60
Рубрики: Technics
Кл.слова (ненормированные):
newral network -- convolutional neural network -- acoustic wave propagation -- predicting models -- supervised learning -- activation function -- pytorch
Аннотация: This article concerns the problem of the acoustic wave propagation in the 3 layered half-space.
Держатели документа:
WKU
Доп.точки доступа:
Baishemirov, Zh.
Tsay, V.
Tastanov, M.
Zhanabekov, Zh.
17.

Подробнее
16.632
K65
Kozhagulov, Y. T.
Comporative analysis of object detection processing speed on the basis of neuroprocessors end neuroaccelerators [Текст] / Y. T. Kozhagulov, D. M. Zhexebay, S. A. Sarmanbetov, D. Zholdas // News of the National Academy of sciences of the Republic of Kazakhstan. - 2020. - №4. - Р. 61-67
ББК 16.632
Рубрики: Neural network
Кл.слова (ненормированные):
convulutional neural network -- neuroaccelerators -- neuroprocessor -- object detection -- deep learning
Аннотация: This paper is devoted to a comparative analysis of neural network models based on neuroprocessos.
Держатели документа:
WKU
Доп.точки доступа:
Zhexebay, D.M.
Sarmanbetov, S.A.
Zholdas, D.
K65
Kozhagulov, Y. T.
Comporative analysis of object detection processing speed on the basis of neuroprocessors end neuroaccelerators [Текст] / Y. T. Kozhagulov, D. M. Zhexebay, S. A. Sarmanbetov, D. Zholdas // News of the National Academy of sciences of the Republic of Kazakhstan. - 2020. - №4. - Р. 61-67
Рубрики: Neural network
Кл.слова (ненормированные):
convulutional neural network -- neuroaccelerators -- neuroprocessor -- object detection -- deep learning
Аннотация: This paper is devoted to a comparative analysis of neural network models based on neuroprocessos.
Держатели документа:
WKU
Доп.точки доступа:
Zhexebay, D.M.
Sarmanbetov, S.A.
Zholdas, D.
18.

Подробнее
28
M23
Mamyrbayev , O.
Evidences propagations in bayesian networks [Текст] / O. Mamyrbayev , N. Litvinenko, A. Shayakhmetova // News of the National Academy of sciences of the Republic of Kazakhstan. - 2020. - №4. - Р. 119-126
ББК 28
Рубрики: Biology
Кл.слова (ненормированные):
bayesian networks -- orirnted graphs -- generation -- propagating
Аннотация: This paper is devoted to some problems of the distribution of several evidences in Bayesian networks.
Держатели документа:
WKU
Доп.точки доступа:
Litvinenko, N.
Shayakhmetova, A.
M23
Mamyrbayev , O.
Evidences propagations in bayesian networks [Текст] / O. Mamyrbayev , N. Litvinenko, A. Shayakhmetova // News of the National Academy of sciences of the Republic of Kazakhstan. - 2020. - №4. - Р. 119-126
Рубрики: Biology
Кл.слова (ненормированные):
bayesian networks -- orirnted graphs -- generation -- propagating
Аннотация: This paper is devoted to some problems of the distribution of several evidences in Bayesian networks.
Держатели документа:
WKU
Доп.точки доступа:
Litvinenko, N.
Shayakhmetova, A.
19.

Подробнее
22.3
M99
Myrzatay, A. A.
The effect of the amount of data array on the results of forecasting network equipment failures. [Текст] / A. A. Myrzatay, L. G. Rzayeva, G. A. Uskenbayeva, A. K. Shukirova, G. Abitova // News of national academy of sciences of the republic of Kazakhstan. . - 2021. - №6. - P. 28-36
ББК 22.3
Рубрики: physics
Кл.слова (ненормированные):
machine learning methods -- modeling of machine learning method -- network equipment failure forecasts -- LAN
Аннотация: The article discusses three methods for predicting network equipment failures and the impact of the data array of input controllers. The purpose of the article is to reveal the relevance of the approach proposed by the authors to the use of large-amount of data in the chosen method of machine learning and to make a comparative analysis of the final values with the works of other world researchers. In the first section, the authors analyze the work of scientists from the Beijing University of Post and Telecommunications, noting the strengths and weaknesses of their method. In Section 2, the authors analyze the Holt-Winters method for developing algorithms for analyzing network traffic, which was applied by researchers from the Tomsk State University of Control Systems and Radio Electronics. In section 3, the authors applied the method of random trees in the modeling of machine learning methods of Rapid Miner Studio. The authors have carried out work with a large amount of data, and a comparative analysis of the results of modeling the method. The importance of using large amounts of information to train a model of network equipment failure forecasts is proved. In the final section, the authors highlight the need to improve forecasting models for its further implementation in the working environment. Also, the authors emphasize that the two articles considered by international researchers are a special case, as well as their chosen method for predicting failures in the LAN system.
Держатели документа:
WKU
Доп.точки доступа:
Rzayeva, L.G.
Uskenbayeva, G.A.
Shukirova, A.K.
Abitova, G.
M99
Myrzatay, A. A.
The effect of the amount of data array on the results of forecasting network equipment failures. [Текст] / A. A. Myrzatay, L. G. Rzayeva, G. A. Uskenbayeva, A. K. Shukirova, G. Abitova // News of national academy of sciences of the republic of Kazakhstan. . - 2021. - №6. - P. 28-36
Рубрики: physics
Кл.слова (ненормированные):
machine learning methods -- modeling of machine learning method -- network equipment failure forecasts -- LAN
Аннотация: The article discusses three methods for predicting network equipment failures and the impact of the data array of input controllers. The purpose of the article is to reveal the relevance of the approach proposed by the authors to the use of large-amount of data in the chosen method of machine learning and to make a comparative analysis of the final values with the works of other world researchers. In the first section, the authors analyze the work of scientists from the Beijing University of Post and Telecommunications, noting the strengths and weaknesses of their method. In Section 2, the authors analyze the Holt-Winters method for developing algorithms for analyzing network traffic, which was applied by researchers from the Tomsk State University of Control Systems and Radio Electronics. In section 3, the authors applied the method of random trees in the modeling of machine learning methods of Rapid Miner Studio. The authors have carried out work with a large amount of data, and a comparative analysis of the results of modeling the method. The importance of using large amounts of information to train a model of network equipment failure forecasts is proved. In the final section, the authors highlight the need to improve forecasting models for its further implementation in the working environment. Also, the authors emphasize that the two articles considered by international researchers are a special case, as well as their chosen method for predicting failures in the LAN system.
Держатели документа:
WKU
Доп.точки доступа:
Rzayeva, L.G.
Uskenbayeva, G.A.
Shukirova, A.K.
Abitova, G.
20.

Подробнее
32.973
B16
Baisholan, N.
Software and mathematical support for attack prediction in information security events. [Текст] / N. Baisholan, M. Turdalyuly, K. S. Baisholanova, K. E. Kubayev, M. T. Tungyshbayev // News of national academy of sciences of the republic of Kazakhstan. . - 2021. - №6. - P. 42-47
ББК 32.973
Рубрики: information Technology
Кл.слова (ненормированные):
network anomaly -- networkinciden -- network attack -- SIEM system -- DLP system -- Irwin model -- prediction models
Аннотация: This article discusses the need to detect attacks in real-time management of information security events and identify anomalies to prevent any attacks. Authors pay attention to the predictive process as one of the management functions. Information security management also considers incidents as unexpected events that can compromise information security.
Держатели документа:
WKU
Доп.точки доступа:
Turdalyuly, M.
Baisholanova, K.S.
Kubayev, K.E.
Tungyshbayev, M.T.
B16
Baisholan, N.
Software and mathematical support for attack prediction in information security events. [Текст] / N. Baisholan, M. Turdalyuly, K. S. Baisholanova, K. E. Kubayev, M. T. Tungyshbayev // News of national academy of sciences of the republic of Kazakhstan. . - 2021. - №6. - P. 42-47
Рубрики: information Technology
Кл.слова (ненормированные):
network anomaly -- networkinciden -- network attack -- SIEM system -- DLP system -- Irwin model -- prediction models
Аннотация: This article discusses the need to detect attacks in real-time management of information security events and identify anomalies to prevent any attacks. Authors pay attention to the predictive process as one of the management functions. Information security management also considers incidents as unexpected events that can compromise information security.
Держатели документа:
WKU
Доп.точки доступа:
Turdalyuly, M.
Baisholanova, K.S.
Kubayev, K.E.
Tungyshbayev, M.T.
Страница 2, Результатов: 26