Pub Date : 2018-11-01DOI: 10.1109/ICECCO.2018.8634734
Zhumaniyaz Mamatnabiyev, R. Suliyev
Smart things which are used as internet devices are the most discussed topics in so-called Internet of Things area last few years. “Smart homes” and “smart cities” become most mentioned topics with each year. Researches and advances in this field affect the availability and affordability of Internet of Things (IoT) devices. This paper describes a specific solution for “smart home” safety and house automation system controlled by web application and hardware using IoT Technologies. Householders will be able to control their house just running an application in their hand device and will be informed about household appliances which are designed using IoT devices.
{"title":"Development of House Automation System Controlled Using IoT Technologies","authors":"Zhumaniyaz Mamatnabiyev, R. Suliyev","doi":"10.1109/ICECCO.2018.8634734","DOIUrl":"https://doi.org/10.1109/ICECCO.2018.8634734","url":null,"abstract":"Smart things which are used as internet devices are the most discussed topics in so-called Internet of Things area last few years. “Smart homes” and “smart cities” become most mentioned topics with each year. Researches and advances in this field affect the availability and affordability of Internet of Things (IoT) devices. This paper describes a specific solution for “smart home” safety and house automation system controlled by web application and hardware using IoT Technologies. Householders will be able to control their house just running an application in their hand device and will be informed about household appliances which are designed using IoT devices.","PeriodicalId":399326,"journal":{"name":"2018 14th International Conference on Electronics Computer and Computation (ICECCO)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115014415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper included the results of scientific research and analysis two cities (Almaty, Astana) of the country to assess the quality indicators of healthcare. In addition, to study the relationship between studied observations or regions we used linear regression analysis, time series analysis and SAS programming language, correlation analysis for predicting, analyzing and presenting.
{"title":"The Analysis of Indexes Quality of a Healthcare in Kazakhstan","authors":"Aipenova Aziza, Khuandykh Araily, Baimuratov Olimzhon","doi":"10.1109/ICECCO.2018.8634681","DOIUrl":"https://doi.org/10.1109/ICECCO.2018.8634681","url":null,"abstract":"This paper included the results of scientific research and analysis two cities (Almaty, Astana) of the country to assess the quality indicators of healthcare. In addition, to study the relationship between studied observations or regions we used linear regression analysis, time series analysis and SAS programming language, correlation analysis for predicting, analyzing and presenting.","PeriodicalId":399326,"journal":{"name":"2018 14th International Conference on Electronics Computer and Computation (ICECCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114656172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICECCO.2018.8634666
Salisu Ibrahim Yusuf, S. Junaidu
In a distributed parallel query execution, complex queries are executed by splitting them into partially related simple subqueries executing each on a different node, communication between machines is often done by message exchange for shared-nothing architecture based grid. Integrity of messages can be lost by temporary or permanent interference along the communication network. Fault tolerance strategies are used to keep the system running in the presence of fault. This is traditionally done through query restart, replication or check pointing and other variations of these approaches to improve latency, restoration time and reduce cost of execution. These processes include: monitoring, detection and tolerance. Transient faults are caused by interference in the medium of exchange which may pass undetected but yielding an incorrect query result. Moreover, the traditional fault tolerance, there is a strong dependency between the nodes. In this research we proposed a model of a fault tolerance strategy that will allow self-detection and tolerate transient fault with less dependency between nodes. The model will be compared with the tradition strategies in terms of detection ability, inter node dependency, and cost of execution.
{"title":"Parallel and Distributed Intra Query Transient Fault Tolerance Model via Parity Checking","authors":"Salisu Ibrahim Yusuf, S. Junaidu","doi":"10.1109/ICECCO.2018.8634666","DOIUrl":"https://doi.org/10.1109/ICECCO.2018.8634666","url":null,"abstract":"In a distributed parallel query execution, complex queries are executed by splitting them into partially related simple subqueries executing each on a different node, communication between machines is often done by message exchange for shared-nothing architecture based grid. Integrity of messages can be lost by temporary or permanent interference along the communication network. Fault tolerance strategies are used to keep the system running in the presence of fault. This is traditionally done through query restart, replication or check pointing and other variations of these approaches to improve latency, restoration time and reduce cost of execution. These processes include: monitoring, detection and tolerance. Transient faults are caused by interference in the medium of exchange which may pass undetected but yielding an incorrect query result. Moreover, the traditional fault tolerance, there is a strong dependency between the nodes. In this research we proposed a model of a fault tolerance strategy that will allow self-detection and tolerate transient fault with less dependency between nodes. The model will be compared with the tradition strategies in terms of detection ability, inter node dependency, and cost of execution.","PeriodicalId":399326,"journal":{"name":"2018 14th International Conference on Electronics Computer and Computation (ICECCO)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICECCO.2018.8634766
Zheniskul Zhantassova, A. Tlebaldinova, A. Nugumanova, A. Zhurtpayeva, Meruert Kavdarova
This paper presents the main stages of software development in different aspects of children's oral and written speech. The program enables to work with a wide range of speech units from sound to text, to solve various surdologopedic tasks: from adjusting speech breathing, voice and pronunciation to the development of the lexical and grammatical aspect of speech. The software scope of the tasks to be solved includes game moments in the process of correcting speech deficiencies, multiple playback of the necessary type of exercises and speech activities, work at different levels of complexity depending on student's abilities along with the speech therapy that develops perception, attention and memory. When creating the program, the psychological features and visual perception of children with speech deficiencies as well as the locomotive system and intellectual disorders were taken into account. The program contains an entertaining plot based on the national features. The software development is based on Adobe Flash technology, which is a powerful tool with great potential in terms of creating large and functional applications.
{"title":"Software Development for the Correction of Various Aspects of Children's Oral and Written Speech (Based on Latin Alphabet)","authors":"Zheniskul Zhantassova, A. Tlebaldinova, A. Nugumanova, A. Zhurtpayeva, Meruert Kavdarova","doi":"10.1109/ICECCO.2018.8634766","DOIUrl":"https://doi.org/10.1109/ICECCO.2018.8634766","url":null,"abstract":"This paper presents the main stages of software development in different aspects of children's oral and written speech. The program enables to work with a wide range of speech units from sound to text, to solve various surdologopedic tasks: from adjusting speech breathing, voice and pronunciation to the development of the lexical and grammatical aspect of speech. The software scope of the tasks to be solved includes game moments in the process of correcting speech deficiencies, multiple playback of the necessary type of exercises and speech activities, work at different levels of complexity depending on student's abilities along with the speech therapy that develops perception, attention and memory. When creating the program, the psychological features and visual perception of children with speech deficiencies as well as the locomotive system and intellectual disorders were taken into account. The program contains an entertaining plot based on the national features. The software development is based on Adobe Flash technology, which is a powerful tool with great potential in terms of creating large and functional applications.","PeriodicalId":399326,"journal":{"name":"2018 14th International Conference on Electronics Computer and Computation (ICECCO)","volume":"495 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116168700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICECCO.2018.8634692
Gulnur Tolebi, N. S. Dairbekov, D. Kurmankhojayev, Ravil Mussabayev
This paper presents an online model-free adaptive traffic signal controller for an isolated intersection using a Reinforcement Learning (RL) approach. We base our solution on the Q-learning algorithm with action-value approximation. In contrast with other studies in the field, we use the queue length in adddition to the average delay as a measure of performance. Also, the number of queuing vehicles and the green phase duration in four directions are aggregated to represent a state. The duration of phases is a precise value for the nonconflicting directions. Therefore, cycle length is non-fixed. Finally, we analyze and update the equilibrium and queue reduction terms in our previous equation of an immediate reward. Also, the delay based reward is tested in the given control system. The performance of the proposed method is compared with an optimal symmetric fixed signal plan.
{"title":"Reinforcement Learning Intersection Controller","authors":"Gulnur Tolebi, N. S. Dairbekov, D. Kurmankhojayev, Ravil Mussabayev","doi":"10.1109/ICECCO.2018.8634692","DOIUrl":"https://doi.org/10.1109/ICECCO.2018.8634692","url":null,"abstract":"This paper presents an online model-free adaptive traffic signal controller for an isolated intersection using a Reinforcement Learning (RL) approach. We base our solution on the Q-learning algorithm with action-value approximation. In contrast with other studies in the field, we use the queue length in adddition to the average delay as a measure of performance. Also, the number of queuing vehicles and the green phase duration in four directions are aggregated to represent a state. The duration of phases is a precise value for the nonconflicting directions. Therefore, cycle length is non-fixed. Finally, we analyze and update the equilibrium and queue reduction terms in our previous equation of an immediate reward. Also, the delay based reward is tested in the given control system. The performance of the proposed method is compared with an optimal symmetric fixed signal plan.","PeriodicalId":399326,"journal":{"name":"2018 14th International Conference on Electronics Computer and Computation (ICECCO)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129493487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICECCO.2018.8634700
Asim Balarabe Yazid, Moussa Mahamat Boukar, Salisu Ibrahim Yusuf
The graphical nature of graphical password nearly makes all graphical passwords vulnerable to shoulder attack. Humans want an easy method of authentication and powerful in terms of security. The problem in most techniques however, less vulnerable passwords are complicated, less user-friendly and lastly, login time takes very long. In this paper, a graphical password authentication technique proved to be more resistant to shoulder-surfing and other types of possible attacks have been proposed. PandaLock technique is a hybrid approach, which combines recall based and recognition based approach. Combination-lock interfaces with variable pointers are used to authenticate the users in this proposed system. A Portable handheld device was used to simulate and test the proposed system.
{"title":"PandaLock: Variable-Pointer Rotary-Password Authentication Technique","authors":"Asim Balarabe Yazid, Moussa Mahamat Boukar, Salisu Ibrahim Yusuf","doi":"10.1109/ICECCO.2018.8634700","DOIUrl":"https://doi.org/10.1109/ICECCO.2018.8634700","url":null,"abstract":"The graphical nature of graphical password nearly makes all graphical passwords vulnerable to shoulder attack. Humans want an easy method of authentication and powerful in terms of security. The problem in most techniques however, less vulnerable passwords are complicated, less user-friendly and lastly, login time takes very long. In this paper, a graphical password authentication technique proved to be more resistant to shoulder-surfing and other types of possible attacks have been proposed. PandaLock technique is a hybrid approach, which combines recall based and recognition based approach. Combination-lock interfaces with variable pointers are used to authenticate the users in this proposed system. A Portable handheld device was used to simulate and test the proposed system.","PeriodicalId":399326,"journal":{"name":"2018 14th International Conference on Electronics Computer and Computation (ICECCO)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132436718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}