Scientific Journal of Astana IT University https://journal.astanait.edu.kz/index.php/ojs <div> <p><strong>Registered and issued a <a href="https://sj.astanait.edu.kz/wp-content/uploads/2021/12/%D0%B6%D1%83%D1%80%D0%BD%D0%B0%D0%BB-%D1%81%D0%B2%D0%B8%D0%B4%D0%B5%D1%82%D0%B5%D0%BB%D1%8C%D1%81%D1%82%D0%B2%D0%BE_page-0001.jpg" target="_blank" rel="noreferrer noopener">certificate</a></strong> Ministry of Information and Social Development Of the Republic of Kazakhstan<br />No. KZ200074316 dated January 20, 2020</p> <p><strong>Published</strong>: since 2020<br /><strong>Frequency</strong>: quarterly (March, June, September, December)<br /><strong>Specialization:</strong> Information Technology<br /><strong>Owner:</strong> <a href="https://astanait.edu.kz/en/main-page/" target="_blank" rel="noreferrer noopener"><strong>LLP "Astana IT University"</strong></a> is the leading educational institution located in Astana, Kazakhstan, specializing in innovative, ongoing IT education and scientific research, underpinned by strong academic traditions and a robust commitment to social responsibility.</p> <p><strong>Publication language:</strong> English</p> <p><strong>The main goal </strong>of a scientific publication is to provide the opportunity for the exchange of information in the scientific community, including international level.</p> <p><strong>Area of expertise:</strong> technical and pedagogical sciences</p> <p><a href="maindirections:Section1. Information Technologies1 Information Security2 Information and communication technology (ICT)3 IT in management, administration, finance andeconomics4 Project managementSection2. Pedagogy5.Digitalization in education: technologies, models, methods"><strong>Main directions:</strong></a></p> <p><strong>I Information Technologies</strong><a href="maindirections:Section1. Information Technologies1 Information Security2 Information and communication technology (ICT)3 IT in management, administration, finance andeconomics4 Project managementSection2. Pedagogy5.Digitalization in education: technologies, models, methods"><br /></a>1 Information Security<br />2 Information and communication technology (ICT)<br />3 IT in management, administration, finance and economics<br />4 Project management</p> <p><strong>II Pedagogy</strong></p> <p>5. IT in learing and teaching</p> <p class="has-text-align-center"><strong>Chief-editor</strong><br /><strong><a href="https://sj.astanait.edu.kz/2086-2/" target="_blank" rel="noreferrer noopener">Andrii Biloshchytskyi</a></strong> – Doctor of Technical Sciences, Professor, Vice-Rector for Science and Innovation</p> <p class="has-text-align-center"><strong>Executive editors</strong><br /><strong><a href="https://sj.astanait.edu.kz/2093-2/" target="_blank" rel="noreferrer noopener">Beibut Amirgaliyev</a></strong> – Candidate of Technical Sciences, Associate Professor</p> <p class="has-text-align-center"><a href="https://sj.astanait.edu.kz/3552-2/" target="_blank" rel="noreferrer noopener"><strong>Nurkhat Zhakiyev</strong></a> – PhD in Physics, Director of the Department of Science and Innovation, Astana IT University</p> <p class="has-text-align-center" align="center">The journal is included in the list of publications recommended by the Committee for Quality Assurance in the Sphere of Science and Higher Education of the Ministry of Science and Higher Education of the Republic of Kazakhstan for the publication of the main results of scientific activities in the scientific areas “Information and Communication Technologies” (18.03.2022, No. 104) and “Pedagogy” (25.01.2024 No. 101).<br />Scientific works are <strong>accepted year-round</strong> to the journal, for more detailed information and to familiarize yourself with the publication requirements of your scientific papers, please do not hesitate to contact us.</p> <table border="1" cellspacing="0" cellpadding="0"> <tbody> <tr> <td valign="top" width="208"> <p> <img src="http://ojs.astanait.edu.kz/public/site/images/babyshark/gerb_sm.aaf449a0_2.png" alt="" /></p> <p><a href="https://www.gov.kz/memleket/entities/control/documents/details/287211?directionId=3826&amp;lang=en" target="_blank" rel="noreferrer noopener">CQASES of the MHES RK</a></p> </td> <td valign="top" width="208"> <p><a href="https://portal.issn.org/resource/issn/2707-9031" target="_blank" rel="noopener"><img src="http://ojs.astanait.edu.kz/public/site/images/babyshark/issn1.png" alt="" /><br /><br />(P): 2707-9031</a><br /><a href="https://portal.issn.org/resource/issn/2707-904X" target="_blank" rel="noopener">(E): 2707-904X</a></p> </td> <td valign="top" width="208"> <p> <img src="http://ojs.astanait.edu.kz/public/site/images/babyshark/doi1.png" alt="" /></p> <p><a href="https://apps.crossref.org/myCrossref/?report=missingmetadata&amp;datatype=j&amp;prefix=10.37943">10.37943/AITU.2020</a></p> </td> </tr> </tbody> </table> </div> <p> </p> <h2 class="has-text-align-left">OPEN ACCESS POLICY</h2> <p>Scientific Journal of Astana IT University is an open access journal. All articles are free for users to access, read, download, and print. The journal uses the <a href="https://creativecommons.org/licenses/by-nc-nd/3.0/deed.ru" target="_blank" rel="noreferrer noopener">CREATIVE COMMONS (CC BY-NC-ND)</a> copyright statement for open access journals.</p> en-US <p>Authors who publish a manuscript in this journal agree to the following terms:</p> <ul> <li>The authors reserve the right to authorship of their work and transfer to the journal the right of first publication under the terms of the <a href="https://creativecommons.org/licenses/by-nc-nd/3.0/deed.ru" target="_blank" rel="noreferrer noopener">Creative Commons Attribution License</a>, which allows others to freely distribute the published work with a mandatory link to the the original work and the first publication of the work in this journal.</li> <li>Authors have the right to conclude independent additional agreements that relate to the non-exclusive distribution of the work in the form in which it was published by this journal (for example, to post the work in the electronic repository of the institution or publish as part of a monograph), providing the link to the first publication of the work in this journal.</li> <li>Other terms stated in the <a href="https://sj.astanait.edu.kz/wp-content/uploads/2022/03/%D0%90%D0%92%D0%A2%D0%9E%D0%A0%D0%A1%D0%9A%D0%98%D0%99-%D0%94%D0%9E%D0%93%D0%9E%D0%92%D0%9E%D0%A0-%D0%B1%D0%B5%D0%B7-%D0%B7%D0%B0%D1%8F%D0%B2%D0%BA%D0%B8-ENG.pdf" target="_blank" rel="noopener">Copyright Agreement.</a></li> </ul> ojs@astanait.edu.kz (Andrii Biloshchitskyi) ojs@astanait.edu.kz (Zhansaya Makhambetova) Mon, 30 Jun 2025 00:00:00 +0500 OJS 3.3.0.8 http://blogs.law.harvard.edu/tech/rss 60 ENHANCED INFORMATION SECURITY FOR VOTING SYSTEM IN EMERGENCIES USING PAILLIER’S CRYPTOSYSTEM https://journal.astanait.edu.kz/index.php/ojs/article/view/598 <p>This study explores the application of Paillier’s Partial Homomorphic Encryption (PHE) in the context of secure digital voting systems, particularly in emergency situations such as pandemics, natural disasters, or martial law. The proposed system is implemented using Python with the Django framework and the pycryptodome library to ensure a secure and scalable environment. A key feature of Paillier’s cryptosystem is its ability to perform computations directly on encrypted data, which preserves voter confidentiality and guarantees data integrity without requiring decryption. A simulated voting scenario involving 10 voters and 3 candidates was conducted to evaluate the system. Encrypted votes were processed using homomorphic operations, allowing for the secure aggregation of votes. The results demonstrated that the system accurately computed vote totals—35 votes for Candidate A, 50 for Candidate B, and 100 for Candidate C—without compromising security. The system proved efficient and reliable for small-scale implementations. However, the study identifies significant challenges when scaling the system to national-level elections. The cryptographic operations required by Paillier’s scheme are computationally intensive and could hinder performance when processing millions of encrypted votes in real-time. Therefore, while the system shows high potential for secure e-voting, further research is required to optimize performance. The authors propose future work in two directions: optimizing the underlying cryptographic operations and integrating blockchain technologies to enhance transparency and auditability. Overall, the results suggest that Paillier’s PHE provides a robust framework for emergency e-voting systems and offers a substantial improvement over traditional voting methods in terms of both security and privacy.</p> Alnur Kussainov, Zeynep Galymzhankyzy, Dinara Akimova, Laura Aldasheva, Zamira Mukhtarova Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/598 Mon, 30 Jun 2025 00:00:00 +0500 AUDIO-TO-TEXT TRANSLATION FOR THE HARD OF HEARING: A WHISPER MODEL-BASED STUDY https://journal.astanait.edu.kz/index.php/ojs/article/view/681 <p>This study investigates the effectiveness of the Whisper model for audio-to-text transcription, specifically targeting the enhancement of accessibility for individuals with hearing impairments. The research focuses on the processing of audio recordings obtained from WhatsApp messenger, which often contain significant background noise that complicates speech recognition. To address this issue, advanced audio processing techniques were employed, including the use of the Librosa library and the Noisereduce package for noise reduction. The spectral gating methods applied in this study effectively diminished wind noise and other ambient sounds, allowing for clearer recognition of spoken content. To ensure the quality of the processed audio, we assessed its clarity using a SimpleRNN model. The training results demonstrated a progressive reduction in loss values across epochs, confirming the successful enhancement of audio quality. Once the audio files were adequately cleaned, we utilized the Whisper model, a sophisticated machine learning tool for speech recognition developed by OpenAI, to transcribe the audio into text. The transcription process yielded accurate Kazakh language output, despite the initial challenges posed by background noise. These findings underscore the critical role of high-quality audio input in achieving reliable transcription results and highlight the potential of machine learning technologies in improving communication access for hearing-impaired individuals. This study concludes with recommendations for future research, including the exploration of additional noise reduction techniques and the application of the Whisper model across various languages and dialects. Such advancements could significantly contribute to creating more inclusive digital environments and enhancing the overall user experience for individuals with hearing impairments.</p> Arypzhan Aben, Gulnur Kazbekova, Zhuldyz Ismagulova, Gulmira Ibrayeva Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/681 Mon, 30 Jun 2025 00:00:00 +0500 CLASSIFICATION OF HUMAN EMOTIONS USING THERMOGRAMS AND NEURAL NETWORK https://journal.astanait.edu.kz/index.php/ojs/article/view/696 <p>As information systems and technologies continue to evolve, there remains a noticeable gap in the efficiency and practicality of data processing algorithms, especially in the field of emotion recognition. This study explores several neural network models designed to classify emotions based on thermal images (thermograms). The dataset used for training included 1,642 images, some of which were generated through augmentation, with all images captured while participants viewed emotionally charged videos. The goal was to recognize six basic emotions: joy, sadness, fear, disgust, anger, and surprise. To identify the most effective architecture, the performance of five models were compared: a standard convolutional neural network (CNN), Quadruplet Network, U-Net, Inception, and SqueezeNet. Each model was trained on the same dataset under consistent conditions. Classification accuracy and validation loss were the main evaluation metrics. In addition, data augmentation and early stopping were applied to improve generalization and prevent overfitting. Among the tested architectures, the Inception model achieved the highest test accuracy of 97.5%, while the Quadruplet Network achieved 96.85% accuracy with a lower validation loss of 0.571, indicating stronger generalization. These results suggest that both models are well-suited for real-time emotion recognition using thermal imaging. The findings highlight the potential of combining infrared data with modern neural architectures to advance emotion detection systems beyond traditional RGB-based methods.</p> Evan Yershov, Madiyar Nurgaliyev, Gulbakhar Dosymbetova, Batyrbek Zholamanov, Sayat Orynbassar, Tomiris Khumarbekkyzy Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/696 Mon, 30 Jun 2025 00:00:00 +0500 GLOVE-EMBEDDED ATTENTION BILSTM NETWORKS FOR ENHANCED MULTICLASSIFICATION OF TWEETS IN CYBERBULLYING DETECTION ON ONLINE CONTENT https://journal.astanait.edu.kz/index.php/ojs/article/view/708 <p>This paper offers a neural network method for social media cyberbullying detection and classification. The model uses GloVe-embedded BiLSTM networks with self-attention to recognize language and semantic patterns. The research uses advanced machine learning methods to fight cyberbullying and suggests ways to improve cyberbullying detection systems' precision and ethics. The proposed paradigm addresses several cyberbullying levels and forms, enabling targeted interventions and victim support. GloVe implementations do semantic processing, BiLSTM networks sequentially learn, and self-attention mechanisms focus contextual analysis in the model. Word clouds show the abundance and relevance of phrases across several cyberbullying categories, revealing common themes and vocabulary. Tweet lengths, confusion matrix, training and validation loss and accuracy metrics, and ROC curves included in the dataset. The logistic regression model's ROC curve investigation shows substantial classification performance across multiple categories with AUC values between 0.905 and 0.997. The best model for age categorization has an AUC of 0.997, followed by religion (0.996) and ethnicity (0.993). Gender classification has an AUC of 0.979, whereas cyberbullying and non-cyberbullying have 0.921 and 0.905, respectively. The logistic regression model's ROC curve investigation shows substantial classification performance across multiple categories with AUC values between 0.905 and 0.997. The best model for age categorization has an AUC of 0.997, followed by religion (0.996) and ethnicity (0.993). Gender classification has an AUC of 0.979, whereas cyberbullying and non-cyberbullying have 0.921 and 0.905, respectively. The study encourages AI technology for social good and emphasizes the need to improve categorization algorithms to handle cyberbullying language's complex changes. Expanding training datasets, exploring hybrid modeling methodologies, and creating AI application ethics must be future goals.</p> Batyrkhan Omarov, Rustam Abdrakhmanov, Aigerim Toktarova Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/708 Mon, 30 Jun 2025 00:00:00 +0500 DETECTION OF HATE SPEECH ON SOCIAL MEDIA UTILIZING MACHINE LEARNING https://journal.astanait.edu.kz/index.php/ojs/article/view/709 <p>This article investigates the identification of hate speech on social media using machine learning and deep learning techniques. The research uses metrics such as F-measure, AUC-ROC, precision, accuracy, and recall assessing the effectiveness of various tactics. The findings indicate that deep learning models, particularly the bidirectional long short-term memory (BiLSTM) architecture, consistently outperform other methods in categorization tasks. The research emphasizes the importance of sophisticated neural network designs in identifying the intricacies of hostile and offensive content online. The study offers insights for promoting early identification and prevention of cyberbullying, improving secure and inclusive online environments. Future research may explore real-time detection systems, hybrid approaches, or the integration of complementary components to enhance and improve innovative technology in tackling this significant social issue.</p> <p>A sample tweet was annotated by specialists who categorize tweets as hate speech, offensive language, or neutral. The researchers applied shallow learning methodologies and integrated word embeddings like Word2Vec and GloVe to enhance the efficacy of deep learning models. The results indicate that BiLSTM surpasses shallow learning methods in detecting hate speech on Twitter, highlighting the efficacy of deep learning approaches in recognizing and tracking hate speech on social media platforms. When comparing different deep learning and machine learning models on different datasets, the results reveal that deep learning techniques are usually more effective. A reasonably high level of accuracy is achieved by KNN and SVM among classical algorithms, whereas Naïve Bayes performs the poorest. While deep learning approaches provide better results, tree-based models such as Random Forest and Decision Trees offer more consistent accuracy. Models based on neural networks, such as LSTM, CNN, and BI-LSTM, perform well, with LSTM-based methods excelling in particular. The most successful strategy for classification problems is the model presented, which obtains the greatest accuracy, precision, recall, F1-score of 95%. The research aids in the development of advanced tools and methodologies to mitigate hate speech on social media and foster positive online interactions. Future research may investigate alternative deep learning architectures, such as transformers, to enhance hate speech detection efficacy. The advancement of interpretable AI methodologies for identifying hate speech and delivering transparent forecasts might enhance user confidence and facilitate better content moderation decisions.</p> Aziza Zhidebayeva, Sabira Akhmetova, Satmyrza Mamikov, Mukhtar Kerimbekov, Sapargali Aldeshov, Guldana Shaimerdenova Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/709 Mon, 30 Jun 2025 00:00:00 +0500 COMBINED APPROACH BASED ON HARALICK AND GABOR FEATURES TO CLASSIFY BUILDINGS PARTIALLY HIDDEN BY VEGETATION https://journal.astanait.edu.kz/index.php/ojs/article/view/718 <p>Classification of urban area is important for urban planning, infrastructure management and detection of illegal constructions. However, automatic object recognition in urban environments is difficult due to textural similarity of materials, varying lighting conditions and partial overlap of buildings with vegetation. The identification of buildings partially hidden by green spaces is particularly challenging because their boundaries merge with the surrounding environment, which reduces the accuracy of traditional classification methods. In this study, a stepwise approach to object classification in aerial images is proposed to improve the recognition of buildings partially hidden by vegetation. The analysis was performed in two stages using three-channel high-resolution aerial images acquired from an unmanned aerial vehicle. In the first stage, classification was performed based on Haralick features computed from a co-occurrence matrix of gradations, which allowed the extraction of statistical texture features. However, this was insufficient for accuracy, so in the second stage, a Gabor filter was additionally applied to provide analysis of local texture features, taking into account the frequency and orientation of image elements. The final classification was performed using Random Forest algorithm, which allowed to divide objects into three categories: "buildings", "vegetation" and "buildings partially hidden by vegetation". The classes "buildings" and "vegetation" were considered as auxiliary, providing quality control of the classification and allowing us to focus on improving the recognition of objects partially occluded by vegetation. Experimental results confirmed that the proposed method is effective for recognizing buildings partially hidden by vegetation. The inclusion of the Gabor filter improved the classification accuracy of this class from 0.84 to 0.90, the completeness from 0.74 to 0.86, and the F1-estimation from 0.79 to 0.88. The 11% improvement in completeness is particularly important because it indicates a reduction in the number of missed buildings. In comparison, the classification accuracy of fully visible buildings increased from 0.84 to 0.91 and that of vegetation from 0.88 to 0.95. Thus, the proposed method, which combines global and local texture features, demonstrated high performance to improve the identification accuracy of complex objects whose boundaries merge with the surrounding vegetation.</p> Dilyara Nazyrova, Zhangeldi Aitkozha, Seyit Kerimkhulle, Gulmira Omarova Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/718 Mon, 30 Jun 2025 00:00:00 +0500 DEVELOPMENT OF IMAGE CAPTION GENERATION HYBRID MODEL https://journal.astanait.edu.kz/index.php/ojs/article/view/726 <p>This study presents a hybrid model for image captioning using a VGG16 convolutional neural network (CNN) for feature extraction and a long short-term memory (LSTM) network for sequential text generation. The proposed architecture addresses the challenges of producing semantically rich and syntactically accurate signatures, especially in languages with limited training data. The model effectively bridges the semantic gap between visual and textual modalities by utilizing pre-trained weights and a robust encoding-decoding system. Experimental results on a dataset of road signs in Kazakhstan show a significant improvement in inscription quality as measured by BLEU and METEOR metrics. The model achieved a maximum METEOR score of 0.9985, indicating high semantic accuracy, and BLEU-1 and BLEU-2 scores of 0.67 and 0.64, respectively, highlighting the model's ability to generate relevant and coherent captions. These findings underscore the model's potential applications in multimodal systems and assistive technologies. Using a pre-trained CNN model (VGG16), we can efficiently encode visual information by extracting high-level features from images. This approach is particularly useful for tasks that require consideration of the semantics of images, such as road sign recognition. The second LSTM model, as a sequence-oriented architecture, is well-suited for text generation, as it effectively considers the context and previous words in a sequence. These models can be integrated into systems requiring the analysis and description of visual information, such as autonomous vehicles or driver assistance systems. In conclusion, the proposed model demonstrates high potential for image caption generation tasks, especially in resource-constrained environments and for specialized datasets.</p> Aigul Mimenbayeva, Rakhila Turebayeva, Assem Konurkhanova Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/726 Mon, 30 Jun 2025 00:00:00 +0500 METHODS OF INFORMATION SECURITY IN THE INTERNET OF THINGS (IOT) NETWORKS USING QUANTUM MACHINE LEARNING https://journal.astanait.edu.kz/index.php/ojs/article/view/755 <p>The development of the Internet of Things (IoT) poses serious security challenges due to the vulnerability of devices and network connections. IoT devices often have limited computing resources, which makes it difficult to implement traditional security methods such as encryption and intrusion detection systems. In addition, the dynamic nature and high complexity of IoT networks create additional security challenges, requiring the development of new, more effective security methods. Traditional machine learning algorithms used to protect IoT networks have their limitations in terms of scalability and ability to effectively cope with large volumes of data, as well as new types of threats. These algorithms are often unable to quickly respond to anomalies, which significantly increases the risk of cyberattacks. In this regard, there is a need to find new solutions to improve the security of IoT networks.</p> <p>This paper proposes a new approach to IoT security using quantum machine learning (QML), which combines the capabilities of quantum computing with machine learning algorithms to create more powerful models for detecting threats and anomalies in IoT networks. We analyze various QML algorithms, such as quantum support vector machines (QSVMs), quantum neural networks (QNNs), and quantum reinforcement learning (QRL), applied to solve security problems. Experiments conducted using the dataset confirm the effectiveness of quantum algorithms compared to traditional machine learning methods. The results show that QML models provide higher accuracy in detecting threats and anomalies, and significantly reduce the time spent on processing and training compared to classical methods. In conclusion, we argue that using QML to protect IoT networks can significantly improve their security and efficiency, opening up new prospects for further research in this area.</p> Assemgul Sadvakassova, Alimzhan Yessenov Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/755 Mon, 30 Jun 2025 00:00:00 +0500 USING GRAPH CENTRALITY METRICS FOR DETECTION OF SUSPICIOUS TRANSACTIONS https://journal.astanait.edu.kz/index.php/ojs/article/view/757 <p>This study addresses the critical challenge of detecting suspicious transactions in modern financial networks, focusing on the persistent threat of money laundering and related fraudulent activities. We propose a graph-based approach where each financial participant—whether an individual or an institution—is modeled as a node, and directed edges represent the flow of transactions. Using a dataset of anonymized banking records, we construct a directed graph and then calculate centrality measures, including degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality. These metrics quantify how actively each node participates in or controls the circulation of funds across the network. Nodes characterized by particularly high values for betweenness or degree centrality emerge as potential “bridge” entities, acting as conduits for the majority of transaction paths. Our results indicate that these high-centrality participants may be key to understanding illicit financial flows, because they facilitate significant volumes of transactions or exert disproportionate influence by connecting otherwise separate sub-networks. Furthermore, a visualization of subgraphs around these nodes reveals tightly knit structures, suggesting the presence of possible hidden clusters that could be orchestrating complex money-laundering schemes. Overall, the proposed network-driven approach provides an efficient lens for early detection of suspicious accounts and transaction routes, especially when integrated with contemporary machine learning technologies for real-time analytics. The study concludes that centrality-based screening can enhance both the speed and accuracy of anti-fraud interventions, thereby strengthening the resilience of financial institutions in an increasingly data-rich and interconnected global economy.</p> Rustem Baigabyl, Aliya Nugumanova, Mariia Sodnomova Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/757 Mon, 30 Jun 2025 00:00:00 +0500 BALANCING SPEED AND PERFORMANCE WITH LAYER FREEZING STRATEGIES FOR TRANSFORMER MODELS https://journal.astanait.edu.kz/index.php/ojs/article/view/779 <p>In this paper, we evaluated different approaches to freezing BERT-base layers and analyzed their impact on the quality and speed of training in the task of named entity recognition in two languages. Layer freezing is an optimization technique in deep neural network training in which specific layers of a model remain fixed. This means their weights do not change during the backpropagation process. By not updating these layers, the overall number of parameters requiring adjustment is reduced, which results in lower computational demands and faster training times. Partial freezing of layers proved to be an effective way to preserve key representations of the model and ensure its adaptation to new tasks. Experimental results showed that freezing from three to six layers allows to achieve stable model performance regardless of the training language. Unlike standard approaches, our method highlights cross-linguistic applicability and promotes energy-efficient training. We personally designed the experimental setup, implemented the freezing scenarios, and carried out all performance evaluations. This study aims to evaluate the effectiveness of layer freezing in a pre-trained BERT model when performing the named entity recognition task. Two variants of the freezing strategy are considered: in the first one the upper layers of the model are fixed, in the second one the lower layers remain unchanged. The analysis is based on two corpora, the English language CoNLL 2003 and the Kazakh language KazNERD. Our experiments showed that freezing three to six layers provides the best balance between training speed and model quality. On the CoNLL-2003 dataset, the training time decreased from 266 to 167 seconds and the Macro F1 score remained at 87%. On KazNERD, learning accelerated from 1609 to 958 seconds with an accuracy of 94-95 % and Macro F1 in the range of 71-72 %. Full freezing of all 12 layers caused a dramatic drop in quality, with Macro F1 dropping to 50 % on CoNLL and to 7 % on KazNERD. This emphasises the importance of limited freezing and fine-tuning of the model architecture.</p> <p>The study further examines how the choice of layers to freeze influences the model’s ability to adapt to new linguistic patterns and domain-specific terminology. These findings offer useful insights for researchers and practitioners aiming to enhance the efficiency of fine-tuning large language models while ensuring robust performance across different languages and datasets. The results also highlight the potential for optimizing resource usage in various NER applications without compromising critical language understanding.</p> Bauyrzhan Kairatuly, Aday Shomanov Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/779 Mon, 30 Jun 2025 00:00:00 +0500 EVALUATING AN ANALYTICAL MODEL OF CYBERATTACK EFFECTS ON AN IIoT SYSTEM WITH EDGE COMPUTING CAPABILITIES https://journal.astanait.edu.kz/index.php/ojs/article/view/782 <p>The Industrial Internet of Things (IIoT) is an important component of future industrial systems. Implementing edge computing in the IIoT can significantly reduce decision latency, save bandwidth resources, and protect privacy to some extent. But it is important to realize that edge computing is often resource-constrained, and devices are often spread across vast geographic areas, including intermittent network connectivity. Such conditions increase security vulnerabilities due to increased attack surfaces and physical availability. This paper addresses the problem of securing IIoT systems utilizing the concept of edge computing. An analytical model of attack influences is proposed, including typical scenarios and individual steps of attacks, both physical and software-informational in nature. The presented analytical model is designed to assess and analyze attack impacts on IIoT, implements the concept of boundary calculations, allows to analyze vulnerabilities of IIoT systems more effectively and develop measures to protect them. The model is designed to provide a comprehensive tool for securing critical infrastructures. The model includes typical attack scenarios, detailed attack steps, and impact classification. The developed model can be used for risk analysis, development of protection strategies, and security testing of IIoT systems. The conducted experimental study confirmed the relevance and practical significance of the developed model. The results of the study showed that IIoT-systems using edge computing are subject to a wide range of threats. The most critical are DoS attacks and Data Integrity Attacks. The obtained results emphasize the need to apply comprehensive security measures for IIoT systems with edge computing and confirm the effectiveness of the proposed analytical model.</p> Tamara Zhukabayeva, Aigul Adamova, Assel Abdildayeva, Nurdaulet Karabayev Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/782 Mon, 30 Jun 2025 00:00:00 +0500 DEVELOPMENT OF THE INTEGRATED WATER RESOURCES MONITORING AND FORECASTING MODULE FOR DECISION SUPPORT SYSTEMS AT HYDROTECHNICAL STRUCTURES https://journal.astanait.edu.kz/index.php/ojs/article/view/833 <p>Nowadays, it is necessary to use monitoring and forecasting technologies for effective water resources management at water management facilities. The objective of this study is to develop and verify an integrated approach to water resources forecasting with the task of identifying features for forecasting, designing a data preprocessing submodule and a forecasting module. The workflow diagram of the water forecasting system includes sequential stages of data collection, preprocessing, filtering, feature extraction, and training. Sentinel-2 and MODIS satellite sources were used for data preprocessing. Predictors for the formation of time series by normalized difference water index (NDWI) and water surface temperature (LST) were selected in the feature engineering stage. The XGBoost Regressor algorithm was chosen due to its ability to model nonlinear relationships and feature interactions. Excluding winter months improved the model performance for all metrics, which demonstrates the importance of seasonal filtering when working with optical satellite data. The machine learning algorithm takes into account the analysis of satellite data (NDWI and LST indices) through the Google Earth Engine (GEE) platform. Both seasonal and long-term dynamics of water volumes in the Tasotkel reservoir are monitored for the period from 2020 to 2024. In practice, image initial filtering submodules were developed using linear regression and the XGBoost model. Model trained without winter data shows high performance using Metrics Mean Absolute Error (MAE) of 52.793, Root Mean Squared Error (RMSE) of 60.276, coefficient of determination (R<sup>2</sup>) of 0.673 and Mean Squared Error (MSE) of 3633.252 metrics. However, a decrease in clarity was observed due to snow and ice on reflective properties in winter. For the purpose of rational water resources management, the combination of satellite images and machine learning algorithms in this study shows the prospects for development.</p> Aliya Aubakirova, Andrii Biloshchytskyi , Mukhtar Orazbay , Ilyas Kazambayev , Alexandr Neftissov Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/833 Mon, 30 Jun 2025 00:00:00 +0500 MULTI-OUTPUT BUS TRAVEL TIME PREDICTION USING CONVOLUTIONAL LSTM NEURAL NETWORKS https://journal.astanait.edu.kz/index.php/ojs/article/view/809 <p>Ensuring accurate and dependable predictions of bus arrival times is essential to improving public transportation services and maintaining their appeal in urban settings. Such predictions, whether displayed on electronic boards or integrated into mobile applications, enable passengers to make better travel decisions, such as choosing alternate routes, anticipating delays, or avoiding missed connections. Furthermore, advanced Intelligent Transport Systems (ITS) utilize this information to facilitate smoother passenger transfers by holding delayed services within predefined limits. However, as urban congestion and travel time unpredictability grow, traditional methods face significant challenges in providing reliable predictions, making the problem increasingly complex. This research focuses on developing a robust system for forecasting bus arrival times in Astana city, utilizing extensive spatio-temporal data from two datasets. Multiple machine learning and deep learning models are implemented and compared to achieve this goal. These include K-means clustering to classify bus routes, K-Nearest Neighbors (KNN) for predictions based on proximity, and a Conv-LSTM model, which integrates convolutional and long short-term memory layers to address intricate temporal and spatial correlations. Support Vector Machines (SVM) and regression models are also incorporated to establish benchmarks and comparative insights. Through empirical evaluation, the proposed models demonstrate varying strengths, with the Conv-LSTM model showing exceptional performance in adapting to dynamic urban conditions and detecting subtle fluctuations in bus travel times. The findings highlight the transformative potential of sophisticated predictive modeling techniques to enhance urban transit systems, ensuring passengers receive timely and accurate information while improving overall operational efficiency.</p> <p> </p> Akmaral Kuatbayeva, Muslim Sergaziyev , Didar Yedilkhan , Daniyar Issenov , Assylbek Gizatov Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/809 Mon, 30 Jun 2025 00:00:00 +0500 EDUCATIONAL FLOWS DISTRIBUTION SYSTEM OF UNIVERSITY ACADEMIC GROUPS https://journal.astanait.edu.kz/index.php/ojs/article/view/828 <p>Planning of educational flows and academic groups by the Academic department is one of the responsible, complex and labor-intensive tasks solved at the stage of the educational process preparation in the university. When planning the work, the Academic department strives to improve the quality of work in order to achieve the best indicators for the types of educational work. One of the main tasks of the IT educational programs is the data analysis and construction of an automated system. Wide opportunities for the implementation of this goal are provided by the topic of scientific research, which is relevant both for the Academic department, which makes up the teaching load of the university, in which educational flows are involved, and for the university as a whole, for the teaching staff of all educational departments. The problem under consideration is really relevant in each higher educational institution and is of scientific interest due to the fact that insufficient attention is paid to mathematical modeling in software development. The aim of the paper is the development and software implementation of the automated system in Python to optimize the business process of distributing educational flows. For the efficiency of writing business processes for optimizing the formation of educational flows and academic groups, the architecture, algorithms and functional model of the software product are described. The functional model of the business process of forming educational flows and academic groups participating in the teaching load calculation at the stage of the educational process preparation at the university is considered. Moreover, the innovative product prototype has been created, which allows us to distribute educational flows evenly and quickly to a large extent, while fulfilling the accepted criteria and limitations of the model. The paper describes the architecture, algorithms and functional model of the software product, which corresponds to the IT field. The development of this innovative program will be useful both for beginners in Python programming and for developers creating their startups.</p> Diana Chigambayeva, Makar Goryakin, Polina Batova Copyright (c) 2025 Articles are open access under the Creative Commons License https://creativecommons.org/licenses/by-nc-nd/4.0 https://journal.astanait.edu.kz/index.php/ojs/article/view/828 Mon, 30 Jun 2025 00:00:00 +0500