• CARDIAC DISEASE PREDICTION USING MACHINE LEARNING ALGORITMS 

      Toleubay, Daniyar Manatuly (L.N. Gumilyov Eurasian National University, 2025)
      This study focuses on the application of machine learning methods for predicting cardiac diseases, aiming to develop accurate and interpretable diagnostic models. The primary objective is to enhance prediction accuracy and identify key risk factors. Various classification algorithms, including Random Forest, Gradient Boosting, Support Vector Machines (SVM), and Neural ...
      2026-04-14
    • COMBATTING QAKBOT: A REVIEW OF DETECTION AND ANALYSIS TECHNIQUES 

      Zhangeldi, Aisulu Zhanibekkyzy (L.N.Gumilyov Eurasian National University, 2024)
      Qakbot, a multi-faceted botnet, continues to pose a significant threat to organizations worldwide. Its ability to steal sensitive data, deploy ransomware, and disrupt critical operations necessitates robust detection and analysis methods. This paper reviews the current state of the art in Qakbot analysis, examining existing techniques, their limitations, and promising avenues ...
      2024-11-18
    • Comprehensive Study on Detecting Multi-Class Classification of IoT Attack Using Machine Learning Methods 

      Zhukabayeva, Tamara; Zholshiyeva, Lazzat; Ven-Tsen, Khu; Adamova, Aigul; Karabayev, Nurdaulet; Mardenov, Erik (Journal of Robotics and Control (JRC), 2024)
      The proliferation of IoT devices has heightened their susceptibility to cyberattacks, particularly botnets. Conventional security methods frequently prove inadequate because of the restricted processing capabilities of IoT devices. This paper suggests utilizing machine learning methods to enhance the detection of attacks in Internet of Things (IoT) environments. The ...
      2026-03-18
    • Comprehensive Study on Detecting Multi-Class Classification of IoT Attack Using Machine Learning Methods 

      Zhukabayeva, Tamara; Zholshiyeva, Lazzat; Ven-Tsen, Khu; Adamova, Aigul; Karabayev, Nurdaulet; Mardenov, Erik (Journal of Robotics and Control (JRC), 2024)
      The proliferation of IoT devices has heightened their susceptibility to cyberattacks, particularly botnets. Conventional security methods frequently prove inadequate because of the restricted processing capabilities of IoT devices. This paper suggests utilizing machine learning methods to enhance the detection of attacks in Internet of Things (IoT) environments. The ...
      2026-03-10
    • Design of QazSL Sign Language Recognition System for Physically Impaired Individuals 

      Zholshiyeva, Lazzat; Zhukabayeva, Tamara; Baumuratova, Dilaram; Serek, Azamat (Journal of Robotics and Control (JRC), 2025)
      Automating real-time sign language translation through deep learning and machine learning techniques can greatly enhance communication between the deaf community and the wider public. This research investigates how these technologies can change the way individuals with speech impairments communicate. Despite advancements, developing accurate models for recognizing ...
      2026-03-11
    • Design of QazSL Sign Language Recognition System for Physically Impaired Individuals 

      Zholshiyeva, Lazzat; Zhukabayeva, Tamara; Baumuratova, Dilaram; Serek, Azamat (Journal of Robotics and Control (JRC), 2025)
      Automating real-time sign language translation through deep learning and machine learning techniques can greatly enhance communication between the deaf community and the wider public. This research investigates how these technologies can change the way individuals with speech impairments communicate. Despite advancements, developing accurate models for recognizing ...
      2026-03-18
    • Enhancing Fault Detection in Wireless Sensor Networks Through Support Vector Machines: A Comprehensive Study 

      Mardenov, Yerik; Adamova, Aigul; Zhukabayeva, Tamara; Othman, Mohamed (Journal of Robotics and Control, 2023)
      The Wireless Sensor Network (WSN) consists of many sensors that are distributed in a specific area for the purpose of monitoring physical conditions. Factors such as hardware limitations, limited resources, unfavourable WSN deployment environment, and the presence of various attacks on nodes can lead to the presence of Faulty Nodes in a WSN. This raises the problem ...
      2024-12-10
    • Enhancing Fault Detection in Wireless Sensor Networks Through Support Vector Machines: A Comprehensive Study 

      Mardenov, Yerik; Adamova, Aigul; Zhukabayeva, Tamara; Othman, Mohamed (Journal of Robotics and Control, 2023)
      The Wireless Sensor Network (WSN) consists of many sensors that are distributed in a specific area for the purpose of monitoring physical conditions. Factors such as hardware limitations, limited resources, unfavourable WSN deployment environment, and the presence of various attacks on nodes can lead to the presence of Faulty Nodes in a WSN. This raises the problem of ...
      2024-11-25
    • Information Security of Educational Portal Based on Face Anti-Spoofing Method: Effectiveness of Tiny Neural Network Machine Learning Model 

      Serik, Meruert; Tleumagambetova, Danara; Alaminov, Muratbay (I.J. Modern Education and Computer Science, 2025)
      This article presents the implementation of a machine learning-based face anti-spoofing method to enhance the security of an educational information portal for university students. The study addresses the challenge of preventing academic dishonesty by ensuring that only authorized individuals can complete intermediate and final assessment tasks. The proposed method leverages ...
      2026-03-19
    • Information Security of Educational Portal Based on Face Anti-Spoofing Method: Effectiveness of Tiny Neural Network Machine Learning Model 

      Serik, Meruert; Tleumagambetova, Danara; Alaminov, Muratbay (I.J. Modern Education and Computer Science, 2025)
      This article presents the implementation of a machine learning-based face anti-spoofing method to enhance the security of an educational information portal for university students. The study addresses the challenge of preventing academic dishonesty by ensuring that only authorized individuals can complete intermediate and final assessment tasks. The proposed method leverages ...
      2025-12-19