Information Technologies, Management and Society

Size: px
Start display at page:

Download "Information Technologies, Management and Society"

Transcription

1 Informācijas sistēmu menedžmenta augstskola ISMA University Information Technologies, Management and Society The 15 th International Scientific Conference Information Technologies and Management 2017 April ISMA University, Riga, Latvia Poltava National Technical Yurii Kondratuyk University, Poltava, Ukraine Institute of Information and Computational Technologies, Almaty, Kazakhstan Kazakh National Research Technical University after K.I. Satbaev Almaty, Kazakhstan Riga, 2017

2 IT&M 2017 Scientific Organizing Committee Prof. Dr. Sc. Roman Dyackon (Riga, Latvia) The Head of Organizing Committee Prof. Dr.Sc. Habil Yuri Shunin (Riga, Latvia) Assoc. Prof. Dr.oec. Deniss Dyackon (Riga, Latvia) Assoc. Prof. Dr.oec. Aivars Stankevics (ISMA University, Riga, Latvia) Prof. Dr.Sc. Victor Gopeyenko (Riga, Latvia) Prof. Dr. oec. Marga Zhivitere (Riga, Latvia) Prof. Dr.Sc. Rostislav Kopytov (Riga, Latvia) Prof. Dr.Sc. Alexander Mrochko (Riga, Latvia) Prof. Dr.oec. Viktoriia Riashchenko (Riga, Latvia) Dr.Sc. hist. Nataly Vorobyeva (Riga, Latvia) The Head of Registration Section MSc. Nataly Burlutskaya (Riga, Latvia) Technical Program Secretary IT&M 2017 Scientific Programme Committee Prof. Dr.Sc. Habil Yuri Shunin (Riga, Latvia) The Head of Programme Committee Prof. Dr.Sc. Habil Arnold Kiv (Israel) Prof. PhD Stefano Bellucci (Italy) Prof. Dr.Sc. Habil Dietmar Fink (United Mexican States) Prof. Dr.Sc. Habil Iryna Kalenyuk (Kiev, Ukraine) Prof. Dr.Sc. Habil Pavel D yachkov (Russia) Prof. Dr.Sc. Habil Sergey Maksimenko (Belarus) Prof. PhD Mariana Petrova (Veliko Turnovo, Bulgaria) Prof. Dr.Sc. Habil Yuris Kalninsh (Ventspils, Latvia) Prof. Dr.Sc. Habil Kurt Schwartz (Darmstadt, Germany) Prof. DSc Sevdalina Ilieva Dimitrova (Veliko Turnovo, Bulgaria) Prof. Dr.Sc. Victor Gopeyenko (Riga, Latvia) Prof. Dr.Sc.ing. Rostislav Kopytov (Riga, Latvia) Prof. Dr.oec. Iryna Chernysh (Ukraine) Assoc. Prof. Dr.Sc. Alytis Gruodis (Vilnius, Lithuania) Prof. Dr.Sc.Ing. Ravil I. Muhamedyev (Almaty, Kazakhstan) The Head of Program Committee of Kazakhstan section Prof. Dr.Sc.Habil. Alma Mansharipova (Almaty, Kazakhstan) Prof. Dr.Sc.Habil. Maksat Kalimoldaev (Almaty, Kazakhstan) Prof. Dr.Sc.Habil. Yedilkhan Amirgaliyev (Kazakhstan) Prof. Dr.Sc.Habil. Vladimir Barakhnin (Novosibirsk, Russia) Prof. Dr.Sc. Lyazzat Atymtayeva (Almaty, Kazakhstan) PhD, Mamyrbayev Orken Zh. (Kazakhstan) Prof., PhD. Assel Akzhalova (Kazakhstan) Prof., PhD. Timur Bakibayev (Kazakhstan) Prof., PhD. Kuanysh Abeshev (Kazakhstan) As. Prof., PhD. Yevgeniya Daineko (Kazakhstan) As. prof., Dr. Sc. Nadiya Yunicheva (Kazakhstan) M.C.S. Yelena Muhamediyeva (Kazakhstan) M.C.S. Orazbekov Sayatbek (Kazakhstan) Supporting Organizations ISSN Copyright isma2017 ISMA Computer Technology Institute, Latvia ISMA Business Institute, Latvia Information Technologies, Management and Society The 15 th International Scientific Conference Information Technologies and Management 2017 April 27-28, Theses. Editors Yu.N. Shunin and V.I. Gopeyenko ISMA University, Riga, Lomonosova Str., Bld.6, LV-1019, Riga, Latvia isma@isma.lv

3 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Nanotechnologies Contents Yu Shunin, V Gopeyenko, St Bellucci, T Lobanova-Shunina, N Burlutskaya Heat conductivity process modelling in onedimensional atomic chains 9 A Kiv, A Fink, Yu Shunin, R Muhamedyev, V Gopeyenko, T Lobanova-Shunina, N Burlutskaya, E Severova, M Ibraeva, D Mansharipov, A Mansharipova, M Gabdullin, N Guseinov Modeling processes for the protection of bacteria 10 A Gopejenko, Yu F Zhukovskii P V Vladimirov, E A Kotomin, Yu Mastrikov, V A Borodin, A Möslang O Lisovski, S Piskunov, Yu Zhukovskii, D Bocharov, S Kenmoe, E Spohr E K Shidlovskaya A Pashko A Kiv, D Fuks, Yu Bondaruk, K Fedoseeva Ab initio calculations of Ti pair-wise interactions inside fcc-fe lattice Modelling a TiO 2 nanotubular surface within formalism of a constrained 2D structure Theoretical modelling of nanodevices in the frameworks of embedded molecular cluster model Analysis of methods of simulation of the fractional Brownian motion Mechanism of radiation-stimulated displacement of n- p- junction in memory devices A B Aubakirov, N Zhailaubai, A T Mansharipova Biological feedback during the stress 22 Y I Antonova, A A Ismailova A A Kabetenova, D Mansharipov, E Mukhamedieva, Z Berkimbaeva, A T Mansharipova V S Arhipkin, S A Mislenkov, S V Kiseleva, E V Stoliarova Introduction of European Emergency department system in Kazakhstan An experimental investigation and visualization of the programmed cell death of cardiomycites Complex analysis of renewable energy resources in coastal regions: approaches and research Computer Modelling and Information Technologies B Sinchev, S Orazbekov U Auyelbekov The research of efficiency of Zipf s first law applied to Kazakh languaged texts Big Data in telecommunication: behavioural analysis of subscribers and churn prediction Zh E Aytkhozhaeva, A A Ziro, A Zh Zhaibergenova Virtualization safety 37 3

4 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 B Rysbaiuly, N Yunicheva B A Suleimenov, N R Toktassynova, A B Suleimenov L Tereykovskaya, I Tereykovskiy, E Aytkhozhaeva, S Tynymbayev, A Imanbayev S Tynymbaev, R Berdibayev, Zh Zhaibergenova The computational algorithm for calculating the thermal properties of the rock mass with inaccurate initial data Intelligent operational diagnostics subsystem of the technical condition of CHPP turbogenerating sets Improvement of learning efficiency of the neural networks, intended for recognition of graphic images in systems of biometric authentication The high-speed device for the accelerated coercion of number on the module M Petrova Analysis of integrated university information systems 55 D Baitursynov Card Fraud Detection models and patterns 58 B Aitchanov, I Bapiev, I Terejkowski, L Terejkowska, V Pogorelov S Dairbayeva, A Dairbayev Calculation of expected output signal of neural network model for detecting of cyber-attack on network resources Mathematical model and computing algorithm of thermal conduction during oil pumping process B K Mukhanov, Zh Zh Omirbekova, Y Zh Orakbayev, M B Kangtarbay Modeling process of in-situ leaching of various regimes 65 D Panyukova, G Nurpeissova Review of modern approaches for power load forecasting 69 Sh Saimassayeva, A N Moldagulova Forecasting inflation using Big Data 72 H Ten A Yebekenova Y Moldagaliyev M Sarzhan N Saparkhojayev, A Mukasheva, P Saparkhojayev V Barakhnin, O Kozhemyakina, I Pastushkov V Barakhnin, A Bakiyeva, T Batura Big Data in text processing: an old problem with a new approach Automation world: covering the field of healthcare workflow optimization Usage of machine learning based recommendation system in the development of web-service Development of methods and models of designing the wireless sensor network and their applications The concept of monetization of IoT-based project: case of Medical System in Kazakhstan The approaches to the construction of a joint ( twodimensional ) classifier of genre types and stylistic colouring of poetic texts Stemming and word forms generation in automatic text processing systems in the Kazakh language

5 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 A Orynbayeva Automatic summarization 87 D Naukhan Decision making system for gas mining company 89 V V Pak A Nazirova, A Kairat Artificial intelligence algorithms in psych profile classification and prediction Methods for evaluation of renewable energy resources in the territory A Sabyrkulova Development of text classification system 94 A Shakhmetova, K Yakunin R Mustakayev, Sh Batkayev M Shmurygin Methods of aggregation different data for estimating and evaluating potential of renewable energy Overview of the stack technology for visualization and storing data in developing of Geo-Information system Autonomous Agent-Based system for navigation and obstacle avoidance using machine learning R Muhamedyev, Y Muhamedijeva Data sources for RES evaluation 102 N Aziken I Chernysh, V Mahovka Stock prices prediction using Machine Learning techniques The importance of information technology in the development of tourism V Gopeyenko, I Lemberski Asynchronous full adders implementation: case study 109 K Nechval, A Tharakath Developing of balancing tools for flight controls 110 K Nechval Engine mount joints using shape factor in aircraft design 113 J R Kalnins, R Narnickis Simulation of a stochastic predator-prey model with external fluctuations 115 I Jefremova, A Mrochko Features of testing mobile applications 117 A N Kovantsov Management and Decision Making D Lukšaitė, J Lukšaitė, G Jurkševičiūtė Application of theorems of elementary geometry to construct graphs of some functions SCALE_UP an active learning cases modelling at Kaunas UAS V Slavyanska, V Dimitrova, K Stankova Stress management as a factor of project success 122 J Mnif Classroom management problems at private schools 125 N V Bakalo Excursion activity as a factor of forming the image of the territory 128 5

6 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 N Bezrukova, A Buriak B Frolenoka, O Dukule A Glebova, O Zernyuk O Grishnova, I Abramovich The role of developing countries in the modern international trade Personnel adaptation in the workplace, the quality of working life and subjective well-being Restructuring and reengineering of organizational and economic mechanism for rail transport International experience of the digital technologies implementation in human resource management Y Ignatenko, J Shumak Prospects of creation of regional innovation cluster 135 E Kryukova, D Makeyeva Y Khudolii, T Zavora, L Svistun S V Onyshchenko I Spica, B Berzina, E Spics D Zakharov, I Spica Yu Trofimova, M Zhivitere H Kazak A Kornyliuk, R Kornyliuk E Sventitskaya, Yu Kochetkov Integration of modern business technology in a virtual learning environment of the Russian professionals tourism industry Preconditions for the introduction of thermomodernization measures of the housing fund in Ukraine Financial globalization: a description from the standpoint of a process approach The methodology for quantitative evaluation of academic staff with Doctors degree Main trends for the further development of e-money and digital currencies legislation Slowdown of the development speed in the construction industry: problems and their solutions The topicality of usage marketing's communications in the tourism sector of Ukraine Debt burden of Ukrainian public agricultural holdings during the systemic crisis The instability of taxation policy in Latvia as a deterrent to the successful development of micro business K Liepina, J Dehtjare Quest room industry: key characteristics and trends 152 I Linde L Ptashchenko R Kinderis, L Zobėlaitė Problems in higher education teaching quality measurement The impact of negative drivers to the financial security of Ukraine Expression of healthy lifestyle components in student behaviour

7 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 M Yelubayeva, G Kabduyeva, M Živitere T Uteubayev V Djakona N Ardalina, M Ahmadejeva, J Mnif Process-oriented approach in a quality management of medical services Labour migration and remittances: strategy for survival or development? Importance of scientific and practical tools in managing the components of intellectual capital of an enterprise The management system improvement budgeted by the educational institution under the unstable financial funding conditions V Riashchenko Key trends in the development of business education 169 V Riashchenko, Zh Kleschevnikova, M Bezpartochnyi, R Seifullajevs, L Kalyta Marketing in social entrepreneurship 171 Management Technologies and Organisational Growth D Bukas A Kondratenko G Akimov Dynamics and controllability dilemma in business organizations The problems of innovations and investments in business projects Diagnostics of management technologies in the context of business organization J Sidorova Technology advancement venture into a new market 179 V Shiryayev The advantages of legal process outsource (LPO) 181 D Kelsina Assessment of multiple actor loyalty 183 D El-Haže, I Ivanova, R Kopitov O Kamforina S Miscenko Specifics of open systems and feature of the organization of their functioning Classification of factors that affect loss of sustainability in organization The practical importance of the science of management through the works of the famous investigators in this field A Amangeldiyev Problem management and business-projects analysis 191 N Kopitova Integration of diverse planning and control means 193 S Zozule The role of CFO from the position of an independent business partner 196 R Kopitov Managing a process of growth of an organisation 198 7

8 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Z Mikrjukova Innovators in management: position of growth and decline of organization 200 A Kalyagin Determination of product safety criterion 201 A Tretyakov Threat factors as symptoms of enterprise development 202 8

9 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Shunin Yu, Gopeyenko V, Bellucci S, Lobanova-Shunina T, Burlutskaya N Heat conductivity process modelling in one-dimensional atomic chains Abstract Yu Shunin 1, 2, 5, V Gopeyenko 2, 5, St Bellucci 3, T Lobanova-Shunina 4, N Burlutskaya 2 1 Institute of Solid State Physics, Riga, Latvia 2 ISMA University, Riga, Latvia 3 INFN LNF Frascati-Rome, Italy 4 RTU, Institute of Avionics, Riga, Latvia 5 Ventspils HES, Ventspils, Latvia *Corresponding author s jurijs.sunins@isma.lv The problem of heat conductivity mechanisms of one-dimensional atomic non-metal chains is considered. Heat conductivity concepts are evaluated. Simulation results for harmonic and non-harmonic atomic interactions are presented. The solitary waves mechanisms of heat conductivity realization is analyzed especially. Keywords: one-dimensional atomic non-metal chains, harmonic and non-harmonic atomic interactions, heat conductivity efficiency 1 Introduction R Peierls was the first who paid attention to explanation of the thermal conductivity [1] (1929).He have used Boltzmann concepts that had been developed by for the gas dynamics to phonons. HAowever, phonons cannot be localised with definite velocity, as can the molecules in a classical gas in accordance original Boltzmann equation. F J Dyson has considered a chain of N masses [2] (1953), each coupled to its nearest neighbours by elastic springs obeying Hooke's law. The longitudinal vibrations of the chain, all motions being supposed to take place in one dimension so that each mass is described by a single coordinate. The chain had mass m j, and its displacement from its equilibrium position be x j. The elastic modulus of the spring between particles j and j+1 be K i. Then the equations of motion of the system are mx = K( x x) + K ( x x). j j j j+ 1 j j 1 j 1 j A Jackson and A D Mistriotis [3] have developed the lattice consisted of two types of particles with different masses. The odd-numbered particles have mass m 1, and the even-numbered have mass m 2. They interact with their nearest neighbours with an exponential force. We pay attention to non-metal one-dimensional atomic chains. However, for understanding the of the heat conductivity efficiency it is necessary to simulate to relative characteristic time of establishing of new phonon distribution state after external heat impact on the model atomic system. We consider various elastic atomic interactions (Hooke's and non Hooke's type) [4]. Moreover, non-hooke interaction (e.g., exponential) leads to solitary wave mechanism of heat conductivity. 2 Conclusion The harmonic waves mechanism for one-dimensional atomic non-metal chains looks very limited for the most of physical cases and evidently wrong. The solitary waves mehanisms of heat condutivity is probably more reliable for it takes into account all possible and reasonable non-linear (non-harmonic) interatomic interactions. References [1] Peierls R 1929 Ont he kinetic theory of thermal conduction in crystals Ann. Phys., Lpz [2] Dyson F J 1953 The dynamics of a disordered linear chain Phys Rev 92(6) [3] Jackson E A, Mistriotis Antonis D 1989 Thermal conductivity of oneand two-dimensional lattices J. Phys. Condens. Matter [4] Toda M 1989 Nonlinear Waves and Solitonsp Mathematics and its Applications (Japanese Series) KTK Scientific Publishers, Tokyo NN01 9 Nano Technologies

10 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kiv A, Fink A, Shunin Yu, Muhamedyev R, Gopeyenko V, Lobanova-Shunina T, Burlutskaya N, Severova E, Ibraeva M, Mansharipov D, Mansharipova A, Gabdullin M, Guseinov N Modeling processes for the protection of bacteria Kiv A 1, Fink A 2, Shunin Yu 3, 9 11, Muhamedyev R 4, Gopeyenko V 9, 11, Lobanova-Shunina T 10, Burlutskaya N 9, Severova E 5, Ibraeva M 6, Mansharipov D 7, Mansharipova A 8, Gabdullin M 12, Guseinov N 12 1 Ben-Gurion University, Israel 2 Berlin Institute of Ghahn-Meitner, Germany 3 Institute of Solid State, Latvia 4 KBTU, RK 5 Aksham Association, RK 6 NIS, RK 7 KazNMU after S.D. Asfendiyarov, RK 8 KRMU, RK 9 ISMA University, Riga, Latvia 10 RTU, Institute of Avionics, Riga, Latvia 11 Ventspils HES, Ventspils, Latvia 12 National Nanotechnological Laboratory Open Type (NNLOT), Al-Farabi KazNU, Kazakhstan Abstract Bacteria are a common cause of the disease. The goal was modelling nanostructures for diagnostics of bacteria. They were used biophysical techniques, tracking electronics, computer simulation. As a result of the model received nanobiosensors based tracking technology for fast and accurate identification of bacteria. Keywords: bacteria, protection, modelling processes, biophysical technique, simulation 1 Introduction Infectious diseases are threats to human life. Medical technologies should facilitate the accurate and rapid detection of bacteria to prevent outbreaks of bacterial diseases. It is known that track devices are used to create a number of biological sensors that can identify bacteria [1, 2]. The technology of ion tracks is based on a unique phenomenon - the effect of heavy ions on the substance leads to the formation of narrow and extended regions of radiation damage (with diameters of ~ 5-10 nm, lengths from 30 to 300 microns), which are called tracks. A feature of track membranes, in particular track membranes is the high adsorption of a number of biologically important molecules, including bacteria. The aim of the study was to study and simulate nanostructures with predetermined properties for bacterial diagnostics. Materials and methods of research: Physical methods of research (working with heavy metal ions using a nuclear gun), biophysical methods (optical methods), biological methods (microscopy) and biochemical methods (spectrometry) were used by standard methods. When creating tracks, standard methods of track electronics were used [2, 3]. The study of multifunctional nanostructures was carried out in NNLOT KazNU named after al-farabi and in research laboratories of universities. Quanta 3D 200i Multifunction Scanning Electron Microscope with Integrated Focused Ion Beam, Energy Dispersive Spectrometer and Crystallographic Analysis for the Diagnosis and Investigation of Polymer with Tracks, Microscope LeicaDM6000 M, a motorized digital material science microscope with a separate CTR6000 control unit and a tripod built in a tripod Leica Screen, with halogen illuminators of 100 W and memorization of 2 positions for the study of bacteria. The method of molecular dynamics was applied, in which the time evolution of a system of interacting atoms or particles is monitored by the integration of their equations of motion. To describe the motion of atoms or particles, classical mechanics was used. In the simulation, the forces of interatomic interaction were represented in the form of classical potential forces (as the gradient of the potential energy of the system). The sets of configurations obtained during the calculations were distributed in accordance with some statistical distribution function, for example, corresponding to a microcanonical distribution [4, 5]. To develop the model, classical molecular dynamics with the Verlet algorithm was used [6]. We used the C #.Net application with the Unity3d graphics engine. The research work was carried out within the framework of the grant of the Science Committee of the Ministry of Education and Science of the Republic of Kazakhstan on the topic "Designing and creating nanostructures for the detection of bacteria (NANOBAC) and therapeutic interventions" (No. NN02 10 Nano Technologies

11 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kiv A, Fink A, Shunin Yu, Muhamedyev R, Gopeyenko V, Lobanova-Shunina T, Burlutskaya N, Severova E, Ibraeva M, Mansharipov D, Mansharipova A, Gabdullin M, Guseinov N 3455 / GF ), the ethical approval of the local committee of the KRMU No. 34 of Results and discussion One of the main reasons for the high sorption capacity of track membranes, in particular with respect to proteins, is the method of obtaining membranes. When the film was irradiated with accelerated charged particles and subsequent physicochemical treatment on its surface, and especially on the inner surface of the pores, various peroxide compounds and groups possessing an affinity for the electron or proton were formed. The number of such functional groups was large, since an ester group is present in each monomer unit, which is the basis for their formation upon irradiation and physicochemical treatment of the film. They dissociated in neutral and alkaline solutions, which led to the appearance of a "net" of negative charges on the surface of the membrane itself, and especially on the inner surface of the pores. Functional groups were able to form a donor-acceptor bond with the corresponding groups of proteins or enzymes, ensuring their strong bond with the membrane and, accordingly, increasing sorption. Therefore, during the filtration or concentration of various biological media adsorption of biological agents took place. The unique optical, electronic and magnetic properties of track devices were used by us to create nanobiosensors that will be able to detect bacterial infections more accurately and quickly than existing methods. Ionic tracks containing thin polymer films immersed in suitable electrolytes were used by us as substrates for constructing nanobiosensors that use the bioreaction principle x + y Z, where X is an analyte, the Y and Z agent is the reaction product. This is achieved by using a set (usually cm) of parallel etched tracks (each of them corresponds to a specific biological agent) in a thin polymer film. Ion-track technology based on the deposition of various materials into channels of track membranes presents ample opportunities for the modification of materials in biomedicine, in micro- or nanotechnologies, and in this connection can become one of the technologies that integrates nanostructural engineering. Prospects for the development of the obtained technology are associated not only with the realization of the possibility of forming ion tracks in various materials, but also with the obtaining of nanostructures of an even smaller diameter in order to study the role of the size factor in various physicochemical and mechanical properties [7]. With the help of ion track technology, a multitude of multilayer nanostructures with alternating layers of parallel nanodiodes can be produced in the substrate substance [8, 9, 10]. Biomass cells associated with patterns on both surfaces of the substrate will be able to maintain certain direct links to each other through the track structures. Molecular mechanisms of cellular adhesion with a substrate are studied using data on their spatial arrangement, joint localization and activation of adhesion receptors and associated structural and signaling proteins, such as paxillin, talin, vinculina and focal adhesion kinases [9, 10]. Such a nanoplatform can be used to identify microorganisms. The method of molecular dynamics allowed to find instantaneous values of microscopic quantities of the system, such as coordinates and particle velocities. With the help of microscopic quantities, instantaneous values of the macroscopic quantities of the system were computed: energy, total momentum, moment of inertia [5]. We carried out a simulation to check how the developed model will reflect the basic properties of pulsations in the track instrument. A computer experiment showed that with an increase in the absolute value of the external force, the average amplitude of oscillations of model particles increases. However, from time to time the average amplitude of oscillations of model particles increases very sharply (Figure 1). This corresponds to the appearance of current surges in the track instrument (Figure 2). As can be seen from Figures 1 and 2, observed oscillation jumps of model particles correspond to those cases when a sufficiently large number of model particles, as a result of their interaction with each other, move simultaneously at a large distance from their nodal centers, and then return in a short time. The conditions of such a model pulse are determined by the parameters of the interaction potential between model particles, the action of external force and temperature. FIGURE 1 Impulses of the model in a computer experiment. On the horizontal axis - computer time in seconds. On the vertical axis - the average amplitude of oscillations of model particles FIGURE 2 Current pulses in a real experiment with a track instrument When creating the model, we based on the fact that for different forms of tracks (latent, funnel-shaped) and for different materials of films, the basic properties of current pulses remain the same. So there was an idea of creating a generalized phenomenological model. We needed a model that would reflect the basic characteristics of real track instruments. 3 Conclusions Thus, as a result of the work, a model of a nanobiosensor working on the basis of track technology has been developed, which is applicable for rapid and accurate detection of bacteria in biological media. NN02 11 Nano Technologies

12 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kiv A, Fink A, Shunin Yu, Muhamedyev R, Gopeyenko V, Lobanova-Shunina T, Burlutskaya N, Severova E, Ibraeva M, Mansharipov D, Mansharipova A, Gabdullin M, Guseinov N References [1] Action plan against the rising threats from Antimicrobial Resistance COM 2011: 748 final, Brussels, 2011, 56 p. [2] Encyclopedia of Nanoscience and Nanotechnology Nalwa H. S.- USA: American Scientific Publishers, 2011, 45p. [3] Fink D, Cruz S, Vacik J, Hnatowicz V 2010 Conducting swift heavy ion track networks Rad. Effects Def. Solids [4] Fink D, Klinkovich I, Bukelman O, Marks R S, Kiv A, Fuks D, Fahrner W R, Alfonta L 2009 Glucose determination using a re-usable enzymemodified ion track membrane, Biosensors and Bioelectronics // Biosensors And Bioelectronics [5] Method of molecular dynamics in physical chemistry Ed. Yu.K. Tovbina Moscow: Nauka, 1996, 233 c. [6] Hairer E, Lubich C, Wanner G 2003 Geometric numerical integration illustrated by the Störmer Verlet method Acta Numerica [7] Fink D, Munoz H G, Alfonta L 2012 Highly sensitive ion-based urea sensing with ion-irradiated polymer foils Nucl. Instr. Meth [8] Fink D, Cruz S, Vacik J, Hnatowicz V 2010 Electrical current pulsations of funnel-type tracks in electrolytes Rad. Effects Def. Solids [9] Mykytenko N, Fink D, Kiv A 2014 Generalized model of the pulsating track device Computer modelling & new technologies [10] Mykytenko N, Fink D, Kiv A 2015 Computer modeling of ion current pulsations in track-containing foils Journal of Computational Science NN02 12 Nano Technologies

13 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Gopeyenko A, Zhukovskii Yu F, Vladimirov P V, Kotomin E A, Mastrikov Yu, Borodin V A, Möslang A Ab initio calculations of Ti pair-wise interactions inside fcc-fe lattice Abstract A Gopejenko 1, Yu F Zhukovskii 1, P V Vladimirov 2, E A Kotomin 1, Yu Mastrikov, V A Borodin 3, A Möslang 2 1 Latvijas Universitātes Cietvielu Fizikas Institūts, Rīga, Latvija 2 Karlsruhe Institut für Technologie, Institut für Angewandte Materialen, Karlsruhe, Germany 3 NRC Kurchatov Institute, Kurchatov sq. 1, Moscow, Russia Addition of the metallic Ti species in the Y2O3 powder before mechanical alloying leads to the formation of Y2Ti2O7 particles in ODS steels. In this case the average size of the ODS particles achieves up to 5nm, which is smaller than the size of Y2O3 ODS particles (10-20 nm). This results in the interest to study the interaction between two Ti atoms, Ti and vacancy as well as between Y and Ti in fcc Fe lattice. As the size of the Ti atom is very close to the size of Fe atom, the former can only substitute regular atoms in the Fe lattice, similarly to Y impurity atoms. Keywords: ODS steels, density functional theory, ab initio calculations 1 Introduction Reduced activation steels strengthened by yttria precipitates are promising structural materials for future fusion- and advanced fission-reactors. They show very promising resistance to radiation-induced creep and swelling, two of the main mechanisms of materials degradation. Both size and spatial distributions of oxide precipitates significantly affect mechanical properties and radiation resistance of ODS steels. The mechanisms of ODS nanoparticle formation as well as their stability under irradiation are still not well understood. Both experiments and simulations indicate that extended mechanical alloying leads to the dissolution of Y 2O 3 particles in the steel matrix during the mechanical alloying. Yttrium and oxygen dissolved above equilibrium solubility limits seem to precipitate during consolidation of mechanically alloyed powder. The processes involved in the particle nucleation are very difficult to study experimentally but they can be simulated using advanced techniques of multiscale modeling. Since titanium can exist as natural impurity in ODS steels its presence in iron lattice does not result in the marked reconstruction of the latter. On the other hand, Ti stabilizes yttria precipitates in ODS steels due to its higher affinity towards oxygen as compared to Y. 2 General The first principles calculations have been performed using the VASP 5.2 computer code based on the Density Functional Theory (DFT) approach with a plane-wave (PW) basis set combined with the Perdew-Wang-91 GGA nonlocal exchange-correlation functional for γ-fe. The core electrons are described using the Projector-Augmented Wave method (PAW). These pseudopotentials include Fe core electrons of (4s 1 3d 7 outer shell), O (2s 2 2p 4 ), Y (4s 2 4p 6 5s 1 4d 2 ), and Ti (3p 6 4s 2 3d 4 ) atoms with 8, 6, 11, and 12 external electrons, respectively. To identify the calculation parameters required to obtain plausible results, numerous preliminary calculations have been performed and the results of these calculations have been compared with the ones reported in experiments and other theoretical studies. These calculations have shown that to achieve reliable results, the cut-off kinetic energies should be set to at least 800 ev, the k-point sets in the Brillouin zone should be at least k-mesh for supercells (SCs) [1]. Our model supercells are cubic, with the dimensions of 4a 0 4a 0 4a 0 and 5a 0 5a 0 5a 0, extensions (containing 64 and 125 atoms, respectively), the calculated optimized lattice constants of which have been found to be Å. 3 Conclusion The interactions between two titanium atoms as well as between Ti atom and a vacancy are qualitatively similar to the interactions between two Y atoms and between Y atom and a vacancy. However, the absolute values of the calculated binding energies are smaller in the configurations containing Ti atoms. It has been found that the displacement of titanium atom in the direction of the vacancy in the configuration, where Ti atom and the vacancy are the first nearest neighbors, is 0.43 Å, which is smaller than the displacement of Y atom towards the vacancy (1.25 Å) in the similar configuration. References [1] Gopejenko A, Zhukovskii Yu F, Kotomin E A, Mastrikov Yu A, Vladimirov P V, Borodin V A, Möslang A 2016 Ab initio modelling of Y O cluster formation in fсс-fe lattice Phys. Status Solidi B 253, NN03 13 Nano Technologies

14 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Lisovski O, Piskunov S, Zhukovskii Yu F, Bocharov D, Kenmoe S, Spohr E Modelling a TiO2 nanotubular surface within formalism of a constrained 2D structure Oleg Lisovski 1*, Sergei Piskunov 1, Yuri Zhukovskii 1, Dmitry Bocharov 1, Stephane Kenmoe 2, Eckhard Spohr 2 Abstract 1 Institute of Solid State Physics, University of Latvia, Kengaraga Str. 8, LV-1063 Riga, Latvia 2 Department of Theoretical Chemistry, University of Duisburg-Essen, Universitätsstr. 5, Essen, Germany *Corresponding author s oleg.lisovski@gmail.com Modelling of catalysts for solar water splitting is one of the most investigated research directions. Nanotubular catalysts attract particular attention. For better understanding of photocatalytic processes computationally expensive approaches are required. For large-scale nanotubes (NTs) such calculations are not feasible with current computational power, therefore it is important to develop a 2D model able to represent a NT surface. In the present study, we developed three such models with various constraints of different complexity at the relatively cheap Density Functional Theory (DFT) level. We show that one sort of the constraints produces better results when modelling NTs with a thick unit cell of small area, and another sort NTs with a thin unit cell of large area due to nature of applied constraints. We suggest that our results can be generalized and used for other material NTs. Keywords: nanotubes, titania, surface, water adsorption, simulation 1 Introduction Previously we have performed study of photocatalytic properties of 1D TiO 2 nanotubes of two different configurations, (101) and (001), both pristine and doped, at the DFT level [1-5]. For in-depth understanding of photocatalytical water splitting, more computationally expensive methods are required, such as Time-Dependent DFT and Molecular Dynamics. It is not possible to accomplish calculations of such large-scale NT systems (around ~1000 atoms) with these methods within finite time period. Hence, we face a necessity to develop 2D models able to represent nanotubular surface properties with acceptable precision and computable within adequate time, in our case we focus on water adsorption. This problem can be generalized and the obtained results can serve as a basis for building 2D models for NTs of other materials and for other applications. 2 Computational details The CRYSTAL computer code [6] has been used in our calculations. The models of TiO2 NThave been initially developed by means of DFT+HF LCAO method based on localized atom-centered Gaussian-type functions (GTFs) in the form of basis sets (BSs). For oxygen atoms, BS has been chosen as the all-valence, in the form of 8s 411sp 1d while for Ti atoms, the effective core potential (ECPs), as implemented by Hay and Wadt [7], has been used in the form of 411sp 311d. A hybrid exchange-correlation functional B3LYP with modified non-local HF exchange contribution [6] has been applied for our calculations. The choice of this specific computational method is explained in our earlier publications [1-5]. 3 Three proposed models We consider three 2D models with constraints of different complexity. In the first model a TiO 2 anatase slab of either (101) or (001) configuration is taken as a basis. One of the lattice constants is kept equal to original slab value and another - corresponding to either inner or outer surface of a NT. Both lattice constants are kept fixed during geometry optimization. In the second model, more complex constraints are applied in order to obtain a set of 2 fractional coordinates for all atoms in a 2D structure which being multiplied by NT lattice constants, one of them corresponding to either inner or outer surface of a NT, would result in a structure more similar to a NT wall. Both lattice constants are also kept fixed within geometry optimization. In addition, one or two TiO 2 units on the opposite side from the adsorbed H 2O molecules are not subjected to optimization. The third model is based on cutting out a curved segment of a NT and translating it within an infinite 2D structure. 4 Conclusions The first model produced promising results for modelling properties of (101) TiO 2 NT possessing a thinner unit cell of larger area. The second model, in turn, performed better for (001) NTs possessing a thicker unit cell of smaller area. This is in a good agreement with the nature of applied constraints. Finally, it is more difficult to draw a positive conclusion on the third, NT segment model. NN04 14 Nano Technologies

15 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Lisovski O, Piskunov S, Zhukovskii Yu F, Bocharov D, Kenmoe S, Spohr E References [1] Lisovski O, Piskunov S, Zhukovskii Yu F, Bocharov D 2017 Quantum chemical simulations of titanium dioxide nanotubes used for photocatalytic water splitting J. Surf. Investigation [2] Lisovski O, Chesnokov A, Piskunov S, Bocharov D, Zhukovskii Yu F, Wessel M, Spohr E 2016 Ab initio calculations of doped TiO 2 anatase (101) nanotubes for photocatalytical water splitting applications Mater. Sci. Semicond. Process [3] Piskunov S, Lisovski O, Begens J, Bocharov D, Zhukovskii Yu F, Wessel M, Spohr E 2015 C-, N-, S-, and Fe-doped TiO 2 and SrTiO 3 nanotubes for visible-light-driven photocatalytic water splitting: Prediction from first principles J. Phys. Chem. C [4] Chesnokov A, Lisovski O, Bocharov D, Piskunov S, Zhukovskii Yu F, Wessel M, Spohr E 2015 Ab initio simulations on N and S codoped titania nanotubes for photocatalytic applications Phys. Scr (p.1-7) [5] Zhukovskii Yu F, Piskunov S,Begens J,Kazerovskis J, Lisovski O 2013 First-principles calculations of point defects in inorganic nanotubes Phys. Status Solidi B [6] Dovesi R 2009 CRYSTAL 09 User's Manual University of Torino, Torino [7] Hay P J, Wadt W R 1985 Ab initio effective core potentials for molecular calculations: Potentials for K to Au including the outermost core orbitals J. Chem. Phys. 82, NN04 15 Nano Technologies

16 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Shidlovskaya E K Theoretical modelling of nanodevices in the frameworks of embedded molecular cluster model E K Shidlovskaya Institute of Aeronautics, Riga Technical University, Kalku iela 1, Riga LV-1658, Latvia Department of Natural Sciences and Computer Technologies, ISMA University, Lomonosova iela 1, k-6, Riga LV-1019, Latvia *Corresponding author s shidlovska@inbox.lv Abstract Applicability of cluster embedding method with non-orthogonal wave functions for theoretical study of processes in nanodevices is studied. We demonstrate that our cluster embedding method is compatible with quantum transport theory based on time-dependent DFT. We conclude that quantum transport theory methods may be applied if we use one-electron approaches both with orthogonal and nonorthogonal wave functions. Possibilities to generalise quantum transport theory methods on the case of temperature-dependent electron transitions and theoretical modelling of temperature-dependent processes in nanodevices are discussed. Keywords: embedded molecular cluster model, non-orthogonal wave functions, quantum transport theory, current in nanodevices 1 Introduction When we theoretically describe nanodevice we have to treat the whole quantum system as two subsystems: small finite fragment of the system containing nanodevice (cluster) and the rest of the system containing electrodes. Problem "cluster in the field of the rest of system" is successfully solved in the frameworks of embedded molecular cluster (EMC) model with orthogonal wave functions. We have modified EMC model treating cluster embedding problem in the frameworks of one-electron approximation with nonorthogonal wave functions. We have proposed new cluster embedding scheme based on this approach [1]. Our present aim is application of our cluster embedding method for quantum-chemical modelling of processes in nanosystems and calculation of electrical properties of nanodevices. 2 Cluster embedding equations Our cluster embedding scheme [1] is based on Hartree- Fock (HF) method. In the last years HF one-electron equations are rarely used. Calculations usually are carried out in the frameworks of density functional theory (DFT) with one-electron Kohn-Sham equations. Besides that, for theoretical modeling of nanodevices we want to apply quantum transport theory based on DFT. Therefore, we should find cluster embedding equations our variation procedure gives when we use DFT Kohn-Sham approach. Total energy of many-electron system described by nonorthogonal one-electron wave functions on the both HF and DFT Kohn-Sham levels may be written in the same way. Varying expression for the total energy and analyzing our variation procedure we demonstrate [2] that our cluster embedding method based on HF calculation scheme is compatible with DFT Kohn-Sham calculation scheme. Cluster embedding equations remain the same if instead of Fock operator we use Kohn-Sham Hamiltonian. Therefore, there exists possibility to combine our cluster model (with non-orthogonal one-electron wave functions) and quantum transport theory based on time-dependent DFT (TDDFT). Our embedding scheme may be combined with TDDFT if electron transitions are described correctly: occupied and vacant cluster states are localized in the cluster region in the same manner. To get occupied and vacant states of the same localization degree, we have modified [3] our initial cluster embedding equations [1]. 3 Quantum transport theory and cluster model One of the approaches for calculation of electrical properties of nanodevices is quantum transport theory methods developed by Gross with co-workers [4]. We study possibility to combine our cluster approach with approach of Gross et al. Method of Gross implies that wave functions of nanodevice central part are orthogonal to the wave functions of the electrodes. We show [2] that approach for electric current calculation developed for orthogonal wave functions may be applied for non-orthogonal wave functions if we transform initial equations assuming that overlaps between wave functions are small (S 2 <<S). Using this assumption we may combine our cluster embedding method with approach of Gross et al. and calculate electric parameters of nanodevices. We can conclude that our cluster embedding method is compatible with electric current calculation method based on TDDFT [4] and we can propose calculation scheme for electric parameters of nanodevices using both methods. NN05 16 Nano Technologies

17 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT Conclusions We demonstrate that our cluster embedding method is compatible with DFT Kohn-Sham method. We conclude that our embedding scheme may be combined with TDDFT and electric current calculation method based on TDDFT. We use TDDFT based quantum transport theory method of Gross et al [4] and propose approach for calculation of electric parameters of nanodevices. Quantum transport theory methods for electric current calculation may be applied if we deal with one-electron approaches. In this case we can easily construct one-electron density and get continuity equation for electric current. To treat processes in nanodevices, we should consider Shidlovskaya E K temperature-dependent electron transitions. In this case oneelectron density may be constructed and continuity equation for electric current may be obtained in the frameworks of one-electron approach if we use temperature-dependent occupation numbers for vacant and occupied one-electron states. Situation is more complicated if we want to overcome limitations of one-electron approximation using approaches like configuration interaction (CI) or perturbation theory (PT) methods. Our cluster embedding scheme is compatible with PT or CI methods. One-electron density may be constructed for these methods, too. But possibility to get continuity equation and expression for electric current in general form requires further investigation. References [1] Shidlovskaya E K 2002 Improved embedded molecular cluster model Int J Quantum Chem [2] Shidlovskaya E K 2012 in ed Y N Shunin, A E Kiv Nanodevices and Nanomaterials for Ecological Security NATO Science for Peace and Security Series B: Physics and Biophysics Springer pp [3] Shidlovskaya E K 2006 Problem of cluster embedding in crystalline lattice Computer Modelling and New Technologies 10(4) [4] Kurth S, Stefanucci G, Almbladh C-O, Rubio A, Gross E K U 2005 Time-dependent quantum transport: A practical scheme using density functional theory Phys Rev B doi: /PhysRevB NN05 17 Nano Technologies

18 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Pashko A Analysis of methods of simulation of the fractional Brownian motion A Pashko * Taras Shevchenko National University of Kyiv, Glushkova Av. 4d, Kyiv, Ukraine *Corresponding author s aap2011@ukr.net Abstract This paper analyses the statistical simulation algorithms of generalized Wiener process and increases of the generalized Wiener process. L ( ) Models built with specified accuracy and reliability in space 2 T. To build statistical models we use various spectral representation of random processes - namely in the form of series and as integrals. The advantages and disadvantages of each representations was compared. Keywords: Simulation, model accuracy, reliability models, generalized Wiener process 1 Introduction Let ( T, Β, µ ) µ ( T ) = 1 - be some measurable space and. Definition 1. Generalized Wiener process (fractional α 0,1 is the ( ) Brownian motion) with Hurst index W ( t), t [ 0, T ] Gaussian random process function W α ( 0) = 0, α with correlation 1 2α 2α 2α Rα ( t, s) = ( t + s t s ) 2, and EW α ( t) = 0. If α=1/2 have a standard Wiener process. Generalized Wiener process can be represented as a series [1] k= 1 ( a sin( x t) X + b ( 1 cos( y t) ) Y ) W α ( t) = k k k k k k, (1) where {X k,y k} - independent standard Gaussian random variables, {Xk}- real zeros Bessel functions J-α(x), {Yk}- real zeros Bessel functions J1-α(x), α π 2C ak = b α + 1 xk J α ( xk ) Γ( 2α + 1) sin( πα, ) C = 2α + 1 π. S α ( M k = y π α α + 1 k J 2C α ( y k ), The model of random process can be obtained as t, M ) = a sin x t X + b 1 cos y t Y ( k ( k ) k k ( ( k )) k ) k = 1, where {X k,y k} - uncorrelated strictly sub-gaussian random variables. Properties of strictly sub-gaussian random variables and processes studied in [2]. Zeros Bessel functions just can not find, they will find a with some accuracy. For k, bk, xk, yk let approximate a values k, bk, xk, yk. a ak a b k h b k k b k h x k xk x k hk Let,,, y yk y a b x y k hk h k, hk, hk, h, where k - precision computation. The model of random process can be obtained as M ( ak sin( xkt) X k + bk ( 1 cos( ykt) ) Yk ) Sα ( t, M ) = k= 1. (2) (t) Accuracy of simulation is ( t ) = Wα ( t) Sα ( t, M ). W (t) Standard Wiener process is the process with independent increments. Generalized Wiener process W α(t) it's the process with stationary increments. Therefore, random process w(t)=w α(t+ )- W α(t) is stationary Gaussian random process with correlation function [3]. 2α 2α 2α ( τ + + τ 2τ ) 1 Ew( t + τ ) w( t) = 2 2 A 1 cos( λ ) f ( λ) = π 2α +1 spectral density λ 1 and ( ), λ, +, cos( λ) A = dλ where π α 0 λ w(t) The random process can be represented as NN06 18 Nano Technologies

19 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 w( t) = cos( λt) dξ1 ( λ) + sin( λt) dξ2 ( λ) 0 0. (3) D = < < < = Λ And for partition Λ : 0 λ 0 λ1... λn, the w(t) model of random process can be obtained as w ( t, Λ) = n n 1 k= 0 ( sin( λ t) X + cos( λ t) Y ) k k k k, (4) where {X k,y k} - uncorrelated strictly sub-gaussian random EX = = 0 variables with k EYk and E k 2 2 ( ) ( ) + X = E Y = k k λ λ k 1 f ( λ) dλ We study simulation of generalized Wiener process with representation (1), simulation of increments of generalized Wiener process with representation (3). 2 The accuracy and reliability of an model X (t) X Let random process n belongs to A(T ) certain functional Banach space with norm of. Let the two numbers be as follow δ > 0 and 0 < α < 1. Model X n ( t, Λ) X (t) approximates process with reliability 1 ε and accuracy δ A(T ) in the norm of space, if the following P{ X ( t) X n ( t, Λ) > δ } ε. inequality holds W 0) 0 Where as, α ( =, then for all the model of generalized Wiener process we constructed as. ( Λ) and all t, W α ( t + ) = Wα ( t) + w( t). (5) Simulation of fractional Brownian motion is reduced to simulation of stationary Gaussian random process. Methods simulation of stationary Gaussian processes studied in [6-7]. There are theorems. S ( t, M ) Theorem 1. Model α approximates process W α (t) with accuracy δ > 0 and reliability 1 ε, 0 < ε < 1 L ([ 0,T ]) in the norm of space 2, if δ B1 inequalities hold 2 > M 2 1 δ δ exp exp ε, 2 B1 2B1 M M B1 M = T 2 2 ak + 4bk ) +( k = M 1 +, and where Pashko A Λ TΛ λ D i+ 1 λi = 1 Let for Λ implemented n and n, then the corollary. w ( t, Λ) Theorem 2. Model n approximates process w(t) with reliability 1 ε and accuracy δ in the norm of ( ) space L 2 T, if for numbers Λ δ and n inequalities 2 1 δ hold exp exp ε 2 G2n, Λ < δ 2 G2, Λ and 2G2 n n,λ, 3 2 Λ T Λ 2, ( ) ( ). 2 3 G n = + Λ f λ dλ T f λ dλ n 0 where Λ 3 Simulation Using the model (2) requires significant computing resources. Table 1 shows the parameters of the model for different values of Hurst index, accuracy of simulation in ( ) space L T 2, for reliability ε = TABLE 1 Parameters of model δ ε n h α Realization of the generalized Wiener process for different values α are presented in Figure 1-2. FIGURE 1 Realization of generalized Wiener process with α = T M k = 1 x a 2 y b ( Ta h + h ) + ( Tb h + 2h ) k k k k k k 2. NN06 19 Nano Technologies

20 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Pashko A FIGURE 2 Realization of generalized Wiener process with α = 0. 3 Realization of increments of the generalized Wiener process for α = 0. 7, δ = and ε = are presented in Figure 3. Realization of the generalized Wiener process for ε = 0.05 and for different values α and δ are presented in Figure 4-5. FIGURE 3 Realization of increments of generalized Wiener process 4 Conclusions Each of the algorithms which discussed above, requires a large number of terms. The level of accuracy calculation by the first method consists of complexity of calculating zeros of Bessel functions and the functions itself. The second model from this point is more simple to implement. To validate the quality of the simulation is possible to use the estimation of the stationary random process correlation function. FIGURE 4 Realization of generalized Wiener process with α = 0. 3 FIGERE 5 Realization of generalized Wiener process with α = 0. 7 References [1] Dzhaparidze K O, Zanten J H A series expansion of fractional Brownian motion CWI. Probability, Networks and Algorithms R0216 [2] Buldygin V V, Kozachenko Yu V 1998 Metric characterization of random variables and random processes Amer. Math. Soc., Providence, RI 260 [3] Prigarin S M 2005 Numerical Modelling of Random Processes and Fields Novosibirsk pp 259 [4] Kozachenko Yu V, Pashko A A 2014 Accuracy of Simulation of the Gaussian random processes with continuous spectrum Computer Modelling and New Technologies 18(3) 7 12 [5] Kozachenko Yu V, Pashko A A 1999 Simulation of random processes Kyiv: T. Shevchenko University, pp 224 NN06 20 Nano Technologies

21 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kiv A, Fuks D, Bondaruk Yu, Fedoseeva K Mechanism of radiation-stimulated displacement of n-p- junction in memory devices A Kiv, D Fuks, Yu Bondaruk, K Fedoseeva South-Ukrainian national pedagogical university after K. D. Ushinskij Low-temperature radiation-stimulated diffusion (RSD) in solids has been studied for a long time [1]. These processes have a special importance for the operation of electronic devices in conditions of radiation effects. Elements B and P are dominating doping elements in silicon electronics. The electronic structure of these doping atoms and silicon are close and this determines their arrangement in Si lattice. B and P are located in the center of Si tetrahedron. In the ionized state P forms with surrounding Si atoms usual two-electron bonds similar to Si-Si bonds. P impurities create shallow traps in the forbidden gap of silicon, and the third sp electron is located at large distance from P atom (~100 Å). Its influence on P- Si bonds is small. Proceeding from these considerations one can write the potential of P-Si bonds using the potential for U Si Si Si-Si ( ) bond with some correcting terms. The correcting terms account the difference between nuclear charges of Si and P ( U 1) and the screening action of the third sp electron ( U 2). Thus the expression for the P-Si bond potential can be written as: U = U Si Si + U 1 + U 2. (1) The potential for Si-Si bond is known and used in many works [1]. The correcting terms can be calculated using the stationary perturbation theory: * ' U1 = ψ H ψdτ. (2) In (2) H is a perturbation operator, ψ is the hybrid wave functions for Si-Si bonds. The perturbation operator H is: * ' ZZ H = r. (3) Z accounts the difference between nuclear Here charges of P and Si. Z* is an effective charge of Si atom. U 1 U 2. Calculations showed that P-Si potential provides a displacement of nearest Si atoms to interstitial sites with low activation energy. This leads to formation of E-center: P+V, which determines the mechanism of P diffusion in silicon [1]. In the region of space charges of n-p junction P atoms are ionized. The field of n-p junction stimulates their slow diffusion and consequently the natural ageing of device. In conditions of γ irradiation the ionization of deep electronic shells of P atoms leads to multiple charging of P atoms due to Auger transitions. In its turn additional vacancies are formed and the diffusion coefficient increases. Fig. 1 illustrates this qualitative mechanism of the radiationinduced displacement of n-p junction. In Fig. 1 the black line shows a concentration of B atoms. The blue curve shows the distribution of P atoms before (down) and after (up) irradiation. As a result of γ irradiation gradient of P atoms distribution decreases due to RSD of P atoms in the region of n-p junction. As a result of this redistribution of P atoms the n-p junction shifts from position 1 to position FIGURE 1 Explanation in text The main effect in memory devices in conditions of γ radiation is a radiation-stimulated redistribution of doping impurities in the region of n-p junction. This effect leads to the lost of rectifying properties of n p junctions. It is clear that a shift of n p junctions causes a shrink of channel length in memory transistor. It is also clear that the spreading of n p junctions leads to a weak programming ability of memory device. References [6] Vavilov V S, Kiv A E, Niyazova O R 1981 Mechanisms of defects formation and migration in semiconductors Nauka, Moscow (in Russian) NN07 21 Nano Technologies

22 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Aubakirov A B, Zhailaubai N, Mansharipova A T Biological feedback during the stress Aubakirov A B 1, 2, Zhailaubai N 2, Mansharipova A T 3 1 Kazakh-Russian medical university department of general medicine, RK Almaty 2 NIS, RK Almaty 3 KRMU, RK Almaty Abstract Biofeedback - a strategic component of any treatment and recovery process, providing potential mechanisms of self-actualization and developing prospect of treatment. This is medical technology, where the patient, which is a passive object of medical manipulations, naturally becomes an active subject in all medical and rehabilitation process. Keywords: stress, biofeedback, psychology 1 Introduction Set of diagnostic methods that open up the possibility of managing the functional state are necessary in order to maintain mental health and increase stress tolerance. One of these methods is the method of biofeedback (BFB). It helps to accelerate the learning of self-regulation skills and improve a person's ability to resist stress. The idea of the biofeedback is to train the subconscious human regulatory mechanisms, i.e. fundamental physiological processes that ensure its homoeostasis. The importance of studying this direction increases also in connection with the growth of maladaptive diseases and forced long-term intake of drugs that promote super saturation of the organism with subsequent disruption of higher nervous activity, and hence of the whole organism [4-6]. 2 The purpose and objective The aim of the work is to diagnose physiological changes in students under conditions of educational stress using BOS training. 1. To study the correlation of psycho physiological features. 2. Analyse the psychological and physiological literature on selected topic. 3. Perform a study of physiological parameters using BOS-method based on the school and university. 4. Carry out a psychological study about the quality of patients life. 5. To determine ways of correcting the educational stress and normalizing the activity of the autonomic nervous system, which will allow students with less loss of health and more successfully absorb the learning process. 3 Material and procedure of the experiment With an equal ratio of theta and beta rhythms, the moment of aerodynamic balance with the dominance of the alpha rhythm comes. The state of the aerodynamic balance is considered optimal for humans [1, 2]. The principle of biofeedback (BFR) is based on the fact that the effective functioning of any biological system depends on the return of information in the form of feedback on the operation of this system. BFR sessions were conducted daily for 10 days, in an isolated room, where patients sat in a sitting position on the armchair. The training was conducted in the presence of methodologists. Before and after each session, the subjective state of patients was determined according to the psychological test of SAN-7, systolic and diastolic blood pressure, heart rate, and the temperature was monitored. Training in EEG-BOS mode lasted for 20 minutes, without taking into account the time for psychological testing, measurement of hemodynamic parameters. Also, conducted psychological testing using SAN techniques, short-term memory, personal and reactive anxiety for Spielberger-Khanin [3]. The results of the work are processed by the method of variation statistics using the t Student's test. 4 Results and its discussion The study of the psycho-emotional state according to the Spielberger test in the patients of the main group revealed a significant decrease in reactive anxiety (from 44 to 34 ± 1.90 to ± 2.05 points) by the end of the training as compared to the control one, where this index decreased only by 3.84 points (Table 1). According to the SAN-30 test (Table 2), a noticeable improvement in all indicators (well-being, activity, mood) was observed before and after the training in the patients of the main group. At the end of BOS-training in patients of the main group, there was a significant improvement in RAM by 1.56 points (in the control group by 0.39 points). The level of subjective determination of the quality of life in the two groups studied has not undergone any significant changes. NN08 22 Nano Technologies

23 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Aubakirov A B, Zhailaubai N, Mansharipova A T TABLE 1 Dynamics of changes in the degree of anxiety in the Spielberger-Khanin test (in points) Groups well-being activity mood initial final initial final initial final Basic n=30 5,19+0,32 6,03*+0,18 4,22+0,30 5,53*+0,25 5,14+0,31 6,12±0,28 Control n=30 4,99+0,33 5,49+0,41 4,78+0,32 4,91+0,33 5,55+0,31 6,01±0,20 TABLE 2 Dynamics of evaluation of the state according to the SUN test (in points) Groups the quality of life initial final basic 15,09+1,89 14,82+2,08 control 16,40+1,97 15,57+1,89 TABLE 3 Determination of quality of life in patients Groups personal anxiety reactive anxiety initial final initial final Basic n=30 45,08±2,11 41,36±2,31 44,34±1,90 21,30±2,05 Control n=30 42,36±1,44 40,36+2,41 39,18±2,83 35,34±2,21 *р <0,05 The reliability of the differences with respect to the reference level The average score in the experimental group is higher than in the control group at 1.31 (initially) (final). Table 3 shows the quality of life of patients. The analysis showed that the students with bio-adaptive management in the complex was better tolerated when passing the test control. They were earlier than the patients of the control group adapted to the stresses. 5 Conclusion The analysis showed that patients with adaptive management in the complex better tolerated the situation when passing the test control. They were earlier than the patients of the control group adapted to the stresses. Thus, biologically feedback can be one of the additional methods of adaptation to chronic stress. The use of psychological training has a positive effect on the inclusion of compensatory mechanisms, to reduce internal conflict and improve health, as well as the psychological status of patients. References [1] Petrova T S, Pronichev I V, Grechishnikova Y E N 2013 Reaction of the central nervous system to non-verbal psychotherapeutic effects: vegetative link of regulation Physiology of man 29(1) [2] Kropotov Yu D, Ponomarev V A, Grin-Yatsenko V A 2001 The method of EEG-biocontrol in the treatment of attention deficit hyperactivity disorder in children Physiology of man 27(3) 5-11 [3] Functional systems of the body: Manual Under. Edition of K Sudakov.- М., 2015, 450 [4] Sudakov K V 2007 Individual resistance to emotional stress Therapeutic archive [5] Chernigovskaya N V, Vereshchagna A A, Svyatogor I A 2015 About the central mechanisms of biofeedback by involuntary functions of the person 28-e Sovet. On probl. Supreme.L.: Science. P [6] Vysochin Yu V, Denisnko Yu P, Gordeev Yu V 2015 Increase of the adaptive capabilities of the body of athletes with the help of biological feedback Physiology of man 31(5) 12 NN08 23 Nano Technologies

24 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Antonova Y I, Ismailova A A Introduction of European Emergency department system in Kazakhstan Y I Antonova, A A Ismailova * Kazakh-Russian Medical University, the Republic of Kazakhstan, University ofalmaty *Corresponding author s adalyat_ismailova@mail.ru Abstract This study has four main objectives and the first one is the development of recommendations for the organization of admission offices, which will allow to reduce the time of stay of a patient in the mentioned offices. The second objective is to reduce the frequency of unreasonable refusal in hospitalization. Further, the study aims to reduce the number and duration of the patients' stay in hospitals. Finally, this study will help to optimize the organization of work of admission offices by using the developed diagnostical route at admission of a patient with an emergency pathology. Keywords: emergency, emergency department, emergency room 1 Introduction Enhancement of emergency aid is one of the basic tasks of the state program for development of health service. This is determined by increase in number of hospitalized patients during the last few decades, which implies higher requirements for functioning of admission stage of admission department and search for new technologies in first-aid treatment in inpatient conditions. The experience of foreign countries proves that optimization in admission of emergency patients into inpatient department is reached by formation of inpatient Emergency department. One of the means for optimization in arrangement of inpatient aid was usage of short-term treatment beds, which permit to reduce amount of admission for expert care by 30-40%. 2 Materials and methods 1. Survey-analytical method. 2. Comparative method 3 Obtained results First time in Kazakhstan, the pilot program «Emergency room» was started on June in Almaty at CCH 4. Front office providing admission of patients, communications, receiving and input of passport data has been created. Multidisciplinary and patient-oriented examination in unified examination room has shortened patient s staying time down to minutes. Patient support service and internal assurance service have been arranged. Waiting room, area of comfort and confidence, with ability of remote surveillance on first-aid treatment was arranged. This system has improved succession between PHC (transfer of assets). 4 Conclusion Functioning of admission department is based on patientoriented principle, i.e. patient s bed is to be surrounded by multidisciplinary medical team in order to make a decision on further therapeutic approach and manipulations such as bandaging, plaster immobilization, blood sampling, diagnostic ultrasound or electrocardiogram. References [1] Emergency Department, Graphic Standards Programming and Schematic Design June 1999 [2] JSC "Medical University of Astana" UDC: : (043.3) Kuspaev E N 2011 Optimization of the organization of the work of the admission department in urgent clinics Thesis for obtaining the scientific degree of Doctor PhD, Astana [3] Order of the Acting President. Minister of Health of the Republic of Kazakhstan from September 12, On approval of the Instruction on the organization of the reception of medical organizations providing inpatient care NN09 24 Nano Technologies

25 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kabetenova A A, Mansharipov D, Mukhamedieva E, Berkimbaeva Z, Mansharipova A T An experimental investigation and visualization of the programmed cell death of cardiomycites Kabetenova A A 1, Mansharipov D 2, Mukhamedieva E 3, Berkimbaeva Z 4, Mansharipova A T 5 Abstract 1 NIS PhMD, Republic of Kazakhstan 2 KazNMU after S.D. Asfendiyarov, Republic of Kazakhstan 3 Aksham Association, Republic of Kazakhstan, ISMA, Latvia 4 IOGC, Republic of Kazakhstan 5 KRMU, Republic of Kazakhstan *Corresponding author s dralma@gmail.com The main purpose of a project was a research on the topic of apoptosis as well as a visualization of apoptosis process on the base of experiments the group has made. It has been first time when the scientific methods of visualization of apoptosis mechanism in cardiomycytes was modeled. Results of the study revealed the basics for the visualization of pathogenetic mechanisms of coronary heart desease. The project shows visualization of new information about the apoptosis in the development of coronary heart disease, describes the visualization methods of apoptosis in the cardiovascular system, the effect of nitric oxide donator on apoptosis, shows anti-apoptotic function of hsp70 protein. Keywords: apoptosis, cardiomyocytes, experiment, visualization 1 Introduction The processes of apoptosis of myocardial cells in animals which suffer from coronary insufficiency syndrome have not been adequately studied. The aim of the study was to study and model apoptosis in cardiomyocytes of people with coronary insufficiency. The methods which were applied include experimental, histological, biochemical and computer modelling. As a result of the work, apoptosis of cardiomyocytes was studied in the modelling of coronary insufficiency and modelling of the process was carried out. The aim of the research was to investigate and visualize the process of apoptosis in the heart cells of animals during coronary insufficiency. Materials of the study. For the experimental part of the study, 300 non-breed male rats weighing g were used. Coronary insufficiency syndrome was developed in the group including 20 animals. The control group consisted of 20 male rats with a mass of g, contained on a single diet, at room temperature, in aerated cells, under conditions similar to experimental animals that were not under any stress. The experiments were conducted in the period of autumn and winter. Experimental work on laboratory animals was carried out in accordance with the European Convention for the Protection of Vertebrates. According to M. Paltsev s Histological studies of myocardial tissue - staining with hematoxylin - eosin, Sudan III, Schick reaction on glycogen, reaction to succinate dehydrogenase. [4]. The studies were performed on a microscope "Leica DM4000B" with a semi-chromatic / Fluotar lens, a digital video camera "Leica DFC 320" and a resolution of 7.2 Mpx. Leica Microsystems. Apoptosis in cardiomyocytes was determined using the TUNEL method. The apoptotic index of myocardial tissue is calculated as the ratio of the number of positively stained nuclei to the total number of cardiomyocytes. Calculations were carried out in 20 randomly selected fields of view with increasing 400. In animals, ECG studies were performed in I, II, III standard leads on the EC1T-3M2 device. "Aloka 1700" with a zoom of 100% in the "Teicholc" program. The levels of total and free blood corticosterone were calculated by the method of Pankov Yu.A., Cherkasova OR. [5]. The products of free radical reactions were determined on an EPR spectrometer of the firm "Bruker" (Japan) by the method of Agip Ya.I. [6]. To study the dynamics of the development of coronary insufficiency for 3, 7, 11, 14 days in animals, the histological parameters of the heart were studied according to the methods described above. Simulation of the apoptosis process had been provided using computer programs. It is known that inducers of apoptosis can be steroid hormones that affect the nucleus of the cell and lead to the initiation of apoptosis of cells [2]. The results of the study showed (Table 1) that the level of both free and total blood corticosterone in animals with coronary insufficiency was 1.3 times and 1.5 times, respectively, as compared to the analogous data of the animals in the control group, p < An increase in the level of the steroid hormone of blood in animals with coronary insufficiency testified to the presence of trigger activation factor for apoptosis of cells. NN10 25 Nano Technologies

26 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kabetenova A A, Mansharipov D, Mukhamedieva E, Berkimbaeva Z, Mansharipova A T TABLE 1 - Indices of free and total blood corticosterone in animals with coronary insufficiency (M ± m, ng / L) Indicator Control group n = 40 Group with coronary insufficiency syndrome n = 56 Reliability of differences Ceruloplasmin 2,57 ± 0,21 4,32 ± 0,38 Р < 0,05 Nitric oxide 35,47 ± 3,14 7,44 ± 0,68 Р < 0,001 Superoxide dismutase 15,64 ± 0,29 7,93 ± 0,44 Р < 0,05 Superperoxidanion 7,86 ± 0,13 19,56 ± 0,12 Р < 0,001 Hydroxyl radical 2,82 ± 0,16 6,91 ± 0,10 Р < 0,001 Xanthine oxidase 0,59 ± 0,05 1,23 ± 0,07 Р < 0,001 Peroxynitrite 0,96 ± 0,02 4,31 ± 0,07 Р < 0,001 NOTE: P-reliability of differences between the groups Another universal mechanism for triggering the process of apoptosis of cells is the violation of the balance of free radical reactions occurring in the body under various pathologies [7] Table 2 reflects the indices of free radical reactions of blood of animals with coronary insufficiency caused by immobilization stress. In the blood of animals with coronary insufficiency, the concentrations of superoxidanion, hydroxyl radical (2.5 times), xanthine oxidase (2.1 times), peroxynitrite (4.5 times), as well as lower levels of nitric oxide (in 4.8 times) Times) and superoxide dismutase (in 2 times) in comparison with the analogous data of animals of the control group. TABLE 2 - Parameters of free radical reactions in blood of animals with coronary insufficiency (M ± m, nmol / ml) Indicator Free corticosterone Total corticosterone Control group n = ,5 ± 2612, ,2 ±11612,4 Group with coronary insufficiency syndrome n = ,3 ± 1768, ,8 ± 12535,7 Reliability of differences Р < 0,05 Р < 0,05 NOTE: P is the reliability of the differences between the groups. The analysis of the obtained results showed that in animals with coronary insufficiency, the balance of free radical reactions changes in the direction of increasing the formation of toxic free radicals, which are inducers of apoptosis of cells. In the myocardium tissue of animals with coronary insufficiency, the concentrations of superoxide anion were significantly increased (by 2.7 times), hydroxyl radical (2.4 times), xanthine oxidase (2.6 times), peroxynitrite (3.5 times), and the levels of nitric oxide (2.7 times), superoxide dismutase (1.8 times) are lower compared with the analogous data of the animals in the control group. The results obtained in animals with coronary insufficiency showed a change in the balance of free radical reactions in myocardial tissue and an increased level of toxic forms of free radicals, which is a universal starting program for activating the processes of apoptosis of cells. Histological examination of myocardial tissue of animals with coronary insufficiency showed that, in contrast to myocardial tissue of intact animals, zones of myocardial ischemia, small foci of necrosis of muscle fibers with swelling of interstitium were recorded. In the tissue of the myocardium, multiple foci of proliferation of connective tissue elements around the dead groups of muscle fibers were found. At the same time, in the near-necrotic zones of the myocardium of animals with coronary insufficiency, vasoconstriction was revealed and there were no clear destructive changes in muscle cells. When studying the myocardial tissue of animals in the control group, no pathological changes were observed. The results of immunohistochemical study showed that in the group of animals with coronary insufficiency, the number of specifically stained cardiomyocyte nuclei significantly increased in comparison with the analogous index of the animals in the control group. Thus, the apoptosis index of cells of myocardial tissue of animals with coronary insufficiency was 21.4 ± 3.5%, which was 3.4 times higher than that of the control group animals, p < Immunohistochemical study of myocardial tissue of animals with coronary insufficiency during 3, 7, 11, and 14 days showed not only the presence of a variation in the apoptosis index from 18% to 61%, but also a statistically significant increase from 3 to 14 days. Thus, the study of the dynamics of changes in myocardial tissue of animals with coronary insufficiency from 3 to 14 days showed that there is a gradual increase in the number of cardiomyocytes that have entered the path of apoptosis. Simulation has shown that with time, the processes of apoptosis of cells in pathology gradually increase. 2 Conclusions 1. The apoptotic index of myocardial tissue of animals on the 3rd day of development of coronary insufficiency was 21.4 ± 3.5%, which was 3.4 times higher than that of healthy animals, p < In the blood and tissue of the myocardium of animals with coronary insufficiency, a significant increase in the level of superoxidanion (2.5 and 2.7 times, respectively), hydroxyl radical (2.5 and 2.4 times, respectively), xanthine oxidase (in 2, 1 and 2.6 times, respectively), peroxynitrite (4.5 and 3.5 times, respectively) compared with similar data of healthy animals. In the blood and in the myocardium tissue of animals with coronary insufficiency, the content of nitric oxide significantly decreases (by 4.8 and 2.7 times, respectively), superoxide dismutase (by 2 and 1.8 times, respectively) in comparison with the same data of healthy animals. The disturbed balance of free-radical reactions leads to an increase in the apoptosis process of cells. 3. Study of the dynamics of changes in myocardial tissue of animals with coronary insufficiency from 3 to 14 days showed that there is a gradual increase in the number of cardiomyocytes that have entered the path of apoptosis. NN10 26 Nano Technologies

27 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kabetenova A A, Mansharipov D, Mukhamedieva E, Berkimbaeva Z, Mansharipova A T References [1] Elsasser A, Suzuki K, Schaper J 2000 Unresolved issues regarding the role of apoptosis in the pathogenesis of ischemic injury and heart failure J Mol Cell Cardiol [2] Narula J, Kolodgie F D, Virmani R 2000 Apoptosis and cardiomyopathy CurrOpinCardiol [3] Rodriguez M, Lucchesi B R, Schaper J 2002 Apoptosis in myocardial infarction Ann Med [4] Pal'tsev M A, Anichkov N M 2001 Pathological anatomy Moscow: Medicine 401 [5] Cherkasova O R 2001 The content of total corticosterone Problems of endocrinology [6] Agipa Ya I 1983 Medico-biological aspects of the application of the EPR method M.: Science 528 p [7] Nepomnyashchikh L M, Lushnikova E L, Semenov D E 2003 Regenerative-Platic Heart Failure: Morphological Foundations and Molecular Mechanisms Moscow: Medicine 216 p NN10 27 Nano Technologies

28 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Arhipikin V S, Mislenkov S A, Kiseleva S V, Stoliarova E V Complex analysis of renewable energy resources in coastal regions: approaches and research V S Arhipkin, S A Mislenkov, S V Kiseleva*, E V Stoliarova Lomonosov Moscow State University, Faculty of Geography, Leninskie Gori, 1, , Moscow, the Russian Federation *Corresponding author s k_sophia_v@mail.ru Abstract The task of the complex analysis of renewable energy sources (solar, wind and wave) of coastal regions is put in the work. The urgency of the task is connected with the high concentration of these resources and the presence of energy consumers in regions remote from centralized energy supply (the case of the northern and Far Eastern seas of Russia) and in recreational zones (southern regions of the Russian Federation). The coast and water areas of the Black, Baltic and Barents Seas have been chosen as a research region. Open databases NASA SSE, NASA POWER which allow to determine the arrival of solar radiation on differently oriented surfaces are used to estimate solar energy resources. To calculate the parameters of wind waves in the Black Sea and Barents Sea the spectral wave model of the third generation SWAN and WaveWatch 3-model were used. Resource databases have been created and maps of the potential distribution of solar and wave energy have been constructed. Keywords: renewable energy sources, databases, modeling. 1 Introduction The wave energy of the ocean occupies a special place among other renewable energy sources (RES). This is due, on the one hand, to the enormous natural (gross) potential and significant efficiency of devices that convert wave energy into useful energy sources (up to 90%), on the other hand, by a small number of realized projects and installed wave power facilities in the world. The latter factor is related both to problems of a technical nature (lack of technical solutions that make it possible to achieve profitability of projects), and the lack of niche consumers of energy from wave installations. The latter factor plays a special role in Russia: the country has a huge length of the coastline. However, the coast of the Arctic and Pacific oceans is among the least populated areas, where power supply problems are traditionally solved with the help of diesel generators and local fuels. The coast of the southern seas of Russia (Black, Azov, Caspian) is characterized by high population density, but it is covered by centralized energy supply, which also limits the use of renewable energy sources in these regions. At the same time, even under these conditions, it is possible to identify some prospective consumers of renewable energy. In this case a complex analysis of renewable energy resources for the coastal zones is urgent. Experimental measurements of the physical and geographical characteristics that determine the potential of these renewable energy sources are complex, therefore methods of mathematical modeling, remote sensing of the Earth and the Ocean and reanalysis are widely used in this field. These methods and data sources allow calculations and estimates to be made on spatial grids with sufficient resolution for practical purposes. The paper presents approaches to assessing renewable energy resources for coastal regions using the example of solar and wave energy. 2 Assessment of the solar energy potential In accordance with the tasks, two data sets on incoming solar radiation (daily sums of total solar radiation and direct normal radiation) were collected on the basis of the open NASA SSE and NASA POWER databases [1, 2]. As the study regions, the water area and the coast of the Black, Barents and Baltic Seas were considered. The boundaries of the territories covered by the data sets are shown in Table 1. TABLE 1 Borders of research regions The boundaries of data sets about incoming Region of research solar radiation 46 N 32 E 46 N 42 E Black Sea 46 N 32 E 46 N 42 E 71 N 31 E 71 N 64 E Barents Sea 64 N 31 E 64 N 64 E 60 N 25 E 60 N 32 E Baltic Sea 54 N 20 E 54 N 32 E The structure of the data sets is presented in Table 2. They include solar radiation on the receiving surfaces of different orientations and different periods, during which the averaging of the characteristics of solar radiation is carried out. In a large territory of Russia, due to climatic conditions, solar installations are effective only when used in the summer, or in the warm six months. Therefore, the following values of solar radiation are included in the data sets: the average value for each month of the year, the average value for the year, the summer period, and for the NN11 28 Nano Technologies

29 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 warm six months. Spatial resolution of the database is (1x1). TABLE 2 Structure of the data sets. φ is the latitude of the site, the optimal orientation is the angle at which the receiving surface receives the maximum amount of solar radiation for a given averaging period, the warm half year is April-September, the cold half year is October-March Characteristic The total solar radiation, (kwh/m 2 /day) Direct normal radiation (kwh/m 2 /day) Orientation of the receiving surface (the angle relative to the horizontal, ) 0, 90, φ, φ+15, φ-15, optimal orientation Surface oriented normal to the solar radiation The averaging period Month, year, summer, warm half year Month, year, summer, warm half year, cold half year Arhipikin V S, Mislenkov S A, Kiseleva S V, Stoliarova E V grid for each of the seas with a time step of 3 hours. For the Black Sea a series was obtained from 1979 to 2010, for the Barents Sea from 1979 to Based on the simulation data, the annual and monthly average wave energy supplies (the fraction of the whole series of data when the wave energy exceeds a predetermined value) were calculated. The average longterm distribution of the wave energy supply (more than 1 kw/m) for the Barents Sea is shown in Fig. 2. In the open part of the Black Sea energy in only 30% of cases exceeds the value of 1 kw/m, then for the Barents Sea this value exceeds 80%. In both seas the wave energy decreases from west to east, which is due to the general western transport in the atmosphere and the trajectories of the cyclones. The average energy for the Barents Sea is an order of magnitude greater than for the Black Sea. Figure 1 illustrates the cartographic implementation of the data sets on solar energy resources for the research region (the Barents Sea). FIGURE 1 Annual averaged insolation incident on a horizontal surface (kwh/m 2 /day) 3 Assessment of the wave energy potential To calculate the parameters of wind waves in the Black Sea, the spectral wave model of the third generation SWAN (Simulating Waves Nearshore [3, 4]) have been used. To model the waves in the Barents Sea, the WaveWatch 3- model was used, since this model allows us to specify the boundaries of the sea ice spreading. The configuration of the model WaveWatch3 was chosen almost the same as in the SWAN model, so that the results of the wave reproduction were the same [5]. As the input wind data, the high-resolution reanalysis NCEP Climate Forecast System Reanalysis ( ) were used. The spatial resolution of the reanalysis is ~ 0.3, the time step is 1 hour. The calculations were carried out on a special irregular triangulation grid, which allows reproducing highresolution wave parameters in selected coastal regions with a small total number of nodes. For the open part of the Black Sea, the space step was 12 km, and for the coastal zone up to 200 m. The total number of grid nodes is For the Barents Sea the space step is from 50 km to 500 m respectively. As a result of the calculations, the values of the wave energy flux (W/m) were obtained for each node of the FIGURE 2 Distribution of the wave energy supply (more than 1 kw/m) for the Barents Sea Also on the basis of the calculations carried out, the maps of the wave energy supply were constructed for values of 2, 5, 10 kw/m. Of some interest is the average energy supply for different seasons of the year. For example, in January for the Black Sea wave energy supply is 2 times greater than for the summer months. In the Barents Sea seasonal differences are much less pronounced and the wave energy supply is more constant in time. 4 Conclusions The obtained results can be used to determine the water areas most promising for the location of wave power plants, as well as coastal areas that have a high solar energy potential. Numerical modeling of the wind wave fields of the Black, Baltic and Barents seas is carried out using the spectral wave models SWAN and WaveWatch3. Calculations were made on irregular and rectangular computational grids of high spatial resolution. As the driving force the wind from NCEP/CFSR reanalysis was set. Comparison of the results of calculations with the data on the heights of wind waves from moored buoys has shown that the use of the new generation of NCEP / CFSR reanalysis significantly improves the quality of the reproduced wind wave fields in comparison with the results obtained using NCEP / NCAR reanalysis. Based on the simulation data, the annual and monthly average wave energy supplies were calculated. Acknowledgments The reported study was funded by RFBR according to the research project NN11 29 Nano Technologies

30 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Arhipikin V S, Mislenkov S A, Kiseleva S V, Stoliarova E V References [1] The NASA Surface meteorology and Solar Energy 2017 Available at: ( ) (In English) [2] The NASA Prediction of worldwide energy resource 2017 Available at: ( ) (In English) [3] The SWAN team. SWAN user manual (Cycle III version 40.72AB) Delft: Delft University of Technology; 2009 [4] Arkhipkin V S, Gippius F N, Koltermann K P, Surkova G V 2014 Wind waves in the Black Sea: results of a hindcast study Natural Hazards and Earth System Sciences Discussions [5] Mislenkov S A, Arkhipkin V S, Koltermann K P 2015 Vestnik Moskovskogo Unviersiteta, Seriya Geografiya (In russian) NN11 30 Nano Technologies

31 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Sinchev B, Orazbekov S The research of efficiency of Zipf s first law applied to Kazakh languaged texts B Sinchev, S Orazbekov * Information Systems Department, International Information Technologies University, Manas/ Zhandosov st., 34 «А»/8 «А» Almaty, Kazakhstan *Corresponding author s orazbekov.sayatbek@gmail.com Abstract The analysis of scientific works in the field of the Kazakh language is carried out. The Zipf s first law is applied to the texts written in Kazakh language. The algorithm and the calculation model of the proposed method is described. It is shown that mostly all documents written in Kazakh language, produces approximately same stable value of Zipf s coefficient. The experiment was conducted on a imaginative literature written in Kazakh language, referring to different topics. Based on the results of the experiment, we have calculated the Zipf s coefficient to be in range To extract a term from a word (cut off endings) Porter s Stemmer was modified and used. The results of the calculations were displayed using the «Matlab» modeling environment. The possibility of application of Zipf s first law to Kazakh-language documents is shown and proven. Keywords: term, occurrence frequency, categorising, frequency rank, probability 1 Introduction Due to the fact that the volume of virtual information in Kazakh language is growing, it becomes necessary to extract the needed data from a huge number of documents. In addition to finding an article or book containing the necessary information, you often have to rank from thousands of sources most suitable for the query. That grows an interest of categorising the documents by topics. The problem of categorizing natural language texts by machines has long been of scientific interest [1]. Solving the documents thematically categorization problem, some methods like LSA (latent-semantic analysis), linguistic analysis, statistical analysis can be applied. However, all methods mentioned above, requires extracting the keywords. Keyword is a term, whose semantic factor (meaning weight) is higher than other terms of this texts. In other words, these are the terms, which carry the main aim of a text. Assuming texts related to sports topics, keywords should be like play, winner, goal and etc Those terms can also be met in a texts related to finance topic, but they are not the keywords there. The problem here, is to teach the machine, to be able to extract needed keywords from texts. 2 Analysis of modern researches and publications There are many works of scientists related to the problem of extracting terms. There is a work of Kiyoshi Emori and Noriko Ohtsuki named Keyword extraction apparatus for Japanese texts where they claim that frequency information acquisition means acquires the appearance frequency of each keyword candidate. Importance calculation means calculates the importance of each keyword candidate as keyword. Keyword finalizing means definitely determines as true keywords only those keyword candidates having degrees of importance above a designated level of importance [2]. Another interesting work is the work named Automatic extraction of keywords from scientific text: application to the knowledge domain of protein families, done by M A Andrade and A Valencia. They developed system that consequently extracts domain-specific information from the analysis of a set of protein families [3]. That was a good practice of integration of biology and informatics. Also, there is a work of extracting the keywords using chain. This work called Using lexical chains for keyword extraction and was done by Gonenc Ercan and Ilyas Cicekli. A lexical chain holds a set of semantically related words of a text and it can be said that a lexical chain represents the semantic content of a portion of the text [4]. From that investigations we can obviously claim that the interest of extracting the keywords is still popular through many scientists from many countries. Also, there are many methods to perform this task. 3 The problem formulation In this paper, we are going to work with the texts in Kazakh language. However, it turns out that all man-made texts are built according to uniform rules! [5] No one manages to get around them. Whichever language is used, whoever writes a classic or graphomaniac the internal structure of the CM01 31 Computer Modelling and Information Technologies

32 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE text will remain unchanged. It is described by the laws of Zipf (G.K. Zipf). Zipf s law where applied on many languages like English, Russian and etc and it was always proven that it works. If it is suitable for other languages why not to apply it to Kazakh language. First Law of Zipf says that all texts written by human should have a constant C = Probability * Rank. Depending on language of text that constant may change its value [5]. The problem here is to calculate the value of that constant applying Zipf s law to texts written in Kazakh language. Sinchev B, Orazbekov S you should understand that in statistics there is nothing absolutely accurate: 50, 52 is not so important.) [5]. 4 The aim of paper The main goal of our paper is to experiment with application of Zipf s first law to texts written in Kazakh language. Therefore, to calculate Zipf s constant C, and use it to extract the keywords in future works, where keywords are the most meaningful words of a text. 5 The research material The first law of Zipf "rank - frequency". Choose any word and count how many times it appears in the text. This value is called the occurrence frequency of the word. We will measure the frequency of each word in the text. Some words will have the same frequency, that is, enter the text an equal number of times. Group them by taking only one value from each group. Arrange the frequencies as they decrease and number them. The sequence number of the frequency is called the frequency rank. So, the most common words will have rank 1, following them - 2, etc. We poke at random into the page and determine the probability of meeting the word that the choice has fallen to. The probability will be equal to the ratio of the frequency of occurrence of this word to the total number of words in the text [5]. Probability = Frequency of occurrence of a word / Number of words (1) Zipf discovered an interesting regularity. It turns out that if we multiply the probability of finding a word in the text for a frequency rank, then the resulting value (C) is approximately constant! [5] C = (Frequency of occurrence of the word * Frequency rank) / Number of words (2) or C = Probability * Frequency rank (3) If we transform the formula slightly and then look at the math reference book, we see that this is a function of the type y = k / x and its graph is an equilateral hyperbola. Hence, according to the first Zipf s first law, if the most common word occurs in the text, for example, 100 times, then the next most frequent word is unlikely to occur 99 times. The frequency of occurrence of the second most popular word, with a high probability, will be at the level of 50. (Of course, 6 Experiment FIGURE 1 Plot of the function y=k/x The value of the constant in different languages is different, but within one language group it remains unchanged [5], no matter what text we take. For example, for English texts the Zipf constant is approximately 0.1 and for Russian texts the value is [5]. It is interesting, how do Kazakh texts look from the point of view of Zipf's first law. They are not an exception. Analysis of the files with Kazakh texts convinced that the law is impeccable here. For the Kazakh language, the Zipf s coefficient turned out to be Although these studies do not pretend to be complete, the universality of Zipf's laws allows us to assume that the obtained data are completely reliable. To calculate that value we took a list of texts and calculated the frequency of each word met there. To extract each term independently of endings (to cut off endings), we used the Stemmer of Porter. Of course we modified the classical Porter s algorithm to fit it for grammatical rules of Kazakh language. FIGURE 2 The database of texts taken from literature written in Kazakh language Afterwards, we have calculated the C coefficient for each word in a book. The results proved that Zipf was right. CM01 32 Computer Modelling and Information Technologies

33 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Sinchev B, Orazbekov S FIGURE 3 Zipf s coefficient of a words in a book Kara Sozder, Abai FIGURE 4 Zipf s coefficient of a words in a book Koshpendiler, I. Esenberlin We can t show the plots of every book, but the results for each book were similarly stable. Hence, from the figures above you can clearly see that around 80-90% of a words from text, have the same value of C (Zipf s coefficient) TABLE 1 The Zipf s coefficient for each book. which is close to value Other words are assumed to be an error or exception. From that results we have calculated the mode (the most frequent value) and assigned that value to each book. Book name Zipf constant abai-kara-soz pdf abai-kara-soz pdf abai-kara-sozder-1-10.pdf abai-kara-sozder pdf Abyl-akyn-zhyrlary.pdf Akan-Seri-Zhyrlary.pdf Dospambet-Zhyrau-zhyrlary.pdf Kaztugan-Zhyrau-zhyrlary.pdf koshpendiler1.pdf Magzhan-Zhumabayev-Olender.pdf Magzhan-Zhumabayev-poemalar.pdf Mirzhakyp-Dulatov-angimeler.pdf Mirzhakyp-Dulatov-audarmalar_1.pdf Mirzhakyp-Dulatov-ballada-Burkit-kegi.docx.pdf Mirzhakyp-Dulatov-olender.pdf Mukagali-Makatayev-Bala-shaktan-bolashakka-poema.pdf Mukagali-Makatayev-olender-2-bolim.pdf Mukagali-Makatayev-olender-3-bolim.pdf Mukagali-Makatayev-olender-4-bolim.pdf Mukagali-Makatayev-olender-5-bolim.pdf Mukagali-Makatayev-olender-6-bolim.pdf Mukagali-Makatayev-olender-6-bolim_1.pdf Mukagali-Makatayev-poema-Akkular-Uiyktaganda.pdf Mukagali-Makatayev-poema-Altai-Atyrau.pdf Mukagali-Makatayev-poema-Appassionata.pdf Mukagali-Makatayev-songy-minuttar-poema.pdf Saken-Seifullin-akkudyn-airyluy.docx.pdf Saken-Seifullin-lashyn-angimesi.docx.pdf Shozhe-Karzhaubaiuly-olenderi.pdf Shyganak-Gabiden-Mustafin.pdf Zhambyl-Zhabayev-olenderi.pdf Using Matlab tool, we have plotted that results and obtained the following picture: CM01 33 Computer Modelling and Information Technologies

34 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE FIGURE 5 Zipf s coefficient of each book, plot As you can see, from the figure above, the value of Zipf s coefficient is approximately similar for each book. Generally, it it somewhere between , but most frequently texts produced the value of Conclusions The analysis of Zipf s first law applied to Kazakh language texts provides quite stable results it terms of the coefficient Sinchev B, Orazbekov S C. Except some exceptions, all other documents produced similar results. We can certainly conclude, that Zipf s first law works for Kazakh language texts and most of the texts produce the coefficient to be in range The computational experiment confirmed the stability of Kazakh texts in term of Zipf s first law and that results can be used to extract the keywords [6] by applying the Zipf s second law in the future works. This approach can also be used to understand the ancient letter or hieroglyphs. More precisely, if the letters will produce stable Zipf s constant, we can certainly say that texts were written by human being, or just pictures drawn for fun, otherwise. Acknowledgments We wish to acknowledge the teams of web portals and for digitizing the literature in Kazakh language and sharing it through web. That is great job in terms of saving the language and without that database of texts in Kazakh language our experimental analysis would be impossible to accomplish. References [1] Palagin A, Krivy S, Petrenko N, Bibikov D 2012 Formalization of the problem of extracting knowledge from natural language texts Sofia: Information technologies & knowledge 100 p [2] Emori K, Ohtsuki N 1997 Keyword extraction apparatus for Japanese texts [3] Andrade M A, Valencia A 1998 Automatic extraction of keywords from scientific text: application to the knowledge domain of protein families [4] Ercan I C 2007 Using lexical chains for keyword extraction 8 [5] Popov A 2016 Effective method of searching for information on the Internet. Search the Internet - inside and out [6] Sinchev B, Orazbekov S, Filko I 2017 Application of latent-semantical method for kazakh-language documents categorization CM01 34 Computer Modelling and Information Technologies

35 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Auyelbekov U Big Data in telecommunication: behavioural analysis of subscribers and churn prediction U Auyelbekov * International Information Technology University, Manas str. 34A, Almaty, Kazakhstan *Corresponding author s ulan.iitu@gmail.com Abstract While customers are able to switch between communication service providers, subscribers churn becomes a major problem in telecommunication industry and it is emerged as crucial. According to high concurrency in media of communication, business model in telecommunication industry must be focused on customer retention than customer acquisition. Because acquiring new clients costs five to six times more than retaining existing customers [1]. No other industries have data about clients as much as telecommunication companies. Refining acquired data from customers can be potential way for communication service providers to improve economic assets. Behavioral analyses of subscribers are based on systematic analyses of that wealth dataset and discover new profit streams. Keywords: Big Data, churn prediction, telecommunication 1 Introduction The aim of this paper is to demonstrate how big data techniques are used to implement behavioral analysis of subscribers and customers churn prediction. In telecommunication industry huge client base provides enormous information that can be complex systematically analysis and retrieve valuable information. Customers requirements influence for customer service providers to spread service offerings. Since the cost of winning a new customer is far greater than the cost of retaining an existing one, mobile carriers have now shifted their focus from customer acquisition to customer retention [2]. Big Data techniques are positioned as the solution to predict potential churners and develop optimal strategies in the way of customer retention. 2 Analytics Acquired data from different data sources does not bring wealth information itself until retrieved data is not structured. Big Data becomes value when there are business model included big data technologies to solve business challenges. This activity requires proper software tools and excellent skills to use them. Examining local telecommunication companies structure there is no communication service provider which engaged in big data techniques to implement customer behavioral analysis. Churn prediction models extremely important to use algorithms to retrieve a model in data which can give wealth information about subscribers. Structured analysis of that data can bring information about customers who about to churn. If communication service providers are able to predict which customer is potential churner, they can avoid unfavorable results in customer retention way. 3 Recommendations Survey in big data techniques clearly gives understanding that big data is right thing for telecommunication industry. Analysis of coming data is important to identify potential churners and focus on customer retention activities. This paper is aimed to give recommendation to extract more wealth from big data. Social media analysis. Social network is the right way to acquire most of customer feedback to services and deeper insights customers needs and expectations. Also social media analysis is the way to monitor resonation from subscribers by providing new services. Analysis data from call-centers. By transcription into plain text call-center conversations between operator and customer provides implement sentiment analysis retrieved information from client. There can be text classification like client needs and expectations and problems caused in providing services. It is important to start analysis of existing data. Customer service providers are everyday provided information form clients with different classification. And the first thing for telecommunication companies is to extract wealth information from existing data. Big data blueprint development. Before to be engaged in big data the first thing is to implement blueprint in using big data. Blueprint comprises requirements and strategy in embedding big data in business model. It is important to consider business model expectation and current IT structure of company. It helps to get common vision how company tries to imbed big data in process. CM02 35 Computer Modelling and Information Technologies

36 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE 7 Conclusions Churn prediction model in positioned as the major activity in telecommunication industry and big data must be the crucial aspect as the future of telecommunication companies Auyelbekov U to extract more beneficial information and pass new business challenges. Systematic analysis and acquiring wealth information based on the historical data about customers opens new ways for telecommunication industry in customer retention methodologies. References [1] Verbekea W, Dejaegera K, Martensb D, Hurc J, Baesens B 2012 New insights into churn prediction in the telecommunication sector: A profit driven data mining approach European Journal of Operational Research 218 [2] Qureshi S A, Rehman A S, Qamar A M, Kamal A, Rehman A 2013 Telecommunication Subscribers Churn Prediction Digital Information Management (ICDIM), Eighth International Conference CM02 36 Computer Modelling and Information Technologies

37 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Aytkhozhaeva Zh E, Ziro A A, Zhaibergenova A Zh Virtualization safety Zh E Aytkhozhaeva 1, A A Ziro 2, A Zh Zhaibergenova 2* 1 Kazakh National Research Technical University, associated professor, Satpayev Str. 22, Almaty, Kazakhstan 2 Kazakh National Research Technical University, tutor, Satpayev Str. 22, Almaty, Kazakhstan *Corresponding author s zhanshuak@gmail.com Abstract Article considered virtualization technologies, their types, advantages and disadvantages. Attention to specific risks and information security threats in case of virtualization platforms is paid. The main risks of virtualization platforms are defined. Potential internal vulnerabilities of virtualization platforms can be revealed only by testing for penetration which user-friendly and available instrument for implementation is specialized by Kali Linux OS. The attacks to the virtual machines with use of the Kali Linux tools were organized. As a result of experiments is Kali Linux allows revealing and analyzing vulnerabilities at the channel, network and transport levels. For detection of problems at the level of applications that is urgent for virtualization of platforms, it is necessary to use commercial products of ethic hacking in addition. Keywords: virtualization platforms, risks, penetration testing 1 Introduction Virtualization technologies, along with cloud computing, take key positions among the advanced and perspective trends in IT area since 2009 (according to the analytical company Gartner). Taking into account that virtualization technologies are the fundament of cloud computing, it is possible to give with confidence a prize-winning place of virtualization without which cloud computing are unrealizable. Much of advantages and disadvantages of virtualization technologies automatically reflected in cloud computing. Virtualization technologies passed the already considerable way of the development from purely scientific interest and decisions for insulation of computing environments of different tasks within one mainframe before creation of the virtual area networks and program containers encapsulating a complete set of the virtual hardware resources [1]. In a general view there is the type of virtualization: virtualization of resources. Virtualization technologies resources historically gained earlier development and recognition- the multiprocessor systems, clustering of computers, grid computing, the virtual area networks, etc. Virtualization technologies platforms began to develop later. Now actively develop and progress, have a set of different types of implementation are cornerstones of cloud computing. Deployment on one physical server of a set of the virtual servers which ensure functioning of any operating system gives big advantages and absolutely new opportunities [2]. Prospects of technology of virtualization of platforms are also defined by it. But wide recognition and application restrains existence enough serious shortcomings of this technology [3]. Experience shows that many projects on virtualization were comprehended by failure. Nearly a half of the companies (44%) which made virtualization attempts can't claim about their successful completion. This is due to the difficulty of assessment of resetting of investments, and to complexity and high cost of deployment and support of corporate virtual infrastructure. 2 Virtualization disadvantages Appearance of new poorly studied and low-probed risks and security risks of information when using virtualization including in cloud computing also belongs to shortcomings of technology. This weakness is compounded by the fact that different types of virtualization of platforms bear specific risks and threats due to specifics of the implementation. Physical, logical and program structures are a defining factor for appearance of risks and threats of information. In architecture of the computing systems used in the virtual decisions nothing changed. Therefore the basic conventional principles of support of information security shall be observed also in such systems. Virtualization not to a lesser extent needs protection and a judgment on its bigger safety thanks to the most structure doesn't respond the reality. On the contrary, specific risks and security risks of information in case of virtualization of platforms in addition take place, as well as in case of any new technology. The main problem constraining development and implementation of virtualization of platforms is the problem of protection of such systems. Use of standard checked methods and security features in case of virtualization platforms, in that look in what they exist now isn't enough. In case of virtualization of platforms of property of a physical medium exist in the form of program settings. And it is simpler to change program settings illegally. For example, the standard security reference monitor (a CM03 37 Computer Modelling and Information Technologies

38 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE resident component of safety) controlling loading processes can't perform the functions when loading the virtual machines. At the same time the resident component of safety shall be present and have access to the controlled environment. For the virtual environment there shall be specific mechanisms of monitoring. By operation in the virtual environments of virtualization platforms the situation changes very quickly. New components are quickly created and together with them also new potential threats are created. At the time of creation of the virtual machine it isn't protected in any way. Constant control of a situation is necessary. The solution is complicated by the fact that architecture of systems of virtualization different for different types of virtualization platforms. For example, depending on a type of virtualization platforms, the hypervisor, being the manager (monitor) of the virtual machines (compact highly specialized OS), is set or on "bare iron", or/and on OS. There are also such types of virtualization (virtualization at the level of an operating system) when the hypervisor isn't used. The expression that virtualization ensures the best information security, is based only that on the virtual machines it is simpler to set rules of a network access. The statement, that vulnerability of a hypervisor and probability of the attack to it very low, is based that there is no information on the attacks to hypervisors. It isn't confirmation of either absence of the attacks, or high safety of hypervisors. There is no accuracy of an exception of risks and threats of virtualization of platforms exist. Besides, now virtualization technologies begin to be applied to violation of confidentiality, integrity and accessibility of information more and more actively. The research Blue Pill project which visually showed how technologies of the hardware virtualization can be applied in the espionage purposes (the Blue Pill program including a hypervisor) is known. Now Blue Pill is a code class name of root kits (the programs hiding presence at system of malicious software) based on use of the hardware virtualization. 3 Risks and threats of virtualization The research of risks and information security threats when using virtualization is an urgent problem, both in respect of safety of the virtual infrastructures, and in the theoretical and practical development plan and advances of technologies of virtualization. It is necessary to define the main risks of virtualization platforms: 1. a uniform point of a failure in a failure mode of the physical server; 2. a uniform point of a failure in a hypervisor failure mode (in case of its existence) and/or hosts OS (in case of its existence); 3. risk of a compromise of a hypervisor of the virtual machines (in case of its existence) and/or hosts OS (in case of its existence); 4. implementation of a hypervisor in the form of software module is more vulnerable to the attacks, than hardware or software implementation; 5. risk of a compromise of data by memory transmission (local storage) from one virtual machine to another; Aytkhozhaeva Zh E, Ziro A A, Zhaibergenova A Zh 6. violation of insulation of processes (virtual machines), basic principle of virtualization; 7. risk of a nonadjustable data migration of limited access; 8. a possibility of network attacks between the virtual machines (virtual servers) located on one physical server; 9. the known decisions on program virtualization aren't provided with protection at the hardware level on TPM technology (the specification describing the trustable module which makes available to an operating system guaranteed safe services). Even in new technologies of the hardware virtualization a part of the mechanism of virtualization is implemented by the software of a hypervisor. There is a nonzero probability of existence of the hidden or functional vulnerabilities of a hypervisor and possibility of carrying out the attack against it: 1. the risks connected to increase in mobility and use of the virtual machines in architecture of cloud computing; 2. the unrolled virtual systems often don't conform to requirements of a corporate policy of information security. Operations in the field of minimization of new risks and threats of virtualization technologies of platforms are carried in different directions. Some of them are provided below. Good hypervisors contain the virtual switchboards and firewalls which settle down between physical interfaces of the server and the virtual interfaces of the virtual machines. Protection against network attacks between the virtual machines (virtual servers) located on one physical server is provided (in the absence of a compromise of a hypervisor of the virtual machines). For the hypervisors Microsoft, IBM, Citrix and VMware companies gives a guarantee of insulation of processes and data of the virtual machines from each other. It is considered that it provides a possibility of safe information processing of different level of privacy on single physical device. The Symantec Company offers the Symantec NetBackup platform with V-Ray technology which on the basis of patent decisions provides evident representation of the virtual machines and applications on physical and virtual servers. The technology of backup and restoration for the environments VMware and Microsoft Hyper-V, quickly selective recovery of data from the applications working under control of hypervisors of VMware and Hyper-V is implemented. The AMD company developed AMD-V technology in which a special protect mode of start of the monitor (hypervisor) of the virtual machines is realized. The Intel Company used the previous TPM 1.2 specification (the last TPM 2.0 specification) for increase in security in one of the chipsets (technology of safety LaGrande/TXT). Even this short list of operations shows, risks of virtualization of platforms are how various. At the enterprise using technologies of virtualization it is necessary to clarify - what risks threaten business processes at present and to estimate these risks [4]. In case of estimation of risks assessment of probabilities of events as the risk is a combination of probability of an event and its consequences are executed. CM03 38 Computer Modelling and Information Technologies

39 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE R = S * E, (1) where R is the risk, S is the extent of damage, E means probability of an event. For detection of potential internal vulnerabilities and assessment of probability of an unauthorized event, including in case of virtualization platforms, it is possible to use penetration tests. During testing the tester (auditor) models actions of the malefactor, trying to break information security of a subject to protection. Search of vulnerabilities of system of protection and their subsequent use is executed. Now testing for penetration is one of the information security systems recognized around the world as method in case of the active audit. There is a standard on conducting testing for penetration [5]. There are different programs for conduct testing for penetration (ethic hacking), including specialized Kali Linux OS [6]. The Kali Linux tools allow executing search of operation of vulnerabilities in Web servers, wireless protocols, communication links, mobile devices, applications. Having set Kali Linux on single virtual machine, it is possible to attack other virtual machines, as for the purpose of testing for penetration, and unauthorized obtaining information. 4 Detection of vulnerabilities by means of testing In an experiment the virtual machines created in VMware Workstation were used. Having set Kali Linux on one virtual machine, the attacks to other virtual machines for the purpose of testing for penetration and unauthorized obtaining information were organized. Results of some of them are given below. One of the methods of detection of vulnerabilities is port scanning of the virtual machines by means of the network Wireshark analyzer. Wireshark analyzer is the application of the Kali Linux. Wireshark analyzes the traffic passing through the network interface of the computer that allows viewing completely contents of the transferred packets at all levels. Wireshark listens to all network traffic and captures it. In a Figure 1 the results received by Wireshark by the analysis of the traffic passing on wires through ports of one Aytkhozhaeva Zh E, Ziro A A, Zhaibergenova A Zh of the virtual machines are provided. In a Figure 1 the flow of network packets which can be analyzed is visible. It is visible that the system of virtualization VMware is used. Contents of the packet both sent, and received can be opened, having executed click on it. We obtain information on port and the IP address of the sender, port and the IP address of assignment, the transfer protocol, lifetime of a packet, etc. FIGURE 1 An example of the scanned traffic Packets can be filtered in a set of parameters. It is possible to set the filter for receiving the traffic meeting certain requirements. By means of the "http.request.method == "POST"" filter it is possible to intercept login and the password, to obtain information on a frame, the version the protocol Internet, the data transfer protocol, the hypertext transfer protocol. In a Figure 2 in the upper part the selected packet from the intercepted flow of packets which contents reveal below is shown. It is visible that the packet of HTTP is encapsulated in a packet of TCP (transport layer), the packet of TCP is encapsulated in IP (network layer), and IP is in turn encapsulated in Ethernet. In the lower part of a Figure 2 the HEX code is shown. Disclosing the level of each protocol, we obtain the detailed information from each level. In a Figure 2 information of a packet 56 of HTML forms is shown. The login and the password entered by the user are defined. If to open the most top line, it is possible to obtain general information about a frame. Information on a packet of 2572 from the Ethernet level is shown in a Figure 3. Information about destination, source address and type of IP (IPV4) is presented. FIGURE 2 An example. Interception of data FIGURE 3 An example of the intercepted data (from the Ethernet level) In a Figure 4 is shown information on a packet 2572 from the IP (IPV4) level. The figure includes information about differentiated services, flags, destination GeoIP. FIGURE 4 An example of the intercepted data (from the IP level) CM03 39 Computer Modelling and Information Technologies

40 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Aytkhozhaeva Zh E, Ziro A A, Zhaibergenova A Zh Information on a packet of 2572 from the TCP level is shown in a Figure 5. Figure defined source port, destination port, flags and etc. FIGURE 7 An example. Interception of the ciphered data 5 Conclusions FIGURE 5 An example of the intercepted data (from the TCP level) Information on a packet of 2572 from the HTTP level is shown in a Figure 6. Information about request method, host, content-length and cookie is presented. In case of use of cryptography protocols (in this case TLS), a part of the intercepted information will be ciphered and the level of the ciphered sockets will be visible (Figure 7). Figure defined TLSv1, handshake protocol. In case of interception of the ciphered data they can be decrypted by using the appropriate settings. FIGURE 6 An example of the intercepted data (from the HTTP level) Virtualization is not only perspective strategic technology which has specific risks and threats. The vulnerabilities of platform virtualization need to be identified considered and minimized, including by means penetration testing. Free products of penetration testing are easy to use. They allow identifying vulnerabilities on the channel, network and transport levels, having built-in expert systems. When solving problems at the application level, these products unusable. In this case necessary to use commercial solutions. Commercial products of the penetration testing use more advanced technologies and have extended capabilities compared to free ones. This provides additional opportunities in assessing risks and threats. Platform virtualization works on the application level. Therefore, penetration testing should be performed on both the channel, network and transport layers, and at the application level. It should be remembered that virtualization platform technologies can be applied also in illegal purposes to violation of information security. Virtualization gives new opportunities, but also place of IT professionals more demands, both in respect of professional level, and in respect of level of responsibility and ethics. References [1] Portnoy M 2016 Virtualization Essentials John Wiley & Sons: Indianapolis p. 309 [2] The Advantages and Disadvantages of Virtualization Milner Feb 2017 [3] Ziro A A, Aytkhozhaeva E Zh 2017 Trend virtualizatscii i ego osobennosti III Mezhdunarodnaya nauchno-practicheskaya konferentsiya: Fundamental nye Nauchnye Issledovaniya: Teoreticheskie i Practicheskie Aspekty ZapSibNTS: Kemerovo pp (in Russian) [4] ISO/IEC 27005:2011 Information technology Security techniques Information security risk management International Organization for Standardization Feb 2017 [5] Information Supplement: Penetration Testing Guidance PCI Security Standards Council pcisecuritystandards.org/documents/penetration_testing_guidance _ March_2015.pdf 1 Mar 2017 [6] Official Kali Linux Documentation Kali Mar 2017 CM03 40 Computer Modelling and Information Technologies

41 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Rysbaiuly B, Yunicheva N The computational algorithm for calculating the thermal properties of the rock mass with inaccurate initial data B Rysbaiuly 1*, N Yunicheva 2 1 International University of Information Technologies, 34 «А» Manas Street, , Almaty, Kazakhstan 2 Institute of Information and Computational Technologies, 125 Pushkin Street, , Almaty, Kazakhstan *Corresponding author s b.rysbaiuly@mail.ru Abstract The paper discusses the coefficient inverse problem for one-dimensional heat equation with inaccurate initial data. A conjugate difference problem is developed on difference level. The problem is solved by method of interval analysis. Condition of applicability of Thomas method and its computational convergence are obtained. Estimates of the interval width of solutions of difference problems and functions of Thomas method are also gained. Keywords: inverse problem, difference scheme, inaccurate data, estimation, width of intervals, convergence 1 Introduction The aim of the work is to find an effective coefficient of thermal conductivity of materials. Methods of finding thermal conductivity have been studied by many researchers, as an example we refer to works [1-5]. However, when it comes to practical application of the developed methods, the new circumstances are found out that are not taken into account in the theoretical development of methods of calculation of thermal properties of materials. For example, composites consisting of a matrix and inclusions of various shapes are widely used as structural and functional materials in various instrumentation devices. Significant number of works are devoted to the research of thermal conductivity of composites. However, calculation formulas in these studies were obtained, as a rule, either as a result of processing of experimental data in relation to specific materials, or by setting a priori distribution of temperature and heat flow in models of the structure of heterogeneous bodies [6]. Material of different inclusions in the composite can have different thermal conductivities [7-11]. In this case, when assessing the effective thermal conductivity composite is considered as multi-phase [12, 13]. Thermal properties of soils are key elements in determining speed of movement and haloe forms of thawing. The thermal conductivity of unfrozen and frozen ground is one of the main parameters that is difficult to determine by indirect method. This parameter is influenced by many factors: genesis, structure of ice, size and configuration of soil particles. Therefore, the actual thermal conductivity may differ significantly from the calculated one [14]. For most materials the thermal conductivity is weakly dependent on temperature, so the sample heating can be neglected. Exceptions are permafrost soil, whose thermal conductivity strongly depends on temperature, and in the range of natural or calculated temperatures close to zero, may vary up to 30% or more [15]. One of limitations of using devices to work with the frozen soil is insufficient limit of thermal conductivity measurement, focused either on working with insulating materials, whose thermal conductivity is significantly lower than the thermal conductivity of the soil, or with building materials [16]. Furthermore, currently a large number of devices use nonstationary method of determining the thermal conductivity, which involves heating and subsequent cooling of the sample, and the resulting speed of propagation of the thermal wave is interpreted by certain thermal conductivity value. This method reduces time needed for measurement and is applicable to materials whose thermal conductivity does not depend on the temperature. Using this method to determine the thermal conductivity of frozen soils can lead to incorrect values because of the wide temperature range in the sample and the phase transition of water in the ground due to excessive heat exposure of device. Consequently, the thermal conductivity of soil is determined in a state which does not exist in nature, and the value may differ up to 30% or more from thermal conductivity under natural conditions [16]. Therefore, in view of above arguments, accurate, welldefined models and algorithms are not suited to solve problems that, by their nature, are too complex and multisided. The most relevant and promising for studying complex thermodynamic systems, under condition of uncertainty, are interval methods. Such methods allow to take into account the uncertainty and inaccuracy in coefficients and parameters of such systems. 2 Conclusions In the course of work, the following results were obtained: An iterative method is developed to find the thermal conductivity coefficient with inaccurate data for the CM04 41 Computer Modelling and Information Technologies

42 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE complex thermodynamic metastable systems; Stability of the method of solving the coefficient inverse problem is studied with inaccurate data for the heat conductivity equation. The obtained results reflect the actual problem of developing elements of the theory of automatic control of interval-specified objects of various classes and the Rysbaiuly B, Yunicheva N development of interval methods in management theory, which allows to reduce the computational cost. These results can be used for various applications in the management of modern objects of industries in education. Theoretical and practical results will be used in the construction of interval algorithms to study the thermal parameters of metastable rock systems. References [1] Williams P J, Smith M W 2015 The Frozen Earth: Fundamentals of Geocryology Publisher Cambridge University Press, Cambridge (hardbach) ISBN pp [2] Rysbaiyly B 2015 Stability and Convergence of Iterative Method for Solving the Inverse Problem of Heat Transfer in Multilayer Ground International Conference on Applied Mathematics, France [3] Beck J, Blackwell B, Saint-Clair Ch 1985 Inverse Heat Conduction. Ill-Posed Problems Academic Press [4] Hasanee A, Lesnic D 2013 Determination of a time-dependent heat source from nonlocal boundary conditions Engineering Analysis with Boundary Elements 37(2013) [5] Hasanov A 2012 Identification of spacewise and time dependent source terms in 1D heat conduction equation from temperature measurement at a final time International Journal of Heat and Mass Transfer 55(2012) [6] Han Z, Fina A 2011 Thermal conductivity of carbon nanotubes and their polymer nanocomposites: a review Progress in Polymer Science 36(2011) [7] Sandrock G, Reilly J, Graetz J, Zhou W-M, Johnson J, Wegrzyn J 2005 Accelerated thermal decomposition of AlH3 for hydrogen-fueled vehicles Appl. Phys. A [8] Dantzer P 1997 Metal-Hydride Technology: A Critical Review, in Hydrogen in Metals III. Properties and Applications (Topics in Applied Physics, Volume 73) // Ed. by H. Wipf. Springer-Verlag Berlin Heidelberg p [9] Dedrick D.E., Kanouff M.P., Replogle B.C., Gross K.J. Thermal properties characterization of sodium alanates // J. Alloys and Compounds Vol.389. P [10] Kim K J, Montoya B, Razani A, Lee K-H 2001 Metal hydride compacts of improved thermal conductivity Int. J. Hydrogen Energy [11] Rodriguez Sanchez A, Klein H P, Groll M 2003 Expand ed graphite as heat transfer matrix in metal hydrid e beds Int. J. Hydrogen Energy [12] Klein H P, Groll M 2004 Heat transfer characteristic s of expanded graphite matrices in metal hydride be ds Int. J. Hydrogen Energy [13] Celzard A, Krzesinska M, Begin D, Mareche J F, Puricelli S, Furdina G 2002 Preparation, electrical and elastic properties of new anisotropic expanded graphite-based composites Carbon [14] Chawla K K 1999 Composite Materials Science & Engineering, New York, Springer-Verlag [15] Evans A, Marchi C S, Mortensen A 2003 Metal Matrix Composites in Industry Dordrecht, Kluwer Academic Pub. [16] Porfiri M, Nguyen N Q, Gupta N 2009 Thermal conductivity o multiphase particulate composite materials Syntactic and composite foams [17] Lykov A V 1982 Heat and Mass Transfer Moscow: Energiya 560 p. [18] Matsevityi Yu M 2002 Inverse heat conduction problems Kiyev, Naukova dumka (In Russian) [19] Cheng C-Y 2003 Shape Identification by Inverse Heat Transfer Method J. Heat Transfer 125(2) рр [20] Rysbaiuly B 2014 Mathematical properties of the iterative method to calculate the coefficient of thermal conductivity of multilayer ground Wulfenia Journal, Austria 20(12) [21] Kalmykov S A, Shokin J I, Juldashev Z X 1986 Mehods of interval analysis N.: Nauka SO p.224 [22] Zholen L, Kifer M, Didri O, Valter E 2007 Applied interval analysis M.: Institute of computer researches p.467 [23] Kabanikhin S I 2011 Inverse and Ill-Posed Problems. Theory and Applications De Gruyter, Germany 459 p. CM04 42 Computer Modelling and Information Technologies

43 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Suleimenov B A, Toktassynova N R, Suleimenov A B Intelligent operational diagnostics subsystem of the technical condition of CHPP turbogenerating sets B A Suleimenov *, N R Toktassynova, A B Suleimenov Kazakh National Research Technical University after K I Satpayev, Satpayev 22, Almaty, Kazakhstan *Corresponding author s batr_sul@mail.ru Abstract The turbogenerating set is considered as an object of run-time diagnostics, its diagnostic indicators were selected, and the decomposition of the "Turboagregat" system was carried out in order to reduce the dimension of the intelligent diagnosis models of its individual elements. Based on the knowledge, experience and intuition of the operators of the CHPP, the planning matrices of the full factorial experiment was built. The matrices used for obtaining the diagnosis knowledge base (model) of individual turbine elements. Simulation test of diagnosis models were conducted to assess their adequacy, responsivity, stability and uniqueness. Keywords: turbogenerating set, multiparameter diagnostics, full factorial experiment, fuzzy model, neural model, neural fuzzy model 1 Introduction Diagnostic functions allow to fix the beginning of destructive processes in a technological object (TO) at an early stage. Such processes are irreversible, but their evolution can be controlled and predicted using the method of look-ahead multiparameter diagnostics (MPD), which produces an aggregate assessment of the monitored parameters trends at any specific time. The forecasting function refers MPD to look-ahead diagnostics, which, through the issuance of a control action, prevents unwanted results at the control object. As control inputs, messages about necessary actions and signals of operating mode regulation are used, including signals for disabling the TO to prevent destructive processes. The existing methods of monitoring the operational characteristics of TO are included in the labor periodic verification of their values in case of scheduled outages, involving qualified personnel. These methods relate to test diagnostics. With such control, in the event of the appearance of unacceptable parameter values, the possibility of timely taking precautionary measures preventing the reduction of operational TO resources is excluded. At the same time, continuous computer monitoring systems allow to monitor the rate of change of TO maintenance characteristics, predict the time of the necessary repair work to extend its safe operation and prevent the inevitable failure of the equipment. Thus, the confunction of the automated process control system and the subsystem of operational diagnostics make it possible to conduct the processes not only in real-time and optimally, but also safe for TO. In general, to create a subsystem of operational diagnostics, it is necessary to solve the following interrelated tasks. To develop a mathematical model of a diagnostic object functioning, which allows to verify capability and correctness of functioning using set of diagnostic variables (DV). Create a mathematical model of damages and failures, which makes it possible to detect damage and failure, identify the causes of their occurrence. Construct diagnostic algorithms by choosing a set of elementary checks, by results of which it is possible: to distinguish between serviceable and operable state, or the state of correct functioning from its faulty states in problems of detecting damage and failures; distinguish between faulty and inoperable states in problems of damages and failures search. In most technical diagnosis tasks, diagnoses are set in advance, and in these situations the recognition problem is often called the classification problem. A set of sequential actions in the recognition process is called the recognition algorithm. There are two basic approaches to the problem of recognition: probabilistic and deterministic. Probabilistic methods require a large amount of priori information. Deterministic approaches more briefly describe the essential aspects of the recognition process, less dependent on redundant, low-value information, more consistent with the logic of human thinking. However, a deterministic approach requires knowledge of qualitative and quantitative mechanism, occurring of physical-chemical phenomena in the TO, that is not always possible. One of the most important features of technical diagnostics is fault recognition within of limited information, when it is required to be guided by certain methods and rules for making a reasonable decision. In these conditions, the most promising approach can be the usage modern intelligent technologies (IT) in problems of recognition. In [1 and 2], we proposed and tested the technique of using intelligent technologies of the creation control systems for technological processes using the planning matrices of the full factorial experiment (FFE). We are inclined that this technique can also be used to create subsystems for operational diagnostics of CM05 43 Computer Modelling and Information Technologies

44 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE technological equipment, because in researching, developing and implementing the processes of diagnosing the technical state of objects, it is necessary to solve the same tasks which occur in researching, developing and implementing the control processes in general. Thus, the methods of developing intelligent diagnostic algorithms proposed in [3] allow to synthesize intelligent algorithms for operational diagnostics of the technical state of equipment based on the generated FFE matrices (knowledge base of experts). 2 Decomposition of the "Turboagregat" technical system We conducted a survey of the operators from the turbine department, which showed that the main variables, characterizing the state of the turbogenerating set, are the following X 1 vibration of axial bearer; X 2 vibration of bearing pedestal; X 3 temperature of axial bearer babbit; X 4 temperature of bearing pedestal babbit; X 5 axial shift towards the generator; X 6 axial shift towards the chair; X 7 relative high-pressure rotor expansion; X 8 relative low-pressure rotor expansion; X 9 hydrogen pressure in the generator frame; X 10 hydrogen temperature in the generator frame; X 11 oil temperature after the oil cooler; X 12 pressure in the discharge chamber of the highpressure cylinder; X 13 hot steam temperature; X 14 hot steam pressure; X 15 breaking of vacuum in the condenser; X 16 temperature of the metal in the high-pressure cylinder; X 17 temperature of the metal in the low-pressure cylinder. Х 18 oil pressure on greasing; Х 19 oil pressure on the generator shaft seal. All these variables are controlled by devices, which makes it possible to synthesize the automated system of operational diagnostics of the technical state of the CHPP turbogenerating sets. In accordance to the methodology [3], it is necessary to create a planning matrix of the full factorial experiment (FFE) for the intellectual model of diagnosis and prediction synthesis. However, in this case, it is necessary to produce a huge number of "mental" experiments, for example for a 3- level evaluation, the number of test points is N = 3 19, which is absolutely unrealistic to implement. Therefore, it is necessary to decompose the formation problem of the planning matrix of the FFE. For that purpose, we propose evaluating the influence of diagnostic variables (DV) Х 1 Х 19 on condition of separate main parts of turbogenerating sets, which will mitigate the number of dimensions influence on forming planning matrix of the FFE. Taking into account the fact that the steam turbine is a tandem-compound double-cylinder aggregate, intended for direct drive of the generator, we propose to consider the Suleimenov B A, Toktassynova N R, Suleimenov A B turbogenerating set as a set of the following basic elements located on one shaft: bearing pedestal (BP), high-pressure cylinder and rotor (HPC), low-pressure cylinder and rotor (LPC), AC generator (ACG), axial bearer (AB). In addition, in view of the particular danger we are entitled to consider the hydrogen handling system (HHS) in the frame of the generator as a separate element, not connected with the other by shaft (figure 1). Designations of turbogenerating set in the figure 1: LC-leading chair (hydraulic control unit for controllers) it also has a shaft turning gear; AB - axial bearer; BP - bearing pedestal; HPC - high-pressure cylinder; IPC, LPC intermediate and low-pressure cylinder in one frame; BE - backup exciter. X1 X3 X11 X9 X10 HHS X2X4 BP AB LC AB AB HPC X11 X18... AB YHHS X2 X4 ACG Yb X5,6 X7 X18 X11 X12 Yb X5,6X19 X2 X4 AB X18 X11 AB X2 X4 BE X5,6 X8 X15 X2X4 AB X11 X18 IPC, LPC AB AB AB... X18 X11 BP Yb X11 X3 X1 FIGURE 1 Elements of a turbogenerating set and variables characterizing their state Figure 1 shows that the technical condition of the bearings is affected by vibration, temperature of babbit and oil, at the same time, the level of the technical condition of the 10 bearings (Y AB and Y BP) are diagnostic features for assessing technical condition HPC, LPC and ACG. It is necessary to take into account the fact that the state of axial bearer and bearing pedestal affect on these elements of the turbine. Therefore, it is necessary to take into account the assessment of the technical condition of only one of the 10 bearings, which has the worst evaluation value (Y b). Accounting the one general assessment of the technical condition of bearings (Y b) will reduce the number of DVs by one for each of the three main elements: HPC, LPC and ACG. Assessment of the technical state of the most dangerous hydrogen handling system (Y HHS) depends on the pressure and temperature of hydrogen in the generator frame. At the same time, Y HHS with other DVs (X 5,6, Y b and X 11) can be used as initial data for the evaluation of the whole technical condition of the generator. At that, the axial shift towards the generator (X 5) and axial shift towards the chair (X 6) are incompatible factors, i.e. shift can be implemented either in one or the other direction, so we combined these two factors into one - X 5,6, which reduced the number of DVs by one for each of the main elements: HPC, LPC and ACG. In addition, the X 16 (temperature of the metal in the highpressure cylinder) and X 17 (temperature of the metal in the low-pressure cylinder) variables are DVs for assessing the CM05 44 Computer Modelling and Information Technologies

45 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE technical condition of HPC and LPC only in the process of preparing them for startup at heat penetration. In the process of normal operation of the turboaggregating set, they are not controlled, so we excluded them from the number of DV, lowering the dimension size of the solving problem. X 13 (hot steam temperature) and X 14 (hot steam pressure) variables are purely technical, depending on the physical state of the stream coming from the boiler department. On these variables, it is not possible to assess the technical condition of HPC and LPC, so we also excluded them from the number of DV. Thus, taking into account the reduction of diagnostic variables, the evaluation of each of the main elements of the turboaggregating set (TS) can be estimated only by 4 DV (figure 1), thus the number of "mental" experiments for each part of TS (HPC, LPC, ACG and AB) will be N=3 4 = 81, which is easy enough to implement. 3 Formation of FFE matrices for individual elements of a turboaggregating set The next step in the methodology [3] involves the questioning of experienced operators, which were working with turbine units for a long time for the formation the base rules (bases of knowledge). It should be noted that creating a "base of knowledge" is much easier and safer, than carrying out of experimental researches on an operating object, because it does not require active intervention on the turboaggregating set. The survey made it possible to formulate a rule in the form of a planning matrix of the full factorial experiment (FFE) with a 0.5-point step for HPC (table 1), where 0 corresponds to minimum values of variables, 1 to maximum. TABLE 1 Fragment of the FFP planning matrix for the synthesis of the high-pressure cylinder model Input data Output data experiment Y b Х 5,6 Х 7 Х 12 Y HPC , , , , ,00 Table 1 is the basis for the synthesis of an intellectual model for diagnosing a technical condition of HPC. Similarly, the planning FFE matrix is formed for other turbine elements. The efficiency of the subsystem of operational diagnostics of the turboaggregating set will depend on their quality. Using the data from table 1 and the Matlab package, three types of HPC diagnostics were synthesized: fuzzy, neural and neural fuzzy models. Table 2 shows the results of a comparison of the three types models of HPC diagnosis. As a result, the most adequate is the diagnostic model of the technical condition of the HPC, synthesized using of neural fuzzy technology. Similarly intelligent diagnostic model of technical condition of LPC, AB and ACG were synthesized. Suleimenov B A, Toktassynova N R, Suleimenov A B TABLE 2 Results of comparison three types of diagnostic models Neural Fuzzy Neural fuzzy experiment logic network logic Expert Y HPC 1 0,63 0, ,612 0,60 2 0,64 0, ,648 0, , ,98 1, , ,98 1, , ,98 1, , ,98 1,00 Error % 11,5 8,05 1,65 4 Synthesis and analysis of intellectual models for the diagnosis of HPC Let s consider the results of modeling the state of HPC (Y) for different values of the input variables: X 1, X 2, X 3 and X 4, obtained by using neuro-fuzzy model of diagnosis. Figure 2 show the results of modeling the state of HPC (Y) depending on the change of the overall condition of the axial bearer and bearing pedestal (X 1) for different values of the pressure of the discharge chamber HPC (X 4), equal to the maximum (X 4=1,0), intermediate (X 4=0,5) and minimum (X 4=0) values. Modeling was performed at the nominal values of the axial shift towards generator or leading chair (X 2=0) of the relative high-pressure rotor expansion (X 3=0). Figure 2 shows that the maximum value (Y = 1) of the technical specification of the HPC has the maximum values of the axial bearer and bearing pedestal (X 1 = 1) for all values of pressure in the discharge chamber of the HPC (X 4 = ). This is fully understandable - just as the general state of the axial bearer and bearing pedestal is equal (X 1 = 1) is inapplicable and will inevitably cause the shutdown of the turboaggregating set, according to the operating instructions. With the standard pressure in the discharge chamber of the HPC (X 4 = 0) and with the standard state of the axial bearer and bearing pedestal (X 1 = 0), the overall technical condition of the HPC is the best (Y = 0), and with deterioration of the general technical condition of the axial bearer and bearing pedestal (X1 = 0.5), the overall technical condition of the HCP is equal (Y = 0.559). From figure 2 it is also evident that at the value of the pressure in the discharge chamber (X 4=0,5), characterizing the runout of the discharge chamber of HPC, and at the best value of the axial bearer and bearing pedestal (X 1 = 0) overall technical condition of the HPC is satisfactory (Y=0,249). According to the period of growth, i.e. the deterioration of the value of the axial bearer and bearing pedestal X 1, overall technical condition of the HPC is getting worse and at (Х 1=0,5) overall technical condition of the HPC is (Y=0,7), that means that the aggregate is not in the normal technical state and requires a heightened attention from operators, and if necessary a detailed inspection of the unit without stopping it. CM05 45 Computer Modelling and Information Technologies

46 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE X4=0 X4=0.5 X4=1 FIGURE 2 Modeling results for technical condition of the HPC assessment depends on pressure change in the discharge chamber at X 2=0 and X 3=0,5 From figure 2 it is clearly seen, that at the maximum values of the pressure in the discharge chamber (X 4 = 1), and at nominal values of the evaluation of the axial bearer and bearing pedestal technical condition (X 1 = 0), the overall technical condition of the HPC has an emergency mode (Y = 0.69), which is characterized by a poor condition of the HPC discharge chamber. At that, it is necessary to reduce the pressure in the discharge chamber of the HPC by way of unloading, i.e. reducing supply of hot steam to the turbine. At the general assessment of the technical condition of the axial bearer and bearing pedestal (X 1 = 0.5), the overall technical condition of the HPC is (Y = 0.759), which is inapplicable for long-term operation of the turboaggregating set. From the above, we can conclude that the values of the pressure, i.e the technical condition of the high-pressure chamber of the HPC (X 4) is not critical, because it is always possible to unload the turbine and thereby reduce this indicator. At the same time, the indication of the overall technical condition of the axial bearer and bearing pedestal is critical for the general state of the turboaggregating set, due to the impossibility of reducing this indicator with a working turbine, except for cases when the general technical condition of the axial bearer and bearing pedestal was affected by the following circumstances: 1. The bearing temperature has risen above the set point due to the non-normal operation of the refrigeration system. In this case, the operative personnel have the opportunity to switch to auxiliary cooling or standby systems. Or solve the problem by simply adjusting the already operating cooling system, if it is not damaged and its state is satisfactory. 2. Oil pressure on bearings fell below the minimum. In this case, the emergency backup is activated and the oil pump is automatically turned on. This is enough time for the operational staff to get the facts straight and to ensure the normal operation of the oil pump, through its maintenance and if necessary repair, so as to the safety technology of the turboaggregating set, it is not possible to operate for a long time without a backup oil pumps. Such a decision is accepted by the management team of the operational staff together with technical staff of the department. Figure 3 show the results of modeling the state of HPC (Y) depending on the change of the values of the axial shift towards generator or leading chair (X 2) for different values Suleimenov B A, Toktassynova N R, Suleimenov A B of the pressure of the HPC discharge chamber (X 4), equal to the maximum (X 4=1,0), intermediate (X 4=0,5) and minimum (X 4=0) values. Modeling was performed at the nominal values of the relative high-pressure rotor expansion (X 3=0) and overall condition of the axial bearer and bearing pedestal (X 1) X4=0 X4=0.5 X4=1 FIGURE 3 Modeling results for technical condition of the HPC (Y) assessment depends on values of the axial shift towards generator or leading chair (X 2) and X 1=0 и X 3=0 Figure 3 shows that at the minimum value of pressure of the HPC discharge chamber (X 4 = 0) evaluation of the technical condition of the HPC is deteriorating with increase of the axial shift towards generator or leading chair (X 2). At (Х 2=0,5) Х 4=0 Y=0,7, at Х 2=1 Y=1. Almost the same thing can be seen on the other two curves of the evaluation of the HPC technical condition, which have different initial data depending on the pressure values in the HPC discharge chamber. At (Х 4=0,5) Х 2=0 Y=0,249, at Х 2=0,5 Y=0,729, at Х 2=1, Y=1 and at (Х 4=1) Х 2=0 Y=0,69, at Х 2=0,5 Y=0,769 and at Х 2=1 Y=1. From this we can conclude that the value of the axial shift towards generator or leading chair (X 2) more important than the pressure in the discharge chamber Х 4. According to the operating instructions of the turboaggregating system, at increasing the value of the axial shift towards generator or leading chair and the inability to normalize it in the shortest time, turboaggregating set is shutdown. The axial shift can provoke a contact between the stator and the rotors in view of the minimum gap between them, which can be lead to the total destruction of both the stator and the rotor. With the normal operation of the turboaggregating set, the axial shift is fairly stable. However when hot steam parameters are abruptly changed, this indicator is going beyond the established, the operator at the same time should take steps for normalize hot steam pressure, which is given to turbine, by control valves manipulation in automatic or manual mode and signaling to other operators of parallel operating turbo-power units and boilers. Figure 3 show the results of modeling the state of HPC (Y) depending on the change of the relative high-pressure rotor expansion (X 3 from 0 to 1), at the nominal values of the overall condition of the axial bearer and bearing pedestal (X 1=0), axial shift towards generator or leading chair (X 2=0) and at values of the pressure of the HPC discharge chamber Х 4=0, Х 4=0,5 and Х 4=1 Figure 4 shows that at the different values of pressure in CM05 46 Computer Modelling and Information Technologies

47 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE discharge chamber of high pressure Х 4=0 Х 4=0,5 and Х 4=1, the initial points of the curves correspond to the state value of HPC Y=0, Y=0,249 and Y=0,6. At increasing value of relative high-pressure rotor expansion Х 3, and at pressure value of high-pressure chamber (Х 4=0 0,5 and 1), the state value of HPC (Y) is going to 1, i.e. to emergency state: at Х 4=0 (Х 3=0,5 Y=0,49), (Х 3=1 Y=1), at Х 4=0,5 (Х 3=0,5 Y=0,54), (Х 3=1 Y=1), at Х 4=1 (Х 3=0,5 Y=0,79), (Х 3=1 Y=1). This implies that the value of relative high-pressure rotor expansion Х 3 is also a critical value for HPC state assessment and for whole turboaggregating set. That statement corresponds to turboaggregating set operating instructions. High-pressure rotor expansion is cause of the same threat as axial shift towards generator or leading chair, with one exception that in this case the turbine stator could expand. Causes of high-pressure rotor excessive expansion are explained by a different thickness of the metal and the rotor. To compensate this phenomenon, flange and pin heating lines are provided. At nominal operation of the turbine, this phenomenon is not observed, it occurs only when the turbine is started and stopped Suleimenov B A, Toktassynova N R, Suleimenov A B FIGURE 4 Modeling results for technical condition of the HPC (Y) assessment depends on values of the relative high-pressure rotor expansion Х3 and at the nominal values of Х1=0 and Х2=0 5 Conclusions X4=0 X4=0.5 X4=1 Thus, the results of modeling the evaluation of the HPC technical condition are valid from the point of view of the technological process physics of the turboaggregating set and in full measure reflect the scores of the turbine engine operators of the CHPP. Similarly, intellectual models for diagnosing the technical state of LPC, AB and ACG were synthesized. References [1] Suleimenov B A, Mutanov G M, Suleimenov A B 2012 Intelligent control systems: theory, methods, tools Kazakh university: Almaty 222 pp. (in Russian) [2] Suleimenov B A 2009 Intelligent and hybrid process control systems Shikula: Almaty 304 pp. (in Russian) [3] Suleimenov B A, Sugurova L A, Suleimenov A B 2016 Intelligent systems of optimal control and operational diagnostics (methods of synthesis and application) Shikula: Almaty 235 pp. (in Russian) CM05 47 Computer Modelling and Information Technologies

48 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Tereykovskaya L, Tereykovskiy I, Aytkhozhaeva E, Tynymbayev S, A Imanbayev Improvement of learning efficiency of the neural networks, intended for recognition of graphic images in systems of biometric authentication L Tereykovskaya 1, I Tereykovskiy 2, E Aytkhozhaeva 3, S Tynymbayev 3, A Imanbayev 3 * 1 Institute of Solid State Physics, National Technical University of Ukraine Igor Sikorsky Kyiv Polytechnic Institute, 14-a Polytechnichna str., 03056, Kyiv, Ukraine 2 Kyiv National University of Construction and Architecture, 31, Povitroflotsky Avenue, Kyiv-037, Ukraine 3 Kazakh National Research Technical University, Satpayev Str. 22, Almaty, Kazakhstan *Corresponding author s azekeee_92@mail.ru Abstract Article is devoted to a problem of use of neural network technologies in the field of biometric authentication of users. It is shown that one of important the shortcomings of application of neural networks technology on the basis of a multi-layer perceptron for recognition graphic images in systems of biometric authentication of users is insufficient quality of processing of statistical data which are used when forming parameters of educational examples. It is offered to increase quality of educational examples due to use of the procedure of neural network coding of value of the expected output signal of educational examples which allows consider closeness of standards of the recognized classes in this signal. The coding procedure of the expected output signal providing use of a probable neural network is developed. The appropriate mathematical devices are created. As a result of numerical experiments it is shown that application of the developed procedure allows reduce the number of the computing iterations necessary for achievement of the given error of training by 30-50%. It specifies prospects of use of the proposed solutions for improvement of learning efficiency of the neural networks, intended for recognition of graphic images in systems of biometric authentication. Keywords: neural network, information security, learning, biometric authentication 1 Introduction The proved ability of neural network models (NNM) to effectively recover unknown multivariate table valued functions provided their broad application during creation of systems of recognition in different fields of science and technology [1, 2]. Application of NNM is especially urgent when the task of recognition is poorly formalized, and the result of its decision is highly responsible. A characteristic example of such tasks is application of NNM for recognition of graphic images in systems of biometric authentication of users of information systems. Though the practical experience of use of the known neural network systems and the analysis of sources [1, 2] also specifies rather powerful scientific and practical practices in this direction, but the same analysis specifies also insufficient learning efficiency of NNM on the basis of a multi-layer perceptron which are a basis of the specified systems. Because of this shortcoming time of creation of neural network system improvement and the accuracy of recognition of unknown input images decreases. Let's mark that NNM like a multi-layer perceptron is adjusted for training by the method "with the teacher" are considered. Today in technical systems generally such models are read the most approved. The main advantage of the multi-layer perceptron is high computational capability and as the shortcomings refers complexity and duration of training. Key parameters which define learning efficiency of NNM is the time and an error of training [2]. Values of these parameters directly depend on quality of educational examples which in case of the given statistical selection shall be provided due to different processing procedures of statistical data. 2 Analysis of the known approaches to processing of statistical data On the basis of data [1, 2] is defined that the majority of the known approaches to processing of statistics assume performing procedures which realize centering, normalization, scaling and/or scaling of input and output parameters of educational examples. For output parameters the main objective of the specified procedures is coercion of definition boundaries of variables of a real object to a certain interval. When using sigmoidal function of neurons activation of an output layer this interval is restricted to zero and unit, and when using a hyperbolic tangent limits of an interval from-1 to +1. Thus, the listed procedures only adapt output parameters of educational examples to the look suitable for application in neural network models, but aren't intended for impact on time and an error of training. At the same time results [3] are specified to reduce time and an error of training it is possible due to reflection in the expected output signal of educational examples of closeness of standards of the recognized classes. In the same operation [3] it is shown that it is possible to CM06 48 Computer Modelling and Information Technologies

49 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Tereykovskaya L, Tereykovskiy I, Aytkhozhaeva E, Tynymbayev S, A Imanbayev realize such display by means of the procedure of expert assessment of closeness of the specified standards. However use of the offered procedure is related to need of attraction of highly enough qualified experts for specific application area use of neural network system. In many cases it is impossible. Also it is possible to apply algorithmic criterion for evaluation of closeness of standards for implementation of display. However development of qualitative criterion requires considerable efforts and its existence levels needs use of NMM. At the same time the task of assessment of closeness of a limited set of standards of classes can be considered in a perspective use of low-resource neural networks for prospecting data analysis [2, 5] that allows assuming prospects of neural network coding of the expected output signal of educational examples of a multilayer perceptron. 3 Formulation of the problem The purpose of the real research is development of the procedure of application of low-resource neural networks for coding an output signal of educational examples of a multi-layer perceptron which at the expense of the accounting of closeness of standards of the recognized classes allows increase efficiency of its training. 3.1 DEVELOPMENT OF CODING PROCEDURE OF THE EXPECTED OUTPUT SIGNAL We detail the task of reflection in an output signal of educational examples of closeness of standards on a specific example of neural network recognition of uppercase printing letters of the Ukrainian alphabet which are displayed in black color on a white background. The classical coding procedure of parameters of standards of letters illustrated with Figure1 consists in sequential implementation of five stages. FIGURE 1 Illustration of coding procedure 1 stage. Every letter accommodates in a separate rectangle of the fixed size which is partitioned into cells by a grid chart. The quantity of these cells determines the number of input parameters of neural network model. In Figure 1this quantity is equal: K = a b = = 110, (1) where a and b height and width of a rectangle which describes a letter. Within a separate rectangle each cell assigned certain number which corresponds to number of the entering parameter of neural network model. 2 stage. For a separate letter i value of input parameter is equal 1 if appropriate i a cell is filled in black color, and is equal 0 in case it is filled in white color. 3 stage. Letters register and numbered in alphabetical order. For example, as it is shown in figure 1, to a letter A there corresponds n = 1, to a letter B there corresponds n = 2, and a letter L - n = stage. Number of a letter in the alphabet defines the raw value of the expected output signal of neural network model. Thus, for a letter A the raw value of the expected output signal is equal 1, for a letter B - 2, and for a letter L stage. For each letter the raw value will be transformed to the look suitable for use in neural network model. Let's consider basic model with sigmoidal function of activation. Depending on structure of neural network model two options of conversion are possible. Option 1. The output signal of neural network model is defined by one output neuron. In this case for an educational example of a standard of n-y of a letter the expected output signal decides on the help of the following expression: y(n) = y(n) / N = n / N, (2) y(n) where the raw value of an output signal of a standard n-oh letters, n number of a letter in the alphabet, N quantity of letters in the alphabet. Option 2. The output signal of neural network model is defined by a set of output neurons which amount is equal to quantity of letters in the alphabet. At the same time number of output neuron is equal to number of the appropriate letter in the alphabet. Therefore for an educational example of a standard n- oh of a letter the expected output signal is defined so: y n(n)= y(n) / n = 1 yk(n)= y(n) n = 0, k = 1,.. N, k n, (3) where k - number of output neuron. Expression (3) can be interpreted as follows, n-oh of a letter for n-go of output neuron the expected output is equal in an educational example of a standard 1, and for all remaining neurons the expected output is equal to 0. Let's mark that concerning the first option of conversion the second option more general. Therefore only the second option will be considered further. The basic lack of the described coding procedure is that the value of the raw expected output signal defined at the fourth stage badly corresponds to geometrical closeness of the recognized images. It is obvious that the image of a letter A is much more similar to the image of a letter L, than to the image of a letter B. At the same time the classical option of coding contradicts this fact. Afterwards in case of implementation of the 5th stage this error doesn't allow to consider geometrical similarity of images correctly. For elimination of this shortcoming it is offered to use low-resource NMM which training doesn't require determination of the expected output signal in a numerical look for assessment of closeness of standards. First of all, this type of network includes the NMM which is capable self-learning. Classical representatives of this type are networks on the basis of Kokhonen's card and Boltzmann's machine. However a hindrance to their application is the low generalizing ability which involves an erratic possibility of reference of different standards to one cluster. More perspective is application of the PNN network in which CM06 49 Computer Modelling and Information Technologies

50 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Tereykovskaya L, Tereykovskiy I, Aytkhozhaeva E, Tynymbayev S, A Imanbayev educational examples the expected output signal represents not number, but the name of a class [2]: { x} NameY K, (4) where {x} K a set of input parameters, Name Y the name of a class to which this educational example belongs. For an example in Figure 2 the structure of the PNN network which is intended for correlation of unknown black-and-white graphic images to one of three classes - A, B or C is shown. It is supposed that each of graphic images is placed in a separate rectangle by the size of a b pixels. Thus, the amount of input neurons (input parameters) correspond to number of signs of a class and decide on the expression help (1). The network consists of four layers of neurons: input - Ln in, images Ln 0, adding Ln s and a day off Ln coll. The quantity of elements of a layer of images is equal to quantity of educational images. The input layer and a layer of images make full-meshed structure. The quantity of elements of a layer of summing is equal to quantity of classes. The element of a layer of images is connected only to that element of a layer of summing to which corresponds the class of an image. Generally both the quantity of classes and quantity of educational examples can be arbitrary number. For the example shown in Figure 2, the amount of neurons of a layer of adding is equal to 3. To each neuron of a layer of adding there correspond two neurons of a layer of images, that is to each class there correspond two standards - educational an example. x1 x2 xk KK Lnin w1,a1 w2,a1 a1 a1 wk,a1 a2 a2 b1 b1 b2 b2 c1 c1 c2 c2 Lno FIGURE 2 Example of structure of the PNN network For the communications entering neuron of a layer of images, weight factors are set same as components of the appropriate educational vector of an image. So, if for an educational example a1 a set of parameters {1,0, } KK AA, that ww 1,aa1 = 1 and ww 2,aa1 = 0. Entering of this example into a network is realized soconnection between neuron a1 and neuron A an adding layer is established: the new neuron a1 is added to a image layer; weight factors of the entering communications are set; connection between neuron a1 and neuron A an adding layer is established. Let's mark that weight factors of the communications entering neurons of a layer of summing and an output element are equal to 1. Thus, all PNN parameters directly ya1 ya2 yb1 yb2 yc1 yc2 AA BB CC Lns YA YB YC Cool Cool Lncoll YColl are defined by educational data, and training of such NNM happens rather quickly. The important positive point of training activity of the PNN network is presence only of one controlling parameter of training which value is selected by the user. Actually this parameter is the radius of function of Gauss which value not considerably influences quality of recognition. The output signal of an arbitrary j is neuron of a layer of images is calculated like: y j = K k= 1 (w exp k, j x 2 σ k 2 ), (5) where x - unknown image, x k k of a component of an unknown image, w k,j - weight factor of communication between k input neuron and j neuron of a layer of images, К quantity of components of an input image, σ radius of function of Gauss. In neurons of a layer of summing the linear function of activation is used. The output signal of n-go of neuron of a layer of summing (Y n) is calculated so: Y n = I i= 1 I y i, (6) where I amount of neurons of a layer of the images connected to n neuron of a layer of summing, y i activity і neuron of the layer of images connected to n summing layer neuron. Value of activity of neuron of a layer of summing is equal to probability of reference of an input image to a class which corresponds to this neuron. The task of an output element is only determination of neuron of a layer of summing with the maximum activity. Therefore in practice the output element can be realized without use of neural network technologies. Let's mark that though only the name of the most probable class is result of recognition of the PNN network, but values of output signals of a layer of summing are specified probability of belonging of an unknown input example to one of the recognized classes. The offered procedure of use of the PNN network for coding of the expected output signal is as follows: by means of expression (4) the set of educational examples which correspond to a set of standards of the recognized classes is created; learning of a network is implemented; on an input of the trained network standards of the recognized classes sequentially move. For each standard the help of expressions (5, 6) values of output signals of neurons of a layer of summing are calculated. If necessary these values should be scaled. For this purpose it is possible to apply results [2, 4]. The scaled values will also be the expected output signal of a multi-layer perceptron for educational examples of the appropriate class. Let's consider application of the developed coding procedure on a specific example of recognition of 5 abstract black-and-white figures shown in Figure 3. CM06 50 Computer Modelling and Information Technologies

51 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Tereykovskaya L, Tereykovskiy I, Aytkhozhaeva E, Tynymbayev S, A Imanbayev F 1 F 5 FIGURE 3 Recognized figures Each figure is written in a square 3х3 i.e. the number of input parameters of NNM is equal to 9. Each figure is accepted in the form of a standard of the recognized class. The set of input and output parameters of educational examples of the specified standards created based on expression (4) is provided in table1. Let's mark that 3 boundaries of squares shown in figure in educational examples aren't considered. TABLE 1 Parameters of educational examples Input Name of reference parameter F 1 F 2 F 3 F 4 F 5 x x x x x x x x x The structure of the built PNN network is shown in Figure 4. Accept σσ = 0,5. x1 1 1 x x9 9 9 Lnin F 2 f11 f11 f21 f21 f31 f31 f41 f41 f51 f51 F 3 F1 F1 F2 F2 F3 F3 F4 F4 F5 F5 YF1 YF2 YF3 YF4 YF5 F 4 YColl Cool Cool Lncoll Application of the built network allowed is to carry out coding of an output signal for each of standards. So, for example, for F1 figure standard not scaled expected output signal YY FF1 = {9, 5,073263, 5,054947, 3,109894, 3,109894}. After scaling the expected values of an output signal are used when forming educational examples for a two-layer perceptron. The made comparative experiments showed that use of such educational examples allows reduce by 30-50% the number of computing iterations concerning examples in which the well-known coding is used. Thus, in a basic case, proved can read prospects of application of the developed coding procedure. 4 Conclusion It is shown that one of important shortcomings of application of neural networks technology on the basis of a multi-layer perceptron for recognition of graphic images in systems of biometric authentication of users is insufficient quality of processing of statistical data which are used when forming parameters of educational examples. It is offered to increase quality of educational examples due to use of the procedure of neural network coding of value of the expected output signal of educational examples which allows to consider closeness of standards of the recognized classes in this signal. The coding procedure of the expected output signal providing use of a probable neural network is developed. The appropriate mathematical apparatus is created. As a result of numerical experiments it is shown that application of the developed procedure allows reducing the number of the computing iterations necessary for achievement of the given error of training by 30-50%. It specifies prospects of use of the proposed solutions for increase in learning efficiency of the neural networks intended for recognition of graphic images in systems of biometric authentication. Lno Lns FIGURE 4 Structure of the PNN network for recognition of the abstract figures References [1] Korchenko A, Tereykovskiy I, Karpinskiy N, Tynymbayev S 2016 Neyrosetevye modeli, metody i sredstva otsenki parametrov bezopasnosti Internet-oriyentirovannykh informatsionnykh system TOV NashFormat: Kiev 275 s (in Russian) [2] Rudenko O G, Bodyans'kiy E V 2006 Shtuchni neyronni merezhi TOV Kompaniya SMIT: Kharkiv 404 s (in Ukrainian) [3] Tereykovs ka L O 2016 Neyromerezhevi modeli ta metodi rozpiznavannya fonem v golosovomu signali v sistemi distantsiynogo navchannya: dís. kand.tekhn. nauk Kyev 312 s. (in Ukrainian) [4] Tereykovs kiy I 2007 Neyronnimerezhi v zasobakh zakhistu komp yuternoi informatsii PoligrafKonsalting: Kyev 209 s (in Ukrainian) [5] Tereykovskaya L, Petrov O, Aleksander M 2015 Prospects of neural networks in business models TransComp. 30 November 3 December, 2015 Zakopanem CM06 51 Computer Modelling and Information Technologies

52 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Tynymbaev S, Berdibayev R, Zhaibergenova Zh The high-speed device for the accelerated coercion of number on the module S Tynymbaev, R Berdibayev, Zh Zhaibergenova * Kazakh National Research Technical University, Satpayev Str. 22, Kazakhstan, Almaty *Corresponding author s zhanshuak@gmail.com Abstract This article presents the method of an acceleration of coercion execution operator on the module where for each two step discharges of the given number are processed that leads to residual formation process acceleration. The article considers development of the high-speed hardware solution of coercion operator on the module. Keywords: high-speed device, module, cipher, coercion 1 Introduction Perhaps to realize encoding programmatically it is hardware and software. The hardware encoding has a row of essential advantages: hardware of encoding has high speed; application of a specialized processor with cipher for execution of cryptography conversions unloads the central processor of the computer; also installation on one computer of several hardware scramblers is possible that it even more increases information processing rate; the hardware implementation of a crypto algorithm guarantees its integrity; encoding and storage of keys is carried out in the board of the scrambler, but not in a random access memory of the computer. on the basis of the hardware scramblers it is possible to create systems of information security from illegal access and demarcation of access to the computer, etc. [1, 2]. The vast majority of the modern cryptosystems are used asymmetric encoding [3]. Feature of asymmetric encryption algorithms is that for an encryption and decoding of information different keys are used. In asymmetric crypto algorithms such operations as multiplication of numbers, squaring and coercion of numbers on the module are executed. The most bulky of them is coercion operator on the module since it represents receiving a remainder of division of number on module, and division operation the most difficult of arithmetical operations. And this operation repeats repeatedly since instead of repeated multiplication and divisions of very large number (a x ) on the module, for an acceleration of exponentiation on the module, multistep sequential multiplication of exponentiation on the module is used, multistep sequential multiplication with coercion on the module on each step every time of the new work is used. The wide experience in development of high-speed integer multipliers and squarer s for different class of computing systems is so far accumulated. For an acceleration of basic operations of multiplication and squaring it is possible to use matrix multipliers, a circuit of adders of Wallace, Dad s counter, systolic and Vedic multipliers [5, 6]. As for an acceleration of basic coercion operator on the module, such task in traditional computing systems didn't stand. Therefore the high-speed hardware solution of coercion operator on the module is a key problem in case of the hardware implementation of the crypto algorithms using exponentiation of numbers in a level on the module. 2 Operation execution process One of the operation approaches of an acceleration of execution coercion operators of numbers on the module is considered, on the basis of the dividing device where for a step of division two discharges of the given number are processed, accelerating residual formation process. The functional diagram of such device of coercion of number A on the module where in high orders of the register RGA [2n-1/n] in each step of division the partial residuals of R i are created is provided on Figure 1. Conditions of formation of the partial residuals (R i) is defined (Table 1). TABLE 1condition of formation of residuals Conditions for the analysis R i 2 2 * R i-1< C 4 R i-1 C<=2 2 * R i-1<2c 4 R i-1-c 2C<=2 2 * R i-1<3c 4 R i-1-2c 3C<=2 2 * R i-1 4 R i-1-3c Check of all conditions it is executed at the same time, the adder for formation of the module of the multiple to three for this purpose will be required (3CC ). Apparently from the Figure 1 it is executed on the SMO adder on which inputs CM07 52 Computer Modelling and Information Technologies

53 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE values CC (carry) and C with the left shift on one discharge towards the high order of the module, i.e. 2C move. Computation of 4 Ri-1-C, 4 Ri-1-2C and 4 Ri-1-3C will require the appropriate SM 1, SM 2, SM 3 adders. In these adders subtraction operation is replaced with addition operation by submission with inputs of low orders of adders the one code, and on the first inputs of adders the next residual shifted on two discharges to the left, i.e. 4 Ri-1 moves, and on the second inputs of SM 1, SM 2, SM 3 adders modules 3CC, 2CC and CC respectively move. In case of additions of number 4 Ri-1 with modules 3CC + 1, 2CC + 1 and CC + 1 on outputs of these adders transfers of CC 3, CC 2, CC 1 are created of polarity bits and value of the signs S 3(sign), S 2, S 1. If the received residual on an adder i-go output the positive, CC ii = 11 at the same time S i=0, and if the received residual on an adder i-go output the negative, CC ii = 0 and S i=1. Tynymbaev S, Berdibayev R, Zhaibergenova Zh on Figure 1 it is visible that in case of CC 3 = CC 2 = CC 1 = 1, and S 3 = S 2 = S 1=0 as the smallest positive residual of R i determined by C 2 residual with an output of SM 3 which is transferred to a diagram AND9 output by C 3 signal. At the same time the signal of S 3 = S 2 = S 1 locks transmissions from outputs SM 2, SM 3 and value 4 Ri-1 with the diagrams AND8, AND7 and AND6. In case of CC 3 = 0, CC 2 = CC 1 = 1 next partial residual is created on counter total exits of adder SM 2 and outputs of adder SM 3 are locked with a signal C 3=0, and the signal of S 2 = 0 and S 1=0 locks counter total exits of SM 2 and passing of a code 4 Ri-1 on inputs of OR circuit 1. In case of CC 3 = CC 2 = 0 and CC 1 = 1 the next residual of R i is created by CC 2 = 0 and CC 1 = 0 on counter total exit of SM 1 at the same time signals of CC 3 = 0, CC 2 = 0 lock outputs of adders SM 3 and SM 1, and the signal of S 1=0 locks passing 4 Ri-1 on register RGA inputs. In case of CC 3 = CC 2 = CC 1 = 0 value of a signal S 1=1 as the next residual is defined by C 2 by the diagram AND6 with value 4 Ri-1. Set of AND6/AND9 and OR1 form the Figure 1 the generator of the smallest positive residual (SFD), and the SFD together with SM3, SM2, SM1 adders form the generator of the partial residuals. 3 Diagrams of coercion on the module FIGURE 1 An example. The functional diagram of coercion of number on the module On outputs of the considered adders the smallest positive residual (SPR) will allow us to define the analysis of combinations of transfers and signs. If on outputs of all adders received residuals with the negative signs, then the previous residual shifted on two discharges towards the senior 4Ri-1 is transferred to high orders of the register RGA[2n-1/n], through the diagrams AND6 and OR1. Conditions of formation of the next smallest positive residual (R i) are given (Table 2). Depending on value of transfers from polarity bits and values of signs of residuals. TABLE 2 Conditions of formation of the next smallest positive residual (R i) C S C S C S SM SM SM 2 R i R i R i R i R i=4*r i -1 From the Table 2, and also from the diagram provided On a signal "Start" the given number A is accepted through the diagram AND1 in the register RGA, the module is accepted in the register C number of shifts K = log 2n/2 (where n-number of discharges modules C). Through the figures AND3 registers in the counter of clock pulses (CCP). The delayed signal "Start-up" on the line of time delay Delay1 writes time of numbers of A,C,K on the appropriate diagrams arrives on a trigger T input. The trigger will be set by this signal in 1 status which arrives on the first input of the diagram AND4. After that the first clock signal on permission will appear on an output of the diagram AND4 abd shifts on two discharges of the register RGA, and subtracts unit from the counter. The delayed first TI on the line of a time delay of Delay2 arrives on the first input of the diagram AND5, and on the second inputs of this diagram the high orders RGA arrives. Here it should be noted that summary delay period on Delay1, the trigger of the diagram AND4 and Delay2 shall be more than time formation the multiple 3C on counter total exit of adder SMO. From outputs the SMO adder the code 3C moves on the second input of the SM3 adder, and on the second inputs of the adder the code C with single position shift moves to the left; on the second inputs the SM1 adder moves a code CC. From a diagram AND5 output high orders of the register RGA moves also on the first inputs of SM3, SM2 and SM1 adders, and also on the second input of the diagram AND6. In SM3, SM2, SM1 adders operations 4 Ri-1+3C+1, 4Ri- 1+2C+1, 4 Ri-1+C+1 are executed. Respectively, and on an output of the diagram SFD the smallest positive residual which moves on register A inputs is created. After that on an input of AND4 the second clock signal which shifts register RGA contents on two discharges to the left arrives and after a time delay of the second clock signal shifted on CM07 53 Computer Modelling and Information Technologies

54 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Tynymbaev S, Berdibayev R, Zhaibergenova Zh two discharges from R1 moves through the diagrams AND5 on inputs of all adders, and in these adders values 3CC + 1, 2CC + 1 and CC + 1 with 4R 1 are added and on an output of the SFD the following residual of R 2 which is accepted in the register RGA is created. Detention by the second clock signal is subtracted from the indication of the counter of clock pulses counter unit. Formation of the next private residual continues until the indication of the counter is nullified. At the same time in the counter of clock signals the signal "The end of operation" is created and the trigger will be set by this signal in a bullet status that locks submission of the next clock pulse in the diagram of the device. The same signal the diagram AND10 gives result from the register RGA on an output. Below an example of computation of residual in the considered device is reviewed. At the same time А=521 10= CC =23 10= CC +1= CC = cc +1= cc = cc +1= where A is the example of the given number R 3=1111=1510 Check: 521 mod 23 = 15 mod 23 7 Conclusions As CC 33 = 0, CC 22 = 1 and CC 1 = 1 as R 1 selected like R 1=10011 On the basis of the dividing device where for a step of division two discharges of the given number are processed, accelerating residual formation process approaches of an acceleration of execution coercion operators on the module P is considered with example. References [1] Shan gin V F 2012 Zashita informatsii v komp uternyh sistemah i setyah Press 160p [2] Ryabko B YA, Fionov A I 2004 Osnovy sovremennoi kriptografii dlya specialistov v informatsionnyh tehnologiyah M:Nauchnyi mir [3] Rostovtsev A G, Mahovenko E B 2005 Teoriticheskaya kriptografiya SPb:Professional 280p [4] Orlov S A, Tsil ker B YA 2014 Organizatsiya EVM i system SPb:Piter [5] Sethi K, Panda R 2012 An improved squaring circuits for binary numbers International Journal of Advanced Computer Science and Application 3(2) 116 p CM07 54 Computer Modelling and Information Technologies

55 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Petrova M Analysis of integrated university information systems M Petrova * St. Cyril and St. Methodius University of Veliko Turnovo, Veliko Turnovo, Bulgaria *Corresponding author s m.petrova@uni-vt.bg Abstract This report makes a comparative analysis of technologies used to design and develop integrated university information systems. The focus is on the modules for management of the educational process and the report on implementation of the various tasks. Appropriate criteria are selected, by which to evaluate the technological solutions implemented in the systems. It displays an approach for evaluating the integrated university information systems of class ERP. Keywords: Integrated university information system, ERP Enterprise resource planning, Software Technologies 1 Introduction Modern integrated information management systems of universities are specific segment of the ERP systems of companies. In many universities in Bulgaria, as well as in St. Cyril and St. Methodius University of Veliko Tarnovo, gradually over the years, information systems have been built with different range of management processes and activities, including various modules covering organizational-management structure. The information systems are widely build on the individual model of operation of each university, they have similar functionality and offer similar services. and needs of each university, the integrated management information system must be specifically designed for the specific university environment, based on the integration of various technological systems for database management, observing the legal requirements and standards [1]. In [2] there is a detailed study of the existing information systems in higher education institutions in Bulgaria and analysis of known best practices, as well as the requirements for integrated information support of universities. Fig. 1 shows a generalized architecture of the university integrated information system of the St. Cyril and St. Methodius University of Veliko Tarnovo [4]. There are shown different levels and opportunities for access to applications (services) via user interfaces that perform various operational and business processes by strictly regulated business rules and procedures, ensuring their security and reliability. FIGURE 1 Functional scheme of Artificial Intelligence Due to the specific and constantly changing conditions FIGURE 2 A view of the functionality of the system that are available for the lecturer (Lazarov, L., 2016) Figure 2 shows the main functionalities that are available to the teacher's profile: assigning classes and reporting of hours, access to their own courses, schedule of classes and exams, accounting reports, educational programs and curricula. The assessment of technological solutions in these types of systems in various stages of their development with appropriately selected criteria is an important issue, the resolution of which depends on the successful development and deployment. This work provides criteria and approaches for assessing the components of integrated information CM08 55 Computer Modelling and Information Technologies

56 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Petrova M systems of universities. Subject of analysis are two specific systems with a focus on the subsystems, related to the management of the educational process and the report on the performance of various tasks, related to its provision. 2 Analysis of technologies for the realization of integrated university information systems There are different ways of evaluating software systems with different purpose [7]. For evaluation and comparison, the following criteria is offered: 1. Functionality (30); 2. Ease of use (25); TABLE 1 Expert evaluations of ERP1 3. Corporate environment (20); 4. Flexibility (20); 5. Integration (20); 6. Reliability (20); 7. Security (15); 8. Scalability (15); 9. Deployment (15); 10. Support (15); 11. Technology (10); 12. Additional development (10); 13. Easy access (5), with their weights indicated in brackets. These weights are determined by statistical experts in the evaluation of ERP systems. Criteria Rat. Evaluation Е1 Е2 Е3 Е4 Е5 Е6 Е7 Е8 Е9 Е10 1 Functionality Ease of use Corporate environment Flexibility Integration Reliability Security Scalability Deployment Support Technology Additional development Easy access Data with expert evaluations are shown in Table 1 and Table 2 for the respective systems - ERP1 and ERP2. The model for processing of evaluations is described below. At first the evaluations of experts are calculated with the formula: OO kk ii = Π nn ii=1 EE kk ii WW jj (1) i=1..n; k=1,..,m; j=1,..,m where: n=10; m=13; n the number of experts, who evaluate; m number of evaluation criteria; E- number evaluation of the i expert on the k criteria; W the weight of the j criteria. TABLE 2 Expert evaluations of ERP2 Criteria Rat. Evaluation Е1 Е2 Е3 Е4 Е5 Е6 Е7 Е8 Е9 Е10 1 Functionality Ease of use Corporate environment 4 Flexibility Integration Reliability Security Scalability Deployment Support Technology Additional development 13 Easy access Ranking by indicators is determined by comparing pairs j and p as the second is placed further down in the standings: RRii = 1, aaaaaa OO ii jj OOii pp RR ii = 2, aaaaaa OO ii jj OOii pp (2) 3 Conclusions The analysis of the integrated university management systems shows that the selected criteria allow to account many aspects of their work. They are related to the Law on Higher Education in the learning process. Moreover user CM08 56 Computer Modelling and Information Technologies

57 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE requirements and specifics when working in such an environment are taken into account. This is sufficient to detect inaccuracies and identify opportunities for improvement and development Acknowledgments Petrova M The research is financed by Project Developing a web portal of the electronic periodicals of University of Veliko Tarnovo "St. st. Cyril and Methodius", Bulgaria. References [1] Kasakliev N 2012 Integrated Information System for management of the educational process (based on active normative regulations and standards) Autoreference of dissertation - PU P. Hilendarski uniplovdiv.bg/docs/procedure/224/ pdf [BG] [2] Касъклиев Н 2011 Сравнителен анализ на информационни системи за висши училища Национална конференция Образованието в информационното общество, май 2011 г., ISSN: , Пловдив, [3] Lazarov L 2014 Autoreference a dissertation on the topic "Model of integrated information management system for university environment" Veliko Tarnovo [BG] [4] Lazarov L 2016 The new capabilities of subsystem "E-tutor" of integrated information management system Pedagogical University almanac [BG] [5] Buzko I, Dyachenko Y, Petrova M, Nenkov N, Tuleninova D, Koeva K 2016 Artificial intelligence technologies in human resource development Computer modelling and new technologies 20(2) 26-9 [6] Nenkov N, Petrova M, Dyachenko Yu 2016 Iintelligence technologies in management and administration of justice, 3rd International Multidisciplinary Scientific Conferences SOCIAL SCIENCES & ARTS SGEM2016, POLITICAL SCIENCES, LAW, FINANCE, ECONOMICS & TOURISM, Conference proceedings, Volume V. pp , ISBN , ISSN DOI /segemsocilal2016B25 [7] Nenkov N V, Petrova M 2015 Instruments and criteria for research and analysis of Internet visibility of Bulgarian judicial institutions WEBspace International Journal of Advanced Research in Artificial Intelligence (IJARAI) 4(9) 6-10 (DOI): /IJARAI [8] Petrova M M, Nenkov N V 2015 Information models for assessing the maturity of the websites of Judicial authorizes in Bulgaria, Civitas, ISSN: , MMXV, N 9/ 2015, Fakultet za pravne i poslovne studije, Novi Sad, [9] Petrova M M, Nenkov N V 2016 Implementating ERP systems in higher educational institutions International Journal of Innovative Technologies in Social Science (IJITSS) 1 pp [10] Petrova M M, Stoyanov Y P, Denev D I 2006 E-UNIVERSITY" a new aproach to design software platforms for online education VI International Scientific Conference Science and education, KemGU, Belovo,Rusia, , [11] Scepanovic D, Lazarevic B, Wassenmiller A 2010 Reform in progress: current trends and concerns in developing education management information systems in the south east European countries Paper.pdf, p. 24 [12] Tolley H, Shulruf B 2009 From data to knowledge: The interaction between data management systems in educational institutions and the delivery of quality education Computers & Education [13] Morgan G, Kreizman G, Lowendahl J-M, Mann J, Cain M W, Thayer T-L B 2015 IT Market Clock for Higher Education, Analyst(s) bar%20ellucian&fnl=search&srcid= [14] Development of method for organization information support to educational process CM08 57 Computer Modelling and Information Technologies

58 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Baitursynov D Card Fraud Detection models and patterns D Baitursynov * IITU, Маnas Str. 8, Almaty, Kazakhstan *Corresponding author s baitursynov.ds@gmail.com Abstract Due to the fast development of e-commerce industry and electronic payment ecosystem, Anti-Fraud systems have a market value. Because of the dissimilar format of the data (Fraud and Non-Fraud cases), the detection of fraudulent transactions is difficult to achieve. This paper intends to survey on existing fraud detection models, analyses and compares various popular classifier algorithms that have been most commonly using in detecting fraud behaviour. It focuses on the benchmark used to assess the classification performance and rank those algorithms. Keywords: Machine learning, Fraud, Data mining, Models, Computational efficiency 1 Introduction Using credit card in payments is significantly increased nowadays. The challenges in this area are risk reputation and risk of loss for issuer. There are a lot of techniques for credit card fraud detection based on artificial neural network (ANN), machine learning, fuzzy logic, and genetic programming have evolved in detecting fraudulent transactions. The aim of this paper is to provide an up-to-date review of different approaches of classification, compare their performances on a wide range of challenging credit transaction dataset, and draw conclusions on their applicability to fraud detection applications. 2 Related works Carter and Catlett [1] explored machine learning algorithms i.e., decision trees and probability trees in assessing a good or bad credit risk costs. To generate a fraud score, a radial basis function network with a density based clustering and historical information on transactions used by Hanagandi et al. [2]. Ghosh and Reilly [3] applied a feed-forward neural network based fraud detection system using past data of account transactions of a customer. They found that the network detected significantly more fraud with fewer false positives over rule-based detection system. Dorronsoro et al. [4] developed an online system based on a neural classifier and a nonlinear Fisher's discriminant analysis for credit card operations fraud detection. 3 Algorithms reviews 3.1 CLASSIFICATION OF CLASSIFICATION PROCEDURES Classification is used in a wide range of human activity. It References [1] Carter C, Catlett J 1987 Assessing credit card applications using machine learning IEEE Expert: intelligent systems and their applications [2] Hanagandi V, Dhar A, Buescher K 1996 Density-based clustering and radial basis function modeling to generate credit card fraud scores Computational Intelligence for Financial Engineering [3] Ghosh S, Reilly D L 1994 Credit card fraud detection with a covers any context in which decision or forecast is made on the basis of currently available information. A classification procedure is some formal method for repeatedly making such judgments in new situations. A wide variety of approaches has been taken towards classification task. Two main historical strands of research can be identified: statistical, and computational intelligence [5]. 3.2 MACHINE LEARNING CLASSIFIERS There are many kinds of classification algorithms; these are grouped into Bayesian classifiers, functions, lazy algorithms, meta algorithms, rules, and trees algorithms. This section deals with different classifier algorithm models. Bayesian classifier: Bayesian classifiers are statistical classifier that predict class membership by probabilities. Several Bayes' algorithms have been developed, such as Bayesian networks and NaIve Bayes. Bayesian classifiers have exhibited high accuracy and speed when applied to large databases e.g. to analyze DNA hybridization arrays, and medical diagnosis. 4 Conclusions This study compares and analyzes the performance of various machine learning algorithms in detecting fraud behavior. The main objective of this paper is to evaluate the ability of the computational intelligence technique in detecting fraud by reviewing performance measurement. The most important parameters such as classification accuracy and fraud detection rate were considered in performance evaluation. The key finding of this study is that only higher classification accuracy cannot give precise estimate of the misclassification because of fraud rate is too minimal. neuralnetwork In Proceedings of the 27 th Hawaii International Conference on System Sciences [4] Dorronsoro J R, Ginel F, Sanchez C, Cruz C S 1997 'Neural fraud detection in credit card operations IEEE Transactions on Neural Networks [5] Michie D, Spiegelhalter D J, Taylor C C 1994 Machine learning, neural and statistical classification Ellis Horwood CM09 58 Computer Modelling and Information Technologies

59 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Aitchanov B, Bapiev I, Terejkowski I, Terejkowska L, Pogorelov V Calculation of expected output signal of neural network model for detecting of cyber-attack on network resources B Aitchanov 1, I Bapiev 1*, I Terejkowski 2, L Terejkowska 3, V Pogorelov 2 1 Kazakh National Research Technical University after K.I. Satpaev, Satpaev Street 22a, , Almaty, Republic of Kazakhstan 2 National Technikal University of Ukraine Igor Sikorsky Kyiv Polytechnic Institute, Polytechnichna str. 14-a, 03056, Kyiv, Ukraine 3 Kyiv national university of construction and architecture, Povitroflotsky Avenue 31, Kyiv-037, Ukraine *Corresponding author s bapiev@mail.ru Abstract The article is dedicated to development of neural network models for detecting of cyber-attack on network resources. Procedure of detecting of expected output signal is developed for such neural networks. The key feature of the procedure is consideration of similarity of cyberattack etalon samples and similarity of etalon safe states in expected output signal. Similarity of samples is calculated by expert estimation. Numerous conducted experiments have revealed that application of developed procedure for training of neural network model that is aimed at detection of network cyber-attacks allows to decrease training iterations for approximately 20%. This achievement, in its turn, allows enhancing efficiency of creation of neural network model. Keywords: Neural network, training samples, neural network model, cyber-attacks detection. During last few years, the important direction of enhancement of protection level of network informational systems resources (ISR) is development and implementation of efficient detection neural network tools (NNT) for detection of cyber-attacks on these resources [1-3, 6]. Although analysis of sources [3, 6-8] indicates at a rather significant scientific-practical start therein, this very analysis also indicates at insufficient efficiency of training of neural network models (NNM) which are the part of indicated NNTs. Due to this problem, the NNT build-up time increases, and cyber-attack detection accuracy decreases. It should be noted that those NNMs are reviewed, for training of which the "teacher inclusive" training model is applied. Precisely these models are a base of majority of tested NNT applied in the field of information protection [2, 7]. Such NNMs base on classic models of multi-layer perceptron, radial bottom-level function or their known modifications (Elman network, Jordan network, deep neural networks). Results [3, 4] also let us to affirm that training efficiency of modern NNMs may be enhanced via improval of quality of training examples through displaying similarity of samples of discernible states of protection in expected output signal. At the same time, [3, 6, 7] the mentioned works containing thorough analysis of modern NNTs used in means of protection of information indicate absence of formalized definition procedure for the output signal which will take into consideration the similarity of discernible states. The independent analysis of available literary sources has also revealed absence of information on scientific researches in this field. Thus, the objective of this research is the development of formalized definition procedure for the expected output signal for neural network model of detection of cyberattacks onto network resources of informational systems. By analogy with [5], the following formula is taken as a basis of the developed procedure: Y = f ( ) Ф d Ф, (1) where Y ф is the expected NNM output signal for training samples corresponding to cyber-attacks type Ф, d Ф is the multitude of similarity between components Ф. As it is foreseen to detect cyber-attacks based on analysis of corresponding features of ISR, it is presumed that similarity of these features was displayed to the extent cyber-attacks are alike to each other. It also must be taken into consideration that two basic NNM structural decisions are possible during cyber-attacks detection. In the first case, the output signal is being realized through one processing element in the output layer: N y =1, (2) where N y is a number of processing elements in the output layer. It the second case, the number of processing elements in the output layer is equal to a number of discernible types of cyberattacks on network ISR: N y = K s, (3) where K s is the number of discernible protection states. That's why, according to possible NNM structural decisions, it is necessary to consider two variants of issue of output signal [2, 3]. Let us detail the first variant. Normally, for the case of CM10 59 Computer Modelling and Information Technologies

60 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE NNM with one processing element its signal may be in the range of: y ] a.. b [, (4) where y is the NNM output signal, while a and b are any real numbers. During use of sigmoid function of output layer processing element activation typical for NNM based on multi-layer perceptron, the output signal is in the range from 0 to 1: y ] 0..1 [. (5) During detection of any possible cyber-attacks, and to any of possible safe states of the network ISR, a certain range of output signal values is applied accordingly. Further on, discernible cyber-attack types and discernible ISR safe states will be hereinafter referred to as safe states for brevity. Without losing discourse generality, it may be presumed that range values for different safe states are different too. Besides, the output signal for training samples corresponding to safety states samples will be at the middle of the indicated range. Due to even quantization of the range of possible values y, the expected output signal for the sample of each і- value for safe state is being calculated as follows: y s і = b a b a i i 0,5 = 0,5 K K K s s s b a, (6) where і is the number of the safe state. In case of use of sigmoid function of activation of processing element in the output layer and due to even quantizing of the range of possible values y, the expected output signal for the sample of each і-value for safe state is being calculated the following way: y s і 1 0,5 i 0,5 = i = K s K s K s. (7) Similarity of safe states in formulas (6, 7) is possible to be taken into consideration due to the fact that similar safe states should have close numbers. Let us detail the second variant. In the training example for the sample of the і-value state, the output signal of corresponding і-processing element is equal to 1. At this, the numeration order of output processing elements may be optional. Altogether, there is a necessity of definition of expected output signal for all other output processing elements not corresponding the mentioned sample. It should be noted that processing elements corresponding to safe states close to the sample must have close values of the output signal. Thus, based on results [3], it may be noted that the level of the output signal of corresponding processing element in the training example for the loadmodule type cyber-attack sample should differ less from the level of the output signal of corresponding processing element of rootkit type cyberattack than from the one of corresponding processing element of "search storm" type cyber-attack. In eteram: y[ а] y[ о] < y[ а] y[ б], (8) y where [ а], y[ о], y[ б] are output signals of processing Aitchanov B, Bapiev I, Terejkowski I, Terejkowska L, Pogorelov V elements corresponding to loadmodule, rootkit, "search storm" types of cyber-attacks. Basically, definition of the expected NNM output signal for the second case is the more complicated variant of the first case which is confined to calculation of numerary estimation of similarity of safe states. At this, known analytical methods of such calculation [4] are peculiar by their complexity and poor reliability which makes their efficient use for detection of cyber-attacks onto network ISR more difficult. At the same time, analysis and detection of cyber-attacks against network ISR are objectives which are rather effectively reached by experts in the field of information protection [3, 5]. That's why it looks necessary to determine the numerary estimation of similarity degree of cyber-attacks parameters and ones for safe states based on expert data. Being based on results [5], it is presumed to use statistical processing methods for expert data. In this case, quantitative data received from experts is being processed for estimation of collective opinion of an expert team, for estimation of concurrence of expert opinions and experts' competence. For estimations definition, statistical methods of selective and interval assessment are applied. At this it is recommended that the number of experts made at least 10. Let us consider the process of assessment of similarity grade of safe states. Presumably, as a result of inquiry of an expert team consisting of m participants, the following data has been retrieved: x... x 1, m... x 1,1, 1, M x x x n, n,m n,m x... x... x N, 1 N,m N,M, (9) where x n, m is the assessment grade of the object n (safe state) by the expert m, N is the number of objects (safe states), M is the number of experts. The average collective value of the n safe state is being calculated by the formula: x = 1 M n x n,m M m= 1, (10) where x n, m is the assessment grade of the n safe state by the expert m, n =1 N. Dispersion of the average collective value is being calculated as follows: M 2 1 σ = M 1 m= 1 2 ( x n, m xn ). (11) For determination of statistical value of obtained results it is necessary to indicate the confidence range which is matched by the estimated value with the preset confidence level P. Presetting error probability Р п (significance value), the one can determine the interval matched by the assessed value with probability (1 Р п): CM10 60 Computer Modelling and Information Technologies

61 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE I x n = ( x ε, x + ε ) n pn n pn. (12) The value ε pn determines ranges of the confidence range and is being calculated as follows: ε pn = t p σ n M, (13) where t p is the ratio depending on the preset confidence level Р. It is considered to be that the assessed value has a normal layout with the center x i dispersion σ. The rate t p has Student's t-distribution with (N-1) the degree of freedom and is being assessed with the help of the table, the fragment of which for some confidence level values Р is given in the Tab. 1. Dimension of agreement of expert opinions is being determined with the help of variation rate γ n which is being calculated using the formula: σn γn = xn. (14) TABLE 1 Coefficient value t p Р 0,8 0,85 0,9 0,95 t p 1,282 1,439 1,643 1,960 Calculated with the formula (14), the variation coefficient γ n defines the relative value of the expert estimation variation range considering the average value of collective estimation x n. Due to complete concurrence of experts' opinions when all are x n,m=x n, the variability rate is γ n=0. It is regarded that concurrence of experts' opinions is satisfactory if all are γ n<0,3 and minimal required if all are γ n<0,2. Otherwise, taking results into consideration, the expert estimation procedure should be repeated. The estimation of experts' competence may be done via two rates: fair competence rate and expert's relative selfesteem rate. the fair rate is defined via filling-in the special table containing questions on all factors influencing the expert's competence. The expert's relative self-esteem rate is defined through expert's self-estimation of knowledge in the range of a certain scale, e. g. from 0 to 1. Competence rates allow to correct expert group's collective opinion estimations. At this, the average collective object estimation will be as follows: 1 xn = M M λm xn,m m= 1, (15) where λ m is the competence rate of expert m. In case the information on expert's competence is missing, it is recommended to use the value of the rate λ m =1. It should be noted that resulting formulas (4-15) make the basis of mathematical support of separate operations of the definition procedure for expected output signal of the neural network model of network resources cyber-attack detection. At this, the order of completion of these operations corresponds to numbers of indicated formulas. Experimental research has been conducted for verification of retrieved theoretical results, based on which Aitchanov B, Bapiev I, Terejkowski I, Terejkowska L, Pogorelov V the NNM has been built-up and habituated aiming at detection of two types of cyber-attacks and one safe state. The main hypothesis of the experiment is that the use of the developed procedure allows to reduce the number of training iterations needed for achievement of the preset training error. As a source of data for the NNM, a KDD-99 database has been used. It contains values of 41 parameter for network connections corresponding to 22 types of cymer assaults and one safe state. There were four types of type R2L cyber-attacks etalon during the experiment. These were aimed at providing an access to a computer sideways a remote device to the non-registered user. Types of detectable cyber-attacks: buffer_overflow, perl, loadmodule and rootkit. The example of the record describing parameters of network connection for cyber-attack type perl: 25, tcp, telnet, SF, 269, 2333, 0, 0, 0, 0, 0, 1, 0, 1, 0, 2, 2, 1, 0, 0, 0, 0, 1, 1, 0.00, 0.00, 0.00, 0.00, 1.00, 0.00, 0.00, 69, 2, 0.03, 0.06, 0.01, 0.00, 0.00, 0.00, 0.00, 0.00, perl. Discerning of safe connection is foreseen too. The KDD- 99 record example for such a connection: 0, tcp, http, SF, 181, 5450, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 8, 8, 0.00, 0.00, 0.00, 0.00, 1.00, 0.00, 0.00, 9, 9, 1.00, 0.00, 0.11, 0.00, 0.00, 0.00, 0.00, 0.00, normal. The NNM build-up is realized based on methodology developed in [1, 4, 5]. As a basic NNM type, a two-layer perceptron with input N x = 41 N = 1 and y output processing element is used. The number of source parameters has been selected based on KDD-99 record structure, and the number of output parameters has been motivated by simplification of the model structure. Selection of the number of training examples P = 1000 has been based on use of formula (16) justified in [6]: P min > 20 N x, (16) where P min is the minimal number of training examples. There is the same number of examples for each discernible safe state foreseen at formation of training samples. The number of hidden processing elements N s = 405 is calculated using the expression (17) also defined in [1, 6]: 2 P N Ns = Round NY X, (17) where Round(X) is the operation of definition of the nearest real number from argument X. TABLE 2 Values of expected output signal Safe state Values of expected output signal Experiment No. 1 Experiment No. 2 Safe connection cyberattack type buffer_overflow cyberattack type loadmodule cyberattack type perl cyberattack type rootkit There were two series of numeric experiments CM10 61 Computer Modelling and Information Technologies

62 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE conducted for definition of a number of training NNM iterations for achievement of faultless discerning of training examples. In the first experiment, the expected output signal has been defined via formula (7) using the supposition that safe states are rated alphabetically. In the second experiment, the expected output signal has been defined via the offered procedure. Retrieved values are presented in Table 2. During experiments it has been established that at use of offered procedure of expected output parameter rate definition, the number of training iterations needed for faultless memorizing of all training examples by the NNM has reduced for approximately 20% confirming the accepted hypothesis. Also, in the first approximation it can be regarded that operational efficiency of creation of NNM will increase for approximately 20% due to reduction of quantity of training iterations. Aitchanov B, Bapiev I, Terejkowski I, Terejkowska L, Pogorelov V The procedure of calculation of expected output signal of neural network model for definition of cyber-attacks on network resources has been developed. It helps to enhance operational efficiency of creation of mentioned models via taking into consideration similarity of etalon cyber-attack samples and etalon samples of safe states. Conducted numerous experiments have revealed that application of the developed procedure for training of neural network model aimed at detection of network cyber-attacks of type buffer_overflow, perl, loadmodule and rootkit allows to enhance operational efficiency of creation of such a model for approximately 20%. Perspectives of further researches in this field need to be aimed at improval of the mentioned procedure based on development and implementation of fair coefficients of similarity for etalon samples. Conclusions References [1] Bapiev I M, Akhmetov B S, Korchenko A G, Tereykovsky I A 2016 The use of a neural network with radial basis functions to detect script viruses Actual problems of cyber security and data protection software: Kyiv p [2] Bapiev I M, Korchenko A G, Tereykovsky I A 2016 Development of criteria for evaluating the effectiveness of neural network recognition means cyber-attacks on network resources information systems Global and regional problems of informatizition in society and nature using: Kyiv p [3] Korchenko A, Tereykovsky I, Karpinski N, Tynymbaev S 2016 Neural network models, methods and tools to evaluate the security settings of Internet-oriented information systems Nash Format: Kyiv p. 275 [4] Rudenko O G, Bodyansky E V 2006 Shtuchnі neyronnі merezhi SMІT: Kharkiv p. 404 [5] Tereykovska L O 2016 Neural models and methods of recognition of phonemes in bare-owl signal in distance learning Kyiv p. 312 [6] Tereykovskiy I 2007 Neural networks in means of information protection PolihrafKonsaltinh: Kyiv p. 209 [7] Tereykovskiy I 2013 Neural network recognition methodology of Internet-based malware Information Security 19(1) p [8] Tereykovskiy I 2011 Perceptron bilayer structure optimization, designed to identify anomalous values of operating parameters of computer network Managing the development of complex systems: Kyiv p CM10 62 Computer Modelling and Information Technologies

63 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Dairbayeva S, Dairbayev A Mathematical model and computing algorithm of thermal conduction during oil pumping process S Dairbayeva *, A Dairbayev International Information Technology University, Manas Str./Zhandosov Str. 34a/8a, , Almaty, Kazakhstan *Corresponding author s sabina.dairbaeva@mail.ru Abstract Improving the methods of calculation modes of pipeline services allows to provide uninterrupted oil pumping process and increase its efficiency. Objective of the computing oriented to increasing work efficiency of current hot underground pipeline. The article considers several tasks of computer and mathematical modeling. There are: obtain a difference scheme for the equation of thermal variations, obtain an algorithm for calculating the equation using the double-sweep method, make a graph of temperature changes and develop program of mathematical model on JavaScript language. Keywords: computer and mathematical modelling, double-sweep method, temperature changes. 1 Introduction The technological process analysis of oil transportation in pipeline shows that the main problem in oil transportation is the changes of temperature requirements in oil pumping process that affected by different factors. The changes of temperature requirements in pipeline lead to the waxing problem and complete half of oil pipeline. Restarting of oil pipeline accompanied with many difficulties. By this reason, the development computer and mathematical model of heat condition of high-viscosity and thickening oil is the highly relevant objective. 2 Mathematical model Solution of thermal transfer equation (Formula 1) in oil pumping process should be considered through the length of pipeline: ππrr 2 kk dd2 TT + ddxx 2 ππrr2 ρρcc pp uu dddd 2ππππh ddxx CC TT TT 1 (xx) = 0, (1) where RR radius of circle, kk heat-conduction coefficient of oil, ρρ oil density, CC pp heat capacity of oil at constant pressure, uu oil pumping velocity, h CC heat-exchange coefficient of pipe, TT 1 (xx) function of temperature changes, TT 0 temperature on left side of border line, initial temperature (TT(0) = TT 0 ), TT LL temperature on right side of border line, final temperature (TT(ll) = TT LL ). Take as a basis the scheme of pipeline between two pumping-heating stations (PHS). The distance between them is from 0 to ll (Figure 1). At each of stations, will measured variety characteristics of high-viscosity oil. Equations that obtained above necessary equate to a non-homogeneous differential formula of the second order (the Dirichlet boundary value problem). For simplifying the equation was executed following substituting: φφ = TT TT 0, xx = xx, xx (0, αα), αα = ll TT LL RR RR aa = RRRR αα, bb = RRh CC kk, σσ = kk ρρcc pp. (2) By using aa, bb, σσ quantities as new variables, it was reduced equation 1 to following difference scheme 3: yy ii+1 2yy ii +yy ii 1 ( xx) 2 + aaaa yy ii+1 2yy ii xx 2bbyy ii + 2bb TT 1 (xx ii ) TT 0 TT LL = 0 + aa(1 σσ) yy ii yy ii 1 xx, (3) where ii = 1, 2,, NN 1 and yy 0 = 0, yy NN = 1 TT 0. TT LL Variables of oil temperature changes TT 1 (xx) along the length of pipeline conform with formula 4: xx 2 xx αα + BB 1 αα + CC 1, 0 < xx < αα 2 TT 1 (xx) = 2 2. (4) xx αα 2 xx + BB + CC 2 αα 2, αα < xx < αα 2 There are boundary conditions, which align with a distinguishing exploitation characteristics of hot oil pipelines: 1 + BB 1 + CC 1 = BB CC 2 1. At the input of pipeline oil temperature is defined and equals TT 0 : TT 1 (0) = CC 1 = TT 0 2. Intermediate value ( αα ) of oil temperature defined as At the output oil temperature is defined and equals TT LL : TT 1 (αα) = 1 + BB 2 + CC 2 = TT LL. Based on the boundary conditions, it was determined the values B1, C1, B2, C2. The problem put by above listed conditions contains a unique solution and well defined. CM11 63 Computer Modelling and Information Technologies

64 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE 3 Method of solving the problems of thermal processes and computing algorithm It was solved approximately the equation 3, that included the equation of thermal variations (Formula 4) and border conditions, which hold for any randomly chosen interval of pipeline. In this regard was considered difference equation of the second order. It was obtainable following notation: AAAA ii 1 CCyy ii + BBBB ii+1 + FF = 0, (8) where AA, BB 0, yy 0 = 0, yy NN = 1 TT 0 TT LL, ii = 1, 2, N-1. Using equation 3, it was determined necessary AA, BB, CC, FF parameters: AA = 1 + aa(1 σσ) xx; BB = 1 + aaaa xx CC = 2 + aaaa xx aa(1 σσ) xx + 2bb( xx) 2. (9) FF = 2bb TT 1 (xx ii ) TT 0 ( xx) 2 TT LL The method of solving linear algebraic equations of the form AAAA = FF accomplished by using double-sweep method, also known as Thomas algorithm. Algorithm based on method of sequential exclusion indeterminate variables. The main idea is to reduce the difference equation of second order to three difference equations of the first order, in general namely, non-linear. Suppose that recurrence equation is valid: yy ii+1 = αα ii yy ii + ββ ii. (10) yy ii = Next step, transformation the equation 8 to form 10: BB CC AAαα ii yy ii 1 + FF ii+aaββ ii CC BBαα ii. (11) This implies recurrence formula for αα ii+1 and ββ ii+1. Consequently, for determination yy NN we get Cauchy problem i. e. equations of inverse double-sweep method: Dairbayeva S, Dairbayev A yy NN = αα NN 1 yy NN 1 + ββ NN 1, αα NN 1 = 0, ββ NN 1 = 1 TT 0 TT LL Finally, put together the computing algorithm of right and left double-sweep method and write them in order of using: αα BB ii+1 =, ββ CC AAαα ii+1 = FF ii + AAββ ii, i = 1,2,, N 1 ii CC AAαα ii yy ii = αα ii+1 yy ii+1 + ββ ii+1, i = N 1, N 2,, 1, 0 4 Results Implementation of mathematical model carried out from step by step, by accordance of solution concept. For implementation it was chose JavaScript language. Figure 1 demonstrate temperature curve along the length of the pipeline for T0 = 40 and TL = 60. FIGURE 1 Temperature distribution along the length of pipe 5 Conclusion The main task of oil transportation is providing the optimal temperature regime. During research was considered mathematical model and computing algorithm of thermal conduction during high-viscosity oil pumping process. As a result, the program of the task was implemented, including computing algorithm of temperature changes and graphic. References [1] Самарский А А 1989 Теория разностных схем 3-е изд., испр. -М.: «Наука». Гл. ред. физ.-мат. лит. 35 с. [2] Агапкин В М 1981 Тепловой и гидравлический расчеты трубопроводов для нефти и нефтепродуктов / В.М. Агапкин, Б.Л. Кривошеин, В.А. Юфин. М.: Недра 256 с. CM11 64 Computer Modelling and Information Technologies

65 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Mukhanov B K, Omirbekova Zh Zh, Orakbayev Y Zh, Kangtarbay M B Modeling process of in-situ leaching of various regimes B K Mukhanov 1, Zh Zh Omirbekova 1, Y Zh Orakbayev 2*, M B Kangtarbay 2 1 Almaty university of Power Engineering Dept. of Engineering cybernetics, 126 Baytursynova Str., Almaty, , Kazakhstan 2 Kazakh National Research Technical University named after K.I. Satpayev,22 Satpayev Str., Almaty, , Kazakhstan *Corresponding author s orakbaev_erbol@mail.ru Abstract In clause the technological model in-situ leaching uranium deposits are stated, settlement data for forecasting and are obtained managements of process leaching. This article provides a numerical simulation of the in-situ leaching (ISL) uranium using application software package Comsol Multiphysics. In preliminary studies, evaluation main hydrodynamic characteristics wells and reservoirs, such as the coefficient of resistance, the saturation recovery, and others can be determined by changes in process variables on the wells during operation. Keywords: in-situ leaching, modeling, partial differential equations, Darcy s law, multiphysics. 1 Introduction Currently the in-situ leaching (ISL) is a fundamental process for the extraction of many metals. At the same time there are a number of ISL technology modes, such as "saturated mode", mode of "pressure filtration", infiltration mode which have to be determined from the measured variables of the process [1, 2]. In-situ leaching is a process in which there is a dissolution of the useful component by the chemical reagent in the place of ore body stratification followed by the removal of the formed compounds from the reaction zone by the moving stream of solvent. Leaching is a diffusion process, in which there is a transition of system components from a solid phase to a liquid phase. The factor characterizing the intensity of such processes is the difference between the concentrations of the solvent and leachable component in the layer adjacent to the surface of the solid particle and in the total volume of the liquid phase [6]. The leaching process occurs in permeable ore host rock in which there is forcibly implemented the solvent filtration. Ore host rock is usually represented by the sand with a dash of clay and other minerals. Uranium minerals constitute hundredths and tenths of a percent; they have different shape and size, form films, sinters, crusts on the grains and embedded in aggregate structures of ores [2]. The leaching process (ISL) comprises three main stages: Transportation of solvent to the surface of uranium minerals; A chemical reaction with the formation of soluble uranium salts; Transportation of the dissolved reaction products in the solution [6]. 2 Identification of the specific objectives of the model During the ISL of uranium from ores the transportation of the solvent to the surface and dissolved products from the interaction place is determined by the velocity of the solution seepage. Each of the above steps may consist of several steps. Thus, in the case of formation of solid reaction product on the surface of the dissolved uranium mineral the process consists of the following steps: diffusion transfer of the reagent to a solid phase surface by the liquid layer adjacent to the surface; diffusion transfer of the reagent through the layer of the solid reaction product; chemical reaction on the surface of the leachable uranium mineral; diffusion transfer of the dissolved substance from the reaction surface layer through the reaction product layer; diffusion transfer of the dissolved reaction product through the liquid layer adjacent to the surface of the solid phase. Development of the field by the in-situ leaching method is possible under the following basic conditions: 1. the extracted component presents in the ores in the form of minerals, easily collapsing by the weak water solutions of the leaching reagent; 2. included in the content the ore forming minerals have low acid capacity in reaction with technological solutions; 3. ores have a natural permeability or have a solution permeability after artificial fragmentation. The aim of modeling is to build a model of the ISL and the investigation of the modes of ISL. The second step is to conduct numerical experiments on a model and to determine the nature of interaction between the variables of the process [3]. COMSOL Multiphysics - is an interactive environment for the modeling and calculation of most scientific and engineering problems based on partial differential equations CM12 65 Computer Modelling and Information Technologies

66 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Mukhanov B K, Omirbekova Zh Zh, Orakbayev Y Zh, Kangtarbay M B (PDE) by the finite element method. With this software package there can be extend the standard model using one differential equation (application mode) in multiphysical models for calculation of interconnected physical phenomena. This is possible due to integral physical modes, where the coefficients of PDE are given in the form of clear physical properties and conditions such as thermal conductivity, heat capacity, heat transfer coefficient, volumetric capacity, etc. depending on the chosen physical partition. Conversion of these parameters in mathematical equations coefficients is automatic. The interaction with the program can be done by the standard way - through a graphical user interface (GUI), or by the programming using a scripting language or COMSOL Script or the MATLAB language. The mathematical modeling and also the element analysis in many applications can reduce the costly and lengthy development cycles of "design - manufacture - test" of new technological devices, and may also be useful in optimizing the structures and modes of operation of already operating systems. In order to solve the PDE COMSOL Multiphysics uses the finite element method (FEM). Software launches the finite element analysis together with a grid which takes into account the geometric configuration of bodies and error control using a variety of numerical solvers. Since many physical laws are expressed in the form of PDE, it is possible to simulate a wide range of scientific and engineering phenomena of the many areas of physics such as acoustics, chemical reactions, diffusion, electromagnetics, fluid dynamics, filtration, heat and mass transfer, optics, quantum mechanics, semiconductor devices, sopromat and many others. Besides the aforesaid, the program with the help of coupling variables allows to interconnect the models in different geometries and to interconnect models of different dimensions. In order to create and calculate the tasks the following steps are recommended: 1. Select the dimensions of the model, define a physical partition in Model Navigator (each partition corresponds to a certain differential equation) and define a stationary or non-stationary analysis; 2. Determine the workspace and sets the geometry; 3. Specify the source data, dependence of the variables from their position and time; 4. Specify the physical properties and the initial conditions; 5. Specify the boundary conditions; 6. Set parameters and construct a grid; 7. Determine the parameters of the decision unit and run the calculation; 8. Configure the display mode; 9. Get the results [4]. Fluid CFD module Multipurpose Material library Chemical Interfacing Livelink for Matlab 3 Numerical modeling by the groundwater fluids filtration process in the comsol multiphysics environment Comsol Multiphysics is used for numerical modeling of flow distribution for the analytical solutions and for the usage of different modes for the modeling experiment. As a starting point there are used the boundary and initial conditions. Under filtration understands the fluid motion in a porous medium. The medium is porous, if it contains a significant number of voids, the sizes of which are small compared to the characteristic dimensions of the environment. A quantitative characteristic of the porosity may be the ratio of pore volume to the total volume mm = VV pppppppppppppppp / VV tttttttttt. Therefore the porosity is a dimensionless quantity. The porosity level of the environment leads to the obvious fact that the continuity equation for the continuous flow of homogeneous fluid [5] ρ + div ρw = 0 (1) t will take the form (mmmm) + dddddd ρρww = 0, (2) where W filtration velocity vector. As for the Euler motion equations, in the theory of filtration there is a number of assumptions that allow to recourse to Darcy s law: WW = kk gggggggg PP, (3) μμ PP = PP + ρρρρρρ, (4) ρρ density; P pressure; g acceleration of gravity; Н distance from the considered point of the environment to a fixed reference surface; μμ dynamic viscosity; k permeability, i.e. conductivity of the porous environment in relation to a given liquid, P - total pressure, L - well depth. 4 Physical formulation of the problem In the ore body, i.e. in a geotechnological field there are drilled some number of wells. In one of them (injected wells) the leach solution is fed, and from the other (pumped wells) the productive uranium containing solution is extracted which is supplied for further processing. In-situ uranium leaching by the borehole systems there have to be kept the balance pumped and injected fluids in the cells and blocks, i.e. the total costs of pumped wells and injected wells must be the same ( W input = W output ). The process occurs in the geotechnical field with the length x, with the width - y. Subsurface module Chemical reaction engineering module Modules are required for ISL modeling FIGURE 1 Structure of module packages of Comsol Multiphysics software CM12 66 Computer Modelling and Information Technologies

67 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Mukhanov B K, Omirbekova Zh Zh, Orakbayev Y Zh, Kangtarbay M B Holes stored pressure wells boundary conditions h2 Orebody pressure filtration h1 The ore body is saturated regime FIGURE 3 Distribution solution at normal the pressure of injection wells Holes the pumping wells 5 Modeling The distance L FIGURE 2 Mineral extraction scheme The main aims of the modeling are: to assess the parameters of the underground fluids flow by comparing the numerical results with experimental measurements; to predict the flow patterns. Two modules were used in the program Comsol: Darcy's law (dl) was used to determine the hydraulic head in time and space, the method of arbitrary Lagrangian-Eulerian (ale) - to calculate the change in the flow of underground fluids [5, 6]. The parameters were evaluated mainly due to 2D models. FIGURE 4 Automatic partitioning into the grid (number of nodes 3165, the number of points ) 6 The results of numerical decision The results of numerical decision are given below. In this work we have chosen two types of well locations. In the first type, the number of wells is equal to two; one of them is injection well, which is located in one-quarter length, and the production well - in three quarters. In the second type the injection wells are located in the quarter and three -quarter length, and the production well - in the center. In both cases, the size of the area, the total debits of injection and production wells were considered to be equal among them. The Figures 5-8 show the distribution of the hydrodynamic pressure field, the velocity field, the field of mineral concentration in the solution for the first case. Figure 5 shows the velocity in the bands to the injection well and the production well, after less than between the holes in the bands. This means that the subjects of the solution from the injection well basically moving between wells, in a timely manner means that the minerals are located in the bands between wells dissolves more than in other parts, ie appears stagnant zones. Figures 7-8 result of the position of contour lines with different moves to a producing well, ie the appearance of the mineral zone concentration increases with time. FIGURE 5 The distribution of the normal velocity field FIGURE 6 The distribution of the higher velocity field FIGURE 7 Distribution solution at increasing the pressure of injection wells CM12 67 Computer Modelling and Information Technologies

68 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Mukhanov B K, Omirbekova Zh Zh, Orakbayev Y Zh, Kangtarbay M B 7 Conclusions FIGURE 8 Flow distribution between the injection and production wells FIGURE 9 Gradient of pressure With the help of Comsol Multiphysics there can be obtained the implementation of the model (3) and (4) in a visual representation and it allows to estimate the filtration process in the various modes. As physical-chemical the process of filtration leaching is determined by a set of parameters: filtration velocity, the nature and concentration of the solvent, the content of uranium in the ore, the physical properties of ore mass, which determine the state and properties of heterogeneous systems at the moment. The leaching velocity increases with the solvent concentration increase that also leads to an increase in the degree of extraction. The reaction between a liquid and solid substance develops from the particle surface to their center, and before the complete leaching there is remained the unreacted core in the center, and on the surface - a solid substance. Ore material with its porous structure obstructs the diffusion process by the resistance. The smaller diffusion resistance is, the higher the leaching velocity and the degree of uranium extraction at a given duration of leaching. The total resistance of the process consists of diffusion and chemical resistances. If the resistance of one of the steps is much higher than the resistance of the remaining stages, the total flow of the process is limited by the slowest stage. In the presence or formation by a solid dense shell on the surface of the dissolved mineral of uranium the limiting stage is the diffusion through this layer. In this case, the effect of leaching conditions on its velocity corresponds to the internal laws of diffusion. The interaction of the reagent with uranium minerals represents the first stage of leaching, on the second stage the dissolved solution moves along the layer with the solvent filter. The transportation of the substance as a whole is carried out by the liquid movement (convective diffusion). The basis of mineral dissolution in acid is the reaction of a hydrogen addition to the anion of solute compound. FIGURE 10 Distribution of hydrodynamic pressure field References [1] DiCarlo J C, Hargreaves B A, Nayak Krishna S, Hu Bob S, Pauly John M, Nishimura Dwight G 2005 Variable Density Excitation Pulses in One-Shot Fourier Velocity Encoding for Valve Flow Imaging Magnetic Resonance in Medicine [2] Lomax H, Pulliam T H, Zingg D W, Kowalewski T A 2002 Fundamentals of Computational Fluid Dynamics Applied Mechanics Reviews [3] Squires Todd M, Stephen Quake R 2005 Microfluidics: Fluid physics at the nanoliter scale Reviews of Modern Physics [4] [5] White W B, White E L 2005 Ground water flux distribution between matrix, fractures, and conduits : constraints on modelling Speleogenesis and Evolution of Karst Aquifers 3(2) 2-6 [6] Femino A M, Fay F S, Fogarty K, Singer R H 1998 Visualization of single RNA transcripts in situ Science 280(5363) [7] Mukhanov Bakhyt K, Omirbekova Zhanar Zh, Usenov Azamat K, Waldemar Wójcik 2014 Simulating In-Situ Leaching Process Using COMSOL Multiphysics Intl Journal Of Electronics And Telecommunications 60(3) CM12 68 Computer Modelling and Information Technologies

69 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Panyukova D, Nurpeissova G Review of modern approaches for power load forecasting Dina Panyukova 1*, Gulnara Nurpeissova 2 1 Institute of Information and Telecommunication Technologies, Kazakh National Research Technical University named after K.I. Satpayev, Satpayev Str.22, , Almaty, Kazakhstan 2 Eurasian Technological University, Tolebi Str. 109, , Almaty, Kazakhstan *Corresponding author s haleth@mail.ru Abstract The growth of renewable energy sources use in the world leads to complication of energy grid control. The challenge is not only in heterogeneous compounds of such system, but also in random nature of power consumption. One of the possibilities to operate power grid with consideration of instant consumption is to provide a load forecasting with greatest possible accuracy. Several approaches offered by scientific community are considered in the article. It includes regression methods as a classical methodology with several developments. The other direction of researches is artificial intelligence s use. Application of classical filtration methods cannot be unconsidered too. Although, only combination of several approaches in one predictive system had shown incredibly high results. Keywords: Forecasting, Power Consumption, Artificial Intelligence, Regression 1 Introduction For last twenty years tremendous growth of renewable energy sources use in centralized power supply can be observed. According to [1] at 2012 all around the world such sources use increased up to 74 EJ, and in 2050 it will reach incredible EJ. The renewable energy sources unlike the classical technologies of energy generation have global uncertain influences; such are amount of wind, sun light and other natural factors. Although, the power consumption, especially in residential areas, is always a random factor explicitly affecting the despatching task of power grid. Therefore nowadays matter of load forecasting is becoming more and more important. The increase of shortterm forecast accuracy leads to essential lowering of loss in power network and optimization of maintenance works of service provider [2]. The article is devoted to review new researches on shortterm predictive systems for power load. Information about classical regression analysis and newly developed methods are included in section Regression approaches. Section Artificial intelligence describes artificial intelligence use for prediction. Section Additional information introduces idea of using weather and social factors to improve forecasting. In section Data pre-processing data filtration methods are discussed. At last, relevant final remarks are provided in Conclusion. 2 Regression approaches First attempts for data structuring and forecasting usually are based on regressive methodology. Classical regressive analysis shows acceptable, although non-competitive with modern models, results. But researchers have developed new regressive methods that are highly comparable with others. According to [3] one of the steps to improve regression model is to consider in linear regression not only previous power consumption data, but some patterns like daily cycles or seasonality. As of totally new regression methods Holt-Winter model, Support Vector Machine should be mentioned. In [4] Holt-Winter and Autoregressive Integrated Moving Average models for load forecasting in Pakistan are used. Accordingly, in [5] Support Vector Machine for prediction was researched. Both models can be used either inherently or as a basis for hybrid systems. 3 Artificial intelligence The parallel direction of the researches considers artificial intelligence as the instrument to data processing and prediction. It includes neural networks, fuzzy logic and genetic algorithms. The neural networks are known as universal approximation mechanism. Consequently they can be used for a forecasting task. The main challenge with adjusting the neural networks for claimed aim is choosing exact architecture, depth and learning algorithm. This needs good knowledge of artificial neural networks working principle and big research to find optimal parameters for exact task. Furthermore even with slightest change of the implementation area adjusted network should be totally reset. In [6] total process of neural networks choice and training by data sets from New England Pool region is described. The chosen and trained bagged neural networks have shown reduction of power prediction error comparing with traditionally used techniques. CM13 69 Computer Modelling and Information Technologies

70 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE One of the advantages of neural networks use is possibility to work with limited existing data. In such condition neural forecasting models can give better accuracy than any methodology, as was totally reasoned in [7]. Other important characteristic of the neural forecasting systems is possibility of retraining with new incoming data in practical application. To provide such possibility short time of training is required. First way to achieve the goal is to use pattern-based labelling of incoming data. This approach was discussed in [8]. Beside that in [8] several architectures were compared and best results were shown by regression neural network and one-neuron perceptron learned locally. Though, more logical way to gain short training time is to simplify the structure of neural network. In [9] extreme learning machine as such simple structured model was examined. This newly developed model was used for evaluation of both 1 and 24 hour power prediction and had reached significant accuracy. The extreme learning machine also can be combined with artificial bee colony algorithms to calculate networks optimal weights as provided in [10]. Such combination of neural approach with genetic algorithms can shorten number of training iterations, hence the system requires less data. It was proved by using New England and North American electric utility data. Genetic algorithms also can be utilised as a feature selector as it was done in [11]. Offered forecasting strategy has impact on optimizing system reliability and stability. Similarly neural forecasting model can be improved by adding uncertainty factor representation. It can be achieved by fuzzy representation utility as in classical adaptive neuro fuzzy inference system or in interval type fuzzy logic model. Both possibilities are compared in [12] by power load data from the Victoria region (Australia) and the Ontario Electricity Market (the USA). Interval type fuzzy logic model showed decrease in prediction error against either neural models or adaptive neuro fuzzy inference system. 4 Additional information Most of the researchers suppose straight correlation between power consumption and weather and social information. It becomes most noticeable in prediction for residential area as was researched in [13], where a system for onemonth-ahead load forecast was designed. Based on Support Vector Machine model was developed by implementing 14 natural and 5 social factors. The researchers suggest that the same approach can lead to more accurate short-term forecasting too. 5 Data pre-processing Panyukova D, Nurpeissova G As mentioned previously pre-labelled incoming data can extend accuracy possibilities of both modern regression and intellectual models. It can be done manually by the researchers and operator or can be provided by classical telecommunication filtration. One of the filtration methodologies is Wavelet decomposition. Wavelets convert incoming data signal from time-domain into time-and-frequency representation. That allows receiving several data sets with different frequencies, which in sum represent initial signal. The data sequences then are used to train the networks or form the regression models, whatever is chosen as basic. Summing outcome from the models represent required forecast. Wavelet use for fractal interpolation in predictive system is described in [14]. As a result it can be concluded that such filtration s use had enabled to achieve high accuracy with less interpolation cycles. Previously mentioned extreme learning machine and modified artificial bee colony algorithms combination can be extended by Wavelet transformation too. Such system will be characterized by high speed re-education and decreased performance error as shown in [10]. Usage of Kalman filter allows using extra information about consumption change trend by evaluation not only state vector of incoming data but also its probability density. Such data pre-processing was used in [15] to improve statespace model of load structure to ensure accurate prediction and detailed analysis of power consumption. 7 Conclusions According to all considered researches present situation in power load forecasting is characterized by several features. First is the fight for the tenth of one percent in accuracy. Second is absents of universality in all presented methods. So that for any particular region optimal approach should be researched again. Regardless, even usage of non-optimal modern system can provide prediction with more than just acceptable result. And it will provide better power grid control than are performed in practice nowadays. At the end it should be mentioned that best resulting forecasts where achieved by hybrid systems in different combinations. But straight comparison cannot be done because of heterogeneous data sets and time periods used. References [1] Wina Crijns-Graus 2016 Renewable Energy: Past Trends and Future Growth in 2 Degrees Scenarios Energy Procedia [2] Kálmán Tornai, Lóránt Kovács, András Oláh, Rajmund Drenyovszki, István Pintér,Dávid Tisza, János Levendovszky 2016 Classification for consumption data in smart grid based on forecasting time series Electric Power Systems Research [3] Grzegorz Dudek 2016 Pattern-based local linear regression models for short-term load forecasting Electric Power Systems Research [4] Anwar Hussain, Muhammad Rahman, Junaid Alam Memon 2016 Forecasting electricity consumption in Pakistan: the way forward Energy Policy [5] Fan Zhang, Chirag Deb, Siew Eang Lee, Junjing Yang, Kwok Wei Shah 2016 Time series forecasting for building energy consumption using weighted Support Vector Regression with differential evolution optimization technique Energy and Buildings [6] Khwaja A S, Naeem M, Anpalagan A, Venetsanopoulos A, Venkatesh B 2015 Improved short-term load forecasting using bagged neural networks Electric Power Systems Research CM13 70 Computer Modelling and Information Technologies

71 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE [7] Che-Jung Chang, Jan-Yan Lin, Meng-Jen Chang 2016 Extended modeling procedure based on the projected sample for forecasting short-term electricity consumption Advanced Engineering Informatics [8] Grzegorz Dudek 2016 Neural networks for pattern-based short-term load forecasting: A comparative study Neurocomputing [9] Song Li, Lalit Goel, Peng Wang 2016 An ensemble approach for short-term load forecasting by extreme learning machine Applied Energy [10] Song Li,, Peng Wang, Lalit Goel 2015 Short-term load forecasting by wavelet transform and evolutionary extreme learning machine Electric Power Systems Research [11] Ahmed I. Saleh, Asmaa H. Rabie, Khaled M. Abo-Al-Ez 2016 A data mining based load forecasting strategy for smart electrical grids Advanced Engineering Informatics 30(3) Panyukova D, Nurpeissova G [12] Saima Hassan, Abbas Khosravi, Jafreezal Jaafara, Mojtaba Ahmadieh Khanesar 2016 A systematic design of interval type-2 fuzzy logic system using extreme learning machine for electricity load demand forecasting International Journal of Electrical Power & Energy Systems [13] Hyojoo Son, Changwan Kim 2016 Short-term forecasting of electricity demand for the residential sector using weather and social variables Resources, Conservation and Recycling In Press [14] Ming-Yue Zhai 2015 A new method for short-term load forecasting based on fractal interpretation and wavelet analysis International Journal of Electrical Power & Energy Systems [15] Hisashi Takeda, Yoshiyasu Tamura, Seisho Sato 2016 Using the ensemble Kalman filter for electricity load forecasting and analysis Energy CM13 71 Computer Modelling and Information Technologies

72 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Saimassayeva Sh, Moldagulova A N Forecasting inflation using Big Data Sh Saimassayeva*, A N Moldagulova International Information Technology University, Almaty, Kazakhstan *Corresponding author s saimassayeva@gmail.com Abstract Big Data is a revolutionary phenomenon which is one of the most frequently discussed topics in the modern age, and is expected to remain so in the foreseeable future. In this paper given a review of using Big Data for forecasting inflation by identifying and reviewing problems. Forecasting inflation during the transition period was given special importance. The government, business entities and the population are interested in forecast calculations. The results of the forecasts form the basis for developing measures and making management decisions. Keywords: Big Data, forecasting, inflation, statistics, economics, data sources, new technologies 1 Introduction Big Data is a term that denotes technologies for processing structured and unstructured data of huge volumes to produce useful and human-readable results. The volume of data on the most diverse aspects of life is growing, and at the same time, the possibilities for storing information are growing. Most experts agree that accelerating the growth in the volume of data is an objective reality. Social networks, mobile devices, data from measuring devices, business information are just a few types of sources capable of generating huge amounts of information [1]. The Big Data paradigm defines three basic types of tasks: 1. Storing and managing the amount of data in hundreds of terabytes or petabytes, which conventional relational databases cannot effectively use. 2. Organization of unstructured information consisting of texts, images, videos and other types of data. 3. Analysis of Big Data, which raises the question of how to work with unstructured information, the generation of analytical reports, as well as the introduction of forecast models [2]. But how can we apply data analytics and Big Data to predict inflation, or any of a number of other economic variables. 2 Main content Big Data and data analytics have already been applied to other fields. For example, the American company Gracenote, which specializes in the processing of large data, has calculated the most likely version of the medal offset of the Olympics in Rio. Given this breakthrough in other fields, how can the same methods are applied to economics and finance? There are some reasons why Big Data technologies still do not applied for forecasting inflation. They are as follows: 1) The economics is a complex system. Economics is a 'complex system' - basically that many relationships exist between parts of the system, its whole, and its environment, and those relationships are not easily represented or modeled. 2) Fear of using new technologies. The government and large corporations are moving much slower and are wasting time implementing these technologies. One of the reasons is that the most "modern analytical methods of data analysis" can be good for predicting, in the sense of understanding the underlying "function" or "templates" of data, but sometimes prediction is not useful without a prescription.[4] That is sometimes it is better to use a simpler model that is more understandable so that you can focus on the possibilities of improvement. 3) Most believe that a certain way of doing things as "right" does not make it a "best" way of doing things. The reality in the trenches is that economic forecasting, strategic planning, the financial budget and many opportunities that require forecasting are largely managed by the staffs of economists and statisticians who rely heavily on their own way of working and their ideas [5]. 4) The creation and implementation of new technologies is complex and expensive The work aimed at getting exactly what you need will turn it into a useful form, safely preserve it, provide reliable property and responsibility for it, integrate it with other data warehouses, model, test, and integrate into organizational processes. 5) Big Data tools are already used in many sectors in the economics Races for analytics for many years existed among us in those industries where the prognostic line is translated into direct and immediate value. This will continue very quietly, because if something really provides a competitive advantage, and the analyst does well, it is in the interests of the organization itself not to let anyone know [6]. The above affect in a bad way the implementation of the Big Date technology for forecasting inflation. But, there are CM14 72 Computer Modelling and Information Technologies

73 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE some examples that perfectly demonstrate that forecasting with Big Data very efficient and effective. For instance, a young company from San Francisco, Premise Data, has created an application for a smart phone that is already used by more than seven hundred people from twenty-five developing countries. Most of these people are students and housewives. With the help of the application, they earn by photographing goods. Each photo brings its author from eight to ten cents and represents significantly more value for Premise. Analyzing the dynamics of prices for daily goods by the new photos, Premise employees build the inflation index practically in real time. The idea is quite simple: having current information and sufficient processing power for processing, you can find new patterns and relationships between different types of data [3]. 3 Conclusions Today, we need to use resources more efficiently. To do this, you always need to keep up to date and try new tools and Saimassayeva Sh, Moldagulova A N technologies to solve specific problems. In the same way, more and more companies from different countries of the world use the Big Data tools to predict inflation. Despite the complexity of the application, the effectiveness of using the Big Data tool is greater. We can continue to make predictions in the old manner - based on the usual retrospective analysis. For example, evaluate the sales of ice cream last summer and prepare for the same volume in the coming season. However, today there are better tools. Big Data analysis allows us to take into account when predicting dozens of third-party factors - from climatic features to the number of other events. It is possible that the sales of specific goods are significantly influenced by them - or some other, by no means obvious factor. Identify such a correlation is possible only according to Big Data technologies. Big Data shed light on the market situation and give the opportunity to respond more quickly. Soon it will become a regular business based on forecasting. References [1] Stock J H, Watson M W 2002 Forecasting Using Principal Components from a Large Number of Predictors Journal of the American Statistical Association 97(460) [2] Stock J H, Watson M W 2006 Forecasting with many predictors. In Handbook of Economic Forecasting Elliott, G., Granger, C. W. J., Timmermann, A. (eds). Elsevier: Amsterdam [3] Shi Y 2014 Big Data: History, Current Status, and Challenges Going Forward The Bridge, The US National Academy of Engineering 44(4) Winter 2014, 6-11 [4] United Nations, Big data and modernization of statistical systems Report ofthe Secretary-General 2014 [5] Manyika J, Chui M, Brown B, Bughin J, Dobbs R, Rox-Burgh C, Byer A H 2011 Big data: The next frontier for innovation, competition, and productivity McKinsey Global Institute [6] Richards N M, King J H 2013 Three Paradoxes of Big Data Stanford Law Review Online 66(41) 41-6 CM14 73 Computer Modelling and Information Technologies

74 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Ten H Big Data in text processing: an old problem with a new approach Handor Ten * International Information Technologies University, Manas Str./Zhandosov Str., 34 A /8A Almaty, Kazakhstan *Corresponding author s handor.ten@gmail.com Abstract Data is everywhere around us. We use existing data and produce new data every day, every hour and every minute. In addition, most of this data is unstructured. It includes data from the Internet, data from tons of smart devices that around us, data from social nets and messengers that we are using every day in order to communicate with our friends and coworkers. Significant part of this volume is textual information and quite often, it is necessary to somehow store and process it. However, we cannot use usual data management systems and approaches in order to do so and one (but not the only one) of the reasons is that the amount of this data is very, extremely huge. Therefore, we need slightly new modern approaches and techniques to solve this problem. This paper covers the existing solutions in text mining sphere using Big Data technologies. Keywords: Big Data, Map Reduce, Hadoop, Text Mining, Distributed Processing 1 Introduction Nowadays we face with data every day in our life. We study, work, communicate and relax somehow using different types of data. Moreover, today each of us can not only consume this data but also produce new data. The development of the Internet provide a great opportunity to try ourselves as content creators. We can write posts in blogs, upload gigabytes of video material on YouTube, exchange s and messages through services, messengers and social nets and, of course, we can write comments approximately on every information resource. The amount of textual information is extremely huge and it is increasing every second. Traditional technologies cannot process this amount of data because it is Big Data. Therefore, we need to use approaches and technologies that are appropriate for Big Data. 2 Basic Information This part of the paper describes shortly main terms and definitions that are connected with Big Data. What is Big Data? How to identify that some data is Big? What is 4 V- s that are the main characteristics of Big Data? What is Hadoop and what is it destination? And some more terms that are necessary to know in order to understand this article. 3 Existing solutions Of course, many algorithms and approaches exist that are traditionally used in order to process textual information. Moreover, nowadays these algorithms and approaches successfully combined together with modern Big Data technologies and solutions in order to do old job but on a large scale. This paper investigates such kind of solutions. For example, usage of Knuth Morris Pratt algorithms with the help of Hadoop Distributed File System [1], basic principles of Hadoop and major resources that it uses [2], concrete solutions that are implemented by big companies such as HETA [3] etc. This paper covers basic principles of these solutions, analyze their advantages, disadvantage, and how the experience from existing solutions can help in implementing slightly new approaches. 4 Conclusion This paper collects information about existing solutions that can help in further work in the sphere of text mining using Big Data technologies and approaches. References [1] Ramya A, Sivasankar E 2014 Distributed pattern matching and document analysis in big data using Hadoop MapReduce model International Conference on Parallel, Distributed and Grid Computing [2] Pandey K, Gadwal A, Lakkadwala P 2016 Hadoop multi node cluster resource analysis Symposium on Colossal Data Analysis and Networking (CDAN) [3] Nicolas V, Da Silva A, Picard M 2014 HETA: Hadoop environment for text analysis International Workshop on Computational Intelligence for Multimedia Understanding (IWCIM) CM15 74 Computer Modelling and Information Technologies

75 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Yebekenova A Automation world: covering the field of healthcare workflow optimization A Yebekenova * International Information Technologies University, Manas Str./Zhandosov Str., 34 A /8A Almaty, Kazakhstan *Corresponding author s ebekenova.azhar@gmail.com Abstract The article examines the possibility of workflow automation in a medical institution by introducing a medical information system (MIS). It represents a computerized business process management (BPM) system, which provides automation and optimization of all the working processes of the medical institution [1]. Keywords: medical information system, decision making, EHR, BPM, EPMR 1 Introduction The following important components can be distinguished in the hospital workflow: patient registration, issuance of ambulatory patient cards, registration of the patient's admission, appointment of treatments, and creation of medical reports. [2] Furthermore, there is a need to create a database containing all information about patients and doctors and providing data access according to the access level. Pursuant to the generally accepted data, the introduction of such system will help to increase the efficiency and accuracy in the formation of reports provided to health authorities, reduce unproductive working hours spent on work with documentation, improve the quality of medical care through information support for medical activities and, as a result, reduce the number of medical errors. [3] 2 Conclusions According to the survey, most physicians are skeptical to the Electronic Health Record (EHR). This fact is caused by small computer literacy, lack of IT experience, uncertainty of time and costs. [4] However, despite the fact that it is hard for people to innovate, there is a tendency of a positive attitude towards IT in medicine. The article gives examples and analysis of existing solutions on the market for BPM in medical facilities. This will help to form common characteristics and take into account all the shortcomings of MIS in order to meet the current public health needs. References [1] Dumas M 2013 Fundamentals of business process management (1st ed., pp ) Berlin: Springer [2] Hameed S, Mustapha S, Mardhiyah A, Miho V 2008 Electronic medical record for effective patient monitoring database International Conference On Computer And Communication Engineering [3] Marinos S, Nikolopoulos P, Pavlopoulos S 1999 A WEB-based patient record and appointment management system. Proceedings Of The First Joint BMES/EMBS Conference IEEE Engineering In Medicine And Biology 21St Annual Conference And The 1999 Annual Fall Meeting Of The Biomedical Engineering Society (Cat. No.99CH37015) [4] Subrahmanian E 2009 Empirical studies of workflow automation in physician offices in the United State IEEE International Conference On Automation Science And Engineering CM16 75 Computer Modelling and Information Technologies

76 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Moldagaliyev Y Usage of machine learning based recommendation system in the development of web-service Y Moldagaliyev International Information Technologies University, Manas Str./Zhandosov Str., 34 A /8A Almaty, Kazakhstan *Corresponding author s yedige1995@gmail.com Abstract The article is about Recommendation Systems that are used to help users find items or services, such as books, music, electronics or based on information about the user, or the recommended item. RS systems also play a major role in the process of making decisions that potentially helping users to maximize profits or minimize risks in choosing items [1]. Keywords: Recommendation system, Machine Learning, Filtering 1 Introduction The existing recommendation methods mainly include collaborative filtering recommendation, knowledge-based recommendation, content-based recommendation, and so on. Each recommendation method has its own advantages and disadvantages. The disadvantages of content-based recommendation methods mainly include low automation level and poor diversity of recommendation results. Collaborative filtering approach depends on a large amount of historical data sets. Knowledge-based recommendation is a static method, whose main difficulty is knowledge modeling. But recently these systems have been using machine learning algorithms from the field of artificial intelligence. 2 Essential Information The problem is that Machine learning field does not have a clear classification scheme for its algorithms, mainly because of the number of approaches and the variations. It becomes difficult and confusing to choose an appropriate machine learning algorithm that fits one s need when developing a web service with Recommendation system module [2]. 3 Example of usage According to the survey, choosing a suitable machine learning algorithm for a recommender system is difficult because of the great number of algorithms described already existing in the field of Machine Learning. For example, an online techshop may use a machine learning algorithm to classify laptops by weight and then recommend other laptops to a user buying a specific one. 4 Conclusion Machine learning has become very popular these days due to incensement in processor speed and memory size. As a consequence, the Machine learning field now has a large number of algorithms that use mathematical or statistical analysis to learn, draw conclusions or infer data [3]. References [1] Adomavicius G, Tuzhilin A 2005 Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions Knowledge and Data Engineering, IEEE Transactions on 17(6) [2] Balabanović M 1998 Exploring versus exploiting when learning user models for text recommendation User Modeling and User-Adapted Interaction 8(1-2) [3] Sarwar B, Karypis G, Konstan J, Reidl J 2001 Itembased collaborative filtering recommendation algorithms In Proceedings of the 10th international conference on World Wide Web. ACM New York, NY, USA CM17 76 Computer Modelling and Information Technologies

77 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Sarzhan M Development of methods and models of designing the wireless sensor network and their applications M Sarzhan International Information Technologies University, Manas Str./Zhandosov Str., 34 A /8A Almaty, Kazakhstan *Corresponding author s magzhanmekebai@gmail.com Abstract The article is about wireless sensor network (WSN), that is a distributed system for collecting, processing and transmitting data. Each sensor consists of a sensor that collects information (temperature, humidity, the degree of radiation or chemical contamination, etc.), a microprocessor, a transceiver and a power source in the form of a rechargeable battery. Despite the fact, that one sensor can be continuously active for a short period of time the WSN can, if it is properly organized, operate autonomously for a long period. In this connection, the main actual task is to maximize the length of the network operation period, which is called the lifetime of the WSN [1], Keywords: wireless sensor network, collecting data, applications of network 1 Introduction Wireless sensor networks have many applications. One of the most important applications is the collection of information when data is collected by sensors and then transmitted to the base station for further analysis. In the WSN, each sensor is equipped with a battery and uses wireless communication. Tracking of wildlife [2], monitoring of the environment [3-4], monitoring of volcanic activity [5], water monitoring [6], monitoring of civil construction, and detection of forest fires are only some examples of such applications. The lifetime of the sensor is largely determined by the capacity of the battery, and the lifetime of the entire network depends on the operating time of each sensor. Therefore, to reduce costs, it is necessary to solve the problems of energy-efficient functioning of the WSN. First of all, the sensors must cover the area, the information about which must be collected. 2 The aim Aim is the development of an algorithmic apparatus for optimizing the structure and functioning of a WSN, which gives them maximum efficiency and efficiency. 3 Methods of research In the development of algorithms will be used t combinatorial analysis, discrete optimization, computational geometry, as well as linear, integer, stochastic and semidefinite programming. To assess the quality of algorithms will be used References [1] Tubaishat M, Madris S 2003 Sensor networks: an Overview IEEE Potentials [2] Tolle G, Polaste J, Szewczyk E, Guller D, Turner N, Tu K, Burgess S, Dawson T, Buonadonna P, Gay D, Hong W 2005 A Amcroscope in the Redwoods ACM SenSys [3] Selavo L, Wood A, Cao Q, Sookor T, Liu H, Srivasan A, Wu Y, King W, Stancovic J, Young D, Porter J 2007 LUSTER: Wireless Sensor Network for Environmental Research ACM SenSys [4] Barrenetxes G, Ingelrest F, Schaefer G, Vetterli M 2008 SensorScope: methods of a priori and probabilistic analysis, as well as numerical modeling. 4 Conclusions The task of building an energy efficient communication tree is the task of routing. However, in practice, the minimum island tree is used as its solution, which is a 2-approximate solution. This means that to ensure the connectivity of the network can be spent 2 times more energy than required, but this is unacceptable. We have developed a new hybrid genetic algorithm that builds a solution close (by functional) to the optimal one. Further development of this approach is seen in the use of the VNS method [7], which will allow using the local search with alternating neighborhoods at the stage of mutation of the solution. An analysis of the problem of minimizing the number of identical sectors participating in the coverage of the strip is carried out. This allows, to minimize the costs associated with monitoring such long objects as roads, pipelines, boundaries, perimeters of buildings, etc. 5 Рractical significance The obtained results will allow to design energyefficient WSN, which will result in more effective use of them. Currently, WSN are used in many areas of human activity, which is due to both economic considerations and security considerations in the case of networks in hard-toreach or life-threatening and human-health places. Oute-of-the-Box Environmental Monitoring ACM/IEEE IPSN [5] Ewrner Allen G, Lorinez K, Johnson J, Lees J, Welsh M 2006 Fidelity and Yield in a Volcano Monitoring Sensor network USENIX OSDI [6] Song W-Z, Huang R, Xu M, Ma A, Shorazi B, LaHusen R 2009 Airdropped Sensor network for Real-time High-fidelity Volcano Monitoring ACM MobiSys [7] Hansen P, Mladenovic N 2001 Variable neighborhood search: Principles and applications Eur. J. of OR CM18 77 Computer Modelling and Information Technologies

78 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Saparkhojayev N, Mukasheva A, Saparkhojayev P The concept of monetization of IoT-based project: case of Medical System in Kazakhstan Nurbek Saparkhojayev 1, Assel Mukasheva 1*, Pazharbek Saparkhojayev 2 1 Department Information Technologies, KazNRTU after K.I. Satpayev, Satpayev Str. 22, Almaty, Kazakhstan 2 Department Physics and Mathematics, The Korkyt Ata Kyzylorda State University, Kyzylorda, Kazakhstan *Corresponding author s mukasheva.a.82@gmail.com Abstract In fast-growing world where new technologies, services and platforms arise every day, the importance of monetizing projects in proper time is becoming one of the main issues that brings not only financial benefits, but also world fame for their owners. Furthermore, the Internet of Things (IoT) is becoming more and more important in many domains worldwide. By 2017, 90 million people will live in smart homes, and by 2020, there will be 50 billion connected devices. The latest Gartner forecast predicts that by 2020 there will be $309 billion in incremental revenue opportunity for IoT suppliers, mostly in services. Taking into account those numbers, author of this research paper presented concept of acquiring money out of possible implementation and deployment of medical system in Kazakhstan. Keywords: Internet of Things, monetization, medical system, wireless systems and technologies. 1 Introduction The next level in the era of computing will be outside the scope of the traditional desktop. In the Internet of Things (IoT) paradigm, many objects surrounding us will be on the network in specific form. Radio Frequency Identification (RFID) and sensor network technologies will continue developing to meet this new challenge, in which information and communication systems are invisibly embedded in the human environment. All this as a result brings to the generation of enormous amounts of data, which have to be stored, processed and presented in a seamless, efficient, and easily understandable form. Smart connectivity with existing working networks and context-aware computation using network resources is a primary part of IoT. The term Internet of Things was first introduced by English scientist Kevin Ashton in 1999 in the context of supply chain management [1]. However, in the past decade, the definition has been more inclusive covering wide range of applications like healthcare, utilities, transport, manufacturing, etc. [2]. Nevertheless to the fact that the definition of Things has changed as technology evolved, the main goal of making a computer sense information without the direct human intervention remains the same. The radical evolution of the modern Internet into a Network of interconnected objects that not only outputs information from the sensing environment and interacts with the physical world, consisting of actuation/command/control, but also uses Internet standards to provide services for information transfer, analytics, applications, and communications. Fuelled by the popularity of devices enabled by open wireless technologies, like Bluetooth, radio frequency identification (RFID), Near-Field Communication (NFC) Wi-Fi, and telephonic data services as well as embedded sensor and actuator nodes, IoT has stepped out of its infancy and is on the edge of transforming the current static Internet into a fully integrated dynamic Future Internet [3]. The Internet revolution led to tight interconnection between people at an unprecedented scale and pace. The next revolution will be the interconnection between objects to create a smart environment. Only in 2011, the number of interconnected devices on the planet exceeded the actual number of people. Currently there are 22.9 billion interconnected devices and it is expected to reach 50 billion devices by The rest of this paper is organized as follows: Section II provides description of literature review on IoT and existing systems, which already have popularity and used worldwide by many people. Section III discusses about the concept of medical system and its impact on Kazakhstan. Section IV is presenting possible ways of monetization of medical system in Kazakhstan starting from governmental financial support and finishing with money from the deployment of this system. Finally, our conclusions and future work directions presented in section V. 2 Literature review As identified by Atzori et al. [4], Internet of Things can be realized in three different paradigms: internet-oriented (middleware), things-oriented (sensors) and semanticoriented (knowledge). Even though, this type of delineation is required due to the interdisciplinary nature of the subject, the practicality of IoT can be released only in an application domain, in which these three paradigms intersect. The RFID group defines the Internet of Things as The worldwide network of interconnected objects uniquely addressable based on standard communication protocols, whereas according to Cluster of European research projects on the Internet of Things [2] Things are active participants CM19 78 Computer Modelling and Information Technologies

79 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE in business, info and social processes wherever they're enabled to move and communicate with one another and with the environment by exchanging knowledge and data perceived concerning the environment, while reacting autonomously to the real/physical world events and influencing it by running processes that trigger actions and make services with or while not direct human intervention. According to author of the following research [5], a smart environment is the environment that uses information and communications technologies to make the critical infrastructure components and services of a city s administration, education, healthcare, public safety, real estate, transportation and utilities more aware, interactive and efficient. IoT takes advantage of identification, data capture, processing and communication capabilities of modern technology to allow regular machines to provide new data sources to applications, which in turn can offer more advanced services. In terms of ICT technologies, IoT adds Any Thing communication to Any Time and Any Place as illustrated in Figure 1. Saparkhojayev N, Mukasheva A, Saparkhojayev P this is used for low cost tagging. Phone cameras decode QR-code by using image-processing techniques. One important disadvantage in using QR Codes is that only Smartphone users can be targeted as mobile camera and Internet connection is a prerequisite [7-8]. The real limitation of the QR Code is the lack of offline ability to authenticate source of code. For example, anyone can easily generate a bogus QR Code claiming to belong to Ford Motors. This makes the application of QR Codes vulnerable to misuse and fraud; 3. Bluetooth and low energy (BLE): this is one of the latest techniques developed so far. All newly releasing smartphones have BLE hardware already installed on them. This emerging wireless technology has been developed by the Bluetooth Special Interest Group (SIG) for short-range communication. In contrast with previous Bluetooth flavours, BLE has been designed as a low-power solution for control and monitoring applications. BLE is the distinctive feature of the Bluetooth 4.0 specification [9]. IoT has already found its own way in variety of different markets, and predictions indicate possible strong growth in next 15 years. Applications are aimed for consumers and companies alike although a certain trend can be seen in how these target groups are divided among the markets in Figure 2. FIGURE 1 IoT compared to other ICT technologies [6] Internet of Things (IoT) term represents a general concept for the ability of network devices to sense and collect data from around the world, and then share that data across the Internet where it can be processed and utilized for various interesting purposes. The IoT is comprised of smart machines interacting and communicating with other machines, objects, environments and infrastructures. Nowadays every person is connected with each other using lots of communication way. Where most popular communication way is Internet, so in another word we can say Internet, which connects peoples. In educational institutions have a situation where in students can be present in any part of the campus and might miss important updates such as rescheduling of classes, etc. Furthermore, students or customers might not be able to know important information in-time for being useful to them as they might not be able to pass through those noticeboards regularly. There are three types of technologies that enable IoT: 1. Near-field communication and Radio Frequency Identification (RFID) technologies: in the 2000s, RFID was the dominant and the most used technology, however, after few years NFC became dominant replacing RFID technology in many areas. NFC have become common in smart phones during the early2010s, with uses, such as reading NFC tags, access to public transportation, etc.; 2. Quick response codes (QR-codes) and Optical tags: FIGURE 2 IoT application ranking [10] As it may be seen from this figure, the most popular market in utilizing IoT is smart homes. The term has more than 60,000 search hits monthly and start-up companies have received over 2.5 billion dollars in total from funding. Examples of these companies are Philips, Belkin, Nest and AlertMe. Home automation solutions include light bulbs, home appliances and security devices. The opportunities IoT offers for businesses are huge as the demand and interest are both clearly visible. Companies should now shift their focus to use cases that would allow organizations to get most out of IoT by adapting new business processes and improving effectiveness of operations [11]. Surprisingly majority of organizations have not started to create value from IoT with the biggest challenges being undeveloped business cases and unclear monetization plans [12]. A scheme of objects interconnection is depicted in Fig. 3, where the application domains are chosen based on the scale of the impact of the data generated. The users span from individual to national level organizations addressing wide ranging issues. CM19 79 Computer Modelling and Information Technologies

80 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE FIGURE 3 Internet of Things scheme [13] Commercial ventures are thinking about and recognizing a tremendous measure of IoT-related applications, which can be separated into two groups. In first group, the gadgets are connected shaping a base that is automated with M2M communication platform and expecting to simplify humans lives. In this group IoT can be seen assuming the part of TCC&R (track, command and control). In houses for instance the room temperature, windows, lights and electrical gadgets, etc. can all be able to be controlled remotely from tablet, laptop or cell phone and automated to dispose of manual procedures that individuals face every day in their lives. Keeping track of organizations' assets gets to be less demanding, when machines and resources are continually sending data to servers. Equipment breakdowns turn out to be less regular when they are under ongoing surveillance and their condition is continually watched. Another huge point has been smart homes, in which the cooling, lights, entryways and appliances are controlled through advanced mobile phone applications. IoT is additionally accepted to reform healthcare, for which many researchers developed many different applications and systems. Devices and gadgets can gather patient information, screen vital signs and consequently change medicine [14]. In the second group, the electronic devices and gadgets are data mines that screen patterns and behaviors for providing organizations with marketing data and to create commerce. This class has raised most worry about the privacy questions of the clients, and to what extent they want to share data about themselves is then used to categorize them [14]. 3 Concept of medical system and its impact on Kazakhstan The main concept of medical system is to create a new model of universal medical center as an information and service platform for the modern organization of the medical treatment process based on IoT and Internet of Everything (IoE) technologies. Smart healthcare system can be called a system of smart medical home designed based on all known technologies of IoT. Patient-oriented medical homes will coordinate and manage patient care process, take responsibility for the prevention of diseases of patients and their well-being. These homes will have a vertically Saparkhojayev N, Mukasheva A, Saparkhojayev P integrated network and will be responsible for facilitating the management of care in cross - sectoral information exchange. They can also take the role of the Medical Centers for preservation of public health. The principle of the service architecture for IoT technology platform is the access point for customers in different locations of wireless local area sensor networks, connected to the global Internet. Smart Home will have networks that are connected on-line to analysis equipment that provides information to the doctor in order to take decisions in urgent cases. In this case, patients may be in a hospital, take outpatient treatment or be in an active operating mode. In deployment of a Smart healthcare system, change in behavior and communication occurs. These changes allow to improve the quality of patient care: a simple, accurate and rapid information search, rapid exchange of information, faster decision making, reducing the number of medical errors due to electronic notification, increase of data storage and records in electronic form, the improvement of information on screening and reporting, rapid response to specific situations and the transfer of on-line information for personnel to take decisions. Every improvement of quality of medical care leads to a reduction in the cost of health care, reduction of patient mortality, and reduction of the number of patients dropping out of the survey of doctors. The integrated medical system provides an integrated quality improvement since it is a new model of public health and is designed for long-term positive effect. This system may look similar to system Healthcare 4.0, but would have the following differences from existing ones on the following characteristics: Distributed monitoring and study of patients; The ever-present help in any situation; Intelligent decision-making. Healthcare 4.0 system (Web 4.0) is designed to change the content of personal portals for new video technologies. From the mobile portal of clients some information, like performances of the physical condition of the body and receiving an appropriate response to the aid from public resources of integrated networks will be sent. It can be applied to all types of patients of hospitals and clinics, nursing homes, and childcare centres. 4 Possible models of monetization of medical system Monetization is the process of converting or establishing something into currency. It usually refers to the coining of currency or the printing of banknotes by central banks, but it may also take the form of a promissory currency. According to [15] monetization is to utilize (something of value) as a source of profit. Many small and big companies are working on monetizing IoT-based applications, products or systems. Among of them, few companies need to describe more detailed. Philips hue connected bulb gives an opportunity for its customers to connect light bulbs to smart phones, which allows geo-fencing, color change and control from anywhere [16]. Their model of monetizing their product is simple: one-time pay for the product, and free app download on customer s smart phone. Famous German automobile CM19 80 Computer Modelling and Information Technologies

81 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE company Audi developed the next IoT-based product. They have implemented Audi Connect system on which 4G/LTE Wi-Fi hotspot navigation system was added, and it utilizes Google Earth and Voice, real-time alerts, weather and traffic. As it was stated by Ricky Hudi, Audi Chief Executive Engineer of Electronics, takes the lead in innovation of the connected car. All this was developed by the help of Gemalto company and according to [17], this developed technology helped Audi to win 2014 Connected World Award. This Audi product used different monetization approach: they offered hotspot subscription in two different packages, one consists of six months for 99$ and the other one consists of 30 months for 499$. There are other possible methods of monetizing products, services, and systems. In [18-19], developers used monetization method that requires customers to proceed one- time payment and download free app, whereas in [20] developers use method that allows them to receive monthly payment by their customers between $ per month, depending on package. All these can help us in preparing our own unique method of monetizing medical system in Kazakhstan. First possible way of making profit out of deployment medical system is to ask medical centers and hospitals subscribe for this system. In this case, the increased number of medical systems and hospitals involved in this process can increase profit. Second possible way of acquiring money is to require monthly payment from people, who will be using this Saparkhojayev N, Mukasheva A, Saparkhojayev P system. If this medical system is consistent and offers many different services, then many people will be subscribing. If monthly subscription price will be around 10 $, then many people can use this medical system. Furthermore, we can offer this medical system to Ministry of Healthcare and Social Development of the Republic of Kazakhstan for buying and using all around the Kazakhstan. It is the easiest way, when medical system can be sold to State and it provides one-time, but high profit. To summarize monetization methods of medical system, there might be some other innovative methods that need to be learned and analyzed. 5 Conclusions Medical systems are always in demand and these systems can bring high profit if managers can choose and use appropriate method for monetization. This system is still in developing process; however, monetization methods need to be taken into consideration earlier because of input money for developing this system. After the successful monetization of the medical system, there are many other systems, which were developed, that can be monetized as well. For example, systems that were created previously in [21-25] can be monetized or can be deployed in industrial manner. Those systems were already tested and utilized, however, they need some investments for further work, which can be acquired from many different sources. References [1] Ashton K 2009 Internet of Things. RFID Journal Available: [2] Sundmaeker H, Guillemin P, Friess P, Woelfflé S 2010 Vision and challenges for realizing the Internet of Things, Cluster of European Research Projects on the Internet of Things CERP IoT [3] Buckley J (Ed.) 2006 The Internet of Things: From RFID to the Next- Generation Pervasive Networked Systems Auerbach Publications, New York [4] Atzori L, Iera A, Morabito G 2010 The Internet of Things: a survey Computer Networks 54(2010) [5] Belissent J 2010 Getting clever about smart cities: new opportunities require new business models Forrester Research [6] International Telecommunication Union URL: 23 March 2016 [7] ehow 2012 Disadvantages of Quick Response Bar Code Available online: [8] Matt B 2011 Microsoft Tag, JagTag, and QR Codes Compared Available online: and-qr-codes-compared [9] Specification of the Bluetooth System, Covered Core Package Version: 4.0; The Bluetooth Special Interest Group: Kirkland, WA, USA, 2010 [10] IoT Analytics Official online website: [11] IoT Use Cases: Start Your Connected Journey Here Available online: [12] Sami Näres 2016 IoT as a Smart Home ImplementationAutomation of Air Humidifier Helsinki Metropolia University of Applied Sciences, Bachelor Thesis 21 April [13] Gubbi J, Buyya R, Marusic S, Palaniswami M 2013 Internet of Things (IoT): A vision, architectural elements, and future directions Future Generation Computer Systems 29(7) [14] Freescale. What the Internet of Things (IoT) Needs to Become a Reality 2016 URL: 20Content/Freescale_375/PDF/freescale-internet-of-thingsreality.pdf?redirected=1 [15] Official website for Merriam-Webster online thesaurus: [16] Official website for Phillips: [17] Official website for Gemalto: [18] Official website for Jawbone UP product: [19] Official website for Jawbone UP product: [20] Official website for Belkin We-Mo product: [21] Saparkhojayev N 2015 RFID-based Staff Control System (SCS) in Kazakhstan Journal of Physics: Conference Series 622(1) 1-6 [22] Saparkhojayev N, Nurtayev A, Baimenshina G 2014 Access Control and Management System Based on NFC-Technology by the Use of Smart Phones as Keys Middle-East Journal of Scientific Research 21(7) [23] Saparkhojayev N, Kurymbayev A 2015 Implementation of RFID - Based Computer Access System (CAS) for Kazakhstani University. In: N. Saparkhojayev, et al (eds.) Proc. of 5th International Workshop on Computer Science and Engineering: Information Processing and Control Engineering. Moscow: WCSE 2015-IPCE [24] Saparkhojayev N, Shakhov E, Mailybayev Y 2016 Mobile Attendance Checking System on Android Platform for Kazakhstani University Proc. of the 4th International Conference on Science & Engineering. Bali: SCIETECH [25] Saparkhojayev N, Kurymbayev A, Akhmetov A 2016 Implementation of RFID - based CAR IGNITION SYSTEM (CIS) in Kazakhstan. Proc. of the nd International Conference on Mechatronics and Robotics Engineering. Nice: IACSIT CM19 81 Computer Modelling and Information Technologies

82 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Barakhnin V, Kozhemyakina O, Pastushkov I The approaches to the construction of a joint ( twodimensional ) classifier of genre types and stylistic colouring of poetic texts V Barakhnin 1, 2*, O Kozhemyakina 1, I Pastushkov 1 1 Institute of Computational Technologies of SB RAS, Lavrentiev av., 6, , Novosibirsk, Russia 2 Novosibirsk State University, Pirogov str.,1, , Novosibirsk, Russia *Corresponding author s bar@ict.nsc.ru Abstract In this paper we propose the algorithm of automated definition of the genre type and semantic characteristics of poetic texts in Russian. We formulated the approaches to the construction of a joint ( two-dimensional ) classifier of genre types and stylistic colouring of poetic texts, based on the definition of interdependence of the type of genre and stylistic colouring of the text. On the basis of these approaches the principles of formation of the training samples for the algorithms for the definition of styles and genre types were analysed. The computational experiments with a corpus of texts of the Lyceum lyrics of A.S.Pushkin were implemented, which showed good results in determining the stylistic colouring of poetic texts and sufficient results in determining the genres. The proposed algorithms can be used for automation of the complex analysis of Russian poetic texts, significantly facilitating the work of the expert in determining their styles and genres by providing appropriate recommendations. Keywords: automated analysis, computational experiments, two-dimensional classifier, genre, style 1 Introduction In the tasks of automated text analysis in natural language, the problem of determination of their genre and stylistic characteristics is determined. The researcher can get this problem in a wide range of situations: from the problems of automation of the complex analysis of poetic texts, for which the type of genre and stylistic characteristics are the important attributes used in determining of the impact of lower levels on higher levels of the verse (see for example [1]), to the tracking of messages in social networks to identify the terrorist threats, the determination of marketing preferences of buyers, etc. The researches in the field of automated determination of the genre type of texts were started recently in early 2010-ies. So, in work [2] the algorithms of determination of genre types of odes, songs, epistles, elegies and epitaphs are based on the works of English poets-sentimentalists of the XVIII century. The time period in this study was not chosen by chance: in the poetry of the XVIII century the classicism with its strict genre rules dominated, and this greatly facilitated the development of algorithms. The paper [3] describes the method of text classification (for certain genres and authors) based on the analysis of statistical regularities of letter distributions, i.e. the probabilities of occurrence of letters and letter combinations, along with this a solution is found without the invasion in the sphere of literature, i.e., without the analysis of syntax, literary techniques and patterns of character interactions. However, in [4], the authors build an original counterexample to the statistical method of identification that shows the necessity of using, at least, the methods of morphological analysis. As for the automation of determination of stylistic characteristics of the texts, we don t know the researches in this area, at least for the texts in Russian. Thus, our researches on computer joint definition of the type of genre and stylistic colouring of Russian texts are of a pioneer nature. In the present work we implement to develop the approaches to the construction of a joint classifier of the types of genre and stylistic colouring of poetic texts as well as we made the comparative analysis of algorithms of determination of these characteristics. Our purpose is not the creation of new theories of genre and stylistic relationships within literary works but the development of the analyser that allows to correlate correctly the stylistic colouring of the text with its genre identity what has relevance for researches in the field of Informatics, because we are talking about the tools used not in the strictly linguistic space. 2 The choice of training samples While we built the joint ( two-dimensional ) classifier of genre types and stylistic colouring of texts, we took into account that the classifier itself is a multidimensional structure, based on the totality of parameters, which define the object of study. When we construct the multidimensional classifiers associated with such difficult (for unequivocal definition) categories like genre and style, the phased development of each analysis parameter is required in order to exclude possible errors and the variability of results. Such classifier is created for the first CM20 82 Computer Modelling and Information Technologies

83 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE time (at least for texts in Russian). This task requires the synthesis of a vast empirical material, so we decided to stay on the classification of lyrics of A.S.Pushkin of Lyceum period, as it has the most strict genre forms, stylistic unity, and adherence to the rules of grammar of that period. In turn, the usage of the Lyceum lyrics as material for the creation of training samples is justified by stylistic dimension, since the stylistic differentiation of lexemes is the development stage of the classifier. Genre types formed the basis of the classifier: along one axis we have placed the genre types in order of ascending the sublimity and along another axis - the traditional styles (see Table 1). TABLE 1 The statistics on the genre and stylistic compliance High Neutral Low Ode Parable Madrigal Epistle Idyll Elegy Romance Ballad Epigram Anecdote In general, the style of a text is determined by the most low of its lexemes and is characterized by the lexemes much more than a genre, although, in our experiment, in particular, and to the global literary categories processes and, in general, the number of genres is much more than a number of styles. This complicates the choice, as because of direct factors, and also because of given training sample of works. 3 Description of the numerical experiment For the experiment we used the above-described massive of the texts of Pushkin's lyrics of Lyceum period, comprising 121 poems, marked by an expert on genres and styles. We used the standard method of support vectors machine (support vector machine) [5] with a linear core and the RBF nonlinear core, in addition, for comparison, the results of calculations were carried out with the use of neural network based on multilayer perceptron [6]. When training the dictionary of all used words was created, except service words, and each text was coded by sequence of the symbols 0 and 1 corresponding to the dictionary in word order: 0 was set if a word is not in the text, 1 if the word is in the text. Also we used the linear regression to determine the styles, our hypothesis was that as styles can be unambiguously ranked: low 1, neutral 2, high 3, the regression can give a numeric value which will be close to the value of the style, and a divergence with the value will be a mistake. The experimental results are following (see Table 2): we calculated the average, the minimum, and the maximum of the proportion of correct predictions of the method with 100 runs, the sample is divided into 80% training and 20% test, the division into which is random every time, each run is independent from the previous ones (algorithm was implemented in the language python using the library scikit-learn). As it is difficult to rank a neutral along with the others, than in each method there is the experiment with it and without it. Barakhnin V, Kozhemyakina O, Pastushkov I As can be seen from the obtained data, the high style is not practically recognized probably because of its insufficient representation in the sample. The method of support vector machines is the best in this case. It is worth to note that in the case of non-linear core the high style was recognized, but by the common parameters, the case of linear core is better than the multilayer perceptron and logistic regression. TABLE 2 Experiment with the definition of the style Average value Max Min SVM, neutral is ignored SVM SVM, RBF core Multilayer neural network Logistic regression Linear regression, neutral is ignored Linear regression High Neutral Low SVM, neutral is ignored SVM SVM, RBF core Multilayer neural network Logistic regression Linear regression, neutral is ignored Linear regression Similarly, we carried out the experiment on definition of the genre (one series of experiments was carried out under the simplified scheme, when the historical elegy and philosophical ode was not seen as separate genres). From Тable 3 it is seen that the definition of genre has fared worse than the definition of styles as each genre is represented by a relatively small number of samples. The lexical signs are not enough for genres, we need poetic features (rhyme, size, number of accented syllables) which should strengthened, for example, with the AdaBoost algorithm [6]. TABLE 3 Experiment with the definition of the genre Average value Max Min SVM, simplified types SVM Conclusions The paper proposes the approaches to the construction of a joint ( two-dimensional ) classifier of genre types and stylistic colouring of poetic texts, based on the definition of interdependence of the type of genre and stylistic colouring of the text. On the basis of these approaches we analyse the principles of formation of the training samples for the algorithms to define styles and genre types. We implement the computational experiments with a corpus of texts of the Lyceum lyrics of A.S.Pushkin, which showed good results in determining the stylistic colouring of poetic texts and sufficient results in determining the genres. Thus, the proposed algorithms showed their efficiency and can be used for automation of the complex analysis of Russian poetic texts, significantly facilitating the work of the expert in determining their styles and genres by providing appropriate recommendations. CM20 83 Computer Modelling and Information Technologies

84 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Acknowledgments Work is executed with partial support of the Presidium of Barakhnin V, Kozhemyakina O, Pastushkov I RAS (project 2016-PRAS-0015) and of the Presidential programme Leading scientific schools of RF (grant ). References [1] Barakhnin V, Kozhemyakina O 2012 About the automation of the complex analysis of Russian poetic text CEUR Workshop Proceedings (In Russian) [2] Lestsova M 2014 The determination of the core and the periphery of the genres of odes, songs, epistles, elegies and epitaphs on the works of English poets-sentimentalists of the XIX century Bulletin of the Chelyabinsk State Pedagogical University (In Russian) [3] Orlov Yu, Osminin K 2010 The definition of the genre and the author of a literary work by statistical methods Applied Informatics 26(2) (In Russian) [4] Orlov Yu, Osminin K 2012 Methods of statistical analysis of literary texts Editorial URSS: Moscow (In Russian) [5] Cristianini N, Shawe-Taylor J 2000 An Introduction to Support Vector Machines and Other Kernel-based Learning Methods Cambridge University Press [6] Freund Y, Schapire R E 1999 A Short Introduction to Boosting Journal of Japanese Society for Artificial Intelligence 14(5) CM20 84 Computer Modelling and Information Technologies

85 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Barakhnin V, Bakiyeva A, Batura T Stemming and word forms generation in automatic text processing systems in the Kazakh language V Barakhnin 1, 2*, A Bakiyeva 2, T Batura 2, 3 1 Institute of Computational Technologies of SB RAS, Lavrentiev av., 6, , Novosibirsk, Russia 2 Novosibirsk State University, Pirogov str.,1, , Novosibirsk, Russia 3 A.P.Ershov Institute of Informatics Systems of SB RAS, Lavrentiev av., 6, , Novosibirsk, Russia *Corresponding author s bar@ict.nsc.ru Abstract This article is dedicated to algorithms of stemming and word forms generation. The proposed algorithms are based on the principles of division the words into inflectional classes. As the Kazakh language is agglutinative, linking the word forms dictionary for the automation of morphological analysis is impractical. Using affix dictionary and sets of rules is much more effective. During the research the dictionary was developed. It includes about 2,000 verbal affixes and their combinations for the 17 inflectional classes and about 3,500 affixes and their combinations (variants of endings) for nouns and adjectives. Some combinations of affixes are repeated. This volume of the dictionary is sufficient to perform text analysis of any themes. The proposed algorithm can be applied at the stage of morphological analysis in the search engines, summarization systems and question-answer systems, as well as in the construction of thesauri and ontologies. Keywords: stemming, generation, morphological analysis, affixes, inflectional classes 1 Introduction Concerning with the expansion of the information space, there is an urgent necessity for automatic processing of texts in various languages, in particular, in Kazakh language. The Kazakh language has a rich and complicated morphology. Like in other Turkic languages, any word consists of a stem, which affixes with different grammatical characteristics are attached. To the stem of a word several form-building affixes (sometimes called endings) can be attached, while each such affix fulfills a grammatical function inherent only in it, the order of affixes is strictly determined. In the process of thematic indexing of document, a set of key terms is usually used to determine if it belongs to a particular domain, which denotes a concept from the given subject area, and the terms are found in different word forms. Consequently, when choosing the characteristics of documents, it is more correct to take into account not the word forms, but the stems of words, therefore, it is necessary to create a qualitative algorithm for stemming. Thus, since the Kazakh language is agglutinative, it is more convenient to use the affix dictionary and sets of rules for both stemming and generation. A distinctive feature of the proposed algorithms for stemming and generation of word forms of the Kazakh language is the use of the principle of words splitting into inflectional classes in accordance with the ideas of work [1]. For the implementation of these algorithms for all changeable parts of speech (noun, adjective, verb) our rule sets combining affixes have been described. 2 Inflective classes of nouns, adjectives and verbs of the Kazakh language The basis for constructing algorithms for morphological analysis and synthesis is the division of all words into classes that determine the character of the change in the literal composition of word forms. These classes are conditionally called morphological. Changes in the form of words can have a different character. They can be related both to the change in the formative affixes of the word and its stems (which in the Kazakh language is extremely rare: for example, there are 18 exceptions for nouns, 352 for verbs). Morphological classes of words are divided into two types [2]: the stem-changable classes that characterize the system of word changes, and the inflectional classes of words. The inflective classes of changeable words were distinguished on the basis of an analysis of their syntactic function and systems of case, personal and generic endings. The classes of uninflected words were distinguished only by the syntactic principle. In this article, we will consider the inflective classes of the verbs of the Kazakh language in more detail, since the inflective classes of nouns and adjectives were described in [1]. Table 1 provides examples of the endings of inflectional classes for certain tense and person affixes. Following the rules of the grammar of the Kazakh language [3] for verbs, we established 17 inflective classes: 1. hard, ends to vowel (except ю); 2. soft, ends to vowel (except ю); 3. hard, ends to б, г, ғ; 4. soft, ends to б, г, ғ; 5. hard, ends to з; 6. soft, ends to з; 7. hard, ends to р, л; 8. soft, ends to р, л; 9. hard, ends to м, н, ң; 10. soft, ends to м, н, ң; 11. hard, ends to ж, д; 12. soft, ends to ж, д; CM21 85 Computer Modelling and Information Technologies

86 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE 13. hard, ends to a deaf consonant; 14. soft, ends to a deaf consonant; 15. hard, ends to a ю; 16. soft, ends to a ю; 17. hard, ends to a у. 3 Algorithms for generation of word forms and stemming A step-by-step description of the algorithm for generation of nouns is given in the article [1]. Similarly, word forms are generated for adjectives and verbs. The only difference is in the first step. The input is a noun or an adjective in the nominative case; the verb is in the form of an infinitive. 3.1 ALGORITHM FOR GENERATION OF VERBS For verbs, there are the following types of endings (in parentheses, we denote each type of endings with the capital latin letter): a. ending of negative (A); b. tense ending (B); c. pronoun ending (C); The following combinations of endings are possible: 1. tense ending (B); 2. tense ending + pronoun ending (BC); 3. ending of negative + tense ending (AB); 4. ending of negative + tense ending + pronoun ending (ABC); Once again, we note that the order of joining affixes strictly fixed and is conditioned by inflected class. 3.2 THE ALGORITHM FOR VERBS STEMMING We state the algorithm for verbs stemming (the algorithm for stemming of nouns and adjectives is described in [4]). It is based on Porter's algorithm [5]. Depending on the conditions, a decision is made whether a word stem is obtained or the affix is cut off. All the necessary rules for transformations can be divided into groups according to inflectional classes. The algorithm for obtaining the stems consists of the following steps. 1. To the input arrives any word form (verb, noun, adjective). 2. Starting with the last letter of the word, the list of affixes is searched. 3. If this affix is found, then it is cut off. Otherwise, the remaining of the word is considered as the stem. The order of the rules has the following steps: Step 1 - ending of negative + tense ending + pronoun ending + plural ending (ABC). For example: «ма + ды + ңыздар». Step ending of negative + tense ending (AB). For example: «пе + ді». References [1] Barakhnin V, Lukpanova L, Solovyov A 2014 An algorithm for constructing word forms using inflected classes for systems of morphological analysis of the Kazakh language Bulletin of NGU, Series: Information technology 12(2) (In Russian) [2] Belonogov G, Zelenkov Y 1985 Algorithm for automatic analysis of Russian word Questions of information theory and practice (In Russian) [3] Valiayeva T The grammar of the Kazakh language (In Barakhnin V, Bakiyeva A, Batura T Step 3 - ending of negative + tense ending + pronoun ending (ABC). For example: «па + ған + мын». Step 4 - tense ending + pronoun ending (BC). For example: «ген + cің». It should be noted that the proposed algorithms of stemming and generation are applicable to simple forms of verbs. More complex forms of verbs, consisting of 2-4 words, are planned to be considered in the future. Note that in scientific and technical texts complex verbs are practically not used. 4 Implementation and testing of proposed algorithms Previously, a web application for generating of word forms for nouns and adjectives was developed and described in [1]. The implementation of the above algorithms for generating of verb forms and stemming of nouns, adjectives and verbs was added to this application. The generation module and the stemming module are implemented in Python using libraries: psycopg2, collections. The dictionaries are stored in the database PostgreSQL. During the research, 14 inflectional classes were extracted for nouns and adjectives, and 17 for verbs. At the moment, a dictionary of exceptions is composed of 18 nouns, 352 verbs, in which the word forms are formed by changing the stem. The volume of the dictionaries is sufficient to perform text analysis of any themes. We tested words belonging to different parts of speech and didn t find any errors. This allows us to judge the correctness of the proposed algorithms. 5 Conclusions Algorithms of stemming and generation of verbs are described in the article. This, together with the results of [1, 4], completely solves the problem of analysis and synthesis of word forms for scientific and technical texts. 17 inflected classes of verbs were described. The created affix dictionaries include more than 5,500 affixes and their combinations (taking into account duplicate combinations for different grammatical forms). We tested words belonging to different parts of speech and didn t find any errors. This allows us to judge the correctness of the proposed algorithms. The generation module and the stemming module are implemented in Python using libraries: psycopg2, collections. The dictionaries are stored in the database PostgreSQL. Acknowledgments Work is executed with partial support of the Presidential programme «Leading scientific schools of RF» (grant ). Russian) [4] Fedotov A, Tusupov D, Sambetbayeva M, Yerimbetova A, Bakiyeva A, Idrisova I 2015 The model determine the normal form of the word for the Kazakh language Bulletin of NGU, Series: Information technology 13(1) (In Russian) [5] Porter M F 1980 An algorithm for suffix stripping Program 14(3) [6] Bakiyeva A Program generation of word forms of the Kazakh language (in Russian) CM21 86 Computer Modelling and Information Technologies

87 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Orynbayeva A Automatic summarization A Orynbayeva Faculty of Information Technology, Kazakh-British Technical University, Tole Bi Str. 59, Almaty, Kazakhstan *Corresponding author s altynai_56@mail.ru Abstract The volume of accessible data on the Web is expanding very quickly. The necessity of frameworks that able to work with those amount of information is becoming ever more desirable. Therefore, dealing with them, it can be beneficial to work with one field of natural language processing called summarization. Automatic summarization plays crucial role in compacting expansive amounts of text into effective summary. This study means to investigate some of the most relevant approaches both in the areas of single-document and multipledocument summarization, giving particular underline to some methods and extractive strategies. Keywords: natural language processing, automatic summarization, single-document, multiple-document 1 Introduction Natural language texts are the most common form of knowledge representation, which are easily perceived and interpreted by a human. However, the volumes of these texts have increased significantly and it is not easy to search, process and analyse their contents manually. As a result, nowadays, there are many technological application which focuses on the analysing and understanding human languages and can be considered by big field named Natural Language Processing (NLP). For instance, entity linking and information extraction, sentiment analysis and opinion mining and also text summarization. 2 Goals The goals of this study are to study a big area called Natural Language Processing and to provide a comprehensive overview of field within NLP named automatic summarization. Moreover, aims of this study to build webbased platform and use known tools and libraries for the reading of articles and documents, whether to compare similarity between articles and their shared keywords, to identify main problem there and to resume it. The idea is to construct the automatic summary from the information by analysis. The service will be built on Djangos framework and will be written with python and their useful library NLTK (Natural language toolkit). select a subset of existing words or sentences from the original text to form the informative summary, whereas abstraction is important and active research area due to their complexity to research. Furthermore, abstractive method construct semantic representation and generate summary which is closer to human languages. The difficulty differential between these two approaches is greatly increased when the task is handed over to computers. Even with the current state of the art in artificial intelligence, computers are still not nearly advanced enough to support the ability to reorganize, modify and merge information expressed in different sentences in the input. [4] Methods of automatic summarization also divide based on the number of sources of information: single-document or multi-document. 4 Surveying the Field of Automatic Summarization A summary must prioritize the most important themes, sentences. The well-known fundamental method determined by Luhn to identify significance of a sentence. [6] A word s significance is equal to its probability of occurring, which is defined by: significance(w) = p(w) = c(w)/n, (1) where p(w) is probability of a word, w, occurring and c(w) is number of times a word, w, occurs in the input document and N is total number of words in the input. 3 Background Summarization is the technique to reduce a text of document with lines of code based on machine learning or algorithms in order to create a summary which will retain crucial points of the original information. Although research on summarization started approximately 55 years ago, there is still a long trip to research in this field. Over time, attention has drifted from summarizing scientific articles, news, mail messages, blogs and medical sources. These systems are designed to take information or url of interested website as input and to produce a concise summary of the most related points as output. There are two methods to automatic summarization: extractive and abstractive ways. Extractive approaches CM22 87 Computer Modelling and Information Technologies

88 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE It was one of the approaches to summary extraction. Summary extraction can be frequency based approach, feature based approach and machine learning based approach. Two techniques that use frequency based approach are word probability and term frequency-inverse document frequency. One of the other way to determine the importance of a sentence is based on feature approach which reflects the relevance of that sentence that can be shown from sentence position, presence of title word and keywords. In later works from journal od Computer Science, there was used Particle Swarm Optimisation (PSO) algorithm, genetic algorithm, differential evolution algorithm and fuzzy logic in order to enhance finding important sentence by combining term frequency weight with position and node weight [9]. Machine Learning (ML) approach need to have a set of training document (dataset) and their corresponding summary extracts. There are some well-known methods such as Naive Bayes Classifier and Markov Hidden Model, also Neural Network. In using Naive Bayes method, there are given a sentences where the probability being chosen to be included in the summary is: P(s SS FF 1, FF 2,, FF nn ) = nn P FF ii=1 ii ss SS PP(ss SS) nn ii=1 PP(FF ii ) where F1, F2,, Fn are the sentence features (assuming the features are independent of each other) for the classification and S is the summary to be generated. Each sentence is then scored according to Equation 2 and ranked for summary selection [7]. Neural network have the advantages to learn summary sentence attributes. The network learn best features and patterns from training to determine the most important information. 5 Simple experiment In order to better understand how work with NLTK library which is the leading platform for building Python programs to work with human language data [8] and their features, there was done a simple script to summarise the article from Tengrinews ( environment/huge-glacier-retreat-triggered-in-1940s /) which is kazakh news portal by url getting using Orynbayeva A BeautifulSoap based on frequency approach to generate summary. As a result, there have been summarised article from Tengrinews into several sentences which more relevant to the summary identifying important sentences. The text was as following: "This glacier used to be pinned to a ridge and once it moved away from that ridge, it started to retreat rapidly; and without other pinning points it could continue to retreat rapidly inland, contributing significantly to global sea level," Dr James Smith from the British Antarctic Survey said. Currently, the PIG is dumping about 130 billion tonnes of ice in the ocean every year. Submersible surveys under its floating front - its "ice shelf" - had revealed the contact point with the seabed once draped over a large ridge. 6 Conclusions In this paper, the research focuses on summary evaluation and the implementation of tools for NLP tasks and especially for automatic summarization. The fundamental concepts and methods related to automatic text summarization have been discussed. Moreover, there was a simple experiment to better understanding working od special python library in order to summarise article from tengrinews with extractive way. It seems that future trend in automatic summarization is not only to focus on the summary information content, however, efforts should also be put into the readability approach of the generated summary and similarity to human language understanding. References [1] Jurafsky D, Martin J H 2009 Speech and Language Processing: An Introduction to Natural Language Processing, Speech Recognition, and Computational Linguistics 2nd edition. Prentice-Hall [2] Manning C D, Schütze H 1999 Foundations of Statistical Natural Language Processing MIT Press [3] Marcu D 2000 The Theory and Practice of Discourse Parsing and Summarization ISBN [4] Nenkova A, McKeown K 2011 Automatic summarization Foundations and Trends in Information Retrieval [5] Luhn H P 1958 The automatic creation of literature abstracts IBM J. Res. Dev. 2(2) Available: [6] Edmundson H P 1969 New methods in automatic extracting J. ACM 16: DOI: / [7] [8] Journal of Computer Science Science publications Available: CM22 88 Computer Modelling and Information Technologies

89 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Naukhan D Decision making system for gas mining company D Naukhan * Faculty of Information Technology, Kazakh-British Technical University, Tole Bi Str. 59, Almaty, Kazakhstan *Corresponding author s dnaukhan@gmail.com Abstract An approach is considered to develop a system that supports the decision-making of day-to-day management tasks for decision makers in order to reduce the energy costs of the hydrocarbon production process at the oil and gas producing enterprise and improve the environmental safety of this process. The architecture and principles of building such a system are discussed. Keywords: decision support system, expert system, analytical module, prediction module, hydrogen sulphide 1 Introduction Gas mining industry is known as a heavy industry in the economy that plays a vital role on an energy market. Gas mining is also an area, where large amount of data is produced and it requires utilization in further analysis. Currently, gas wells are well equipped with monitoring, control and regulation systems associated with machines, devices and vehicles. Application of knowledge in the subject area and the results of data analysis can improve the performance of operators and supervisor significantly. But, as a rule, these automated process control systems are installed on local facilities and serve only the main production process, namely, the extraction of hydrocarbon raw materials, while not affecting the transport services and carrying out planned and emergency repairs. In this regard, such systems can not provide the decision maker (the person making the decision) with the necessary information about all the processes affecting the efficiency and environmental safety of the enterprise.[1] Monitoring companies strive to gain a competitive advantage in equipping their systems with the means of development, modeling and analysis of data. This is a strong motivation for considering the DSS presented in this article. 2 Goals The main goal of this study is to show on the example of gas mining company Karachaganak Petroleum Operating b.v. where decision making system is needed. There is a wellfounded need to implement a Decision Support System (DSS) [2] that integrates various aspects of the operation of a gas well in order to maintain production continuity. In Karachaganak [3], DSS is required for: 1. Management decisions; 2. Monitoring of natural hazards; 3. Prediction of the concentration of hydrogen sulphide. The decision support system will integrate data from various monitoring systems and contains an expert system module that can use the knowledge of an expert in the field and an analytical module that can be used to diagnose processes and devices and forecast natural disasters. 3 Tasks of management decision support systems Decision-making is everyday activity of a person, part of his daily life. In most cases, it consists in generating possible alternatives to solutions, evaluating them, and choosing the best alternative. The contradictory nature of the requirements, the ambiguity of the assessment of situations, the mistakes in the choice of priorities greatly complicate decision-making. Uncertainties are an integral part of decision-making processes. To reduce the problem, characterized by uncertainties for exactly the goals cannot be in principle. For this, it is necessary to "remove" uncertainties. One of such methods of withdrawal is the subjective evaluation of a specialist (expert system), which determines his preferences [4]. Computer support for the decision-making process is based on formalization: methods for obtaining objective (measurable) and subjective (given by the manager or expert) initial and intermediate assessments; algorithmization of the decision-making process itself; situation analysis; developing a solution. It consists in assisting the leader in the decision-making process and includes: 1. Assistance to the leader in the analysis of the objective component, i.e. in understanding and assessing the current situation and the constraints imposed by the emerging situation; 2. Revealing the manager's preferences, i.e. in the identification and ranking of priorities, taking into account the uncertainty in the manager's assessments and the formation of his preferences; 3. Generation of possible solutions, i.e. forming a list of alternatives; 4. Assessment of possible alternatives, based on the manager's preferences and constraints imposed by the external environment; 5. Analysis of the consequences (forecast) of the results of decisions; 6. Support for negotiations in the adoption of an agreed group decision; 7. Choosing the best, from the point of view of the manager, option [5]. CM23 89 Computer Modelling and Information Technologies

90 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE 4 System architecture Naukhan D forecast quality. If the quality of the forecasts satisfies the conditions set by the user, the forecasts will be considered as values provided by the soft sensor. They can be the following, for example, an expert system, but they can also be representatives of the monitoring system dispatcher [6]. Module of the expert system for on-line and off-line diagnostics of machines and other technical equipment. It is also directed to monitoring processes and support in accordance with the technical conditions, as well as improper execution of the process. Qualification decisions based on the use of classical inference, based on strict rules and facts or probabilistic reasoning, based on trust networks. The system also contains a knowledge base editor that allows the user to define such rules and network. 5 Hydrogen sulfide concentration prediction FIGURE 1 Architecture of the decision support system The analytical module is designed for data analysis (offline) and for the report on identified significant dependencies and trends. The results generated by this module are stored in the repository only when the user accepts them. Thus, this module supports decisions about what is interesting from the point of view of monitoring and forecasting. It also provides additional information that can be used to enrich the knowledge of the expert system or that can be used for comparative analysis. The module supports identification of changes and trends in controlled processes and tools, and allows you to compare the work of the operator and the dispatcher. The prediction module is designed to perform incremental (online) training in forecast models or applications of classification and forecast models that create an analytical modular system for measuring time and horizontal indicators, the measured selected sensors. This module also tracks the trends of incoming measurements. The created predictive models are adapted to the analytical process based on the incoming data stream and models derived from historical data (in the analytical module). The module provides interfaces that allow you to select quality standards and their thresholds that provide a minimum The content of hydrocarbons and hydrogen sulphide is influenced by many factors: [7] atmospheric pressure; wind direction; temperature; traffic congestion 6 Conclusions An approach to the development of a decision support system for daily management tasks for decision-makers at an oil and gas producing enterprise is proposed. The developed system provides solutions to support decisionmaking by the dispatcher and process operator. This system is complete, as it provides tools that can be applied to the storage, processing and preparation of data, as well as the identification of models based on expert knowledge (expert system) and models based on the results of both historical and online data analysis. Computer support for decisionmaking enables the leader to easily process large amounts of information in real time, allowing him along with objective assessments and accurate mathematical methods, to use his subjective, inherent methods of analysis, generation and evaluation of possible solutions, using all the power Software to implement their management style. References [1] Sikora M, Sikora B 2012 Rough natural hazards monitoring Rough Sets: Selected Methods and Applications in Management and Engineering. Springer, pp Available: [2] Трахтенгерц Э А 1998 Компьютерная поддержка принятия решений М. СИНТЕГ [3] [4] Turban E 1990 Decision support and expert systems Maxwell Macmillan. New York p. 50 [5] Беляков А Г, Мандель А С 2002 Анализ достоверности выводов, формируемых с помощью экспертно-статистических систем М. ИПУ [6] Bifet A, Holmes G, Kirkby R, Pfahringer B 2010 Moa: Massive online analysis The Journal of Machine Learning Research [7] Petroleum Extension Service (Petex), Hydrogen Sulfide in Production Operations (Oil and Gas Production), 2nd Edition, pp , 2012 CM23 90 Computer Modelling and Information Technologies

91 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE Pak V V Artificial intelligence algorithms in psych profile classification and prediction V V Pak Kazakh-British Technical University, Tole bi Str. 59, Almaty, Kazakhstan Author s vvpak14@gmail.com Abstract The definition of a psychological portrait of a person is one of the most difficult and important issues, the solution of which will improve the success of personnel management. There is a dependence of the psychological portrait and the success of a person in life. The presence of certain qualities affect the relationship with other people and the attitude to the world as a whole. There are many components of the psychological portrait such as temperament, character, intellect, etc. However, these components limit the number of possible types of personality. The purpose of this work is to use the algorithms of artificial neural network for classifying people and predicting certain aspects of human life. Keywords: keywords: psychological portrait of a person, ART1, artificial neural networks 1 Introduction There are many personality testing systems based on standard psychological components. These tests only show which group a person belongs to. For example, extraversion introversion test. This knowledge is not so useful in predicting for example salary. Because there is no direct dependence between extraversion introversion and salary. In this work, there are several objectives. 1. Use artificial intelligence algorithm for classification persons into groups. 2. Use artificial intelligence algorithm for predicting certain values such as salary of person. 3. Develop system for collecting and analyzing data 2 Solution This approach is based on questions. Person answers for questions. Each person s profile can consist any additional information. It can be salary, age, working place etc. This additional information is needed for predicting. All answers of different person is storing and analyzing using algorithms that described below. 2.1 ART1 For solving first problem ART1 [1] algorithm was chosen. This algorithm fits well, since we do not know the number and attributes of classes for which we need to divide profiles. Every person s profile is future vector (P i). ART1 algorithm help to divide group off people to several groups by similarity. 2.2 FEEDFORWARD NEURAL NETWORK In order to achieve second objective artificial intelligence with supervised learning can be used. Artificial neural network [2] is one approach. The input will be user s profile vectors and the output of additional References [1] Jones M T 2006 Artificial Intelligence Application Programming Dreamtech Press user data, for example salary. After learning we can predict additional values by profile vectors. 3 Experimental data To get experimental data testing system was developed. The system consists of mobile application and server. Users answer on question using application and server collects, stores and analyzes data. Backend is written on.net Core framework using C# 6. Mobile application is written for ios platform using Swift language. 4 Result The results of training the neural network are presented in the table 1. TABLE 1 Neural Network Correct classification rate Layers Network (CCR) count structure Learning Training , , , ,4657 The set of data has no enough entries to get better results. This problem will be solved in future by getting more information. 5 Conclusion In this work, algorithms of artificial intelligence were used to classify and analyze a person's psychological portrait. This approach has several problems to solve. The main problem is drafting questions that is not tightly connected with each other. The second is to get enough amount of data to increase accuracy of algorithms. These problems will be solved in the future work. [2] Mitchell T M 1997 Machine learning Burr Ridge, IL: McGraw Hill 45(37) CM24 91 Computer Modelling and Information Technologies

92 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE Nazirova A, Kairat A Methods for evaluation of renewable energy resources in the territory A Nazirova 1, A Kairat 2* 1 Almaty University of Power Engineering and Telecommunication, Baitursinova av. 126, Almaty city, , Kazakstan 2 Kazakh-British Technical University, Tole bi Str. 59, Almaty city, Kazakhstan *Corresponding author s aidanakairat@gmail.com Abstract The use of renewable energy sources allows, in comparison with traditional methods, to improve the ecological condition of the territory. As a rule, the receipt of energy from renewable sources is determined by the territorial distribution (solar stations, wind generators, bioenergy stations occupy a certain area necessary for energy production), dependence on weather, geographic and other factors. For Kazakhstan, the territory of which is very rich in solar energy and wind energy, the problem arises of determining the optimum zones for the location of generators. However, for the identification of these areas, purely engineering considerations are not enough, because the placement of such structures are affected by many factors of different nature, which is necessary to evaluate and consolidate in the form of some generalized assessment. The sequence of assessing the applicability of RES in a given territory is carried out in several stages described in the article. Keywords: RES, methodology, optimum zone, location of generators 1 Introduction In recent years, worldwide there has been a tendency to increase the use of non-traditional energy sources, with the aim of generating electricity and heat energy. The use of renewable energy sources (RES) is an environmentally safe and affordable source of energy. To date, Kazakhstan has huge reserves of RES and great potential for their application. Reserves of coal, gas, oil, uranium, livestock waste and many other things will in the future fully produce energy in the thermal and electrical. Favorable climatic conditions of the republic create prerequisites for the development of renewable energy sources. The development of RES for Kazakhstan will not only be attractive economically, but will also significantly reduce the negative impact on the environment. According to the Statistics Committee of the Ministry of National Economy of the Republic of Kazakhstan for 2015, the volume of emissions of pollutants into the atmosphere was about 2 million tons, with the largest volume of emissions coming from power, gas, steam and air conditioning (37%) and manufacturing industries (30%) [1]. Therefore, application of renewable energy sources for the republic is an urgent task that will help solve strategic tasks for the creation of environmentally balanced and sustainable development. 2 Methodologies for estimating renewable energy resources in perspective areas This article proposes a methodologies for estimating renewable energy resources in perspective areas, which consists of several stages: Determination of natural characteristics for the corresponding type of energy. The main potential for using renewable energy in the Republic of Kazakhstan is related to hydropower, bioenergy, wind, geothermal and solar energy [2, 3]. For solar energy, the natural characteristic will be the incident solar radiation on a horizontal surface, for wind energy - the speed and frequency of the wind [4]. A full assessment of the level of environmental sustainability of renewable energy sources for wide application, which implies the development of electrical installations (EI), which operate on their basis [5]. Here it is necessary to determine the types of EC based on their technical characteristics, and it is advisable to reflect the calculations using the gross and technical potential of RES. Determination of a number of factors affecting (inhibitor) or inhibiting (catalyst) the installation of renewable energy sources. The following groups of factors are proposed to be singled out (Figure 1). FIGURE 1 Groups of factors affecting the installation of RES 3 Example of using methodologies The sets of factors that limit or, on the contrary, promote the use of renewable energy depend significantly on the energy source used, the class and type of the generator, the physicogeographical and socio-economic characteristics of the territory, the country, and so on. For example, in work [7] the potential of one of the regions of Spain (province of Jaen) on the use of RES (bioenergy, wind energy and energy of solar radiation) is considered. The region has about 669 thousand inhabitants and is located on an area of 13,500 sq. Km. Km. The territory has a mountain system and a valley in the riverbed of the Upper Guadalquivir river. The region's main production is olive oil, which is (at the time of writing) CM25 92 Computer Modelling and Information Technologies

93 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE 20% of the world's and 50% of production in Spain. At the same time, the region produces less energy than it consumes. Wastes from the production of olive oil constitute the main source of bioenergy. To estimate the biomass potential, geographical conditions of the region are taken into account, for example, areas with steep slopes (more than 20 degrees) are excluded from consideration. Also excluded from consideration are areas that are further than 50 km from the places where biomass is burned. 7 Conclusions In the case of regional assessments, it is necessary to take into account the availability of engineering and geological features, the size of the occupied territory, the availability of Nazirova A, Kairat A protected areas, the impact of the installation of power stations on nearby territories, objects of historical and cultural heritage, etc. As for technical factors, the presence of a noise effect near wind turbines and the thermal effect on the environment plays an important role [8]. Thus, the conducted methodology for estimating renewable energy resources will allow us to identify promising areas that will be optimal for the placement of renewable energy sources. Acknowledgments The work was funded by grant No. 0168/GF4 of the Ministry of Education and Science of the Republic of Kazakhstan. References [1] Committee on Statistics of the Ministry of National Economy of the Republic of Kazakhstan. [2] Fortov V Е, Popel О S 2014 State of development of renewable energy sources in the world and in Russia Teploenergetika DOI: / S [3] Pachurin G V, Maslayeva O V, Sosnina E N 2012 Ecological aspects of bioenergetics Germany, LAP LAMBERT Academic Publishing [4] Rafikova Yu Yu 2015 Geoinformation mapping of resources of renewable energy sources (on the example of the south of Russia) [5] Sosnina E N, Maslayeva O V, Kryukov E V 2015 Comparative Ecological Assessment of Unconventional Power Plants Teploenergetika DOI: / S X [6] Sosnina E N, Maslayeva O V, Pachurin G V, Keckin A Yu, Golovkin N N 2014 Ecological problems of renewable energy sources: monograph N. Novgorod: Nizhny Novgorod. Gos. Techn. Un-t them. R.E. Alekseeva [7] Ruiz-Arias J A, et al Assessment of the renewable energies potential for intensive energy production in the province of Jaén, southern Spain Renewable and Sustainable Energy Reviews 16(5) [8] Ryzhenkov M A, Ermolenko B V, Ermolenko G V 2011 Ecological aspects of wind energy Heat power engineering CM25 93 Computer Modelling and Information Technologies

94 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE Sabyrkulova A Development of text classification system A Sabyrkulova * Faculty of Information Technology, Kazakh-British Technical University, Tole bi Str.59, Almaty, Kazakhstan *Corresponding author s sabyraliya@gmail.com Abstract In this article we will consider the approaches applied to classification of texts in a natural language processing by their topics. The problem of automatic classification of texts is considered by sentiment analysis, there are described methods of machine learning for the solution of this problem. The description of an algorithm of classification of the naive Bayesian classifier is provided. Utilization of classifiers, allows to limit search of necessary information to rather small subset of documents. Keywords: bag of words, machine learning, Bayesian classifier 1 Introduction The Internet is full of information and every day we deal with constantly increasing volume of the processed and accumulated information that does a problem of text classification more and more urgent. For example, such necessity at automatic processing of a news stream and distribution of news texts by catalogs, Classification and Spam Filtering, recognition of emotional coloring of texts in documents. In all cases, the main idea is to assign the suitable category or label to each document that needs to be classified. 4 Classification Algorithm. Naive Bayes classifier Nowadays we have different well-known often used machine learning algorithms for text classification such as decision trees, support - vector machines, naïve Bayes classifier, nearest neighbor algorithms. 2 Goals The main purpose of this work is creation of an automatic texts classification system. The idea is to build web-based platform by using well-known NLP tools and libraries for the reading and processing widely distributed and dynamic data for classification into different categories.for the construction of a system it is necessary to know the Naive Bayesian Classifier, sentiment analysis, moreover system will build on high-level web framework Django, and written in python language with different useful library such as OpenNLP, NLTK. 3 Feature Representation Document representation and feature selection,it's a one of the most fundamental tasks which needs to be realized, preceding any classification problem.to understand better we use bag-of-words (bag-of-features or bag-of-keypoints) [1] word-based document representation method, where we ignore the structure and sequence of words in the document. It is regularly used in methods of text classification where the frequency of each word is used as a feature for training a classifier. The feature vectors describe the words noticed in the documents. By this representation a document is considered to be simply a group of words which occur in it at least once. With this technique, it is possible to have thousands of words occurring in a small set of texts. FIGURE 1 Classification by category The naive Bayesian classifier [4] (NBC) is one of examples of use of methods of the vector analysis. This model of classification is based on a concept of conditional probability of the document d to a class c. NBC one of the most often used classifiers, because of comparative simplicity in implementation and testing. Basic formula of the naive Bayesian classifier (1): PP(AA\BB) = PP(BB\AA_PP(AA). (1) PP(BB) For this model, the document is a vector: d = { w1, w, wn }, where wi - weight of i-th term, and n size of the dictionary of selection. Thus, according to Bayes's theorem, probability of a c class for the document d will be (2): PP(cc\dd) = PP(dd\cc)PP(cc). (2) PP(dd) Thus, for finding of the most probable class for the document d = { w1, w, wn }by using naive Bayesian classifier, it is necessary to count conditional probabilities of accessory of the document d to each of the provided CM26 94 Computer Modelling and Information Technologies

95 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE classes separately and to choose the class having the maximum probability: cc NNNN = aaaaaaaaaaaa cc [PP cc jj ii PP ωω ii \cc jj ]. (3) Sabyrkulova A PP ωω ii \cc jj = nn iiii+1 nn jj +kk jj, (4) where nj is the total number of words in class cj, nij is the number of occurrences of word wi in class cj and kj is the vocabulary size of class cj. This is the result of the Bayesian estimation with a uniform prior assumption [3] Bayesian method has the high speed of work and simplicity of mathematical models.this method is often used as a basic method when comparing various methods of machine learning. 5 Example There is a small problem connected to this formula. If a word never appears in the given training data, its relative frequency estimate will be zero.for the solution of this problem we applied the Laplace law of succession [2] to estimate P(wi c j). The estimate of the probability P(wi cj) is given as: In order to better understand how naive Bayesian classifier works, let s assume that we are faced with a spam problem,and we need to create simple Spam filter which will attempt to classify incoming messages in two different categories as 'spam', 'ham' (good, non-spam ) or unsure'. To solve this problem we will manually create data set with « s», and determine bag of words which usually come in spam such as "sale", "buy now", "lowest prices", "click here» and etc. By counting probability of how many times spam words appears in , system will identify, is it spam or ham. The program is written in Python with using NLTK libraries. In result, we retrieve information about in the table: 6 Conclusion Nowadays the classification problem is one of the most fundamental problems in the machine learning and data mining. The amount of data that needs to be processed is very large, consequently, text analysis techniques must be designed effectively to manage large numbers of elements with varying frequencies. In this research paper we mentioned work with classification algorithms, moreover have got acquainted with the principle of Bayesian classifier work and reviewed an example of simple spam filter where we categorized s in two groups (spam and not spam). References [1] Barakhnin V, Lukpanova L, Solovyov A 2014 An algorithm for constructing word forms using inflected classes for systems of morphological analysis of the Kazakh language Bulletin of NGU, Series: Information technology 12(2) (in Russian) [2] Belonogov G, Zelenkov Y 1985 Algorithm for automatic analysis of Russian word Questions of information theory and practice (in Russian) [3] Valiayeva T The grammar of the Kazakh language (in Russian) [4] Fedotov A, Tusupov D, Sambetbayeva M, Yerimbetova A, Bakiyeva A, Idrisova I 2015 The model determine the normal form of the word for the Kazakh language Bulletin of NGU, Series: Information technology 13(1) (in Russian) [5] Porter M F 1980 An algorithm for suffix stripping Program 14(3) [6] Bakiyeva A Program generation of word forms of the Kazakh language (in Russian) CM26 95 Computer Modelling and Information Technologies

96 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE Shakhmetova A, Yakunin K Methods of aggregation different data for estimating and evaluating potential of renewable energy A Shakhmetova, K Yakunin Faculty of Information Technology, Kazakh-British Technical University, Tole Bi Str. 59, Almaty, Kazakhstan *Corresponding author s asima-1995@mail.ru Abstract It is important to be able to evaluate the territory, in order to establish some kind of generator. There are many factors influencing on installation, therefore article below illustrates different ways of evaluating and finding optimal place. Each system of assessment has own advantages and disadvantages, all of them will be discussed and represented in examples. Finally, the most efficient system will be chosen for future usage in project. Keywords: Bayes system of inference, apriori probability, aposteriori probability, conditional probability 1 Introduction The usage of renewable energy source allows improving ecological condition of territory and improving the stability of energy supply. The main problem of establishing the generator is to find optimal location, which ensures the maximum amount of energy received at minimum cost as well as the economical feasibility, which includes analysis of infrastructure, local economic level and proximity of potential energy consumers. Engineering considerations are not enough to determine the optimal place, because wild range of factors affect placement of such structures. Therefore, data will be aggregated to obtain an integrated assessment. It is proposed to use Bayesian inference system or Multiplicative Multifactor Model, which is able to get the evaluation without accurate, detailed data (lack of details). Bayesian system gives two answers simultaneously, namely for and against with different probabilities. Also, the ratio between results is considered to be degree of certainty of the algorithm higher ratio means more certainty and generally means more detailed (and less ambiguous) data was available. 2 Multiplicative multifactor model For aggregation of data could be used method based on summation of factors or a multiplicative method. The multiplicative multifactorial model is represented by the formula: N F = f i i=1 This model aggregates all the data as a product of the values of factors. If the specific factor does not affect on assessment, its value is set to 1, if it has a significant negative impact, to 0. There is a problem of reliability of results when multiplicative multifactor model is used. The reason of that is that some data could be unreliable and not accurate. 3 The Bayes system of inference The multiplicative evaluation system is not accurate, in a way it could not provide the opportunity to assess the quality of obtained data, especially in case of lack of data or incomplete confidence in their reliability. In this case, the following stochastic rule is used: "If h is true, then e will be observed with some probability p". For instance, h could be considered as an event, which indicates the installation of a generator, and e is an event which determines an evidence of correctness of decision. In other words, h is denoted as an event, which means that hypothesis is correct, when e is an event which could confirm the correctness of hypothesis. The possibility of h, in case of e occurs could be expressed by the following formula: p(h e) = p(e h) p(h) p(e h) р(h) + p(e h) p( h) p(e h) - conditional probability of the occurrence of the event e, when h is valid CM27 96 Computer Modelling and Information Technologies

97 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE p(h) prior probability of the hypothesis h p(e h) - conditional probability of e, when h is not valid p( h) probability, that the event h is not true, according to the formula of total probability, it can be calculated by the formula: p( h) = 1 p(h) In this way, in order to calculate the conditional probability p (h e), it is nessecery to know the probabilities p(e h) and p(e h), also apriori probability p(h). It is possible to consider several events {h1, h2,..., hn} H. 4 The algorithm consists of following steps: For each hypothesis h H and all evidences e E, it is necessary to determine a priori probabilities p (h) and conditional probabilities p (e h) and p (e h), followed by calculation of possibilities p (h e) and p (h e) for each hypothesis h and evidences e. For each subsequent evidence, the prior probability of the hypothesis p (h) is set equal to the conditional probability p (h e) found at the previous step. As a result, two estimates p (h e) and p (h ~e) will be obtained for each hypothesis, which can be compared with each other and chosen those p (h e) and p (h ~e), which will have the significant difference between maximum and minimum values. For example, there is plan to install a large wind generator in certain place. However, a large number of factors have influence on the decision, such as roads, railway stations, favorable engineering-geological conditions of the area, arable land, hayfields, rural or urban areas, forests, pastures and pastures, sands, gardens etc. Each of the factor has the conditional probability value 0<=P<=1. The bigger value is, the more suitable the area is for establishing a generator. You can find two examples of calculations using the model below. The values of p(h1) and p(h2) start of at 0.1. TABLE 1 Example of calculation using the model p(h1) p(h2) p(e h1) p(e h2) p(~e h1) p(~e h2) Shakhmetova A, Yakunin K The tables above illustrate several properties of the model. Value of 0.5 is considered to be neutral value and doesn t affect p(h1) or p(h2). It might be counter-intuitive from probability theory point of view, however it allows to estimate positive and negative effect of different factors in a simple and intuitive way. TABLE 2 Example of calculation using the model p(h1) p(h2) p(e h1) p(e h2) p(~e h1) p(~e h2) The value of 0 works as a hard boundary if one of the factors with p(e h1) = 0 is present, establishing of generator is completely impossible and other factors cannot change it. 4 Conclusion Methods of aggregation different data for estimating and evaluating potential of renewable energy were researched, a number of factors were analyzed and systemized and two models of evaluation of feasibility of installing a generator were considered: namely, multiplicative/additive models and Bayesian system of inference. From the initial research it became clear, that multiplicative MMM has a serious flaw it is almost impossible to tune to work with heterogeneous and unreliable data. On the other hand, Bayesian inference can deal with this problem due to its stochastic nature, which in addition represents the probabilistic nature of the object of the research. From initial research, it can be deduced that Bayesian inference can be used to estimate feasibility of establishing generators. Acknowledgments The work was funded by grant No. 0168/GF4 of the Ministry of Education and Science of the Republic of Kazakhstan. References [1] Muhamedyev R I, Mustakaev R, etc Aggregation of dissimilar data in the decision support system for the use of renewable energy sources Materials of the International Scientific Conference "Informatics and Applied Mathematics" Almaty [2] Bernardo J M, Smith A F M 1994 Bayesian Theory Wiley [3] Lee P M 2012 Bayesian Statistics: An Introduction Fourth Edition John Wiley [4] Samaniego F J 2010 A Comparison of the Bayesian and Frequentist Approaches to Estimation Springer, New York [5] Bayesian Networks and BayesiaLab A practical introduction for researchers by Stefan Conrady and Lionel Jouffe CM27 97 Computer Modelling and Information Technologies

98 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Mustakayev R, Batkayev S Overview of the stack technology for visualization and storing data in developing of Geo-Information system Abstract Renat Mustakayev 1, Shafkhat Batkayev 2* 1 Doctoral of Kazakh National University, IT-developer, Almaty, Kazakhstan 2 Fourth-year student of Kazakh-British technical university, IT-developer, Alamty, Kazakhstan *Corresponding author s shafhat.batkaev@gmail.com For creating and developing of Geo-Information system, required to use certain steps, which help. In case, which will be considered, Geo- Information system is a software product, allowing users to search, analyze and edit both the digital map of the terrain, and additional information about objects. The reason for creating this type of system, can be the fact, that there is no such system in Kazakhstan, as well as the huge potential of renewable energy sources in Kazakhstan. Stack of technology, which will be described, is more than comfortable for visualization and storing this type of data. Keywords: Renewable Energy Sources, Database, Geo-Information system, Visualization 1 Introduction Using of renewable energy sources (RES) allows, in comparison with traditional methods, to improve the ecological condition of the territory, improve the stability of energy supply and, if necessary, provide greater autonomy. The topic of RES is quite relevant in our time, especially in Kazakhstan. The most modern and comfortable method for analysis renewable energy sources, and benefit-sharing is creating Geo-Information system. In considered case, for developing Geographic information system, used steps: Collecting of data (information, maps) about regions of Kazakhstan Import this data in format we need Processing data Visualization and storage data 2 Stack of technologies for visualization and storage Descry more carefully the fourth step: visualization and storage data. Under this article, it is recommended to use stack of technologies, which will be discussed in this part of article. Stack looks like that: 1. PostgreSQL + PostGis extension 2. Geoserver (as a part of our backend) 3. OpenLayers (JS library) 4. Bootstrap, JavaScript, JQuery In comparison with the stack considered in another article [1], stack in our article has several advantages, which will be discussed carefully. 3 PostgreSQL + PostGis extension PostgreSQL is a powerful, open source object-relational database system. The main advantage of this database, the opportunity to solve many problems in store huge data and voluminous work, and it will be free. Also very strong argument in favor of PostgreSQl is PostGis extension. PostGIS is a spatial database extender for PostgreSQL object-relational database. It adds support for geographic objects allowing location queries to be run in SQL. It s very important. It s impossible to miss the fact about wide using PostgreSQL. It means, search of information about all solutions is very fast. It s huge vantage for process of developing. PostGis extension keeps maps and their data in tables. For example, PostGis gives an opportunity to import shape file, which keeps data about all buildings around Almaty region. All information, about these buildings (like location coordinate, names etc) PostGis keeps in tabular data. 4 GeoServer Go ahead. After upload maps files with needing data in PostGis, connect it with our next technology in our stack. It s GeoServer. GeoServer is Java-based soft server, with open source software for managing geographic information systems (GIS) data sources and access to such data using Web services, Web Feature Service (WFS) and Web Map Service (WMS). It allows to view, edit and work with geographical data. Take from PostGis, 3 layers, for example shapefiles. Layers have information about buildings, reserves, reservoirs. GeoServer allows publish all these layers with OpenLayers tools, edit, add styles etc. After that, take all information about our 3 layers, process it by Java and do the analysis by Bayesian method. There is no need to describe it carefully, because, this is considered in another part of article. 5 OpenLayers (JS library) Take our aggregated information, after processing, and get CM28 98 Computer Modelling and Information Technologies

99 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 to frontend. Developing of good frontend in projects like this is not simple task. For creating and working with maps based on a programming interface (API), like the GoogleMap API or the Bing Maps API, use OpenLayers JS library. OpenLayers is an open source library written in JavaScript, it allows quickly and easily create a web-based interface for displaying cartographic materials presented in various formats and located on different servers. In OpenLayers, the developer has the ability to create, for example, his own map, including layers provided by WMS (and WFS) servers, such as Mapserver, ArcIMS or Geoserver, and Google map service data. OpenLayers is the most usable and popular library for working with maps at the Web level. Take aggregated information, and by dint of OpenLayers, create maps, with so-called substrates (administrative and satellite etc), and layers from GeoServer with information about objects, and how comfortable and profitable to build a power, wind or solar station. Of course, it s necessary to co-operate OpenLayers library with such well-known tools for web development like Bootstrap and JQuery. 7 Conclusions Mustakayev R, Batkayev S In the paper approaches in the implementation of systems for estimating the potential of renewable energy have been considered. It is shown that when developing such systems, databases of both national (including EC level) and local are widely used. The described systems are unique developments applied for a specific territory and country. In order to support decision-making processes in the field of RES, the concept of a multi-layer intellectual geoinformation decision support system. In particular in the details described the visualization and proper storage of data with convenient tools. Acknowledgments The work was funded by grant No. 0168/GF4 of the Ministry of Education and Science of the Republic of Kazakhstan. References [1] Muhamedyev R, Ishmanov A, Andreev A, Muhamedijeva J, Alikhodzhayev I 2015 Technological preconditions of monitoring of renewable energy sources of the Republic of Kazakhstan Proceedings of the 2015 Twelve International Conference on Electronics Computer and Computation (ICECCO), IEEE 2015, ISBN: CM28 99 Computer Modelling and Information Technologies

100 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Shmurygin M Autonomous Agent-Based system for navigation and obstacle avoidance using machine learning M Shmurygin * Kazakh-British Technical University, Tole Bi 59, Almaty, Kazakhstan *Corresponding author s shmurygin.mikhail@gmail.com Abstract The goal of the project is the development of autonomous robotic platform that can navigate and explore unknown environment by itself. This paper describes the usage of Reinforcement Learning algorithms like Queue Learning (Q-learning) and its modifications and optimizations on the real physical model. The algorithm for finding the optimal strategy is implemented in the C++ code using the "Q- Learning" method. Training with reinforcement is a method of machine learning, in which a model is trained with no information about the system, but has the ability to perform any actions in it. Actions translate the system into a new state and the model receives some reward from the system. Keywords: Reinforcement Learning, Microcontroller, Robot, Q-Learning, Navigation 1 Introduction The Q-Learning algorithm was proposed by Watkins in It is a part of learning algorithms that uses reinforcement. The usage of this algorithm can be applied to the system where agent should find an optimal strategy for interaction. For the training process rewards that have numerical values are used. The effective training and navigation of the platform depends on the construction of the state-action pair estimation function. 2 Navigation planning The goal of the work is to teach robotic platform to learn the unknown environment. The agent is placed in a rectangular arena with a fixed surroundings in it and requested to calculate the shortest path. The goal is to calculate the navigation plan from starting point to the exit. This task is complexed because arena contains multiple obstacles and thus the finding of optimal path is impossible without initial exploration. Ultrasonic sensor that is placed on the rotation platform helps to avoid collisions and create a mapping of the space. The usage of such technique allow us to teach robotic agent to find optimal path without human intervention. 3 Q-Learning The basis of the Q-Learning method is the matrix of the weights of the system state. The matrix Q is a collection of all possible states of the system and the weights of the system's response to various actions. In this problem, possible combinations of the parameters of the system are 16 = 4 ^ 2. In each of the 16 states of the system, it is possible to perform 4 different actions (Action = 0,1,2,3). Actions are set as following: North 0, South 1, East 2, West 3. The initial values of the Q matrix are set to zero and then will be updated during the learning process. Table 1 shows the initial state of the R matrix which represents rewarding values of the Q learning update function. The zero column contains the row index, the four columns equal the weights for the actions 0, 1, 2 and 3. Each line represents the unique state of the system. When initializing the table, we assign all the weights to the corresponding values to block the transitions we do not need e.g. north to south not allowed and north to north is not allowed. TABLE 1 Initialization of the matrix R N S E W N S E W In the simplest form the one-step Q-Learning formula is defined: QQ(SS tt, AA tt ) QQ(SS tt, AA tt ) + αα RR tt+1 + γγ max QQ(SS tt+1, aa) QQ(SS tt, AA tt ) aa Where γγ or Gamma represents the learning parameter. The range of this value is set from 0 to 1. When Gamma is close to zero the agent will tend to consider only immediate rewards. If Gamma is closer to one, the agent will consider future rewards with greater weight, willing to delay the reward. We set gamma parameter to 0.9 which promises to be the optimal value. The calculation of the suitable gamma parameter is one of the goals of the future research. CM Computer Modelling and Information Technologies

101 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT Q-Learning Software The Learning software and corresponding algorithm can be described as follows: Initialize Q(s, a), s A(s), arbitrarily, QQ(tttttttttttttttt ssssssssss, ) = 0 Repeat (for each episode): Initialize S: Repeat (for each step episode): Choose A from S using policy derived from Q Take action A, observe RR, SS QQ(SS tt, AA tt ) + αα RR tt+1 + γγ max QQ(SS tt+1, aa) QQ(SS tt, AA tt ) aa SS SS The algorithm described above will repeat until the goal state is achieved. Agent will calculate the actions with highest rewards and update the Q matrix for each corresponding pair state-action. Each episode of this algorithm is considered as a training session. Which means that the more session the platform is accomplishing the more optimized Q matrix is becoming. 5 Hardware platform For this project a specialized hardware platform was developed that uses Arduino microcontroller. Important factor for the autonomous robotics is the limitations that are set on the computational power. In this case all calculations Shmurygin M and processing is done on the platform itself without human interaction. However, Bluetooth module for the monitoring of the current state of the learning parameters and distance sensors is used. Robotic platform is represented by a 4- wheel rover that can easily move in four different directions. 6 Conclusions During the research process the usage of Reinforcement learning algorithms was applied to the real physical agent. Specialized hardware platform has been developed. In future work it is planned to use different optimization methods for Q-Learning algorithm in order to speed up the learning process and make system more adaptive to the surrounding conditions. Another direction of research is to learn what other factors can be applied for the reward computation including the speed of the motors and power consumption. The other important goal is to learn robotic platform adapt to dynamically changing environment. Acknowledgments I want to thank Yakunin Kirill my science supervisor for great support in preparing material and working with theoretical aspects of machine learning algorithms applied to the hardware systems and also the Faculty of Information Technologies of Kazakh-British Technical University for providing the financial support in constructing of the hardware platform of this project. References [1] Sutton R S, Barto A G 2012 Reinforcement Learning: An Introduction [2] Q-Learning tutorial [3] Learning Reinforcement algorithm on real physical model - [4] Nazmul Siddique, Hojjat Adeli Computational Intelligence: Synergies of Fuzzy Logic Neural Networks and Evolutionary Computing [5] Monk S 2011 Evil Genius USA: McGraw-Hill/TAB Electronics [6] Margolis M 2011 Arduino Cookbook USA: O Reilly Media, Inc CM Computer Modelling and Information Technologies

102 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Muhamedyev R, Muhamedijeva Y Data sources for RES evaluation R Muhamedyev 1, 2, Y Muhamedijeva 3 1 Kazakh National Research Technical University, Satpaev Street 22a, , Almaty, Republic of Kazakhstan 2 Kazakh-British Technical University, Almaty, Republic of Kazakhstan 3 Institute of Information and Computational Technologies, , Almaty, Kazakhstan *Corresponding author s ravil.muhamedyev@gmail.com Abstract Usage of renewable energy sources (RES) is a modern powerful trend in energy development. Green energy technologies (technologies of gathering energy from renewable sources) are actively developed and will allow in the future significantly to reduce use of nonrenewable resources (oil, gas, coal, peat), reduce the ecological impact of energy plants, improve the ecology around populated areas, reduce the cost of obtaining energy in some cases, increase the autonomy of life support systems and energy security of the country Heterogeneous data are needed to evaluation renewable resources. Paper considers data sources that accessed for researchers. The Kazakhstani problems are briefly discussed. Keywords: Renewable energy resources, data sources, information systems 1 Introduction According the expert calculations the potential of the renewable energy sources in the Republic of Kazakhstan exceeds one trillion kwth yearly [1, 2], of which less than 0.1% are used (as mentioned below). The use of RES is associated with a certain complexity due to the dependence of the systems performance from random natural factors. Wind speed, solar radiation, hydropower resources can t be predicted exactly. Due to the depletion of the fossil fuel and ecological problems, the role of RES and of the more intellectual systems of energy distribution is going to increase. To solve the problem of RES evaluation we need collect several kind of data. Information system should collect weather, geographical and social data. After analysing gathered data the system can support decision making process. 2 Data sources Energy resources monitoring tasks imply collecting data from different sources. Weather stations, autonomous sensors, remote sensing data, surface images from satellites, results of mathematical modelling can serve as the data sources for the parameters of the environment. Besides crowd source data-mining gradually becomes of more importance [3]. SETI@home, Galaxy Zoo, Citizen Weather Observer Program (CWOP) serve as the examples of such projects [4]. The latter is intended to collect meteorological data by the community of users, providing the data to the weather forecast services and to the security services, providing the feedback to the users in order to improve the quality of the collected data. The data received by the project is used in the universities, research centres, weather forecast services etc. The data collection in this systems is performed by the weather stations owned by the enthusiasts, by measuring the temperature of the mobile devices batteries [5] etc. E.g. OpenWeatherMap [6] project uses the data from private weather stations in order to improve the accuracy of the weather forecasts as the number of measuring points is more important in predicting than the accuracy of the measurements. For European researchers, several databases are available. For example, some databases present data for solar radiation of varying levels (global, continental). The Meteonorm [7] database is based on the 3D interpolation of solar radiation measured by meteorological stations. It includes data on global solar radiation, as well as direct and diffuse fractions. The PVGIS database [8] includes month averaged values of solar radiation and ambient temperatures for Europe. It processes climatologically data that is available within the European Solar Radiation Atlas using interpolation methods and the r.sun model [9]. This model is implemented in GRASS GIS, an open source environment. Data is freely available at [10]. The HelioClim 2/3 databases contain long-term solar radiation data series for Europe and Africa. Satellite images of Meteosat are used to form global radiation maps on a horizontal surface [11]. The estimates are based on the Heliosat2 method [9, 12], whose software at the time of this writing was available at but currently at [13]. Many researchers also use local data sources available in selected areas. For example, in [14] the local data sources of the county of Vermont, the state of Poltney, were used. This approach allows a more balanced assessment of resources, especially for mountainous and remote areas. The problem of collecting data for the territory of the CM Computer Modelling and Information Technologies

103 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Republic of Kazakhstan is quite actual as data itself is not sufficient for full-scale analysis. E.g. in order to assess the energy potential of wind and solar energy it is necessary to get the data about the weather conditions on the territory of the whole country with the best possible resolution in the first place. This data should also contain information about time. The force of wind, illumination and temperature affect the performance of energy plants of the given type directly. In order to assess the parameters the weather stations are placed on the territory of interest. But according to the NASA Global Surface Summary of Day (GSOD) [15] data for the year 2015 the territories of the Republic of Kazakhstan covered by the World Meteorological Organization (WMO) are about 1 for 7590 km2. This cannot be compared with the coverage in Europe and USA and does not allow assessing the weather conditions accurately enough. Despite the fact that the number of automatic weather stations is gradually increasing, but this number still is very small for such a large territory (Figure 1). FIGURE 1 Automatic weather stations on Kazakhstan territory [23] The presence of a large number of the weather stations should allow improving the weather forecasting models assessing the energy potential more precisely. Currently, these models are mostly based on the data of the remote sensing and interpolation taking into account this data. The errors of the given models are assessed in ref. [16]. E.g. it is about 10% to 30% for the solar energy in comparison with the data observed on the surface, significantly increasing during the winter. Thus, the basis of assessment of renewable energy potential in Kazakhstan should become remote sensing data and ground-based meteorological data. The list of the main sources of the meteorological data Muhamedyev R, Muhamedijeva Y consists of: NASA SSE (Surface meteorology and Solar Energy) [17] ECMWF (European Centre for Medium-Range Weather Forecasts) [18] archived sets of data NASA GSOD (Global Surface Summary of Day) [19] Some sets of publicly available data from NOAA (National Oceanic and Atmospheric Administration), NCEP (National Centers for Environmental Prediction) Currently, the data provided by numerous subsidiaries of NASA and NOAA are of the highest interest. This data is mostly results of remote sensing of earth's surface. NCDC (National Climatic Data Center) [20] should be noted out of these organisations also as the data can be ordered in a certified printed form and the authenticity is guaranteed [21]. In addition to the text and numerical information, spatial data may be stored in the form of maps (layers of maps). There is a significant amount of map sources on different subjects. Lately, online map suppliers such as OpenStreetMap (OSM) [22], OpenWeatherMap (OWM) mentioned above, Google Maps etc. become popular. E.g. OWM provides the maps of cloud coverage, air pressure, temperature, precipitation all over the world. Typically, the map suppliers have a well-documented API (which often is free of charge) using which it is possible to create own web- GIS with maps consisting of different layers, available from the map suppliers. However, the most of the spatial information is stored in the form of the map s files and satellite images. The most popular formats of map storage are Shape, GeoJSON for vector information and TIFF, JPEG for raster maps. 3 Conclusion For decisions on the use of various mechanisms of state regulation in the transition to renewable energy sources and the use of other useful resources a decision support system at national and regional levels is necessary. One of the main problems that apply to the conditions of the Republic of Kazakhstan is the low quantity of the data sources, especially the local one. Nevertheless, it is possible to use the remote sensing and global meteorological data for initial assessment of the resources. For the implementation of the system it is necessary to solve some important problems related to the detailed system architecture, services, data collection, integration and processing, functionality provided to users, aggregation of heterogeneous data and methods of their storing. References [1] Alimgazin A Sh 2007 Research report: The concept of using renewable energy in the housing heating systems in pilot areas Astana 28 p. [2] Filippov A V, Mukhamedieva A G 2010 Status and prospects of development of electric power industry in Kazakhstan The contribution of young researchers in the industrial-innovative development of Kazakhstan Ust-Kamenogorsk [3] Nov O, Arazy O, Anderson D 2010 Crowdsourcing for science: understanding and enhancing SciSourcing contribution ACM CSCW Workshop on the Changing Dynamics of Scientific Collaborations [4] Citizen Weather Observer Program [5] Overeem A, et al Crowdsourcing urban air temperatures from smartphone battery temperatures Geophysical Research Letters 40(15) [6] Open Weather Map (Weather in your city) [7] Irradiation data for every place on Earth [8] Photovoltaic Geographic Information System [9] Rigollier C, Bauer O, Wald L 2000 On the clear sky model of the CM Computer Modelling and Information Technologies

104 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 ESRA European Solar Radiation Atlas with respect to the Heliosat method Solar energy 68(1) [10] Joint research centre. Institute for energy and transport [11] Cros S, Albuisson M, Lefe vre M, Rigollier C, Wald L 2004 HelioClim: a long-term database on solar radiation for Europe and Africa Proceedings of the 14th EuroSun conference [12] Rigollier C, Lefe vre M, Wald L 2005 The method Heliosat-2 for deriving shortwave solar radiation from satellite images Solar Energy [13] Solar Energy Services for Professionals [14] Van Hoesen J, Letendre S 2010 Evaluating potential renewable energy resources in Poultney, Vermont: A GIS-based approach to supporting rural community energy planning Renewable energy 35 (9) [15] Global Surface Summary of the Day Muhamedyev R, Muhamedijeva Y [16] Atlas of renewable energy resources in Russia Editors: Kiseleva S.V., Ermolenko G.V., Popel O.S. - М.: РХТУ им. Д. И. Менделеева, p [17] Surface meteorology and Solar Energy [18] European Centre for Medium-Range Weather Forecasts [19] NNDC Climate Data Online - Global Surface Summary of the Day (GSOD) [20] National centers for environmental information [21] NOAA's National Centers for Environmental Information (NCEI) [22] OpenStreetMap [23] Adal meteo CM Computer Modelling and Information Technologies

105 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Aziken N Stock prices prediction using Machine Learning techniques N Aziken Faculty of Information Technologies, Kazakh-British Technical University, Toraygiriv Str. 25, Almaty, Kazakhstan Corresponding author s nesiko.aziken@mail.ru Abstract This paper gives an explanation of applying Machine Learning techniques to forecast stock market prices. Different companies were taken to be predicted in terms of share prices based on historical data. Stock prices fluctuate at any time and tend whether to raise or fall. This trend can be tracked by several methods described in this paper. Two of them which exist many decades are shown based on practical examples. Moreover, drawbacks and disadvantages are concerned and explained. As a solution and innovative method of forecasting Artificial Neural Network is considered and explained in details. The way of applying this method, its architecture, logic and system are shown as an innovative approach to solve the problem of stock prediction. As a conclusion reader can see powerful advantages of described technique, its advantages in front of conventional methods and its high potential to solve problems in different fields. Keywords: artificial neural network, stock prediction, stock analysis, machine learning, stock exchange 1 Introduction From the beginning of capitalistic relationships in the markets stock exchanges became one of the market epicenters. From the first site it seems that stock market is just game of luckiness. However, stock exchanges are algorithmic systems with their rules and laws. To trade successfully on such markets it is necessary to continuously conduct analysis of the market and predict stock prices trends. Markets for now are explored by two methods: fundamental analysis and technical analysis. Recently, one of the new and innovative approaches appeared to solve stock prediction problem. It is about applying neural network for stock trends determination by finding the function between share properties and its price up to 4 days. 2 Fundamental and technical analysis Fundamental analysis is the method of forecasting future stock trends based on economical, political and other fundamental factors influencing on demands and supplies. Fundamental analysis consists of 4 main blocks: overall economical analysis (Figure 1), industry analysis (Figure 2), and financial analysis of a company and investigation of stock assets quality. FIGURE 1 Analysis of economical condition in gas industry FIGURE 2 Industry analysis of semiconductor market Increase in product or security supply quantity can result in share price fall. Backwards logic also exists: uncompensated increase for demand leads to increase in share prices. Fundamental analysis is applied for exploring finance-economical condition of a company. With its help we can achieve two targets: To implement selection of the most efficient issuers which can give the biggest profit To determine fair or inner price of the share The complexity of fundamental analysis is that it is hard to clearly determine economical and financial indicators. Technical analysis is the method of predicting share prices based on graphs indicating historical stock data. There exist 3 postulates of technical analysis: 1. Stock trends consider all possible changes 2. Models or logic of stock trends exist 3. History repeats Technical analysis does not consider reasons of share prices trends. It is influenced only by past prices. It considers only existing directions of share prices. It helps to forecast future prices depending on past changes in prices. Also the information about trade volumes and other statistical data is used in technical analysis. Charts are used to illustrate trends. One of the most popular charts is Japan candlesticks (Figure 3). CM Computer Modelling and Information Technologies

106 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Aziken N FIGURE 3 Japan candlestick chart Here the following averaged are calculated and then explored: 1. Moving average: FIGURE 4 Architecture of ANN To solve stock prediction problem we use share properties such as volume, day low, day high, OBV and other as inputs and share price as an output. For activation function we use hyperbolic tangent and sigmoid functions to compare: Where: n number of periods in the moving average D demand in period i 2. Weighted Moving Average: Where: W weight for period i P demand for period i. 3. Other All these lines are then put together and explored. It can show string, average or weak signals to buy or sell a share or other security. 3 Artificial neural network Artificial Neural Network is a complex information system which solves the problem of identification of some particular function of several variables (Figure 4). It is analogue for a real neural network of the human brain that processes some set of data and gives determined response. Artificial neural network consists of several nodes (which are the imitation of biological neurons) which are arranged in one layer or several layers. All nodes are interconnected and there are some weights between each pair of nodes (which are the imitation of synapse). These weights are some numbers which are used to calculate the output of a neuron based on activation function. Weights of a neural network are adjusted during the process of learning. The final error of a neural network depends on the values of network weights. Weight adjustment depends on a learning rate of neural network. Our neural network is simulated in Visual Gene Developer app on PC (Figure 5). FIGURE 5 Screen of Visual Gene Developer CM Computer Modelling and Information Technologies

107 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Aziken N And then, when the optimal configurations for network are found we create program code on Python (Figure 6). 4 Conclusion FIGURE 6 Python code on Eclipse IDE For error correction we use Back-propagation algorithm: This paper describes the Artificial Neural Network for stock prediction problem. The algorithm clearly shows the possibility of forecasting share prices analyzing their history by neural network. After conducting several experiments we finally get the function which describes dependency of share prices on different share properties. This will enable us to predict trends of stock with certain correlation. This tool has a big potential to be used by nonprofessionals to predict stock market trends. For reaching this it needs to be improved and corrected properly with no bugs. Acknowledgments Rakhimbayev N.M., Deputy Chairman of the Management Board, JV Asyl-Invest ; Abdrazakov K.A., fundamental analyst, JV Asyl-Invest References [1] Erik Naiman 2016 Malaya Enciclopedia Treidera Moscow [2] Morris G L Japan Candlestick [3] analiza_birzhevoy_konyunktury [4] ock.pdf [5] gence_neural_networks.htm CM Computer Modelling and Information Technologies

108 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Chernysh I, Mahovka V The importance of information technology in the development of tourism I Chernysh, V Mahovka * Poltava National Technical Yuri Kondratyuk University, Tourism and Administration Department, Pershotravneviy Avenue, 24, Poltava, Ukraine *Corresponding author s irinachernysh@gmail.com Abstract The essence and role of information technologies in tourism are considered in the article. It is determined that tourism is an informationally saturated sphere of the economy. Some basic components of the information technology system used in tourism have been identified and examined. The prospects of using information technologies aimed at providing the tourist's needs and technologies oriented to tourist destinations and facilities are shown. Keywords: tourism, information technologies. 1 Introduction Tourism, as an up-to-date branch, performs one of the leading functions in the world economy, ensuring the formation of a significant part of the world's gross product. This branch of the economy is developing rapidly and in the coming years will become one of its largest sectors. The rapid development of the tourism industry generated the need to develop modern information technologies aimed at improving the level of rendering tourist services. The use of information technology in tourism is concentrated in travel agencies, insurance and transport companies, excursion bureaus, hotels, cafes and restaurants, as well as in providing services to individual tourists and tourist groups. [1]. 2 Main part Informatization and virtualization of modern society leads to the formation of a completely new social space, determines the active use of new information technologies aimed at meeting the needs of the tourist: providing personalized advice; Planning of group trips taking into account the individual characteristics of the tourist; Technology "smart" planning of the tourist route, as well as changing and planning the route during the trip; Technology support user during the journey; Technology of centralized storage and processing of information on the journey of perfection of intelligent computer interfaces; Technology for planning and supporting travel anywhere in the world. Important for improving the competitiveness of the tourist product is the introduction of information technologies oriented to tourist destinations and objects, namely: the development and improvement of information technologies of tourist interfaces of a sensible city; integration technologies for advertising and marketing tourist destinations, tourist routes and services; Methods of introducing intelligent technologies in tourist cities and tourist sites; Technologies of formation and complex information support of tourist routes in cities [2, 3]. 3 Conclusions In modern conditions it is impossible to ensure the quality management of the tourist business without the introduction and application of the latest information technologies. It is their use that ensures the observance by the subjects of tourist activity of a set of interacting and mutually complementary requirements that ensure the quality and competitiveness of the tourist product in modern market conditions. References [1] Glebova A O 2012 Innovative technologies in tourism Economics. Control. Innovation. 2(8) Access mode: [2] Melnichenko S V 2010 Information technologies in management of subjects of tourist activity Melnichenko / Bulletin of the CSTU [3] Smart tourist destinations: explore how smartness improves competitiveness in the context of tourism destinations etourismlab. Bournemouth University Access mode: CM Computer Modelling and Information Technologies

109 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Gopeyenko V, Lemberski I Asynchronous full adders implementation: case study V Gopeyenko 1*, I Lemberski 2 1 Smart Technology Research Centre Ventspils University College, Ventspis, ISMA, Riga, Latvia 2 International Radio Astronomy Centre, Ventspils University College, Ventspis, Baltic International Academy, Riga, Latvia *Corresponding author s viktors.gopejenko@isma.lv Abstract Case study implementation a full 1- and 4-bit asynchronous adders in XILINX environment is discussed. The proposed adders can be realised based on WebPack application which has initially been developed for synchronous design. Our main goal is to examine XILINX environment as a tool for asynchronous design. An approach to asynchronous design has been proposed for this purpose. Keywords: Full Asynchronous Adder, Xilinx, BLIF and EDIF Formats, Self-Timed Schematic. 1 Introduction Asynchronous schemas work faster in comparison with the synchronous ones, however, there are special constraints for the realization. Furthermore, there are no special environments for asynchronous design. To overcome these problems a model for asynchronous schemes implementation using XILINX ISE WebPack Design software (WebPack) [1] has been suggested. 2 General The main difference between synchronous and asynchronous schemas is as following: any port in synchronous schemas, e.g. Port A in Table 1 should be split in two Ports, e.g. A1 and A2. Value 1 for port A corresponds to combination 01 for asynchronous schemas and value 0 corresponds to combination 1. Combination 11 is prohibited and combination 00 is used to reset schemas. TABLE 1 Synchronous and asynchronous logic relations Synchronous Port A 1 0 Asynchronous Port A Asynchronous Port A The pairs of ports (A1 and A2) must be mapped on the same slice to provide asynchronous logic - this is a technological constraint. To describe asynchronous schemas BLIF (Berkeley Logic Interchange Format) [1] is used, however, XILINX environment does not support this format. So, a temporary procedure has been suggested to solve this problem. The main idea of this procedure is the decomposition of functions, representation in BLIF format and mapping into LUT [3] (Look-Up-Table). Based on it schematic design is created. This is one of the conventional source types of the input data for WebPack application. The implementation (mapping, routing, slices distribution) is done using WebPack procedure under an user constraint file. 3 Implementation A full 1- and 4-bit asynchronous adders were realised and simulated. The results of the time analysis show that asynchronous full 4-bit adder has value of maximum delay approximately the same as a full 1-bit synchronous adder [4]. 4 Conclusion XILINX WebPack environment can be used for asynchronous design. BLIF to EDIF (Electronic Design Interchange Format, which is one of Webpack input formats) converter should be created. Acknowledgments This work is supported by ERAF Project Methods and Tools for the Design in Reconfigurable Environment Nr /16/A/234. References [1] Berkeley Logic Interchange Format (BLIF) University of California Berkeley July 28, 1992 [2] [3] Spartan6 FPGA Configurable Logic Block, User Guide, UG384 [4] Bobbinpreet Kaur, Girdhari Agarwal, Amandeep Kaur 2015 Analysis and Implementation of a Full Adder Circuit using Xilinx Software International Journal of Computer Applications ( ) International Conference on Advancements in Engineering and Technology (ICAET 2015) p.5-8 CM Computer Modelling and Information Technologies

110 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Nechval K, Tharakath A Developing of balancing tools for flight controls Konstantin Nechval, Anas Tharakath * 1 Transport and Telecommunication Institute, University of Latvia, Lomonosova Str. 1, LV-1019 Riga, Latvia *Corresponding author s anashaneef313@gmail.com Abstract Wingtip devices may be fitted for various reasons, they often combine more than one function and usually occupy a substantial part of the stabilizer, just belong the aileron spar. Winglets allow decreasing fuel consumption of over 10%. But with the development of new generations of aircraft, it is not always appropriate to take into account the stability and controllability of the flight. Because there is a need to improve the existing designs in the paper proposed new concept of winglets. Keywords: Please select a maximum of 5 keywords from the keyword list 1 Introduction As shown in Figure 1 the winglet can be deflected in an almost upright vertical position. Immediately after take-off, or in the event of an aborted take-off, they may be activated eitherby the pilot or automatically. It could be done in bad weather conditions in case of strong side wind. As a result of the interrupted/ resumed airflow over the flaps, the wing loses a some parts of its lift, which increases the moment of normal force on the surfaces and than makes winglet control much more effective. In addition, they could create considerable drag and these combined effects increase the deceleration by some 10%. Winglet transition may be used in flight when an appreciable increment in drag is required to obtain a high rate of coefficient or improved speed stability with a constant angle of decent. reffered to as airbrakes (speedbrakes). The location of actuator hinges should be close to prevent structural deflection which will interfere with the adjacnt structure (see Figure 2). 2 The main concept The concept of mounting wingtip devices to reduce induced drag as applied to a model commercial Boeing wing is investigated through a planned computational study. The design and simulation was done using commercial software. The effect of mounting winglet was seen to have greatly affecting the induced drag and vortices formation at the wing tip. A flow visualization study substantiates, rather spectacularly, the effectiveness of the concept. In order to prevent wing surface flutter during high speed flight, the stiffness of the winglet system, made up of the wing surfaces, actuators and actuators support structure (as shown in Fig 2) is required. These are: Winglet bending and torsional stiffness (EI&GJ) reflects minimum acceptable stiffness to meet flutter requirements. Actuator and support strucure stiffness reflects minimum acceptable stiffness. FIGURE 1 Specific winglets are not deflected in this case to avoid disturbing the flow over the wing and prevent buffeting. For this reason specific option are only used to decrease the speed on the ground and are refferred to decrease the lift on the ground and are refferred to as ground spoilers (liftdumpers). When acting as drag-produsing device, these winglets re FIGURE 2 Several of the current jet airplanes have had control problems that resulted from structural deflections caused by CM Computer Modelling and Information Technologies

111 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 the landing gear during the take-off run (upward landing gear loads and than the wing bending down). This deflection has resulting in the spoilers lifting and thereby killing the wing lift during the most critical portion of the take-off run. Control system design is another must to be established to accommodate the structural deflections. Attention should be given to the winglet hinge due to the wing forced bending (wing deflection) for three- hinge design as illustrated in Figure 3 by the se of winglet track. The winglet is composed of a high speed (low drag & strong) central winglet section with completely retractable high lift sections which move in a spanwise direction as opposed to the chordwise direction of conventional flaps. Nechval K, Tharakath A The angle of the trailing edge can be expressed in terms of the characteristics of the winglets in the plan. ξ 2w π b w = arctg 2 C tipw. (3) Expressing edge width Ctipw determine the bevel angle of the trailing edge of the winglets. C tipw = tg b w π ξ 2w 2. (4) The next step is to determine the sweep angle of the leading edge of the winglets. FIGURE 3 It is the same concept of changing lift with conventional chordwise flaps except that the spanwise flap increases span & area instead of only the camber. It also increases the aspect ratio instead of decreasing it, which greatly improves efficiency and safety. 3 Performance Prerequisites for calculation; the component of the resistance does not depend on the magnitude of the lift force created and is made up of the profile drag of the wing, the resistance of the aircraft's structural elements that do not contribute to the lift, and the inducing resistance. This factor is essential when moving with a near- and supersonic speed, and is caused by the formation of a shock wave that takes a significant share of the energy of motion. Inducing resistance occurs when the aircraft reaches a speed corresponding to the critical Mach number, when a part of the flow around the wing of the aircraft acquires supersonic speed. The critical number of Mach is the larger, the larger the wing sweep angle, the more the leading edge of the wing is sharpened and the thinner. Having comprehensively considered the complexity of function and fitting error, we can express the problem as the constrained optimization problem: π µ > ζ 2 2w. (1) Let's find the Mach angle. µ=arccsin (M) Hence the angle of sweep of the trailing edge is assumed equal to = π ζ 2w 2 µ. (2) π b w ξ1w = arctg 2 C tipw + Ctip. (5) The area and the winglelet range are determined by the trapezium formulas S W C = tip b λw = S 2 w w + c 2 w b w, (6). (7) The inductive resistance is proportional to the square of the lifting force Y, and is inversely proportional to the wing area S, its elongation \ lambda, the density of the medium ρ and the square of the velocity V: 2Y CL V Xin = V S = ρ 2πλ S 2 ρ πλ. (8) To solve this equation, you must always specify a parameter, either bw is the magnitude of the winglet span, or Cw is the magnitude of the end edge of the winglet λ λ = 2 2bw Cb w w W WCtip 0. (9) The winglet span is calculated by the use of similar formulae WCtip b w = λ 2. (10) Sweep angle of the leading edge of the winglets. π b w ξ1w = arctg 2 C tipw + Ctip. (11) The power required to overcome the parasitic resistance is proportional to the velocity rise 3, and the power required to overcome the inductive resistance is inversely proportional to the velocity, so the total power also has a non-linear velocity dependence. As example we can CM Computer Modelling and Information Technologies

112 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Nechval K, Tharakath A estimate some main geometrical properties (see Table 1.) TABLE 1 Performance of Boeing 737 NG Speed (kt) Altitude (ft) Fuel consumption (kg/h) Max. cruise Weight: Design payload (kg) Operational empty (kg) Design fuel load (kg) Wing tip: MAC (m) 4.17 Taper Ratio Area (mі) Span (m) Aspect Ratio 9.44 Root Chord (m) 7.88 Tip Chord (m) Ctip 1.25 coefficient CLmax (T/O) 2.49 CLmax MLM) 3.32 coefficient С D 0.35 Mach sweep angle χ 30 Airfoil and winglet properties: Mach angle μ 51 C L (max K) 0.80 C D (max K) edge width Ctipw sweep leading edge ξ2w 38 angle of LE ξ1w 66 total aspect ratio of wing λnk 10 calc aspect ratio of winglet 0.58 λw winglet span bw 0.6 Long range cruise Conclusions The telescopic winglet is composed of a fixed outer section and three extendable outer sections. An overlapping extension spar system makes this design an improvement over previous attempts at telescopic wing design. This overlapping spar system provides for a 3:1 span ratio, which has never before been attained. During takeoff & landing the high lift airfoils are extended at the wing tips. When transitioning to a high speed cruise, they are retracted in flight to leave a highspeed low drag wing capable of withstanding high 'g' loads. This system is simple, rugged, and fail-safe. The aircraft can also maneuver in flight and land safely with the wings in any position from fully extended through fully retracted. The extension/retraction mechanism is a simple system of cables that prevents asymmetric extension. Redundancy is built in so that failure of any cable does not hinder safe operation. The airfoils are conventional NACA sections. The mechanism is simple and reliable. The extendable section spars interlock and are guided on rollers to increase the span. Binding under load during transition is prevented by the details of the roller system. This design is actually simpler than conventional high lift devices. The overall weight of this wing is comparable to that of a conventional compromise wing for a similar size aircraft that is required to produce the same speed range, however, it is stronger and more efficient than the conventional wing. Acknowledgments Authors wishing to acknowledge encouragement from colleagues. References [1] Williams A L 1985 Ä new and less Complex Alternative to the Handley Page Slat Technical Paper, Northrop Corp. CM Computer Modelling and Information Technologies

113 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Nechval K Abstract Engine mount joints using shape factor in aircraft design Konstantin Nechval Transport and Telecommunication Institute, University of Latvia, Lomonosova Str. 1, LV-1019 Riga, Latvia *Corresponding author s konstantin.nechval@gmail.com Optimizations of power plant joints for modern and new types of aircraft jet engine have for a considerable time been applied successfully in the aerospace industry, but still has not become a mainstream technology for the design of universal aircraft mounts. The explanation for this is partly to be sought in the larger problem sizes and in the often quite complicated support and loading conditions for aircraft components and engine mounts. Also, aircraft components are often stability designs and the compliance based optimization using shape factor method. Keywords: airframe design, engine mount, strength, engine installation, stress, strain member, joint of structure 1 Introduction The question is how to deal with this more with less mentality. The purpose of this research is to investigate and measure the changes of structure and strength for effects of optimization associated with taking a micro approach to stable aircraft design estimation. Results show that there is a significant difference between estimating at the differing of assembly levels. However, from a practical standpoint, the difference in dollar terms is too small to be considered significant. As a result, engineer should allocate resources based on other constraints such as time allotted to complete the maintenance or required level of visibility into the inspections of jet engine joints. 2 The mating joints Mounting jet engines on the airplane structure is somewhat simpler than in the case of reciprocating engines. The engine mounts must be designed to prevent airplane deflections from introducing loads into the powerplant, and must permit thermal expansion of the engine both axially and radially [1]. The major portio of the vertical loads is carried on two trunnions located near the engine C.G. Side loads are taken out on the trunnion on one side only, the other being free to move laterally to allow for thermal expansion. The forward mount (some design are located in the aft) is a universal joint capable of carrying vertical loads only. Since the trunnions are located near the C.G., therefore the major forces imposed on the front support arising from the gyroscopic couple caused by angular velocity in yaw and inertia moment caused by angular acceleration in pitch are small. Since the moving parts in a gas turbine have a simple rotary motion, and since combustion is continuous rather than intermittent, the unbalanced forces which might excite vibration are few in number and small in magnitude. Detail design have two main concepts: Process Selection Materials Selection We will concentrate on most important joints check calculation. In this case we have estimated section of cantilever of link design for engine axial expansion is shown in Figure 1. Eliminate the free variables using each constraint in turn, giving a set of performance equations (objective functions) of the form: where σ and τ is adequate strength are expressions containing the functional requirements of geometry and materials indices J, S stiffness and dependent variables are Q, M mass loads. If the beam is to meet both constraints then, for a given material, its dimensions are determined by the lowest of factor F. As a result of these assumptions it is needs to resolve multiple constraints equations: f 1 Q S [ τ ] x max = Jx s M f 2 = ymax J where J x x [ σ ] s ( h 2 t) b (2 s) = F min, (1) 3 3, (2) h t yi Sx_ max = bt + ( yi s) 2 2. (3) If the beam is to meet both constraints then, for a given material, its weight is determined by the lowest of f1 or f2 Figure (1). CM Computer Modelling and Information Technologies

114 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Nechval K 3 Structures estimations FIGURE 1 Cross-section of joint element All tail mount engines (inside fuselage as shown in Figure 1) are designed to withstand forward decelerations in those direction which would allow a less securely mounted engine. An engine mount is a frame that supports the engine and holds it to the fuselage or nacelle. It may be made of builtup sheet metal, welded steel tubing, or some other suitable material. Engine mounts vary widely in appearance and construction, although the basic features of construction are similar and well standardized. They should be designed so that the engine and its accessories are accessible to inspection and maintenance. Engine mounts may be built as individual units which can be detached easily and quickly from the supporting structure. In many of the large transport aircraft, the engine mounts, the engine, and its accessories are removed and replaced as a single complete power-unit assembly, this makes maintenance and overhaul simpler as well as the time required for engine change much shorter. The bushings are often a part of the engine-mountings bracket and may be installed on the engine at the factory. The maximum vibration absorption is obtained when the mounting bolts are tightened so that the engine can move within reasonable limits from any fore-and-aft movement. The torsional motion is damped by the restraining action of the pads or cushions and the friction of the metal surface held by the bolts. If these bolts are too tight, the mounts tends to vibrate with the engine, which is obviously undesirable. The typical turbojet engine tail mount installation is shown Figure 2. The Fig 2 shows a detailed turbojet engine mount known as the QEC (QEC is an abbreviated notation for Quick Engine Change ). It is a semi-rigid structure made up of frames, shear panels, and truss members [2]. 4 Conclusions FIGURE 2 Detail configuration of QEC engine mount At present, most jet engines are attached rigidly to the airplane structure. Some fuselage engine mounts for modern and new types of aircraft jet engine are shown in Figure 2 engine-mount supports virtually the entire power plant in the usual case, although for engines of large horsepower the engines mounts do not extend more than a few inches beyond rearmost accessory. It is a better engineering design to use tubular steel or titanium alloy supports which may be enclosed with a suitable cowling because of the necessity of gaining access to various parts of the engine and its accessories [2]. Acknowledgments Authors wishing to acknowledge encouragement from colleagues. References [1] Information on Williams International FJ [2] Chun-Yung Niu M 1989 Airframe structural design Los Angeles, California chapter CM Computer Modelling and Information Technologies

115 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kalnins J R, Narnickis R Simulation of a stochastic predator-prey model with external fluctuations J R Kalnins*, R Narnickis Engineering Research Institute Ventspils International Radio Astronomy Centre of Ventspils University College, Inženieru street 101a, LV-3601, Ventspils, Latvia, *Corresponding author s simts@latnet Abstract We have built a stochastic predator-prey model for educational purposes in the interactive modelling environment VensimPLE*. The predator-prey model is simulated using Gillespie s stochastic simulation algorithm. A external fluctuation source is added to the model. Population dynamics are studied under different parameter values. External fluctuations effectively change the phase portrait. This model allows to understand and investigate the different evolution dynamics in a very simple way. Keywords: predator-prey, simulation, stochastic 1 Introduction Gillespie s stochastic simulation algorithm was made by Daniel T. Gillespie to simulate chemical and biochemical systems of reactions [1-2] and it is widely used today especially in astrochemistry [3]. To better understand the problem, we have built a simple stochastic predator-prey model avoiding the assumption that the rate of prey death equals the rate of predator birth (which is usually the case for chemical reactions) and on top of that we add an external fluctuation term. 2 Predator prey Vensim model The sketch of the model is shown in FIG. 1 The corresponding differential equations (deterministic case) are dpy = a Py b Py Pd + f () t dt dpy = c Py Pd d Pd + f ( t), dt where Py stands for the number of prey and Pd for the number of predators; f(t) is the external fluctuation term which conforms to a uniform distribution; a, c are birth rate coefficients and b and d are death rate coefficients for the prey and predators respectively. VensimPLE code for realising the Gillespie algorithm in the model: Flow Py=IF THEN ELSE(q<ABS(a*Py), 1, IF THEN ELSE( q<abs(a*py+b*py*pd), -1, 0))+ kr*random UNIFORM(0, 1, 5), Flow Pd=IF THEN ELSE (q<abs(a*py+b*py*pd+ c*pd*py), 1, -1)+ kr*random UNIFORM(0, 1, 25) tot p=abs(a*py)+abs(b*py*pd) +ABS(c*Pd*Py)+ABS(d*Pd) Flow T=-1/tot p*ln(ran1) Parameter values were chosen a=0.04, b=0.01, c=0.04, d=1.4, Py0=30, Pd0=20, kr=0, TIME STEP=1, FINAL TIME=4000. The Parameter kr characterizes the intensity of fluctuations. Here we show the population dynamics (Figure 2) and the phase portrait (Figure 3). FIGURE 1 Predator-prey model sketch CM Computer Modelling and Information Technologies

116 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kalnins J R, Narnickis R 200 Kinetics 400 Kinetics Py : Current Pd : Current T FIGURE 2 Predator-prey kinetics. Kr= 0 Py : Current Pd : Current T FIGURE 4 Predator-prey kinetics,.kr= Pd(Py) Pd(Py) Pd : Current Py FIGURE 5 Predator-prey phase picture, kr= Pd : Current Py FIGURE 3 Predator-prey phase diagram.kkr=0 In the case of kr=0.134 we see more pronounced periodicity (Figure 4). And a more concentrated phase portrait (Figure 5). *Ventana Systems. Inc software 7 Conclusions A simple demonstration of a stochastic predator-prey model is built in VensimPLE. It is very easy to change the parameters of the simulation in Vensim which gives the possibility to find different interesting features of the model. This model is easily reproducible and different scenarios can be evaluated visually immediately. Acknowledgments Work is supported by ERDF project "Physical and chemical processes in the interstellar medium", Nr /16/A/213. References [1] Gillespie D T 1976 A general method for numerically simulating the stochastic time evolution of coupled chemical reactions Journal of computational physics 22(4) [2] Gillespie D T 1977 Exact stochastic simulation of coupled chemical reactions Journal of physical chemistry 81(25) [3] Vasyunin A I, Herbst E 2013 A unified monte carlo treatment of gas grain chemistry for large reaction networks. ii. a multiphase gassurface-layered bulk model The Astrophysical Journal 762(86) CM Computer Modelling and Information Technologies

117 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Jefremova I, Mrochko A Features of testing mobile applications I Jefremova, A Mrochko ISMA University, Riga, Latvia *Corresponding author s aleksandrs.mrocko@isma.lv Abstract Today we are witnessing more and more enterprises leveraging mobility to improve efficiencies of business. Mobility provides consumers an access to more and more data at their disposal to make decisions. In an ever evolving mobile apps market, it s challenging to be successful as the users have a range of apps to choose from. Testing for mobile market is becoming challenging in an industry that s constantly changing. It brings forth some unique problems. Keywords: Mobile Applications, testing mobile devices, testing strategy, device emulators, scripting 1 General The goal of testing efforts is not to find errors, it should be to understand the quality of your app. Mobile app testing is time consuming and expensive presents unique challenges. There are trade-offs that you need to consider and choices, that you need to make regarding the mix of different techniques and methods that will be used in mobile app testing. Rather, you will need to consider a testing strategy that combines different testing options that as a whole, provide the best balance of trade-offs between cost, quality, and time-to-market. Apps based on the three different mobile app architectures Native, Web, and Hybrid have different test case scenarios for each. They differ significantly in performance, stress, and compatibility testing. However, all types of apps are subject to other mobile testing challenges as well. Native Applications commonly downloaded from an app store, is often controlled by the gate-keeping app store. They maximizes the capabilities of the device and operating systems for which they are developed. A mobile web application, like the web itself, is viewable by users around the world. When testing both native and mobile web applications, there are several challenges. Working out the right solutions requires an assessment of the advantages and disadvantages inherent to each of the available testing options and determining the technology that best suits your app testing requirements. Testing needs to determine whether the app can be successfully: downloaded to the device; executed on the device; interact with the supporting back-end content infrastructure; when updates are made, need to be sure that the application can be pushed out to and accepted by the end user. Native applications are inherently tied to the hardware and operating systems for which they are written. To meet the challenge of testing for native mobile applications: it is essential to test on the physical devices supported by your application; to ensure backward compatibility with each older and perspective generation of the device; to account for updates to the operating systems. 2 Testing mobile devices Potentially tens of thousands of different client devices and wide range operating systems every day fancy the users who expect smooth running of mobile apps on any device anywhere. The mobile devices used by consumers create the most obvious challenge to mobile testing. To handle the device challenge, you have three options: test exclusively using real devices; test exclusively with emulated devices; to use a combination of both. Testing with real devices can be expensive and labour intensive. Emulated devices are relatively easier to manage and cost effective. However, an emulated device is not sensitive to the ambient conditions that can impact the behaviour of the device. A third approach is to select a mix of both emulation and real device testing. Emulated device testing early in the development cycle can help you achieve goals at a relatively low cost. The addition of real devices to your test plan later in the development cycle is helpful for validating that applications are functioning as expected, and certifying that all development requirements and objectives have been met. Network. There are more than some hundred mobile network operators in the world. Each mobile operator may support multiple network technologies including LTE, CDMA, GSM and etc. Some mobile operators use less common or local networking standards such as iden, FOMA, and TD-SCDMA. Each network has a unique combination of network infrastructure that tunnels the packet-based protocols used by mobile networks into TCP-IP protocols used by the mobile web. Most network operators, implements a mobile web proxy, can restrict the flow of information that travels between your server and the test client. Thus, the network challenge is quite complex. CM Computer Modelling and Information Technologies

118 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Scripting. The next challenge of mobile testing is scripting, which is the method of defining a test. Script execution can either be manual or automated. Most real device automated testing software provides high-level scripting that operate on the text, image, or object layer. Most device emulators are capable of automating test execution using a higher-level, abstracted scripting language that is not device dependent. When you use automated scripting, the cost of setting up the script will typically be higher than the cost of a single manual execution of a test. But if it is a test script that you run on a periodic basis, you will eventually recover the costs of initial scripting. Many automated scripting tools have a special ability to scan a mobile website or application. This is a special capability, powerful, and cost-effective tool that can test an entire site with a single command. There are trade-offs between coverage and efficiency during various development and test phases when applying test automation. 3 Conclusions Jefremova I, Mrochko A Choice of strategy for mobile application testing, is a matter of choosing a combination of testing tools and techniques to meet your quality requirements, because there are simply too many compromises that must be made. After identifying bugs and functional problems using emulators, one can move to test with real devices, and remotely accessed devices. This way of testing in real-world conditions helps in identifying security and network impact. There are trade-offs between coverage and efficiency during various development and test phases when applying test automation. Network factor impacts the performance of a mobile app effecting user experience beyond hardware and software and it must be taken into consideration for testing Mobile Applications. References [1] Testing strategy for Mobile Applications CM Computer Modelling and Information Technologies

119 The 15 th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kovantsov A N Application of theorems of elementary geometry to construct graphs of some functions Abstract A N Kovantsov* Riga Technical University, Riga, LV-1658, Kaļķu iela 1, Latvia *Corresponding author s akovancova@baltinet.lv The ability to find easier ways to solve problems by means of elementary methods has always been the aim of science. In mathematics, the solution of many geometric problems looking for a ruler and compass. Many managed to solve the problem, it was impossible to solve some. Here we propose to apply some elementary mathematics methods for solving problems of mathematical analysis. 1 Theory In elementary geometry we have a lot of theorems, which in them are interesting, but do not have any application. These theorems are consequences of the Pythagorean Theorem. So, using the properties of the perpendicular dropped from the vertex of the right angle to the hypotenuse, it could quite 1 easily construct graphics functions yy =, yy = ff(xx) 1 ff(xx), yy =, yy = 1, if you set the function yy = ff(xx) ff 2kk (xx) ff(xx) graphic. In this paper, we use the well-known theorem of Thales. If the parties to the corner to cross the parallel lines, it will be proportional to the segments on the sides of the angle. By this we could easily to build a graph of the function yy = ff 1 (xx)ff 2 (xx), yy = ff 1(xx). Here functions yy = ff 2 (xx) ff 1 (xx), yy = ff 2 (xx)- completely arbitrary. References [1] Kovantsov A N, Krumbergs R 2012 Creation of graphics of functions with use of theorems of elementary geometry Computer Modelling and new Technologies 16(3) Riga CM Computer Modelling and Information Technologies

120 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Lukšaitė D, Lukšaitė J, Jurkševičiūtė G SCALE_UP an active learning cases modelling at Kaunas UAS D Lukšaitė, J Lukšaitė, G Jurkševičiūtė Kaunas kolegija (Kaunas University of Applied Sciences), Pramonės pr. 20, LT-50468, Kaunas, Lithuania *Corresponding author s gintare.jurkseviciute@go.kauko.lt Abstract The article reviews SCALE-UP (The Student-Centered Activities for Large Enrollment Undergraduate Programs) active learning environment and Cloud Computing technologies Enabled Active Learning know-how, the main requirements for a SCALE-UP type classroom and educational model. Transfer of this good practice of equipping two SCALE-UP classes at Kaunas University of Applied Sciences is discussed. This article presents the modelling case for Software Engineering, Data Management Technology, Business Economics and Management Courses. Each of those courses consists of lectures and practical activities. Three phases are underlined for each topic: 1) the problem based learning; 2) practical activities by tutoring; 3) collaborative learning. The lectures and practical work are combined and executed as a whole in the frame of SCALE-UP study plan and an active learning scenario. The classroom is equipped with a virtual workplace, cloud computing services, open resources on the Internet, e-libraries and subscribed databases. The study results considering the assessment of collaborative learning outcomes and the use of cloud computing technologies are discussed. Keywords: Collaborative active learning, Cloud Computing technologies Enabled Learning, SCALE-UP learning environment. 1 Introduction The new approach to teaching and learning in higher education is no longer directly related to systematically organized studies. Teaching is viewed as the process which enables people to develop their knowledge, understanding, abilities, values, attitudes and experience. The implementation of this idea is concurrent with learning environments which put emphasis on equipping students with effective and interactive learning tools and devices that correspond to the student s learning habits and needs. The question is: what kind of technological and educational conditions and innovations will be needed to achieve that? What learning environments have to be created and what learning technologies need to be chosen in order to improve students perception of conceptual (theoretical) subjectmatter, their ability to solve problems, study results and motivation? Conventional lectures, when the study material is uploaded and easily available in the virtual environment, is becoming less than effective method of teaching. At Kaunas University of Applied Sciences, the availability of study material in virtual learning environments has generated the need to modify conventional lectures by integrating active learning methods [1]. Active learning means the student s active participation in the learning process [4], the most advanced thinking skills such as analyzing, synthesizing, and assessing [3], *SCALE-UP. The Internet resource: Centered_Activities_for_Largeinteractivity defined by the interaction between the student and the lecturer, between students, the student and the subjectmatter, and the student and tools needed to accomplish the task [10]. In order to achieve such level of interaction and student activity it is necessary to appropriately reconstruct the physical space in relation to the virtual learning environment. Successful examples of such reconstruction are SCALE-UP (Student-Centered Activities for Large Enrollment Undergraduate Programs) and TEAL (The Technology Enabled Active Learning) projects*. Since 2010 Kaunas University of Applied Sciences has been developing the environment of active collaborative learning as based on the good practice of SCALE-UP and TEAL projects. The article discusses the practice of developing the active collaborative learning environment by setting up studio-like SCALE-UP classrooms at Kaunas University of Applied Sciences while making use of the already existing e-learning infrastructure and MS Visual Studio software tools for visualization, simulation, experimentation and designing. The aim of research: to analyse the case practice of active collaborative learning environment and cloud computing technologies enabled active learning while modelling the contents of the Software Engineering study subject. The subject of research: SCALE-UP active collaborative learning environment. The methods of research: analysis of scientific literature, case study, survey. _Enrollment_University_Physics_SCALE-UP TEAL at MIT. The Internet resource: MD Management and Decision Making

121 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE 2 Good practice SCALE-UP and TEAL projects SCALE-UP is a learning environment created to stimulate active collaborative learning in a studio-like classroom [6]. The requirements for such environment were shaped during the implementation of the SCALE-UP project at different universities including North Carolina State University (USA). The main achievements of the project: improved understanding of conceptual (theoretical) material; more positive approach to studies; increased motivation; improved study results and augmented problem solving abilities; decreased student wastage rates [2]. 3 Setting up SCALE-UP classes at Kaunas University of Applied Sciences The first SCALE-UP classroom at Kaunas University of Applied Sciences was set up in October There are four round tables of six computerized workplaces for the total of 24 students and one computer-equipped workplace for the lecturer. There is a wireless Internet connection. Students can also use their personal computers. Students are able to perform individual or group tasks, demonstrate the results and discuss them in groups or together in the classroom; they can show the results from their workplace via the video projector. All the course material prepared by the lecturer is available in the virtual learning environment. The SCALE-UP project at Kaunas University of Applied Lukšaitė D, Lukšaitė J, Jurkševičiūtė G Sciences is being continued. In October 2014 the second SCALE-UP classroom was opened. 4 Conclusions 1. The newly-equipped class at Kaunas University of Applied Sciences meets all major requirements for SCALE-UP infrastructure and potential to implement a SCALE-UP didactic model. 2. The classroom can be used to teach different exact and technology science subjects (general and specialized): mathematics, physics, information technology, programming, engineering, data management technology, business economics and management, process management and others. 3. Information technologies used in the classroom are easily integrated into the already existing e-learning infrastructure developed at Kaunas University of Applied Sciences and create additional possibilities for active learning and setting up of the studentoriented environment, as well as the development of lecturers qualification by introducing them to the SCALE-UP didactic model and its implementation. Acknowledgments Authors wish to acknowledge Kaunas UAS for possibility to carry out a research. References Baltrušaitis P, Lukšaitė D 2010 Į studentą sutelkta mokymosi aplinka: gerosios praktikos perkėlimas Informacijos technologijų taikymas švietimo sistemoje 2010: patirtis ir perspektyvos. Kauno kolegija Beichner R, Saul J, Abbott D, Morse J, Deardorff D, Allain R, Bonham S, Dancy M, Risley J 2006 Student-Centered Activities for Large Enrollment Undergraduate Programs (SCALE-UP) project Knygoje E. F. Redish and P. J. Cooney (Eds.), PER-Based Reform in University Physics. College Park, MD: American Association of Physics Teachers. The Internet source: ment=1 [Prieiga ]. Bloom B, ed Taxonomy of educational objectives The cognitive domain 1 New York: McKay Bonwell C C, Eison J A 1991 Active learning: Creating excitement in the classroom ASHE-ERIC Higher Education Report No. 1. Washington, DC: George Washington University Clearinghouse on Higher Education. The Internet source: [Prieiga ] Campbell S L, Chancelier J P, Nikoukhah R 2006 Modeling and Simulation in SCILAB Scicos. Sringer Gaffney J, Richards E, Kustusch M B, Ding L, Beichner R 2008 Scaling up education reform Journal of College Science Teaching 37(5) Grzegorz S, Tomasz Z, Andrzej B 2008 Rapid control prototyping with SCILAB/Scicos/RTAI for PC-based ARM-based platforms. Computer Science and Information Technology. IMCSIT Lapinskienė D 2002 Edukacinė studentą įgalinanti studijuoti mokymosi aplinka Daktaro disertacija. KTU Longworth N 1999 Making Lifelong Learning Work: Learning Cities for a Learning Century Great Britain: Kogan page. Moore M 1989 Three types of interaction American Journal of Distance Education 3(2) 1-6 The Internet source: [Access ] Wilson B G 1995 Metaphors for instruction: why we talk about learning environments Educational Technology 35(5) MD Management and Decision Making

122 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Slavyanska V, Dimitrova V, Stankova K Stress management as a factor of project success V Slavyanska, V Dimitrova, K Stankova * *Corresponding author s viara_bfu@abv.bg Abstract The paper is devoted to an important aspect, influencing the effectiveness of the project teams in a multi-project environment, and more concretely it tries to demonstrate the necessity of stress management, as well as to identify opportunities for this. The authors focus consecutively on aspects such as: stress management as a factor of effectiveness of the project activity in a multi-project environment, explaining the essence and importance of the professional stress as a psychological phenomenon, the negative consequences of the stress and the potential stressors at the work place; necessity of stress management in a multi-project environment, explaining the essence and characteristics of the multi-project organization as a natural environment of the project teams and presenting this type of environment as a stress factor; opportunities for stress management in a multi-project environment, including organizational mechanisms and psychological techniques. Keywords: occupational stress, project team, multi-project environment 1 Introduction In recent decades the project work spread in almost all business and non-profit spheres it is extremely difficult to find out some area, which does not apply projects as effective means to realize its organizational mission, strategic and short-term goals, through maximum utilization of the available resources [1]. Among all resources, necessary for the realization of a project, the most important are the human resources and for this reason the project team is unanimously identified as a key factor of success [2]. It is confidently declared that the projects are not only technical systems, but behavioral systems as well, so it is logically the project management to focus more and more on their human aspects, connected with communications, leadership and other elements, oriented towards people [3]. At the same time, despite its extreme importance, the HRM remains the most poorly developed aspect of the project management, saturated with lots of ambiguities and contradictions. Especially scarce is the knowledge in the field of the project team management in a multi-project environment, which delineates as a natural work environment of more and more employees. In this context the present paper is devoted to one important aspect, influencing the effectiveness of the teams in a multi-project environment, and namely work stress. 2 Research methods The main objective of the present theoretical research is to demonstrate the necessity and opportunities for stress management in a multi-project environment. It is reached through performance of the following tasks: 1) To identify the stress management as a key factor of project work effectiveness in a multi-project environment; 2) To discuss opportunities for stress management in a multi-project environment. 3 Results Occupational stress is treated as a main factor of work activity effectiveness, including the project work. This determines the necessity of searching effective mechanisms for its management, which involves its recognition as a psychological phenomenon, consequences and potential sources, and also as specificity in a multi-project environment. 3.1 STRESS MANAGEMENT AS A FACTOR OF THE PROJECT WORK EFFECTIVENESS Stress could be defined in many different ways. Selye defined it in 1936 as a nonspecific response of the body to any demand, whether it is caused by, or results in, pleasant or unpleasant conditions, and later as a state of the organism manifested as a general adaptation syndrome [4]. Occupational stress as a psychological phenomenon. Lazarus and Folkman suggested in 1981 that stress can be thought of as resulting from an "imbalance between demands and resources" or as occurring when "pressure exceeds one's perceived ability to cope". Work-related stress is defined as the adverse reaction people have to excessive pressures or other types of demand placed on them at work [5]. High levels of stress at the workplace could result in: poor decision-making; poor timekeeping; increasing mistakes, leading to more clients complains; increasing sickness absences; poor physical and mental health and wellbeing; poor workplace relations. Stress can affect the business: lost working days; high staff turnover; low morale; reduced work performance; financial losses [6]. The most common stressors at the workplace are: work overload, lack of control, job insecurity, poor work relationships, poor work-life balance, lack of resources and communication, insufficient pay and benefits [7]. Necessity of stress management in a project MD Management and Decision Making

123 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE environment. From the theory and practice is known that the staff members have a better performance when they are relaxed, in harmony and in emotional equilibrium. Therefore, it is extremely important to make efforts to overcome the occupational stress and to regain the emotional balance of the employees. Stress management was developed and premised on the idea that stress is not a direct response to a stressor but rather one's resources and ability to cope mediate the stress response and are amenable to change, thus allowing stress to be controllable [8]. The contemporary organization is more and more oriented to the application of the project approach in the implementation of a big part of its activities, which often leads to the existence of a great number of varied, simultaneously realized projects. It turns out that about 90% of all projects are realized in a multi-project environment, which makes it a natural environment of the project teams. In the course of time the researchers come up to the conclusion that besides all advantages of the project work, its realization in this type of environment actually is characterized by many potential negative effects upon the psychological well-being of the project participants and hence upon the effectiveness of the projects. According to many authors, the multi-project environment creates extremely intensive work load, which can have strongly negative effects on the health, professional development and work-life balance of the employees [9]. It is underlined that the combining of many parallel activities the high work intensity and increased individual responsibility can provoke healthy problems, feeling of overload, difficult synchronization of the professional and personal engagements and interests, and ultimately more stress for the staff [10]. 3.2 POSSIBILITIES FOR STRESS MANAGEMENT IN A PROJECT ENVIRONMENT Slavyanska V, Dimitrova V, Stankova K There are many options for stress management in multiproject environment, treating the stress sources, as well as their effects. Organizational mechanisms for stress management. These mechanisms are directly connected with the elimination (reduction) of the causes of stress. One possible instrument is impoving the manager s attitude, i.e.: attention to the team members competencies and providing training where is needed; monitoring of the workload, developing workload plans/schedules and setting realistic dead-lines; applying effective approach to problem solving; process monitoring in order to improve them; encouraging the position rotation/job enrichment; ensuring the employees that they can do their job/empowerment; coaching instead of pressure; recognizing the necessity of simple support or counseling; encouraging the project team members development; informing the team for everything that happens in the organization; formulating clear goals and objectives; clarifying the roles, expectations and communication channels; holding regular team meetings and face-to-face communication; respecting the working hours; recognizing the efforts of the team members; developing culture of nonjudgement and strategic problem solving; etc. Another organizational mechanism for stress management is improving the project teams staffing. In this way it is possible to achieve optimal distribution of the human resources between the projects in the organization, which to prevent (or even reduce) their excessive work load and respectively all arising negative effects upon their psychological comfort, productivity and development. The projects essentially differ according to their complexity and the contents of the included activities; therefore it is logically the competencies and the personal (psychological) characteristics of the participants to be very different. Practically the type (characteristics) of the project itself should determine the profile of the successful project team, i.e. the suitable combination of participants as professional skills, as well as personal characteristics and preferences. Third possible organizational mechanism for stress management is improving the project team management. Not always the project managers are successful in the team management for many reasons. For example, sometimes they lack skills in the specific technical area of the project, or management skills in the area of the administrative management (planning, organizing and controlling of work, including delegation of tasks and conducting team meetings) and leadership (interpersonal dynamics, conflict management, team motivation). This creates prerequisites for stress and dissatisfaction of the project teams and eventually troubles the realization of the projects in the frames of the determined requirements for time, cost, and quality. Therefore, the improvement of the team management through provision and application of a suitable collection of competencies and management style should also be examined as a possibility for stress management in project environment. Psychological techniques for stress management. According to Selye, the problem is not to avoid or eliminate stress, but to protect us from the harmful stress (distress). It could be overcome not by avoiding work and efforts but engaging in activity that is motivating and pleasant for us. Distress is not related to the working hours or the work complicity, but to the degree of work dissatisfaction [4]. Some concrete psychological techniques for stress management: 1) At personal level tracking the stressors and reactions; developing healthy responses exercise, yoga, breathing, mindfulness, good sleep, limiting caffeine intake; establishing work-life boundaries; finding time to replenish and return to the pre-stress level of functioning work disconnecting; getting support from family members and friends; resisting perfectionism; flipping negative thinking; looking for humor in each situation. 2) At organizational level getting support from the supervisor and co-workers; prioritizing and organizing development of balanced schedule; balancing work and personal life; prioritizing tasks; planning regular short breaks; breaking projects into small steps; delegating responsibility; making compromises; etc. 4 Conclusion One of the essential reasons for the unsuccessful realization of the projects in a multi-project environment is the stress MD Management and Decision Making

124 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE provoked by the simultaneous participation in too many projects, each of them having strict restrictions regarding budget, time and quality. Therefore, the management of Slavyanska V, Dimitrova V, Stankova K stress in the project team is an important factor for elaboration of the project work. Fortunately, there exist many possibilities for this. References Kerzner H 2013 Project management a systems approach to planning, scheduling, and controlling John Willey & Sons Inc. Newton P 2015 Managing a project team. Project skills Accessible at: [ ] Knight J 2016 Project management: project management, management tips and strategies, and how to control a team to complete a project Dimitrova V 2013 Psychology of management Academic publishing house of UARD, Plovdiv and-well-being-among-staff-in-higher-education-jul- 13/pdf/HE_stress_report _July_2013.pdf/ European Agency for Safety and Health, Managing work-related stress and psychosocial risks E-guide, at Work Somaz W H, Tulgan B 2003 Performance under pressure: managing stress in the workplace, Canada, HRD Press Inc. Lazarus R S, Folkman S 1984 Stress, Appraisal and Coping New York: Springer Packendorff J 2002 The temporary society and its enemies: Projects from an individual perspective, in K. Sahlin-Andersson, A. Söderholm, Beyond project management: new perspectives on the temporary - permanent dilemma Copenhagen Business School Press Donnelly R 2006 How "free" is the free worker: An investigation into the working arrangements available to knowledge workers Personnel Review 35(1) MD Management and Decision Making

125 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Mnif J Classroom management problems at private schools 1, 2* Julia Mnif 1 Nour el Maaref Private School, 16 Av. El Bousten, Sfax, Tunisia 2 Laboratoire Approches du Discours, Faculty of Letters and Humanities, University of Sfax, Tunisia *Corresponding authors juliamnif@yahoo.com Abstract This paper explores young learner behavioural problems at private schools in Tunisia. The task is to investigate the reasons of discipline problems in the classroom and to search for the solutions applicable to the current context. For this purpose, the factors influencing learner behaviour are studied separately and in relation to the classroom behaviour. The synthesis of major findings has brought about the following generalisations: the socio-political situation and the family environment have a great impact on the development of behavioural habits in young learners. The conclusions drawn include the necessity for the global changes in educational system and teaching/learning materials and methods used at school. In addition, the teacher training in classroom management is indispensable. The proactive changes are also to be made in private school administration: establishment of fundamental rules or boundaries and a reward system or consequences in case of disrespect; timetable revision; and improvement of school-parents-learners relationships with the focus on the role of every party. Keywords: discipline, classroom management, parents, teachers, school, learners 1 Introduction This paper focuses on the classroom discipline problems in K-9 Tunisian private schools. The research was fostered by the professional experience and interest in educational behaviour. The inquiry area this work is aimed at includes the factors contributing to the misbehaviour at school and the proactive solutions required for the classroom management improvement. 2 Context The current paper discusses school discipline problems in Tunisia, a North-African country undergoing a transitional period after a democratic revolution in The basic education in Tunisia consists of nine years and is divided into two stages: six years of primary and three years of preparatory education, the secondary education afterwards is gained within four years. Both public and private schools are available in the country. However, due to frequent strikes and inevitable extra tutoring stimulated by the aspects such as society influence and inefficient teaching at public schools, a tendency to enrol children into a private school prevails among the middle/upper-middle class of people. Evidently, the private school is seen as a place to provide more than required by the ministry of education. For the purpose of objectivity, this research is based on the professional experience and therefore is limited to preschool-ninth grade basic education at private schools. 3 Classroom management problems Distraction, walking around the classroom, talking to peers, refusing to follow instructions and class rules are among the most frequent disturbances for the teacher. Such behaviour, according to Dunbar (2004) serves to obtain something or to avoid something. It becomes a very effective form of communication and to the child seems reasonable and logical. (p.7). Whose fault is it if these problems occur on the daily basis? Brophy (2006) claims that classroom management refers to actions taken to create and maintain a learning environment conducive to successful instruction (arranging the physical environment, establishing rules and procedures, maintaining students' attention to lessons and engagement in activities) (p. 17). Consequently, it is mainly the responsibility of the teacher to manage the class. However, the discipline problems may have incompatible outcomes and the same teacher may succeed or not succeed in classroom management. The difference between successful and unsuccessful classroom management is caused by the factors which stand behind the discipline problems. 4 Factors which impact student discipline at private schools in Tunisia Based on personal observations, there are several factors which play a role in behavioural attitudes of young learners at Tunisian private schools: 1. Socio-political situation In 2011, Tunisia went through a revolution. The country is still going through a transition from dictatorship to democracy. The problems emerging along this path are economic crisis, political instability and social chaos. The law is not implemented and not always respected, the corruption is widely spread, the unemployment rate is high, MD Management and Decision Making

126 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE pessimistic moods and indifference to what is around conquer the population. Children, therefore, do not have a positive example of patriotism, law respect, environmental protection and community sense. 2. Ineffectiveness of boundaries and consequences Private schools are less strict and are not consistent in applying school rules and consequences in case of disruptive behaviour. This impacts student attitude to the school administration and weakens the efficiency of both preventive and reactive strategies aimed at school discipline improvement. 3. Absence of strict school premises employment and arrangement rules Classroom physical arrangement is not always agreed upon among the teachers in charge of the same class. Presence of distracting objects, i.e. lockers or unnecessary school things and lack of common sense of sharing and being responsible for what one shares, i.e. a classroom or a computer lab, impact the formation of both teacher and, consequently, learner behaviour. 4. Timetable Dissimilarities between timetables at different private schools are minimal. Below is one instance: lessons start at 8:15 and the first nutritional break is at 10:10. From 10:30 to 13:15 there is no break. After lunch, students have lessons from 14:30 to 16:30. Extra classes for weak students can be either from 13:30 to 14:30 or from 16:30 to 17:30. That makes minimum 7 hours, maximum 9 hours of lessons a day with solely 2 short pauses. With the child s ability to stay focused maximum for 20 minutes the problems with discipline are inevitable. 5. Family Education The majority of students come from middle/uppermiddle class families. Many are used to have a maid at home and a driver to take them to school. The basic things like tying shoes, cutting nails or hair, changing clothes are often not taught at home due to the so-called absence of parents. Evidently, the global elements like respect, love, politeness are left for school as well. Many things are taken for granted by young learners. Among those is the academic success which is often seen as something purchased by their parents rather than achieved by themselves. 6. Homework In preschool, class one and two not all the private schools administer homework, however even if the school has a no-homework-policy, there is still much to do to keep up with the program. Starting from class three the homework is given regularly, even for holidays, so that most of the free time is spent on revision, reading, writing and rotten memorisation. 7. Lack of time for extra-curricular activities Many parents enrol their children into private schools due to their job constraints and, therefore, due to the lack of time. They enrol their children into extra-curricular activities but on the premises of the school which means the children spend most of their time where they study and do not attend any clubs outside the school. 8. Teacher Incompetency Teachers play a key role in shaping effective education (Hattie, 2009). Unfortunately, many teachers working at the Mnif J private schools lack training and education to be able to work with young learners and to effectively create both academic and social-emotional learning. 9. Peer influence Children are easily influenced and start following their peers spreading misbehavioural attitudes around the school. 10. Climate An evident effect on young learner behaviour results from the weather conditions in September, October, April and May when the temperature may often rise to C. Children get tired faster and loose ability to stay focused on the task in hand. All of the above mentioned factors play a vital role in the emotional and intellectual development of young learners having a negative impact on their behavioural attitudes. 5 Solutions The multidimensional changes have to be made in several sectors: government priorities and state education, private school policy and family environment. 1. The educational system requires improvement of teaching materials and methodologies. 2. The teacher training should become more seriously organized where special attention should be paid to educational psychology and classroom management put into practice. 3. The teachers employed by the private schools should be strictly preselected according to the pre-set standards. 4. The private school course of action should include preventive school discipline management with clearly set boundaries and consequences for staff, learners and parents without exception. It is proved preventive strategies are more effective than reactive strategies, however the school should also consider reactive strategies that are sometimes needed to reduce disruptive or other undesired student behaviour when preventive strategies do not work (Marzano et al., 2003). 5. The teacher class management style should be based on well-established class rules and consequences in case of disrespectful behaviour. A system of class rewards should serve every teacher as a way to motivate learners and decrease the discipline problems. 6. Classroom seating arrangement needs to be agreed upon (Dunbar, 2014) and presence of distracting things, e.g. lockers learners can walk to, windows, unnecessary school things on the desks should be eliminated to keep students on task. 7. The timetable should be improved and the homework policy-reconsidered. Children require more time for extra-curricular activities outside school. 8. The weather conditions should be taken into consideration providing air-conditioners/fans and indoor recreational halls and substituting outdoor recreation with indoor pauses. 9. The role of the family should be given more importance and parents should be encouraged to actively participate in their children education to MD Management and Decision Making

127 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE minimize the negative influence of school peers and to boost every learner s self-discipline and sense of responsibility for academic success. 6 Conclusions The current paper attempts to call for changes in the educational system, school administration principles, teacher class management styles, family responsibilities and human attitudes to make the classroom in Tunisian private schools a healthier and more effective place for both the Mnif J teacher and the learners. This area of inquiry is acute and hides opportunities for future researchers to add missing blocks to the current paper which can help improve educational atmosphere in more practical rather than theoretical way. Acknowledgements I wish to acknowledge with much appreciation the role of my friend and colleague, I Rebai, an FSL teacher, Tunisia, who provided me with encouragement and constructive advice. References Brophy J 2006 History of Research on Classroom Management. In Evertson C M, Weinstein C S (Eds.) Handbook of classroom management. Research, practice, and contemporary issues Lawrence Erlbaum Associates, Inc: Malwah, NJ pp Dunbar C 2004 Best Practices in Classroom Management Michigan State University: Michigan Evertson C M, Weinstein C S (Eds.) 2006 Handbook of classroom management. Research, practice, and contemporary issues. Lawrence Erlbaum Associates, Inc: Malwah, NJ Hattie J 2009 Visible learning: A synthesis of over 800 meta-analyses relating to achievement Routledge: London; New York Korpershoek H, Harms T, de Boer H, van Kuijk M, Doolaard S 2014 Effective classroom management strategies and classroom management programs for educational practice: A meta-analysis of the effects of classroom management strategies and classroom management programs on students academic, behavioural, emotional, and motivational outcomes Groningen: RUG/GION Marzano R J, Marzano J S, Pickering D J 2003 Classroom management that works. Research-based strategies for every teacher Association for Supervision and Curriculum Development (ASCD): Alexandria, VA MD Management and Decision Making

128 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Bakalo N V Excursion activity as a factor of forming the image of the territory N V Bakalo Tourism and Administration Department Poltava National Technical Yuri Kondratyuk University, Pershotravnevyi Avenue, 24, Poltava, Ukraine, Abstract Excursion activity is a very complex and problematic sphere of the modern tourist industry. It combines many tasks to meet the aesthetic, spiritual and information needs of the tourist. For the qualitative performance of the functions of excursion, the image of the territory is of great importance. Keywords: market segment, situation, growth rate, volume of sales 1 Introduction The image of the territory is a set of beliefs and feelings of people that arise because of the natural and climatic, ethnographic, historical, socio-economic, political, cultural characteristics of the territory. That is, it is its image that has developed in a wide range of people: the inhabitants of the territory, tourists, people who visited this territory and people who have at least some idea of it. There are the following types of image of the territory: positive; Poorly expressed; Superfluous traditional; contradictory; mixed; negative; Is excessively attractive. The image of the region is a very diverse, emotionally colored, artificially created image, consisting in the minds of people. The image of the region is controlled by the administration, the media, prominent figures of various spheres of society, the population of the region and the settlements that make up this region. 2 Main part The objective component of the tourist image of the territory is the combination of competitive advantages and shortcomings that affect the general excursion activity of the region. This component is attributed to the specialization of the region, the available tourist potential, the level of development of tourism infrastructure and social sphere, investment attractiveness and so on. The second component of the tourist image of the territory is subjective and depends on certain actions of people who form certain ideas about the region: First, it is the assessment of the region by its consumers - the authorities, local residents, tourists, entrepreneurs, investors, based on their own experience and observations. Secondly, this is the actions of the local authorities, their attitude to the tourism sphere, image-making and the need to promote the territory as a single tourist product. The image of the region depends on the nature of the relationship of all participants in the process of its formation. When researching the subjective component of the formation of the image of the territory, it is necessary to take into account the actions of the media, using competently which can achieve significant success in promoting the created image in the target groups. For the development of excursion is not enough only economic, resource and cultural grounds. It is necessary to have a well-formed tourist image of the territory, which will "work" on the region. This image is formed taking into account the level of the economy, the level of development of infrastructure, transport, services, uniqueness and exotic nature and historical and cultural sites, the ecological condition of the territory, as well as its general attractiveness. 3 Conclusions So, it can be said that excursion activity can influence the positive image of the territory, just as the already existing image of a particular country or region influences the tourism industry. In order to avoid a number of negative consequences that affect the quality of excursions, it is important not to ignore the phenomenon of the image of the territory. Therefore, image occupies an important place in a number of such concepts as rating, reputation, fame, prestige, authority. MD Management and Decision Making

129 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Bezrukova N, Buriak A The role of developing countries in the modern international trade N Bezrukova*, A Buriak Poltava National Technical Yurii Kondratuyk University, Poltava region, Ukraine *Corresponding author s n_bezrukova@mail.ru Abstract The authors analyze the position of different countries in international trade relations and prove that the role of developing countries is growing. Keywords: developing countries, modern international trade The main factor affecting the modern global economy is globalization. The globalization process is characterized by the contradictory effects on the national economies. A few years ago the main trade flows were concentrated within developed countries. Those countries provided goods, especially knowledge-intensive ones, all over the world. Now we can observe the changes in the global economic environment. Developing countries play a more important TABLE 1 World production volume (real GDP), annual change in % role. In these countries, GDP and foreign trade are growing more rapidly than in developed countries [1]. Really, most of the intellectual and technical potential of humanity is concentrated in developed countries. But the role of developing countries in the global economy, the newly industrialized countries in particular, is gradually increasing (Table 1). Index Mean Value Predictions World 4,0 5,7 3,1 0,0 5,4 3,8 4,0 Countries with developed economies 2,8 2,8 0,2-3,4 3,1 2,4 1,9 Developing countries 5,5 8,7 5,8 3,1 7,4 4,7 5,3 So, innovative development and global competitive advantage of the developing countries will lead to an increase in their share in the gross world product [2]. In the future, countries like China, India, Brazil, South Korea and other developing countries will provide most of the world's gross domestic product. They will become a new pole of the global economy. The economies of Mexico, Indonesia, Malaysia, Hong Kong, Singapore, and the Philippines are dynamically developing along with the economies of India and China. Foreign trade is quite rapidly increasing in these countries, its share of intermediate products has amounted to 50-60%, while the import component of exported goods has increased from 20% in the 1970s to 40% presently [3]. The volume of foreign trade in the developing countries is growing more rapidly than in developed countries (Table 2) [4, 5]. References International Monetary Fund: World Economic Outlook: a Survey by the Staff of the International Monetary Fund (2015) [Online] Available from: weodata/index.aspx National Intelligence Council: Global Trends 2035: Alternative Worlds 2012 Available from: national-intelligence-council-global-trends World Trade Organization: The Future of Trade: the Challenges of TABLE 2 The volume of world trade (percentage change) Index Import of the countries with developed economies 2,1 3,3 3,3 4,3 Import of the developing countries and countries with 5,5 3, ,5 emerging markets Export of the countries with developed economies 3,1 3,3 3,2 4,1 Export of the developing countries and countries with emerging markets 4,6 3,4 5,3 5,7 In other words, while a few years ago the developed countries had leading positions in international trade, at present, the role of developing countries is gradually increasing. China, India, Brazil in particular could be distinguished in this aspect. In addition, these countries are now not only target markets, but also the world's largest exporters. Convergence 2012 Available from: publications_e/future_of_trade_e.htm UNCTAD: Handbook of Statistics 2016 Available from: UNCTAD: World Investment Report 2016 Available from: MD Management and Decision Making

130 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Frolenoka B, Dukule O Personnel adaptation in the workplace, the quality of working life and subjective well-being Abstract B Frolenoka, O Dukule* *Corresponding author s odukule@yahoo.co.uk The process of personnel adaptation in the workplace is reviewed in this paper. In many works, this question is regarded as involvement in someone s job. The analysis of scientific publications has shown that personnel adaptation in the company directly depends on a company s corporate culture. Successful adaptation influences an employee s quality of working life and professional wellbeing. The model describing professional wellbeing, taken from the field of psychology, has been commented on in this paper. In addition, topical issues regarding personnel adaptation types and stages are addressed. The approaches to designing organizational programmes, which aim at improving and optimising adaptation process, at decreasing stress levels during adaption and at increasing professional wellbeing are outlined in the pap Keywords: Personnel adaptation, quality of working life, motivation, corporate culture, professional wellbeing, job-related stress, involvement in one s job 1 Introduction Currently, many changes are being brought to economic and political spheres in Latvia. People were actively registering their small size businesses and start-ups during the past years. The present paper presents the results of the research on personnel adaptation process in the workplace, in small companies in Latvia. During the research of these issues, it was found that adaptation of newly hired personnel, its training and retention are seen as acute problems that are dealt with by personnel management. In present days, graduates apply for a job in such companies to receive hands-on experience and to acquire length of service in the field relevant to their university studies. Moreover, adaptation period plays an important role even for specialists with secondary adaptation and with hands-on experience. Regardless of the previous job experience, it is successful adaptation that defines a new employee s efficiency, and the time a new employee will stay in the company. It was also noted that personnel adaptation in the company is directly connected with the company s corporate culture, it typology and elements. Taking into consideration the research findings, it is possible to assume that an employee s quality of working life and professional wellbeing depends on successful adaptation. All this affects the operation of companies and society. Therefore, the aim of the present research is the following: to study personnel adaptation in the workplace, the quality of working life and professional wellbeing. The research was carried out in cooperation with small size businesses with limited liability that enrol up to 10 employees and with microenterprises in Latvia. Their employees, from different age groups, participated in the research. The research was anonymous. 2 Outlining methodology The secondary research on personnel adaptation, the quality of working life and professional wellbeing was carried out within the present work. The following methods were used to achieve the aim of the research: 1. Work-Relation Quality of Life (WRQoL) Scale, Simon Easton, Peter Warr, Job - related affects and behaviours, A questionnaire based on problems arising during adaptation in the workplace was designed. The total number of employees that took part in the research was 245. The research was carried out from October 2016 till February Findings of the research Professional wellbeing is a new subject under scientific research. There are few publications in the field of psychology that deal with an individual s wellbeing related to his or her professional activity during his or her work; these publications, considered as scientific studies, appeared in the late 1980s. A model of professional wellbeing proposed by Peter Warr is one of the widely known approaches developed abroad and used in the psychology to study wellbeing in the professional context. This model was designed in the late 1980s; wellbeing is shown from the perspective of professional activities in the model. (Warr, 1990). This allows us to discuss the importance of understanding personnel needs, the significance of interconnection between adaptation, motivation, the quality of working life, corporate culture and professional wellbeing. 4 Research results Thereby, the following suggestions can be made to optimize the personnel adaptation process in the workplace: 1. Adaptation is a complex psychological process during which an employee enters new employment relationships. It is a subject s reaction towards the changes in his or her work life conditions. It is possible to manage this reaction if its main tasks are identified: making the process of integration in a new MD Management and Decision Making

131 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE group of colleagues easier, decreasing the anxiety level and diminishing the lack of confidence, increasing job satisfaction. 2. The adaptation process depends on clear and proper actions of the whole group of colleagues, on the designed personnel adaptation programme and on the introductory instruction. 3. Nowadays, new opportunities to implement the changes in the adaptation process with the aim to improve it are being created. 4. Adaptation success is determined by: High level of initial knowledge and skills Interest in the organization and in a new job, and in the future perspectives Having necessary character traits and psychological characteristic Timely assistance from colleagues, the supervisor and the manager The ability to envisage difficulties and timely react to situations 5 Conclusions 1. As the respondents included both personnel with primary and secondary adaptation, their answers to the distributed questionnaire differed. 2. The recent graduates experienced certain difficulties in adaptation to a new workplace. These difficulties include the lack of practical skills, the lack of skills regarding communication with clients and colleagues, as well as they had some difficulties in professional and organizational-administrative adaptation. 3. Newly hired employees who had previous work experience had minor difficulties during adaptation. Newly hired employees usually did not have any Frolenoka B, Dukule O difficulties in professional and organizationaladministrative adaptation. 4. Regarding supervision, the opinions of respondents were split. A half of the employees believes that a specialist needs a supervisor; this helps the recent graduate to receive work experience and a certain set of practical skills and competences that are necessary in their careers. 5. The majority of the respondents believe that it is necessary to ensure every new employee and a recent graduate with a supervisor for the time period from one to six months in average. 6. The personnel, in general, did not experience any difficulties in adaptation to a new work team. 5.2 FEATURES OF SUCCESSFUL ADAPTATION ARE: Acquisition of professional knowledge and skills Showing true interest in the organisation and in work that begins playing even more significant role in life Feeling connection with a profession and satisfaction with the increase in the quality of working life Having and understanding your life goals as well as being satisfied with self-fulfilment The connection between the adaptation in the workplace, the quality of working life and well-being It is necessary to plan development and to examine how the set goals can be attained to increase the personnel competitiveness in the labour market, to decrease the influence of stress and to raise and improve personnel wellbeing. It is crucial to help personnel to adapt to a new workplace, to overcome stress, to strengthen self-esteem and to increase confidence in oneself and in one s profession; thereby, improving the quality of working life and increasing personnel s well-being. References Spule A 2004 Praktskais personālmenedžments, Turība, 297 (in Latvian) Warr P 2014 Four-guadrant investigation of job-relaited afekts and behaviours European Journal of Work and Ofganizational Psychology Nucho A, Vidnere M 2004 Stress: Tā pārvarēšana un profilakse. Rīga 17., 22., 77 (In Latvian) MD Management and Decision Making

132 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Glebova A, Zernyuk O Restructuring and reengineering of organizational and economic mechanism for rail transport A Glebova, O Zernyuk * Poltava National Technical Yuri Kondratyuk University, Tourism and Administration Department, Pershotravneviy Avenue, 24, Poltava, Ukraine *Corresponding author s alliaglebova@gmail.com Abstract The article discusses the restructuring of railway undertakings. Identify the features of the restructuring process management systems of railway undertakings. It is proposed to use reengineering methodology for the management restructuring of railway undertakings. Keywords: restructuring, reengineering, кailway transport 1 Introduction Nowadays the state-level reform process needed for rail transport, the development of competitive market of transport services: accelerate the modernization of production and technical base, liberalization in pricing, development of new approaches in innovation and investment policy, including attracting foreign and domestic private capital in the form of joint ventures, leasing, continue and accelerate the integration of transport system of Ukraine to European and global transport systems based on the principles of European transport policy, adapting national legislation to international transport and customs law; alignment to international standards, specifications, technical, operational and environmental requirements in the field of transport. 2 Main part The analysis of world and domestic practice of reforming railway transport points to the need consideration of these features, including: 1) signs of natural monopoly, will always be inherent in the businesses and organizations in the industry; 2) the possibility of widespread use of the potential benefits of the corporate form of ownership (first, it is to combine various capital, that will allow to reduce the number of economic risks; in - the second, it is the union of capital, skills, knowledge and ideas) 3) the ability to use a wide combination of different forms of corporate associations 4) the need to use different forms of control institutional, management and operational levels by the state for the use of strategic resources References Yevtushevskyy V A 2002 Essentials of Corporate Governance: Training Guidances 317p. 5) the possibility of monopoly profits, which can be used as an incentive, that is the driving force of innovation and reward for innovation; 6) the impact of the infrastructure on railway development and possibility second species transport; 7) the presence of preconditions for restructuring based on reengineering, which will enable: first, to identify the main business - processes and create for them an information base; in - the second, to assess the situation, prospects disadvantages of business associations, services, directorates; in - third, a transparent system of financing, management and pricing; by - fourth, introduce modern technologies of information, that will increase the flexibility of the industry and its competitiveness; fifthly, to introduce balanced scorecard system that is widely used by the public sector services. 3 Conclusions The main advantage of corporate restructuring based reengineering lies in, it forms discipline the process of implementing the strategy and specifies its goals through indicators, targets and initiatives in four key perspectives: customers, internal processes, finances, learning and growth. Also in the process of corporate restructuring management rail have more opportunities for the implementation of EU directives, gains and reengineering facilitate their practical implementation. In our opinion, reengineering as one of modern management contains a complete methodology changes internal parameters management system and its elements and corporate restructuring - external parameters. Eliferov V G, Repin V V 2004 Business - processes: Regulation and management: the Textbook 319 (Textbooks for the MBA program) MD Management and Decision Making

133 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Grishnova O, Abramovich I International experience of the digital technologies implementation in human resource management Olena Grishnova, Igor Abramovich Abstract The development of digital technologies is a worldwide trend and a necessary condition of effective human resource management of the modern organization. The most widespread digital HR acquired in Japan, North America and Europe. The development of the digital technologies in human resource management has contributed to implementing of international HR-standards that should taking into account specifics of human resource management, national legislation and established business practices. Keywords: digital HR, international standards of human resource management, digital technologies 1 Introduction Distribution of digital technologies is simultaneously a vector of modern technologies development of enterprise management, the organization of all its business processes, and a factor that predetermines change of content of labor and forms of its organization, and a new direction of improving labor productivity. Personnel processes in the modern organization can't already be provided without specialized information systems that allow to automate the selection processes, HR records and an employee administration, internal communications, preparation of HR analytics, an assessment, adaptation and personnel development, distance training and HR branding. 2 Overview of the study area The results of the Deloitte research [3] demonstrates that digital approach in HR is developing rapidly, but in 2016 only 38% of the companies thought of implementation of such technologies and only 9% are completely ready to their implementation; 72% of the companies consider that it is an important priority for them and 32% determine it as very important priority. Most often companies recognize the importance and priority of the digital HR in Japan, the countries of North America and Europe that is caused, first of all, by the high level of technology development of these countries and regions. Implementation of the digital technologies in human resource management processes is performed in the following directions [1, p. 53]: work with mobile applications (transfer of HR of processes on a platform of applications for smartphones); a cloud computing (use of the software based on online technologies); work with analytics (collection and the analysis of data, individualization of approaches to training and motivation on the basis of accumulation of personal information); media and digital technologies (the translation of all materials in convenient for perception a format); HR platform (creation of the single consolidated platform for all HR processes). The development of digital technologies in personnel management is promoted by implementation of the international HR standards ISO/ТС Human resources management (ISO/AWI Human resource management Knowledge management system; ISO/DIS Human resource management Guidelines on recruitment; ISO/DIS Human resource management Guidelines on human governance; ISO/NP Guidelines Human Capital Reporting for Internal and External Stakeholders ets.), the standarts of the American National Standards Institute ANSI (Cost-per-hire; Performance Management ets); British Standards Institution - BSI (BS Human resource - Valuing people- Management system - Requirements and guidance), Hong Kong Institute of Human Resource Management - HKIHRM (HR Professional Standards Model-Creating Values For You and For Organisations) ets. It should be noted that since 2015 according to the results of the research of Deloitte [3], the DuPont Company, for example, began the implementation of the large project on replacement, simplification and merging of all HR processes and educational systems in the single integrated portal. Instead of offering traditional separate application, the company developed the advanced interface on a new platform that led to productivity improvement [2]. Telstra is one of the largest telecommunication companies in Australia uses the application Design Thinking for tracking of the first year of work of the new employee. Using and studying behavior of first year employees, and also their development as persons, Telstra developed the comprehensive program of adaptation that involves employees to work more actively and promotes their retention [1]. 3 Conclusion The implementation of digital technologies, the best practices of the human resource management is the MD Management and Decision Making

134 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE important direction of efficiency improvement of all personnel processes and consequently increase of the efficiency of activities of a modern organization. The implementation of digital approach yields the best results in HR processes of search, selection, an onboarding, personnel developments and the organizations of daily work. Grishnova O, Abramovich I Digitalization is directed to improvement of quality of labor life, reduction of time of implementation of personnel processes and is one of the leading trends of modern business that is connected with the acceleration of development of modern information and communication technologies, globalization processes. References Грішнова О А, Заїчко О С 2016 Новітні технології в економіці персоналу: нові можливості й нові виклики / О.А. Грішнова, О.С. Заїчко Вісник економічної науки України 2(31) 52-7 Dupont. Cultural Maturity The True Measure of Progress. Dupont 2016 Avatiable at: solutions/subbrands/operational-risk-management/products/ culturalmaturity.html Volini E, Walsh B, Yoshida R, Stephan, Uzawa S 2016 Digital HR: Revolution, not evolution Deloite University Press Avatiable at: MD Management and Decision Making

135 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Ignatenko Y, Shumak J Prospects of creation of regional innovation cluster Y Ignatenko, J Shumak Polessky State University, Dnieper Flotilla Street, 23, Pinsk, Republic of Belarus *Corresponding author s Julia_ignatenko@tut.by Abstract The article substantiates the need of creation a regional innovation cluster of biotechnology. The article briefly describes the methodology for stratifying focus groups of innovation recipients in a regional cluster, which will be important in developing a sound socio-economic and personnel regional policy, determining the set of measures and actions of the national and local government, management of the enterprises, centers of innovation for innovative development of regions. Keywords: cluster, region, innovation, focus groups, stratification Today one of the most promising areas of innovation development of the Republic of Belarus is the introduction cluster models into the practice of management and control, which suggests the widespread in our country this form of integration of science, education and industry, as clusters. An important area of management tasks within the framework of regional innovation cluster is the development of an appropriate model of development. In this regard, the high scientific and practical relevance of the development tools of structuring and strategic evaluation of the focus group of beneficiaries in the project of innovation cluster - recipients of innovations. Innovation needs of enterprises-participants of the regional innovation cluster is largely determined by the accumulated problems of their activities. The domain of definition of these problems is in two main dimensions: financial management, and production management. Combining stratification ideas with known locations of project management technology can complement the model of strategic development of enterprises in regional innovation cluster monitoring system that allows to understand how to effectively solve the most acute problems and to reveal the innovative potential of a member of the cluster [1]. There is growing interest in the creation of clusters from the scientific community and public authorities. World experience shows that there are three options for the formation of clusters, with each of them must be part of the university: 1) clusters as a result of cooperation between enterprises; 2) clusters on the basis of innovative structures (technoparks and business incubators); 3) clusters around or technological research universities. In Brest region Polessky State University is developing as a research center, providing the integration of research, learning and application of research results in practice [2, p.8]. Nowadays Polessky University has sufficient capacity to become a scientific center of regional innovative biotechnology cluster in the Brest region. Historically developed agricultural specialization of the regional economy will also affect the specialization of a regional cluster dynamically developing agro-industrial complex of the region provides more than 27% of the national export of food-products. The agrarian specialization of the Brest region is manifested in the structure of industry, in which the largest share is occupied by the food industry (48% of the total volume of industrial production). An important segment in the structure of the region's production is also occupied by machine building and metal working (14%), light industry (4.5%), construction industry (4.4%) and furniture production (5%) [3]. The focus group of the innovative cluster of the Brest region can be represented by more than 300 enterprises of the agro-industrial sector. To assess the problems of each potential cluster participant and develop innovative projects that solve these problems within the innovation cluster, a stratification technique for the subjects of the agro-industrial complex as the focus group of the regional innovation cluster project is needed. The developed methodology will allow to allocate segments within the target group, depending on their problems, innovative capabilities and needs. Stratification will be based on, firstly, assessing and comparing the performance indicators of enterprises of the target group for a number of periods, and secondly, comparing the performance indicators before and after entering the cluster. From the stratification follows groups of problems and packages of innovative solutions for enterprises participating in the regional innovation cluster. The results of the stratification of focus groups according to the methodology developed by the authors are addressed to: regional authorities for making objective personnel and organizational decisions and assessing the effectiveness of previous measures; a center for innovative developments to focus projects on the needs and problems of individual strata of the focus group; to the enterprises-participants of the innovative cluster for assessing their positions in the region and developing a strategy for raising it. References Ignatenko J V 2016 Stratification of target groups of innovation recipients in an innovation cluster Enonomy and Banks Shebeko K K 2015 The concept of creating an innovative scientific and industrial cluster in the Polessky region / K.K.Shebeko, V.N.Shtepa, S.P.Vertai Economy and Banks Official site of the Brest Regional Executive Committee Access mode: Data of access: MD Management and Decision Making

136 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Kryukova E, Makeyeva D Integration of modern business technology in a virtual learning environment of the Russian professionals tourism industry Abstract E Kryukova*, D Makeyeva Russian State Social University, , Moscow, Wilhelm Pieck st., 4/1 *Corresponding author s egelni@yandex.ru This article examines the information technology education as an effective means of implementing the practice-oriented approach in training and the involvement of students in entrepreneurship. This article provides guidance on new ways to use information technology in higher education. Keywords: tourism, hospitality, in-formational educational technology, training, educational software 1 Introduction In each field of activity there are a number of problems that should be eliminated as far as possible, and information technologies are no exception. At this stage of development, the society has faced the problem of integrating information technologies into various fields of activity. Information technology is constantly evolving at an incredible speed, whether it is genius or an ordinary person, it is simply impossible to cover the whole array of changing, evolving information, technologies, programs, because each industry, needs its own knowledge and unique experience. Identification of problems of integration and further search for solutions to these problems will help to choose the right ways of development, education and stimulation of society [1]. At the present stage of economic development, the issue of integrating business technologies into the educational environment is of particular importance. Since the process is new for the education sector, the legislation is not fully developed, organizations face many problems when integrating and implementing educational programs using modern business technologies, in this context, in our opinion, it is interesting to study the experience of advanced universities [2]. One of many factors is how this problem is solved by the FSHEI HE «Russian State Social University», Moscow, Russia, with the preparation of bachelors in the field of training «Tourism». The policy in the sphere of education of the Russian Federation is aimed at resolving the sounded problem, so the main trends of the State Program of the Russian Federation "Development of Education" for are: Applied undergraduate programs should provide application qualifications By 2018, the share of applied bachelors should be at least 30 percent of the total number of students in educational institutions under programs of higher professional education. The applied bachelor's degree will allow eliminating the social gap between the high social status inherent to graduates of higher educational institutions and the labor market demand in working cadres who can work on high-tech equipment. Within the framework of the state policy in the field of education, the applied bachelor's degree is an educational qualification awarded to a graduate who has completed the basic educational program of higher education at the bachelor's level with the competence to solve technological problems in various spheres of social and economic activity ready to start professional activity immediately after graduation [3]. Thus, speaking about the direction of tourism preparation, we note that this direction as no other is required in the learning process of obtaining practical skills, taking into account the specifics of professional activity. So, within the framework of mastering the professionally applied competence, a graduate of the bachelor's degree program with the qualification "applied bachelor" in the framework of GEF3 +, should have the ability to promote and implement a tourist product using information and communication technologies (this is in particular PPK-2 (professionally applied competence) - 2, in accordance with GEF 3+). To perform the task in our opinion and experience, it is simply necessary to integrate the business technologies of the tourist business into the educational environment, and taking into account the current trends in the development of educational technologies, into the electronic educational environment. The last ones were the one of the main vectors of RSSU recently. Electronic education is a supplement and extension of the classical educational process. In fact, a comprehensive educational environment is created at the RSSU, where there will be classroom activities, placement of control materials in the network, and consultations - both full-time and in chat - and many other forms of interaction. Note that the electronic educational environment is now being introduced in all the leading universities of the world [4]. As part of the implementation of the academic discipline, specifically the module included in the discipline, the dynamic packaging system gives the trainees new opportunities, not only to test the theory or to obtain sufficient practical benefits, but also to earn money. So what are the specific opportunities given by the system: 1. Business activities without discontinuing educational process, implementation of the first MD Management and Decision Making

137 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE commercial experience within the framework of consolidating project student travel club ; 2. Obtaining practical skills in marketing and PR on the example of promotion and implementation of tourism services; 3. Use of advantages of package tariffs from hotels, airlines and aggregators of tourist services. 4. Exchange of information and experience among learners; 5. Creation of a virtual (professional) environment for communication, analog capabilities of social networks, but having a specific specialization, "clean" from "outside information". One of the first in this direction was the partner Inna-tour, in July 2014 INNA TOUR launched the BOOKINNA service - the first Russian platform of dynamic packaging. Dynamic packaging is a new technology for the formation and sale of Kryukova E, Makeyeva D tourist products through direct access to the resource systems of airlines, hotels and aggregators of travel services. The use of these business technologies in the educational process is aimed not only at the student, but also the scientific and pedagogical staff, which in turn has the opportunity to demonstrate to the students and to improve themselves. In addition, theory and practice do not go beyond the limits of the university. And finally we will get - the creation of a tourist community in a student environment [5]. On the part of the administration of the university, this process is also indisputably interesting, it allows to significantly increase the competitiveness of the educational program implemented in the RSSU, motivate both the NDP and students to a quality educational process, reduce the transformational and transaction costs, and most importantly, to prepare worthy qualified practitioners. References Makeeva D, Kryukova E, Mukhomorova I, Kaurova O 2016 Vocational education in Russia: course for survival Social policy and sociology 15 4(117) Order of the Ministry of Education and Science of N 1463 "On the approval of the federal state educational standard of higher education in the field of training Tourism (bachelor's level)" (Registered in the Ministry of Justice of Russia on 01/19/2016 N 40639) Kryukova E, Baranova T, Kropotkina S, Timoshina E 2016 Use of information educational technologies in the process of training personnel in tourism and hospitality Scientific notes of the Russian State Social University 15 1(134) MD Management and Decision Making

138 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Khudolii Y, Zavora T, Svistun L Preconditions for the introduction of thermo-modernization measures of the housing fund in Ukraine Y Khudolii *, T Zavora, L Svistun Poltava National Technical Yuri Kondratyuk University, Finance and Banking Department, Pershotravneviy Avenue, 24, Poltava, Ukraine *Corresponding author s yul.dov@gmail.com Abstract In the theses, we determined the preconditions for the introduction of measures for the thermo-modernization of housing stock in the context of increasing its energy efficiency. An analysis of the current state of the housing sector and the state housing policy in Ukraine was realized. We have disclosed the structure of housing and communal services and analysed the debt of the population on their payment. Based on analysis of the solvency of the Ukrainian population and providing subsidies to households we came to the conclusion about the need to reduce the inefficient use of energy resources. In the conclusions, we determined the prospects for further research on this issue, which consist in the need for the formation of methodological support for real estate market monitoring in terms of energy efficiency and energy conservation and the search for financing mechanisms for the thermo-modernization of housing stock. Keywords: thermo-modernization, housing stock, energy efficiency, financing mechanisms 1 Introduction In the years of independence, housing reform in Ukraine was purely declarative. The analysis of the state housing stock showed that a significant part of it, where about 50% of the country's population lives, is in an emergency condition or is obsolete and requires major repairs. According to experts of the Ministry of Regional Development as of January 1, 2017, more than 70% of the housing stock needs thermo-modernization. In this regard, more than 40,000 multi-storey buildings need to increase their energy efficiency and reduce energy consumption through thermal upgrading. population of Ukraine. Having analysed the regional distribution of the debt of the population for August 2016, we have concluded that the largest share of the debt for gas supply. The lowest debt of all types of housing and communal services are Kyiv, Dnipropetrovsk, Kharkiv and Odessa regions and the greatest - Ternopil and Cherkasy region. In turn, the problem of improving the quality of housing and communal services is closely linked with the consumers understanding the need to timely and fully pay for the services received. 2 An analysis of preconditions for the thermomodernization of housing stock Another factor for the urgency of a thermo process is the growth of the consumer price index on utilities, reducing the solvency of the population and the late payment of wages. Thus, the consumer price index for utilities tended to increase during September September 2015; it had a negative impact on the level of solvency of the population for housing and communal services. The increase in prices (tariffs) for housing, water, electricity, gas and other fuels by 3.7% was mainly due to an increase in electricity tariffs by 27.8%. An analysis of the distribution of the level of payment by the population of housing and communal services across regions showed that Cherkasy (141%), Zhytomyr (139.6%), Khmelnytskiy (139.5%), regions have the highest level of payment and Sumy (43.8%) and Ivano- Frankivsk (42.1%) regions have the lowest level of payment (Figure 1). This situation is due to the increase in the price of housing and communal services and low wages of the FIGURE 1 Regional distribution of payment for housing and communal services in January-August 2016 A separate reason for the urgent thermal modernization of housing stock is the imperfection of the management system of housing and communal services in Ukraine and the delay in its reform, which resulted in the industry's failure to work effectively in market conditions and provide MD Management and Decision Making

139 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE consumers with services of the appropriate level and quality. To improve the situation with payment of housing and communal services and strengthen social protection of the most vulnerable segments of the population in Ukraine, since 2014, the instrument of the government subsidies has been actively used. Subsidies for payment of housing and communal services are provided to citizens by state authorities and local authorities within the social norms of housing space and the norms of consumption of communal services, taking into account the subsistence level, the aggregate family income and operating benefits. The number of households receiving subsidies accounted for 34.5% of the total number of households in August Among the regions, the larger part of such households was in the Sumy and Ternopil regions (58.8% and 54.9%, respectively), and the lowest in the Odessa region and Kiev (12.6% and 18.8%, respectively). The total amount of subsidies allocated to households was million UAH (in urban settlements million UAH, in rural areas million UAH) in January-August 2016, in the corresponding period of million UAH (in urban settlements million UAH, in rural areas million UAH). The analysis of the state of housing and communal services, the solvency of the population of Ukraine and the provision of subsidies to households allows us to assert about the need to reduce inefficient consumption of energy resources. Given the scarcity of energy in Ukraine, import volume that is 75% natural gas and 85% of oil and petroleum products, we conclude that the structure of the energy balance is critical and is unacceptable from the standpoint of energy security. In this connection, energy saving is one of the priority directions of Ukraine's development. Out-dated energy-consuming production base, together with the established social stereotypes is a real obstacle to the formation of the energy-efficient economy. At the same time, energy production costs, create a huge potential for implementing policies in the field of energy conservation and efficient energy consumption. All of the Khudolii Y, Zavora T, Svistun L foregoing requires a focused state energy policy which will take into account the possibility of Ukraine's domestic production of hydrocarbons, the development of restoring energy and energy saving, transition economy to a broad introduction into production innovation. During there is a stable dynamics of the reduction in gas consumption by the population, heatgenerating enterprises and budget organizations. The total reduction of gas consumption in the heating season 2015/2016 in relation to the heating season of 2013/2014 is 7.2 billion m3, (30%), including the population's consumption from to 9.6 billion m3 (or 32%); HCE from 8.8 to 6.38 billion M3 (or 27%); budget from 0.73 to 0.49 billion m3 (or 33%). Along with a reduction in gas consumption in order to increase the energy security of Ukraine is necessary to increase the use of renewable energy sources. State policy should be aimed at energy saving, energy efficiency and rational use of resources and economic energy expenditure. 3 Conclusions Thus, the increase in consumer prices, the growth of debt in wages and pensions, lead to an increase in the debt of Ukrainian citizens for housing and communal services. In the conditions of the constant increase of prices for energy carriers, the uncertainty of the situation with the supply of natural gas at the state level, it is necessary to take measures to stimulate energy saving in the housing stock, including by carrying out its thermo-modernization. So, the current state of the real estate market in terms of energy conservation, which is at the stage of formation, requires increasing its efficiency. Prospects for further research on this issue include the need to develop methodological support, in particular, the choice of methods and tools for monitoring the real estate market in terms of energy efficiency and energy conservation and the search for financial support for its thermal upgrading. References The new energy strategy of Ukraine until 2020: security, energy efficiency, competition 2015 Retrieved from Onishchenko V, Zavora T 2011 Organizational and economic aspects of modern housing policy: a regional dimension Poltava, Ukraine: PoltNTU Svistun L 2016 Preconditions and trends of energy efficiency providing of housing and utilities in Ukraine Young scientist Svistun L, Dovgal Y 2014 Mortgage lending in Ukraine: current problems and development factors Poltava, Ukraine: PoltNTU Svystun L, Khudolii Y, Zavora T 2016 Directions of energy efficiency in the construction sector in view of the foreign experience. Energy efficiency of the economy: problems of today and tomorrow: International scientificpractical conference, October Zavora T 2014 Prerequisites for the development of energy efficient housing construction in Ukraine. The 12th International Conference Information Technologies and Management 2014 April Zavora T 2017 Organizational and economic fundamentals of amount of housing thermal modernization. International Scientific Conference Innovative Economy: Processes, Strategies, Technologies: Conference Proceedings, Part I, January 27, MD Management and Decision Making

140 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Onyshchenko S V Financial globalization: a description from the standpoint of a process approach S V Onyshchenko PhD, Finance and Banking Dpartment, Poltava National Technical Yuri Kondratyuk University, Pershotravnevyi avenue, 24, 36011, Poltava, Ukraine Abstract The complexity of the financial globalization process is caused not only by the presence of a significant number of subprocesses, their scale, and depth of consequences but also common consequences of these subprocesses, for which a synergistic effect is observed. Author proved that manifestation of financial globalization caused by the growth of financial markets and the priority development of the international financial sector in comparison with the real sector of the world economy. The descriptive model of financial globalization from the position of process approach is proposed, taking into account the subjects and objects of financial globalization. Keywords: globalization, financial globalization, the budget security, the state budget, threats. Financial globalization is an integral part of the globalization process and its subprocess. Moreover, as a subpocess by form, the real impact of financial globalization eventually started to determine not only the globalization of the commodity markets, public relations etc., but globalization in general. There has been a recent, noticeable tendency of exceeding the rates of financial globalization over economic, social, cultural globalization. We can assume that backlag of rates of economic and social globalization caused to some extent by the opposition of its national economies, international public organizations, national commodity markets, while there is no opposition in financial globalization. Financial globalization is characterized by: free flow of international finance between countries and regions of the world economy (it is free of flow guarantee its effectiveness); formation and operation of global (world) financial market; formation a system of supranational regulation of international finance; implementation of global financial strategies of global companies, multinational corporations and worldwide banks [2]; harmonization of regulation rules and reducing barriers that should ensure the free movement of capital and allow all companies to compete at all markets [3]. Financial globalization, like globalization as a whole, is regarded within the process approach that is as a dynamic complex process that has an extensive network of subprocesses. Moreover, the complexity of the process of financial globalization caused not only by a large number of subprocesses, their scale and depth of effects, but also by common consequences of this subprocesses which are characterized by a synergistic effect. The impact of financial globalization on financial and budgetary system of the country and its security budget is obvious. But the study of its impact on the budget security of state is not possible without understanding the essence, characteristics, objects and subjects, result (or results) and properties of financial globalization. Such a description requires descriptive model, the basis of which is complementary (here in the original context - in mutual compliance of the description components or their fragments, that form connections between them) description of financial globalization demonstrating its multiple systematization. Multisystem approach facilitates greatly the study of various processes which because of their complexity can be investigated only by dividing them into less complex elements and detailed study of such elements. It is multisystem approach formed the basis of the developed descriptive model of financial globalization. Descriptive model of financial globalization is provided in Figure 1. Each of the elements of descriptive model in Fig. 1 requires different attention in the context of the conducting research. Therefore, special attention is paid to those elements of descriptive model of financial globalization which are considered important in the study as a decisive condition of safe country development. MD Management and Decision Making

141 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE The effects of financial globalization Objects of financial globalizati on The properties of the process of financial globalization Essence of financial globalization FINANCIAL GLOBALIZATION as a process Result of financial globalization Manifestations of financial globalization Subjects of financial globalizati on Features of the process of financial globalization FIGURE 1 Financial globalization: a description from the standpoint of a process approach Descriptive model of financial globalization requires appropriate methodological framework from the standpoint of the process approach. Such framework includes methods of semantic, organizational and technological approaches (content approaches are revealed in [4]. Financial globalization, like any process, have result, objects and subjects. It is these components of financial globalization contribute to its multiple systematization as a process. The objects of financial globalization are: international (global) financial market as a whole; Onyshchenko S V market of electronic financial services; subjects of international (global) financial market (global companies, multinational corporations, worldwide banks, the central (national) banks of countries, international financial institutions); financial instruments that emerged (and emerging) in circulation of buy-sell objects on a world financial markets; global information systems; global payment systems [5]. A variety of financial globalization subjects led to the emergence and active action of various financial globalization subjects - international institutions (international regional monetary and financial institutions), which are based on intergovernmental relation to ensure that the global financial system and should govern international economic (including monetary and financial) relations of financial globalization subjects and the processes occurring in the global (world) financial market including these objects. It is financial globalization subjects as international institutions objectify the processes occurring in the global financial system and world financial market, directing them to certain vectors and guidelines in the interests of the major participants of the world market. The activities of financial globalization subjects and effect of their mechanisms of regulatation the financial flows in the global financial market could create a threat to Ukraine's security as well as eliminate or mitigate the effects of their implementation. That is, in the broad sense, financial globalization can be regarded as a threat to Ukraine as well as a comprehensive way to protect against other threats to the security of Ukraine. References The official website of the IMF 2016 Globalization, Skills & Inequality imfdirect - The IMF Blog. Retrieved from: Shamshidinova R A 2008 In forms of financial globalization Bulletin of Saratov State Socio-Economic University (in Russian) Kontseptsyy hlobalyzatsyy v sovremennoi ystoryohrafyy [The concept of globalization in Modern historiography] Retrieved from (in Russian) Kuniev Y D, Korostashova I M, Mazur, AV, Shaposhnyk S P 2006 Upravlinnia v mytnii sluzhbi [Management in Customs] Kyiv: TsUL. (in Ukranian) Voznyknovenye fynansovoi hlobalyzatsyy [Appearance fynansovoy globalization] Retrieved from vozniknovenie-finansovoy-globalizatsii.html (in Russian) Onishchenko S, Pugach A 2016 Threats to economic security of Ukraine: essence, evaluation and prevention mechanism Poltava: PoltNTU (in Ukranian) United Kingdom HM Treasury Access mode: MD Management and Decision Making

142 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Spica I, Berzina B, Spics E The methodology for quantitative evaluation of academic staff with Doctors degree Abstract I Spica, B Berzina, E Spics ISMA University, Scientific Institution Business Competence Centre, Lomonosova Str. 1, Building 6, LV-1003 Riga, Latvia *Corresponding author s inese.spica@gmail.com In modern day world intellectual capital presents ever greater share in the total capital structure. Competitiveness of a country and welfare of its people is very closely connected to the scope and quality of intellectual capitl. Major part of intellectual capital is created in universities, scientific institutes and research institutions. Methodology of quantitative evaluation of the quality of academic staff with Doctors degree encompasses there basic principles:1)calculation of the indicators of the efficiency of the involvement of academic staff in the formation of intellectual capital; 2)comparative analysis of the indicators of the efficiency of the involvement of academic staff in the formation of intellectual capital; 3)annual evaluation of the indicators of the efficiency of the involvement of academic staff in the formation of intellectual capital. Keywords: Methodology, academic staff, quantitative evaluation, intellectual capital, higher education establishments 1 Introduction Objective of the present study is to develop the basic principles of methodology for quantitative evaluation of academic staff with Doctors degree. 2 Research methods, period and research basis Comparative analysis of the rating of higher education establishments in Latvia is based on Rating of Higher Education Estblishments in Latvia developed by the newspaper Latvijas Avīze. It is based on previously elaborated methodology with world wide recognition and approbation including ten criteria of higher educational establishments: percentage of the number of students and graduates, percentage of the employed academic staff with Doctors degree, percentage of the employed academic staff, age structure of the academic staff, percentage of foreign students, number of publications per one academic staff unit (from ISI Web of Knowledge or Scopus ), as well as opinion of the Latvian public regarding popularity and recognition of each higher education establishment and quality of education offered. Quantitative statistical data publicly available from website of Ministry Education and Science of the Republic of Latvia have been used for the purpose of comparing the higher education establishments in Latvia. Each evaluation criterion has been allocated specific ratio between 0,5 and 2. Authors of the present study calculated the efficiency of involvement of acdemic of the higher education establishments of Latvia in the formation of intellectual capital (AIK) by using the intial data from Rating of Higher Education Establishment in Latvia concerning the number of scientific publications and the number of employed academic staff and worked out the rating for each higher education establishment. Authors of the present study calculated the efficiency of involvement of acdemic with Doctors degree of the higher education establishments of Latvia in the formation of intellectual capital (DIK) by using the intial data from Rating of Higher Education Establishment in Latvia concerning the number of scientific publications and the number of employed academic staff with Doctors degree and worked out the rating for each higher education establishment. Mutual efficiency of involvement of academic staff with Doctors degree and without the Doctors degree in the formation of intellectual capital of higher education establishments (DE) was calculated by the authors of the present study by way of dividing indicator DIK by indicator AIK and thus determining rating of each higher education establishment. Development of trial methodology of quantitative evaluation of academic staff with Doctors degree by applying previously calculated indicators of higher education establishments in Latvia AIK, DIK, DE and comparative analysis of rating the indicators mentioned above. The research period is from the year 2003 till the year 2017, separate theme have been studied for a shorter period of time or buy way of comparison. 3 Discussion By way of comparison of ranking of a higher education establishment in Rating of Higher Education Establishments in Latvia according to ranking indicators AIK and DIK we can conclude that only the first three ranking in all three ratings are more or less the same, but other ratings demonstrate considerable differences. Even more differences can be observed by comparing the first three ratings with the ranking of rating DE. Namely, the University of Latvia is ranked in the first place according to the Rating of Higher Education Establishments in Latvia, in the second place in DIK indicator, but the eleventh place in DE indicator rating. Whereas Latvian Academy of Culture is ranked in the twentieth place according to the Rating of Higher Education Establishments in Latvia, shares fifteenth till MD Management and Decision Making

143 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE sixteenth place in DIK indicator rating, but is ranked in the first place in DE indicator rating. This allows to conclude that in the year 2014 the quality of academic staff with Doctors degree representing Latvian Academy of Culture is higher than the quality of academic staff with Doctors degree representing University of Latvia. 4 Conclusions Methodology of quantitative evaluation of the quality of Spica I, Berzina B, Spics E academic staff with Doctors degree encompasses there basic principles: 1. calculation of the indicators AIK, DIK, DE; 2. comparative analysis of AIK, DIK, DE indicators; 3. annual evaluation of AIK, DIK, DE indicators. Methodology of quantitative evaluation of the quality of academic staff with Doctors degree will ensure impartial evaluation as well as facilitate efficiency of involvement of academic staff in formation of intellectual capital. References Kuzmina I 2015 LU, RTU, RSU - joprojam vadība, Latvijas Avīze: Izglītība. Karjera 13.maijs Kuzmina I 2014 Jau septīto reizi - augstskolu reitings Latvijas Avīze: Izglītība. Karjera 14.maijs Kuzmina I 2013 Reitingu spozums un posts Latvijas Avīze: Izglītība. Karjera 8.maijs MD Management and Decision Making

144 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Zakharov D, Spica I Main trends for the further development of e-money and digital currencies legislation Dmitry Zakharov, Inese Spica ISMA University, 1 Lomonosova Str., build. 6, Riga, Latvia, LV-1019 *Corresponding author s dmitry.zakharov@inbox.lv Abstract In this work the authors analyze the legislation of the European Union in a field of use of electronic money and digital currencies and identify the main trends for the further development of legislation in this area. Keywords: electronic money, digital currency, cryptocurrency, Eropean Central Bank. 1 Introduction In view of the dynamic digitalization of the financial sphere, it is necessary to examine the normative acts of the ECB and to identify the directions for its further development. This information will be relevant to financial companies which are going to work in the field of digital currencies. The authors using the theoretical method examine the regulatory documents of the European Central Bank, as well as statistical data on this subject for the period Result In this work the authors identified the main trends in the further development of legislation in the field of electronic money and digital currencies, and studied statistical data on market volume for these currencies. 3 Conclusions The ECB in a timely and consistent manner reflects in its regulatory framework the use of electronic money and is currently engaged in the analysis of virtual currencies and digital-based money in terms of the Distibuted Ledger Technology which allows us to conclude that these concepts will appear in European legislation in the next 2-3 years. References Report to the Council of the European Monetary Institute on prepaid cards 1994 Report on Electronic Money ECB 1998 Directive 2000/46/EC of the European Parliament and of the Council 2000 Evaluation of the E-money Directive (2000/46/EC) 2006 Directive 2009/110/EC of the European Parliament and of the Council 2009 MD Management and Decision Making

145 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Trofimova Yu, Zhivitere M Slowdown of the development speed in the construction industry: problems and their solutions Yu Trofimova, M Zhivitere * Ventspils University College, Inženieru 101a, LV-3601, Ventspils, Latvia *Corresponding author s marga.zivitere@isma.lv Abstract Speed of construction growth in recent years has substantially decreased, by showing significant fall in certain segments. Construction industry data outlines slowdown in the industry trends, and it is a signal for potential challenges in the future. Article aims to examine causes and problems of existing companies deceleration trends in construction industry and to draw conclusions on possible solutions of the problems. For this purpose there is carried out a study on the assessment of the Latvian construction industry, as well as SWOT analysis about internal and external factors that influence the industry. It also forms the base for conclusions and proposals for more rapid development of the industry in future. Keywords: construction, production, SWOT analysis 1 Introduction Speed of construction growth in recent years has substantially decreased. Data compiled by the Central Statistical Bureau of Latvia (CSB) show that, compared to 2015, in 2016 construction output declined by 17.8 %, according to calendar adjusted data [1], and in 2016 the volume index still were below 2007 (see Figure 1). Construction volume output index (2010=100) construction site [2]. According to this classification, construction output reduction was significantly affected by decline in amount of engineering construction (40.7% of the total construction volume) by 33.3%. Decline was almost in all engineering areas: decline in construction of ports, waterways, dams and other hydraulic engineering buildings by 31.3%, construction of bridges, overpasses and tunnels - by 29.9%, construction of motor roads, streets, roads, airfield runways and railways by 29.5%. Significant reduction was experienced also in construction of piping and cables of local importance - by 11.5% [1]. 2 Summary of SWOT analysis of construction industry 2.1 STRENGTHS Sezonāli izlīdzināti dati - Seasonally adjusted data; Sezonāli neizlīdiznāti dati - Seasonally unadjusted data FIGURE 1 Construction output index The construction industry is diverse, it includes not only construction works, but also electric installation, water and gas supply works, engineering network installation, road and motorway construction, thermal insulation. According to the statistical classification of economic activities NACE Rev. 2, although construction has only three sub-sectors - Construction of buildings, Civil engineering, Specialised construction activities - it covers twenty two types of activities. Value Added Tax Law adds to construction services also putting in order and improvement of a As strengths of the industry are considered number of positive trends in the arrangement of legal environment - modern legislation that is based on the fight against the shadow economy activities: reverse VAT implementation; improvement of Construction Law; adoption of new Public Procurement Law (since ) One of the industry s strengths is also professional associations defending industry interests: Partnership of Latvian Construction Entrepreneurs; Latvian Builders Association; Latvian Association of Power Engineers and Energy Constructors. 2.2 WEAKNESSES Whereas, industry s weaknesses are seasonality, shortage of MD Management and Decision Making

146 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE skilled labour, frequent rotation of labour [3], sharp competition in the industry, increased level of injuries in the workplace [4]. Companies have big challenge to keep specialists during empty season because due to labour shortage, it is financially difficult to provide them competitive wages. As weakness of construction industry may be mentioned also deficiency of current assets [5] very often provision of construction process requires credit line in the bank or other financial instruments. Consequently, there is a lack the necessary financial resources to enhance the skills of employees and to invest in further development of the company. 2.3 OPPORTUNITIES One of the most important opportunities for ensuring sustainable competitiveness for small and medium-sized construction companies is concentration of companies. Trofimova Yu, Zhivitere M being left for competitiveness of small and medium-sized construction companies. Competition is very sharp, and in addition also foreign builders, such as from Poland, Lithuania, Estonia, Italy, Germany and other EU countries are fighting for important objects. The largest Latvian construction companies already for several years are using merger strategy for participation in public procurement procedures - for example, the largest construction companies have joined together in several general partnerships. Whereas, Latvian small and medium-sized companies mostly work individually, with the high level of fragmentation. 2.4 THREATS All kinds of studies and surveys carried out during recent years show that the greatest threat to small and mediumsized construction companies is a shadow economy. According to the data of study The shadow economy index in the Baltic States from 2009 to 2015 [6], amount of shadow economy in the construction industry is 40.0%, its proportion in the construction industry in Lithuania and Estonia, compared to Latvia, is almost half the size. 3 Conclusion Pārējie uzņēmumi Other companies FIGURE 2 Distribution of work performed in construction industry by own resources. Source: CSB, Lursoft Given that concentration ratio of four companies in construction industry during past three years comprises 21% - 19% - only 80% of the Latvian construction market is Construction industry is not homogeneous and includes several mutually related activities. In conditions of modern large uncertainty insufficient centralization and concentration of them forms one of the main causes for deceleration of development speed in the construction industry. At present, it is also is one of the most discussed ones. Hypothesis of the authors: one of potential partial solution for the problem could be development and implementation of sustainable competitiveness model in Latvian construction industry. References LR Centrālā statistikas pārvalde gada-buvnieciba-kritums-par html Pievienotās vērtības nodokļa likums 142. panta ceturtās nodaļas 12. apakšpunkts Sauka A 2016 Ēnu ekonomiku ietekmējošo faktoru analīze Latvijas būvniecības nozarē: uzņēmēju un ekspertu viedoklis BASE, SSE Riga Valsts darba inspekcijas 2015.gada darbības pārskats Rīga, 2016 Sauka A 2016 Konkurētspēju ietekmējošo faktoru analīze Latvijas būvniecības nozarē; uzņēmēju un ekspertu viedoklis. BASE, SSE Riga Sauka A Ēnu ekonomikas indekss Baltijas valstīs SSE Riga MD Management and Decision Making

147 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Kazak H The topicality of usage marketing's communications in the tourism sector of Ukraine H Kazak Poltava National Technical Yuri Kondratyuk University, Tourism and Administration Department, Pershotravneviy Avenue, 24, Poltava, Ukraine *Corresponding author s kazaklena77@gmail.com Abstract The article presents complex marketing communication and its basic types such as advertising, sales promotion, Public Relations, Direct Marketing. We can see the necessity of a comprehensive coordination and mutually beneficial use of marketing communications, the most important for tourism enterprises in Ukrainian reality is the use of various promotional and marketing activities, including advertising in the Internet world. Keywords: marketing communications, advertising, online advertising, tourism industry 1 Introduction To the current state of the tourism industry in Ukraine inherent tendency of reducing the number of tourists and tourism enterprises as a result of the economic crisis. But a significant portion of businesses stay on the tourists services market, despite its narrowing and decreasing of sales. As a result, the competition in this economical sector escalates and induce to use all types of marketing communications. 2 Main part Marketing studies show that to create only a quality tourism product for successful implementation is not enough. This requires the effective use of marketing's communications that acting comprehensively promote a positive image of the company, attracting the attention of potential customers, promoting the tourist product on the tourist's services market and preserve a permanent customer s loyalty. In modern Ukrainian realities of the market's narration the particular relevance becomes a continuous communication link with businesses and potential customers. The success of the tourist industry, like other sectors of the business activity mainly depends from the efficiency of the marketing communication that provide a link between the manufacturer of tourist services (tour operator) and consumers (tourists). The main marketing communications include advertising, sales promotion, Public Relations, Direct Marketing, which are significant leverages of the effect on the consumer's choice and his following favorable attitude toward the travel company. The studies in the Ukraine, on the impact of marketing's communications show that the ranking of the most effective tools of promotion are advertising in the media (16%), public relations (15%). Methods of outdoor advertising and sales promotion account for 12% of advertising on radio 11% and direct marketing and internet advertising - 10% [1]. Considering the fact that the Internet audience in Ukraine is increasing and psychological perception and trust to the Internet information in comparison to other types of advertising - is also increasing than in the medium term it is to the online advertising to become the most common means of marketing communication tourist services in Ukraine. 4 Conclusions Thus, in the present conditions of increased competition, the level of success in business travel companies in Ukraine largely depends on competent combination of different types of complementary marketing communications, by using which the enterprises of the tourism industry will have a competitive advantage. References Rating Marketing Communications // Small business [Electron resource]. Access: http//businessideas.com.ua/basicmarketing/marketingovyye-kommunikatsii MD Management and Decision Making

148 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Kornyliuk A, Kornyliuk R Debt burden of Ukrainian public agricultural holdings during the systemic crisis A Kornyliuk, R Kornyliuk * SHEE Kiyv National Economic University names after Vadym Hetman Corporate Finance and Controlling Department, 54/1 Prospect Peremogy, Kyiv, Ukraine *Corresponding author s anna.kornelli@gmail.com Abstract The level of debt burden of Ukrainian public companies is explored. The negative impact of devaluation on equity amount and its positive impact on the EBITDA value is determined. The types of companies debt strategies during the crisis economic growth periods are characterized. Keywords: debt burden, systemic crisis, public agricultural holdings 1 Introduction Agricultural products are export leaders, the industry is an important supplier of foreign currency cash inflows. Also, the industry is attractive for investments - the vast majority of Ukrainian IPO companies is agriculture companies. After the bankruptcy agricultural holding Mriya, technical default and debt restructuring reports, it is important to analyze the debt burden level of the companies in the industry. 2 Main part The analysis was carried out on the sample of 9 public holdings during the period from 2009 till 2015 [2-10]. For the analyses was used the following indices and ratios: the total amount of debt, debt to equity ratio, the share of longterm and short-term debt, Net debt to EBITDA ratio. The amount of total debt of sample holdings was rising from 1.9 billion USD to 3.9 billion USD during It means that over the period the debt level has doubled. However, this period is characterized by the general trend of increasing capital for the considered companies. The amount of equity of analized companies tripled (from 1.5 billion USD to 4.9 billion USD). However, during the crisis of there was a reduction of the total debt amount to 3 billion USD. The amount of equity was reduced twice and it was 2.3 billion USD in This sharp decline caused by currency devaluation, which led to significant losses from exchange differences and directly affected the amount of retained earnings (loss), and thus the amount of equity. Debt to equity ratio declined from 1.2 to 0.8 during , but increased to 1.3 during the crisis of Despite the fact that the period of is characterized by debt capital increasing, as mentioned above, the higher rates of equity capital increasing lead to the debt to equity ratio decreasing. The opposite trend occurred during the next years. Because of lower debt reduction rate in comparison with equity reduction, debt to equity ratio has risen sharply. The share of long-term debt capital during the period varied slightly and share was 54% in average, the share of short-term loan capital was 46%. It should be noted that this percentage is generally unusual for Ukrainian agricultural companies. Thus, according to the State Statistics Service of Ukraine [1], the share of short-term liabilities for such companies was 71% during The difference is explained by the fact that public companies have easier access to debt capital at lower interest rates, and therefore have higher chances for attracting long-term financing. Instead, because of the high financial risks cost of long-term debt capital cost for the most agricultural companies is very high. Net debt to EBITDA ratio fluctuated slightly during the period and was 2.4 in average. The maximum ratio was in 2013 through the maximum total debt amount. In 2014 and 2015 the ratio lowered to 2.3. This reducing was due to debt reduction and EBITDA increasing. There was a positive influence of currency devaluation to EBITDA value. Because the almost all the analyzed companies are export oriented, the proceeds from the sale of products is received in foreign currency, while most of the components of production costs are denominated in local currency. Thus, due to shock currency and sticky price effects there was a relative cost reduction, which positively affected on EBITDA. 3 Conclusions The results of the retrospective study based on empirical data of 9 agricultural holdings Ukraine led to the following conclusions: The level of Ukrainian agricultural holdings leverage, expressed through debt-to-equity ratio indicator, during the period before the crisis was reducing MD Management and Decision Making

149 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE despite the debt amount growth. This reduction is caused by equity growth. During the crisis of , and the currency shock debt burden has increased in nominal terms due to equity decreasing, despite the reduction in debt. Since net debt to EBITDA ratio remained stable, the effects of the crisis on domestic economic changes Kornyliuk A, Kornyliuk R were not significant, foreign exchange earnings of export-oriented agricultural holdings allowed to cover previously taken loans nominated in foreign currency. Determined the negative impact of devaluation on the amount of equity the company and its positive impact on the EBITDA value. References State Statistic Service of Ukraine Access: Astarta Corporate Website Access: Avangard Corporate Website Access: Agrogeneration Corporate Website Access: Agroton Corporate Website Access: Kernel Corporate Website Access: MHP Corporate Website Access: Ukrproduct Group Corporate Website Access: IMC Corporate Website Access: Ovostar Corporate Website Access: MD Management and Decision Making

150 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Sventitskaya E, Kochetkov Yu The instability of taxation policy in Latvia as a deterrent to the successful development of micro business E Sventitskaya 1 1, 2*, Yu Kochetkov 1 Baltic International Academy, Lomonosova Str. 4, LV-1019 Riga, Latvia 2 Institute of Mathematical Sciences and Information Technologies, Liepaya University, Liela Str. 14, LV-3401 Liepaya, Latvia *Corresponding author s Jurijs.Kocetkovs@rtu.lv Abstract The goal of the research is to analyse some aspects of formation of the taxation system, the sector of economically active self-employed persons in Latvia and their provision with social guarantees, as well as evaluate the opportunity of applying a uniform tax to micro businesses. Small business is the most important driving force behind the development of the economy and the society as a whole. State aid to entrepreneurs working in this field is necessary and urgent. In 2010, Latvia adopted the Law on Micro-enterprise Tax aimed at creating favourable conditions for business development. However, in subsequent years, the Law has been changed many times. To enable the sustainable development of economy, increase employment, reduce social tension and emigration, effective laws should be stable in the country. Micro businesses need a uniform tax, which includes deductions for social protection. Keywords: taxation policy, micro business, uniform tax 1 Introduction Changes in the economic situation of Latvia have given rise to entrepreneurial activity of the population. One manifestation of this activity is the rise in the number of micro businesses and self-employment, which have had a significant impact on the creation of a competitive environment and satisfaction of people s needs for goods and services. State aid to entrepreneurs working in this field is necessary and urgent. At all stages of economic development of the country, nation-wide tasks have two almost opposite goals full employment and an increase in real income of the population, on the one hand, and the collection of taxes to ensure the country s activity, on the other hand. The both goals are directly related to the economic security of the country. Search for balance between these parameters is performed by countries in different ways at all stages of economic development. The goal of the research is to analyse some aspects of formation of the taxation system, the sector of economically active self-employed persons in Latvia and their provision with social guarantees, as well as evaluate the opportunity of applying a uniform tax to micro businesses. 2 Analysis of situation According to J. Keynes, rapid economic growth will ensure only the active state intervention in the national economy and the active manipulation of taxes. In the period of economic recession for the revival of economic growth, it is necessary to reduce taxes, provide more benefits and create appropriate tax regimes. In the period of economic growth, to prevent the onset of the overproduction crisis, on the contrary, it is necessary to raise tax rates and reduce benefits. The 1980s marked the beginning of the theory of supplyside economics developed by A. Laffer and M. Feldstein, who opposed the active role of the state in economic regulation. The main focus of this theory is the reduction of tax burden to stimulate economic growth. In order to increase the pace of economic development, the second step is the employment of unemployed active population of the country. The population employment issue is always of major importance. All over the world, small business is the most important driving force behind the development of the economy and the society as a whole. At present, when Latvia as well as the whole world is experiencing economic slowdown, the small and micro businesses have taken the brunt of the protracted economic crisis [1]. In Latvia, the number of the registered self-employed persons increased by 36.8% in the period from 2010 to Self-employed persons make up 10.6% of the country s active age population aged 20 to 64 years [2]. This study does not include business persons that have registered their activity in the Register of Enterprises, receiving the status of a legal entity. The number of self-employed persons able to provide themselves with at least minimum social guarantees decreased in the period under review (calculated according to the CSB of Latvia) (Figure 1). According to statistics, even in case of active participation of entrepreneurs to provide themselves with the means of existence, the income of many entrepreneurs was at a minimum level that either resulted in the fact that social security contributions were not paid to the state budget or the lion s share of business was withdrawn into the shadows. There are many causes of such deplorable results and the main one is high tax rates. MD Management and Decision Making

151 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE FIGURE 1 Dynamics of registered self-employed persons paying social security contributions to the state budget of Latvia from 2010 to Axis OY % In August 2010, the Law on Micro-enterprise Tax was proclaimed by the President of the Republic of Latvia. The goal of the Law was to reduce the level of unemployment, decrease administrative and tax burden for micro businesses, especially at the beginning of economic activity. Selfemployed persons with the planned annual net turnover of less than 100 thousand and employing not more than 5 workers who receive salary not exceeding 720 could register their own business and gain the right to pay taxes imposed on micro businesses to the state budget. The tax rate is 9% of net turnover. This tax on micro businesses includes personal income tax of 35% of the paid tax and compulsory payments of social insurance of 65% of the amount of tax. Within 5 years to December 2015, the Law Sventitskaya E, Kochetkov Yu has undergone various additions and changes more than 6 times. Without additions and amendments, the Law existed not more than 2 years in a row. In 2014, the Law underwent changes twice, and in 2015 it was changed three times. In January 2016, the Law on Micro-enterprise Tax in Latvia underwent further changes and additions in the form of new restrictions. Under such conditions and in the prevailing economic situation, they were practically deprived of the opportunity to run business, and enterprises were forced to close down. Thus, at the end of 2016 there were more than 50 thousand micro businesses in Latvia, whereas in early 2017 their number decreased by more than 6 thousand. 3 Conclusions In 2010, Latvia adopted the Law on Micro-enterprise Tax aimed at creating favourable conditions for business development, reduction of unemployment and the shadow economy. However, in subsequent years, the Law has been changed many times; various additions and limitations of its application have been introduced. The attempt to simplify the tax legislation has not been practically implemented. To enable the sustainable development of economy, increase employment, reduce social tension and emigration, effective laws should be stable in the country. They should be simple and focus on promoting the development of micro businesses. Micro businesses need a uniform tax, which includes deductions for social protection. References Kochetkov Yu A, Sventitskaya E 2016 Characteristics of small business in Latvia VADYBA Journal of Management 29(2) Lithuania Business University of Applied Sciences Klaipeda Statistics Database 2016 Central Statistical Bureau of Latvia 20 October 2016 MD Management and Decision Making

152 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Liepina K, Dehtjare J Quest room industry: key characteristics and trends Kristine Liepina, Jevgenija Dehtjare* ISMA University, 1/6 Lomonosova str., Riga, LV 1019, Latvia *Corresponding author s kristta2005@gmail.com Abstract The article gives the current state of the Latvian quest room industry. In the article are considered characteristics and main trends of development of the quest industry. In order to create a complete picture on the issues of the escape rooms business, there were carried the analysis and comparison of the quest rooms in the world. As an example, is taken the brand "Quest Lab". This topic is very relevant in our time. To maintain the interest of consumers and expand the boundaries of intellectual entertainment there is a great demand for using new techniques. There is a gradual decline in interest to some quest rooms because of the oversaturation of the escape room market. To take hold and continue its development in the entertainment industry market, it is necessary to change constantly, use new opportunities and new forms. The practical result of the research should be increase in the rating and awareness of the "Quest Lab" brand that will allow maintaining a leading position in the escape market in Latvia. Keywords: entertainment industry, escape room, trends, social meaning, performance, quality 1 Introduction Entertainment is one of the most important spheres of a person's everyday life, which, along with education can significantly influence the state of society. In different sources the word "entertainment" is interpreted in different ways, for example, according to Collins English Dictionary it is "something affording pleasure, diversion, or amusement, especially a performance of some kind" [2]. Quest industry is a specific niche in the entertainment industry. It contains quests in reality: escape rooms, outdoor quests, performance quest etc. The Cambridge dictionary explains the word quest, as a long search for something that is difficult to find, or an attempt to achieve something difficult [1]. The first documented "escape game" was SCRAP's room in Kyoto, Japan in July 2007, intended for a team of 5-6 people [6]. Following the Asian countries, the quests became confidently gaining popularity in the USA and Europe, and Budapest became the "capital" of the new kind of entertainment on the European continent. In Latvia, the first quest games came to Riga in August 2012 and the first room was opened by the "Mysteria" company. Despite a short time of existence, the quest industry has developed rapidly. Currently, due to the large growth of the escape industry it has come to the peak of competition. Therefore, in order to attract new customers and stay in this entertainment market, innovative ideas and improvement of the quality of services are in great need. This can be done both as through formation of new rooms, for example, performance quests, as the introduction of new technologies, the improvement of quality, the expansion of activities and the use of trends in the industry [4]. 2 Overview of the research object Quest Lab is a young agency of organizing entertainment and recreation activities for people. It was founded in Riga in September The main activity of entertainment and gaming centre Quest Lab are quest-rooms. Quest Lab is a quest in reality, a fascinating game for teams from 2 to 6 people. From the end of 2015 it started outdoors quests for big companies. Quest Lab has a very good location in the centre of the city on the 45/47 Elizabetes Street. Gaming centre Quest Lab provides two rooms to solve «The Captain's Room» and «Experiment». A new room Time Machine is coming soon [5]. 3 Characteristic of quest industry Quest is an interactive game that consists of solving various puzzles and logical tasks according to the scenario. Throughout the game a storyline is traced, which in the end, depending on the choice and moves of the player should lead him to victory. The main distinction between quests from other similar entertainments is the presence of a goal. The players immediately have a task they must achieve. The quests industry is not at a stop, it is constantly being improved. Currently, the following three most well-known areas can be distinguished. They are in constant demand among representatives of different age and social groups [6]. Form of the Quest room The principle of escaping from the room (escape the room) is by far the most popular kind in the quest for the industry. Their idea consists in escaping of the team from MD Management and Decision Making

153 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Liepina K, Dehtjare J the room within the allotted time - 1 hour - by solving the fragments of brainteaser. And most often the tasks presented in the quest alternate not only in terms of complexity, but also in the format of their focus. These tasks are as for logic and mindfulness, as for teamwork and dexterity, etc. There is an administrator outside the quest room tracking the progress of the game. The most popular genre of the escape rooms for the second decade of the year 2016 was such: horror, fantasy, history, science, the future of technology. Form of the Performance quest This is a theatrical performance with actors, in which the player directly assumes the main role. Quest performance is essentially the same quest room, the players also find themselves in a locked room, but their main goal is not to solve a specific task, but rather the actual passage of the quest, immersion in its atmosphere, in a different reality. Attributes of such quests are selected visual and sound TABLE 1 Main features of the quest-business models [5] Room effects, an authentic interior of the room, as well as a game of animators. The first and the only quest performance in Latvia is "Madness" from the company "Escaperoom". [7] Form of City quest or outdoor quest These are quests for various interesting urban places. It can be older museums-manors, parks, lively and historically significant streets of the city. In contrast to the quest of rooms and quest performance, city quests take place in open spaces. We can say that this is not justly forgotten - orientation on the terrain in a new format. One of the hallmarks of urban quests is the complete absence of restrictions on the number of participants. In Latvia representatives of such quests are the company "Quest Riga". At the moment, the most popular type of quests is the quest room. In Table 1 are shown main features of the questbusiness models. Outdoor Open For individuals Corporative Start-up costs High Low Medium Payback High Medium High The number of games in one scenario, which can be conducted per day Till Number of participants More than 25 The cost of the game for a group of participants, (euro) (euro/team) 8-10 (euro/person) (euro/game) From 170(euro/event) The chart shows that each model has its own advantages and disadvantages. Both models are in demand among customers. At the moment, there are about 70 such rooms with different plots in Riga. Figure 1 shows overall dynamic of the development of quests in Latvia from the period from 2014 to FIGURE 1 General dynamic of development of Quests in Latvia ( ) (quantity) Despite the fact that participation in quests is a popular type of entertainment, it is necessary to take into account the possibility of diminishing interest due to the glut of the market. Therefore, it is necessary to modify this business or to come up with new ideas for the enterprise. 3 Trends General dynamic of development of Quests in Latvia (quantity) Integration of quests, creation of universal entertainment centres. (DisneyQuestPlanet) Expansion of the "assortment" of services (nanny for the quest, master classes, organization of parties, expansion of the directions of quests, etc.) Certification of quests (as proof of quality) Globalization and enlargement of escape business. (Absorption and consolidation of quest companies, franchising) Social missions: 1. charitable quests; 2. expanding of the age audience; 3. check-up during the Quests; 4. psychological correction; 5. projects to save historical sites; 6. educational. 4 Conclusions Companies in the entertainment industry constantly have to solve the problem of maintaining their place in the market. This applies as well to a new kind of entertainment - the quest industry. In order to strengthen its position in the market it is necessary to move forward constantly. Companies need a competitive advantage, which gives superiority over competitors. Quest industry, continuing its development, becomes more civilized and enlarges as an alternative to other traditional entertainment. Based on the analysis of the activities of the company "Quest Lab", it can be assumed that in order to increase competitiveness and stabilize positions in the quest industry, it is possible to apply certain types of trends - new technologies, social missions, quality certification and expansion of the "assortment" of services. The main obstacles to the implementation of such ideas are MD Management and Decision Making

154 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE the complexity of implementing individual components and the speed of their implementing. As a result, usage of all mentioned above tendencies will Liepina K, Dehtjare J raise rating and recognition of the enterprise and will allow it maintaining the leading position in the market of quests in Latvia. References Definition of quest from the Cambridge Advanced Learner s dictionary & Thesaurus Cambridge University Press Entertainment. Dictionary.com. Collins English Dictionary - Complete & Unabridged 10th Edition HarperCollins Publishers. com/browse/entertainment (accessed: february 20, 2017) Escape the Room Games are the Latest Trend ( ) Liepina K, Dehtjare J 2016 The use of the new technologies on the Latvian market of escape rooms Лиепиня К 2016 Бакалаврская работа «Разработка комплекса мероприятий по продвижению продукта «Quest Lab» на латвийском рынке развлечений и досуга» Рига (in Russian) Сенсация индустрии развлечений квесты в реальности ( ) (in Russian) Квест с актёрами ( ) (in Russian) MD Management and Decision Making

155 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Linde I Problems in higher education teaching quality measurement Linde Ivars* ISMA University, Lomonosova str. 1, 6 bld., LV-1019, Riga, Latvia *Corresponding author s ivars.linde@isma.lv Abstract In world practice the idea of rating of higher education institutions has been admitted that must serve to characterize a HEI. However, in different countries the idea of rating comprises its different components and their totality makes a certain combined number, which according to its forming conceptions must numerically reflect those advantages of HEI to permit its comparison with other schools. In fact, rating is a combined complex estimation containing a number of independent parameters forming according to a certain algorithm, the qualitative estimation of a HEI. Yet this obtained estimation is seldom able to reflect the real possibility of a certain, chosen specialty for studies. Indeed, HEI and the greatest number of HEI offer not only one but a much greater number of programs for studies. HEI comprise a number of faculties and institutes with a great number of programs, which may have a different numerical estimation the rating of a HEI. It has been suggested that a framework can be used to describe how HEI transform inputs into outputs (Astin 1993; Cave et al. 1991; Borden and Botrill 1994). Keywords: higher education, education quality measurement 1 Introduction Therefore one numerical estimation may reflect the quality of training for certain specialties, while for other specialties the estimation will show either reduced or increased estimation of training according to the accepted principle of counting the rating at a certain HEI. Thus only one type HEI can be compared according to rating and it is categorically impossible to compare HEI with a different number of faculties and training programs. Moreover, even in the case of identical or similar set of programs for training specialists, one and the same numerical estimation of HEI rating does not permit to compare the training for one particular specialty, because the parameters characterizing one and the same program may differ, but the similarity or closeness of rating estimation is obtained on account of other parameters included in the rating estimation. Some researchers have argued that the quality of training should be measured by learning outcomes, student attitudes, and the behaviors changed through education (Brew 1995; Elton 2001). 2 Methodological issues in evaluating quality By estimating the potential possibilities of the HEI according to the quality of training a graduate besides the characterization of the professors and teaching staff a number of other indicators are used when forming the HEI rating, such as the laboratories and library and also lecturehalls (the number of m² per student). A great role is played by the organization of the study process, teaching plans and programs, methodical work and the system of guiding the tuition process in general. Each of the above mentioned characterizations may be presented by the vector-parameter (R i) and all these vectors form a multicomponent vector R = R( R1, R2,..., R i,..., Rn ), (1) that shapes the concept of the HEI rating. Each of these vectors R i has its own specific gravity in forming the resultant vector of the rating R. It is impossible to give a well-grounded estimation to the numerical importance of every component R i, because of the lack of direct methods to make such measurements. To get it the method of expert estimates must be used. The qualified experts in this field form estimates for every component R i, and later shape the common resultant vector R, according to which the comparison of HEI can be made. The formation of every estimate R i must be realized according to the preliminary worked out criteria. For example, the range of numerical importance from min to max is determined by means of which parameter can be estimated. Each expert gives his own quantitative estimation. Next the opinions of all experts are summed up and the summary expert estimate R i is given. The generalized result R i, by using the expression (1), can be presented like: R = λ 1 R 1 + λ 2 R λ i R i + + λ n R n, (2) where λ 1 is a weight ratio of the contribution R i to the joint sum of the rating R. The expression (2) will be correct only when the regulations n of standardization will be performed: λ i = 1 i= 1. (3) The determination of every weight ratio is also made by MD Management and Decision Making

156 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE the method of expert estimates. To obtain the indisputable expert estimate, the necessary number of experts must serve to secure the required precision of the estimate. Let us carry out this estimate. Let us suppose that the real meaning of the evaluated parameter is equal to x o. Every expert gives his own estimate x k. Let us present x k as the sum of the real meaning x o and the mistakes (x o + Δ x k ). Summing up all expert estimates and dividing them by the number of experts N, we will get the expert estimate xˆ : n xk k xˆ = 1 = x0 + N. (4) Considering that all experts are chosen rather close as regards their qualification, in this case Δ x k may be considered a random variable with mean squared deviation that is similar to all components σ 1 = σ 2 = = σ i = σ n = σ. As every expert gives an independent estimate, then in the expression (4) we will have the sum of random variables as a kind of deviation divided by the number of experts N. It is generally known that in this case the evaluating the mean squared deviation will be [5]. σ ˆ σ =. N (5) By analyzing (5) it is obvious that the average estimate of the summary mistake is smaller than the mistake when estimating one expert. However, by choosing the number of experts the level of their competence must be considered. It is also essential to consider the work concerning the coordination of their estimates and bear in mind that the work of a highly qualified expert is a costly affair. The above-described model concerning receiving the estimation of vector R, as the HEI rating, by means of getting separate estimates of the vectors R i, permits to draw the conclusion that they may occupy a number of uninterrupted meanings, each of them in its certain range, e.i. they may accept an infinitive number of sizes. In practice it is preferable to divide the possible range of ratings into a number of discreet estimates (classes) and operate with the conception depending to which class, according to the rating, a certain HEI belongs. In all the amount of the above-described parameters of Linde I the rating R i, there are undoubtedly those that play the main role in the formation of the generalized parameter R. Therefore the insignificant parameters may be discarded, but those playing the main role could be called the decisive parameters. The approaches to the division into insignificant and decisive parameters may be different including those obtained by expert methods. One of the possible numerical approaches may be considering λ i in (2) and quantitative meanings of the specific R i. In the case of small λi and the quantity of R i, being smaller than the mistake determining the estimates R k if λ k > λ i, such components may be disregarded. The examined approach to determining the HEI rating can be easily propagated to HEI departments and separate programs for training specialists. Fixing the rating for them according to (4) permits to draw the conclusion that various R i, different in meaning, permit to make one and the same rating. 3 Conclusions Thus the above mentioned declaration is confirmed about illegality of comparing HEI concerning the possibility of training specialists in a specific specialty only according to the generalized rating of the HEI. When introducing the analogical conception it is necessary to compare the ratings of programs for training specialists. Such approach allows one to deal with the criticism, often made to league tables and rankings systems that rankings are presented as if they were calculated under conditions of certainty while this is rarely the case. Thus we deviate from the classic approach to build a composite indicator by a simple weighted summation of indicators. Upon propagating uncertainties the HEI rank is no longer a simple number, but a distribution of values. Thus, the ranking system might be seen to lose relevance if a high fraction of HEI were to overlap with one another. In fact if a high number of HEI overlap (wide range of ranks), this casts doubts on the relative position of the HEI. In general, there is a trade-off between the level of uncertainty that is included in the ranking system and its worthiness, which is herein considered as the capacity of the system to discriminate effectively between HEI. References Astin A 1993 What matters in college: Four critical years revised San Francisco: Jossey-Bass Borden V, Botrill K 1994 Performance indicators: History, definitions, and methods. New directions for institutional research 82 San Francisco: Jossey-Bass Brew A 1995 Teaching and research: Establishing the vital link with learning Higher Education Cave M, Hanney S, Kogan M 1991 The use of performance indicators in higher education: A critical analysysis of developing practice (2 nd ed.). London: Jessica Kingsley Elton L 2001 Research and teaching: Conditions for a positive link Teaching in Higher Education 6(1) Linde I (et al.) 2015 First Conference CIT&DS 2015, Volgograd State Technical University, Volgograd, Russia, September 15-17, Analysis of the University Rankings Assessment Reliability, pp. Proceedings. Springer, ISBN MD Management and Decision Making

157 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Ptachchenko L The impact of negative drivers to the financial security of Ukraine L Ptashchenko Poltava National Technical Yuri Kondratyuk University, Prospect Pershotravnevyi, 24, Poltava, 36011, Ukraine *Corresponding author s lianaptaschenko@rambler.ru Abstract We have researched corruption as its influence on a country s economy. The article is highlighting the issue of corruption in Ukraine to research and describe the influence of corruption on a country s financial security, to provide examples of indicators that measure the level of corruption in a society, as well as to suggest ways and methods of anticorruption efforts. The article has argued for the need of immediate use of all existing anticorruption efforts. Keywords: corruption, financial security, the level of the shadow economy, corruption Corruption is almost never considered as a factor in the state of a financial security of a country, and that is why after researching respected authors and their publications, it can be said that the issue of influence of corruption on a country s financial security hasn t been examined enough. Most of the scientists that research financial security state the fact that, financial security is the most important part of economic security of a government, because any economy is based on finance. Thus the need to provide and support financial security of a country is argued, since it affects all levels of economic life in a country, be it the private sector, entrepreneurs, or individuals [1, 2, 3]. Synthesis of various scientific approaches allowed vyznychyty this category as: Financial security is a state of the financial system, in which the conditions for a stable social and economic development of a country are met, a stability against negative shocks is provided, and the wholeness and unity of the financial system is kept. It s noteworthy that all of the parts of financial security above have a high rate of correlation with corruption of a country, because the efficiency of official operation decreases, since they have to make decisions to benefit society, and if you only account for the interests of a small group of people, the overall level of development, be it government finance or the economy in general, becomes worse as a result. In international ratings, Ukraine has a very bad reputation and, sadly, is described as unstable, unreliability and high levels of corruption. Such a state of affairs can t positively influence development of international relations or efficient foreign policy. That being said, there is another side to the current reputation. According to experts calculations, the shadow economy constitutes a 40-60% part of the GDP (Ukraine s Ministry of Economy states a 47%). The current level of shadow in the economy has reached the dangerous point, where it is possible to consider an extended reproduction of shadow financial relations in the country. The main issue of shadowing the financial cash-flows lies in use of financial institutions, especially banks, insurance companies, stock brokers,, credit groups to inefficiently withdraw funds, to evade taxes and to avoid legalization of profit, earned through crime. «Shadow» economy is the epitome of how corruption intertwines with financial security of a country. FIGURE 1 The dynamics of shadow economy rate as a % of the official GDP. Source: Ministry of Economic Development estimates [4] According to experts, the losses of profit from shadow economy annually are billion UAH [5]. In our opinion, one of the most important factors of anticorruption efforts is to form a clear cooperation between countries, primarily between their executive bodies, joint participation in events organized by the UN, Council of Europe, Interpol, IMF, World Bank as well as other international organizations. However, the most vital part is the need for Ukrainian officials that hold high-power positions to become aware of the urgency of anti-corruption activity, on every level of governance. MD Management and Decision Making

158 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE In order to decrease the spread of corruption, to diminish the costs related to the negative impact of corruption in the national economy, it is necessary to implement a complex anti-corruption effort system. Implementing this systematic Ptachchenko L approach will allow to defeat corruption and its societal impact and to reach a point of stable development economically and socially. References Baranovskyy O I 2004 Financial security in Ukraine (methodoly of assessment and execution) Kyiv National Trade and Economic University К.: KNTEU 760 p. Vlasyuk O S 2008 Theory and application of economic security in the context of economy as a science National Institute on Security by the Council of Security of Ukraine К. 48 p. Sanzharovets V M 2014 Corruption in times of crisis Gileya: scientific journal Trends in Ukraine of the shadow economy Documents/List?lang=uk-UA&id=e384c5a ab6-b56f- 50e5243eb15a&tag=TendentsiiTinovoiEkonomiki Melnyk O M 2012 Scholarly commentary on the Law of Ukraine «On methods of counteracting corruption» Dated К.: Publishing house «Professional» 464 p. MD Management and Decision Making

159 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Kinderis R, Zobėlaitė L Expression of healthy lifestyle components in student behaviour Remigijus Kinderis *, Lina Zobėlaitė Klaipeda State University of Applied Sciences Jaunystes Str. 1, LT-91274, Klaipeda, Lithuania *Corresponding author s r.kinderis@kvk.lt Abstract The article analyzes the expression of healthy lifestyle components in student behaviour. The aim of the research is to determine component expression of healthy lifestyle in tourism and recreation students behaviour. The survey revealed that most students consume a lot of fruit and vegetables, that is, it is important to a healthy diet. Quite a lot of respondents rest too little, not properly plan their work and rest, which involve large number of students to experience tension and stress, and it leads to mental fatigue of students. Quite a lot of students try to cheer up or stir in sports, but there is a lack of time and too little physical activity does not help to reduce stress. The student s choice of lifestyle is mostly determined by family and friends, in other words, those who surround them constantly. Health value cherished in the family encourages students at least partially to live according to the principles of a healthy lifestyle. Also, lack of motivation, time and finances leads to and the indifference of the respondents to live according to the principles of a healthy lifestyle. Keywords: healthy lifestyle, healthy lifestyle components, behaviuor 1 Introduction and research methodology Health in the broadest sense is understood as a comprehensive physical, social and spiritual well-being and a phenomenon of healthy lifestyle is the object of medicine, sociology, public health, psychology, education science, history, anthropology, management science. According to Norkus [1], although young people are traditionally regarded as the healthiest social group, researches show the number of youth-specific health problems and healthdamaging behaviours (Jankauskas, Jatulienė, 2008 [2]; Miksys, 2005 [3]; Poteliūnienė, Viraliūnaitė, 2006 [4]; Kardelis et al [5]; Tamošauskas, 2005 [6]; Bobrova, Grajauskas, 2005 [7]; Narkauskaitė et al., 2011 [8]; Škėmienė et al., 2007 [9]; Stukas, Dobrovolskij, 2009, et al. [10]). These researches show that health of young academic people are affected negatively by lack of physical activity, alcohol, tobacco and other psychoactive substance use, unhealthy diet, stress, inappropriate work and rest, other. It is believed that the greatest impact on health is done by lifestyle, which is perceived as the habits and customs as the whole, exposed and amplified by socialization process during all human life (Norkus 2012 [1]). The concept of a healthy lifestyle proposed by Gochman (1997) [11] states that a healthy lifestyle is reflected not only by noticeable, visible actions or behaviour, but also by mental processes and experiences. Proškuvienė (2004) [12] supplements perception of a healthy lifestyle, arguing that it is a daily way of life that strengthens and improves the body's reserve capabilities, helps people to stay healthy and to protect and improve their health. Adaškevičienė and Strazdienė (2013) [13] support this idea stating that a healthy lifestyle is a complex of constant behaviour and habits of a person, which reveals the peculiarities of his or her life and which describes the human way and character. Similarly, Gudžinskienė et al., (2013) [14] - defines a healthy lifestyle, which is a form of an individual's lifestyle, helping to preserve and strengthen health. Meanwhile Urbonienė (2016) [15] identifies the healthy lifestyle, as our daily habits and customs of the whole. Thus, a healthy lifestyle is a multifaceted concept that reveals the everyday human life, which not only helps to maintain health but to cherish and to promote a positive approach to health, and which describes the interaction between an individual's personal characteristics and living conditions. Multidimensionality of a healthy lifestyle concept reveals the fact that it includes the following key components: nutrition; physical activity; tobacco consumption/not consumption of tobacco; alcohol and other psychoactive substance use / not use; pharmaceutical use; work and rest (sleep) mode; sexual behaviour; stress and ability to cope with it; hygiene habits; preventive health check; other behaviours that can affect health (Norkus 2012) [1]. As already clarified, health of the public directly depends on the whole society, public welfare, and the very healthy lifestyle can and should be perceived not only as a universal, humanistic, but also as an economic asset. Therefore, the country strategic documents, such as Lithuania progress strategy Lithuania 2030 (2012) and Lithuanian Health Programme (2014), special attention is given to every citizen for healthy lifestyle habits formation, and emphasis on the idea that for a healthier society < it is necessary to enhance a healthy lifestyle skills development in the family, educational and scientific institutions, the workplace and the community; to promote healthy eating habits by increasing public awareness of a healthy and balanced diet; to ensure optimum physical activity; develop unfavourable provisions in relation to addictions. MD Management and Decision Making

160 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Therefore, the pilot research problems are formulated under the following questions: "How healthy lifestyle is manifested when studying at a higher education? Which components of a healthy lifestyle students focus on mostly?; How a higher education institution contributes to the students' health education and physical stimulus?; What are the opportunities for students to promote healthy lifestyle habits? The aim of the research is to determine component expression of healthy lifestyle in tourism and recreation students behaviour. Objectives of the research: 1. To analyse the components of a healthy lifestyle in the context of the expression of an individual's values and determinants in student behaviour in theoretical aspect. 2. To investigate component expression of healthy lifestyle in tourism and recreation students behaviour. 3. To analyse the tourism and recreation study programs students healthy lifestyle components of the expression of determinants. Methodology of the research. The research is based on qualitative research access. The research instrument is an anonymous questionnaire, which consisted of 35 mixed form questions. The research included 53 tourist and recreation students of 168 students studying at the time. The logical sequence of the research progress consists of 3 phases: Phase I - preparation for the research, Phase II - implementation of empirical research - the process, Phase III - analysis and interpretation received data. The data were processed in Microsoft Excel 2010 programme, and presented structuring them into tables and describing the text, i.e. using structural and interpretative analysis types of data. The quantitative research was based on principles of social research ethics. Since the questionnaire was posted on an online questionnaire site, it was easy to ensure the legal ethical principles: security and confidentiality principles as there was no direct link between the respondent and the completed questionnaires. The questionnaire started with the introduction of who is conducting in it, for what purpose and where it will be used, all people who participated in the research could have the information of the collected data. Filling in this questionnaire was treated as confirmation to participate in the research. Respondents were free to decide on their participation in the research. 2 Analysis of survey results of healthy lifestyle components expression in student behavior The research data showed that 60 percent of respondents assess their health as very good or good, while 8 percent - as poor and very poor. About 85 percent of students take care of health and are ill rarely. Unfortunately, less than half of the students i.e. 47 percent take the principles of a healthy lifestyle, and 30 percent of them began to do it not so long ago - during their studies, and say that live healthily is difficult or even complicated (71 percent). Fortunately, even 72 percent of students say that a healthy diet is very important to try to do so. Respondents based their healthy diet on the fact that 26.4 percent of students eat vegetables daily, and even 28.3 percent of them have fruit daily. Kinderis R, Zobėlaitė L All people suffer stress in one or another situation, and often it becomes a constant companion of the majority, so the respondents were asked how they are struggling with stress. Stress is experiences by even 94.4 percent of participated students percent of respondents avoid stressful situations, that is, trying to avoid environment or people, which cause stress percent of students suffer stress, but do nothing, meanwhile, 13.2 percent of respondents reduce stress taking various drugs and vitamins, and only 1.9 percent try to cheer up to distance itself from the surrounding stress. As a result, stress makes them feel mental fatigue. Therefore, it is hardly surprising that the questionnaires with students showed that 60.4 percent of students already feel mentally exhausted. Well-being can be affected and the lack of rest, which is felt by number of students due to a busy study schedule. This is confirmed by obtained results of the survey, as more than half of the respondents (50.9 percent) sleep only 5 to 7 hours a day, when only 26.4 percent of students have recommended daily sleep time of 8 to 9 hours. Mainly studying raise tensions to the students. In other words, even 36.7 percent of the surveyed suffer continuous pressure because of studying, which means that almost every third student of the College is under constant stress, which is affected by the study process, and 55.1 percent of students experience frequent tension on the studying. The tension is experienced on the following factors: high requirements, additional paid work during their studies, financial insecurity, health problems, and family problems. Another important principle of a healthy lifestyle is sport, so the students were asked how many hours a week they play sports? The answers showed that there is 35.8 percent of students that do not do sports at all, though 60.4 percent of respondents noted that it is not difficult to combine sport with studies. In order to comply with the principles of a healthy lifestyle and be healthy it is very important to give up bad habits. Surveyed students reported that they have bad habits, that is, 26.4 percent of them smoke. Another bad habit is alcohol: 11.3 percent of students do not have this habit, 22.6 percent of respondents consume alcoholic beverages rarely, that is, once or several times a year, 43.4 percent of respondents surrender these drinks to once or several times a month, and, 20.8 percent of students drink it once or several times a week. In the future, 35.8 percent of students would give up bad habits, 13.2 percent of respondents complete abandon bad habits, 15.1 percent want to stay healthy and no longer have bad habits, but they are struggling, and, the remaining 11.3 percent of respondents do not promise to abandon existing addictions. 3 Survey result analysis of healthy lifestyle components expression in student behaviour determinants The results revealed that the greatest influence on a healthy lifestyle compliance is affected by family (almost 30 percent of students indicated it), the financial situation (19 percent), friends (14 percent), and the least affect is by the lecturers and mass communication tool. Respondents also MD Management and Decision Making

161 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE highlighted the fact that more than 30 percent of those around them in the near environment of try to follow healthy lifestyle principles and it affects student behaviour. About 85 percent of respondents supported the claim that health is the greatest human asset, a healthy person is the biggest asset of the state, and students indicate that a healthy lifestyle is on their value list. Other important factors in determining compliance with the principles of a healthy lifestyle is the motivation (52 percent), time (49 percent), and money (36 percent). 4 Conclusions 1. After consideration of healthy lifestyle components expression it is revealed that this value has a direct impact on the students' actions, which depend on how they understand and appreciate what they know about, in other words, how students behave in order to be healthy. The main determinants of a healthy lifestyle are qualities of character, lifestyle, social environment, motivation, knowledge, Kinderis R, Zobėlaitė L communication with parents, other family members and surrounding people. 2. The survey revealed that most students consume a lot of fruit and vegetables, that is, it is important to a healthy diet. Quite a lot of respondents rest too little, not properly plan their work and rest, which involve large number of students to experience tension and stress, and it leads to mental fatigue of students. Quite a lot of students try to cheer up or stir in sports, but there is a lack of time and too little physical activity does not help to reduce stress. Although there are students with bad habits, most of them try to get rid of it, or they plan to give them up in the future. 3. The student s choice of lifestyle is mostly determined by family and friends, in other words, those who surround them constantly. Health value cherished in the family encourages students at least partially to live according to the principles of a healthy lifestyle. Also, lack of motivation, time and finances leads to and the indifference of the respondents to live according to the principles of a healthy lifestyle. References Norkus A 2012 Sveika gyvensena Lietuvos studentų populiacijoje: edukacinis diagnostinis aspektas Daktaro disertacija, ŠU Jankauskas J, Jatulienė N 2008 Vilniaus universiteto studentų gyvenimo kokybė Vilnius: VPU Mikšys D 2005 Studentų fizinio aktyvumo motyvacija. Studentų fizinis aktyvumas: dabartis ir naujos perspektyvos Sporto mokslo konferencijos straipsniai, p Kaunas: Kauno kolegijos leidybos centras Poteliūnienė S, Viraliūnaitė L 2006 Socialinių veiksnių įtaka studentų gyvensenai Pedagogika Kardelis K, Miseičienė I, Šaferis V 2001 Studentų gyvensena ir požiūris į sveikatos stiprinimą. Ugdymas Kūno kultūra. Sportas 2(39) 22 6 Tamošauskas P 2005 Studentų fizinio ugdymo atsinaujinimo gairės Kultūra ugdymas visuomenė: mokslo darbai Kaunas: Akademija Bobrova L, Grajauskas L 2005 Lietuvos ir Amerikos studenčių psichosocialinių poreikių, kaip gyvensenos determinantų, ypatumai Mokytojų ugdymas Narkauskaitė L, Juozulynas A, Jurgelėnas A, Venalis A 2011 Psichiką veikiančių medžiagų vartojimo paplitimas tarp Lietuvos aukštųjų mokyklų studentų Visuomenės sveikata 1(52) 91 7 Škėmienė L, Ustinavičienė R, Piešinė L, Radišauskas R 2007 Studentų medikų mitybos ypatybės Medicina 43(2) Stukas R, Dobrovolskij V 2009 Visuomenės sveikatos studentų mitybos ypatumai Sveikatos mokslai 1(62) Gochman D S 1997 Health Behavior Research: Definitions and Diversity. In D. S. Gochman (ed.) Handbook of Health Behavior Research 1 Personal and Social Determinants. New York: Ple-num Press Proškuvienė R 2004 Sveikatos ugdymo įvadas Vilnius: Leidykla Adaškevičienė E, Strazdienė N 2013 Vaikų sveikatą stiprinančio fizinio aktyvumo ugdymas Klaipėda: Klaipėdos universiteto leidykla ISBN Gudžinskienė V, Česnavičienė J 2013 Sveikos gyvensenos ugdymo įgyvendinimas 5-8 klasių mokinių požiūriu [interaktyvus] Vilnius: [žiūrėta 2016 m. spalio 20 d.]. Prieiga per: doi: /sd Urbonienė L 2016 Sveikos gyvensenos pagrindai, arba ką mes žinome apie sveiką gyvenseną [žiūrėta 2016 m. spalio 20 d.] Prieiga per internetą: MD Management and Decision Making

162 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Yelubayeva M, Kabduyeva G, Zhivitere M Process-oriented approach in a quality management of medical services M Yelubayeva 1*, G Kabduyeva 2, M Živitere 2 1 Karaganda State Medical University, Gogolja Str. 40, Karaganda, Kazakhstan 2 ISMA University, 1 Lomonosova Str., LV-1019, Riga, Latvia *Corresponding elubaeva_maral@mail.ru Abstract This paper discusses the main issues of process-oriented approach of management. The main aim of this paper is to emphasize the importance and effectiveness of process-oriented approach, and show its connection with Total Quality Management (TQM) and monitoring system in the healthcare organizations. The secondary data was obtained through the literature review and document study. It is found that the process approach can increase the quality of resources, reduce the costs, and increase the level of satisfaction and healthcare knowledge of consumers. On the other hand, TQM and monitoring can reduce the chance of quality (value) loss within the processes. The use of the process-oriented approach and quality monitoring system of medical services enable healthcare organizations to realize their potential. Process-oriented approach makes an organization more flexible in its performance. Keywords: process-oriented approach, management, healthcare, organization, Total Quality management, monitoring 1 Introduction The aim of this paper is to study the effectiveness of the impact of the process approach and monitoring the quality of healthcare (services) provided by health care organizations. At the present stage of development of healthcare, Total Quality Management (TQM) ideology is becoming increasingly important. As part of the TQM, the quality of health services and medical supplies should be understood not only as achieving or exceeding the level of private or general characteristics of the goods and services but also as a meeting of the needs and expectations of consumers. The role of the consumer, in this approach, plays a patient and an each subsequent member of the technological chain of Public Health. Hence, the foundation of total quality management in healthcare is based on the following principles: 1. The needs of patients form the work of healthcare organizations. 2. Quality assurance is a priority objective of healthcare organizations. 3. High quality healthcare is a result of processes of quality of medical services (organizational, technological, resourcing). The achieving the high quality healthcare services is impossible without a fundamental change in the management system of healthcare organizations. 2 Process management and TQM Medical care is a set of medical services, which aimed for the preservation, strengthening and restoration of human health. Although the term "medical care" is defined as a range of services and it should be tried to be determined whether the data is an equivalent to the concept of quality management system. The pricing mechanism in the healthcare, in fact, has no value expression. It is only the corresponding service. Therefore, the quality of care is determined by compliance with the standards, and quality of services includes also a financial component and the use value for a patient. In terms of the process-oriented approach, medical service is considered as an economic category. The quality management system is based on ISO Nowadays, in most countries, it is the standard of quality management in medicine. The introduction of the version of the international standards ISO 9001: 2001 enhances the understanding of the process. 3 Process management in healthcare organizations An activity using resources is managed in order to transform inputs into outputs and it can be considered as a process. In turn, the healthcare process is defined as an activity, which consists of medical care in relation to a particular patient. The basic principles of the process-oriented approach lies in the fact that all results achieved are shown in the process, which is the driving force behind the needs and expectations of consumers. Any work is a process (or system of processes) transforming resources into a certain result at the output; any product and/or service are the result of a series of interrelated processes that are amenable to planning, management and improvement. Process-oriented approach in the management of healthcare organizations deals with all the processes and changes that occur at different stages of medical services as a whole. This management approach offers new opportunities to optimize the activity of medical organizations and improve their MD Management and Decision Making

163 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE results. Today, healthcare organizations are faced with the need to revise, adjust their activities on a daily basis. So, the processes become the tools in the daily management. The use of the process-oriented approach in the management of health organizations ensures: Flexibility - at every turn in the process structure; Ongoing evaluation and consideration of the interests of all stakeholders; The close link between the process approach and the economy of quality of medical services. However, at the same time, useful changes can bring the changes that lead to a loss of value (quality) of services. Reasons for the loss of quality could be: Technology infringement; Inadequate quality of resources; Human factor; Imperfect management system and/or legislation, etc. All this loss of quality can be found in the performance of individual processes (operations), hence, it is better to manage it during a process performance, i.e, when the quality loss occurs, not when the value of the services has decreased. The advantage of the process-oriented approach is that the rendering is represented as a series of operations and structural formation of a value for the consumer. The understanding of a healthcare organization structure can determine the source of the loss of quality (value) of services in order to prevent the occurrence of these losses in the future. The notion that the keys to efficient operation of the health system are prophylaxis and prevention of diseases can be applied in relation to quality management as well. Diagnosis of loss of quality in the early stages of their appearance is the key to high-value services in the future. 4 Process management and monitoring It is possible to move away from the traditional way and determine the "problem area" in the activities of healthcare organizations. This requires monitoring of the quality losses. Monitoring is defined as purposeful activity related to constant or periodic supervision, evaluation and forecast the state of the observed object (process, phenomenon, system) for its development in a desired direction. The monitoring of the quality of healthcare system should include the following areas: Yelubayeva M, Kabduyeva G, Zhivitere M A continuous assessment of the quality (value) services; Detection of defects and errors that led to decline in the quality and efficiency of services; The study of patient satisfaction by anonymous questionnaire; Operational management response to an identified quality of the loss (of value) services; Continuous evaluation of the status and use of human and material resources. Monitoring allows assessing the situation and taking the necessary measures to improve a quality. These measures will lead to a higher quality of healthcare and efficiency of healthcare organizations. 5 Conclusion In summary, it is better to focus not on a final result of the control of a service but on a management of intermediate processes, and identify deviations and analysis. Moreover, the process-oriented management is closely linked with TQM and monitoring. As a result, the application of a process-oriented approach in a quality management of medical services will bring flexibility in order to: make better use of resources (labour, material, financial); increase the level of satisfaction of medical personnel; prevent and reduce the overheads related to a loss of quality (value) services; manage the process of achievement; increase degree of satisfaction of patients in obtaining healthcare services. The use of the process-oriented approach and quality monitoring system of medical services enable healthcare organizations to realize their potential. Process-oriented approach will transform a patient into a partner and it will make the work more productive for a doctor. Hence, the patient will be healthy and satisfied with the quality of services rendered. A significant advantage of this approach will be a decrease in the overall healthcare system costs associated with training of the patients in areas of healthy lifestyles and formation of skills of disease preventing (prophylaxis). References Harrington J 2007 Process Excellence Management: The Art of Excelling the Process Management Petrenko N A 2015 Management in Public Health-workbook (in Russian) Ronny S, van der Aalst, Wil M P, Vanwersch, Rob J B 2015 Process Mining in Healthcare: Evaluating and Exploiting Operational Healthcare Processes MD Management and Decision Making

164 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Uteubayev T Labour migration and remittances: strategy for survival or development? Talgat Uteubayev * Information Systems Management Institute (ISMA), Riga, Republic of Latvia *Corresponding author s talgat4001@mail.ru Abstract The article is devoted to an actual problem of labor migration, the study of remittances and their role in the lives of migrant households. Remittances are used in migrant households in Central Asia primarily for the purchase of consumer goods. Since labor migration flows in the region tend to increase, and the volume of remittances increase, it becomes much more urgent to use the remittances not only for consumption, but also for development. To develop the programs on the use of remittances for the development of outcomes in the countries and for the achievement there is a need to study the problem comprehensively: the volumes and methods of transfers, their role in migrant households and national economies. Keywords: Labour migration, Migrant remittances, Central Asia, Kazakhstan According to the report of the International Organization for Migration, the number of international migrants worldwide increased from 173 million in 2000 to 244 million in This figure includes nearly 20 million refugees. Accordingly the volume of remittances from migrant workers increased. Migrant remittances defined by the International Organization for Migration (IOM), in the broadest sense is the transfer of cash that a migrant worker or an immigrant in the country to achieve carries out to his relatives in their countries of origin. Transfers may also include investments, deposits or charitable contributions of migrants to their country of origin i.e. to cover the whole financial flows associated with migration. Remittance flows are at the second place after foreign direct investment. Issues of migration and migrants' remittances are crucial for many countries in Europe and Central Asia (ECA), because, according to the World Bank for 2015, four of these countries (Tajikistan, Moldova, Kyrgyzstan and Kosovo) were among the top ten countries in terms of the share of migrant remittances in the value of gross domestic product (GDP). In the past few years in many ECA countries, there has been an increase in the volume of remittances of migrant workers. In most of these countries, the economic growth and the achievements in the field of poverty reduction are closely intertwined with the trends in the dynamics of migration and remittances from abroad. The study on remittances and their role in the lives of migrant households are increasingly carried out Abroad. Global reports of international organizations (IOM, ILO, World Bank) of the last years have sections devoted to remittances, which emphasized the growing role of migrant remittances in national economies. According to a study conducted by the World Bank, the earnings of migrant workers and their remittances, defined as the share of remittances in gross domestic product of developing countries play a large, statistically significant role in reducing poverty. On average the increase in the share of international remittances in GDP by 10% leads to a reduction of 1.6% the proportion of people living in poverty. From the conclusion of scientists, the increase of 10% of international migrants, defined as the proportion of the population living abroad, leads to the 1.9% decrease in the proportion of the population living in poverty. In the 25-year history of migration movements in Kazakhstan and Central Asia region there has been formed the following basic laws. Firstly, it formed a sub-regional migration system centered in Kazakhstan and with more active involvement of Xinjiang to western China in the transboundary movements of Central Asia. Secondly, there is a diversification of the types of migrations with predominance of labor migration as involvement in the socio-economic transformation of Central Asian countries. Thirdly, economic role of labor, trade and business migration and remittances increased in households, communities and national economies. In some countries, such as Tajikistan, remittances are equivalent to 50% of GDP and it is much higher than foreign direct investment and official assistance of international organizations for development. Then, fourthly, temporary migration is more prevalent in Kazakhstan and Central Asia, but gradually there are formed a trend of transformation of temporary migration to permanent migration (moving to a permanent place of residence and the acquisition of citizenship of the Republic of Kazakhstan). At the same time, this is a global trend. Fifth, the role of diasporas in the organization and MD Management and Decision Making

165 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE maintenance of migration, their involvement in the solution of problems of migrants are increasing. The study of the author showed that at the moment in the republics of Central Asia, labor migration and remittances - are mainly a survival strategy, rather than development. "Migradollars" are rarely used for the development of Uteubayev T migrant communities (for the construction or repair of local schools, roads, bridges and communication infrastructure). CAR Government has not developed yet a practical mechanism translations usage for the development of national economies. References Aliyev U, Kurmanov N 2015 Higher education in the Republic of Kazakhstan: problems and improvement methods In CBU International Conference Proceedings Anafyeva Z, Kurmanov N 2008 Pension Reforms in Kazakhstan Journal of Xinjiang University (Philosophy, Humanities & Social Sciences) 6(022) ICMPD 2006 Overview of the CIS Migration Systems International Centre for Migration Policy Development, Vienna. IOM 2015 World Migration Report 2005: Migrants and Cities: New Partnerships to Manage Mobility Geneva: International Organisation for Migration Koretskaya-Garmash V A 2016 Socio-demographic potential of regional development The economy of the region 12(2) (in Russian) Korobkov A, Palei L 2005 The Socio-Economic Impact of Migrant Remittances in the CIS In: International Migration Trends International Migration Trends. Scientific series International migration of population: Russia and contemporary world. Edited by V. Iontsev. Volume 15. Moscow: MAX Press, p Kurmanov N, Yeleussov A, Aliyev U, Tolysbayev B 2015 Developing effective educational strategies in Kazakhstan Mediterranean Journal of Social Sciences 6(5) 54 Masanov N 1999 Migratsionnye metamorfozy Kazakhstana In S. A. Panarin, A. N. Vyatkin and N. Kosmarskaya (eds), V dvizhenii dobrovol nom i prinuzhdennom: postsovetsie migratsii v Evrazii, Moscow, Natalis pp (in Russian) Park R E 1928 Human migration and the marginal man. American journal of sociology Ravenstein E G 1885 The laws of migration Journal of the Statistical Society of London 48(2) Sadovskaya E 2007 Chinese migration to Kazakhstan: a silk road for cooperation or a thorny road of prejudice In China and Eurasia Forum Quarterly 5(4) Sadovskaya E 2016 International Migration to Kazakhstan in the Period of Sovereign Development Kazakhstan spectrum Journal 1(75) 7-43 Sadovskaya Y 2002 Preduprezhdeniye nezakonnoy migratsii v Respublike Kazakhstan [Prevention of Irregular Migration in the Republic of Kazakhstan] Illegal Immigration. Scientific series International Migration: Russia and the Contemporary World Edited by V.Iontsev 9 Moscow: MAX Press, (in Russian) Sadovskaya Y 2006 Labor Migrant Remittances and Their Role in the Migrant Households of Central Asian Countries Central Asia and the Caucasus 3(39) Shcherbakova E M 2014 Remittances of International Migrants. Demoscope Weekly , 1-32 URL: /2015/0641/barometer641.pdf (in Russian) Sirkeci I, Cohen J H 2015 Measuring impact and the most influential works in Migration Studies Migration Letters 12(3) Thomas W I, Znaniecki F 1918 The Polish peasant in Europe and America: Monograph of an immigrant group 2 University of Chicago Press Толысбаев Б С, Утеубаев Т Б, Курманов Н А 2016 Человеческий потенциал Казахстана и в странах ЕАЭС MD Management and Decision Making

166 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Djakona V Abstract Importance of scientific and practical tools in managing the components of intellectual capital of an enterprise Valentina Djakona* ISMA University, Lomonosova 1/6, LV-1019, Riga, Latvia *Corresponding author s valentina.djakona@isma.lv Socio-economic and scientific-technological progress, informatisation and intellectualisation of labour activity increase the role of intellectual capital in the activity of business entities of all types and forms of ownership. In the conditions of knowledge economy it is exactly cognitive components of human capital and various types of intangible assets that become determinant while ensuring competitiveness and increase in value of enterprises. Keywords: intellectual capital, scientific and practical tools, strategy of multi-vector management of intellectual capital, human capital, market capitalization, structural capital Efficient management of a company's intellectual capital is ensured on the grounds of adequate assessment and continuous monitoring of the dynamics of the company s development, and on the identification of upward trends for specific types of intangible assets, which is implemented in the course of the company's financial and economic activity. The systematic monitoring of this invaluable asset ensures obtaining of important information for making managerial decisions. However, methods of intellectual capital monitoring allow to only state the current condition of specific components of intellectual capital at a certain point in time. They merely form informational base for managerial decision making and for the development of specific ways to increase the efficiency of use and to activate accumulation of intellectual capital. Monitoring alone is insufficient for the comprehensive management of intellectual capital. It is necessary to develop the tools which would give an opportunity to not only evaluate the current condition of different components of intellectual capital at an enterprise, but also to develop specific directions of its improvement, which will result in significant benefits (profit growth or cost reduction) for an enterprise. To develop a strategy of efficient intellectual capital management of an enterprise it is essential to, firstly, identify its strategic and tactical goals and, secondly, to work out relevant tools, which will make it possible to not only evaluate the current condition of different components of intellectual capital, but also to develop the strategy of their development. To meet the set objectives the Author proposes the strategy of multi-vector management of intellectual capital. The strategy includes three main directions: human capital development, market capitalization increase, structure capital accumulation. Human capital development aims at the maximizing the efficiency of staff. Objectives: 1. identification of the employees, investing in professi 2. onal and personal development of which will bring the greatest benefit to the enterprise; 3. investing in the development of the key employees; 4. investing in the formation of effective project teams; 5. corporate culture development. Market capitalization increase. Aim: effective management of market capitalisation. Objectives: 1. identification of the company s aims and clients expectations; 2. identification of the tools or projects which contribute to the increase of market capitalisation of the enterprise; 3. determination of the budget for the implementation of specific tools, as well as stating potential economic benefits of the project; 4. implementation of the tools or projects. Structure capital accumulation. Aim: to gain long-term benefits and sustainable growth of structure capital. Objectives: 1. identification and implementation of the projects which lead to long-term benefits and sustainable growth of structure capital; 2. improvement of a company s business reputation and development of business information systems. Conclusions Effective management of the intellectual capital of an enterprise is ensured by credible evaluation and continuous monitoring of the dynamics of its development, by identification of the upward trends of certain types of intangible assets, and is implemented during financial and economic activity of an enterprise. Implementation of monitoring alone is insufficient for the comprehensive management of intellectual capital. To develop a strategy of efficient intellectual capital management of an enterprise the Author proposes the strategy of multi-vector management of intellectual capital, which includes three main directions: MD Management and Decision Making

167 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE human capital development, market capitalization increase, structure capital accumulation. The proposed strategy of multi-vector development will enable an enterprise to comprehensively analyse each component of its intellectual capital, to identify the projects Djakona V which are aimed not only at the gaining of long-term economic benefits, but also at the achievement of the full capitalisation of investments in each component of intellectual capital. References Edvinsson L 1997 Intellectual Capital: The Proven Way to Establish Your Company s Real Value by Measuring Its Hidden Brain power L. Edvinsson, M. Malone. N. Y.: Harper Business 225 p. Молодчик М А 2012 Интеллектуальный капитал компании: диагностика и подходы к управлению Пермь: Изд-во Перм. нац. исслед. политехн. ун-та 219 с. MD Management and Decision Making

168 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Ardalina N, Ahmadejeva M. Mnif J The management system improvement budgeted by the educational institution under the unstable financial funding conditions N Ardalina 1, M Ahmadejeva 2, J Mnif 3 1 ISMA University, 1 Lomonosova Str., bld. 6, Riga, Latvia 2 LV Latvian University 3 Nour el Maaref Private School, 16 Av. El Bousten, Sfax, Tunisia Abstract The paper deals with the problems of modern management system budgeted by the educational institution and offers ways of improvement in order to optimize the educational system under the unstable financial funding conditions. Keywords: education, management, efficiency, budget cost, management system, financial funding 1 Introduction The problem of management system improvement budgeted by the educational establishment is currently topical since the market of educational services in Russia is only beginning to emerge. The aim of this report is to turn attention to the issue of cost management of the educational institution in the circumstances of uncertain financial funding and economic risks. 2 Main part The educational system of Russia launched in circumstances of state budget financial funding, under the new economic conditions and conditions of general economic crisis, found itself unprepared for a new economic functioning mechanism and got into a difficult financial situation. It had its effect not only on the level of training of modern professionals, but also on the efficiency of the educational management system. The unstable financial funding of educational services had an impact on the level and type of providing the national economy with highly qualified personnel. The problem of improvement and cost management in educational institutions of Russia is based on economic postulates with the use of modern information technologies and computer engineering. Its solution is being achieved by using a set of interrelated tasks: 1. The scientific substantiation of the specifics of functioning of educational 2. institutions in the circumstances of market economy and the definition of the role of cost management in their activities. 3. The formation of cost management system of indicators and determination of their impact on the efficiency of development and quality of education. 4. The development of actual directions of improving the cost management system of educational institutions on the basis of mathematical modeling. 5. The development of methods and cost management system automation technology with the use of general scientific methods of economic analysis, systems theory, decision making theory, economic and mathematical modeling methods. 3 Conclusions The current system of cost mechanism accounting for educational activities requires an improvement by: The formation of cost management system of indicators that affect the efficiency of the educational system development as a whole; The development of educational institutions cost management models aimed at the improvement of the management system itself; The Information Technology and technological support of the educational system; The development and use of advanced methods and automation algorithms for cost management models based on modern information technologies and computer engineering. All of the above mentioned will allow not only to improve the current system of cost management of the educational institution, but also, in the circumstances of unstable financial funding, to make it possible to manage the resources of educational institutions promptly and in a timely manner, as well as to enhance their competitiveness in the market of educational services. MD Management and Decision Making

169 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Riashchenko V Key trends in the development of business education Viktoriia Riashchenko ISMA University, 1 Lomonosova Str., build. 6, Riga, LV-1019, Latvia Corresponding author s viktorjas@gmail.com Abstract At this point in time, the public significance of the education system, both general and professional, has increased manyfold. Global changes in the technological, economic and social development of world civilization have turned education into a strategic factor in the progress of society. The growth of the scientific, technical, socio-cultural and spiritual potential of the society is directly related to the level and condition of the education system, the raising of the educational and professional level of the entire population. It should be noted that the influence that the formation of a postindustrial society has on education. The main question is what kind of social order will replace the industrial system, and the answer to it becomes more urgent. In the postindustrial society against the background of machine technology, information technology, based on the increased intellectual potential, is becoming increasingly important. This phenomenon must be accompanied by an appropriate modernization of the education system. In the event that the education system can not provide support for career changes, then education as an independent category of business can leave the market. Keywords: development, business education, process of education, education 1 Introduction Many advanced firms, enterprises and organizations have relied on building human capital in the field of business management. Presence of the personnel of the highest qualification makes them practically inaccessible to competitors who, having the same advanced technology and technology, lose to them in the management potential developed with the help of high-quality business education. There was an acute need for the objective adjustment of business education to the needs of competitive development of enterprises. And in this regard, an urgent scientific and practical problem was the study of the entire spectrum of management problems related to the use of business education as an effective means of developing the management potential of the entire enterprise. Modern conditions predetermine the presence of several trends, characteristic for the education sector. First, there is a trend of so-called structural relevance. Any educational program of an institution becomes more and more structured. Actuality is expressed in the fact that the curricula are not compiled on the basis of classical models that have proved their workability using precedents of the past, but on the basis of the factors of the modern period. In business there is only one currency, it is called "result". You must be in constant readiness to demonstrate the relevance of yourself, your position, otherwise, if your employer feels that you are pulling the team back, he will have to shorten your post. Relevance can be supported by new knowledge. Often I came across such a problem when a person does not want to realize that his own knowledge has ceased to be relevant, moreover, in other cases he believes that he already knows everything. In addition, most people at the moment believe that the theoretical knowledge obtained at universities should have a higher priority than applied skills, in particular, the ability to establish business ties. In certain cases, theoretical information can be presented in the right way and can be of practical use. For this, it is necessary to structure this information. It is necessary to abandon the quantitative flow of data, albeit useful in content, and to emphasize the structuring of curricula based on the actual specificity of the sphere of this or that sphere of business. In addition to this condition, it is important to achieve a change in attitudes in the minds of company management in favor of introducing innovative teaching methods aimed at a concrete result. The next trend: the learning process ceases to be tied to any particular place, concrete building or institution. Training becomes mobile - you can access the training materials with the help of existing means of communication: computers, mobile devices. Also, people get the opportunity to quickly apply to expert opinions on a particular issue, and going to the library, thus, may not be the most rational decision. Most educational enterprises now came to the conclusion that it is necessary to actively introduce innovative teaching methods using all available technical capabilities. The most important features of the current stage of development of business education in Latvia can be presented as follows. 1. Transfer of emphasis on new knowledge and competences acquired by the listener. At the same time, their priority is increased in comparison with a formal diploma or degree. To form the necessary skills and competencies, it is not always necessary to have formal, licensed and accredited (by the state or professional associations) educational institutions that issue appropriate diplomas of the "state sample". It is enough to have teachers ("trainers"), whose knowledge and skills are demanded by listeners. 2. Demand for shorter and more time-concentrated MD Management and Decision Making

170 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE programs. This trend first manifested itself in Europe, where the acceleration of integration processes constantly demanded the involvement of all new managerial personnel on the market. The answer to this challenge was a reduction in the terms of training in business schools, and in some of them they were initially 1 year (in most Western European schools, including LBS and INSEAD). 3. Choice of the form of training. The complete separation of the student from the business for the purpose of obtaining additional education, as a rule, is inconvenient and deprives the listener of the opportunity to immediately test the received knowledge in practice. This leads to ubiquitous reorientation to modular formats and part-time. This allows people in the case of financial difficulties to study the program in blocks. In other words, listeners can pause at a time convenient for them and either continue their education after a while, or limit themselves to the knowledge gained. This process has seriously changed the structure of client bases of business schools and increased their volume. 4. Strengthening the role of global online education. Until 2010, it represented mainly distance learning systems, video lectures on the Internet. In September 2011, a revolution in this area is attributed to the emergence of so-called mass open online courses (MEP). For the first time, free courses for students from all over the world offered full-fledged courses from universities, which are included in the top 10 international ratings. What was previously available only to a very limited number of people and for a lot of money, in 2011, for the first time it was open to all. This is the course of Harvard, Stanford, Princeton and other leading universities in the world. One of the first such courses on artificial intelligence was offered by Stanford, about 150,000 people registered for him in a short time. This was the beginning of the second generation of online education. Today there is a boom in the development of the MEP, there are several international online platforms. The most famous is Coursera [5]. 5. Segmentation of consumers of business education. The ineffectiveness of joint training on MBA programs of students with different experience, official position, with different levels of tasks is Riashchenko V obvious. Thus, the Executive MBA program emerged and became widespread. 6. The emergence of functional specializations. MBAmanagement began to operate in healthcare, education, culture. Moreover, specialized programs began to appear in the MBA format. 7. Increased internationalization of MBA programs. This is reflected in an increase in the number of foreign students on programs, as well as in the organization of joint educational projects of Latvian business schools with other European colleagues. 8. Marketing of business education. Business schools have to constantly adapt, change and adapt to the "mood" of listeners. As in any other market, its players - business schools - usually use a whole set of indicators to assess the effectiveness of their activities, and here an important indicator is the degree of customer satisfaction. This satisfaction with the duration and mode of training, the forms of information, the quality of knowledge obtained during the training and even the reputation of the chosen business school. 2 Conclusions In conclusion, it is worth mentioning the share of business components in business education, which is discussed throughout the history of the existence of business schools. The educational aspect is obvious and there is no doubt that the students are taught at business schools. However, in addition to the aggregate of some knowledge, the exchange of practical experience of entrepreneurs and managers in the classroom and the mastery of new practical management skills play an equally important role, for which practitioners and consultants play an important role in the teaching building. Thus, the market for business education will grow by orders of magnitude. And most of it, on the one hand, is a vulnerable place, on the other - promising - this is not a lack of demand, and not a demand-matching proposal. The training needs of the business are large. It is important to understand the relevance of any request and the disclosure of a particular topic at the exact moment it is in demand, and also to offer training in the format that is most convenient. Educational institutions are increasingly willing to change programs for specific requests. References Mintzberg H 2004 Managers not MBAs, A hard look at the soft practice of managing and management development London: Prentice Hall Khurana R 2007 From higher aims to hired hands: The social transformation of American business schools and unfulfilled promise of management as a profession Princeton, NJ: Princeton University Press Graduate Management Admission Council (GMAC) 2006 MBA Alumni Perspectives Survey: Comprehensive data report Graduate Management Admission Council (GMAC) 2007a MBA Alumni Perspectives survey MD Management and Decision Making

171 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Riashchenko V, Kleshchevnikova Zh, Bezpartochnyi M, Seifullajevs R, Kalyta L Abstract Marketing in social entrepreneurship Viktoriia Riashchenko 1*, Zhanna Kleschevnikova 1, Maksim Bezpartochnyi 2, Rolands Seifullajevs 1, Luydmyla Kalyta 1 1 ISMA University, 1 Lomonosova Str., build. 6, Riga, LV-1019, Latvia 2 Poltava Universityof Economics and Trade, Ukraine *Corresponding author s viktorjas@gmail.com The object of the research are the social entrepreneurs and its business development. The aim of the research is to discuss existing marketing strategies applied to social entrepreneurship and to offer possible ways of their improvement. The research is relevant and consistent with the increasing role of social entrepreneurship taking the full power throe the fast changing political, economic, socio cultural and technological circumstances of the 21 st century. While marketing the social entrepreneurship, the focus on marketing strategies must be revised. The research methodology includes both traditional and modern elements of marketing, such as marketing mix, strategies, customer segmentation and targeting, pricing altogether with the main elements of social entrepreneurship, such as social and economic aspects. The results present thet in standard marketing strategies, the strategy for social entrepreneurs should include segmentation of the customers and consumers by taking into consideration standard criteria (such as geographical, demographical, psychographic and behavior segmentation) but also implementing own criteria most adequate for the products they are currently interested to produce. It is important which factors are significant enough to take decisions of expansion, harvest or liquidation of products. Keywords: marketing mix, marketing strategy, social entrepreneurship, social sustainability 1 Introduction Every type of business consists of following market participants: suppliers, intermediaries, companies, competitors and customers. Social entrepreneurship, as an object of the research, is also a part of the modern business environment with the one exception customers of the product or service produced by such companies are not often the consumers or targeted customers of the related goods. In many cases the decision maker is that paying part, such as the government, a foundation, an individual sponsor or a funder. The ultimate consumer in many cases gets an access to services at no cost or at discounted prices through the payer. This additional customer profile makes an issue of this research as in the case of social entrepreneurship the focus on marketing strategy should be slightly different from traditional businesses. The aim of the research is to discuss existing marketing strategies applied to social entrepreneurship and to offer possible ways of their improvement. The research is relevant and consistent with the increasing role of social entrepreneurship taking the full power throe the fast changing political, economic, socio cultural and technological circumstances of the 21 st century. While marketing the social entrepreneurship, the focus on marketing strategies must be revised. For social entrepreneurs sometimes main benefit is not a profit but grow of positive reputation. This can be achieved throe dissemination of marketing strategies, devoted to enhance the image through public recognition. The same can be stated both for customers of socially related goods and for the final consumers. The goods they buy may mean to them not only profitable deal and cost optimization but also can increase their intangible sense of social outcome. The research methodology includes both traditional and modern elements of marketing, such as marketing mix, strategies, customer segmentation and targeting, pricing altogether with the main elements of social entrepreneurship, such as social and economic aspects. Works of various authors related to the research field were analyzed, such as Ph. Kotler (Principles of Marketing) [8], J. Dees (Entreprising nonprofits ) [3], J. Boschee (Strategic Marketing ) [2] and others [5, 7, 9]. Tools of the research include observation, experiment, analysis of the specific literature and statistical methods, interviews with participants of social entrepreneurship. Ethics of the research must take into consideration specific groups of the targeted consumers that often represent different minorities, people with disabilities, low income population and taking into attention rapidly changing political situation in European Union refugee groups. While discussing a role of marketing in the social entrepreneurship an additional element should be stated among the main elements of marketing mix and this is a social impact. The social mission, its goals and objectives should be analyzed altogether with product, its price, distribution place and necessary promotion. When evaluating special target group for social business following questions should be stated and discussed by decision makers: 1. Most segments of the final consumers should be stated. 2. Which of them are reached and served in a most effective way with the most limited resources? 3. How is it possible to attract more of prospective consumer segments? Which customers should be involved then? MD Management and Decision Making

172 The 14th INTERNATIONAL SCIENTIFIC CONFERENCE Riashchenko V, Kleshchevnikova Zh, Bezpartochnyi M, Seifullajevs R, Kalyta L 4. Is the cost consistent with the social outcome? 5. Are there certain ways to decrease the cost without reducing the impact provided? FIGURE 1 Marketing environment of social entrepreneurship On a figure 1 there is marketing environment of social entrepreneurship analyzed. Unlike the tradition entrepreneurs, social entrepreneurs should take care not only about their profit maximization. Social impact and increase of positive brand or company`s image reputation must also be taken into attention. As a company, it meets on a market with competitors who could have better market proposition or have/ have not been socially targeted. In this case there also should be different strategies applied. Sometimes socially targeted competitors have the same intention with the company and their interests intersect or match. In this case competitor may become a partner or even intermediary on a way to a related targeted auditorium. For example a company that produces food with the purpose to disseminate for a special social group (as homeless people) and sponsored by a public body or a foundation may join with food disseminators on wheels that serve the same or similar groups of people. In this case resources spent on promotion and distribution elements of marketing mix will be decreased and total cost of the product will become lower as well. 2 Conclusions While marketing the social entrepreneurship, the focus on marketing strategies must be revised. For social entrepreneurs sometimes main benefit is not a profit but grow of positive reputation. This can be achieved throe dissemination of marketing strategies. In the social entrepreneurship an additional element should be stated among the main elements of marketing mix and this is a social impact. Intangible outcome customers and consumers get when purchasing goods or services from social entrepreneurs. This outcome should be positioned as an additional element of customer s response to the marketing mix. Social impact from marketing mix meets intangible outcome, the sense that customers get while buying socially related products. It is stated that making strategic marketing decisions, however, is more difficult for a social entrepreneur than it is for either a traditional nonprofit or a commercial business, both of which are primarily concerned with a single bottom line. A traditional nonprofit will continue offering products and services that have a significant social impact even if they lose money; commercial enterprises will not. Social entrepreneurs, on the other hand, are equally concerned both with social impact and income, and that means they must simultaneously analyze the social impact and financial viability of each product and service - and only then they are ready make decisions about which ones to expand, nurture, harvest or kill. The same as in standard marketing strategies, the strategy for social entrepreneurs should include segmentation of the customers and consumers by taking into consideration standard criteria (such as geographical, demographical, psychographic and behavior segmentation) but also implementing own criteria most adequate for the products they are currently interested to produce providing also a social impact. To measure which factors are significant enough to take decisions of expansion, harvest or liquidation of products, following then should be taken into attention: significant success factors; environment forces; competitors and their power. Acknowledgments This study was partly supported by the New D(o)or, starptautiska sociālo inovāciju platforma. Link: References About Lude. Textile rugs. Link: (accessed ) Boschee J 2015 Strategic Marketing for Social Entrepreneurs. Social Enterprise Reporter Dees J G, Emerson J, Economy P 2001 Enterprising Nonprofits: A Toolkit for Social Entrepreneurs Toronto: John Wiley & Sons Etsy.com ship_to=lv (accessed ) Hamel G 2000 Leading the revolution. Harvard Business School Press Boston Jysk product sortment Link: (accessed ) Kalb Ira 2015 Marketing: the missing ingredient in social entrepreneurship Huff Post Business newspaper Kotler P, Armstrong G 2007 Principles of Marketing 14 th Edition. Pearson Prentice Hall Mair J, Schoen O 2005 Social Entrepreneurial Business Models: An Exploratory Study. ESE Business School, University of Navarra, WP 610 October 2005 New D(o)or, social initiative Link: (accessed on ) MD Management and Decision Making

173 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Bukas D Dynamics and controllability dilemma in business organizations Abstract Daniil Bukas ISMA University, 1 Lomonosov Str., LV-1019, Riga, Latvia *Corresponding author s daniil.bukas@inbox.lv This article discusses the issue of the system change while increasing its dynamics in the process of constant influence of the external and the internal environment of the organization. A constantly changing, aggressive environment leads to the serious decisions making which have both positive and negative impact on the state of the system. Each decision made by the management of the organization leads to a change in the certain elements of the system, which in turn can have a direct influence on other participants оf the system. Keywords: learning ability, adaptation, practices, resistance, procedures, methodology 1 Introduction Currently, effective management consultants help managers of organizations to improve the employees learning ability to adapt to open systems [1]. Such consultants, caring about the effectiveness of the offered solutions, direct their efforts to the so-called "fine-tuning of the business" [2]. Thus, they seek to ensure the sustainable orientation of business organizations. All this requires from the managers focusing on the management processes, and getting a bigger return in the search and testing of the best management practices [3]. The introduction of practices, on the one hand, allows you to catch up with the surrounding business trends, and on the other hand, causes resistance from the opponents of innovation, which, in turn, leads to loss of control. It is about preserving the norms of managing the organization in conditions of increased business activity [4]. 2 The main problem With this approach, a contradiction arises, expressed in the fact that high dynamics without strong controllability can break the business. In its turn, order without dynamics is doomed and therefore is not systemic. In the organization it is necessary to introduce sources and means of development, and then the order will be adjusted to the development goals, and not vice versa [5]. The arrival of new leaders to the company leads to disruption of continuous improvement. With changes in leadership, there are also changes in the management philosophy. Only obvious quantitative indicators usage in management, without considering immeasurable indicators [6]. 3 Purpose This study is focused on developing a procedure of increasing of the dynamics and controllability of the organization, as well as maintaining the integrity of the system and preventing the leaders from making the crucial managerial mistakes under the pressure of an ever-changing, both internally and externally, aggressive environment. 4 Overview Revealing the content of the set goals, a number of key questions was raised, the answers to which were the basis for the study of the problem. The necessity: to classify the dynamic aspects of the organization, including: growth rates; the speed of change and of the feedback; to systematize the pooling of the goals and the actions of employees; to increase the stability of the system in detecting anti-system reactions from management; to identify the most crucial changes in the internal structure of the organization which affect the changes in its system; to develop a combining methodology on the basis of the qualitative organizational arrangement; to test the results of the methodology in the framework of a sustainable enterprise. 5 Solution In the course of improving the management mechanisms, tuned to the result-oriented process, the following solutions were obtained: First and foremost, a thorough and detailed study of the organization system is needed to identify the elements that are the most unstable and poorly adapted to the changes. Secondly, the changes made after the analysis of the organization system should also be subject to detailed analysis to identify positive and negative impact on system. These decisions will be justified and will help the company to increase its resistance to external and internal changes. MO Management technologies & organisational growth

174 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT Conclusions The results of the research are aimed at harmonizing the Bukas D interests of the companies owners, their managers, employees and investors and all the interested participants of business organizations. References [1] Лалу Ф 2016 Открывая организации будущего Москва: анн, Иванов и Фербер 332 с. [2] Пригожин А И 2015 Управленческие идеи: Вы какое положение на рынке хотите занять? Как для этого должна измениться Ваша организация? Москва: ЛЕНАНД 480 с. [3] Минцберг Г 2011 Действуй эффективно! Лучшая практика менеджмента. Санкт-Петербург: Питер 288 с. [4] Bukas Daniil 2016 Дилема динамики и управляемости в бизнес организациях 4th International Scientific Practical Conference Business Environment 2/12/2016, Riga, Latvia [5] Пригожин А И 2015 Управленческие идеи: Порядок против развития. Москва: Ленада. 25 с. [6] Деминг У Э 1990 Организация как система: Смертельные болезни. Москва: Ленада 98 с. MO Management technologies & organisational growth

175 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kondratenko A Abstract The problems of innovations and investments in business projects Anzelika Kondratenko ISMA University, Lomonosova Str. 1, LV-1019, Riga, Latvia *Corresponding author s Anzhelika.demidova@gmail.com The present article deals with the question of innovations and investments in new business projects. It is referred to the problems of innovation in a company, and factors that allow to make decisions regarding business investment. The entrepreneurs often deal with disruptive technologies and solving dilemmas. These entrepreneurs have to learn how to solve dilemmas and to work with disruptive technologies. In this article, the solution of a dilemma is shown from the perspective of an investor. Keywords: dilemma, innovation, disruptive technologies, investment 1 Introduction Any organization has various life cycles. A company owner have different objectives at every stage of company development. For example, in the beginning of development, it aims to make a profit; at the initial stage, a manager neglects an increase of the company value, as there should be a proper time for everything. In every cycle,an entrepreneurdeals with various dilemmas. [1]. One of the problems of an innovator is that good managers would like to be as close as possible to a consumer, and this often leads to irrecoverable mistakes. The problem is that, when it comes to supporting innovations, companies often attend to the consumers, but managers are not flexible enough to look at the situation within the emerging markets. The leading companies become hostages of the consumers, and are unable to deal with new companies every time a disruptive technology emerges [2]. 2 Main problem In the present work, two main problems are examined: inability to solve a dilemma in timely manner, and inability to start working with a disruptive technology in timely manner. As practice shows, the solving of dilemmas is a complicated task for company owners, as a dilemma may have only one solution, either YES or NO, there is no third option. However, entrepreneurs often try to unite several variants of dilemma solutions, and by this, they cause numerous issues, which in course of time only accumulate and increase. Company owners have to learn how to make a choice and solve dilemmas [1]. For an entrepreneur, it is often difficult to make decisions concerning the work with disruptive technologies because such work is completely different from the work with supportive technologies. Work with innovations requires the ability to act in the situation of complete uncertainty and flexible reaction to any changes, the ability to make intuitive decisions, as well as to make decisions in such way so that objectives and vision of the company could coincide [2]. 3 The objective The present work is based on the following objectives: to unite the theories of I.V.Ivashkovskaya and C. M. Christensen in order to understand how to solve a dilemma from the perspective of an investor; and to classify the factors for innovator's dilemma solutions. 4 Review To disclose the contents of the stated objectives, a number of key questions were raised, and the answers for them served as a basis for the research of this problem: the study and analysis of the dilemma solution theories ofi.v.ivashkovskaya and C. M. Christensen; the comparison and unification of the theories of I.V.Ivashkovskaya and C. M. Christensen; the classification of innovative factors for dilemma solution. 5 The solution While unifying the theories of I.V.Ivashkovskaya and C. M. Christensen, the following results for the solution of dilemmas were obtained: A dilemma of professional competence- either to retrain the personnel, or to establish a new independent company with new management; the company owner s dilemma to sell a part of his sharesand to invest into another financial tool a new independent organization; the investor s dilemma the main task is to increase the value of a company and to create the procedures and values of the company. These solutions may help anentrepreneurto solve the innovator s dilemma. MO Management technologies & organisational growth

176 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT Conclusions The results of the present work will be needed for potential investors to enable them to make decisions regarding investments in a new project. Kondratenko A Having the solutions for dilemmas and the classification of factors for innovator's dilemma solutions at their command, it would be easier for the investors to act and create a vision and objectives of the company. References [1] Ivashkovskaya I V The Establishment of A Corporation in the Context of The Lifecycle of Organization [2] Christensen C 2014 The Innovator's Dilemma Moscow: Alpina Publisher 280 p. [3] Beer S 1963 Cybernetics and Production Management Moscow: Science, pp 276 (in Russian) [4] Litvak B G 2015 Management portraits Retrieved: (in Russian) [5] Litvak B G 2015 On my books Retrieved: (in Russian) [6] Miscenko S 2014 Modality of managing the generation of resultant ideas: multidimensional organization structure The 12 International Scientific Conference Information Technologies and Management 2014 April Riga. Latvia [7] Miscenko S 2015 Genesis of management science through the prism of practical and theoretical studies in the researches of beer S. and Litvak B.G. The 13 International Scientific Conference Information Technologies and Management 2015 April Riga. Latvia [8] Hamel G, Breen B 2007 The future of management harvard business press, pp.272 MO Management technologies & organisational growth

177 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Akimov G Abstract Diagnostics of management technologies in the context of business organization Gleb Akimov ISMA University, Lomonosova Str. 1, LV-1019, Riga, Latvia *Corresponding author s gleb_akimov@gmail.com This is a study of the new means of fundamental diagnostics, which are focused at the identification of management problems and exclusion of organizational pathologies. Systematization of both early and late symptoms lies in the basis of diagnostic evaluation. The results of such systemaization serve as grounds for the development of symptomatic measures, which are viewed as a way of eliminating the manifestation of external pathologies. This calls for drastic sure aimed a tradical changes within a business organization. Keywords: subject, decision, mechanisms, results, procedures, approbation 1 Terms of reference Business organization in the open-systems context is associated with a high level of ambiguity [1]. Against the background of conventional market and resource ambiguities, which are routinely experienced by modern managers, there are manifestations of technological and organizational misunderstandings [2]. The current problem of multidirectional ambiguities is further complicated by their interaction by way of synergy. Therefore, for an investment project to pass a complex initial phase successfully, one must reduce the ambiguity in all four directions. All this requires objective means of interpretation of complex situations related to the choice of management technologies [3l]. In aggregate, the said means are part of the fundamental diagnostic system, whose functions are confined to the analysis and estimation of the management technologies development and efficiency upgrading. The aim of the fundamental diagnostics is to form a general view of the stable functioning of a business organization, and to determine pathways of in depth studies aimed at the identification of management problems. Such diagnostics, based on strategy-oriented approaches, must provide for special requirements to business information gathering, processing and analysis. The object of research is the unstable functioning of a business organization. To identify the measures determining the state of instability, one must conduct a comprehensive analysis of the symptoms related to the organization systems conversion into a non-operable state. The focus is on the object of research, whose backbone is to identify the causes of the onset of critical state within a business organization. 2 Specifics of management technologies diagnostics When estimating a new business before its startup, one must take measures to enhance its stability. That is predetermined by high ambiguity, which is the source of not just risks but also potential wrong diagnoses. Therefore, the risk of high losses will grow unless possible mistakes are excluded at the preliminary stage of investigation. From the managerial viewpoint, one must not record deviations in diagnostic parameters, and not create conditions for augmentation of organizational pathologies. This is the manifestation of the specifics of management technologies diagnostics, which must be tuned to specific management technologies. Of special importance are the following two categories: ambiguity and tolerance, which are closely interrelated in the context of diagnostic measures. Tolerance for ambiguity includes the following three components: First, it is the ability of compensating for the missing information by way of thinking process, the ability of seeing more than is known about a situation, thereby making up for the ambiguity. Second, it is the ability of perceiving ambiguous situations not as threatening or mentally disturbing but as natural and inevitable, although undesired. Third, ambiguity tolerance comprises such personality traits as self-confidence, determination, lack of fear of defeat, high level of ambitions, emotional stability, independence from the group, low reflectivity. Thatishowthediagnosticsystemuserreachesstrategicdeci sionsandmakes conclusions regarding the quality of the decisions made. Thus, in the context of open systems, special attention is paid to specific, tailor-made business diagnostic methods for a concrete enterprise. For example, in estimation of a stable business, there are two interpretations of the IRR value indicator, which are used in the new quality of the business deposit and the rate of return on capital. The comparison of the two allows linking of the two positions together: business and management. Ignoring of the aforesaid specifics would reduce the diagnostic accuracy, which may lead to major mistakes, and, consequently, to losses and damages. 3 Applied aspects of productive diagnostics Any diagnostics, whatever the object of research, must be considered from both sides [4]. Firstly, at the beginning of the investigation, the diagnostic means help identify the problems, select the main MO Management technologies & organisational growth

178 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 spheres of expedient in depth studies and work out measures for management improvement and a relevant plan of activities. Secondly, having completed the whole set of investigations, one must verify the hypothesis, which was put forward at the initial stage, formulate the final conclusions about the problems existing in management sphere and specify the possible solutions in view of the specifics of the given business entity and its environment. Developers of diagnostic systems and management technologies must have the means of business objective appraisal at their disposal. The aforesaid means must provide for verification of the fulfillment of the specified goal-setting conditions, which must be previously identified using the main management parameters. When estimating the stable functioning of a business entity, a general view of in depth studies of management problems identification is formed. Such a view requires development of algorithms for diagnostics, which shall be unique for each business entity. The basis for the said algorithms is such methods of analysis as oriented at the identification of problems and bottlenecks in the management system. The management system diagnostics algorithms must be tailor-made for each individual business entity. The algorithms are based on methodological support providing Akimov G for a number of consequential procedures, which would enable to gain reliable information about the business entity s development problems. As a methodology for productive diagnostics, organizational measures have been proposed consisting of 28 stages. 4 Results Diagnostics is the first stage in the management improvement process resulting in identification and formation of objectives to be fulfilled in the course of development and implementation of a complete set of specific activities. For a business organization, conducting of diagnostics would bring a number of positive results. Firstly, the business entity receives information updates about the state of the business entity as a whole. Secondly, consulting methods used during the diagnostics would ensure both collection and production of information, which cannot be gained by a manager by any other methods. Thirdly, the application of organizational diagnostics helps identify the core problem with in a business organization, which will subsequently helps resolve a set of minor problems. References [1] Лалу Ф 2016 Открывая организации будущего Москва: анн, Иванов и Фербер 332 с [2] Кристенсен Р 2012 Стратегическое управление человеческими ресурсами. Дорожная карта. Москва: Олимп Бизнес 288 с. [3] Исмаил C, Мэлоун М, ван Геест Ю 2017 Взрывной рост: Почему экспоненциальные организации в десятки раз продуктивнее вашей (и что с этим делать) Москва: Альпина Паблишер 216 с. [4] Пригожин А И 2003 Методы развития организаций Москва: МЦФЭР 864 [5] Каммингс С 2010 Реконструкция стратегии Харьков: Гуманитарный центр, 560 с. MO Management technologies & organisational growth

179 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Sidorova J Technology advancement venture into a new market Jelizaveta Sidorova ISMA University, 1 Lomonosov. Str., LV-1019, Riga, Latvia *Corresponding author's liza.sidorova@inbox.lv Abstract This study examines the question of what is currently in the existing conditions of tough competition and have an old business model needs to be modified for the disclosure of the potential in a new market and strengthen competitive status. The fact that in this approach there is a contradiction expressed that modification and introduction of a new market can entail the risk of high ruff. Keywords: development, product management, modification, introduction 1 Introduction The business model is to describe the basic principles of the creation, development and success of the organization. To create or modify a business - model, the author suggests the way consisting of a template, style, design, strategy and method. Alexander Ostervalder in his book "Creation of Business Models" discloses the concept technology which allows to describe and analyze business models of any organization. This technology allows to avoid the difficulties encountered in the study of business models and creation of new strategic alternatives. It is known that without this it is difficult to predict development of any business model and to successfully introduce innovations. The technology includes a "tool" of the nine blocks, which reflect the company's logic of action, aimed at making a profit. These blocks comprise four main business areas: interaction with customers, the offer, the infrastructure and the financial efficiency of the company. 2 Main problem The main problem is to change an outdated business model it is necessary to correctly identify the tools in order to modify blocks that reflect the company's logic, aimed at making a profit.the main nine blocks covering four main areas of business (the interaction with consumers, the offer, the infrastructure, financial efficiency of the company): consumer segments; interaction with customers; sales channels; valuable offers; key kinds of activity; key partners; key resources the structure of expenses the flows of revenue The tool promotes understanding and discussion, stimulates creativity and helps with the analysis of the company's business model. 3 Aim The aim of this research is to develop a mechanism for effective replacement of outdated business models in the new market. 4 Review Disclosing the content of the goal, there is a number of tasks: to investigate the principles of competition of a business model in the new market and its modifications; to join the international community of projects of the researchers whose efforts are aimed at the development of productive techniques in the public domains; to consider the main strategy of an entry into the markets and to reveal their characteristics 5 Solution The choice of the style of a business model of the company. The technology of the Long Tail.These are sales of much gradually: the offer of a large number of niche goods, all of which are on sale relatively seldom. Complex sales of niche goods can be as profitable, as the traditional model where the main income is brought in by sales of limited number of best-sellers. These business models require little storage costs and a strong platform for fast delivery to buyers interested in their products. Or the choice of Open Business Models style. Open business models can be used to create and preserve value due to cooperation with external partners. It can be carried out "from the outside" by means of use of the external ideas or "from within" by granting the ideas or assets which weren't demanded by firm to the third-party partners. In addition, it was required to perform a number of studies: MO Management technologies & organisational growth

180 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 to develop requirements imposed to a business model; to correlate two styles to each other; to identify the key factors; to formulate the characteristics of a business model; to prove the choice of means of assessing the business model. 6 Conclusions Sidorova J The results of the scientific research are aimed at confirmation that the made hypothesis about the improvement of a business model and its introduction to the new market, is real, reasonable and effective. The results of this research may be of interest to owners (in particular - the owners of travel agencies), of both small and large enterprises. References [1] Osterwalder A, Pine I 2012 Building of business models: strategist and novator's handbook Moscow, Alpina Publisher 288 p [2] Sidorova J 2016 Improving the business model output organization to the new market 4th International Scientific Practical Conference "Business Environment", MO Management technologies & organisational growth

181 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 April 27-28, 2017, Information Systems Management Institute, Riga, Latvia Shiryayev V The advantages of legal process outsource (LPO) Vadim Shiryayev * ISMA University, 1 Lomonosova Str., Riga, Latvia *Corresponding author s vadbaltic@gmail.com Abstract Every business needs a legal support and it means that there is a need to keep a personnel lawyer. Legal support of business must be constant and cover all aspects and stages of business activities. A personnel lawyer often can not keep up with all legal process therefore quality of the legal support goes down and this implies big risk for business. Legal support of business, instead of salaried lawyer, has the guarantee of quality legal services considering all peculiarities of business activities. Outsourcing allows firms quickly to scale up for a case or project, leveling the playing field with larger firms. Flexible staffing also reduces firm overhead; by outsourcing to external vendors, law firms can avoid the fixed costs of salaries and benefits associated with full-time, permanent personnel. This article is an attempt of investigation all the nuances of this issue. Keywords: Legal Services Outsourcing (LSO), Legal Process Outsourcing (LPO), legal support. 1 Introduction Legal outsourcing, also known as legal process outsourcing (LPO) related with the practice of a law firm or corporation obtaining legal support services from an outside law firm or legal support services company. This phenomenon has been a part of the legal experience since the 1950s, where it was restricted only with patents. The legal industry has experienced a global paradigm shift in the delivery model for legal services. This new model, involves the transfer of the work of attorneys, paralegals and other legal professionals to external vendors located domestically and overseas. Legal outsourcing is growing in popularity as law firms and corporate legal departments seek to minimize costs, increase flexibility and expand their in-house capabilities. Below are several key advantages of outsourcing legal work domestically or to overseas providers, also known as offshoring). The concept of legal process outsourcing, which based on the division of labour principle, widespread in law firms, where various time consuming and onerous processes like due diligence are delegated to paralegals and document reviewers. This allows the firm to solve the various legal issues that arise on a daily basis while being able to streamline productivity. Among the leading proponents of this process, there have been corporate clients, worried with rising legal expenses. Nowadays, the market could be described in Figure 1 [1]. The process includes a contract with due to consideration between both firms. Below, there are the various methods, when the process could be initiated, in Figure 2. Figure 1 LPO structure Figure 2 Breakdown of LPO duties MO Management technologies & organisational growth

182 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 April 27-28, 2017, Information Systems Management Institute, Riga, Latvia It presupposes making a contract for complex corporate legal services provided under the terms of the contract. Available options include distant advice and physical presence of the lawyer when it necessary. Subscribing legal service for business is the guarantee of prompt legal support of your business and perfect keeping of internal and external records of the company. 2 Overview In this article: discusses the different types of possible collaboration with law firms adduces proofs of benefits analyses the flaws shows the comparative characteristics of the salaries of staff lawyers and law firms additional advantages, not related to the financial side (such as flexibility and similar) are given. 3 Decision As a demonstration of the advantages of LPO to personal lawyers, will be given the comparative characteristics of the services costs and salaries. What is emerging from the most progressive law firms and LPO providers is a multi-layered Shiryayev V approach in which organizations lay to their strengths. Employing a combination of external talent allows law firms and organizations to tailor their capabilities in response to workload and client demands. Workflow challenges are particularly prevalent for small and mid-size firms. These firms may find it more difficult to spread variability due to a smaller number of attorneys, support staff and clients. Outsourcing legal work allows firms to quickly scale up for a case or project, leveling the playing field with larger firms. Flexible staffing also reduces firm overhead; by outsourcing to external vendors, law firms can avoid the fixed costs of salaries and benefits associated with full-time, permanent personnel. 4 Conclusion The pent-up potential in the legal industry for improved productivity through better infrastructure, workflow and employment systems is off the charts [3]. A more intelligent allocation of work is not just a cost cutter, but it is also a business builder. And it is the part played by legal process outsourcing (LPO) in this new scenario which will prove vital. Thinking strategically about how best to configure all the options to maximize the benefits while minimizing the risks is now a key challenge. References [1] Legal process outsourcing uction.php [2] Fennell E, Racounter 2015 LPO builds business Racounter [3] Furlong J 2013 Evolutionary Road: A Strategic Guide to Your Law Firm s Future [4] Gogel R 2016 Top 3 Trends to Watch in Legal Outsourcing The Huffington post [5] MO Management technologies & organisational growth

183 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 April 27-28, 2017, Information Systems Management Institute, Riga, Latvia Kelsina D Assessment of multiple actor loyalty Dina Kelsina ISMA University, 1 Lomonosova Str., LV-1019, Riga, Latvia *Corresponding authors d.kelsina@gmail.lv Abstract The overview of the loyalty evaluation weaknesses allow using innovative mechanisms for specific organisation not allowing to make typical mistakes and develop a new process of strategic development. This procedure is based on practical system to measure the customer relationships. The system can identify the measures to help personally responsible and assess the work quality done. Keywords: problem, program, strategy, value, development 1 Introduction The research question is as follows: «How to develop an effective system for the work with customers in hotel business on the basis of unconventional research samples?» The main purpose of this is study is to evaluate the multiuser loyalty, based on the objective measurement systems of customer relationships [1-5]. In accordance with the intended purpose it is necessary: 1. Explore customer loyalty evaluation approaches; 2. Loyalty program analysis; 3. Identification of tools for the assessment of customer satisfaction indicators; 4. Development of mechanisms for the assessment of customer, staff and management relationships; 5. Development of a procedure for assessment of loyalty programme implementation in hotel business. TABLE 1 Understanding the results of the preliminary research Scope for further research Summary of issues foundations of customer relationship Status and prospects Objectives Variables Management 6. Test the procedure effectiveness on a specific subject. Based on these tasks, it is possible to set the study design, which is manifested of ability to determine the proportion of respondent willingness to recommend the study object to their colleagues and friends. 2 Understanding of preliminary findings The listed 30 provisions allowed formulating the five distinct study areas, where each formulates a preliminary conclusion (See Table 1): Summary of issues. Status and prospects. Objectives. Variables. Management. Output The measurement and evaluation operating system is based on unique loyalty to particular company research The operating system of loyalty measurement and evaluation is part of the hotel strategic plan The operating system is created on objective basis for measuring and evaluating the multilayer loyalty The study of the dependent variable and independent variables allowed stopping the choice of value management The binding of the main research variables has allowed developing a management scheme compromising the measurement and evaluation steps of multilayer loyalty 3 Scope of the research The subject of the study is to develop a view on the use of the mechanisms related to the loyalty evaluation when the customer relationships are measured. The scopes of such representations are defined by selected element composition and structure of the multilayer loyalty measurement and loyalty [4-5]. The system elements are characterized by selected variables that are used in this study. The decision whether to develop loyalty measurement mechanisms is applied in the study of efficiency (in terms of actions) and the performance (in terms of quality) [6-7]. The leverages are more effective measures to address the exceptional gap and perceptions that exist between participant groups in business (customers, employees and management) [8-9]. The indicator measurement appears in the increase of the enterprise value. The cost effectiveness increase is determined by the organisation long-term and investment attractiveness of the project obtained by value indicators in the medium term. 4 Significance of study The significance of the present study lies in the objective to develop an effective means for the development of multiple actor loyalty. Such evaluation shall be value- based since this will enable a strategic development of the company in terms of loyalty [10-12]. The management of the company shall be considered as a single unit with a single value. From the viewpoint of value nanagement, a company is a set of harmonised measures in an effort to ensure a strategic MO Management technologies & organisational growth

184 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 April 27-28, 2017, Information Systems Management Institute, Riga, Latvia development of the company. Each of the scenarios shall take into account the unique contribution by the following three study samples: customers, staff, management. Change of value is considered in the framework of activities aimed at improvement of loyalty while implementing the new programme. Assessment mechanisms should allow to determine a link between each of the contributions to the total value. This shall be done with the use of gaps between expectations and perceptions that form between participants Kelsina D of the study in the light of their personal incentives. The said incentives shall be identified in the course of the survey. The practical value of the study lies in the acquisition of effective mechanisms to improve the general performance of any organisation. Effectiveness related conclusion shall be drawn on the basis of the increase of property's value. Also a long term investment attractiveness shall be defined in each scenario. Cash flows shall be considered on an annual basis. References [1] Bridson K, Evans J, Hickman M 2008 Assessing the Relationship Between Loyalty Programs Attributes, Store Satisfaction and Store Loyalty Journal of Retailing and Consumer Services [2] Skogland I, Siguaw J A 2004 Are Your Satisfied Customers Loyal? Cornell Hotel and Restaurant Administration Quarterly DOI: / [3] Aaker D A 1991 Managing Brand Equity The Free Press p. 39 [4] Reichheld F 2006 The Ultimate Question: Driving Good Profits and True Growth Harvard Business School Press [5] Customer Loyalty in the Travel Agency: The Effects of Customer Satisfaction, Service Recovery, and Perceived Value Asia Pacific Journal of Tourism Research DOI: / [6] Cokins G 2004 Performance Management: Finding the Missing Pieces (To Close the Intelligence Gap) John Willey & Sons, Inc. [7] Nien-TeKuo, Kuo-ChienChang, Yi-Sung Cheng&Chia-Hui Lai How Service Quality Affects [8] Addison-Wesley; Kotler P, Keller K 2009 Marketing Management 13th ed, New Jersey:Pearson Prentice Hall [9] Hofmeyr J, Rice B 2000 Commitment-Led Marketing John Wiley and Sons p. 85, 22 [10] Doyle P 2000 Value-Based Marketing: Marketing Strategies for Corporate Growth and Shareholder Value John Willey & Sons, Inc. [11] Copeland T, Coller T, Murrin J 2000 Company value: estimation and control New York: Wiley [12] Copeland T, Dolgoff A 2005 Outperform with Expectations-Based Management A State-of-the-Art Approach to Creating and Enhancing Shareholder Value New York: Wiley MO Management technologies & organisational growth

185 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 April 27-28, 2017, Information Systems Management Institute, Riga, Latvia El-Haže D, Ivanova I, Kopitov R Abstract Specifics of open systems and feature of the organization of their functioning Darja El-Haže, Irina Ivanova, Rostislav Kopitov ISMA University, 1 Lomonosova Str., LV-1019, Riga, Latvia *Corresponding author s darja_21@inbox.lv In this work the problem of ensuring steady functioning of the organization, from a line item of its prevention from hit in chronic conditions is researched. At the same time emphasis is placed on preventive measures of such prevention. For this purpose the parallel between two concepts a chronic condition in medicine and a chronic condition in business is considered. Stay of the organization in a chronic condition is researched from a line item of unnatural passing of process. Being in open system, from the organization, in order to avoid incorrect decisions, it is required to carry out setup of the diagnosing mechanisms on achievements of strategic objective in essentially new conditions. Keywords: generation, strategy, resistance, purposes, competence 1 Introduction In the conditions of open systems as a part of which again formed community of separate systems is created, it is required to consider interests of various participants of the new environment. In such community the form of the organization oriented to intellectual management style [1] is necessary. In the organizations of this kind it is required not only to align interests of its various participants, but also to timely reflect influence of the external environment on a management system of the specific entity. Thereby setup of a management system on functioning in a new contour of full-scale strategic management [2] is performed. Without setup on the solution of a strategic task, the entity wait bigger for loss in the future. For this reason less than five percent of the entities don't realize the strategy in practice [3]. To reflect influence of the external environment means to find measures of the return impact. In other words at the disposal of managers of the entity there shall be means of correlation of external influence and internal impact. It is reached thanks to approach of a purpose based, considered by A. I. Prigozhin [4]. In our statement this approach is productive when system effectiveness of each participant of the organization in terms Ch.Barnard becomes effectiveness in relation to system of higher order [5]. In other words, each participant of the organization, aiming to keep the line items in the external environment, shan't contrast the private interests with social requirements. Permission of the pushed problem is performed taking into account the known rule 2/98 in case of which the minimum quantity of elements of system yield the greatest result in the long term [6]; Senge [7]. Such result can't already be achieved at the level of management of the separate project which, in fact, becomes a brake in condition assessment, both the separate entity, and the organization in general [8]. The Purpose based beginning is interpreted by us as the knowledge base of a social orientation. In case of such statement it is necessary to determine how the purpose based conflict in case of implementation of the new innovative offer in relation to which social requirements are imposed is made. Feature of such offer is its long term, lack of pledge for expected investments in the project, and also inability of analysts of the organization to prove generation of cash flows in the future. Such offers from the point of view of their implementation test special resistance in practice, and seldom is allowed to prove them, not to mention implementation. Such offers can be brought under category of "the gained ideas" [9]. 2 Enter organizations in the chronic condition Exploring features of transition to systems of new type, we have found that the transition was a breeze, from the perspective means of assessment of the new States. In fact rework the assessment tools did not happen. In the end, organizations are left without effective means of diagnosis points of the deteriorating financial condition, until the complete loss of sustainable functioning. Long stay in a damaged condition, mistakenly taken for healthy, caused by the unwillingness of management to implement new diagnostics. This gap caused by the crisis style of management. If there are errors, the multiple repetition of well learned rules, leads to the fact that the company, being a long time in a precarious condition, and having not the slightest idea, multiplies the spread of bad decisions, leading the organization to loss of health. This phenomenon is comparable with the chronic disease of a living organism. Against the background of the fact that at the disposal of management there are no productive diagnostic aids of organizational pathologies of chronic nature we made an attempt to consider the positive experience of their identification and the prevention used in medicine. The research of productive mechanisms of struggle against chronic diseases in medicine was conducted in the MO Management technologies & organisational growth

186 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 April 27-28, 2017, Information Systems Management Institute, Riga, Latvia context of disclosure of content of the concept "chronic condition" [10-13]. Studying of such methods carried to innovative approach allowed us not only to create idea of a chronic condition, but to formulate the determination revealing a sense of the term interesting us. The chronic condition is an unnatural condition of an organism, which is an authentic disease, is shown that destructive forces, that is the mismatch and deception, experiencing external impacts, sharply progress. In the made determination two destructive forces which cause damage to an organism are revealed: mismatch (as violation functioning of an organism in general); deception (results of violation of habitual standards of behavior consciously disappear). In other words, treatment of a specific organism requires the special long-term training program of the potential patient from fixings of the special facts of violations and deviations. The created representation allows purchasing understanding of factors of implementation of new strategy on the basis of which key provisions of development of new estimative tools are created. El-Haže D, Ivanova I, Kopitov R Identification of negative factors of finding of the organization in a chronic condition allows to assess damage caused to the organization and to determine as far as the structure of business is subject to risk. 3 Conclusions The research of complexity of recovery of the organization in case of hit in a chronic condition showed that the adjusted system of activities of all entity has practical application if new offers of management find timely demand in the new environment of open type. Studying of such demand determined elements of system organization, that is what is and is natural state for systems. Knowledge of the device of such system shows how it is important to remain "healthy" and to keep immunity throughout all life of the organization. For this purpose it is necessary to develop mechanisms which won't let in the destroying forces from the external environment. As such mechanisms tool of cost management are chosen: pentagram and hexagram of cost [14]. At the same time it is very important to notice that the pentagram of cost is oriented to type of the closed systems, and the hexagram is applied in the conditions of open systems. References [1] Нив Г 2007 Организация как система: Принципы построения устойчивого бизнеса Эдвардса Деминга Москва: Альпина Бизнес Букс 370 с. [2] David F 2015 Strategic Management Concepts and Cases A Competitive Advantage Approach: 15th Edition by Fred R. David and Forest R. David, published by Pearson Education [3] Kopitov R 2013 Enhancing business sustainability: Improving business policy s methodology by managerial principles development Procedia - Social and Behavioral Sciences [4] Пригожин А И 2015 Управленческие идеи: Вы какое положение на рынке хотите занять? Как для этого должна измениться Ваша организация? Москва: ЛЕНАНД 480 с. [5] Барнард Ч 2012 Функции руководителя: власть, стимулы и ценности в организации Москва, Челябинск: Социум, ИРИСЭН, 333 c. [6] Кокинз Г 2008 Управление результативностью. Как преодолеть разрыв между объявленной стратегией и реальными процессами Москва: Альпина Бизнес Букс 318 [7] Senge P 2006 The Fifth Discipline: The Art and Practice of the Learning Organization. New York: Doubleday [8] Лалу Ф 2016 Открывая организации будущего Москва: анн, Иванов и Фербер 332 с [9] Байндер Г, Бэше Ф 2008 Бизнес по науке. Чему менеджерам стоит научиться у биотехнологов Москва Манн, Иванов и Фебер 272 с. [10] The Institute for Healthcare Improvement's Breakthrough Series Collaborative on Providing More Effective Care for Low Back Pain [11] Rossiter L F, Whitehurst-Cook M Y, Small R E, Shasky C, Bovbjerg V E, Penberthy L, Okasha A, Green J, Ibrahim I A, Yang S, Lee K 2000 The impact of disease management on outcomes and cost of care: a study of lowincome asthma patients Inquiry (2) [12] Ghosh C S, Ravindran P, Joshi M 1998 Stearns SC. Reductions in hospital use from self management training for chronic asthmatics SocSci Med. 46(8) [13] Mayor S 2001 Pilot projects show cancer treatment can be speeded up. BMJ [14] Copeland T, Dolgoff A 2006 Expectations-Based Management Journal of Applied Corporate Finance 18(2) DOI: /j MO Management technologies & organisational growth

187 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 April 27-28, 2017, Information Systems Management Institute, Riga, Latvia Kamforina O Classification of factors that affect loss of sustainability in organization Olga Kamforina ISMA University, 1 Lomonosova Str., Riga, Latvia Corresponding author s oljga2005@inbox.lv Abstract For the enterprise to function successfully it is necessary to possess the fullness of knowledge that allows timely warning of a possible danger that may lead to the occurrence of unforeseen losses. For the control system to react to environmental conditions and prevent the system from switching to an unstable, uncontrolled and faulty state, it is necessary to understand and take into account the factors that affect the loss of stability. The approach of restoring the features of stability loss under open systems conditions is proposed. Keywords: Stable dedication, external audit, selection, long-term perspective 1 Introduction The DIKW conceptual framework is used as the core for restoring the sustainability of an organization. Relying on the model of Russell Ackoff (DIKW), we are talking about the application of technology that can indicate the path of sustainable dedication, and hence the possibility and tool applicable in the event of destructive processes in the organization [2]. In DIKW model, the vector of purposefulness is always aimed at considering a new quality of the system. The main meaning of this concept is the ability of the control system to influence the conditions of the external environment. When we talk about a sustainable system, it means that our management system should be well prepared for timely response to environmental conditions. Thus, the task of strategic management is being solved. 2 Method In order to understand the full-scale strategic management, we recall the conceptual model of David [1] Figure 1, consisting of 7 matrices, decomposed into three units. Stage 1 includes EFE - analysis of the external and internal environment. The use of this analysis is a time-consuming process, which in our case takes more than three months, since a formal attitude to the method causes errors at subsequent stages. FIGURE 1 Formulating strategy of analytical flame work (David) The EFE matrix was applied in the research, analyzing the field under the DIKW model. (see Figure 2) D Activity EFE FIGURE2 Combination of EFE and DIKW model The combination of the two approaches in the context of sustainability required the identification of 72 factors that W I Process K MO Management technologies & organisational growth

188 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 April 27-28, 2017, Information Systems Management Institute, Riga, Latvia affect the process of organization s sustainability loss. It is a matter of deviations in goal setting arising in the management system. In order to make our management system sustainable, it was necessary to identify the main key factors affecting the recovery process of the stability features. The EFE audit procedure requires the use of Pestel analysis. Kamforina O difficulties due to the lack of methodological guidelines for rating in the specified conditions. Therefore a double step selection was proposed. In the course of the work, methodical materials on grading points were developed for the expert. The first level defining the choice of the program by 3 point scale: 1-the effect of the factor is small, any change in the factor has practically no effect on the company's activity (communication); 2-only significant change in the factor affects the sales and profits of the company (vacancy); 3- The effect of the factor is high, any fluctuations cause significant changes in sales and company profits (potential). The second level - qualification of the factor resonance according to 5 - point scale in the context of business organization s life cycle. Expert estimation: 1 -debugging of the system; 2-test; 3-introduction; 4- implementation; 5- growth. 3 Findings FIGURE 3 Pestel -analysis The Pestel analysis allowed classifying all 72 observed factors into 6 groups. In the course of such classification, the expert has difficulty in determining whether a particular factor belongs to a particular group. In addition, there are no rules to identify the loss of stability. Thus, to rank factors according to six categories: Political, Economy, Social, Technology, Environment, Legal, it was necessary to develop rules for attributing the belonging of a factor to a certain group by characteristic features. The operational definition technique was used [5]. For instance, we refer ideology, formulas, rules, construct, and the transformation of the business model to political factors. The economical factors include the economy, efficiency, the science of wealth. Social factor: losses, cost, capital, benefit, description of how external environment destroys the influence system on the management system. Technological factors include: technology, information, training techniques [4], retraining, formalization, impact of the expert. The environmental factor describes the resistance of a 5% strategy, rule 2/98, the hidden influence on the management system, the social enterprise is what adds value (to occupy people), recovery, capitalization, relationships, environmental impact, auditors. The legal factor include the laws of management, the specifics of business management, rules and principles, destructive forces, mistakes / demining, fatal errors, arbitration courts, arbitrators, creation of chaos. This allowed us ranking using a small set of factors from the perspective of their impact on the loss of sustainability. In general, it is required to determine the degree of influence on the management system and the importance for the market. In the first case, expert evaluation is carried out on a three-point system, whereas in the second case, on a fivepoint system. At this stage, the expert is experiencing As a result, it was possible to identify 6 significant threats that negatively affect the stability of the organization. In contrast to the combined threats (T), the organization s growth potential (O) is determined. As a result, the conceptual scheme of DIKW was reduced to the form DITKWO (see Figure 4) Thus, EFE analysis allows us to move into a new strategic space in which the control system needs to be adjusted to a new quality. O D 4 Results and discussion I T W K FIGURE 4 Conceptual scheme DITKWO Applying the concepts of EFE, we reveal a program that brings a long-term perspective. Through an external audit, we disclose the potential of our system; form rules and principles that allow us to increase our income. Revealing the weak and strong points help to form a representation of new space (potential). By classifying the factors, we managed to remove the uncertainty and describe the rules for the expert's actions. By carrying out the ranking (the selection mechanisms were carried out at two levels), which consisted, firstly, in determining the impact on the management system and, secondly, determining the importance of each factor, we MO Management technologies & organisational growth

189 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 April 27-28, 2017, Information Systems Management Institute, Riga, Latvia managed to reduce the number of main factors from 72 to the main 15, capable to describe our basic capabilities and threats. It is necessary to go through the algorithm EFE- PESTEL-OT, thereby revealing the influence of the external environment on the control system. Kamforina O As a result of the conducted studies, we managed to obtain an instrument that makes it possible to classify factors that affect the stability of our organization. The use of this tool makes it possible timely foresee the shortcomings of the system and to work on a sustainable successful functioning. References [15] David Fred R, David Forest R 2015 Strategic Management Concepts and Cases [16] Ackoff R, Emery F E 1972 On purposeful systems Chicago [17] Chan K W Blue ocean strategy: how to create uncontested market space and make the competition irrelevant / W. Chan Kim, Renée Mauborgne [18] Kryuchkov V N 2009 Company message through mental virus Вестник Омского университета. Серия «Экономика» [19] Деминг Э 2011 Выход из кризиса. Новая парадигма управления людьми, системами и процессами М.: «Альпина Паблишер», 400 с. (Модели менеджмента ведущих корпораций) MO Management technologies & organisational growth

190 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Miscenko S The practical importance of the science of management through the works of the famous investigators in this field Abstract Stanislav Miscenko ISMA University, 1 Lomonosova Str., LV-1019, Riga, Latvia *Corresponding author s miscenko.stanislav@gmail.com The investigation presented by the author is considered to be the so-called extract, the attempt to reproduce the integrity of the science of management in the given time period through the works of Beer S. Science of Management, Litvak B.G. Science of Management: Theory and Practice and Hamel G. The Future of Management. Particular attention is paid to the practical importance of management science and its key role in solving different economic tasks. The author analyses the prospects of developing the science of management in future. Keywords: knowledge, management, economic, integral, operation, systematization, notion, resources, experience 1 General Is it possible to state that in spite of numerous research works, the science of management as an integral system of notions, laws, experience, conditions etc. does not exist? Unfortunately, this is the real situation in this field of science, and we have at our disposal only the number of resources, technologies and constructions, being the constituent parts of the integral managerial process and not giving the answer to the necessary questions [1, 2, 10]. In author s opinion, similar and, in many cases, opposite authors theories, uncoordinated definitions of the principal notions, especially of strategies, various approaches, schools, points of view should give way to the efforts aimed at the creation of integral science of management [9]. The origination of any phenomenon in management has its sources and critical points of the time and energy development, which determines in what degree the potentialities of future in the managerial area, would be implemented, if ever it happened [1, 3, 4, 8].The author attributes the theories of Beer S., Litvak B.G. and Hamel G. to such phenomena, correlating, analyzing and comparing them [11, 12]. The comparison, as the cognitive operation, constitutes the foundation of the author s opinion about the similarity or difference of the works of three scientists [4, 6]. The author considers these theories and directions not only from the theoretical standpoint, but he pays special attention to the managerial practice as the basis of the References [1] Litvak B G 2012 Management Science Theory and Practice. Moscow: Publishing House "Delo" RANHiGS pp. 424 (in Russian) [2] Beer S 1971 Management Science Moscow: "Energy", pp.112 (in Russian) [3] Maslennikov M M 1968 Methodological value of comparison in scientific research Voronezh: Publishing House of Voronezh State University (in Russian) [4] Kondakov I 1975 A logical Glossary & Reference Book Moscow: Science (in Russian) [5] Kochanowski V P 1999 Philosophy and Methodology of Science. Rostov-on-Don: "Phoenix", pp. 576 (in Russian) [6] Samojlenko E S 2010 Problems of Comparisons in Psychological Research. Moscow: Russian Academy of Sciences, Institute of Psychology, pp.7-8 (in Russian) [7] Beer S 1963 Cybernetics and Production Management Moscow: Science, pp.276 (in Russian) science of management. The author regards solving the managerial tasks as well as revealing the laws and basic principles of taking decisions by the skilled managers to be the primary purpose of research [1, 7]. The author puts forwardthe following tasks to be solved: 1. to reveal some neural connections between scientists works; 2. to define the common nature of the works and to study the background of their creation; 3. to analyze the ordinary andcomplicated managerial constructions and to determine their potentialities. 2 Conclusion The actuality of the research paper is emphasized by the importance of studying the reasons of appearing so different, but, at the same time, having the common direction theories in analyzing the science of management. The basis of the theories and mutual connections reflecting the main idea of the works of Beer S., Litvak B.G. and Hamel G. compose the contents of the research. The author hopes that the chosen aims will help to distinguish between the theoretical and practical parts of the management science in the framework of the investigated theories and to follow the development of the management science through the prism of the analyzed works. [8] Litvak B G Management portraits Retrieved: (in Russian) [9] Litvak B G On my books Retrieved: (in Russian) [10] Miscenko S 2014 Modality of managing the generation of resultant ideas: multidimensional organization structure The 12 International Scientific Conference Information Technologies and Management 2014 April Riga. Latvia [11] Miscenko S 2015 Genesis of management science through the prism of practical and theoretical studies in the researches of Beer S. And Litvak B.G. The 13 International Scientific Conference Information Technologies and Management 2015 April Riga. Latvia [12] Hamel G, Breen B 2007 The Future of ManagementHarvard Business Press, pp.272 MO Management technologies & organisational growth

191 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Amandgeldiyev A Problem management and business-projects analysis Abilkhan Amangeldiyev ISMA University, 1 Lomonosova Str., LV-1019, Riga, Latvia Corresponding author s amanabil61@gmail.com Abstract The complex approach of evaluating business projects from the position of obtaining complete, reliable and correct preparation, processing and initial business information is considered. Advantages of the proposed measures to conduct a thorough examination, built upon the calculation of analytical indicators, used only within the framework of a specified project will be explored. Research of such advantages will be backed through extensive use of the established model solutions, founded on the basis of formal evaluation procedures. Keywords: subject, decision, mechanisms, results, procedures, approbation 1 Research subject description One of the most effective mechanisms, experts utilize in their business design, to spread their vision is rooted in emphasizing on things that they pay special attention to [1] It is about, what they evaluate, control and stimulate [2]. In other words attention is concentrated on subjects and questions of their systematic employment [3]. In the case of experts within the sphere of business design recognizing this fact, systematic attention to various things becomes an effective means of producing and transmitting a particular solution, especially when experts are consistent in their actions. On the other hand, if experts don't realize the effectiveness of this tool or are inconsistent in their choice of main objects of attention, but they spend a considerable amount of time and effort attempting to decipher incorrect decisions made within the framework of the conducted examination, risk channeling their resources into a dead-end. [4] Sequence, established during the examination process, allows for judgement of not only priorities, values, views, but also helps develop a programme for perfecting management methods. Hence, development of an appropriate monitoring system is required. Discussing problems of planning, an expert should attempt to understand the activities of employees who bear certain financial responsibility. At the same time, the expert is required not only to prose the next decision, focusing not on the end-results of financial activities, but, in contrast, analyze in detail all aspects of the business plan [5]. The outlined moment is crucial in expert's job. Preferably, he should constantly make appropriate comments, whilst paying attention to deviations from standards set by him and taking into consideration, how his employees intend to ensure implementation of their duties in the future. 2 Identifying trends in the field of business design Expert's expectations should be focused around the fact that an effective manager will have constant control over his work site. Business-design expert should always take an interest in the plans of his employees and identify cases, when plans do not correspond with the detailed knowledge about the product or with the current situation on the market. Therefore, three major tendencies have to be explored in further detail [6-10]. First of all, it is imperative to understand the earning and spending process, from the point of planning and future development. At the same time, control over the estimate implementation has to be entrusted to people, who are impartial to the policies of the enterprise. Secondly, responsibilities over the new planning roles have to be taken into consideration, according to which control is carried out not with the purpose of checking the budget, but to control the movement of money in the particular sphere of influence. Thirdly, in the field of expenditure, income and investment, managers of all levels of the organization who perform different functions should be involved in the planning process. 3 Solution of the problem In the framework of this study, short-term cost control is implemented to verify the consistency of the business plan. Answer to the problem lays within the framework of the following question: "Are investments justified in terms of profit ratio and employed capital, and whether future cash flows will achieve the set goals?" Increased role of estimates, is formulated from the standpoint of cost prediction, profits, investments and cash flows, compounded in order for managers of the enterprise to have control over forecasts and make appropriate amendments to them. It is imperative to note that control functions are violated due to the circumstances, specifically imposed by managers who fear lowering their reputation during the comparison process. Additionally, it is necessary to take into account their aspirations to overestimate expenses and underestimate revenues, hence making it easier to compile performance reports. Furthermore, increasing expenses is regarded as managers prioritizing their own reputation, which is contradictory with enterprise's interests as a whole. In this regard, during the examination process, estimates MO Management technologies & organisational growth

192 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 should be recounted and verified on a monthly basis. Hence, this not only allows for comparison with the annual budget, but also allows to re-evaluate forecasts, which should reflect latest changes in revenues and expenses, whilst taking investment needs into consideration. Therefore, this requires taking into consideration qualifications of employees, production capacity of fixed assets and the possibility of an organizational restructuring. Process of restructuring requires for the search of new forms of organization and management, which is essential for its success. 4 Results In the context of this study two parallel, influencing each other, but not functionally linked processes were considered. First, is the process of eliminating not proven themselves organizational forms, second a thorough search and appropriation of new ones. This examination of business projects utilized the second approach. Amandgeldiyev A Its essence is reduced to the following: increase the quality of the business project; improve the chances of attracting investors; determine the adequacy and accuracy of input data and results obtained; verify the accuracy of the financial and economic calculations; ensure the practicality and feasibility of the project; assess the risks of the project; determine the possibility and probability of finding an investor; receive recommendations on additions/changes regarding the project; receive recommendations regarding the optimal form of investment attraction and investor relations. As a result, this establishes that the examination of business projects plays a fundamental role in the gradual growth of the enterprise, having a special influence on the process of making critical decisions. References [1] Trompenaars F, Coebergh P H Management Models. How to understand and apply the world s most powerful business tool Oxford: Infinite Ideas Limited 577 p. [2] Олет Б 2015 Путеводитель предпринимателя. 24 конкретных шага от запуска до стабильного бизнеса Москва: Манн, Иванов и Фербер 336 с. [3] О'Коннор Дж, Макдермотт И 2009 Искусство системного мышления: Необходимые знания о системах и творческом подходе к решению проблем Москва: Паблишерз 256 с. [4] Kopitov R 2012 A Reliable Organization s Axioms Issues of Business and Low 12 p [5] Amangeldiyev A 2016 Evalution of business planning technologies The 14 th International Conference Information Technologies and Management 2016, April 14-15, ISMA University, Riga, Latvia, Information Systems Management Institute, Riga, Latvia, p [6] Лалу Ф 2016 Открывая организации будущего Москва: анн, Иванов и Фербер 332 с [7] Пригожин А И 2015 Управленческие идеи: Вы какое положение на рынке хотите занять? Как для этого должна измениться Ваша организация? Москва: ЛЕНЕНД 480 с. [8] Кристенсен Р 2012 Стратегическое управление человеческими ресурсами. Дорожная карта Москва: Олимп Бизнес 288 с. [9] Каммингс С 2010 Реконструкция стратегии Харьков: Гуманитарный центр 560 с. [10] Кокинз Г 2007 Управление результативностью. Как преодолеть разрыв между объявленной стратегией и реальными процессами Москва: Альпина Бизнес Букс,325 с. MO Management technologies & organisational growth

193 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kopitova N Integration of diverse planning and control means Natalija Kopitova ISMA University, 1 Lomonosova Str., LV-1019, Riga, Latvia *Corresponding author s natalija.kopitova@gmail.com Abstract An approach on assessment of an enterprise activity's functioning that is based on means of fundamental diagnostics is investigated. As main means of management parameters that define goals of an organization, four groups of parameters are used that in their turn provide ranges of coefficients required for N-parameterisation of assessment of management s effectiveness, identified relationship of which subsequently reflects a balance of these parameters and indicates three zones of perspective stability. Keywords: stability, liquidity, viability, maneuverability 1 Important prerequisites for change A scale of growth of a modern enterprise should be commensurate with capabilities of its business model [1-3]. In case this was not achieved, then an enterprise loses a direction and is not aware what to do. In this regard, it is required to provide a special strategic vision that is currently seen as a new phenomenon. This phenomenon is characterised by a short-term perspective of planning and a significant aspiration [4]. As a result, it is necessary in a timely manner to move the focus from internal policies to an external impact [5]. Thus, an organisation's ability to timely identify rapidly emerging threats, covering all aspects of activities and parts of an organisation. This is a special ability to adapt in a rapidly changing environment. In addition, it is necessary to study, since a half-decay period of the acquired knowledge and skills has been reduced to five years or less. 2 Challenges Every enterprise in a strategic aspect is developing in accordance with its individual plan. Corporate management hinders a development of an enterprise. Therefore, it is required to carry out a thorough revision of management mechanisms used, including assessment tools. The five-year strategic plan in its traditional execution becomes an obsolete tool [6]. Its place should be taken by new dynamic elements that contribute to understanding a nature of organisation and provide a viability of an organisation in a competent market. Thus, an advantage is given to the one-year plan and means of monitoring a development of events taking place, adjustments of direction in a real time. Besides that, owners of enterprises have been gradually shifting an emphasis from the balance sheet in favour of the profit and loss report, realizing the priority of profits over assets. Thus, at a disposal of effective organisations there should be means of fundamental diagnostics, on the basis of which objective conclusions on a sustainable functioning of an enterprise would be issued [7, 8]. Problem solving requires a large-scale assessment of a financial condition. In addition, it needs to be done using diverse business information extracted from various data sets and documents, such as: business plans, accounting records, as well as assessment reports developed on the basis of cost management approaches. In other words, it is considered about parameters of assessment system that are separated in time, the binding of which ensured during integration procedures and synchronisation of various goals [9]. Such challenge requires to receive an answer that will be obtained on the basis of algorithms of linking short-term and long-term elements of planning and control, for example, profitability and liquidity indicators [10]. At the same time, it should be taken into account that a flexibility of an organisation and maneuverability of resources used outweigh a size of an enterprise and its scale, and in the coming years such tendency will only becoming stronger. 3 Provided approach Carrying out an assessment of enterprise s activity is carried out based on a developed system of diagnostics of financial condition. As the main management parameters that determine organisation s goals, four groups of indicators are being used. The first group of indicators is formed by liquidity indicators, the second group consists of indicators of short-term sustainability, the third group includes indicators of performance and maneuverability of activity, the fourth group consists of profitability indicators. In fact10 indicators are being used (see Table 1), based on values of which the problem of N-parameterisation of management effectiveness assessment. MO Management technologies & organisational growth

194 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kopitova N TABLE 1 Parameters of management effectiveness assessment Indicator Title Group belonging Lower limit Upper limit LQ C Current liquidity ratio Liquidity >2 - LQ Q Quick liquidity ratio Liquidity >1 - LQ A Absolute liquidity ratio Liquidity WCap/Inv - <1 Crisis state Short-term sustainability JSC/Inv - <1 WCap/Inv - <1 Normal short-term sustainability Short-term sustainability JSC/Inv >1 - WCap/Inv Absolute short-term sustainability Short-term sustainability >1 - K WC Current activity ratio Current activity provision >0.1 - M WC Cash to Working Capital ratio Current activity provision 0,50 1 M E Net Working Capital to Equity ratio Current activity provision - - ROI Return on Investment Profitability - - It should be noted that out of 10 parameters only for two have defined ranges, for 8 ones statistical data are collected on boundary values, such as "greater than or equal to 1" or "greater than 2". Moreover, such recommendations are of a general nature and do not take into account specifics of the organisation. Therefore, it was necessary to find ranges of change for all indicators. Further, it was necessary to determine boundary values for successful, loss-making and crisis activities. For this, connections between different groups of indicators were found. As a link, the security of current activity ratio and the return on investment ratio from investor's position were used. Besides that, two complex indicators have been derived: the financial security factor [11] and the ratio of current sustained growth: C WCap CA CL CSGR = WCap CA CL ( AR + Inv) For all indicators ranges were found, which made it possible not only to obtain their balance, but also determine three zones of short-term sustainability: absolute, normal sustainability and crisis state. Thus, the basis for conducting a fundamental diagnostics of financial condition has been formed. The produced diagnosis are being formed during the analysis of business information that was collected and processed based on various means of assessment, such as business planning, factor analysis and value pentagram. Even though the present approach is still in its infancy phase, the first signs of its usage indicate the fact that its diagnostic mechanisms can eventually be turned into a platform. 4 Results Disclosing the content of the set objectives, a number of the considered approach has been approved within the framework of an assessment of a financial condition of a Latvian transport enterprise. Activity of the enterprises is analysed during all three types of activity in general, based on four chosen groups of indicators and 13 selected indicators. In each of four groups it was necessary to establish ranges of indicators that are separated in time in order to determine boundaries of enterprise s viability: absolute, normal, abnormal sustainability and crisis state (see Table 2). TABLE 2 Parameters of management effectiveness diagnostics Indicator Title Group belonging Lower limit Upper limit LQ C Current liquidity ratio Liquidity 2,00 3,33 LQ A Quick liquidity ratio Liquidity 0,50 0,83 LQ Q Absolute liquidity ratio Liquidity 1,12 1,87 WCAP/Inv 0 0,68 Crisis state Short-term sustainability JSC/Inv 0,47 1 WCAP/Inv 0,68 1 Normal short-term Short-term sustainability JSC/Inv Cap/Inv Absolute short-term sustainability Short-term sustainability 1 1,75 K WC Current activity ratio Current activity provision 0,5 0,75 M WC Cash to Working Capital ratio Current activity provision 0.5 0,33 M E Net Working Capital to Equity ratio Current activity provision 0,43 0,43 K CA Current Assets Structure ratio Current activity provision Therefore, the base for conducting fundamental diagnostics if financial condition on the basis of diverse documents was formed: business plan developed in a ten-year perspective; assessment of current activity for any period of time; value-based management schemes developed for a five-year period. Falling outside the set limits signal an unstable condition. The usage of complex CSGR coefficient makes it possible to reproduce a property of sustainability based on separate features of unsustainability. This is achieved through interconnected diverse means of liquidity, short-term sustainability and current activity provision: CSGR = M K LQ K WC WC C TCA The presence of boundaries, unsustainability for each separate coefficient that is included in the compound CSGR ratio, allows not only to respond to challenges of changeability of environment, but also ensures timely MO Management technologies & organisational growth

195 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 updating of various assumptions. Such assumptions require addressing to various documents and data that are being collected for different periods of time. As a result, the mechanisms are being developed through which management system is capable of being continuously Kopitova N updating, benefiting from unpredictable events. Thus, the developed diagnostic system is orientated towards setting rapidly evolving adaptation trends by creating new business models based on existing data flows and adding new data flows to existing models. References [1] Остервальдер А 2013 Построение бизнес-моделей. Настольная книга стратега и новатора Москва: Альпина Паблишер 288 с. [2] Trompenaars F, Coebergh P H Management Models. How to understand and apply the world s most powerful business tool Oxford: Infinite Ideas Limited 577 p. [3] Олет Б 2015 Путеводитель предпринимателя. 24 конкретных шага от запуска до стабильного бизнеса Москва: Манн, Иванов и Фербер 336 с. [4] Крючков В Н 2015 Стратегическое видение: формирование новой парадигмы стратегического менеджмента Эффективное антикризисное управление 3(90) [5] Лалу Ф 2016 Открывая организации будущего Москва: анн, Иванов и Фербер 332 с [6] Исмаил C, Мэлоун М, ван Геест Ю 2017 Взрывной рост: Почему экспоненциальные организации в десятки раз продуктивнее вашей (и что с этим делать) Москва: Альпина Паблишер 216 с. [7] Brigham E F, Ehrhardt M C 2013 Financial Management: Theory and Practice 14th ed., Mason, South-Western/Cengage [8] Kelly N 2013 How to Measure Social Media: A Step-by-Step Guide to Developing and Assessing Social Media ROI Boston, Pearson Education [9] Hubbard D W 2010 How to Measure Anything: Finding the Value of Intangibles in Business 2nd ed., Hoboken, John Wiley [10] Копытова Н 2016 Согласование целей долгосрочного финансового планирования и краткосрочного финансового контроля 4 th International Scientific Practical Conference Business Environment 2/12/2016, Riga, Latvia [11] Копытова Н 2017 Использование коэффициента ROI в качестве интегратора долгосрочных схем оценки и краткосрочных средств V Международная научно-практическая интернет-конференция студентов, аспирантов и молодых ученых «Инновационное развитие информационного общества: экономикоуправленческие, правовые и социокультурные аспекты», , Чернигов, Украина MO Management technologies & organisational growth

196 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Zozule S The role of CFO from the position of an independent business partner Abstract Svetlana Zozule ISMA University, 1 Lomonosova Str., LV-1019, Riga, Latvia *Corresponding author s svetlana.z3@inbox.lv This article observes the issue of improving management mechanisms that are focused on the resultant process. The greatest need for a new strategic tool concerns those professionals whose role is the integration of business. Such candidates must take into account the current trends of integration. As a business integrator, it is recommended that you use the finance director. The article reveals the role of the finance director of the company from the point of an independent business partner, which will improve the company's sustainability in the long term. Keywords: management, finance, innovation, integration 1 Introduction The modern world economy is characterized by the desire of business companies to achieve competitiveness in the global market, which confronts them with serious tasks, the solution of which falls on the heads of companies and, in particular, on the finance director [1]. The company's current major strategic objectives: cooperation, customer care, risk management and corporate governance - now refers to the competence of the financial service and the finance director [2]. Shareholders want to see an objective picture of the company's position, its prospects and risks. Therefore, in this article, the financial director will act as an obligatory participant in the process of developing a management strategy in the company, which makes its financial component clear and understandable [3, 4]. 2 The main problem Surveys show that most of the finance directors want to increase the value of their position and move from the role of accounting specialists to the role of strategic or business partners [5]. Vacancies for this position are available, i.е. there is a demand. But he is not ready, firstly, because there is not enough information and knowledge; secondly, there is no time to analyze strategic aspects, nor the necessary resources within the existing team of finance managers, and thirdly, some finance directors feel uncomfortable, becoming business partners and pushing the control functions to the second place. They believe that their role is to ensure independence and objectivity, and they should not take such a big part in the decision-making process. But those who have time and resources in the open systems have real advantages [6, 7, 8]. They have become trusted and indispensable members of the groups responsible for business development, people who are able to provide real value through accurate analysis and based on experience of interpretation of both historical and new information. Their role is also perceived now in a different way. 3 Objective In the basis of this work were set goals: to deal with the skills, competences that are presented to the finance director now, and which will be presented in the future? And how to become an independent business partner in the conditions of an increased demand. 4 Overview Disclosing the content of the set objectives, a number of key questions was raised, the answers to which were the basis for the study of the problem: identification of the factors that led to the creation of a new role of the finance director as a business partner, to go beyond the usual representation of interested participants in this specialty; study of key characteristics that distinguish the followers of the new financial approach from bookkeepers and interpreters of figures, that are "stuck in traditional schemes"; development of principles for expanding the capabilities of the finance director by implementing effective strategies that ensure risk management and corporate governance; disclosure of requirements to the finance director as to an independent business partner. 5 Decision In the process of improving management mechanisms, focused on the resultant process, the following solutions were obtained. MO Management technologies & organisational growth

197 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 First of all, the greatest need for a new strategic tool concerns those professionals whose role is the integration of business. Secondly, such candidates should take into account the current trends of integration. As a business integrator, it is recommended to use the finance director. The requirements for business integration in 2017 are reduced to the ability to monetize innovation and pricing [9]. These decisions will be justified and will help the company to enter a new stage of business integration. 6 Conclusions Zozule S The results of this work will be useful to those participants of the business environment who are interested in improving the effectiveness of strategic management of the company. Having at the disposal the development of a fundamentally new strategic position where the finance director as an independent business partner, the managers of companies will not only be able to make decisions on which strategy to choose in each specific situation, but also will enable them to improve the company's long-term sustainability. References [1] Кокинз Г 2008 Управление результативностью: Как преодолеть разрыв между объявленной стратегией и реальными процессами Пер. с англ Москва: Альпина Бизнес Букс стр.318 [2] Рид Седрик, Шойерман Ханс-Дитер, группа mysap ERP Financials 2015 Финансовый директор как интегратор бизнеса Пер. с англ.-5-е изд. Москва: Альпина Паблишер стр.397 [3] Каммингс С 2010 Реконструкция стратегии Киев: Гуманитарный центр стр.560 [4] Копытов Р 2006 Менеджмент и управление финансами Рига: TSI стр.199 [5] Хоуп Д 2007 Финансовый директор новой эпохи: как финансовый управляющий может изменить свою роль и обеспечить успех компании на рынке Москва: Вершина стр.304 [6] Чан К В, Моборн Р; 2012 Стратегия голубого океана Пер. с англ. И. Ющенко Москва: Манн, Иванов и Фербер стр.304 [7] Zozule S Особенности формирования стратегии, ориентированной на инновацию ценности 4th International Scientific Practical Conference Business Environment 2/12/2016, Riga, Latvia [8] Лалу Ф 2016 Открывая организации будущего Москва: Манн, Иванов и Фербер стр.432 [9] Рамануджам Мадхаван, Таке Георг 2017 Монетизация инноваций. Как успешные компании создают продукт вокруг цены ООО «Библос» стр.256 MO Management technologies & organisational growth

198 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kopitov R Managing a process of growth of an organisation Rostislav Kopitov ISMA University, 1 Lomonosova Str., LV-1019, Riga, Latvia *Corresponding author s rostislavs.kopitovs@isma.lv Abstract A growth of an organization is determined by a willingness of its leadership to implement new knowledge that was formed due to timely detection of hidden effective symptoms that develop a company. Such readiness manifests itself during phase of support and expands through a special ability of enterprise managers not only to respond professionally to a call of time, but also to provide a large-scale program of response to an influence of external factors. Keywords: system, feedback, commitment, crisis, vision, comparison 1 Introduction A scale of growth of a modern enterprise should be a deficit in methodological grounds that take into account challenges of surrounding business environment is observed in a management arsenal of effective organisations. It is concerned about a unity of learning tools and adaptive measures which are oriented on growth, rather than development. Feature of growth concerns in finding those reserves that will lead to development of an organization and an extension of its life cycle under conditions of accelerated changes. Thus, paces of growth should not be reduced to standartised simplicity of their detection and standard procedures of their distribution. In the conditions of open systems, a new type of organizational culture is required which is orientated towards a higher level of organizational business [1]. Such culture should be based on nature of control. The forefront is a search for such leverages of management that appear to be simple at first glance and provide a guaranteed result, and are very difficult to be implemented in practice [2]. In this regard, a diagnostic tool is proposed that allows to monitor a development of an organization, adjusting its direction in real time operational mode. 2 Paradigm Every enterprise in a strategic aspect is developing in An implementation of the rule 2/98 in practice is lead to removing uncertainty by a mean of finding leverages of growth of organization following the law of accelerating return of Kurzweil [3]. Such growth is observed while moving from linear to non-linear model, and in practice is accomplished through looping of a chain of elements of a whole process into a network (see Fig.1). FIGURE 1 Contour of control system with a positive feedback Speaking the language of control systems, such phenomenon is characterized by the so-called effect of creating tension that strengthens the initial change and represents a loop of positive feedback. 3 Concept A growth of an organization is secured by large-scale events that cause changes, a rejection to realization of such damages a control system. The modified Akoff concept of constructing of purposed control systems in DIKW [4]. The essence of the concept is based on adding features a previous level and is expressed while linking together an understanding of hardly resolving problems with its understanding on a way of formation of deep knowledge. Date Information Knowlege Wisdom FIGURE 2 Contour representation of the DIKW Model Thus, an informational dependence of an organization is removed through a clear perception and acquisition of meaning. Correction function serves as a feedback. 4 Approach Growth of an organization is determined by an ability of its system to overcome crisis. As a basic mean a modified approach of the Greiner s life cycle of an organization is chosen [5]. Its usage expands contents of control process throughout the whole cycle of its conduct. Role of a feedback instrument is performed by a correction function (see Fig.3). Leadership crisis Autonomy crisis Control crisis Border crisis Projecting crisis FIGURE 3 Contour representation of the modified Greiner model Consistent overcoming of potential threats on a strategic path allows to develop a practical guide for a creation of growing organisations and their management. The strategic approach is based on formation of a set of valuable applied knowledge and recommendations concerning ensuring a competitive development of an organisation in conditions of accelerated rates of change. MO Management technologies & organisational growth

199 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT Method Strategic vision of threats is formed in the short-term period of time that is perspective from the present to the future, requires a voluminous representation and is associated with detection of a state of a crisis in the full long-term interval of an organizational life cycle. In this connection, the Barnard s modified approach is used [6] that is based on subsequent passing of six stages. Such stages represent coordinated internal and external mechanisms that are used by an organization in order to achieve growth (see Fig.4). Business Situation Organisation Activity Management Economics FIGURE 4 The structural representation of the modified Barnard's scheme A positive feedback is provided by reproduction function. As a result, a toolkit has been formed that makes it possible to conduct a fundamental diagnostics of managing a process of growth of an organisaton in conditions of accelerated changes. As an assessment tool the well-known procedure Hexagram of Value [7] has been chosen (see Fig.5). Potential external value Potential internal value Activity D3 D2 Organisation D4 Asi s value Situation Control Restructuring value D1 D5 Business D6 Economics FIGURE 5 Diagnostic toolkit Current value Recovery value The present toolkit has been complemented and Kopitov R described in terms of the system of interconnected categories of Diamandis, the so-called system of six D s [8]. Such system forms six basic components of exponential change. As a result, a range of important comparisons has been obtained that are presented in Table 1. TABLE 1 Comparison of the approaches of Barnard and Diamandis Stage of the Barnard scheme Business Situation Function Technology Laws Comparison Accompaniment Correlation Economics Recovery Component of the Diamandis system Democratization Demonatezation Activity Personnel Digitalization Event Organisation Coordination Deception Resistance Management Correction Disruption Perfection Dematerialization Creation It should be noted that all six words present in the fifth column of the table and representing the result of comparison of two approaches, begin in the Russian language with the same prefix. Such result is not a coincidence but does reflect the outcome of achieving the operational certainty. 6 Conclusions in terms of the performed comparison Business support requires a correlation of situation to presence of an event in activity that causes resistance from participants of an organisation while managing a process of achieving a certain level of perfection by creating an efficient economic model. References [1] Лалу Ф 2016 Открывая организации будущего Москва: анн, Иванов и Фербер 332 с [2] Исмаил C, Мэлоун М, ван Геест Ю 2017 Взрывной рост: Почему экспоненциальные организации в десятки раз продуктивнее вашей (и что с этим делать) Москва: Альпина Паблишер, 216 с. [3] Kurzweil R 2013 How to Create a Mind: The Secret of Human Thought Revealed PenguinBooks [4] Акофф Р, Эмери Ф 2008 О целеустремленных системах Москва: Либроком 272 с. [5] Greiner L 1972 Evolution and revolution as organizations grow Harvard Business Review 50(4) [6] Барнард Ч 2012 Функции руководителя: власть, стимулы и ценности в организации Москва, Челябинск: Социум, ИРИСЭН, 333 с. [7] Diamandis P H, Kotler S 2012 Abundance: The Future Is Better Than You Think FreePress [8] Copeland T Dolgoff A 2006 Expectations-Based Management. Journal of Applied Corporate Finance 18(2) DOI:10.111/j , x. MO Management technologies & organisational growth

200 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Mikrjukova Z Innovators in management: position of growth and decline of organization Zhanna Mikrjukova Institute of Solid State Physics, University of Latvia, Kengaraga Str. 8, LV-1063 Riga, Latvia Corresponding author s zannaabece@inbox.lv Abstract Some possible planes of improving the technologies of enterprise management, with the system of transfer of management, from the position of innovative proposals are considered. The time requirement of the corresponding management order sets a different thinking vector for the manager. Keywords: Improvement, innovator, implementation, change of thinking 1 Introduction The state of irreversibility of innovative approaches, leads managers to the point of internal conflict. Management approaches were mutated, because of combining the previous time management rules with modern instructions. The application of classical management approaches sets the transitional type of stagnation as well as stagnation in the management system. The depressive character in the collectives is sharply manifested; the thinking process of the employees is slowing down, contributing to the formation of ignoring innovations, as well as devaluing motivational stimuli for productive work. 2 Terms of implementation For the introduction of systemic methods of organizational management of activities based on reflection, standardization and the use of specialized materially technological tools, it is necessary to have at least two conditions. Firstly, the process itself must have a degree of complexity that would allow and require its dismemberment, into relatively isolated parts. Consequently, the need to create technology is dictated, first of all, by the object itself, by the degree of its complexity [1]. The second is to find means that would allow the subject to systematize so that the maximum effect is achieved with a minimum of effort. Most of all, the innovative approach of technology requires management activities, consisting of a large number of consecutive phases and heterogeneous operations [2]. 3 Tasks Management activities must be divided into a number of working positions, bearing in mind that the task of each of them is to justify the optimal version of the corresponding part of the overall complex action. It is important to understand the fact of where management technology should not be clustered, the development from the perspective of an innovative approach, requires a high flexibility for absolute range of motion, which further leads to the solution of problems in instant effort [3]. 4 Innovative flexibility approaches Applying varieties of flexibility, each of which will allow the process of management to hold in this phase more or less. The names of these approaches are not applied in the literal sense; they are bearing the conditional encoded character. "Dynamic" (kinetic) flexibility of management processes - enables the execution of tasks in a dynamic mode. "Matrixactive" flexibility is the ability to accept and maintain the extended position of the process from an external position, while keeping the active reset mode inside. "Static-passive" flexibility is the ability to take a stretched position of the previous order, in order to search for the addition of the potential of future events in the required time. On the one hand, there is a premium evolutionary technology (which cannot be abandoned), on the other hand, practical management, and between them the space of adaptation [3]. References [1] Деминг Э 2011 Выход из кризиса. Новая парадигма управления людьми, системами, процессами Москва: Альпина Паблишер, 420 с. [2] [3] Акофф Р, Эмери Ф 2008 О целеустремленных системах Москва: Либроком, 272 с. MO Management technologies & organisational growth

201 The 15th INTERNATIONAL SCIENTIFIC CONFERENCE INFORMATION TECHNOLOGIES AND MANAGEMENT 2017 Kalyagin A Determination of product safety criterion Aleksey Kalyagin ISMA University, 1 Lomonosova Str., build. 6, LV-1019 Riga, Latvia * Corresponding author plus3@inbox.lv Abstract The main criteria of product safety in food industry are reviewed as well as factors that could influence to these criteria. Keywords: product, safety, quality, ISO, HACCP. 1 Introduction The aim of food industry is achievement of results that are foreseen to be achieved within planned time period in condition that manufactured product complies for all safety requirements. 2 The task Provision manufactured product to users in accordance with agreements and market demand as well as ensuring safety standard norms in accordance with requirements of quality system ISO Overview To be able to define product quality there is arising necessity to formulate safety requirements: Requirements of ensuring manufacturing process [5]. Determination of the area of utilisation of the latest technologies [4]. Determination of standardisation criteria in accordance with quality system ISO [1]. Determination of identification criteria in accordance with safety system on food manufacturing of HACCP (hazard analysis and critical control points) [2]. There is necessary to point out that for securing of requirements in the safety area there are arising necessity in utilization of time, material and human resources which are limited by abilities of product manufacturer [3]. 4 Solution A necessity of information collection and performing of detailed analysis of requirements determination to manufacturing process, possibility of introduction of the latest technologies and determination of product quality and safety compliance is appearing within this work frames. References [1] [2] [3] Гусаков В, Ильина З, Бельский В 2008 Продовольственная безопасность. Термины и понятия: энциклопедический справочник, Минск 5 Target The aim of this work is complex system development of safety product: Figure 1 Detailed figure of developing product safety regulation 6 Conclusions This detailed figure showing that product safety is achieved in the area of the crossing of two systems activities ISO quality system and HACCP safety system, in condition of formulated requirements to product as well as introduction and utilisation of modern innovative technologies in the manufacturing of certain type of product. [4] Innovation in the food industry and service. The 1 th International scientifically and practical conference. Russia, Krasnodar 2014 [5] Kalyagin A 2017 Mechanisms of accompaniment of product in the conditions of continuous suggestion on its improvement. Master s Degree work Latvia, Riga, ISMA MO Management technologies & organisational growth

Information Technologies, Management and Society

Information Technologies, Management and Society Informäcijas sistèmu menedzmenta augstskola ISMA University Information Technologies, Management and Society The 14th International Scientific Conference Information Technologies and Management 2016 April

More information

Information Technologies, Management and Society

Information Technologies, Management and Society Informācijas sistēmu menedžmenta augstskola ISMA University Information Technologies, Management and Society The 14 th International Scientific Conference Information Technologies and Management 2016 April

More information

Сonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union

Сonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union Сonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union Dmitry Krupsky Head of Department of Economy of Innovation Activity, Ministry of Economy of the Republic

More information

Information Technologies, Management and Society

Information Technologies, Management and Society Informācijas sistēmu menedžmenta augstskola ISMA University Information Technologies, Management and Society The 16 th International Scientific Conference Information Technologies and Management 2018 April

More information

Contents. Nanotechnologies

Contents. Nanotechnologies Nanotechnologies Contents Yu Shunin, L Alfonta, D Fink, A Kiv, A Mansharipova, R Muhamediyev, Yu Zhukovskii, T Lobanova-Shunina, N Burlutskaya, V Gopeyenko, S Bellucci T Lobanova-Shunina, Yu Shunin E K

More information

Information Technologies, Management and Society

Information Technologies, Management and Society Informācijas Sistēmu Menedžmenta Augstskola ISMA University Information Technologies, Management and Society The 13 th International Scientific Conference Information Technologies and Management 2015 April

More information

1 Semiconductor-Photon Interaction

1 Semiconductor-Photon Interaction 1 SEMICONDUCTOR-PHOTON INTERACTION 1 1 Semiconductor-Photon Interaction Absorption: photo-detectors, solar cells, radiation sensors. Radiative transitions: light emitting diodes, displays. Stimulated emission:

More information

Experimental investigation of crack in aluminum cantilever beam using vibration monitoring technique

Experimental investigation of crack in aluminum cantilever beam using vibration monitoring technique International Journal of Computational Engineering Research Vol, 04 Issue, 4 Experimental investigation of crack in aluminum cantilever beam using vibration monitoring technique 1, Akhilesh Kumar, & 2,

More information

STRATEGIC ACTIVITY PLAN

STRATEGIC ACTIVITY PLAN STATE FUNDED RESEARCH INSTITUTE CENTER FOR PHYSICAL SCIENCES AND TECHNOLOGY Appropriation manager code 302496128 2017-2019 STRATEGIC ACTIVITY PLAN I. MISSION AND STRATEGIC CHANGES MISSION Implementation

More information

AFM Study of Hydrocarbon Thin Films

AFM Study of Hydrocarbon Thin Films WDS'05 Proceedings of Contributed Papers, Part II, 391 396, 2005. ISBN 80-86732-59-2 MATFYZPRESS AFM Study of Hydrocarbon Thin Films M. Valtr, I. Ohlídal Masaryk University in Brno, Faculty of Science,

More information

Applications of Monte Carlo Methods in Charged Particles Optics

Applications of Monte Carlo Methods in Charged Particles Optics Sydney 13-17 February 2012 p. 1/3 Applications of Monte Carlo Methods in Charged Particles Optics Alla Shymanska alla.shymanska@aut.ac.nz School of Computing and Mathematical Sciences Auckland University

More information

UNIT-II : SIGNAL DEGRADATION IN OPTICAL FIBERS

UNIT-II : SIGNAL DEGRADATION IN OPTICAL FIBERS UNIT-II : SIGNAL DEGRADATION IN OPTICAL FIBERS The Signal Transmitting through the fiber is degraded by two mechanisms. i) Attenuation ii) Dispersion Both are important to determine the transmission characteristics

More information

Intrinsic Semiconductor

Intrinsic Semiconductor Semiconductors Crystalline solid materials whose resistivities are values between those of conductors and insulators. Good electrical characteristics and feasible fabrication technology are some reasons

More information

STUDIES OF INTERACTION OF PARTIALLY COHERENT LASER RADIATION WITH PLASMA

STUDIES OF INTERACTION OF PARTIALLY COHERENT LASER RADIATION WITH PLASMA STUDIES OF INTERACTION OF PARTIALLY COHERENT LASER RADIATION WITH PLASMA Alexander N. Starodub Deputy Director N.G.Basov Institute of Quantum Radiophysics of P.N.Lebedev Physical Institute of the RAS Leninsky

More information

Chapter 4 SPEECH ENHANCEMENT

Chapter 4 SPEECH ENHANCEMENT 44 Chapter 4 SPEECH ENHANCEMENT 4.1 INTRODUCTION: Enhancement is defined as improvement in the value or Quality of something. Speech enhancement is defined as the improvement in intelligibility and/or

More information

ULTRASONIC GUIDED WAVE ANNULAR ARRAY TRANSDUCERS FOR STRUCTURAL HEALTH MONITORING

ULTRASONIC GUIDED WAVE ANNULAR ARRAY TRANSDUCERS FOR STRUCTURAL HEALTH MONITORING ULTRASONIC GUIDED WAVE ANNULAR ARRAY TRANSDUCERS FOR STRUCTURAL HEALTH MONITORING H. Gao, M. J. Guers, J.L. Rose, G. (Xiaoliang) Zhao 2, and C. Kwan 2 Department of Engineering Science and Mechanics, The

More information

Low-energy Electron Diffractive Imaging for Three dimensional Light-element Materials

Low-energy Electron Diffractive Imaging for Three dimensional Light-element Materials Low-energy Electron Diffractive Imaging for Three dimensional Light-element Materials Hitachi Review Vol. 61 (2012), No. 6 269 Osamu Kamimura, Ph. D. Takashi Dobashi OVERVIEW: Hitachi has been developing

More information

GaAs polytype quantum dots

GaAs polytype quantum dots GaAs polytype quantum dots Vilgailė Dagytė, Andreas Jönsson and Andrea Troian December 17, 2014 1 Introduction An issue that has haunted nanowire growth since it s infancy is the difficulty of growing

More information

Conversion of dinitrogen to ammonia by FeN 3 -embedded

Conversion of dinitrogen to ammonia by FeN 3 -embedded SUPPLEMENTARY MATERIAL FOR Conversion of dinitrogen to ammonia by FeN 3 -embedded Graphene Xiao-Fei Li 1, *, Qin-Kun Li 1, Jin Cheng 1, Lingling Liu 1, Qing Yan 1, Yingchao Wu 1, Xiang-Hua Zhang 1, Zhi-Yong

More information

Supplementary Figure S1 X-ray diffraction pattern of the Ag nanowires shown in Fig. 1a dispersed in their original solution. The wavelength of the

Supplementary Figure S1 X-ray diffraction pattern of the Ag nanowires shown in Fig. 1a dispersed in their original solution. The wavelength of the Supplementary Figure S1 X-ray diffraction pattern of the Ag nanowires shown in Fig. 1a dispersed in their original solution. The wavelength of the x-ray beam was 0.1771 Å. The saturated broad peak and

More information

Electronics The basics of semiconductor physics

Electronics The basics of semiconductor physics Electronics The basics of semiconductor physics Prof. Márta Rencz, Gábor Takács BME DED 17/09/2015 1 / 37 The basic properties of semiconductors Range of conductivity [Source: http://www.britannica.com]

More information

Computer Sciences & Engineering Titles

Computer Sciences & Engineering Titles Bapatla Engineering College :: Library Science Direct e-journals 2016 subscribed by the College Library. Computer Sciences & Engineering - 275 Titles S No ISSN Journal Title Imprint Specialization Subject

More information

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS TEST DESIGN AND FRAMEWORK June 2018 Authorized for Distribution by the New York State Education Department This test design and framework document is designed

More information

Super-Resolution and Reconstruction of Sparse Sub-Wavelength Images

Super-Resolution and Reconstruction of Sparse Sub-Wavelength Images Super-Resolution and Reconstruction of Sparse Sub-Wavelength Images Snir Gazit, 1 Alexander Szameit, 1 Yonina C. Eldar, 2 and Mordechai Segev 1 1. Department of Physics and Solid State Institute, Technion,

More information

Lecture 6 Fiber Optical Communication Lecture 6, Slide 1

Lecture 6 Fiber Optical Communication Lecture 6, Slide 1 Lecture 6 Optical transmitters Photon processes in light matter interaction Lasers Lasing conditions The rate equations CW operation Modulation response Noise Light emitting diodes (LED) Power Modulation

More information

Principles of Engineering

Principles of Engineering Principles of Engineering 2004 (Fifth Edition) Clifton Park, New York All rights reserved 1 The National Academy of Sciences Standards: 1.0 Science Inquiry 1.1 Ability necessary to do scientific inquiry

More information

Supporting Information

Supporting Information Supporting Information Eaton et al. 10.1073/pnas.1600789113 Additional Characterization and Simulation of CsPbX 3 Nanowires and Plates Atomic Force Microscopy Measurements. Atomic force microscopy (AFM)

More information

AN AUTOMATED ALGORITHM FOR SIMULTANEOUSLY DETERMINING ULTRASONIC VELOCITY AND ATTENUATION

AN AUTOMATED ALGORITHM FOR SIMULTANEOUSLY DETERMINING ULTRASONIC VELOCITY AND ATTENUATION MECHANICS. ULTRASONICS AN AUTOMATED ALGORITHM FOR SIMULTANEOUSLY DETERMINING ULTRASONIC VELOCITY AND ATTENUATION P. PETCULESCU, G. PRODAN, R. ZAGAN Ovidius University, Dept. of Physics, 124 Mamaia Ave.,

More information

Direct Observation of Current-Induced Motion of a. 3D Vortex Domain Wall in Cylindrical Nanowires

Direct Observation of Current-Induced Motion of a. 3D Vortex Domain Wall in Cylindrical Nanowires Supporting Information Direct Observation of Current-Induced Motion of a 3D Vortex Domain Wall in Cylindrical Nanowires Yurii P. Ivanov,,, *, Andrey Chuvilin ǁ,, Sergey Lopatin, Hanan Mohammed, Jurgen

More information

Magnetometer Based on a Pair of Symmetric Transitions in the 87 Rb Hyperfine Structure

Magnetometer Based on a Pair of Symmetric Transitions in the 87 Rb Hyperfine Structure ISSN 1063-7842, Technical Physics, 2006, Vol. 51, No. 7, pp. 919923. Pleiades Publishing, Inc., 2006. Original Russian Text E.B. Aleksandrov, A.K. Vershovskiœ, A.S. Pazgalev, 2006, published in Zhurnal

More information

NOISE IN MEMS PIEZORESISTIVE CANTILEVER

NOISE IN MEMS PIEZORESISTIVE CANTILEVER NOISE IN MEMS PIEZORESISTIVE CANTILEVER Udit Narayan Bera Mechatronics, IIITDM Jabalpur, (India) ABSTRACT Though pezoresistive cantilevers are very popular for various reasons, they are prone to noise

More information

Investigate the great variety of body plans and internal structures found in multi cellular organisms.

Investigate the great variety of body plans and internal structures found in multi cellular organisms. Grade 7 Science Standards One Pair of Eyes Science Education Standards Life Sciences Physical Sciences Investigate the great variety of body plans and internal structures found in multi cellular organisms.

More information

Use of Back Scattered Ionizing Radiation for Measurement of Thickness of the Catalytic Agent Active Material

Use of Back Scattered Ionizing Radiation for Measurement of Thickness of the Catalytic Agent Active Material 18th World Conference on Nondestructive Testing, 16- April 1, Durban, South Africa Use of Back Scattered Ionizing Radiation for Measurement of Thickness of the Catalytic Agent Active Material Boris V.

More information

1241. Efficiency improvement of energy harvester at higher frequencies

1241. Efficiency improvement of energy harvester at higher frequencies 24. Efficiency improvement of energy harvester at higher frequencies Giedrius Janusas, Ieva Milasauskaite 2, Vytautas Ostasevicius 3, Rolanas Dauksevicius 4 Kaunas University of Technology, Kaunas, Lithuania

More information

version 7.6 RF separator

version 7.6 RF separator version 7.6 RF separator www.nscl.msu.edu/lise dnr080.jinr.ru/lise East Lansing August-2006 Contents: 1. RF SEPARATOR...3 1.1. RF SEPARATION SYSTEM (RFSS) PROPOSAL AT NSCL... 3 1.2. CONSTRUCTION OF THE

More information

The Effect of He-Ne and Diode Lasers on the Electrical Characteristics of Silicon Diode

The Effect of He-Ne and Diode Lasers on the Electrical Characteristics of Silicon Diode American Journal of Optics and Photonics 2018; 6(1): 8-13 http://www.sciencepublishinggroup.com/j/ajop doi: 10.11648/j.ajop.20180601.12 ISSN: 2330-8486 (Print); ISSN: 2330-8494 (Online) The Effect of He-Ne

More information

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska Call for Participation and Proposals With its dispersed population, cultural diversity, vast area, varied geography,

More information

Contents. Nano-2. Nano-2. Nanoscience II: Nanowires. 2. Growth of nanowires. 1. Nanowire concepts Nano-2. Nano-2

Contents. Nano-2. Nano-2. Nanoscience II: Nanowires. 2. Growth of nanowires. 1. Nanowire concepts Nano-2. Nano-2 Contents Nanoscience II: Nanowires Kai Nordlund 17.11.2010 Faculty of Science Department of Physics Division of Materials Physics 1. Introduction: nanowire concepts 2. Growth of nanowires 1. Spontaneous

More information

Introduction Fundamentals of laser Types of lasers Semiconductor lasers

Introduction Fundamentals of laser Types of lasers Semiconductor lasers ECE 5368 Introduction Fundamentals of laser Types of lasers Semiconductor lasers Introduction Fundamentals of laser Types of lasers Semiconductor lasers How many types of lasers? Many many depending on

More information

AUTOMATED METHOD FOR STATISTIC PROCESSING OF AE TESTING DATA

AUTOMATED METHOD FOR STATISTIC PROCESSING OF AE TESTING DATA AUTOMATED METHOD FOR STATISTIC PROCESSING OF AE TESTING DATA V. A. BARAT and A. L. ALYAKRITSKIY Research Dept, Interunis Ltd., bld. 24, corp 3-4, Myasnitskaya str., Moscow, 101000, Russia Keywords: signal

More information

COMPUTER SCIENCE AND ENGINEERING

COMPUTER SCIENCE AND ENGINEERING COMPUTER SCIENCE AND ENGINEERING Internet of Thing Cloud Computing Big Data Analytics Network Security Distributed System Image Processing Data Science Business Intelligence Wireless Sensor Network Artificial

More information

Introduction of New Products

Introduction of New Products Field Emission Electron Microscope JEM-3100F For evaluation of materials in the fields of nanoscience and nanomaterials science, TEM is required to provide resolution and analytical capabilities that can

More information

Electronic Devices 1. Current flowing in each of the following circuits A and respectively are: (Circuit 1) (Circuit 2) 1) 1A, 2A 2) 2A, 1A 3) 4A, 2A 4) 2A, 4A 2. Among the following one statement is not

More information

Technical Readiness Level For Plasma Control

Technical Readiness Level For Plasma Control Technical Readiness Level For Plasma Control PERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION A.D. Turnbull, General Atomics ARIES Team Meeting University of Wisconsin, Madison,

More information

PHYS 3050 Electronics I

PHYS 3050 Electronics I PHYS 3050 Electronics I Chapter 4. Semiconductor Diodes and Transistors Earth, Moon, Mars, and Beyond Dr. Jinjun Shan, Associate Professor of Space Engineering Department of Earth and Space Science and

More information

Neural Network Application in Robotics

Neural Network Application in Robotics Neural Network Application in Robotics Development of Autonomous Aero-Robot and its Applications to Safety and Disaster Prevention with the help of neural network Sharique Hayat 1, R. N. Mall 2 1. M.Tech.

More information

Invitation for SMEs from associate partner institutions preparing a course under NPTEL

Invitation for SMEs from associate partner institutions preparing a course under NPTEL Invitation for SMEs from associate partner institutions preparing a course under NPTEL Criteria for faculty interested in preparing courses under NPTEL: PhD from a recognized university with experience

More information

Methods of Leak Search from Pipeline for Acoustic Signal Analysis

Methods of Leak Search from Pipeline for Acoustic Signal Analysis Indian Journal of Science and Technology, Vol 10 (1), DOI: 10.17485/ijst/2017/v10i1/109953, January 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Methods of Leak Search from Pipeline for Acoustic

More information

New Detectors for X-Ray Metal Thickness Measuring

New Detectors for X-Ray Metal Thickness Measuring ECNDT 2006 - Poster 132 New Detectors for X-Ray Metal Thickness Measuring Boris V. ARTEMIEV, Alexander I. MASLOV, Association SPEKTR- GROUP, Moscow, Russia Abstract. X-ray thickness measuring instruments

More information

Basic concepts. Optical Sources (b) Optical Sources (a) Requirements for light sources (b) Requirements for light sources (a)

Basic concepts. Optical Sources (b) Optical Sources (a) Requirements for light sources (b) Requirements for light sources (a) Optical Sources (a) Optical Sources (b) The main light sources used with fibre optic systems are: Light-emitting diodes (LEDs) Semiconductor lasers (diode lasers) Fibre laser and other compact solid-state

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION Bifurcation-based acoustic switching and rectification N. Boechler, G. Theocharis, and C. Daraio Engineering and Applied Science, California Institute of Technology, Pasadena, CA 91125, USA Supplementary

More information

Optodevice Data Book ODE I. Rev.9 Mar Opnext Japan, Inc.

Optodevice Data Book ODE I. Rev.9 Mar Opnext Japan, Inc. Optodevice Data Book ODE-408-001I Rev.9 Mar. 2003 Opnext Japan, Inc. Section 1 Operating Principles 1.1 Operating Principles of Laser Diodes (LDs) and Infrared Emitting Diodes (IREDs) 1.1.1 Emitting Principles

More information

NanoSpective, Inc Progress Drive Suite 137 Orlando, Florida

NanoSpective, Inc Progress Drive Suite 137 Orlando, Florida TEM Techniques Summary The TEM is an analytical instrument in which a thin membrane (typically < 100nm) is placed in the path of an energetic and highly coherent beam of electrons. Typical operating voltages

More information

Monitoring of Galvanic Replacement Reaction. between Silver Nanowires and HAuCl 4 by In-Situ. Transmission X-Ray Microscopy

Monitoring of Galvanic Replacement Reaction. between Silver Nanowires and HAuCl 4 by In-Situ. Transmission X-Ray Microscopy Supporting Information Monitoring of Galvanic Replacement Reaction between Silver Nanowires and HAuCl 4 by In-Situ Transmission X-Ray Microscopy Yugang Sun *, and Yuxin Wang Center for Nanoscale Materials

More information

- Basics of informatics - Computer network - Software engineering - Intelligent media processing - Human interface. Professor. Professor.

- Basics of informatics - Computer network - Software engineering - Intelligent media processing - Human interface. Professor. Professor. - Basics of informatics - Computer network - Software engineering - Intelligent media processing - Human interface Computer-Aided Engineering Research of power/signal integrity analysis and EMC design

More information

Wavelength Tunable Random Laser E.Tikhonov 1, Vasil P.Yashchuk 2, O.Prygodjuk 2, V.Bezrodny 1

Wavelength Tunable Random Laser E.Tikhonov 1, Vasil P.Yashchuk 2, O.Prygodjuk 2, V.Bezrodny 1 Solid State Phenomena Vol. 06 (005) pp 87-9 Online available since 005/Sep/5 at www.scientific.net (005) Trans Tech Publications, Switzerland doi:0.408/www.scientific.net/ssp.06.87 Wavelength Tunable Random

More information

FABRICATION AND CHARACTERIZATION OF NICKEL NANOWIRES

FABRICATION AND CHARACTERIZATION OF NICKEL NANOWIRES FABRICATION AND CHARACTERIZATION OF NICKEL NANOWIRES Raminder Kaur Department of Basic and Applied Sciences, Punjabi University, Patiala, India ABSTRACT This paper shows that nickel nanowires of length

More information

Evaluation: Strengths and Areas for Improvement

Evaluation: Strengths and Areas for Improvement Assessment Report Viewer Nuclear Engineering BS (Spring/2015) Objective 1: The Nuclear Engineering program is an ABET, Inc. accredited program. As such, the student learning outcomes used are the student

More information

Multi-Functions of Net Surface Charge in the Reaction. on a Single Nanoparticle

Multi-Functions of Net Surface Charge in the Reaction. on a Single Nanoparticle Multi-Functions of Net Surface Charge in the Reaction on a Single Nanoparticle Shaobo Xi 1 and Xiaochun Zhou* 1,2 1 Division of Advanced Nanomaterials, 2 Key Laboratory of Nanodevices and Applications,

More information

A Novel Multipass Optical System Oleg Matveev University of Florida, Department of Chemistry, Gainesville, Fl

A Novel Multipass Optical System Oleg Matveev University of Florida, Department of Chemistry, Gainesville, Fl A Novel Multipass Optical System Oleg Matveev University of Florida, Department of Chemistry, Gainesville, Fl BACKGROUND Multipass optical systems (MOS) are broadly used in absorption, Raman, fluorescence,

More information

2. Pulsed Acoustic Microscopy and Picosecond Ultrasonics

2. Pulsed Acoustic Microscopy and Picosecond Ultrasonics 1st International Symposium on Laser Ultrasonics: Science, Technology and Applications July 16-18 2008, Montreal, Canada Picosecond Ultrasonic Microscopy of Semiconductor Nanostructures Thomas J GRIMSLEY

More information

Development of the frequency scanning reflectometry for the registration of Alfvén wave resonances in the TCABR tokamak

Development of the frequency scanning reflectometry for the registration of Alfvén wave resonances in the TCABR tokamak Development of the frequency scanning reflectometry for the registration of Alfvén wave resonances in the TCABR tokamak L. F. Ruchko, R. M. O. Galvão, A. G. Elfimov, J. I. Elizondo, and E. Sanada Instituto

More information

No part of this material may be reproduced without explicit written permission.

No part of this material may be reproduced without explicit written permission. This material is provided for educational use only. The information in these slides including all data, images and related materials are the property of : Robert M. Glaeser Department of Molecular & Cell

More information

Measurement of Microscopic Three-dimensional Profiles with High Accuracy and Simple Operation

Measurement of Microscopic Three-dimensional Profiles with High Accuracy and Simple Operation 238 Hitachi Review Vol. 65 (2016), No. 7 Featured Articles Measurement of Microscopic Three-dimensional Profiles with High Accuracy and Simple Operation AFM5500M Scanning Probe Microscope Satoshi Hasumura

More information

Confocal Imaging Through Scattering Media with a Volume Holographic Filter

Confocal Imaging Through Scattering Media with a Volume Holographic Filter Confocal Imaging Through Scattering Media with a Volume Holographic Filter Michal Balberg +, George Barbastathis*, Sergio Fantini % and David J. Brady University of Illinois at Urbana-Champaign, Urbana,

More information

III III 0 IIOI DID IIO 1101 I II 0II II 100 III IID II DI II

III III 0 IIOI DID IIO 1101 I II 0II II 100 III IID II DI II (19) United States III III 0 IIOI DID IIO 1101 I0 1101 0II 0II II 100 III IID II DI II US 200902 19549A1 (12) Patent Application Publication (10) Pub. No.: US 2009/0219549 Al Nishizaka et al. (43) Pub.

More information

Periodic Table of Elements for the Digital Economy

Periodic Table of Elements for the Digital Economy American Journal of Engineering, Technology and Society 2018; 5(2): 20-25 http://www.openscienceonline.com/journal/ajets ISSN: 2381-6171 (Print); ISSN: 2381-618X (Online) Periodic Table of Elements for

More information

Enhancing the low frequency vibration reduction performance of plates with embedded Acoustic Black Holes

Enhancing the low frequency vibration reduction performance of plates with embedded Acoustic Black Holes Enhancing the low frequency vibration reduction performance of plates with embedded Acoustic Black Holes Stephen C. CONLON 1 ; John B. FAHNLINE 1 ; Fabio SEMPERLOTTI ; Philip A. FEURTADO 1 1 Applied Research

More information

Modern Electromagnetic Equipment for Nondestructive Testing

Modern Electromagnetic Equipment for Nondestructive Testing 18th World Conference on Nondestructive Testing, 16-20 April 2012, Durban, South Africa Modern Electromagnetic Equipment for Nondestructive Testing Aleksey G. EFIMOV 1, Sergey V. KLUEV 2, Andrey E. SHUBOCHKIN

More information

Laboratory 1: Uncertainty Analysis

Laboratory 1: Uncertainty Analysis University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can

More information

COVENANT UNIVERSITY NIGERIA TUTORIAL KIT OMEGA SEMESTER PROGRAMME: MECHANICAL ENGINEERING

COVENANT UNIVERSITY NIGERIA TUTORIAL KIT OMEGA SEMESTER PROGRAMME: MECHANICAL ENGINEERING COVENANT UNIVERSITY NIGERIA TUTORIAL KIT OMEGA SEMESTER PROGRAMME: MECHANICAL ENGINEERING COURSE: MCE 527 DISCLAIMER The contents of this document are intended for practice and leaning purposes at the

More information

Chapter 4 Imaging Lecture 17

Chapter 4 Imaging Lecture 17 Chapter 4 Imaging Lecture 17 d (110) Imaging Imaging in the TEM Diffraction Contrast in TEM Image HRTEM (High Resolution Transmission Electron Microscopy) Imaging STEM imaging Imaging in the TEM What is

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

SCINTILLATING FIBER DOSIMETER ARRAY

SCINTILLATING FIBER DOSIMETER ARRAY SCINTILLATING FIBER DOSIMETER ARRAY FIELD OF THE INVENTION [0001] This invention relates generally to the field of dosimetry and, more particularly, to rapid, high-resolution dosimeters for advanced treatment

More information

Bias errors in PIV: the pixel locking effect revisited.

Bias errors in PIV: the pixel locking effect revisited. Bias errors in PIV: the pixel locking effect revisited. E.F.J. Overmars 1, N.G.W. Warncke, C. Poelma and J. Westerweel 1: Laboratory for Aero & Hydrodynamics, University of Technology, Delft, The Netherlands,

More information

Networks of Josephson Junctions and Their Synchronization Yurii N. Ovchinnikov 1,2 and Vladimir Z. Kresin 3

Networks of Josephson Junctions and Their Synchronization Yurii N. Ovchinnikov 1,2 and Vladimir Z. Kresin 3 Networks of Josephson Junctions and Their Synchronization Yurii N. Ovchinnikov 1,2 and Vladimir Z. Kresin 3 1 L.Landau Institute of Theoretical Physics, 117334,Moscow, Russia 2 Max-Planck Institute for

More information

Kazakhstan Way of Innovation Clusterization K. Mukhtarova Al-Farabi Kazak National University, Almaty, Kazakhstan

Kazakhstan Way of Innovation Clusterization K. Mukhtarova Al-Farabi Kazak National University, Almaty, Kazakhstan Journal of Social Sciences (COES&RJ-JSS) ISSN (E): 2305-9249 ISSN (P): 2305-9494 Publisher: Centre of Excellence for Scientific & Research Journalism, COES&RJ LLC Online Publication Date: 1 st January

More information

STUDY OF VIBRATION MODAL ESTIMATION FOR COMPOSITE BEAM WITH PZT THIN FILM SENSOR SYSTEM

STUDY OF VIBRATION MODAL ESTIMATION FOR COMPOSITE BEAM WITH PZT THIN FILM SENSOR SYSTEM STUDY OF VIBRATION MODAL ESTIMATION FOR COMPOSITE BEAM WITH PZT THIN FILM SENSOR SYSTEM Nobuo Oshima, Takehito Fukuda and Shinya Motogi Faculty of Engineering, Osaka City University 3-3-38, Sugimoto, Sumiyoshi-ku,

More information

Modelling of electronic and transport properties in semiconductor nanowires

Modelling of electronic and transport properties in semiconductor nanowires Modelling of electronic and transport properties in semiconductor nanowires Martin P. Persson,1 Y. M. Niquet,1 S. Roche,1 A. Lherbier,1,2 D. Camacho,1 F. Triozon,3 M. Diarra,4 C. Delerue4 and G. Allan4

More information

ENHANCEMENT OF SYNTHETIC APERTURE FOCUSING TECHNIQUE (SAFT) BY ADVANCED SIGNAL PROCESSING

ENHANCEMENT OF SYNTHETIC APERTURE FOCUSING TECHNIQUE (SAFT) BY ADVANCED SIGNAL PROCESSING ENHANCEMENT OF SYNTHETIC APERTURE FOCUSING TECHNIQUE (SAFT) BY ADVANCED SIGNAL PROCESSING M. Jastrzebski, T. Dusatko, J. Fortin, F. Farzbod, A.N. Sinclair; University of Toronto, Toronto, Canada; M.D.C.

More information

The development of a virtual laboratory based on Unreal Engine 4

The development of a virtual laboratory based on Unreal Engine 4 The development of a virtual laboratory based on Unreal Engine 4 D A Sheverev 1 and I N Kozlova 1 1 Samara National Research University, Moskovskoye shosse 34А, Samara, Russia, 443086 Abstract. In our

More information

(a) apparatus: cell with particles e.g. smoke (container must be closed) diagram showing suitable arrangement with light illumination and microscope

(a) apparatus: cell with particles e.g. smoke (container must be closed) diagram showing suitable arrangement with light illumination and microscope 4 Specimen 03 (a) apparatus: cell with particles e.g. smoke (container must be closed) diagram showing suitable arrangement with light illumination and microscope (b) specks / flashes of light in random

More information

Assessment Report Viewer. Nuclear Engineering-BS

Assessment Report Viewer. Nuclear Engineering-BS Assessment Report Viewer Nuclear Engineering-BS Objective 1: The Nuclear Engineering program is an ABET, Inc. accredited program. As such, the student learning outcomes used are the student learning outcomes

More information

Neural Network based Multi-Dimensional Feature Forecasting for Bad Data Detection and Feature Restoration in Power Systems

Neural Network based Multi-Dimensional Feature Forecasting for Bad Data Detection and Feature Restoration in Power Systems Neural Network based Multi-Dimensional Feature Forecasting for Bad Data Detection and Feature Restoration in Power Systems S. P. Teeuwsen, Student Member, IEEE, I. Erlich, Member, IEEE, Abstract--This

More information

NANOSTRUCTURED CuCo NANOWIRES. Fedosyuk V.M.

NANOSTRUCTURED CuCo NANOWIRES. Fedosyuk V.M. NANOSTRUCTURED CuCo NANOWIRES Fedosyuk V.M. Institute of Solid State Physics and Semiconductors of the Belorussian Academy of Sciences, P Brovki str 19, 220072 Minsk, Belarus E-mail:fedosyuk@ifttp.bas-net.by

More information

Lecture 18: Photodetectors

Lecture 18: Photodetectors Lecture 18: Photodetectors Contents 1 Introduction 1 2 Photodetector principle 2 3 Photoconductor 4 4 Photodiodes 6 4.1 Heterojunction photodiode.................... 8 4.2 Metal-semiconductor photodiode................

More information

PLASMA BUILD-UP and CONFINEMENT IN URAGAN-2M DEVICE

PLASMA BUILD-UP and CONFINEMENT IN URAGAN-2M DEVICE PLASMA BUILD-UP and CONFINEMENT IN URAGAN-2M DEVICE V.E. Moiseenko, A.V. Lozin, M.M. Kozulya, Yu.K. Mironov, V.S. Romanov, A.N. Shapoval, V.G. Konovalov, V.V. Filippov, V.B. Korovin, A. Yu. Krasyuk, V.V.

More information

Institute of Physical and Chemical Research Flowcharts for Achieving Mid to Long-term Objectives

Institute of Physical and Chemical Research Flowcharts for Achieving Mid to Long-term Objectives Document 3-4 Institute of Physical and Chemical Research Flowcharts for Achieving Mid to Long-term Objectives Basic Research Promotion Division : Expected outcome : Output : Approach 1 3.1 Establishment

More information

Emission Rate Variation and Efficiency Measurement in TiO 2 Light Emitting Diode

Emission Rate Variation and Efficiency Measurement in TiO 2 Light Emitting Diode Emission Rate Variation and Efficiency Measurement in TiO 2 Light Emitting Diode S.N. Ariffin 1,*, N.A.M.A. Hambali 1, M.H.A. Wahid 1, M.M. Shahimin 1, U.K. Sahbudin 1, and N.N. A.Saidi 1 1 Semiconductor

More information

Foresight for aviation industry in Russia

Foresight for aviation industry in Russia Foresight for aviation industry in Russia Konstantin Vishnevskiy Head of Department for Private-Public Partnership in Innovation Sector, PhD Research Lab for Science and Technology Studies Institute for

More information

1 st IFAC Conference on Mechatronic Systems - Mechatronics 2000, September 18-20, 2000, Darmstadt, Germany

1 st IFAC Conference on Mechatronic Systems - Mechatronics 2000, September 18-20, 2000, Darmstadt, Germany 1 st IFAC Conference on Mechatronic Systems - Mechatronics 2000, September 18-20, 2000, Darmstadt, Germany SPACE APPLICATION OF A SELF-CALIBRATING OPTICAL PROCESSOR FOR HARSH MECHANICAL ENVIRONMENT V.

More information

CHAPTER 6 CARBON NANOTUBE AND ITS RF APPLICATION

CHAPTER 6 CARBON NANOTUBE AND ITS RF APPLICATION CHAPTER 6 CARBON NANOTUBE AND ITS RF APPLICATION 6.1 Introduction In this chapter we have made a theoretical study about carbon nanotubes electrical properties and their utility in antenna applications.

More information

ANALYSIS OF ELECTRON CURRENT INSTABILITY IN E-BEAM WRITER. Jan BOK, Miroslav HORÁČEK, Stanislav KRÁL, Vladimír KOLAŘÍK, František MATĚJKA

ANALYSIS OF ELECTRON CURRENT INSTABILITY IN E-BEAM WRITER. Jan BOK, Miroslav HORÁČEK, Stanislav KRÁL, Vladimír KOLAŘÍK, František MATĚJKA ANALYSIS OF ELECTRON CURRENT INSTABILITY IN E-BEAM WRITER Jan BOK, Miroslav HORÁČEK, Stanislav KRÁL, Vladimír KOLAŘÍK, František MATĚJKA Institute of Scientific Instruments of the ASCR, v. v.i., Královopolská

More information

AN ANALYSIS OF THE METROLOGY TECHNIQUES TO IMPROVE QUALITY AND ACCURACY

AN ANALYSIS OF THE METROLOGY TECHNIQUES TO IMPROVE QUALITY AND ACCURACY AN ANALYSIS OF THE METROLOGY TECHNIQUES TO IMPROVE QUALITY AND ACCURACY Numan M. Durakbasa 1, Gökcen Bas 2 1 Prof.Dr., Vienna University of Technology, AuM, numan.durakbasa@tuwien.ac.at 2 Dr.techn., Vienna

More information

Cognitive robots and emotional intelligence Cloud robotics Ethical, legal and social issues of robotic Construction robots Human activities in many

Cognitive robots and emotional intelligence Cloud robotics Ethical, legal and social issues of robotic Construction robots Human activities in many Preface The jubilee 25th International Conference on Robotics in Alpe-Adria-Danube Region, RAAD 2016 was held in the conference centre of the Best Western Hotel M, Belgrade, Serbia, from 30 June to 2 July

More information

Supplementary Figure 1 Reflective and refractive behaviors of light with normal

Supplementary Figure 1 Reflective and refractive behaviors of light with normal Supplementary Figures Supplementary Figure 1 Reflective and refractive behaviors of light with normal incidence in a three layer system. E 1 and E r are the complex amplitudes of the incident wave and

More information

Observation of X-rays generated by relativistic electrons in waveguide target mounted inside a betatron

Observation of X-rays generated by relativistic electrons in waveguide target mounted inside a betatron Observation of X-rays generated by relativistic electrons in waveguide target mounted inside a betatron V.V.Kaplin (1), V.V.Sohoreva (1), S.R.Uglov (1), O.F.Bulaev (2), A.A.Voronin (2), M.Piestrup (3),

More information

Loughborough University Institutional Repository. This item was submitted to Loughborough University's Institutional Repository by the/an author.

Loughborough University Institutional Repository. This item was submitted to Loughborough University's Institutional Repository by the/an author. Loughborough University Institutional Repository Effects of lateral resistances in photovoltaic cells and full 2-D parameter extraction for the spatially-resolved models using electroluminescence images

More information

2 COURSES TAUGHT IN ENGLISH Eurasian National University named after L.N. Gumilyov Academic year 2015/ Autumn

2 COURSES TAUGHT IN ENGLISH Eurasian National University named after L.N. Gumilyov Academic year 2015/ Autumn COURSES TAUGHT IN ENGLISH Eurasian National University named after L.N. Gumilyov Academic year 0/06 COURSES TAUGHT IN ENGLISH Eurasian National University named after L.N. Gumilyov Academic year 0/06.

More information

NANO MODIFICATION OF THE W(100)/ZrO ELECTRON EMITTER TIP USING REACTIVE ION ETCHING

NANO MODIFICATION OF THE W(100)/ZrO ELECTRON EMITTER TIP USING REACTIVE ION ETCHING NANO MODIFICATION OF THE W(100)/ZrO ELECTRON EMITTER TIP USING REACTIVE ION ETCHING Miroslav HORÁČEK, František MATĚJKA, Vladimír KOLAŘÍK, Milan MATĚJKA, Michal URBÁNEK Ústav přístrojové techniky AV ČR,

More information