https://ce.journal.satbayev.university/index.php/journal/issue/feedComputing & Engineering2025-05-20T05:06:15+00:00Open Journal Systems<p>The mission of the journal <em>Computing & Engineering</em> is determined by the desire to create a creative discussion platform for discussing current issues in the field of computing and engineering. Demonstration of the achievements of university researchers, promotion of their scientific results, positioning of the university in the scientific community and self-expression of university employees.</p> <p><strong>Objectives of the magazine:</strong></p> <ul> <li>providing pages for presenting the results of research in the field of computing and engineering;</li> <li>maintaining high scientific standards by involving leading scientists and specialists in relevant fields of knowledge in the review process;</li> <li>enriching science with new research regardless of geographical and institutional frameworks;</li> <li>the desire to reduce the period of editorial processing of an article and support a flexible schedule for submitting materials to the journal;</li> <li>increasing the accessibility of the journal for foreign readers - publishing an expanded summary of the essence of the study in English (Abstract), keywords (Keywords) and duplicating the list of references in the Latin alphabet (References).</li> </ul> <p><strong>Publication languages:</strong> Kazakh, Russian and English.</p> <p>The frequency of issue is <strong>4 times a year.</strong></p> <p><strong>eISSN:</strong> 3080-3829</p> <p><strong>Certificate of state registration:</strong> KZ85VPY00060870 12/09/2022</p> <p><strong>Publisher:</strong> <a href="http://satbayev.university/">Satbayev University</a></p> <p> </p>https://ce.journal.satbayev.university/index.php/journal/article/view/1306Research and analysis of embedded software for undeclared capabilities2025-05-20T04:38:35+00:00A.B. Batyrgalievo.lizunov@bk.ruO.A. Lizunovo.lizunov@bk.ru<p>This paper presents the process of extracting, studying, and analyzing embedded software to confirm the presence of an undeclared capabilities. For this purpose, an educational scenario was modeled in which a software backdoor is inserted into an encryption algorithm implemented using Arduino IDE 2.3.2. The backdoor enables covert transmission of a secret key from the electronic device to an attacker over an Ethernet network in response to a predefined code phrase received via the same network interface. The electronic device used is the open-source Arduino UNO platform. To activate an undeclared feature by sending a passphrase to an electronic device, the attacker is expected to use a software backdoor implemented in the Python programming language in the PyCharm 2021.2.2 IDE.</p>2025-03-31T00:00:00+00:00Copyright (c) 2025 Computing & Engineeringhttps://ce.journal.satbayev.university/index.php/journal/article/view/1307Blockchain-based validation of academic credentials2025-05-20T04:50:01+00:00B. KoshkinbayevaB.Koshkinbayeva@su.edu.kzZh. KalpeyevaB.Koshkinbayeva@su.edu.kz<p>In the context of the transition to a new environment driven by digitalization and transparency, it is essential to identify the criteria that influence and facilitate these changes. Education represents an integral component of societal development and constitutes a key element of the modern global structure. Today, the digital sphere has become an indispensable part of the educational system. Graduates who have legitimately earned their diplomas contribute to the advancement of society through their knowledge and skills. However, in recent years, the issue of fraudulent certificates has raised increasing concern. This challenge underscores the need for reliable systems capable of verifying the authenticity and validity of academic documents. Owing to its decentralized and secure nature, blockchain technology offers a robust solution to many of the problems encountered in the education sector, particularly in the domain of academic data verification. Unlike traditional methods that rely on manual verification or third-party services, blockchain enables a decentralized and immutable ledger-based solution. Nevertheless, research on the implementation of blockchain for academic data validation remains in its early stages. To gain a deeper understanding of this emerging area, this article provides a comprehensive review of existing knowledge and developments in blockchain-based systems for academic certificate verification.</p>2025-03-31T00:00:00+00:00Copyright (c) 2025 Computing & Engineeringhttps://ce.journal.satbayev.university/index.php/journal/article/view/1308A comparative analysis of machine learning methods for personal information recognition (PII) in unstructured texts2025-05-20T05:06:15+00:00A. Makhambetaluamakhambet@gmail.comA. Moldagulovaaluamakhambet@gmail.com<p class="Text"><span lang="EN-US">With the rapid growth of unstructured data and increased attention to the privacy of personally identifiable information (PII), the tasks of automatic recognition and data protection are becoming increasingly relevant. This paper provides a comparative analysis of machine learning methods for recognizing PII in unstructured texts. The study considers rule-based methods, classification algorithms (SVM, random forests), and deep learning models (neural networks, transformers). The effectiveness of the models is assessed using metrics such as accuracy, recall, and F1-measures. The experimental results show that deep learning models such as BERT demonstrate high accuracy and recall, outperforming traditional methods. However, they require significant computing resources and a large amount of training data. The article discusses the advantages and disadvantages of each approach, and offers recommendations for choosing a model depending on the specifics of the task and available resources. Beyond technical advances, the study highlights the value creation provided by effective PII recognition, including improved data security, automated compliance, and operational efficiency.</span></p>2025-03-31T00:00:00+00:00Copyright (c) 2025 Computing & Engineeringhttps://ce.journal.satbayev.university/index.php/journal/article/view/1304Blockchain for wireless IoT sensor networks 2025-05-19T12:50:06+00:00A. Khabibullina-razaque@onu.eduA. Razaquea-razaque@onu.eduZh. Kalpeyevaa-razaque@onu.edu<p>The convergence of blockchain technology with wireless IoT sensor networks has emerged as a groundbreaking innovation, addressing critical issues of security, data integrity, scalability, and energy efficiency. With the proliferation of IoT devices and sensors across industries, managing and securing the vast amounts of data they generate have become paramount. Blockchain's decentralized, immutable ledger system offers an ideal solution for these challenges.</p>2025-03-31T00:00:00+00:00Copyright (c) 2025 Computing & Engineeringhttps://ce.journal.satbayev.university/index.php/journal/article/view/1305AI and Machine Learning for 6G-enabled IoT 2025-05-19T13:01:40+00:00D. Pana-razaque@onu.eduA. Razaquea-razaque@onu.eduA. Matkarimovaa-razaque@onu.edu<p class="Text"><span lang="EN-US">The rapid advancement of wireless communication technologies has brought about a transformative era of connectivity. With the evolution towards the sixth generation (6G) networks, the integration of Internet of Things (IoT) and Artificial Intelligence (AI) is set to redefine industries by enhancing efficiency, reducing latency, and fostering innovative applications. IoT, a critical enabler of smart environments, requires robust communication systems to support the massive number of interconnected devices. However, current 5G networks face challenges in addressing the exponential data demands, energy efficiency, and real-time responsiveness needed for IoT ecosystems.</span></p>2025-03-31T00:00:00+00:00Copyright (c) 2025 Computing & Engineeringhttps://ce.journal.satbayev.university/index.php/journal/article/view/1302Combating Social Network Manipulations: A Machine Learning Approach to Enhance Digital Literacy and Emotional Awareness2025-05-19T12:17:56+00:00A. Bakpokpayeva.bakpokpayev@satbayev.universityA. Razaquea.bakpokpayev@satbayev.universityZh. Kalpeevaa.bakpokpayev@satbayev.universityA. Ayapbergenovaa.bakpokpayev@satbayev.university<p>Modern social networks are crucial to users' lives, but with their growing popularity comes the danger of manipulation that can alter perception, behavior, and weaken critical thinking. This article examines the causes and consequences of harmful manipulations in social networks, such as commercial interests, political influence, and the psychological vulnerability of users. False information, emotional manipulation, and algorithmic distortions are factors contributing to the increase in social and psycho-emotional instability. The new approach addresses these issues by using machine learning and emotional tone analysis for more accurate manipulation detection. This method can detect not only explicit manipulations but also subtler influences, using contextual analysis and user sentiment tracking. The method is extremely adaptive and capable of learning from specific situations, which allows it to constantly improve. The application of this approach in educational programs aimed at enhancing digital literacy will help increase user awareness and reduce their susceptibility to manipulation. The proposed approach is an important step in developing user protection methods and creating open and secure digital ecosystems.</p>2025-03-31T00:00:00+00:00Copyright (c) 2025 Computing & Engineeringhttps://ce.journal.satbayev.university/index.php/journal/article/view/1303Gamification for Enhancing Team Productivity in Software Development: A Motivational Framework2025-05-19T12:32:04+00:00A. Razaquea-razaque@onu.eduN. Kozhana-razaque@onu.eduA. Abdrakhmanova-razaque@onu.eduZh. Kalpeyevaa-razaque@onu.eduA. Matkarimovaa-razaque@onu.edu<p class="Text"><span lang="EN-US">Teams that make software today usually run into the issue where they are not feeling too pumped or productive. Because of this stuff takes longer to finish and the stuff they make is not as good. To tackle this issue one can investigate improving the work environment, introducing flexible approaches to project management and incorporating gaming aspects to boost staff morale. The focus of this document is on how changing the usual tasks in the style of game tasks will help increase interest and efficiency in groups. It is thought that the introduction of game elements, such as receiving awards, developing a leaderboard and accumulating badges, will make employees more motivated to complete and upload their tasks successfully and efficiently. The aim is to create game-inspired rewards that match the objectives of the team and fit seamlessly into the daily tasks. We'll also tackle the possible downsides like too much rivalry and offer up some top tips for putting things into action in a good way. This study leans on case studies from big names like Microsoft and software (SAP) to show how turning tasks into games can really boost how well teams do.</span></p>2025-03-31T00:00:00+00:00Copyright (c) 2025 Computing & Engineering