Computing & Engineering https://ce.journal.satbayev.university/index.php/journal <p>The mission of the journal <em>Computing &amp; Engineering</em> is determined by the desire to create a creative discussion platform for discussing current issues in the field of computing and engineering. Demonstration of the achievements of university researchers, promotion of their scientific results, positioning of the university in the scientific community and self-expression of university employees.</p> <p><strong>Objectives of the magazine:</strong></p> <ul> <li>providing pages for presenting the results of research in the field of computing and engineering;</li> <li>maintaining high scientific standards by involving leading scientists and specialists in relevant fields of knowledge in the review process;</li> <li>enriching science with new research regardless of geographical and institutional frameworks;</li> <li>the desire to reduce the period of editorial processing of an article and support a flexible schedule for submitting materials to the journal;</li> <li>increasing the accessibility of the journal for foreign readers - publishing an expanded summary of the essence of the study in English (Abstract), keywords (Keywords) and duplicating the list of references in the Latin alphabet (References).</li> </ul> <p><strong>Publication languages:</strong> Kazakh, Russian and English.</p> <p>The frequency of issue is <strong>4 times a year.</strong></p> <p><strong>eISSN:</strong> 3080-3829</p> <p><strong>Certificate of state registration:</strong> KZ85VPY00060870 12/09/2022</p> <p><strong>Publisher:</strong> <a href="http://satbayev.university/">Satbayev University</a></p> <p> </p> en-US <p>&lt;div class="pkpfooter-son"&gt;<br />&lt;a rel="license" href="http://creativecommons.org/licenses/by-nc/4.0/"&gt;&lt;img alt="Creative Commons License" style="border-width:0" src="https://i.creativecommons.org/l/by-nc/4.0/80x15.png"&gt;&lt;/a&gt;&lt;br&gt;This work is licensed under a &lt;a rel="license" href="http://creativecommons.org/licenses/by-nc/4.0/"&gt;Creative Commons Attribution-NonCommercial 4.0 International License&lt;/a&gt;.<br />&lt;/div&gt;</p> Mon, 31 Mar 2025 00:00:00 +0000 OJS 3.2.1.2 http://blogs.law.harvard.edu/tech/rss 60 Research and analysis of embedded software for undeclared capabilities https://ce.journal.satbayev.university/index.php/journal/article/view/1306 <p>This paper presents the process of extracting, studying, and analyzing embedded software to confirm the presence of an undeclared capabilities. For this purpose, an educational scenario was modeled in which a software backdoor is inserted into an encryption algorithm implemented using Arduino IDE 2.3.2. The backdoor enables covert transmission of a secret key from the electronic device to an attacker over an Ethernet network in response to a predefined code phrase received via the same network interface. The electronic device used is the open-source Arduino UNO platform. To activate an undeclared feature by sending a passphrase to an electronic device, the attacker is expected to use a software backdoor implemented in the Python programming language in the PyCharm 2021.2.2 IDE.</p> A.B. Batyrgaliev, O.A. Lizunov Copyright (c) 2025 Computing & Engineering https://creativecommons.org/licenses/by-nc-nd/4.0 https://ce.journal.satbayev.university/index.php/journal/article/view/1306 Mon, 31 Mar 2025 00:00:00 +0000 Blockchain-based validation of academic credentials https://ce.journal.satbayev.university/index.php/journal/article/view/1307 <p>In the context of the transition to a new environment driven by digitalization and transparency, it is essential to identify the criteria that influence and facilitate these changes. Education represents an integral component of societal development and constitutes a key element of the modern global structure. Today, the digital sphere has become an indispensable part of the educational system. Graduates who have legitimately earned their diplomas contribute to the advancement of society through their knowledge and skills. However, in recent years, the issue of fraudulent certificates has raised increasing concern. This challenge underscores the need for reliable systems capable of verifying the authenticity and validity of academic documents. Owing to its decentralized and secure nature, blockchain technology offers a robust solution to many of the problems encountered in the education sector, particularly in the domain of academic data verification. Unlike traditional methods that rely on manual verification or third-party services, blockchain enables a decentralized and immutable ledger-based solution. Nevertheless, research on the implementation of blockchain for academic data validation remains in its early stages. To gain a deeper understanding of this emerging area, this article provides a comprehensive review of existing knowledge and developments in blockchain-based systems for academic certificate verification.</p> B. Koshkinbayeva, Zh. Kalpeyeva Copyright (c) 2025 Computing & Engineering https://creativecommons.org/licenses/by-nc-nd/4.0 https://ce.journal.satbayev.university/index.php/journal/article/view/1307 Mon, 31 Mar 2025 00:00:00 +0000 A comparative analysis of machine learning methods for personal information recognition (PII) in unstructured texts https://ce.journal.satbayev.university/index.php/journal/article/view/1308 <p class="Text"><span lang="EN-US">With the rapid growth of unstructured data and increased attention to the privacy of personally identifiable information (PII), the tasks of automatic recognition and data protection are becoming increasingly relevant. This paper provides a comparative analysis of machine learning methods for recognizing PII in unstructured texts. The study considers rule-based methods, classification algorithms (SVM, random forests), and deep learning models (neural networks, transformers). The effectiveness of the models is assessed using metrics such as accuracy, recall, and F1-measures. The experimental results show that deep learning models such as BERT demonstrate high accuracy and recall, outperforming traditional methods. However, they require significant computing resources and a large amount of training data. The article discusses the advantages and disadvantages of each approach, and offers recommendations for choosing a model depending on the specifics of the task and available resources. Beyond technical advances, the study highlights the value creation provided by effective PII recognition, including improved data security, automated compliance, and operational efficiency.</span></p> A. Makhambet, A. Moldagulova Copyright (c) 2025 Computing & Engineering https://creativecommons.org/licenses/by-nc-nd/4.0 https://ce.journal.satbayev.university/index.php/journal/article/view/1308 Mon, 31 Mar 2025 00:00:00 +0000 Blockchain for wireless IoT sensor networks https://ce.journal.satbayev.university/index.php/journal/article/view/1304 <p>The convergence of blockchain technology with wireless IoT sensor networks has emerged as a groundbreaking innovation, addressing critical issues of security, data integrity, scalability, and energy efficiency. With the proliferation of IoT devices and sensors across industries, managing and securing the vast amounts of data they generate have become paramount. Blockchain's decentralized, immutable ledger system offers an ideal solution for these challenges.</p> A. Khabibullin, A. Razaque, Zh. Kalpeyeva Copyright (c) 2025 Computing & Engineering https://creativecommons.org/licenses/by-nc-nd/4.0 https://ce.journal.satbayev.university/index.php/journal/article/view/1304 Mon, 31 Mar 2025 00:00:00 +0000 AI and Machine Learning for 6G-enabled IoT https://ce.journal.satbayev.university/index.php/journal/article/view/1305 <p class="Text"><span lang="EN-US">The rapid advancement of wireless communication technologies has brought about a transformative era of connectivity. With the evolution towards the sixth generation (6G) networks, the integration of Internet of Things (IoT) and Artificial Intelligence (AI) is set to redefine industries by enhancing efficiency, reducing latency, and fostering innovative applications. IoT, a critical enabler of smart environments, requires robust communication systems to support the massive number of interconnected devices. However, current 5G networks face challenges in addressing the exponential data demands, energy efficiency, and real-time responsiveness needed for IoT ecosystems.</span></p> D. Pan, A. Razaque, A. Matkarimova Copyright (c) 2025 Computing & Engineering https://creativecommons.org/licenses/by-nc-nd/4.0 https://ce.journal.satbayev.university/index.php/journal/article/view/1305 Mon, 31 Mar 2025 00:00:00 +0000 Combating Social Network Manipulations: A Machine Learning Approach to Enhance Digital Literacy and Emotional Awareness https://ce.journal.satbayev.university/index.php/journal/article/view/1302 <p>Modern social networks are crucial to users' lives, but with their growing popularity comes the danger of manipulation that can alter perception, behavior, and weaken critical thinking. This article examines the causes and consequences of harmful manipulations in social networks, such as commercial interests, political influence, and the psychological vulnerability of users. False information, emotional manipulation, and algorithmic distortions are factors contributing to the increase in social and psycho-emotional instability. The new approach addresses these issues by using machine learning and emotional tone analysis for more accurate manipulation detection. This method can detect not only explicit manipulations but also subtler influences, using contextual analysis and user sentiment tracking. The method is extremely adaptive and capable of learning from specific situations, which allows it to constantly improve. The application of this approach in educational programs aimed at enhancing digital literacy will help increase user awareness and reduce their susceptibility to manipulation. The proposed approach is an important step in developing user protection methods and creating open and secure digital ecosystems.</p> A. Bakpokpayev, A. Razaque, Zh. Kalpeeva, A. Ayapbergenova Copyright (c) 2025 Computing & Engineering https://creativecommons.org/licenses/by-nc-nd/4.0 https://ce.journal.satbayev.university/index.php/journal/article/view/1302 Mon, 31 Mar 2025 00:00:00 +0000 Gamification for Enhancing Team Productivity in Software Development: A Motivational Framework https://ce.journal.satbayev.university/index.php/journal/article/view/1303 <p class="Text"><span lang="EN-US">Teams that make software today usually run into the issue where they are not feeling too pumped or productive. Because of this stuff takes longer to finish and the stuff they make is not as good. To tackle this issue one can investigate improving the work environment, introducing flexible approaches to project management and incorporating gaming aspects to boost staff morale. The focus of this document is on how changing the usual tasks in the style of game tasks will help increase interest and efficiency in groups. It is thought that the introduction of game elements, such as receiving awards, developing a leaderboard and accumulating badges, will make employees more motivated to complete and upload their tasks successfully and efficiently. The aim is to create game-inspired rewards that match the objectives of the team and fit seamlessly into the daily tasks. We'll also tackle the possible downsides like too much rivalry and offer up some top tips for putting things into action in a good way. This study leans on case studies from big names like Microsoft and software (SAP) to show how turning tasks into games can really boost how well teams do.</span></p> A. Razaque, N. Kozhan, A. Abdrakhmanov, Zh. Kalpeyeva, A. Matkarimova Copyright (c) 2025 Computing & Engineering https://creativecommons.org/licenses/by-nc-nd/4.0 https://ce.journal.satbayev.university/index.php/journal/article/view/1303 Mon, 31 Mar 2025 00:00:00 +0000