Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 213, Issue C2022
Publisher:
  • Elsevier Science Publishers B. V.
  • PO Box 211 1000 AE Amsterdam
  • Netherlands
ISSN:1877-0509
EISSN:1877-0509
Reflects downloads up to 11 Feb 2025Bibliometrics
front-matter
Contents
index
INDEX
research-article
A prototype system for supporting a network of information graphs with the ability to assess the nature of the subject's knowledge
Abstract

The task of modeling a subject whose cognitive activity is directed under the influence of the information environment continues to remain relevant. The difficulties in solving this problem are due to (1) the dependence of the truth of information ...

research-article
Modeling the effects of propranolol administration after fear memory reactivation by a second-order adaptive network model
Abstract

Fear involves activating the fight-or-flight response in order to prevent harm from dangerous threats. However, dysregulation of chronic fear is harmful and can lead to disorders such as post-traumatic stress disorder. Propranolol has been shown ...

research-article
A Second-Order Adaptive Network Model for Connecting Social Media Platforms and Users through Bonding by Faked Homophily
Abstract

In this paper a second-order adaptive network model is introduced for presenting a user with content they like on a platform. The platform's method is using its so-called fake state. Simulation results have been performed with different scenarios ...

research-article
A new method of localizing brain activity using the scalp EEG data
Abstract

We propose a spatial localization method for scalp electroencephalography (EEG). The technique allows reliable and unambiguous identification of the activity for any intracerebral source by its spatial coordinates. Our "virtually implanted ...

research-article
Information Security Management Maturity Models
Abstract

Several maturity models for organizations, their subsystems and processes, for example, information security (IS) incident management are known. Continuing our earlier analysis of the most common maturity models (MMs), models and approaches to ...

research-article
Security Architecture of Network Security Centers as Part of Modern Intranets
Abstract

The paper presents a structural model of the modern typical corporate network (intranet). The detailed functional structure security architecture of the Network Security Center (NSC) within the intranet is proposed. The research results can be ...

research-article
Importance of dynamics of physiological reactions in resting state fMRI
Abstract

The expediency of using the method of monitoring and recording the dynamics of physiological processes using MRI compatible polygraph (MRIcP) during functional magnetic resonance imaging of the resting state was studied. The concern of applying ...

research-article
Multilevel organisational learning in a project-based organisation: computational analysis based on a 3rd-order adaptive network model
Abstract

This paper describes how the recently developed self-modeling network modeling approach for multilevel organisational learning has been tested on applicability for a real-world case of a project-based organisation. The modeling approach was able ...

research-article
Open Source INTelligence Tools
Abstract

The possibility of conducting search and collecting information about the IT infrastructure of any organization and its information systems in open sources (Open Source INTelligence, OSINT) is shown. The OSINT tools for its implementation are ...

research-article
The Fourth Space in the Fourth Revolution
Abstract

The Fourth Space is the concept that developed from postcolonial critique at Harvard (Bhabha), through urban studies (Soja; Oldenburg) all in the 1990s, through the 2016-19 urban studies (Morisson) and marketing projects, all the way to the works ...

research-article
Multiagent System for Monitoring, Analysis and Classification of Data from Procurement Services
Abstract

The article describes the method for automatization of procurement notices (tenders) monitoring, analysis and classification. This method is aimed at simplification and reduction of labor costs for search, gathering and subsequent analysis of ...

research-article
Development of a generalized algorithm for identifying atypical bank transactions using machine learning methods
Abstract

The article presents the results of the development of an algorithm for identifying bank transactions that are not typical for a client, based on data pre-processing and machine learning methods. Various methods of classification have been studied ...

research-article
Application of machine learning methods to identify suspicious actions of employees related to violation of the procedures of a credit institution
Abstract

The article presents the results of the application of machine learning methods to identify suspicious actions of employees related to a violation of the procedures of a credit institution, specifically, the theft of funds from customer accounts ...

research-article
Identification of atypical behavior of bank employees when using e-mail to prevent information leakages
Abstract

The article presents the results of using machine learning methods to identify atypical behavior of bank employees when using e-mail. A feature space is formed that characterizes the behavior of e-mail users. The objects were previously clustered ...

research-article
Developing a named entity recognition model for text documents in Russian to detect personal data using machine learning methods
Abstract

This paper outlines a study of various approaches to the task of detecting and removing personal data from text documents in Russian. To solve the problem regular expressions, various supervised learning models, artificial neural networks and ...

research-article
Inner speech and external speech: phonemes, syllables and words. fMRI study
Abstract

This article describes the fMRI study of the processes of internal and external speech. The purpose of this work is to compare the processes of internal and external speech in conjunction with those activated structures. The experiment included 3 ...

research-article
Managing software as intellectual property: protection and commercialization
Abstract

The article sets forth and analyzes the milestones of management of software as intellectual property. Software is assessed as an asset of the company's intellectual property (IP) portfolio. Protection options for a software program are specified, ...

research-article
The Structure of Associative Heterarchical Memory
Abstract

Natural language processing by artificial intelligence (NLP) remains an urgent problem of our time. The main task of NLP is to create programs capable of processing and understanding natural languages. To solve these problems the authors have ...

research-article
Machine learning Models Compositions Builder
Abstract

The article presents the results of the development of a software product for constructing compositions of machine learning methods that gives an opportunity to solve the classification tasks in any scope of activities. The software tool supports ...

research-article
Detection and analysis of atypical stock transactions with possible misuse of insider information and market manipulation: methods and models
Abstract

The article presents the results of the application of machine learning methods to identify customers prone to the use of insider information and market manipulation. The feature space was formed taking into account the specifics of the subject ...

research-article
Forensic information system for olfactory research
Abstract

The problems of storing, systematization and accounting for data, accumulated in the process of carrying out olfactory examinations have been considered in the paper. The main purpose of this paper is to present a new forensic information system ...

research-article
Cognitive Architecture for Decision-Making Based on Brain Principles Programming
Abstract

We describe a cognitive architecture intended to solve a wide range of problems based on the five identified principles of brain activity, with their implementation in three subsystems: logical-probabilistic inference, probabilistic formal ...

research-article
Implementation of value based curiosity mechanism in Reinforcement Learning algorithm based on A3C
Abstract

Intrinsic motivation for RL agents was shown to be useful as it helps to explore better, to learn better and to handle sparse reward environments. In this work we present a new variant of intrinsic motivation in the form of an additional reward ...

research-article
Training Multilingual and Adversarial Attack-Robust Models for Hate Detection on Social Media
Abstract

Social media provide plenty of textual information in various languages. This information can contain or provoke hatred towards different social or religious groups. In this paper, we study methods to process short text messages in English, Hindi, ...

research-article
Neural Network Method for Determining The Direction of a Person's Gaze based on a Web Camera Image Analysis
Abstract

Determining the direction of a person's gaze improves the accuracy of the voice control systems, which are relevant in the actively developing voice assistant creation field. This paper proposes a neural network method for determining the gaze ...

research-article
An environment emulator for training a neural network model to solve the “Following the leader” task
Abstract

This paper presents a formalization of the ”following the leader“ task and an implementation of the environment emulator based on that formalization for training a neural network model that solves this task. The emulator is based on the path ...

research-article
Information Support of Decision-making Technology on the Safe Operation of Gas Cylinder Equipment
Abstract

The issues of information support for decision-making on the safety of operation of gas cylinder equipment of natural gas vehicles are considered. The proposed solutions, implemented in the form of a set of software and hardware tools, make it ...

Comments