A prototype system for supporting a network of information graphs with the ability to assess the nature of the subject's knowledge
The task of modeling a subject whose cognitive activity is directed under the influence of the information environment continues to remain relevant. The difficulties in solving this problem are due to (1) the dependence of the truth of information ...
Modeling the effects of propranolol administration after fear memory reactivation by a second-order adaptive network model
Fear involves activating the fight-or-flight response in order to prevent harm from dangerous threats. However, dysregulation of chronic fear is harmful and can lead to disorders such as post-traumatic stress disorder. Propranolol has been shown ...
A Second-Order Adaptive Network Model for Connecting Social Media Platforms and Users through Bonding by Faked Homophily
In this paper a second-order adaptive network model is introduced for presenting a user with content they like on a platform. The platform's method is using its so-called fake state. Simulation results have been performed with different scenarios ...
A new method of localizing brain activity using the scalp EEG data
We propose a spatial localization method for scalp electroencephalography (EEG). The technique allows reliable and unambiguous identification of the activity for any intracerebral source by its spatial coordinates. Our "virtually implanted ...
Information Security Management Maturity Models
Several maturity models for organizations, their subsystems and processes, for example, information security (IS) incident management are known. Continuing our earlier analysis of the most common maturity models (MMs), models and approaches to ...
Security Architecture of Network Security Centers as Part of Modern Intranets
The paper presents a structural model of the modern typical corporate network (intranet). The detailed functional structure security architecture of the Network Security Center (NSC) within the intranet is proposed. The research results can be ...
Importance of dynamics of physiological reactions in resting state fMRI
The expediency of using the method of monitoring and recording the dynamics of physiological processes using MRI compatible polygraph (MRIcP) during functional magnetic resonance imaging of the resting state was studied. The concern of applying ...
Multilevel organisational learning in a project-based organisation: computational analysis based on a 3rd-order adaptive network model
This paper describes how the recently developed self-modeling network modeling approach for multilevel organisational learning has been tested on applicability for a real-world case of a project-based organisation. The modeling approach was able ...
Open Source INTelligence Tools
The possibility of conducting search and collecting information about the IT infrastructure of any organization and its information systems in open sources (Open Source INTelligence, OSINT) is shown. The OSINT tools for its implementation are ...
The Fourth Space in the Fourth Revolution
The Fourth Space is the concept that developed from postcolonial critique at Harvard (Bhabha), through urban studies (Soja; Oldenburg) all in the 1990s, through the 2016-19 urban studies (Morisson) and marketing projects, all the way to the works ...
Multiagent System for Monitoring, Analysis and Classification of Data from Procurement Services
The article describes the method for automatization of procurement notices (tenders) monitoring, analysis and classification. This method is aimed at simplification and reduction of labor costs for search, gathering and subsequent analysis of ...
Development of a generalized algorithm for identifying atypical bank transactions using machine learning methods
The article presents the results of the development of an algorithm for identifying bank transactions that are not typical for a client, based on data pre-processing and machine learning methods. Various methods of classification have been studied ...
Application of machine learning methods to identify suspicious actions of employees related to violation of the procedures of a credit institution
The article presents the results of the application of machine learning methods to identify suspicious actions of employees related to a violation of the procedures of a credit institution, specifically, the theft of funds from customer accounts ...
Identification of atypical behavior of bank employees when using e-mail to prevent information leakages
The article presents the results of using machine learning methods to identify atypical behavior of bank employees when using e-mail. A feature space is formed that characterizes the behavior of e-mail users. The objects were previously clustered ...
Developing a named entity recognition model for text documents in Russian to detect personal data using machine learning methods
This paper outlines a study of various approaches to the task of detecting and removing personal data from text documents in Russian. To solve the problem regular expressions, various supervised learning models, artificial neural networks and ...
Inner speech and external speech: phonemes, syllables and words. fMRI study
This article describes the fMRI study of the processes of internal and external speech. The purpose of this work is to compare the processes of internal and external speech in conjunction with those activated structures. The experiment included 3 ...
Managing software as intellectual property: protection and commercialization
The article sets forth and analyzes the milestones of management of software as intellectual property. Software is assessed as an asset of the company's intellectual property (IP) portfolio. Protection options for a software program are specified, ...
The Structure of Associative Heterarchical Memory
Natural language processing by artificial intelligence (NLP) remains an urgent problem of our time. The main task of NLP is to create programs capable of processing and understanding natural languages. To solve these problems the authors have ...
Machine learning Models Compositions Builder
The article presents the results of the development of a software product for constructing compositions of machine learning methods that gives an opportunity to solve the classification tasks in any scope of activities. The software tool supports ...
Detection and analysis of atypical stock transactions with possible misuse of insider information and market manipulation: methods and models
The article presents the results of the application of machine learning methods to identify customers prone to the use of insider information and market manipulation. The feature space was formed taking into account the specifics of the subject ...
Forensic information system for olfactory research
The problems of storing, systematization and accounting for data, accumulated in the process of carrying out olfactory examinations have been considered in the paper. The main purpose of this paper is to present a new forensic information system ...
Cognitive Architecture for Decision-Making Based on Brain Principles Programming
We describe a cognitive architecture intended to solve a wide range of problems based on the five identified principles of brain activity, with their implementation in three subsystems: logical-probabilistic inference, probabilistic formal ...
Implementation of value based curiosity mechanism in Reinforcement Learning algorithm based on A3C
Intrinsic motivation for RL agents was shown to be useful as it helps to explore better, to learn better and to handle sparse reward environments. In this work we present a new variant of intrinsic motivation in the form of an additional reward ...
Training Multilingual and Adversarial Attack-Robust Models for Hate Detection on Social Media
Social media provide plenty of textual information in various languages. This information can contain or provoke hatred towards different social or religious groups. In this paper, we study methods to process short text messages in English, Hindi, ...
Neural Network Method for Determining The Direction of a Person's Gaze based on a Web Camera Image Analysis
Determining the direction of a person's gaze improves the accuracy of the voice control systems, which are relevant in the actively developing voice assistant creation field. This paper proposes a neural network method for determining the gaze ...
An environment emulator for training a neural network model to solve the “Following the leader” task
This paper presents a formalization of the ”following the leader“ task and an implementation of the environment emulator based on that formalization for training a neural network model that solves this task. The emulator is based on the path ...
Information Support of Decision-making Technology on the Safe Operation of Gas Cylinder Equipment
The issues of information support for decision-making on the safety of operation of gas cylinder equipment of natural gas vehicles are considered. The proposed solutions, implemented in the form of a set of software and hardware tools, make it ...