Efficient Bounded-Suboptimal Search for the Multiagent Pathfinding Problem
This article considers the problem of planning a complex of nonconflicting paths for a set of agents that are capable of performing actions of arbitrary duration. Two bounded-suboptimal modifications of a conflict-based search algorithm are ...
Problems of Combining Multiple Text Recognition Results
In this paper, the task of combining recognition results from multiple images is considered. Systems in which such problems occur are analyzed, and some known approaches are described. It should be noted that currently there is no unified approach ...
Representation of Syntactic Structures with Coordinating Conjunctions
The paper discusses sentences with coordinating conjunctions and homonymy where it is hard or impossible to build feasible syntactic structures using well-known models: dependency-based parse trees, constituency-based parse trees, and syntactic ...
Method of Training a Kernel Tree
Axis-parallel decision trees perform poorly on that multidimensional sparse data that are frequently input in many tasks. A straightforward solution is to create decision trees that have oblique splits; however, most training approaches have low ...
Internet Traffic Prediction Model
Many modern machine learning tools are inefficient due to the pronounced nonlinearity of traffic changes and nonstationarity. For this, the task of predicting the signs of increments (directions of change) of the process of time series is singled ...
The IACPaaS Platform for Developing Systems Based on Ontologies: A Decade of Use
The paper presents the IACPaaS cloud platform, which is used for creating intelligent services based on ontologies, as well as the conceptual ideas and architecture underlying its development. The main features of the supported technologies for ...
Identification of Linguistic Indicators of Network Sociopolitical Discourse Using Text Mining
This article examines sociopolitical discourse using a method of the intelligent analysis of texts on social and political psychology. A methodology for applying the tool in sociopolitical research is proposed. The most significant ...
Creation and Study of 3D Models for Digital Plant Phenotyping
In this article, the authors present the results of the development and study of methods for creating 3D models of plants grown in vitro, which provides the ability to accurately record the morphometric indicators of the growth of the individual ...
Homonymy Resolution During Interpretation of Speech Commands by a Mobile Robot
Modern robots can perform a wide range of tasks when working together with a person. During collaboration, the robot can receive commands from a person through various control systems, as well as through natural language. Utterances in natural ...
Trend Detection Using NLP as a Mechanism of Decision Support
The purpose of this article is to present the principles of a developed algorithm for identifying trends based on the analysis of big text data and presenting the result in formats that are convenient for decision makers to be implemented in the ...
Situational-Command Motion Control of an Autonomous Unmanned Aerial Vehicle Searching for Forest Fires in an Unstable Air Environment
The major problems associated with the rapid detection of forest fire and smoke are considered based on the use of autonomous unmanned aerial vehicles for flying over and surveying certain areas. A method of searching for forest fires through a ...
Mathematical Models of Dynamics of Emotional Robots’ Interest in Media Projects
This article considers mathematical models that describe the emotional education of digital twins who are psychological analogs of humans. A mathematical model of an emotional robot’s interest in media projects is proposed. The results of the ...
Intelligent System for Predicting the Feasibility of Using Computed Tomography
This article describes the principles of creating an intelligent system using a JSM method of automated research support (JSM method ARS) to predict the feasibility of computed tomography application. The procedures of JSM research that are ...
A Method for Deepfake Detection Using Convolutional Neural Networks
This paper proposes a method of countering spoofing attacks by improving the resilience of face-based biometric authentication systems to digital face manipulation attacks on the biometric input module. The proposed method of digital face ...
Formalization of the Structural Synthesis of Technical Systems at the Initial Stage of Design
This paper considers the means for conceptual design of complex technical systems. A quasi-axiomatic theory was constructed that formalizes the procedures of generating meaning for a natural language description of the process of creating a new ...
Approaches to Cross-Language Retrieval of Similar Legal Documents Based on Machine Learning
In order to study global experience for legislation changing and rule-making necessitates, tools for information retrieval of regulatory documents written in different languages become increasingly necessary. One of the aspects of information ...
Reflex or Reflection? The Oculomotor Behavior of the Companion Robot, Creating the Impression of Communicating with an Emotional Being
The control system of the F-2 companion robot implements a competitive system of rules (scenarios) to model the robot’s reactions to a wide range of events. The system is designed in such a way as to provide balanced responses by the robot to ...