Artificial intelligence as a post-stage of natural intelligence
The problem of creating artificial intelligence is discussed. It is argued that trying to develop it on binary computers is a deadlock.
It is proposed to move from binary logic to ternary and then to multivalued or fuzzy logic as a first step.
The second obstacle is brain mapping using a Cartesian coordinate system. It is suggested that we move to a tree-like coordinate system.
Blockchain technology makes it possible to back up ĺđó thinking of a particular individual, for example, for medical purposes
to restore a person's memory after amnesia if ternary logic is used. In the following experimental stage, an object
with elements of both natural and artificial intelligence is created, which can be used to retrieve answers from a person
who has already passed away. In this sense, the created complex intelligence can be considered as a post-stage of natural intelligence.
To develop artificial intelligence, we have to connect thought chains recorded from different people, then solve the problem of "gluing" trees
with different hierarchies, association formation systems, and cause-effect relationships, and move from ternary logic to multivalued
or fuzzy logics.
Giovanni Antonio Cignoni
Museums of the future: computer technology in the museum of technology
Computer science has always been concerned with reproducing the real world in the form of data, making it abstract to handle it better.
Today achievements in virtual reality have a terrific ability to attract the attention of the public.
Combining these two qualities allows you to take a fresh look at how a computer museum of the future should look like, and in the future,
any museum of technology.
Computers are devices made to run software programs: old computers should be exhibited running. Unfortunately, old machines still in working
condition are extremely rare. Restoring or rebuilding an old computer is a hard, expensive task: the original components are rare and the
technology is forgotten, sometimes lost. The research needed to understand those computers has to adopt experimental archaeology methods:
rebuilding old hardware/software requires to proceed by hypotheses and experiments.
However, a rebuilt or restored computer is a unique exemplar and a precious specimen. But it is not suitable for interacting with people.
A more flexible solution is to build virtual replicas by using software simulation. First of all, simulation is a valuable tool to carry out
the experiments needed to study the past technologies. Second, simulators let people interact with the old machines, fully enjoying
the experience without risks for the precious devices. The usage of 3D visualization techniques can make the close encounter more immersive
and appealing. The talk reports on this topic by drawing on the experiences of the HMR Project in the building and usage, for exhibitions
and education activities, of replicas – more or less virtual – of old computing devices.
Experience in standardization of programming languages for mini- and microcomputers
The article describes the experience of the scientific and technical commission for the unification of programming languages for mini- and microcomputers, created under
the USSR State Committee for Science and Technology. The appearance in the early 1980s of little compatible models of computers initiated the task of revising the software used
to ensure the portability of programs when switching to new types of computers. It was vitally important for programming control computers and simulators that simulate control
for technological processes. The limitation of the task to the classes of mini- and microcomputers only was explained by the fact these classes computers were used mainly
in simulators and control systems. The side results of the commission's activities were more significant than the formal results.
Women in Computer World of the USSR and Russia
The first electronic digital computers in the USSR were developed and built in the early 1950s.
Among the first computer engineers and programmers of the USSR, there were many women who mastered new professions and achieved success in them, were leaders of projects
and scientific directions. They took part in developing devices for the first electronic computers, were engaged in the mathematical formulation of problems and programming for them,
were pioneers of mathematical linguistics. Their achievements and contribution to the common cause were very significant. The article tells about women -
pioneers of the computer world of the USSR.
About the Evolution of the Concept of “Artificial Intelligence”
The article briefly examines the history of the emergence of the scientific and practical direction, called "artificial intelligence". The evolution of the concept of "artificial intelligence"
is considered to identify its constituent parts. The ideas and methods of artificial intelligence developed by the school of Professor V. Finn are considered.
In particular, the formulation of 13 intellectual abilities that characterize the intellectual process inherent in natural intelligence is given.
The main provisions of the JSM-method of automated research support are briefly stated, examples of its use in intelligent computer systems ISJSM are given.
Yilmaz Aydin and Fatih Ozkaynak
Eligibility Analysis of Different Chaotic Systems Derived from Logistic Map for Design of Cryptographic Components
One of the topics that have successful applications in engineering technologies and computer science is chaos theory. The remarkable area among these successful applications has been especially
the subject of chaos-based cryptology. Many practical applications have been proposed in a wide spectrum, from image encryption algorithms to random number generators,
from block encryption algorithms to hash functions based on chaotic systems. Logistics map is one of the chaotic systems that has been the focus of attention of researchers
in these applications. Since Logistic map can be shown as the most widely used chaotic system in chaos-based cryptology studies due to its simple mathematical structure
and its characterization as a strong entropy source. However, in some studies, researchers stated that the behavior displayed in relation to the Logistic map dynamics may pose a problem
for cryptology applications. For this reason, alternative studies have been carried out using different chaotic systems. In this study, it has been investigated which one
is more suitable for cryptographic applications for five different derivatives of the Logistic map. In the study, a substitution box generator program has been implemented using
the Logistic map and its five different derivatives. The generated outputs have been tested for five basic substitution box design criteria. Analysis results showed that the proposals
for maps derived from Logistic map have a more robust structure than many studies in the literature.
Limits of “the Self”, boundaries of Personal space and IT
The article examines personal autonomy and confidentiality problems that have arisen in connection with the rapid development of information technology. The system concept of
"personal space" has been introduced. The foundations of the theory of personal space have been developed. The conclusion is made about the pulsating nature of the boundaries of personal space.
The influence of information technologies on the dynamics of the boundaries of personal space is being investigated. The proposed approach is extended to neuroinformational technologies.
The phenomenon of personal space narrowing inside the person's mental sphere and the individual's reaction to blocking external influences are discussed.
It is emphasised that the current legislation does not regulate the relations arising in neuroinformational interaction. Since the rate of IT progress is incompatible with
the legislation's traditionally conservative nature, the solution to this contradiction should be sought in the area of experimental jurisprudence.
Shlomi Dolev, Sergey Frenkel, and Victor Zakharov
Forecasting Tools in Practical Applications: Selection and Evaluation Methodology
We call a set of programs a Prediction Tool (PT) that can be used to solve a particular applied prediction problem, for example, predicting the volumes of traffic under consideration
at certain points in the future. The goal may also be a forecast for the network administrator. We analyze the information on the input data used for prediction and the choice of the predictors
to be used among a set of predictors. The paper analyzes procedures for choosing a predictor during the implementation of a prediction online scheme. The predictability properties of random
sequences and the required and achievable accuracy are based on estimating the conditional probability of prediction over past history results. Although some of these issues have been considered
in sufficient detail in the literature, for example, the analysis of predictability measures, accuracy metrics, however, as will be shown, they are more focused on the problems of constructing
specific prediction algorithms rather than focus on the choice of existing predictor from a given predictor set. It is shown how the specified properties of sequences and probability estimates
affect the quality of the choice of predictors. Based on this analysis, a rule for choosing a predictor based on the results of previous (potential) predictions is formulated.
Sergey Kratov and Olga Sokolova
On popularization of scientific developments and use of free and open source software
The problem of popularization of scientific developments (simulation systems, programs, and databases) to consumers has been investigated. The importance of using open source software in
high-tech programming has been noted. The activity of the Fund of Algorithms and Programs of the Siberian Branch of the Russian Academy of Sciences (FAP SB RAS) has been considered.
The problems of work of FAP have been described: popularization of free and open source software, distribution of repositories of high-tech software packages, promotion of scientific
developments to potential consumers.
Andrey Kuleshov, Andrey Ignatiev, and Anna Abramova
The Deficiency of "Redline/Greenline" Approach to Risk Management in AI Applications
Expanding the application of technologies classified as AI draws public attention to associated risks and effective measures for risk mitigation. Policy makers in most countries are currently
looking for effective approaches to securing the public interest against AI-related risks and unforeseen consequences of widening AI use. In this connection, there is widespread talk
of defining “red” and “green” areas for AI technologies, frequently leading to calls to draw “red lines” and “green lines” for technological innovation. The authors draw on the analysis
of AI related risks in several international fora and question the efficacy of this “redline/greenline” approach in terms of making the benefits of AI available in society while not impeding
innovation and technological progress. The authors propose that a more nuanced approach is required, which could involve certification of AI systems in sensitive applications or apply
codified ethical principles to derive specific rules for AI use dependent on the risks created by AI in a particular application.
Stanislav S. Malakhov and Mikhail I. Rozhkov
On construction of bi-regular circulant matrices, relating to MDS matrices
The objective of this work is to design bi-regular circulant matrices with the maximum number of occurrences of an arbitrary element. The reason to examine bi-regular matrices is that
any MDS matrix is necessarily the bi-regular one, and MDS matrices are substantial to cryptography. Simultaneously, the reason to maximize the number of occurrences of an arbitrary element
for matrices is that such matrices allow performing matrix-vector multiplication more efficiently. The results obtained include the upper bound of the number of arbitrary element occurrences
for which the bi-regularity of the circulant matrix preserves. Furthermore, necessary and sufficient conditions for the bi-regularity of the circulant matrix are derived. Those conditions
provide the efficient procedure of bi-regularity property verification, which is described within the paper. Additionally, the paper lists several bi-regular circulant matrices templates
of order up to 31 with the maximum number of arbitrary element occurrences. It was revealed that there are no square templates of order 32 of the structure mentioned.
Applied Technologies: History and Modernity
Development of microelectronics in the USA and Russia and Society
Progress of the semiconductor and integrated microelectronics contributed to the development of electronic computing systems and other types of equipment. The border of the 20th and 21st
centuries became the birth time of nanoelectronics with an even greater degree of integration of elements. The USA and Russian governments and scientific communities paid big attention
to the studies and developments in nanotechnology. At the same time, a part of society met information about works at the new technology with a certain skepticism. Some authors expressed
concerns that the development of nanotechnology unlikely will help the population of the developing countries but will bring dividends to rich and prosperous. In Russia, the main role
in implementing programs developed in the 2000s belonged to newly created corporations and innovation centers, whose rapid growth caused some skepticism among specialists
from the Academy of Sciences and universities. Nevertheless, the expected improvement in mutual access to advanced technologies of other countries associated with Russia's accession
to the WTO (2014) did not occur due to the impact of world politics on the economy.
Ekaterina Budreyko and Vladimir Gvozdetsky
"Whoever is not with us is against us"
The article reviews how Soviet sociopolitical reality affected the fates of the scientific and engineering intelligentsia during the country’s industrialisation.
The study is based on the materials from the trial of the Industrial Party (1930), with the emphasis on trial materials concerned with how the regime attributed retarded industry growth
to “wrecking” in the power industry, the core sector of the national economy. During that period, a method of combining facts, truthful but taken out of context,
with their interpretation that served the regime’s objectives, was honed and then broadly used to expose the “enemies of the people.”
The article looks into the problem of compatibility of morality with a political determination of human views and behaviour.
The main figure in this article is L.K. Ramzin who was the biggest expert in thermal engineering at the time.
Katarzhina Budreyko and Sergei Prokhorov
Software localization: from the Past to the Present
The article is devoted to the origin and development of computer software localization. The internationalization aspect is highlighted. Comparisons are made of the differences
in localization in different languages. The history of Windows localized versions is considered. The features of specialized software localization are analyzed.
The creation of the Unified Power System of Russia: the inception
The article looks into the emergence of the Unified Power System of the Soviet Union (now UPS of Russia) based on the review of the construction and operation of the Belyi Ugol’
hydroelectric plant (1903) and the Pyatigorsk thermoelectric Plant (1913). The circumstances that preordained the birth of experience of parallel operation of two generating plants
within the framework of the Unified Power System and the contribution of the foremost Russian power engineers H.O. Graftio, R.E. Klasson, and M.A. Shatelen are analysed.
It is proposed to commemorate the first experience of the parallel operation of two power plants within the framework of a unified power network by setting a memorial plaque bearing
the text prepared by the author.
Alexander I. Iakovlev and Inna A. Kruglova
How the foundations of the crypto-economy methodology were formed
The article considers the problem of forming the methodological foundations of the crypto-economy, the impact of this process on the modern economy, its role in forming the “money of the future”.
It discusses both the main historical events of the blockchain technology formation, from the idea of blind signature and simple encryption through cryptographic building blocks to the creation
and implementation of DLT (Distributed Ledger Technology), and the historical genesis of crypto-economy in the developmental stages from Blockchain 1.0 to Blockchain 3.0. It is noted that
the “Bit Gold” project, as the first model of digital money, not only combined all previous fundamental solutions but also included Proofof-Work as the main feature of the digital cash concept.
The work concluded: the economy as a whole is rapidly transforming from analog to digital, but its sphere of exchange is the most rapidly developing, where the system of transferring values
(the payment system is technology) and possession of values in the form of a crypto coin (money circulation is economy) represent a single whole (crypto-economy).
Andrey V. Leonov
Virtual 3D reconstruction of historical vehicles: Columbia electric car and Kulibin’s pedal carriage
Historical vehicles are a part of technical heritage. Some still exist as museum exhibits, while others are lost and we can investigate them only through drawings and descriptions.
Virtual 3D reconstruction of such vehicles provides an opportunity to restore their historical appearance, visualize and check hypotheses about their construction and interaction
of mechanical elements, and prepare for physical reconstruction. In the article, we analyze two projects of virtual 3D reconstruction of historical vehicles, their methods and results:
the Columbia electric car of 1901 year that exhibits in the Moscow Polytechnic Museum, and the lost Kulibin’s pedal carriage of the late 18th century.
Mariia V. Sigova, Igor K. Klioutchnikov, and Oleg I. Klioutchnikov
Long-Tail Data-Driven Recommendations - Innovative Solutions for Financial Recommender Systems
Social media financial recommender systems demonstrate their ability to address the interests of netizens better and offer greater promise for better meeting their financial service needs.
This article discusses the role of longtail data from network users in financial recommender systems. Long-tail data is supposed to improve the accuracy of financial recommendations,
expand the customer base, and increase the availability of financial services. To do this, consider the model of operation of data of long tails (LTD) through verification and correction
by discriminator systems (DM) prepared by generative filters (GM) of financial recommendations.
Victor Zakharov, Yury Stepchenkov, Dmitry Khilko, and Yury Diachenko
Computing Dataflow Architectures: History and Implementation Perspectives
The article analyzes computational architectures with data flow controlling computations. In particular, it analyzes the reasons that prevented the formation of this promising class of
architectures. The paper considered the features of algorithms in digital signal processing and the requirements from the digital signal processors. A more accurate accounting of these
features allows for proposing an approach for introducing the dataflow paradigm into the DSP area. The paper considers the concept of a new multicore dataflow recurrent architecture
developed at the Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences. It is designed for the parallel computing implementation of real-time signal
processing. This architecture is currently at the final stage of prototyping on FPGA.
Social and Educational Aspects of Computer Technology Development
Ahmed Al-Sa'Di and Cam Chris Allott McPhee
User-Centred Design in Educational Applications: A systematic literature review
User-centred Design (UCD) is an approach used to develop an efficient, effective, and satisfying user needs application by putting the user in the centre of the design. The primary purpose
of this article is to comprehensively analyse the previous research around education applications developed through user-centred design methods and draw a map for the best practice for
the UCD process. The findings allow education application user interface designers to improve their application's student engagement, motivation, and performance. Adding to the knowledge base
of user-centered design applications across a wide range of learning contexts will establish if UDC design improvements are universally applicable and effective.
Andrey Bespalko and Vladimir Gaponenko
Social Credit Systems: Prospects and Challenges of Overall Scoring
The development of information and communication technologies has led to the emergence of new opportunities in human capital management. The purpose of the article is to identify problems
and prospects for applying social trust (credit) systems. A brief overview of works on the subject of social credit systems is given. The analysis of the social rating system, similar
to the social credit systems in the People's Republic of China, is carried out. Possible consequences of the application of the social credit system, both positive and negative, are analyzed.
Threats that may have an undesirable effect on the social rating system are considered. It is concluded that the social rating system can be used as a tool for managing human potential,
especially in social systems that, to some extent, use the principles of meritocracy. The conditions under which the introduction of the social rating system can have a positive effect
are indicated. These conditions, first of all, include the level of confidence of the population of the state in the government.
Vasily Borisov and Yoel Bergman
The Role of Industry Based Research in Advancing Thermionics Science
The thermionics branch in physics and electronics originated and developed in the first four decades of the 20th century. Research in industries targeting the production of
thermionic vacuum tubes in the United States, Great Britain, the Soviet Union, Germany, and other countries has played an important role in shaping the theoretical and empirical sides.
The article discusses the key contributions of industrial laboratories. They demonstrate the importance of research, research carried out in industrial laboratories,
for the development of academic science. There is no doubt that without intensive research in industrial laboratories, which aroused the interest of academic scientists
in the field of thermionics and stimulated their collaboration with industrial laboratories, scientific progress in this area would have been much slower.
Electrochemical zinc plating
This article is devoted to the history of the development and industrial implementation of the first zinc coatings used for purely protective purposes. The main problems encountered
by the electroplaters in developing the most commonly used zinc plating electrolytes (acidic, cyanide, and zincate) are outlined. The works of the Soviet scientists in zinc electroplating
are reviewed, and the priority of the foremost Soviet scientific and engineering school of electroplating and its leader, professor N.T. Kudryavtsev, in the development and industrial
implementation of zincate electrolytes is established.
Marina E. Lebedeva, Irina A. Nikonova, and Elena V. Tetereva
Digital Technologies in Leasing – A New Development Direction of the Russian Market
The current state of digitalization of the Russian leasing services market is characterized. Trends and problems of digitalization of leasing companies in the domestic market are identified
as a provider of digital asset financing and as a recipient of digital technologies. The main tools of digitalization available to leasing companies for implementation within their structure
and that can be offered to the clients of these companies themselves are identified. The impact of the COVID-19 pandemic on the digitalization development in the leasing and finance sector
as a whole is considered.
Neural networks as a motivation for humanity to evolve and survive
The article discusses the directions and prospects for the development of such a direction as neural networks and the consequences of their implementation for daily use.
Oluwatobi Oyinlola, Kayalvizhi Jayavel, and Didacienne Mukanyiligira
Smart Bracelet: With Handshake Recognition For Information Exchange
Digital bracelets or wrist watches, including functionalities like calculators and unit converters, were commercially available for decades. Due to the technological advancements,
they are equipped with data transferring facilities and becoming multifunctional. This paper presents the smart bracelet design, which can identify the pairs of people during handshakes
and exchange their contact details with each other. An advanced system was implemented to detect handshakes when happening concurrently, as multiple pairs of people may do hand shaking
simultaneously when the crowd size is large in a gathering. A peak detection algorithm and a top-k algorithm were used to identify the matching handshakes by processing data.
Communication links were also established using the Bluetooth Low Energy (BLE) technology to exchange contact information of handshaking people. Finally, a smart bracelet with multiple
functionalities was manufactured and its performance was evaluated.
Development of technologies for using carbon dioxide emissions by producing methanol as a prerequisite for the transformation of energy
In connection with the pessimistic forecasts about the prospects for renewable energy to completely replace traditional energy sources by 2050, the problem of their decarbonization arises.
To remove the greenhouse gas CO2, CCS (carbon capture storage) technology is used worldwide to capture and store carbon dioxide from thermal power plants (TPPs) emissions.
However, there is no commercial interest in CO2 recovery, and CCS technologies are not developing rapidly enough. More than 30,000 megatons of CO2 emissions are produced worldwide every year.
In reality, CCS technology captures only about 40 megatons. CCS technology involves costly processes,
including drilling wells in the right place to great depths. A largescale process of converting CO2 into fuel (methanol) with the possibility of generating electricity may turn out
to be less costly and more efficient. An additional incentive to expand the ways of utilizing CO2 can be choosing the same fuel as a means of long-term accumulation of excess electricity
in renewable energy sources. A favorable condition for such a decision is the territorial proximity of thermal power plants or industrial enterprises that burn hydrocarbons.
The article considers the developing technologies for producing low carbon footprint methanol, methanol reforming, and high power fuel cell technology.
Madalin-Dorin Pop and Andreas-Robert Stoia
Improving the Tourists Experiences: Application of Firebase and Flutter Technologies in Mobile Applications Development Process
Mobile application development gained special interest from researchers in the last years. Many people have a smartphone and use mobile applications for various purposes such as transport,
travel, shopping, medical services, etc. These applications proved their importance also in the tourism domain. Various applications were developed to facilitate the access of the tourists
to accommodation options, must-see locations suggestions, restaurants, etc. Still, the main drawback is that many of these are separate applications. For this reason,
the users shall switch between all these applications. This paper intends to improve the users’ experience by providing all the before mentioned functionalities in just one application.
Current research highlights the development process of an allin-one touristic mobile app for Timisoara (Romania) by employing recent technologies such as Firebase and Flutter.
These technologies will show their benefits through the proposed application as a case study.
Organizers & Partners
The conference will be held
at Moscow Institute of Electronics and Mathematics of the Higher School of Economics
Moscow, Tallinskaya street, 34