NEUROLINGUISTIC INFORMATION IDENTIFICATION OF INTELLIGENT SYSTEMS

  • L.К. Khadzhieva Grozny State Petroleum Technical University named after M.D. Millionshchikova
  • V.V. Kotenko Southern Federal University
  • К.Y. Rumyantsev Southern Federal University
Keywords: Intelligent system, identity range, neurolinguistic identification, redundancy coefficient, verbality coefficient

Abstract

The results of studies of the possibilities of using language and its components (text and speech) as
factors of neurolinguistic identification and authentication of intelligent systems (IS) of native speakers of
Russian and Chechen languages are presented. To achieve the research goals, an approach based on
information virtualization was used. It is proposed to use one of the ways to solve the problems of increasing
the efficiency of identification and authentication, which is the use of the factor of linguistic
neurolinguistic text identification and authentication. Research shows, firstly, that when a language
changes, in the case of using an intelligent system as a speaker of several languages, there is a change in
the parameters of neurolinguistic identification, and secondly, that if all intelligent systems are native
speakers of the same language, then when moving from one intellectual system to the other is a change in
the parameters of neurolinguistic identification. Thus, the study determined that the language of an intelligent
system can be used as an identification and authentication factor. IP speakers who are native speakers
of both Chechen and Russian languages have been studied. At the first stage, ten IPs were studied as
native speakers of the Russian language, and at the second stage, the same ten IPs were studied, but as
native speakers of the Chechen language. The results of the dependence of the main parameters, as well as
the dependence of the derived parameters of neurolinguistic text identification of intellectual systems of
native speakers of Russian and Chechen languages are presented. The results obtained open up a fundamentally
new opportunity for research in the direction of neurolinguistic text identification and authentication.
Research in this direction is of scientific and practical interest, both for the case of identifying an
intellectual system of native speakers of one language, and for the case when one intellectual system is a
native speaker.

References

1. Kotenko V.V. Tekhnologii informatsionnogo analiza pol'zovatel'skogo urovnya telekommunikatsionnykh
sistem: ucheb. posobie [Technologies for information analysis of the user level of telecommunication
systems: a textbook]. Rostov-on-Don – Taganrog: Izd-vo YuFU, 2019, 194 p.
2. Kotenko V.V. Teoriya virtualizatsii i zashchita telekommunikatsiy: monografiya [The theory of virtualization
and telecommunications protection: monograph]. Taganrog: Izd-vo TTI YuFU, 2011, 236 p.
3. Kotenko V.V. Rumyantsev K.E., Kotenko S.V. Metodologiya identifikatsionnogo analiza
infokommunikatsionnykh sistem: monografiya [Methodology of identification analysis of
infocommunication systems: monograph]. Rostov-on-Don: Izd-vo YuFU, 2014, 315 p.
4. Federal'nyy akon №572 ot 29 dekabrya 2022 g. «Ob osushchestvlenii identifikatsii i (ili)
autentifikatsii fi ic heskikh lits s ispol' ovaniem biometricheskikh personal'nykh dannykh» [Federal
Law No. 572 of December 29, 2022 “On the identification and (or) authentication of individuals using
biometric personal data”.
5. Kotenko S.V., Pershin I.M., Kotenko V.V. Osobennosti identifikatsionnogo analiza na osnove
informatsionnoy virtualizatsii izobrazheniy mestopolozheniya ob"ektov v GIS [Features of identification
analysis based on information virtualization of images of the location of objects in GIS], Izvestiya
YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2014, № 8 (157), pp. 212-219.
6. Kotenko V.V., Savina D.A. Kompleks formirovaniya informatsionnykh obrazov dlya sistemy
autentifikatsii [Complex of formation of information images for the authentication system], Vysshaya
shkola: nauchnye issledovaniya: Mater. Mezhvuzovskogo mezhdunarodnogo kongressa [Higher school:
scientific research: Materials of the Interuniversity International Congress]. Moscow, 2022, pp. 91-100.
7. Pron' E.V. Biometricheskaya sistema kontrolya dostupa na zakrytye ob"ekty putem raspoznavaniya
lits lyudey v tolpe po signalam s kamer videonablyudeniya [Biometric access control system to closed
facilities by recognizing the faces of people in a crowd using signals from CCTV cameras], Aktual'nye
problemy aviatsii i kosmonavtiki [Current problems of aviation and astronautics], 2017, Vol. 2,
pp. 218-220.
8. Kornienko V.T., Giniyatullin L.P. Ispol'zovanie akusticheskoy golografii v sistemakh
videonablyudeniya opticheski neprozrachnykh kontroliruemykh ob"emov [The use of acoustic holography
in video surveillance systems of optically opaque controlled volumes], Informatsionnoe
protivodeystvie ugrozam terrorizma [Information counteraction to the threats of terrorism], 2010,
No. 15, pp. 123-126.
9. Kotenko V.V. Printsipy kodirovaniya dlya kanala s pozitsiy virtual'nogo predstavleniya vyborochnykh
prostranstv ansambley soobshcheniy i kodovykh kombinatsiy [Principles of coding for a channel from
the standpoint of virtual representation of sample spaces of ensembles of messages and code combinations],
Informatsionnoe protivodeystvie ugrozam terrorizma [Information counteraction to the threats
of terrorism], 2005, No. 3, pp. 65-70.
10. Kotenko V.V., Levendyan I.B. Formirovanie virtual'nogo obraza lichnosti pri reshenii zadach
autentifikatsii [Formation of a virtual image of a person when solving authentication problems],
Informatsionnoe protivodeystvie ugrozam terrorizma [Information counteraction to the threats of terrorism],
2005, No. 4, pp. 107-110.
11. Kotenko V.V. Novyy podkhod k otsenke informatsionnogo obraza ob"ekta issledovaniya s pozitsiy
teorii virtual'nogo poznaniya [A new approach to assessing the information image of a research object
from the perspective of the theory of virtual cognition], Informatsionnoe protivodeystvie ugrozam
terrorizma [Information counteraction to the threats of terrorism], 2005, No. 4, pp. 17-26.
12. Kotenko V.V. Optimizatsiya strategii shifrovaniya na osnove virtualizatsii informatsionnykh potokov
[Optimization of encryption strategy based on virtualization of information flows], Informatsionnoe
protivodeystvie ugrozam terrorizma [Information counteraction to the threats of terrorism], 2005,
No. 5, pp. 56-58.
13. Kotenko V.V., Levendyan I.B., Polikarpov S.V. Novyy podkhod k zashchite audioinformatsii s pozitsii
virtual'nogo skremblirovaniya [A new approach to protecting audio information from the perspective
of virtual scrambling], Fundamental'nye issledovaniya [Fundamental Research], 2004, No. 6, pp. 68.
14. Kotenko V.V. Novyy podkhod k autentifikatsii v telekommunikatsionnykh i bankovskikh sistemakh
[A new approach to authentication in telecommunications and banking systems], Informatsionnoe
protivodeystvie ugrozam terrorizma [Information counteraction to the threats of terrorism], 2004,
No. 2, pp. 21-23.
15. Kotenko V.V., Rumyantsev K.E., Polikarpov S.V. Strategiya modelirovaniya intellektual'nykh sistem
[Strategy for modeling intelligent systems], Informatsionnoe protivodeystvie ugrozam terrorizma [Information
counteraction to the threats of terrorism], 2002, No. 1, pp. 58-60.
16. Bryukhomitskiy Yu.A., Kazarin M.N. Biometricheskaya autentifikatsiya pol'zovatelya na osnove
parametricheskogo obucheniya klassifikatora [Biometric user authentication based on parametric training
of a classifier], Perspektivnye informatsionnye tekhnologii i intellektual'nye sistemy [Perspective
information technologies and intelligent systems], 2003, No. 4 (16), pp. 22-31.
17. Shuman E.A., Kucherov A.I. Proverka identifitsirovannogo pol'zovatelya na predmet sootvetstviya
lichnosti [Checking the identified user for identity matching], Novye matematicheskie metody i
komp'yuternye tekhnologii v proektirovanii, proizvodstve i nauchnykh issledovaniyakh: Mater. XII
Respublikanskaya nauchnaya konferentsiya studentov i aspirantov (16-18 marta 2009 g, Gomel')
[New mathematical methods and computer technologies in design, production and scientific research:
Proceedings of the XII Republican Scientific Conference of Students and Postgraduate Students
(March 16-18, 2009, Gomel)]. Vol. 2. Gomel': Izd-vo GGU, 2009, pp. 259-260.
18. Liu Juan, Hu Min, Wang Ying, Huang Zhong, Jiang Julang. Symmetric Multi-Scale Residual Network
Ensemble with Weighted Evidence Fusion Strategy for Facial Expression Recognition, Symmetry,
2023, 15 (6), pp. 1228. Available at: https://doi.org/10.3390/sym15061228.
19. Litvinova T. Authorship attribution of russian social media texts: does the volume of data favor idiolect
identification?, Lecture Notes in Networks and Systems, 2022, Vol. 315 LNNS, pp. 352-362.
20. Litvinova T.A. Stilemetricheskaya identifikatsiya idiolekta na osnove printsipov korpusnoy
idiolektologii [Stylemetric identification of idiolect based on the principles of corpus idiolectology],
Voprosy kriminologii, kriminalistiki i sudebnoy ekspertizy [Issues of criminology, forensics and forensic
examination], 2021, No. 1 (49), pp. 126-132.
Published
2024-08-12
Section
SECTION I. COMPUTING AND INFORMATION MANAGEMENT SYSTEMS