<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Neuro-fuzzy models in tasks of intelligent data processing for detection and counteraction of inappropriate, dubious and harmful information</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>I V Kotenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>I B Parashchuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>T K Omar</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of computer security problems, St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences (SPIIRAS)</institution>
          ,
          <addr-line>39, 14 Liniya, St. Petersburg, 199178</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>International Laboratory of Information Security of Cyberphysical Systems, St. Petersburg National Research University of Information Technologies, Mechanics and Optics (University ITMO)</institution>
          ,
          <addr-line>49 Kronverksky pr., St. Petersburg, 49,197101</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Non-profit JSC "Almaty University of Power Engineering and Telecommunications"</institution>
          ,
          <addr-line>26/1, Baitursynov Street, 050013 Almaty</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <fpage>116</fpage>
      <lpage>125</lpage>
      <abstract>
        <p>The paper considers methodological approaches aimed at optimizing the operation of intelligent systems of analytical processing of digital network content in order to detect and counteract inappropriate, dubious and harmful information. An approach is proposed to eliminate uncertainty, incompleteness and inconsistency of evaluation and categorization of semantic content of information objects for analyzing network content. The approach uses neuro-fuzzy models and relies on processing of incomplete, conflicting and fuzzy knowledge. At the same time, the importance of the features of inappropriate, dubious and harmful information is determined taking into account the uncertainty - ambiguity (fuzziness) and unreliability (insufficiency, incompleteness) of the original information. The results of computational experiments to determine the membership functions of unwanted information signs on the basis of the neuro-fuzzy network are presented. The use of neural-fuzzy models in tasks of intelligent data processing for detection and counteraction of inappropriate, dubious and harmful information will significantly increase the reliability and efficiency of the decisions taken to detect and counter information of this class.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The rapid development of the Internet, the introduction of the global network and social networks in
the political, economic, social and cultural spheres of modern society is an important and powerful
stimulus for the further development of the country. At the same time, the Internet and social networks
have become one of the most important threats to personal, public and state information security.</p>
      <p>It is known that «information security» is the state of protection of the individual, society and the
state from internal and external information threats.</p>
      <p>That is why the concept of «information security of the country» has two aspects. The first aspect
determines the need to protect information in computer systems, networks and objects of critical
information infrastructures from internal and external threats. The second aspect determines the need
to protect the individual, society and the state from information that is distributed through information
and telecommunications networks and can harm the health of citizens or motivate them to illegal
behavior.</p>
      <p>From a scientific and methodological point of view, the second aspect is considered as a large set
of tasks to protect against inappropriate, dubious and harmful information. Laws and other guidance
and regulatory documents refer to information: that is harmful to health, moral and spiritual
development of people (especially children); promotes desocialization and perpetuation of illegal and
unacceptable behavior; containing public calls for terrorist and other extremist activities; promoting
pornography, the cult of violence and cruelty; containing data on the methods for development,
manufacture and use of drugs and suicide, as well as obscene language; containing a biased
assessment of the state policy of the country; delivery of inter-ethnic and social tensions; inciting
ethnic and religious hatred or enmity; undermining the sovereignty, political and social stability,
territorial integrity of the country and its allies.</p>
      <p>The solution of a complex of priority state tasks on protection against inappropriate, dubious and
harmful information consists now, firstly, in development and improvement of mechanisms for
blocking sites in the Internet containing prohibited information, and secondly, in the development and
implementation of effective modern hardware and software tools for protection against such
information.</p>
      <p>The second task is associated with development of new models, methods and techniques based on
new, fundamental, advanced and rapidly developing fields of scientific knowledge, such as data
mining, big data, processing of incomplete, contradictory and fuzzy knowledge, etc.</p>
      <p>The relevance of this topic is determined by the fact that often the problem of intelligent data
processing to detect and counter inappropriate, dubious and harmful information (IDHI) has to be
solved in conditions of various kinds of uncertainty.</p>
      <p>This significantly affects the reliability of decision making, for example, at an important stage –
evaluation and categorization (EaC) of the semantic content of information objects (SCIO).
Elimination of uncertainty, incompleteness and inconsistency on this stage should be based on the
methods of processing of incomplete, contradictory and fuzzy knowledge. The theoretical significance
and the main idea of the paper are to consider new methodological and mathematical approaches
aimed at reliable evaluation and classification of IDHI under uncertainty. Evaluation and
categorization of these features should take into account two key types of uncertainty: ambiguity
(fuzziness) and unreliability (insufficiency, incompleteness) of the original information.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Relevant works</title>
      <p>
        The methodology and technologies of protection against inappropriate, dubious and harmful
information are under close state attention all over the world [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6">1-6</xref>
        ].
      </p>
      <p>
        Technologies and methods of protection are defined, for example, in the laws «On protection of the
children's Internet» and «On protection of children's privacy on the Internet», acting in the USA. They
are actively used, aimed at detection of and counteraction against sexual and other undesirable
materials posted on the Internet. They protect the privacy and safety of children on the Internet,
including marketing restrictions [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>
        In the UK and Canada there is a «Cleanfeed» system, that blocks the Internet sites that contain
prohibited and unwanted information in accordance with the «black lists» [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In Germany,
requirements to remove and restrict access, usually to protect minors or to suppress hate speech and
extremism, are imposed on the Internet service providers [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In Australia and Singapore, the tasks of
filtering the Internet content are assigned to state regulators, as described in [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
      <p>
        In Russia, the detection of malicious sites and messages, the formation of «black lists» is currently
carried out, as a rule, in manual mode [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. However, a single expert judgment on belonging of
information to a particular category is always subjective [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], may be incomplete or erroneous.
      </p>
      <p>
        In manual mode of the Internet content analysis, it is quite difficult to ensure compliance with the
requirements for timely response to the emergence of new information objects and changes in the
content of existing ones [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In addition, the Internet content tools have insufficiently high levels of
speed, completeness and accuracy [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], and applied big data technologies are difficult for practical
implementation [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Algorithms based on fuzzy logic continue to be the traditional tool used in the development of the
methodology of intelligent analysis and detection of signs of inappropriate, dubious and harmful
information under uncertainty. Their main advantage is the ability to simultaneously take into account
the opinions and experience of many experts [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">9-11</xref>
        ]. However, fuzzy logic systems are not capable to
learn automatically [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The type and parameters of fuzzy set membership functions are static [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
Fuzzy inference methods are chosen subjectively by human experts [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. All of this can lead to
inadequate results.
      </p>
      <p>
        Models of artificial neural networks (ANN) are partially free from these shortcomings. For
example, the paper [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] describes an approach based on the use of multilayer direct propagation ANN
(multilayer perceptron).
      </p>
      <p>
        However, this approach requires specifying auxiliary parameters characterizing the activation
function of the sigmoid type, which is not always possible. In [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] the approach to the analysis of
quality of communication networks on the basis of neural network synthesis of optimum system of
quality indicators is stated. But this method is applicable to standard algorithms of the theory of
complex systems estimation, which narrows the scope of application.
      </p>
      <p>
        The paper [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] is devoted to the method that allows adaptive filtering of system states using
recursive neural networks. But this approach is very difficult for mathematical specification and
timeconsuming.
      </p>
      <p>In addition, none of the approaches is able to take into account simultaneously two key types of
uncertainty: ambiguity (fuzziness) and unreliability (insufficiency, incompleteness, inconsistency) of the
initial information – the analyzed signs of inappropriate, dubious and harmful information.</p>
      <p>
        The papers [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] are devoted to modern neuro-fuzzy models (NFM) and neuro-fuzzy
networks (NFN). They substantiate the possibility of constructing optimal algorithms to analyze
controlled parameters of complex systems based on NFM. In this case, NFM combines advantages of
fuzzy inference and neural network algorithms [
        <xref ref-type="bibr" rid="ref17 ref18 ref19">17-19</xref>
        ].
      </p>
      <p>This approach will be considered in our paper. It is the basis to eliminate uncertainty (fuzziness,
incompleteness and inconsistency).</p>
      <p>The analysis of relevant works shows that direct application of the results obtained in these works
is impossible for our task. The reason is that the real data processing, the processes of EaC SCIO occur
under different types of uncertainty. This is due to a large number of different factors, including a
variety of malicious content.</p>
      <p>Therefore, the proposed unified approach to solve the problems of intelligent data processing to
detect and counteract inappropriate, dubious and harmful information under uncertainty, is relevant.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Theoretical part</title>
      <p>3.1. Formulation of the problem of elimination of incompleteness and inconsistency using NFM
Neuro-fuzzy models in tasks of intelligent data processing for detection and counteraction of IDHI are
aimed at eliminating the incompleteness and inconsistency of EaC SCIO. NFM allows you to handle
incomplete, inconsistent, and fuzzy knowledge. Neuro-fuzzy models (networks, systems) are data
analysis ones that share neural network structures and fuzzy logic to analyz complex dynamic objects
under uncertainty.</p>
      <p>Sometimes they are used as expert systems and called neuro-expert models. They are a neuro-fuzzy
network corresponding to a certain fuzzy inference model. Moreover, the knowledge of experts (a
priori experience of the system) in the form of linguistic variables and fuzzy inference rules can be
mutually and unambiguously reflected in the NFN structure.</p>
      <p>In other words, NFM are combining the capabilities of neural networks and fuzzy logic. They
represent a promising approach to the organization of modern mechanisms (algorithms) of data mining
of any nature. The inclusion of the concept of fuzzy logic in neural networks (NFM formation) enables
such a hybrid system to deal with the process of «reasoning similar to human».</p>
      <p>This allows to form a new knowledge base (information space, information field) of ANN taking
into account the a priori experience of experts, using the fuzzy information representation, fuzzy
inference system (FIS), and also allows to extract knowledge from the input data stream, intended for
processing in the interests of EaC SCIO.</p>
      <p>
        Methods of practical implementation of NFM for elimination of incompleteness and inconsistency
of EaC SCIO, can be various [
        <xref ref-type="bibr" rid="ref17 ref18 ref19">17-19</xref>
        ]. For example, you can use a simple, so-called «joint» model.
Often it is characterized as a preprocessor, where the learning mechanism of ANN determines the
rules of FIS. As soon as the parameters of FIS NFM determined, the ANN operates in the normal
mode, and the approximation of membership functions is carried out by a neural network based on
training data.
      </p>
      <p>
        Another method of implementation of NFM in key tasks of intelligent data processing, such as EaC
SCIO, is a «parallel» model [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Here, the neural network helps the fuzzy system to identify, detect
the signs of IDHI, especially if these signs cannot be directly measured. Learning takes place only in
the neural network, and the fuzzy system remains unchanged.
      </p>
      <p>In some cases, fuzzy outputs cannot be directly applied to the process of EaC SCIO. In this case,
the neural network can act as a postprocessor of fuzzy outputs. In other words, a «parallel» NFM is a
model in which the input data is fed to the neural network and the output from the neural network is
further processed by a fuzzy system.</p>
      <p>An important feature of the NFM is the ability to automatically generate a system of fuzzy rules,
extracting hidden patterns from the data of the training sample of signs of the IDHI. The choice of
NFM («joint» or «parallel») is carried out depending on the class of actually solved tasks of intelligent
data processing and the tasks of elimination of incompleteness and inconsistency of EaC SCIO.</p>
      <p>As in the tasks solved by conventional ANN, the extrapolating neural network in NFM may consist
of two layers of neurons – the input layer and the output layer. In contrast to the synaptic map, used in
a conventional artificial neural network, the so-called «cognitive» map is used in the extrapolating
neural network of NFM for eliminate incompleteness and inconsistency.</p>
      <p>This map is completely defined by the matrix of links between the signs of the IDHI, those subject
to EaC SCIO in the framework of data mining.</p>
      <p>A «cognitive» map is an oriented graph, whose nodes are objects or concepts (in our case these are
IDHI signs), and arcs are links between them, that characterize the cause-effect relations (links). As a
rule, an expert or a group of experts is involved in drawing up such cards.</p>
      <p>The concepts of the extrapolating neural network in the HFM for eliminating the incompleteness
and inconsistency of EaC SCIO can be presented, for example, by the following signs (characteristics)
of the IDHI:</p>
      <p>signs of direct calls for violence (to war, seizure of power, violent change of the foundations of the
constitutional system);</p>
      <p>signs of incitement of hatred, enmity, discord or intolerance on social (class), racial, national,
linguistic or religious grounds (as a result of agitation, propaganda or other actions);
signs of pornography, a cult of violence and cruelty;
signs of propaganda of superiority, exclusiveness or inferiority of citizens in their attitude to
religion or race, signs of humiliation of national dignity;</p>
      <p>signs of orientation of the purposes (or actions) on use of information on violation of integrity of
the country, on undermining of security of the state, and other signs.</p>
      <p>The use of «cognitive» maps in the NFM for elimination of incompleteness and inconsistency of
EaC SCIO allows to describe (in the interests of formation of training data of the NFM) stable
causeand-effect relationships between different signs of dangerous information, allows to naturally combine
the knowledge of several experts in the issues of detection and counteraction of the IDHI.</p>
      <p>Filling in the matrix of connections and input fuzzy vector of preferences is the starting point in the
neuro-fuzzy model for intelligent systems of analytical processing of digital network content.</p>
      <p>As a result, the output layer (the fuzzy logic inference system) of the neural network of the HFM
forms the optimal set (number) of the essential, most important IDHI signs to be analyzed. The
structure of the fuzzy inference system of the set (numerical quantity) values of IDHI signs is
proposed in (figure 1).</p>
      <p>The fuzzy inference system consists of five function blocks:
fuzzification block, that converts input numerical values of IDHI signs in the extent to which the
linguistic variables;
rule base, containing a set of fuzzy rules of type «IF» - «THEN»;
database, which defines the membership functions of fuzzy sets used in fuzzy rules for the output
of IDHI signs;
decision-making unit, performing an output operation on the basis of existing rules;
defuzzification block, that converts the output results in numerical values of IDHI signs.</p>
      <p>Input
(numerical)</p>
      <p>Fuzzification
(fuzzy)</p>
      <p>Knowledge base
Database</p>
      <p>Rule base
Decisionmaking</p>
      <p>Defuzzification
(fuzzy)</p>
      <p>Output
(numerical)</p>
      <p>Thus, from the point of view of the task of elimination of incompleteness and inconsistency of
EaC SCIO, theoretical aspects of neuro-fuzzy networks are used.</p>
      <p>They combine neural networks and fuzzy logic, collect the best properties of both methods and at
the same time free from their problems.</p>
      <p>On the one hand, such structures include computing power and the ability to train neural networks,
and on the other hand, the intelligent capabilities of neural networks are enhanced by the inherent
«human» way of thinking fuzzy rules of decision-making.</p>
      <p>In addition, the NFM is able to take into account simultaneously two key types of uncertainty:
ambiguity (fuzziness) and unreliability (insufficiency, incompleteness, inconsistency) of the initial
information – the analyzed signs of unwanted, questionable and malicious information.</p>
      <p>In the NFM, the output is based on fuzzy logic, and the parameters of the membership functions are
configured using neural network learning algorithms. The module of fuzzy EaC SCIO is represented
in the form of a multilayer network. In this network, layers act as elements of the fuzzy inference
system.
3.2. Formation of the structure and formulation of functions of the levels of the NFN to eliminate
incompleteness and inconsistency of EaC SCIO
The fuzzy inference system in NFM is implemented on the basis of the structure of ANFIS
(AdaptiveNetwork-Based Fuzzy Inference System). This five-layer neural network of direct propagation of the
signal, including adaptive fuzzy inference network.</p>
      <p>A variant of the NFN with ANFIS-type structure for solving the tasks of elimination of incompleteness
and inconsistency of EaC SCIO is presented in figure 2.</p>
      <p>The first (input) layer L1 implements membership functions for each term of each input variable –
the values of IDHI signs.</p>
      <p>The first input of the layer receives input signals that characterize a specific sign X1 of the IDHI, the
second – opinion of experts X2 about this sign. At the output of the layer, we obtain the value of the
membership function  X1 and  X 2 for these signals.</p>
      <p>This is a procedure of fuzzification – conversion of numerical input variables (values of IDHI
signs) into a fuzzy form.</p>
      <p>The parameters of the membership functions become the weights of the connections to neurons in
the first layer of the network, and they will be modified in the learning process.</p>
      <p>X1
X2</p>
      <p>L1
1
1
1
1
1
L2
2
2
2
2
L3
3
3
3
3
L4
4
4
4
4
L5
Ʃ</p>
      <p>Y</p>
      <p>As membership functions of input and output variables (IDHI signs), the Gauss function is used in
the form of</p>
      <p> 1  X n  ai 2  ,
 A  exp</p>
      <p> 2  bj  
where ai , bj – parameters of the membership function that require adjustment in the learning process
of the NFN, Xn – a sign of the IDHI entering the input of the NFN.</p>
      <p>The configuration of the second layer links corresponds to the structure of the rules of fuzzy
inference in NFM for eliminate incompleteness and inconsistency of EaC SCIO.</p>
      <p>~
Rule R1 : if Х1 is А1 and Х 2 is B1 ;</p>
      <p>~
Rule R2 : if Х1 is А2 and Х 2 is B2 ;</p>
      <p>~ ~ ~ ~
Rule Rn : if Х1 is Аn and Х 2 is Bn , where ( А1, A2 ,...,An ) – fuzzy sets.</p>
      <p>Then the rule (R1 ,R2 ,...,Rn ) can be represented in the form of fuzzy implication (the conjunction of
two statements in one)</p>
      <p>~ ~
Rk : Ak  B , k  1,...,N .</p>
      <p>k</p>
      <p>The second layer L2 implements a logical output block. The number of neurons in a layer is equal
to the number of rules.</p>
      <p>Each node of the layer is connected to the previous layer in such a way that the node of the layer L2
corresponding to the k-th rule is connected to all neurons of the layer L1 corresponding to the fuzzy
sets of conditions of this rule. The output value of the second layer L2 will be the weight of the rule :
~ ~
1  А1( Х1) B1( Х 2 );</p>
      <p>~ ~
 2  А2 ( Х1) B2 ( Х 2 ).</p>
      <p>Elements of the third layer L3 is carried out the normalization of the degree of compliance with the
rules and calculate the normalized values of importance (preference)  of the particular sign of the
IDHI:
1 1 1  2 ;</p>
      <p>A clear value of importance (significance, preference)  of a particular sign of the IDHI, which
determines the conclusion of each rule, in the fourth layer L4 is considered as a fuzzy set with a
Gaussian membership function.</p>
      <p>Adaptive nodes of the fourth layer L4 calculate the contribution of each fuzzy rule to the network
output by the formula</p>
      <p>n
Y   i ( X1  X 2 ),</p>
      <p>i1
where Y – the numerical value of the importance (significance, preference) of a particular sign of the
IDHI.</p>
      <p>This value, through the use of the NFM, takes into account both types of uncertainty: ambiguity
(fuzziness) and unreliability (insufficiency, incompleteness) of the original information.</p>
      <p>Thus, the fifth layer L5 is an implementation of the defuzzification block – the transformation of
fuzzy output variables (values of signs of the IDHI) into a numerical form.</p>
      <p>At the output of the layer L5 , in the summator, a clear total value of Y importance (significance,
preference) of a particular sign of unwanted, questionable and malicious information is formed.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental part</title>
      <p>Let the vector of characterizing the sign of direct appeals to violence (for example, to war) goes to the
first entrance of the NFN Х1  {Prwar (k )} , and the opinions Х 2  {Prwexarp (k )} of experts on this sign of
the IDHI – on the second.</p>
      <p>At the output of the layer L1 we get the value of the membership function  A1 and  A2
 A1  exp 12  Prwar b(kj )  ai 2 ;</p>
      <p> 1  Prwexarp (k )  ai 2 .</p>
      <p> A2  exp 2  bj  
The configuration of the links of the second layer L2 corresponds to the structure of the rules.
Rule R1 : if Prwar (k ) is А1 and Prwexarp (k) is B .</p>
      <p>1
Then: the Rule Rk can be represented as a fuzzy implication</p>
      <p>Rk : Prwar (k )  P~rwexarp (k );</p>
      <p>~
Rk 1 : Prwar (k 1)  P~rwexarp (k 1).</p>
      <p>~</p>
      <p>At the output of the second layer L2 , we obtain the values that will be the weights of the rules for
the neuro-fuzzy EaC SCIO:
1  Prwar (k) Prwar (k ) Prwexarp (k ) P~rwexarp (k );</p>
      <p>~
 2  Prwar (k) P~rwar (k 1) Prwexarp (k) P~rwexarp (k 1).</p>
      <p>Elements of the third layer L3 fulfill the normalization of the degree of compliance with the rules
and calculate the normalized values of particular sign of the IDHI.</p>
      <p>Next is the exception of incorrect rules.</p>
      <p>If some element of the layer L2 is connected to different elements of the layer L3 , then no more
than one connection with the greatest weight is selected, and the rest are excluded.</p>
      <p>Thus, only one conclusion is made in accordance with the specific condition of the rule.</p>
      <p>In the case where the weights of all links are negligible, they are all excluded and it is assumed that
this rule has no significant effect on the output variable.</p>
      <p>The third layer L3 normalizes the degree of compliance with the rules and calculates the normalized
values of the importance (preference) of such a sign of the IDHI as the presence of direct calls for
violence (war) – {Prwar (k )} :</p>
      <p>The fifth layer is the implementation of the defuzzification block. At the output of the L5 layer, a
clear value of the importance (preference) of such a sign of the IDHI as the presence of direct calls for</p>
      <p>We introduce a «boundary», threshold value of the membership function, describing the
importance (preference) a sign of the IDHI at the k-th step of the EaC, for example, at the level of</p>
      <p>Then the graph of convergence of the values of the membership function describing the importance
(preference) of such a sign of the IDHI as the presence of direct calls for violence (war) has the form
~
1 </p>
      <p>Prwar (k ) Prwar (k ) Prwexarp (k ) P~rwexarp (k )</p>
      <p>~
(Prwar (k ) Prwar (k ) Prwexarp (k ) Prwexarp (k ))  (Prwar (k ) Prwar (k  1) Prwexarp (k ) P~rwexarp (k  1))</p>
      <p>~ ~ ~
Adaptive nodes of the fourth layer calculate the contribution of each fuzzy rule to the network
μth(k) = 0,65</p>
      <p>Х 21  {Prwexarp (k )}
Х 22  {Prwexarp (k )}
output by the formula
violence (war) {Prwar (k )} .
 th (k ) =0,65.
depicted in figure 3.</p>
      <p> Prwar</p>
      <p>(k )
1,0
0,9
0,8
0,7
0,6
0,5
0,4
0,3
0,2
0,1
0
12
2
3
4
5
6
7
8
9
10
11
12
13
14
prediction of the guaranteed importance (preference) of IDHI sign {Prwar (k )} to detect and counteract
unwanted, questionable, and malicious information.</p>
      <p>This condition is characterized by a decrease in the importance (preference) of IDHI sign
{Prwar (k )}for one variant of the initial expert opinions on this sign Х 21  {Prwexarp (k )} and an increase
in the importance (preference) of IDHI sign for another variant of the initial expert opinions
Х 22  {Prwexarp (k )} .</p>
      <p>In other words, for the different values of experts' opinions on this IDHI sign, the final values of
the importance (preference) of this sign will be different and may take values above and below the
k
threshold. This characterizes the weight (influence, importance, preference of accounting) of a
particular sign of the IDHI in the EaC SCIO tasks.</p>
      <p>As a result of the consistent implementation of the EaC SCIO stages, taking into account the
uncertainty, a number of important, essential signs of the IDHI can be obtained. According to experts,
it is desirable to include these signs of the IDHI in the control procedures. This will improve the
objectivity (accuracy, informativeness) of content monitoring and management of detection and
counteraction of unwanted, questionable and malicious information.
5. Conclusion
From the point of view of practice, the presented approach allows, in our opinion, to build a decision
support system for the EaC SCIO, able to assess the importance of signs of malicious information
quickly and with high accuracy, taking into account the uncertainty of the description and observation
of these signs, the requirements and conditions of the functioning of the intelligent system of
analytical processing of digital network content.</p>
      <p>The advantage of the proposed approach is the possibility of using a decision support system based
on the neuro-fuzzy model not only for content analysis, but also for synthesis – for the selection of the
most important features of unwanted information in the control loop of detection and counteraction of
such information in conditions of incompleteness, fuzziness and unreliability of the source data.</p>
      <p>At the same time, through the use of NFN, evaluation and categorization of the signs of the IDHI
takes into account both key types of uncertainty: ambiguity (fuzziness) and unreliability
(insufficiency, incompleteness) of the source information.</p>
      <p>Thus, the use of the proposed neuro-fuzzy models in the tasks of intelligent data processing to
detect and counter inappropriate, dubious and harmful information will significantly increase the
reliability and efficiency of the evaluation and categorization of the semantic content of information
objects, as well as increase the objectivity of decisions to detect and counteract dangerous information.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This research was supported by the Russian Science Foundation under grant number 18-11-00302 in
SPIIRAS.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Baykan</surname>
            <given-names>E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Henzinger</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marian</surname>
            <given-names>L</given-names>
          </string-name>
          and
          <string-name>
            <surname>Веber</surname>
            <given-names>I 2009</given-names>
          </string-name>
          <article-title>Purely URL-based topic classification</article-title>
          <source>Proceedings of the 18th international conference on World wide web (WWW '09) ACM</source>
          , New York, NY, USA pp
          <fpage>1109</fpage>
          -
          <lpage>1110</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Calado</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cristo</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moura</surname>
            <given-names>E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ziviani</surname>
            <given-names>N</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ribeiro-Neto</surname>
            <given-names>B</given-names>
          </string-name>
          and
          <string-name>
            <surname>Goncalves M A 2003</surname>
          </string-name>
          <article-title>Combining link-based and content-based methods for web document classification</article-title>
          <source>Proceedings of the 12th International Conference on Information and Knowledge Management (CIKM'03)</source>
          New York, NY, ACM Press pp
          <fpage>394</fpage>
          -
          <lpage>401</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Dumais</surname>
            <given-names>S</given-names>
          </string-name>
          and
          <string-name>
            <surname>Chen</surname>
            <given-names>H 2000</given-names>
          </string-name>
          <article-title>Hierarchical classification of web content Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR '00) ACM</article-title>
          , New York, NY, USA pp
          <fpage>256</fpage>
          -
          <lpage>263</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Joachims</surname>
            <given-names>T 1998</given-names>
          </string-name>
          <article-title>Text categorization with support vector machines: learning with many relevant features</article-title>
          <source>Proceedings of ECML-98, 10th European Conference on Machine Learning</source>
          Chemnitz, Germany pp
          <fpage>137</fpage>
          -
          <lpage>142</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Kan</surname>
            <given-names>M Y</given-names>
          </string-name>
          <year>2004</year>
          <article-title>Web page classification without the web page</article-title>
          <source>Proceedings of the 13th International World Wide Web conference (WWW Alt.'04) ACM</source>
          , New York, NY, USA pp
          <fpage>262</fpage>
          -
          <lpage>263</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Kan</surname>
            <given-names>M Y</given-names>
          </string-name>
          and
          <string-name>
            <surname>Thi H O N 2005</surname>
          </string-name>
          <article-title>Fast web page classification using url features Proceedings of the 14th ACM international conference on Information and knowledge management (CIKM'05) ACM</article-title>
          , New York, NY, USA pp
          <fpage>325</fpage>
          -
          <lpage>326</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Kotenko</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chechulin</surname>
            <given-names>A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Komashinsky</surname>
            <given-names>D 2015</given-names>
          </string-name>
          <article-title>Evaluation of Text Classification Techniques for Inappropriate</article-title>
          <source>Web Content Blocking Proceedings of the IEEE 8th International Conference on «Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications»</source>
          (IDAACS'
          <year>2015</year>
          ) Warsaw, Poland pp
          <fpage>412</fpage>
          -
          <lpage>417</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Kotenko</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chechulin</surname>
            <given-names>A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Komashinsky</surname>
            <given-names>D 2017</given-names>
          </string-name>
          <article-title>Categorisation of web pages for protection against inappropriate content in the internet</article-title>
          <source>International Journal of Internet Protocol Technology (IJIPT) 10</source>
          <volume>1</volume>
          pp
          <fpage>61</fpage>
          -
          <lpage>71</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Rodriguez-Lopez</surname>
            <given-names>R</given-names>
          </string-name>
          2008
          <article-title>Monotone method for fuzzy differential equations J</article-title>
          .
          <source>Fuzzy Set</source>
          Systems pp
          <fpage>2047</fpage>
          -
          <lpage>2076</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Crespo</surname>
            <given-names>F</given-names>
          </string-name>
          and
          <string-name>
            <surname>Weber</surname>
            <given-names>R 2005</given-names>
          </string-name>
          <article-title>A methodology for dynamic data mining based on fuzzy clustering J</article-title>
          .
          <source>Fuzzy Set</source>
          Systems pp
          <fpage>267</fpage>
          -
          <lpage>284</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Kotenko</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saenko</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ageev</surname>
            <given-names>S</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kopchak</surname>
            <given-names>Y 2015</given-names>
          </string-name>
          <string-name>
            <surname>Abnormal Traffic</surname>
          </string-name>
          <article-title>Detection in networks of the Internet of things based on fuzzy logical inference</article-title>
          <source>Proceedings of the XVIII International Conference on Soft Computing and Measurements (SCM'2015) IEEE Xplore 5-8</source>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Rojas R 1995 Neural Networks</surname>
          </string-name>
          Springer-Verlag, Berlin p 453
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Parashchuk I B 2002 System Formation</surname>
          </string-name>
          <article-title>Algorithm of Communication Network Quality Factors using Artificial Neural Networks Proceedings of the 1st IEEE International Conference on Circuits and System for Communications (ICCSC'02) St</article-title>
          .PGU,
          <string-name>
            <surname>St. Petersburg</surname>
          </string-name>
          , Russia pp
          <fpage>263</fpage>
          -
          <lpage>266</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Parlos</surname>
            <given-names>A G</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Menon S K and Atiya A F 2001</surname>
          </string-name>
          <article-title>An algorithmic approach to adaptive state filtering using recurrent neural networks</article-title>
          <source>Proceedings of the IEEE Trans. Neural Networks 12 6</source>
          pp
          <fpage>1411</fpage>
          -
          <lpage>1432</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Nesteruk</surname>
            <given-names>G</given-names>
          </string-name>
          <string-name>
            <surname>Ph and Kupriyanov M S 2003</surname>
          </string-name>
          <article-title>Neural-fuzzy systems with fuzzy links Proceedings of the VI-th Int</article-title>
          .
          <source>Conference SCM'2003 St.Pb StPSETU «LETI» 1</source>
          pp
          <fpage>341</fpage>
          -
          <lpage>344</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Polschykov</surname>
            <given-names>K O</given-names>
          </string-name>
          <year>2013</year>
          <article-title>Synthesis of neuro-fuzzy systems of data flows intensity control in mobile ad-hoc network</article-title>
          <source>Proceedings of the 23rd International Crimean Conference Microwave and Telecommunication Technology (CriMiCo)</source>
          pp
          <fpage>517</fpage>
          -
          <lpage>518</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Takagi</surname>
            <given-names>T</given-names>
          </string-name>
          and
          <string-name>
            <surname>Sugeno</surname>
            <given-names>M 1985</given-names>
          </string-name>
          <article-title>Fuzzy identification of systems and its applications to modeling and control IEEE</article-title>
          <source>Transactions on Systems, Man and Cybernetics</source>
          SMC-15 1 pp
          <fpage>116</fpage>
          -
          <lpage>132</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Buldakova</surname>
            <given-names>T I</given-names>
          </string-name>
          and
          <article-title>Dzalolov A Sh 2012 Analysis of Data Processes and Choices of Dataprocessing and Security Technologies in Situation Centers Scientific</article-title>
          and
          <source>Technical Information Processing 39</source>
          pp
          <fpage>127</fpage>
          -
          <lpage>132</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Ajith</surname>
            <given-names>A 2005</given-names>
          </string-name>
          <article-title>Adaptation of Fuzzy Inference System Using Neural Learning Computer Science</article-title>
          Department Oklahoma State University, USA pp
          <fpage>130</fpage>
          -
          <lpage>134</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>