<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Increasing, Decreasing and Flat Strategies in Information Warfare</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Alexander</forename><surname>Mikhailov</surname></persName>
							<email>apmikhailov@yandex.ru</email>
							<affiliation key="aff0">
								<orgName type="department">Keldysh Institute of Applied Mathematics</orgName>
								<address>
									<addrLine>Miusskaya sq., 4</addrLine>
									<postCode>125047</postCode>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Increasing, Decreasing and Flat Strategies in Information Warfare</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2680E93A9E68E0FB8E8D4D7C1E4D97B0</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T08:58+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Mathematical Modeling</term>
					<term>Computational Experiment</term>
					<term>Information Warfare</term>
					<term>Increasing</term>
					<term>Decreasing and Flat Strategies of Broadcasting</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The paper studies the mathematical model of information warfare in which each of belligerent parties has the option of choosing between an increasing, decreasing and flat strategies of broadcasting. The broadcasting resource of each of the parties is supposed to be limited. Increasing strategy refers to broadcasting weakly at the start of the campaign and increase the intensity of broadcasting gradually. Similarly, decreasing strategy means broadcasting with high intensity at the start of the campaign and decrease it gradually. Flat strategy refers to constant intensity of broadcasting. Each party faces the question of which strategy is the mast advantageous. We address this problem by making computational experiments with the model of information warfare. Combining three options of the first party with three options of the second party we obtain 9 scenarios. For each of them the numbers of each party's supporters at the end of the warfare is calculated. Which strategy appears to be the best depends on parameters that characterize the intensity of mouth-to-mouth spread of information and deactivation of parties' supporters.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Information warfare has been an increasingly important topic for mathematicians as well as social science scholars and practitioners. The constantly growing volume of literature includes, among others, papers that introduce, develop and analyze mathematical models. Mathematical modeling of the dissemination of information in society stems from rumor models that do not take into account broadcasting by mass media but consider only the diffusion of information in interpersonal communications. The earliest models of this kind <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref> were proposed back in 1964 and 1973. The model of competing rumors <ref type="bibr" target="#b2">[3]</ref> was proposed basing on their approach and can be considered the earliest model of information war. It deals with the spread of two competing rumors, considering that if the spreader of the first rumor meets the spreader of the second rumor, then they switch to spread the second rumor. The idea is that the first rumor is false, and the second contains convincing evidence of its falseness. In this approach, the "winner" of the information war is set by the researcher by defining that the second rumor is stronger than the first. An alternative approach <ref type="bibr" target="#b3">[4]</ref> assumes that a supporter of the other party cannot be convinced, thus an individual becomes once and forever a supporter of the party whose information they internalize earlier. The winner of the confrontation is derived from the analysis of the model: in <ref type="bibr" target="#b3">[4]</ref> the so-called "victory condition" was analytically obtained, i.e. inequality (containing system parameters), which determines which side of the confrontation has a greater number of supporters when t→∞. Among modern trends in this area, we also note emphasis on social networks, and agent-based and game theory-based models <ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref>. In models of this kind the network structure plays an important role as well as reputations of agents (network nodes). Related empirical studies (for example, <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref>) can be used in constructing mathematical models of information warfare.</p><p>Approaches to mathematical modeling of information warfare include the model of making a decision by individual as for which party to support. The latest versions of this model <ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref> incorporates the ideas of the agenda-setting <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b18">19]</ref>.</p><p>In this paper we address the problem of choosing a strategy in information warfare. Suppose two Parties, say X and Y, are engaged in information warfare. During this extended process each party broadcasts its propaganda via mass media.</p><p>It is supposed that each party has a limited resource for broadcasting. A useful image would be that a party has enough resource to broadcast, say, 100 units over a campaign that lasts 25 days. The flat strategy is to release 4 units every day. However, maybe it's more advantageous to broadcast weakly at the start of the campaign and increase the intensity of broadcasting gradually. This would be an increasing strategy. Similarly, decreasing strategies start from powerful broadcasting and decrease the intensity gradually. The other party has the same types of strategies. The question here is which strategy is to choose. We approach it with our mathematical model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Model</head><p>Take the model of information warfare <ref type="bibr" target="#b3">[4]</ref>  , XY    describe the individuals' shift from supporters to unattached, so that parameter  characterizes the intensity of this deactivation process. The system is considered at 0 tT  . For the sake of simplicity suppose</p><formula xml:id="formula_0">    , xx dX t X N X Y X dt              , yy dY t Y N X Y Y dt             00 0 , 0 . X X Y Y </formula><formula xml:id="formula_1">  x t  ,   y t</formula><p> to be linear functions of time:</p><formula xml:id="formula_2">  x x x t k t l    ,   y y y t k t l    .</formula><p>In terms of these equations, increasing, decreasing and flat strategies of Party X mean, respectively, 0</p><formula xml:id="formula_3">x k  , 0 x k  , 0</formula><p>x k  , and the same for Party Y. Combing various strat- egies by two parties we get scenarios such as "increasing strategy of Party X vs flat strategy of Party Y" and so on. In comparing various strategies of a party as for which one is more advantageous given the strategy of the other party fixed, it is necessary to control that the total broadcasting resource given by     <ref type="table" target="#tab_1">1</ref> that for each party the increasing strategy is dominated by the flat strategy, which in turn is dominated by the decreasing strategy. In other words, under given parameters the decreasing strategy is the most advantageous while the increasing strategy is the worst one.</p><p>The explanation of this is that mouth-to-mouth spread of messages is more intensive than the deactivation of partisans, that is xy      . Given this condition, the idea of effective campaigning is to take the lead at the start, that is to circulate your message powerfully at the start of the campaign and let your supporters relay it further to their interlocutors. </p><formula xml:id="formula_4">    10 , 6 xy t t t      . Right:   x tt  ,   12 1.2 y tt    .</formula><p>As expected, the best strategy for each party is the increasing one. The intuition behind the conclusion is like this. Imagine a person who receives a party's message to become a supporter of this party but gives up their partisanship before relaying the message to someone else. In this situation there is no sense of wasting much resource to recruit many supporters at the start of the campaign. More rationally would be to keep your broadcasting resource until the final burst. This means an increasing strategy. An obvious question arises about the intermediate case. We have got that decreasing strategies tend to be the most advantageous when xy      whereas increasing strategies tend to be the most advantageous when xy      The important point here is that there is no dominating strategies in this experiment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Computational Experiment: A Viral Message vs Greater Resource</head><p>In this section we consider a situation where Party X circulates a viral message, which is relayed by individuals more intensively than the message of party Y. On the other side, Party Y has a greater broadcasting resource.     </p><note type="other">.</note><p>To sum up the computational results, the generic feature is that the choice of strategy depends on relation between the intensity of relaying messages via interpersonal communication and the intensity of deactivation of individuals that is between β and  . Relatively big values of β and small values of γ are favorable for decreasing strategies and reverse. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Here</head><label></label><figDesc>X and Y are numbers of parties' supporters, N is the total numbers of individuals in the population. It comprises supporters of X, supporters of Y and unattached individuals. It is supposed that each party's messages are spread by broadcasting and via interpersonal communication. The intensity of broadcasting of Party X is given by function   x t  and the intensity of mouth-to-mouth relaying of their message is characterized by parameter. Similarly, refer to broadcasting and relaying via interpersonal communication the message of Party Y. The terms</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>across all strategies of Party X, and ditto for Party Y.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Experiment 3. Top left:</figDesc><graphic coords="7,124.68,147.36,302.64,238.32" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>The research was supported by Russian Science Foundation (project No. 20-11-20059).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>3 Computational Experiment: One of the Parties Has a Greater Broadcasting Resource</head><label></label><figDesc></figDesc><table><row><cell>so that</cell><cell>y Resource </cell><cell>9.6</cell><cell cols="5">. The results are presented in Table 1. The dynamics for two</cell></row><row><cell cols="3">cases is shown in Fig. 1.</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="4">It follows from Table</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="8">Experiment 1. Let the duration of the warfare be T=4. Parameters</cell><cell>1     and</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>xy</cell></row><row><cell cols="8">0.1  . Let the strategies of Party X be</cell></row><row><cell></cell><cell></cell><cell></cell><cell cols="5">Increasing</cell><cell>x :,   t t </cell></row><row><cell></cell><cell></cell><cell></cell><cell cols="2">Flat</cell><cell>:</cell><cell></cell><cell></cell><cell>x</cell><cell>  t</cell><cell></cell><cell>2,</cell></row><row><cell></cell><cell></cell><cell></cell><cell cols="5">Decreasing</cell><cell>:</cell><cell></cell><cell>x</cell><cell>  t</cell><cell>4 , t  </cell></row><row><cell>so that</cell><cell cols="7">8 Resource  . Similarly, strategies of Party Y are</cell></row><row><cell></cell><cell>x</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell cols="3">Increasing</cell><cell>:</cell><cell>x    t</cell><cell>1.2 , t</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Flat</cell><cell>:</cell><cell></cell><cell></cell><cell></cell><cell>x</cell><cell>  t</cell><cell></cell><cell>2.4,</cell></row><row><cell></cell><cell></cell><cell></cell><cell cols="4">Decreasing</cell><cell>:</cell><cell></cell><cell>x</cell><cell>  t</cell><cell></cell><cell>4.8 1.2 , t </cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 .</head><label>1</label><figDesc>Experiment 1: the final numbers of supporters.  . Let the strategies of Party X be</figDesc><table><row><cell></cell><cell></cell><cell>  x tt </cell><cell cols="3">  2 x t </cell><cell></cell><cell></cell><cell>  4 x tt  </cell></row><row><cell></cell><cell>  1.2  y tt</cell><cell>X=45.409, Y=54.491</cell><cell cols="4">X=98.417, Y=1.481</cell><cell>X=98.698, Y=1.196</cell></row><row><cell></cell><cell>  2.4  y t</cell><cell>X=1.154, Y=98.743</cell><cell cols="4">X=45.405, Y=54.486</cell><cell>X=62.094, Y=37.804</cell></row><row><cell></cell><cell> y tt </cell><cell>X=0.958, Y=98.942</cell><cell cols="4">X=29.698, Y=70.191</cell><cell>X=45.398, Y=54.478</cell></row><row><cell></cell><cell></cell><cell></cell><cell>  xy t t ,  </cell><cell>  t</cell><cell></cell><cell>1.2 t</cell><cell>. Right:</cell><cell>  4</cell></row></table><note>  4.8 1.2Fig. 1. Dynamics for Experiment 1. Left: x tt    ,   2.4 y t  . This being so, one can suppose that in the case of the opposite relation, that is if xy      , then the most advantageous strategy would be the increasing one. This conjecture gives us the idea of the following experiment. Experiment 2. Put T=10, 0.1 xy     and 1 y Resource  . The results are presented in</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2 .</head><label>2</label><figDesc>The dynamics for two cases is shown in Fig.2.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 2 .</head><label>2</label><figDesc>Experiment 2: the final numbers of supporters.</figDesc><table><row><cell></cell><cell></cell><cell>  x tt </cell><cell>  5 x t </cell><cell></cell><cell>  10 x tt  </cell></row><row><cell></cell><cell>  1.2  y tt</cell><cell>X=44.040, Y=52.848</cell><cell>X=33.002, Y=63.356</cell><cell cols="2">X=15.368, Y=80.174</cell></row><row><cell></cell><cell>  6  y t</cell><cell>X=55.105, Y=41.118</cell><cell>X=43.343, Y=52.011</cell><cell cols="2">X=21.949, Y=71.944</cell></row><row><cell></cell><cell>  12 1.2   y tt</cell><cell>X=74.768, Y=20.347</cell><cell>X=64.959, Y=28.532</cell><cell cols="2">X=41.014, Y=49.217</cell></row></table><note>Fig. 2. Experiment 2. Left:</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 3 .</head><label>3</label><figDesc>Experiment 3: the final numbers of supporters.</figDesc><table><row><cell>. Thus the intermediate</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 4 .</head><label>4</label><figDesc>. The results are presented in Table4. The dynamics for one of the cases is shown in Fig.4. Experiment: the final numbers of supporters.</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="4">7.5, xy t  </cell><cell>t</cell><cell></cell><cell>1.3 t</cell></row><row><cell cols="2">Experiment 4. Put T=10,</cell><cell> </cell><cell cols="2">0.24,</cell><cell></cell><cell cols="3"> </cell><cell>0.2,</cell><cell> </cell><cell>0.8</cell><cell>. Let the strategies of Party X be</cell></row><row><cell></cell><cell></cell><cell cols="6">xy</cell></row><row><cell></cell><cell></cell><cell cols="5">Increasing</cell><cell cols="2">x :,   t t </cell></row><row><cell></cell><cell></cell><cell cols="2">Flat</cell><cell>:</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>x</cell><cell>  t</cell><cell></cell><cell>5,</cell></row><row><cell></cell><cell></cell><cell cols="6">Decreasing</cell><cell>:</cell><cell></cell><cell>x</cell><cell>  t</cell><cell>10 , t  </cell></row><row><cell>so that</cell><cell cols="8">50 Resource  . Similarly, strategies of Party Y are</cell></row><row><cell></cell><cell>x</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell cols="4">Increasing</cell><cell>:</cell><cell></cell><cell>x    t</cell><cell>1.2 , t</cell></row><row><cell></cell><cell></cell><cell>Flat</cell><cell>:</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>x</cell><cell>  t</cell><cell></cell><cell>6,</cell></row><row><cell></cell><cell></cell><cell cols="5">Decreasing</cell><cell>:</cell><cell></cell><cell>x</cell><cell>  t</cell><cell>12 1.2 , t  </cell></row><row><cell>so that</cell><cell>60</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table><note>. Bottom right:  x tt  ,   1.3y tt . y Resource  Fig. 4. Experiment 4. Top left: x tt    ,   1.2 y tt . Bottom:</note></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Stochastic rumors</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Daley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">G</forename><surname>Kendall</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the Institute of Mathematics and its Applications</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="42" to="55" />
			<date type="published" when="1964">1964</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">P</forename><surname>Maki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Thompson</surname></persName>
		</author>
		<title level="m">Mathematical Models and Applications</title>
				<meeting><address><addrLine>NJ, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Englewood Cliffs</publisher>
			<date type="published" when="1973">1973</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The supersession of one rumour by another</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">K</forename><surname>Osei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">W</forename><surname>Thompson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. of Applied Probability</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="127" to="134" />
			<date type="published" when="1977">1977</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Models of information struggle</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Mikhailov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Marevtseva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Math. Models Comput. Simul</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="251" to="259" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Social Networks: Models of Information Influence</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Chkhartishvili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Gubanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Novikov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Control and Confrontation</title>
		<imprint>
			<biblScope unit="volume">189</biblScope>
			<date type="published" when="2018">2018</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Modeling Political Preferences of Russian Users Exemplified by the Social Network Vkontakte</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">V</forename><surname>Kozitsin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Chkhartishvili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Marchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">O</forename><surname>Norkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Osipov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">A</forename><surname>Uteshev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Goiko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">V</forename><surname>Palkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">G</forename><surname>Myagkov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematical Models and Computer Simulations</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="185" to="194" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">On an Approach to Measure the Level of Polarization of Individuals&apos; Opinions</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Chartishvili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">V</forename><surname>Kozitsin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Goiko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">R</forename><surname>Saifulin</surname></persName>
		</author>
		<idno type="DOI">10.1109/MLSD.2019.8911015</idno>
	</analytic>
	<monogr>
		<title level="m">Twelfth International Conference &quot;Management of large-scale system development</title>
				<meeting><address><addrLine>Moscow, Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
	<note>MLSD)</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Symmetric Convex Mechanism of Opinion Formation Predicts Directions of Users&apos; Opinions Trajectories</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">V</forename><surname>Kozitsin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Marchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Goiko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">V</forename><surname>Palkin</surname></persName>
		</author>
		<idno type="DOI">10.1109/MLSD.2019.8911064</idno>
	</analytic>
	<monogr>
		<title level="m">Twelfth International Conference &quot;Management of large-scale system development</title>
				<meeting><address><addrLine>Moscow, Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
	<note>MLSD)</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Influence Levels of Users and Meta-Users of a Social Network</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Chkhartishvili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Gubanov</surname></persName>
		</author>
		<idno type="DOI">10.1134/S0005117918030128</idno>
	</analytic>
	<monogr>
		<title level="j">Automation and Remote Control</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="545" to="553" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Multidimensional Model of Opinion Polarization in Social Networks</title>
		<author>
			<persName><forename type="first">D</forename><surname>Gubanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Petrov</surname></persName>
		</author>
		<idno type="DOI">10.1109/MLSD.2019.8910967</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 12th International Conference &quot;Management of Large-Scale System Development&quot; (MLSD)</title>
				<meeting>the 12th International Conference &quot;Management of Large-Scale System Development&quot; (MLSD)<address><addrLine>Moscow, Russia</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Opinion Mining on Small and Noisy Samples of Health-related Texts</title>
		<author>
			<persName><forename type="first">L</forename><surname>Akhtyamova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alexandrov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cardiff</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Koshulko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing III (Proc. of CSIT-2018)</title>
				<imprint>
			<publisher>AISC</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">871</biblScope>
			<biblScope unit="page" from="379" to="390" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">LM-Based Word Embedding&apos;s Improve Biomedical Named Entity Recognition: A Detailed Analysis</title>
		<author>
			<persName><forename type="first">L</forename><surname>Akhtyamova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cardiff</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-45385-5_56</idno>
	</analytic>
	<monogr>
		<title level="j">Bioinformatics and Biomedical Engineering</title>
		<imprint>
			<biblScope unit="volume">12108</biblScope>
			<date type="published" when="2020">2020. 2020</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Creating collections of descriptors of events and processes based on Internet queries</title>
		<author>
			<persName><forename type="first">A</forename><surname>Boldyreva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sobolevskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alexandrov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Danilova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of 14-th Mexican Intern. Conf. on Artif. Intell. (MICAI-2016)</title>
				<meeting>of 14-th Mexican Intern. Conf. on Artif. Intell. (MICAI-2016)<address><addrLine>, Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">10061</biblScope>
			<biblScope unit="page" from="303" to="314" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Queries to Internet as a tool for analysis of the regional police work and forecast of the crimes in regions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Boldyreva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alexandrov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Koshulko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sobolevskiy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of 14-th Mexican Intern. Conf. on Artif. Intell. (MICAI-2016)</title>
				<meeting>of 14-th Mexican Intern. Conf. on Artif. Intell. (MICAI-2016)<address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">10061</biblScope>
			<biblScope unit="page" from="290" to="302" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Propaganda Battle with Two-Component Agenda</title>
		<author>
			<persName><forename type="first">A</forename><surname>Petrov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Proncheva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the MACSPro Workshop 2019</title>
		<title level="s">CEUR Workshop Proceedings.</title>
		<meeting>of the MACSPro Workshop 2019<address><addrLine>Vienna, Austria</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">March 21-23. 2019</date>
			<biblScope unit="volume">478</biblScope>
			<biblScope unit="page" from="28" to="38" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Modeling Position Selection by Individuals during Informational Warfare with a Two-Component Agenda</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Petrov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">G</forename><surname>Proncheva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematical Models and Computer Simulations</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="154" to="163" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A Model of Propaganda Battle with Individuals&apos; Opinions on Topics Saliency</title>
		<author>
			<persName><forename type="first">O</forename><surname>Proncheva</surname></persName>
		</author>
		<idno type="DOI">10.1109/MLSD49919.2020.9247796</idno>
	</analytic>
	<monogr>
		<title level="m">13th International Conference &quot;Management of large-scale system development</title>
				<meeting><address><addrLine>Moscow, Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
	<note>MLSD)</note>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">The agenda-setting function of mass media</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Mccombs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Shaw</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Public opinion quarterly</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="176" to="187" />
			<date type="published" when="1972">1972</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Psychology of agenda-setting effects: Mapping the paths of information processing</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mccombs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">J</forename><surname>Stroud</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Review of Communication Research</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="68" to="93" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
