Vol 75, No 1 (2025)
Data Mining and Pattern Recognition
Extraction and structuring of expert knowledge for a diagnostic system for acute appendicitis in children
Abstract



The capacity of ideographic research of network communities by means of intellectual text analysis
Abstract



System diagnostics socio-economic processes
Improving the methodology for assessing the effectiveness of the system of professional educational organizations in the region
Abstract



Reputation-based System for Expert Workforce Support for China-Russia Partnership
Abstract



Russian society: state, possible directions of development: socio-philosophical aspect
Abstract



Basic information technologies and spatial hierarchy of behavioral “rules”: comparative genesis
Abstract
From the standpoint of informatics and cybernetic modeling of the process of development of the selfcontrolling hierarchical-network system of Humanity, the comparative genesis of basic information technologies (BIT) and the spatial hierarchy of behavioral “rules” of adaptive behavior (AB) is considered, which at the stages of complication of Homo sapiens looks like this: communities at the level of proto-civilizations, relying on their own version of BIT speech/language, determine possible forms of AB of their own individuals, oriented towards maximizing their energy efficiency, by assigning fixed “prescriptive rules” of AB (i.e. equality-type restrictions) to their own families, and “limit rules” (i.e. inequality-type restrictions) to their own clans, establishing the boundaries of possible implementations of their AB. With further growth of the hierarchy of the Humanity system, structures additionally arise on the basis of new BITs that expand behavioral “limit rules” to levels: BIT of writing/reading – local civilizations, BIT of text replication – regional civilizations, BIT of local computers – Planetary Civilization, BIT of telecommunications/networks – Civilization of Near-Earth Space. The special role of the family, implementing the only prescriptive rules of the AB, against the background of the limit rules formed by larger communities, and the importance of the correspondence of conscious actions of people to implement the AB to the algorithms of the “unconscious” AB of the self-controlling system of Humanity are noted.



Information Technologies
Enhancing Blockchain-Based Access Control Using Probabilistic Filters
Abstract
Attribute-Based Access Control (ABAC) in blockchain environments faces challenges in token management, including privacy, storage efficiency, and token lifecycle handling. Storing tokens on-chain compromises privacy and increases costs. This paper introduces a token management system using probabilistic filters, comparing Bloom and Cuckoo filters for efficient token storage and verification. Experiments on the Ethereum testnet show that Cuckoo filters deliver superior performance, with configurable false positive rates as low as 9.54 ×10-7 and support for lifecycle operations like deletion. The system achieves a 99.8% success rate for basic operations while ensuring efficient gas consumption. Under high load, it handles up to 80 operations per minute with minimal performance degradation. These results demonstrate that probabilistic filters, especially Cuckoo filters, provide an efficient and scalable solution for managing tokens in blockchain-based access control systems.



Enhancing Kubernetes Security with Feedback-Driven Machine Learning Models
Abstract
Kubernetes has become the cornerstone of container orchestration in modern cloud computing, offering unmatched scalability and flexibility. However, its growing adoption has introduced critical security challenges, particularly in mitigating Denial-of-Service (DoS) attacks. This study presents an innovative seven-layer framework to enhance Kubernetes security through real-time anomaly detection and feedback-driven machine learning models. The framework integrates two core components: a Feedback Application that captures user input to improve detection precision and a Model Agent for real-time data collection, anomaly detection, and adaptive model retraining. By combining real-time metrics with user feedback, the system dynamically evolves to address emerging threats, ensuring robust protection for Kubernetes environments. Experimental results demonstrate the framework's effectiveness in achieving high anomaly detection accuracy, reducing false positives, and maintaining adaptability in dynamic, cloud-native infrastructures.



Development of digital platforms and their role in the global economy
Abstract



Methods and Models in Economy
Macroeconomic models of forecasting development of economy of Far Eastern Federal District and its regions
Abstract



Methods and Models of Systems Analysis
System analysis of the influence of clouds on the assessment of solar optical radiation arriving at the earth
Abstract


