Suggested Topics within your search.
Suggested Topics within your search.
- Logic 2
- Methodology 2
- Clinical psychology 1
- Computer-aided design 1
- Context (Linguistics) 1
- Data processing 1
- Design and construction 1
- Electronic circuits 1
- Empiricism 1
- Fluid mechanics 1
- Historiography 1
- History 1
- Human-computer interaction 1
- Law 1
- Logic circuits 1
- Logic design 1
- Mass media 1
- Mass media and technology 1
- Mathematics 1
- Microprocessors 1
- Perspective (Linguistics) 1
- Philosophy 1
- Psychology, Clinical 1
- Reasoning 1
- Regression analysis 1
- Research 1
- Research Design 1
- Semantics 1
- Study and teaching 1
- Subjectivity (Linguistics) 1
-
3001
Haydn, Schenker, Schönberg. Ein Beitrag zur Eklektizismusdebatte in der Musiktheorie
Published 2010-01-01“…The analysis uses the Schenkerian category of ‘logical genesis’ in order to reconstruct an immanently contradictory structural complex. …”
Get full text
Article -
3002
Discipline as a key factor in the formation of legal awareness and legality among Ukrainian citizens
Published 2024-06-01“…The following methods of scientific knowledge were used during the research: terminological, comparative, comparative, systemic-structural, formal-logical. Results. In the research process, it was recognized that the discipline in scientific sources is considered as a system of norms and rules of behavior that ensures compliance with the standards of morality and law accepted in society. …”
Get full text
Article -
3003
Specifics of the Autobiographical Narrative in “Memoirs” of D. Ovsyaniko-Kulikovskiy
Published 2024-06-01“…"Memoirs" reveals such components of a scientific narrative as description, explanation, analogy, analysis, argumentation, categorization, classification, logical proof, and intertextuality. The supertask performed by the narrator is to characterize the history of his personal and scientific formation as a path to the acquisition of scientific truths and the methodological, basic, and ideological foundations of scientific activity. …”
Get full text
Article -
3004
“Epystemologically Different Worlds”: from J. Uexküll to G. Vakariu
Published 2024-12-01“…Heidegger in the second part of his lectures, The Fundamental Concepts of Metaphysics, is considered logically superior. In these lectures, Heidegger draws from J. …”
Get full text
Article -
3005
The Difficult Airway Trolley: A Narrative Review and Practical Guide
Published 2019-01-01“…Additionally, specialized airway equipment may be included in the fifth drawer of the proposed difficult airway trolley, thus enabling widespread use. A logically designed, guideline-based difficult airway trolley is a vital resource for any clinician involved in airway management and may aid the adherence to difficult airway algorithms during evolving airway emergencies. …”
Get full text
Article -
3006
La maison aux esprits : configurations spatiales, pluralité religieuse et syncrétismes dans l’espace domestique afro-cubain
Published 2018-06-01“…What are the ritual, cosmological, and reflexive logics enabling such a transformation? How is the household arranged and divided? …”
Get full text
Article -
3007
Research on the Challenges and Approaches to Family Inheritance of Ethnic Traditional Sports Culture
Published 2025-01-01“… Through the comprehensive use of literature, fieldwork, interviews, questionnaires, data analysis, logical reasoning and other methods, the study takes Shizhu County, Chongqing Municipality, one of the Tujia settlements in China, as an example to sort out the dilemmas that families currently face in the transmission of ethnic traditional sports culture, and to analyze the factors that lead to the dilemmas in the transmission of ethnic traditional sports culture. …”
Get full text
Article -
3008
Edge-centric optimization: a novel strategy for minimizing information loss in graph-to-text generation
Published 2024-12-01“…However, while learning from knowledge graphs, these language models are unable to fully grasp the structural information of the graph, leading to logical errors and missing key information. Therefore, an important research direction is to minimize the loss of graph structural information during the model training process. …”
Get full text
Article -
3009
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01“…At present, the mainstream cyber security systems are laid out in an alienated style, where security functions are separated from business processes, and security products are isolated from each other.It is difficult to effectively cope with increasingly complicated cyber threats in this architecture.Therefore, it is imperative to move security inward for more resilient and secure network infrastructures.Business scenarios of the cybersecurity sector can be categorized into four perspectives: organization, vendor, regulatory and threat, each of which has different business objectives.Starting from the commonness and individuality of the four perspectives, the needs of this sector was systematically summarized and then the goal of building an extensible cybersecurity capability ecosystem was recognized.As the key to this goal, the intrinsic assurance methodology was proposed.Intrinsic assurance capabilities referred to the abilities of ICT components to natively support security functions such as monitoring, protection and traceability.But intrinsic assurance is not the ultimate security implementation itself, which is a key difference from the existing “endogenous security” or “designed-in security” methodologies.Intrinsic assurance emphasizes the inherent security enabling endowment of network components, whether by activating an innate gift or by encapsulating a given one, both of which logically exhibit autoimmunity from an external viewpoint.One advantage of such a component is the cohesion of business and security, which leads to transparent security posture awareness, customized security policies, and close-fitting security protection.It also simplifies the overall engineering architecture and reduces management complexity through encapsulation of multiple functions into a singleton.Additionally, the Intrinsic Assurance Support Capability Framework was put forward, which summarized and enumerated the security capabilities that conformed to the intrinsic assurance concept.This framework classified the security capabilities into five categories, namely collection, cognition, execution, syndication and resilience respectively, together with their sub-types and underlying ICT technologies.Based on this framework, the enhanced implementations of typical security business scenarios was further introduced in light of intrinsic assurance.…”
Get full text
Article -
3010
Simulation of Electromagnetic Field of a Powerful Electrical Machine
Published 2021-04-01“…In mathematical modeling, a sequential logical transition is applied from a simple model of the central part of the machine to a more complex model of the end zone using preliminary results, which makes it possible to obtain data on the distribution of the electromagnetic field in complex areas. …”
Get full text
Article -
3011
Impact of Dienogest Alone or in Combination with Ethinylestradiol on the Quality of Life of Women with Endometriosis: A Prospective Cohort Study
Published 2023-12-01“…CONCLUSION: Evaluating our data, the efficacy and success of the two treatment protocols were the same. It seems more logical to prefer cost-effective oral contraceptive treatments with a low side-effect profile than high-cost Dionegest. …”
Get full text
Article -
3012
Principle and certain nomotechnical characteristics of criminal offences against the constitutional order and security of the Republic of Serbia
Published 2024-01-01“…The dogmatic, normative and logical method was dominantly used in the paper. Criminal law protection of the constitutional order and security of the Republic of Serbia is indisputable from the aspect of the basic postulates on which modern criminal law rests. …”
Get full text
Article -
3013
A financeirização do circuito imobiliário como rearranjo escalar do processo de urbanização
Published 2013-07-01“…In both cases, we have attempted to shed light on the disagreements and tensions that have resulted from the convergence of agents that embody distinct socio-spatial logics, thus demonstrating that the geographical scale, far from being a fixed dimension of social relations, is itself socially produced and changed and, because of that, it internalizes tensions and contradictions. …”
Get full text
Article -
3014
Information support for administrative and jurisdictional activities of the state border guard service of Ukraine in relation to proceedings on administrative offences
Published 2024-06-01“…The methodological basis of the study is formed by a set of philosophical, general scientific, sectoral and special scientific methods (dialectical, communicative, structural and functional, formal and logical, hermeneutical), which, when applied in a comprehensive manner, made it possible to achieve the purpose of the study. …”
Get full text
Article -
3015
Evaluation of the practice of applying state price regulation methods: Indian experience
Published 2020-04-01“…Depending on the nature of the problems being developed, the methods of causal analysis, economic-statistical, monographic, abstract-logical and comparative have been applied. The regulatory legal acts of the Republic of India, statistics, electronic resources, as well as operational primary information of the ministries and departments of the Central Government of India make up the information base of the study.It has been concluded, that the state-built model of price regulation provides protection not only to consumers, ensuring the availability of necessary goods, but also to producers, ensuring redistribution of profit in their favor. …”
Get full text
Article -
3016
Memory-corrected quantum repeaters with adaptive syndrome identification
Published 2025-01-01“…To this end, we introduce the check matrix model and quantify the resilience of stabilizer codes of up to eleven qubits against Pauli noise, obtaining analytical expressions for effective logical error probabilities. Generally, we find that the five-qubit and Steane codes either outperform more complex, larger codes in the experimentally relevant parameter regimes or have a lower resource overhead. …”
Get full text
Article -
3017
Compliance with the rules of military registration as the implementation of military duty by citizens of Ukraine
Published 2024-03-01“…The scientific novelty of the article is set out in the conclusions and consists in improving the scientific views on the legal nature of the concept of “military duty” enshrined in the Law of Ukraine “On Military Duty and Military Service”, which should be considered a logical continuation of the development in legislation of the constitutional duty to defend the Motherland and perform military service and consists in the imperatively established obligation of a person to take active steps to prepare for military service, perform military service and comply with the rules of military registration. …”
Get full text
Article -
3018
Colposcopy Value in Young Child-bearing Women: Is New Recommendations Necessary?
Published 2024-12-01“…Conclusion: Early cytological plus genotyping assessment in women at early child-bearing ages seems logical, as the cervical premalignant lesions have a slow progressing nature and can be easily treated in early stages.…”
Get full text
Article -
3019
European and Integration Studies
Published 2014-10-01“…The creation in 2003 at MGIMO of the first in Russia Department of European integration was a necessary and logical step.…”
Get full text
Article -
3020
Manuel Сastells’ concept of the power of communication in the scientific discourse of digital sociology
Published 2020-10-01“…The paper describes theoretical approaches to the study of the concept of the power of communication in ontological and socio-cultural contexts, as well as the characteristics of the author’s empirical sociological research in the framework of disclosing the logical and semantic components of the concept under consideration. …”
Get full text
Article