Suggested Topics within your search.
Suggested Topics within your search.
- Logic 2
- Methodology 2
- Clinical psychology 1
- Computer-aided design 1
- Context (Linguistics) 1
- Data processing 1
- Design and construction 1
- Electronic circuits 1
- Empiricism 1
- Fluid mechanics 1
- Historiography 1
- History 1
- Human-computer interaction 1
- Law 1
- Logic circuits 1
- Logic design 1
- Mass media 1
- Mass media and technology 1
- Mathematics 1
- Microprocessors 1
- Perspective (Linguistics) 1
- Philosophy 1
- Psychology, Clinical 1
- Reasoning 1
- Regression analysis 1
- Research 1
- Research Design 1
- Semantics 1
- Study and teaching 1
- Subjectivity (Linguistics) 1
-
3021
LEVELS OF NICOTINE ADDICTION IN CONSUMERS OF THE LATEST TOBACCO PRODUCTS
Published 2023-10-01“…The study uses the methods of structural-logical analysis, system approach and analysis, calculation of average and relative values, correlation analysis. …”
Get full text
Article -
3022
Social diagnostics of information security of digital society: methodological and regulatory aspects
Published 2020-02-01“…Special attention has been paid to the substantiation of the possibilities of early detection of information threats to the functioning of basic social institutions – social trust and stability of social relations, solidarity, civilizational identity, interfaith peace and tolerance in a complex society.The author’s methodology has been presented in the article as a sociological research technology that includes the interpretation and operationalization of groups of information threats enshrined in the state concept of national security, the correct application of expert procedures to assess security against these threats, as well as the subsequent mathematical-statistical and logical interpretation of the data obtained. The proposals for the use of methods of social diagnostics of information security in the practice of social management in the process of transformation of modern society on the basis of digital technologies have been explained.…”
Get full text
Article -
3023
Telehealth use in primary healthcare collaborative interprofessional practice: protocol for a scoping review
Published 2023-03-01“…The results will be presented in data map format in a logical way, in a diagram or in a tabular format, accompanied by a descriptive summary.Ethics and dissemination No ethical approval is required for this study. …”
Get full text
Article -
3024
Teachers’ pedagogical improvement who participate in the training and specialization of doctors in Venezuela
Published 2023-03-01“…The theoretical and empirical level methods were applied: analytical-synthetic, inductive-deductive, historical-logical, group interview, participant observation and documentary analysis. …”
Get full text
Article -
3025
A Critique on An Analysis of the Identity of Religious and Modern Science
Published 2021-09-01“…In analyzing the content of the book, we are looking for its logical and systematic harmony in the principles and the results presented by the writer. …”
Get full text
Article -
3026
Module to scaffold the process of filling grant documents in English
Published 2020-06-01“…This module will allow for the development of critical thinking skills necessary to present application materials in a logical and structured manner, in both Russian and English.…”
Get full text
Article -
3027
On Defining Expressions for Entropy and Cross-Entropy: The Entropic Transreals and Their Fracterm Calculus
Published 2025-01-01“…This can lead to calculations with problematic subexpressions such as <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0</mn><msub><mo form="prefix">log</mo><mn>2</mn></msub><mn>0</mn></mrow></semantics></math></inline-formula> and uncertainties in large scale calculations; partiality also introduces complications in logical analysis. Instead of adding conventions or splitting formulae into cases, we create a new algebra of real numbers with two symbols <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>±</mo><mo>∞</mo></mrow></semantics></math></inline-formula> for signed infinite values and a symbol named ⊥ for the undefined. …”
Get full text
Article -
3028
Management of business processes of the organization in the context of digital transformation
Published 2023-03-01“…The method of expert assessments, normative and logical methods were also used. It has been determined that the structure of the resource potential of digital technologies for Russian enterprises and organizations is a wide range of opportunities to influence both the labor process, the process of forming technological and professional digital competencies of employees and managers, and the organizational ecosystem as a whole. …”
Get full text
Article -
3029
Neuronauka poznawcza z punktu widzenia Mocnego Programu Socjologii Wiedzy Naukowej
Published 2025-01-01“…Consequently, SPSSK seems to precede, in a logical order, all possible results of neurocognitive research, which turns out, like allnatural sciences, a conceptually open-ended and indeterminate system. …”
Get full text
Article -
3030
WELTKRIEGSPHILOSOPHIE AND SCHELER'S PHILOSOPHICAL ANTHROPOLOGY
Published 2018-06-01“…Problems of Weltkriegsphilosophie become comprehensible based on the historical, logical and comparative principles of historical and philosophical analysis, which allowed to theoretically reconstruct the cultural and historical context, philosophical sources and ideological intentions of the German philosopher. …”
Get full text
Article -
3031
Human involvement with the rise of artificial intelligence in the realm of Geospatial Health
Published 2023-10-01“…Meanwhile, artificial intelligence only makes logical decisions that are not compatible with human thinking. …”
Get full text
Article -
3032
Analysis of the Ukrainian legislation on labour protection adaptation to the European Union acts
Published 2023-09-01“…To achieve this goal, the general scientific and special scientific methods were used, in particular, dialectical, formal and logical, and comparative legal methods. The state of implementation of the provisions of the main European directives relating to occupational health and safety in the workplace into Ukrainian legislation is analysed. …”
Get full text
Article -
3033
Perspectives of Legal Policy on Balancing the Discretionary Provisions of the Tax Code of Ukraine
Published 2021-07-01“…While formulating legislative initiatives, it is necessary to primarily rely on the logical laws, general theoretical ideas about the legal system, the rules of legislative technique and economic feasibility.…”
Get full text
Article -
3034
Use of metabolites, metabolithotropic agents and nutritional supplements in sports and sports medicine: a modern view on the problem
Published 2023-12-01“…This study used bibliosemantic, analytical, logical, and generalization methods. The life sciences and biomedical information bibliographic databases MEDLINE, EMBASE, Medline (PubMed), Web of Science, and Cochrane Central were searched to find publications in English that matched the research keywords. …”
Get full text
Article -
3035
CULTURAL TRANSFORMATION AND VALUE DEVELOPMENT IN RUSSIA
Published 2023-12-01“…The cultural philosophical approach has made it possible to trace the transformation of values in society in recent years. General logical research methods were used in the work. The legislative acts of the Russian Federation regulating the policy in the field of culture are considered. …”
Get full text
Article -
3036
ISSUES OF VALUES IN ANCIENT PHILOSOPHY
Published 2024-12-01“…The following approaches and research methods were used: the historical-philosophical approach – to study the views of ancient philosophers on values in the context of their time; the comparative approach – to compare the views of different philosophers on values; and the analytical approach – to logically analyze key concepts such as the Good, virtue, happiness, justice, etc. …”
Get full text
Article -
3037
PHILOSOPHICAL REPRESENTATION OF FEMALE ARTISTIC IMAGES IN OBJECTIVISM
Published 2019-06-01“…This piece is an attempt to underline peculiarities of female artistic images representation in Rand’s work and the way Rand’s novel influenced the logical development of feminist discourse. Discourse of feminism is a rather peculiar notion for Objectivism, where the notion of gender is, theoretically, annihilated as far as gender is irrelevant for both personal and professional growth, however, practically, gender representation and actualization is ubiquitous in Rand’s philosophy. …”
Get full text
Article -
3038
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01“…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
Get full text
Article -
3039
SMM for Promoting Healthy Eating: Bibliometric Analysis
Published 2025-01-01“…The study of the use of SMM in this article is carried out in the following logical sequence: analysis of the literature, bibliometric analysis of publication dynamics and geography, identification of key trends and research clusters, and testing hypotheses about the influence of regional features and innovative SMM tools. …”
Get full text
Article -
3040
Project Approach to the Implementation of Individual Educational Paths in Modern University
Published 2020-09-01“…The awareness of individualization of learning is determined by the project approach, while the individual educational path becomes more conscious and logical for the student, provoking his (her) educational needs and providing the need for the development of certain competencies. …”
Get full text
Article