Showing 1 - 20 results of 245 for search '"unconsciousness"', query time: 0.06s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    HORROR FILMS IN UNCONSCIOUS ANTHROPOLOGICAL STRATEGIES OF BIOPOWER by S. A. Malenko, A. G. Nekita

    Published 2018-06-01
    “…The article is devoted to horror films as forms of anthropological crisis in mass culture, which generate specific meanings and are presented in ways of control over consumer society, as well as act as unconscious ideological mediators of multiculturalism and globalization. …”
    Get full text
    Article
  5. 5

    Introductory note on Emergent Unconscious Knowledge Networks (Asygnodic Networks) by Edward M. Roche, Michael J. Blaine, Henry Bakis

    Published 2015-12-01
    “…This note introduces the following paper on the concept of Emergent Unconscious Knowledge Networks (Asygnodic Networks) created by E. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    The UnconTrust Database for Studies of Unconscious Semantic Processing and Attentional Allocation by Maor Schreiber, Francois Stockart, Liad Mudrik

    Published 2025-01-01
    “…Yet there is still no consensus regarding the extent and scope of unconscious processing, and past research abounds with conflicting results. …”
    Get full text
    Article
  11. 11

    Motor Habits in Visuo-manual Tracking: Manifestation of an Unconscious Short-Term Motor Memory? by Andreas Hufschmidt, Günther Deuschl, Carl Hermann Locking

    Published 1990-01-01
    “…The results are discussed in terms of a short term memory store contributing to unconscious movement habits in tracking. This may represent part of the motor learning process working together with conscious visuo-motor control mechanisms. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition by Cheng-cheng MAI, Bo CHEN, Jia-kun ZHOU, Ling YU

    Published 2016-10-01
    “…A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.…”
    Get full text
    Article
  16. 16
  17. 17

    Visual and graphic features of the Russian language edition of Phil O'Neill's book "Poems from the unconscious" as the literature of trauma by Bliznetsov Daniil M., Rodina Inna V.

    Published 2024-12-01
    “…The Russian edition project of Phil O'Neill's book "Poems from the Unconscious" is described as a literature of trauma from the perspective of its visual and graphic features. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20