Meridiano 47-Journal of Global Studies最新文献

筛选
英文 中文
Putin and Chaos (How Chaos Theory is Interpreted in the Kremlin) 普京与混乱(克里姆林宫如何解读混乱理论)
IF 0.1
Meridiano 47-Journal of Global Studies Pub Date : 2021-12-30 DOI: 10.26565/2227-6521-2021-47-01
I. Rushchenko, Nataliya Zubar
{"title":"Putin and Chaos (How Chaos Theory is Interpreted in the Kremlin)","authors":"I. Rushchenko, Nataliya Zubar","doi":"10.26565/2227-6521-2021-47-01","DOIUrl":"https://doi.org/10.26565/2227-6521-2021-47-01","url":null,"abstract":"The article considers chaos theory as a scientific concept that was developed to explain nonlinear dynamics in objects of a complex nature and to solve applied problems in engineering, meteorology, economics, construction, etc. Application of chaos theory in sociology provides for good outcomes in big social systems. In the context of social management, it opens the discourse of models that overcome “the curse of complexity”. It explains the social transformations processes that include the critical complexity. The research reveals that in modern Russia the pseudoscientific concept of “managed chaos” is developed and is being used to wage the hybrid war. Russians are erroneously attribute to the USA strategists and in fact legitimizes subversive activities against countries where the Russian Federation conducts or plans to start military operations. V. Putin is well informed about the “managed chaos” tactics; content-analysis of his public narratives detected at least 50 mentions of the term “chaos” in the following contexts: 1) as a as a difficult legacy of the 90's, which he skillfully overcame; 2) to characterize different countries and regions of the world, where the culprits of chaos are allegedly created the the USA; 3) conceptualization of chaos as a global phenomenon and a weapon of hybrid warfare. The analysis of Russian sources shows that the “managed chaos” tactic is understood as a politics of deep invasion in the internal affairs of the sovereign states, subversive operations, economic and diplomatic pressure, interference in the electoral process, political corruption, information interventions, the formation of the fifth column and any kinds of destructive measures. From the experience of the 2014 events of the so-called \"Russian Spring\" in Ukraine, operations of \"managed chaos\" unfolded in three directions: 1) chaos of the mass consciousness, 2) obstruction of state institutions, 3) organization of street protests and riots. The conclusion is formulated that the chaos of large systems is a necessary and specific element of social dynamics and social changes; as for the nature of the transformation, it depends on the choice of the model of the system's existence in the near future.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"39 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76784066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A diplomacia não tem rosto de mulher: o Itamaraty e a desigualdade de gênero 外交没有女人的面孔:伊塔马拉蒂和性别不平等
IF 0.1
Meridiano 47-Journal of Global Studies Pub Date : 2021-04-20 DOI: 10.20889/M47E22001
Gabrielly Almeida Santos do Amparo, Julia Bertino Moreira
{"title":"A diplomacia não tem rosto de mulher: o Itamaraty e a desigualdade de gênero","authors":"Gabrielly Almeida Santos do Amparo, Julia Bertino Moreira","doi":"10.20889/M47E22001","DOIUrl":"https://doi.org/10.20889/M47E22001","url":null,"abstract":"Este artigo pretende elucidar como a imagem de diplomata foi construída e reproduzida no Itamaraty, desde a gênese dessa instituição no Brasil. A hipótese condutora da pesquisa é que tal imagem desenvolveu-se a partir da exclusão da mulher, devido ao ethos do MRE embasar-se no patrimonialismo, no elitismo e na desigualdade de gênero. Partindo de revisão bibliográfica e pesquisa documental, abordaremos os feminismos nas RI, as características do ethos itamaratiano e a questão da mulher no Itamaraty.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"61 3 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77316028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Risco político na visão chinesa como determinante dos investimentos externos no setor petrolífero brasileiro (2011 a 2014): Parceiro estratégico ou apenas garantia da segurança energética chinesa? 中国认为政治风险是巴西石油行业外部投资的决定因素(2011 - 2014年):战略合作伙伴还是仅仅是中国能源安全的保证?
IF 0.1
Meridiano 47-Journal of Global Studies Pub Date : 2021-04-20 DOI: 10.20889/M47E22002
Elias David Morales Martinez, Athilio Silva dos Santos
{"title":"Risco político na visão chinesa como determinante dos investimentos externos no setor petrolífero brasileiro (2011 a 2014): Parceiro estratégico ou apenas garantia da segurança energética chinesa?","authors":"Elias David Morales Martinez, Athilio Silva dos Santos","doi":"10.20889/M47E22002","DOIUrl":"https://doi.org/10.20889/M47E22002","url":null,"abstract":"O crescimento da economia chinesa veio acompanhado do investimento para responder à demanda energética. No Brasil, a China se tornou importante investidor no setor petrolífero. Contudo, esquemas de corrupção assolaram as companhias petrolíferas chinesas. O trabalho pretende analisar se houve durante o processo de investimento das empresas petrolíferas chinesas no Brasil, a avaliação do risco político e se contestado, continuou devido o ambiente promissor para garantia da segurança energética chinesa.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"83 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74854228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Como a Política e a Estratégia Nacionais de Defesa de 2016 Dialogam Entre Si? 2016年国防政策和战略是如何相互作用的?
IF 0.1
Meridiano 47-Journal of Global Studies Pub Date : 2021-04-20 DOI: 10.20889/M47E22005
Marcelo Antonio Osller Malagutti
{"title":"Como a Política e a Estratégia Nacionais de Defesa de 2016 Dialogam Entre Si?","authors":"Marcelo Antonio Osller Malagutti","doi":"10.20889/M47E22005","DOIUrl":"https://doi.org/10.20889/M47E22005","url":null,"abstract":"Os assim-chamados Documentos de Defesa brasileiros permitem o aprofundamento do debate sobre o tema pela sociedade. Entretanto, mesmo em sua terceira geração, ainda apresentam erros e inconsistências na forma e na coerência, interna e entre si, chegando por vezes a serem contraditórios. Este artigo aponta situações presentes nos dois documentos de mais alto nível, a Política e a Estratégia, e propõe algumas melhorias simples que buscam ampliar a objetividade e a consistência dos referidos documentos.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"2008 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82583098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relações militares entre Estados Unidos e Colômbia: do Plano Colômbia ao Acordo de Paz (2000-2018) 美国和哥伦比亚的军事关系:从哥伦比亚计划到和平协议(2000-2018)
IF 0.1
Meridiano 47-Journal of Global Studies Pub Date : 2021-04-20 DOI: 10.20889/M47E22003
João Estevam, Marco Aurélio Chaves Cepik
{"title":"Relações militares entre Estados Unidos e Colômbia: do Plano Colômbia ao Acordo de Paz (2000-2018)","authors":"João Estevam, Marco Aurélio Chaves Cepik","doi":"10.20889/M47E22003","DOIUrl":"https://doi.org/10.20889/M47E22003","url":null,"abstract":"This article aims to explain the military relations between the United States and Colombia between 2000 and 2018. Our working hypothesis states that, while the situation of dependence on the United States continued, security relations in the period defined by Plan Colombia (2000-2009) were mainly characterized by quantitative dependence (technologically and financially). In turn, in the period defined by the Peace Agreement (2010-2018) the dependency was largely qualitative (related to doctrine and training).","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"19 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76466122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image collections clustering in large databases on the basis of recurrent optimization 基于循环优化的大型数据库图像集聚类
IF 0.1
Meridiano 47-Journal of Global Studies Pub Date : 2020-09-28 DOI: 10.26565/2304-6201-2020-47-01
Sirhii I. Bogucharskyi
{"title":"Image collections clustering in large databases on the basis of recurrent optimization","authors":"Sirhii I. Bogucharskyi","doi":"10.26565/2304-6201-2020-47-01","DOIUrl":"https://doi.org/10.26565/2304-6201-2020-47-01","url":null,"abstract":"The following paper considers methods for clustering large amounts of data and proposes a modification of the density-based approach to clustering multimedia objects with disturbance. The analysis of the existing DENCLUE method is carried out, and the matrix influence function is introduced, which makes it possible to effectively use this approach in the analysis of multidimensional objects, the collections of images, video and multimedia data in particular. The introduced matrix form makes it possible to increase the speed of clustering due to the absence of vectorization-devectorization of the initial data.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"12 2","pages":""},"PeriodicalIF":0.1,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72467326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the authentication scheme based on the use of QR-code and webcam for Smart-Mobile devices 基于qr码和网络摄像头的智能移动设备认证方案分析
IF 0.1
Meridiano 47-Journal of Global Studies Pub Date : 2020-09-28 DOI: 10.26565/2304-6201-2020-47-04
Oleksandr I. Kot, I. Svatovskiy
{"title":"Analysis of the authentication scheme based on the use of QR-code and webcam for Smart-Mobile devices","authors":"Oleksandr I. Kot, I. Svatovskiy","doi":"10.26565/2304-6201-2020-47-04","DOIUrl":"https://doi.org/10.26565/2304-6201-2020-47-04","url":null,"abstract":"The paper analyzes the necessity and expediency of using the method of user authentication based on QR-code and webcam for Smart-Mobile devices. Phishing attacks are one of the most serious threats faced by Internet users. Existing authentication schemes are not able to provide an adequate protection from these attacks, as evidenced by statistics collected by the companies researching cybersecurity. Therefore, the task of developing a secure authentication scheme for users, which can effectively counteract various types of phishing attacks is very important. The paper proposes a new authentication scheme for users, which allows them to log in to their accounts without remembering passwords or presenting other authentication tokens. According to the messaging protocol in the proposed scheme, the user must scan the dynamically generated QR-code using a smartphone application, then take their own photo via the webcam, and send it to the smartphone via a message from the server. Thus, the full authentication procedure requires minimal user involvement and is performed automatically. The results of evaluation and practical testing show that the proposed authentication scheme is quite reliable and can be used as a secure user authentication scheme for Smart-Mobile devices. The proposed authentication protocol is not only able to cope with attacks such as Real Time Man-In-The-Middle and Controlled Relay Man-In-The-Middle, but can also protect users from the effects of malicious browser extensions and substitution of authentic applications by malicious variants. In addition, the proposed scheme does not require users to have any authentication tokens or credentials, as all they need is to scan the QR-code and verify the image taken by their own webcam. That makes the use of the proposed scheme more convenient and easy for users as compared to other known authentication schemes. Currently, the application of the proposed scheme requires the use of HTTPS websites for the exchange of all data involved. Thus, the proposed protocol can be implemented to manage cookies securely in order to prevent the interception of session data.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"83 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73310004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm for building a website model 建立网站模型的算法
IF 0.1
Meridiano 47-Journal of Global Studies Pub Date : 2020-09-28 DOI: 10.26565/2304-6201-2020-47-03
Natalia A. Huk, Stanislav V. Dykhanov, Oleh D. Matiushchenko
{"title":"Algorithm for building a website model","authors":"Natalia A. Huk, Stanislav V. Dykhanov, Oleh D. Matiushchenko","doi":"10.26565/2304-6201-2020-47-03","DOIUrl":"https://doi.org/10.26565/2304-6201-2020-47-03","url":null,"abstract":"The analysis of the structure of the website modeling has been carried out. The models of Internet space representation in the form of semantic networks, frame structures and ontology have been analyzed. The web graph model has been chosen to represent the web resource. The pages of a web resource are connected by hyperlinks, which form the internal structure of the resource. To build a model of a website in the form of a web graph, a method and algorithm for scanning the pages of a web resource have been developed. The web resource scanning is performed by in depth searching with the LIFO (Last In - First Out) method. Links are searched by sorting the lines of the page markup text and extracting links by using regular expressions. Only links to pages within the resource are taken into account in the search process, external links are ignored. The crawling procedure is implemented by using the Scrapy framework and the Python. To account for the presence of additional filters used to select pages with criteria, the rules for selecting URL in HTML code have been strengthened. Web resources are scanned to build their web graphs. Storing information by using a list of edges and an adjacency matrix is used in further work with the obtained web graphs. To visualize the obtained graphs and calculate some metric characteristics, the Gephi software environment and the algorithm for stacking the vertices of the Yifan Hu graph has been used. The graph diameters, the average vertex degree, the average path length, the density factor of the graph are used for analysis of the structural connectivity of the graphs studied. The proposed approach can be applied during the site reengineering procedure.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"15 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74803683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model of control access process in wireless computer network 无线计算机网络中的控制访问过程模型
IF 0.1
Meridiano 47-Journal of Global Studies Pub Date : 2020-09-28 DOI: 10.26565/2304-6201-2020-47-06
Mykhailo O. Slabyshev, A. G. Berdnikov
{"title":"Model of control access process in wireless computer network","authors":"Mykhailo O. Slabyshev, A. G. Berdnikov","doi":"10.26565/2304-6201-2020-47-06","DOIUrl":"https://doi.org/10.26565/2304-6201-2020-47-06","url":null,"abstract":"The problem of ensuring the minimum delivery time of information with prevention of collisions is a pressing problem in ACS TP, since collisions often occur during transmission or the delay time of information is not optimal. This problem is solved by the use of wireless computer networks and methods of information transmission with collision prevention, which affect the delay time of information transmission. The developed model of the access control process in wireless computer networks solves the problem of effective information transfer with collision prevention. The purpose of using this model is to reduce the delay in information transmission. ACS TP often needs modernization as technical innovations are becoming available. At the same time, the quality of production should not fluctuate. The most important element of modernization is the use of wireless technologies that save money and time, compared to the deployment of wired networks. The aim of the work is to develop the model of control access process in a wireless computer network with collision prevention. The process of forming delay slots for information transfer has been researched. The object of the study is a wireless computer network in the ACS TP. The subject of the study is a model of control access process in a wireless computer network with collision prevention. The research objectives are to create requirements for the model, to propose a structure, to create a model, to conduct tests and evaluate the obtained results. The model of access control process in a wireless computer network designed to transmit information with prevention of collisions in a wireless computer network has been developed.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"2 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89724364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical model of condition-based preventive maintenance of a complex technical system 复杂技术系统基于状态的预防性维修数学模型
IF 0.1
Meridiano 47-Journal of Global Studies Pub Date : 2020-09-28 DOI: 10.26565/2304-6201-2020-47-05
Nikolay S. Podtcykin
{"title":"Mathematical model of condition-based preventive maintenance of a complex technical system","authors":"Nikolay S. Podtcykin","doi":"10.26565/2304-6201-2020-47-05","DOIUrl":"https://doi.org/10.26565/2304-6201-2020-47-05","url":null,"abstract":"A new approach to mathematical modeling of complex technical systems according to their condition is being developed. Connections between subsystems of a complex system are considered to be arbitrary in terms of reliability. Due to wear, failures of subsystems can happen at random moments of time. Failures of some subsystems can lead to the entire system failure. The purpose of the simulation is to maintain the level of reliability and operability of a complex technical system at an optimal level for an unlimited time interval by means of regular preventive maintenance and repair. Technical instructions and specifications, as well as statistical data, are used in modeling a priori characteristics of subsystems. That information is used to determine the reliability of a complex system and its condition. The mathematical model is built in terms of the Markov decision-making process. The chosen optimization method allows obtaining the best policy for choosing acceptable preventive maintenance policy and repairs at the planned time of inspections and moments of failures.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"99 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81457499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信