{"title":"Putin and Chaos (How Chaos Theory is Interpreted in the Kremlin)","authors":"I. Rushchenko, Nataliya Zubar","doi":"10.26565/2227-6521-2021-47-01","DOIUrl":"https://doi.org/10.26565/2227-6521-2021-47-01","url":null,"abstract":"The article considers chaos theory as a scientific concept that was developed to explain nonlinear dynamics in objects of a complex nature and to solve applied problems in engineering, meteorology, economics, construction, etc. Application of chaos theory in sociology provides for good outcomes in big social systems. In the context of social management, it opens the discourse of models that overcome “the curse of complexity”. It explains the social transformations processes that include the critical complexity. The research reveals that in modern Russia the pseudoscientific concept of “managed chaos” is developed and is being used to wage the hybrid war. Russians are erroneously attribute to the USA strategists and in fact legitimizes subversive activities against countries where the Russian Federation conducts or plans to start military operations. V. Putin is well informed about the “managed chaos” tactics; content-analysis of his public narratives detected at least 50 mentions of the term “chaos” in the following contexts: 1) as a as a difficult legacy of the 90's, which he skillfully overcame; 2) to characterize different countries and regions of the world, where the culprits of chaos are allegedly created the the USA; 3) conceptualization of chaos as a global phenomenon and a weapon of hybrid warfare. The analysis of Russian sources shows that the “managed chaos” tactic is understood as a politics of deep invasion in the internal affairs of the sovereign states, subversive operations, economic and diplomatic pressure, interference in the electoral process, political corruption, information interventions, the formation of the fifth column and any kinds of destructive measures. From the experience of the 2014 events of the so-called \"Russian Spring\" in Ukraine, operations of \"managed chaos\" unfolded in three directions: 1) chaos of the mass consciousness, 2) obstruction of state institutions, 3) organization of street protests and riots. The conclusion is formulated that the chaos of large systems is a necessary and specific element of social dynamics and social changes; as for the nature of the transformation, it depends on the choice of the model of the system's existence in the near future.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"39 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76784066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gabrielly Almeida Santos do Amparo, Julia Bertino Moreira
{"title":"A diplomacia não tem rosto de mulher: o Itamaraty e a desigualdade de gênero","authors":"Gabrielly Almeida Santos do Amparo, Julia Bertino Moreira","doi":"10.20889/M47E22001","DOIUrl":"https://doi.org/10.20889/M47E22001","url":null,"abstract":"Este artigo pretende elucidar como a imagem de diplomata foi construída e reproduzida no Itamaraty, desde a gênese dessa instituição no Brasil. A hipótese condutora da pesquisa é que tal imagem desenvolveu-se a partir da exclusão da mulher, devido ao ethos do MRE embasar-se no patrimonialismo, no elitismo e na desigualdade de gênero. Partindo de revisão bibliográfica e pesquisa documental, abordaremos os feminismos nas RI, as características do ethos itamaratiano e a questão da mulher no Itamaraty.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"61 3 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77316028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elias David Morales Martinez, Athilio Silva dos Santos
{"title":"Risco político na visão chinesa como determinante dos investimentos externos no setor petrolífero brasileiro (2011 a 2014): Parceiro estratégico ou apenas garantia da segurança energética chinesa?","authors":"Elias David Morales Martinez, Athilio Silva dos Santos","doi":"10.20889/M47E22002","DOIUrl":"https://doi.org/10.20889/M47E22002","url":null,"abstract":"O crescimento da economia chinesa veio acompanhado do investimento para responder à demanda energética. No Brasil, a China se tornou importante investidor no setor petrolífero. Contudo, esquemas de corrupção assolaram as companhias petrolíferas chinesas. O trabalho pretende analisar se houve durante o processo de investimento das empresas petrolíferas chinesas no Brasil, a avaliação do risco político e se contestado, continuou devido o ambiente promissor para garantia da segurança energética chinesa.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"83 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74854228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Como a Política e a Estratégia Nacionais de Defesa de 2016 Dialogam Entre Si?","authors":"Marcelo Antonio Osller Malagutti","doi":"10.20889/M47E22005","DOIUrl":"https://doi.org/10.20889/M47E22005","url":null,"abstract":"Os assim-chamados Documentos de Defesa brasileiros permitem o aprofundamento do debate sobre o tema pela sociedade. Entretanto, mesmo em sua terceira geração, ainda apresentam erros e inconsistências na forma e na coerência, interna e entre si, chegando por vezes a serem contraditórios. Este artigo aponta situações presentes nos dois documentos de mais alto nível, a Política e a Estratégia, e propõe algumas melhorias simples que buscam ampliar a objetividade e a consistência dos referidos documentos.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"2008 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82583098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relações militares entre Estados Unidos e Colômbia: do Plano Colômbia ao Acordo de Paz (2000-2018)","authors":"João Estevam, Marco Aurélio Chaves Cepik","doi":"10.20889/M47E22003","DOIUrl":"https://doi.org/10.20889/M47E22003","url":null,"abstract":"This article aims to explain the military relations between the United States and Colombia between 2000 and 2018. Our working hypothesis states that, while the situation of dependence on the United States continued, security relations in the period defined by Plan Colombia (2000-2009) were mainly characterized by quantitative dependence (technologically and financially). In turn, in the period defined by the Peace Agreement (2010-2018) the dependency was largely qualitative (related to doctrine and training).","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"19 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76466122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image collections clustering in large databases on the basis of recurrent optimization","authors":"Sirhii I. Bogucharskyi","doi":"10.26565/2304-6201-2020-47-01","DOIUrl":"https://doi.org/10.26565/2304-6201-2020-47-01","url":null,"abstract":"The following paper considers methods for clustering large amounts of data and proposes a modification of the density-based approach to clustering multimedia objects with disturbance. The analysis of the existing DENCLUE method is carried out, and the matrix influence function is introduced, which makes it possible to effectively use this approach in the analysis of multidimensional objects, the collections of images, video and multimedia data in particular. The introduced matrix form makes it possible to increase the speed of clustering due to the absence of vectorization-devectorization of the initial data.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"12 2","pages":""},"PeriodicalIF":0.1,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72467326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the authentication scheme based on the use of QR-code and webcam for Smart-Mobile devices","authors":"Oleksandr I. Kot, I. Svatovskiy","doi":"10.26565/2304-6201-2020-47-04","DOIUrl":"https://doi.org/10.26565/2304-6201-2020-47-04","url":null,"abstract":"The paper analyzes the necessity and expediency of using the method of user authentication based on QR-code and webcam for Smart-Mobile devices. Phishing attacks are one of the most serious threats faced by Internet users. Existing authentication schemes are not able to provide an adequate protection from these attacks, as evidenced by statistics collected by the companies researching cybersecurity. Therefore, the task of developing a secure authentication scheme for users, which can effectively counteract various types of phishing attacks is very important. The paper proposes a new authentication scheme for users, which allows them to log in to their accounts without remembering passwords or presenting other authentication tokens. According to the messaging protocol in the proposed scheme, the user must scan the dynamically generated QR-code using a smartphone application, then take their own photo via the webcam, and send it to the smartphone via a message from the server. Thus, the full authentication procedure requires minimal user involvement and is performed automatically. The results of evaluation and practical testing show that the proposed authentication scheme is quite reliable and can be used as a secure user authentication scheme for Smart-Mobile devices. The proposed authentication protocol is not only able to cope with attacks such as Real Time Man-In-The-Middle and Controlled Relay Man-In-The-Middle, but can also protect users from the effects of malicious browser extensions and substitution of authentic applications by malicious variants. In addition, the proposed scheme does not require users to have any authentication tokens or credentials, as all they need is to scan the QR-code and verify the image taken by their own webcam. That makes the use of the proposed scheme more convenient and easy for users as compared to other known authentication schemes. Currently, the application of the proposed scheme requires the use of HTTPS websites for the exchange of all data involved. Thus, the proposed protocol can be implemented to manage cookies securely in order to prevent the interception of session data.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"83 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73310004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Natalia A. Huk, Stanislav V. Dykhanov, Oleh D. Matiushchenko
{"title":"Algorithm for building a website model","authors":"Natalia A. Huk, Stanislav V. Dykhanov, Oleh D. Matiushchenko","doi":"10.26565/2304-6201-2020-47-03","DOIUrl":"https://doi.org/10.26565/2304-6201-2020-47-03","url":null,"abstract":"The analysis of the structure of the website modeling has been carried out. The models of Internet space representation in the form of semantic networks, frame structures and ontology have been analyzed. The web graph model has been chosen to represent the web resource. The pages of a web resource are connected by hyperlinks, which form the internal structure of the resource. To build a model of a website in the form of a web graph, a method and algorithm for scanning the pages of a web resource have been developed. The web resource scanning is performed by in depth searching with the LIFO (Last In - First Out) method. Links are searched by sorting the lines of the page markup text and extracting links by using regular expressions. Only links to pages within the resource are taken into account in the search process, external links are ignored. The crawling procedure is implemented by using the Scrapy framework and the Python. To account for the presence of additional filters used to select pages with criteria, the rules for selecting URL in HTML code have been strengthened. Web resources are scanned to build their web graphs. Storing information by using a list of edges and an adjacency matrix is used in further work with the obtained web graphs. To visualize the obtained graphs and calculate some metric characteristics, the Gephi software environment and the algorithm for stacking the vertices of the Yifan Hu graph has been used. The graph diameters, the average vertex degree, the average path length, the density factor of the graph are used for analysis of the structural connectivity of the graphs studied. The proposed approach can be applied during the site reengineering procedure.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"15 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74803683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model of control access process in wireless computer network","authors":"Mykhailo O. Slabyshev, A. G. Berdnikov","doi":"10.26565/2304-6201-2020-47-06","DOIUrl":"https://doi.org/10.26565/2304-6201-2020-47-06","url":null,"abstract":"The problem of ensuring the minimum delivery time of information with prevention of collisions is a pressing problem in ACS TP, since collisions often occur during transmission or the delay time of information is not optimal. This problem is solved by the use of wireless computer networks and methods of information transmission with collision prevention, which affect the delay time of information transmission. The developed model of the access control process in wireless computer networks solves the problem of effective information transfer with collision prevention. The purpose of using this model is to reduce the delay in information transmission. ACS TP often needs modernization as technical innovations are becoming available. At the same time, the quality of production should not fluctuate. The most important element of modernization is the use of wireless technologies that save money and time, compared to the deployment of wired networks. The aim of the work is to develop the model of control access process in a wireless computer network with collision prevention. The process of forming delay slots for information transfer has been researched. The object of the study is a wireless computer network in the ACS TP. The subject of the study is a model of control access process in a wireless computer network with collision prevention. The research objectives are to create requirements for the model, to propose a structure, to create a model, to conduct tests and evaluate the obtained results. The model of access control process in a wireless computer network designed to transmit information with prevention of collisions in a wireless computer network has been developed.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"2 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89724364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical model of condition-based preventive maintenance of a complex technical system","authors":"Nikolay S. Podtcykin","doi":"10.26565/2304-6201-2020-47-05","DOIUrl":"https://doi.org/10.26565/2304-6201-2020-47-05","url":null,"abstract":"A new approach to mathematical modeling of complex technical systems according to their condition is being developed. Connections between subsystems of a complex system are considered to be arbitrary in terms of reliability. Due to wear, failures of subsystems can happen at random moments of time. Failures of some subsystems can lead to the entire system failure. The purpose of the simulation is to maintain the level of reliability and operability of a complex technical system at an optimal level for an unlimited time interval by means of regular preventive maintenance and repair. Technical instructions and specifications, as well as statistical data, are used in modeling a priori characteristics of subsystems. That information is used to determine the reliability of a complex system and its condition. The mathematical model is built in terms of the Markov decision-making process. The chosen optimization method allows obtaining the best policy for choosing acceptable preventive maintenance policy and repairs at the planned time of inspections and moments of failures.","PeriodicalId":53765,"journal":{"name":"Meridiano 47-Journal of Global Studies","volume":"99 1","pages":""},"PeriodicalIF":0.1,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81457499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}