Sign Communication in Different Languages

The relevance of the article is due to the change in the scientific paradigms of modern linguistics, which has significantly increased the relevance of research on nonverbal communication, in particular, sign communication. The article examines and conducts a typological analysis of kinetic means...

paralinguistic’s nonverbal communication gesture sign verbal and nonverbal sign social differentiation kinesics polemics phonation
Psychological Characteristics of Preschool Children

The role of pre-school educational institutions in the formation of a child's personality and development of his interests in the field of knowledge, ensuring its physical and mental development, as well as the proper organization of the preparation of children for school education can not be ove...

children's physically healthy spiritually mature
Adaptive Processing of Technological Time Series for Forecasting Based on Neuro-Fuzzy Networks

Methodological bases for identification, data processing for forecasting technological time series based on the synthesis of soft computing apparatus (dynamic models, neural networks, neuro-fuzzy networks, genetic algorithms) in various combinations have been developed. A generalized prediction o...

technological time series neural network neuro-fuzzy network genetic algorithms hybrid model
Optimization of Data Processing of Non-Stationary Processes Based on Setting the Parameters of Fuzzy Models

Scientific and methodological foundations, methods, models and algorithms for processing data of non-stationary objects based on the mechanisms for setting the parameters of fuzzy sets using genetic algorithms have been developed. The processes of transformation of input data into output data are...

data processing fuzzy sets non-stationary object genetic algorithm optimization technological process
Profound Importance of Cyber security in the Field of Business

Cyber security refers to the safeguarding of the systems which are connected to the Internet including hardware, software, and data, from cyber threats. Individuals and businesses utilize the method to prevent illegal access to data centers and other digital systems. A robust cyber security strat...

cyber security business attacks security phishing worms ransom ware mitigation weakness malicious software