everyday problems
Recently Published Documents


TOTAL DOCUMENTS

309
(FIVE YEARS 103)

H-INDEX

22
(FIVE YEARS 2)

Jurnal Elemen ◽  
2022 ◽  
Vol 8 (1) ◽  
pp. 201-215
Author(s):  
Evangelista Lus Windyana Palupi ◽  
Sylvana Novilia Sumarto ◽  
Mayang Purbaningrum

Mathematics inequality is an essential concept that students should fully understand since it is required in mathematical modeling and linear programming. However, students tend to perceive the solution of the inequalities problem without considering what the solution of inequality means. This study aims to describe students’ mistakes variations in solving mathematical inequality. It is necessary since solving inequality is a necessity for students to solve everyday problems modeled in mathematics. Thirty-eight female and male students of 12th-grade who have studied inequalities are involved in this study. They are given three inequality problems which are designed to find out students’ mistakes related to the change of inequality sign, determine the solution, and involve absolute value. All student work documents were analyzed for errors and misconceptions that emerged and then categorized based on the type of error, namely errors in applying inequality rules, errors in algebraic operations, or errors in determining the solution set, then described. The result shows that there were some errors and misconceptions that students made caused by still bringing the concept of equality when solving the inequalities problem. It made them did not aware of the inequality sign. Students are still less thorough in operating algebra and do not understand the number line concept in solving inequalities. The other factor was giving “fast strategy” to the students without considering the students’ understanding.


Vestnik NSUEM ◽  
2022 ◽  
pp. 242-251
Author(s):  
N. M. Volovskaya ◽  
L. K. Plyusnina

The article presents the results of two sociological studies carried out for the purpose of research of motivation of obtaining a higher education and factors of selection of a higher educational institution by foreign students, revelation of problems and elaboration of recommendations for their solution. It was revealed that foreign students in general praise obtaining a higher education, and that motivational postulates of obtaining education include not only commercial goals but cultural as well. It was established that Russian education is praised by foreign students in terms of quality, and that foreign students seek Russian education purposefully. It was found that Russia is a financially attractive country for foreign students, including employment. The study demonstrated a great significance of the website and social media of a higher educational institute for making decision on obtaining education in this higher educational institute. The results of the study showed that the level of competence in higher educational institutes of the city conforms to the requirements of foreign students and satisfies their demands maximally. At the same time several problems were revealed relating to training of foreign students: language problems; problems in training; communicational problems; social and cultural problems and social and everyday problems. Several recommendations were made to solve those problems.


2022 ◽  
Vol 11 (1) ◽  
pp. e7111124456
Author(s):  
Sheyla Fernanda da Costa Barbosa ◽  
Thaís Yuriko Fernandes Sozinho ◽  
Luiz Euclides Coelho de Souza Filho ◽  
Ana Cláudia da Costa Barbosa ◽  
Letícia Faria Teixeira ◽  
...  

The elaboration of educational products/processes as a result of the dissertation of a Post-Graduation Program (professional modality) is primordial for the improvement of Brazilian education, bringing academic knowledge closer to the needs of society. Therefore, the present research investigates how the knowledge generated by a professional Post-Graduate Program (PGP) in the Teaching Area of a public University in Pará has been disseminated, identifying which regions of Brazil and the world are interested in these educational products/processes. For this, a documentary research was conducted with the analysis of these educational products/processes produced in the quadrennium 2017/2020, made available on the PGP website and on the eduCAPES Platform. Data collected: the type of educational product/process; number of downloads, viewing ranking by country and city (further arranged in geographic regions). It was found that the analyzed production was visualized in the European, American and Asian continents; and in the countries Brazil, United States and Ukraine; in Brazil the largest number of accesses is from the Southeast region. The most viewed products were educational games. In this context, the dissemination of academic production is vital to meet the demands of society and of teachers/researchers, helping in the solution of everyday problems and professional practice. So, making the products/processes accessible by making them available not only in open access platforms but also in other social media. Present the products in other languages for greater global reach.


Author(s):  
Zanyar Ameen

As everyday problems contain a lot of data and ambiguity, it has become necessary to develop new mathematical approaches to address them and soft set theory is the best tool to deal with such problems. Hence, in this article, we introduce a non-continuous mapping in soft settings called soft U -continuous. We mainly focus on studying soft U -continuity and its connection to soft continuity. We further show that soft U -continuity preserves soft compact sets and soft connected sets. The later sets have various applications in computing science and decision making theory. In the end, we show that if each soft U -continuous mapping f from a soft space X into a soft T 0-space Y is soft continuous, then Y is soft T 1.


2021 ◽  
Vol 12 (8) ◽  
pp. 420-424
Author(s):  
V. A. Galatenko ◽  
◽  
K. A. Kostyukhin ◽  
G. L. Levchenkova ◽  
◽  
...  

There are three main aspects of the information security: • confidentiality; • availability; • integrity. Nowadays ensuring the confidentiality has ceased to be the dominant requirement, but privacy as an element of confidentiality (or as an independent aspect) attracts, perhaps, the greatest attention both at the legislative (personal data protection) and at the technical (depersonalization of big data) levels. The Internet of Things has defined a new level of accessibility requirements. Network access has come to the fore, without it a (too) smart kettle will not boil water. (Attempts to block some Internet resources led to similar everyday problems.) The number of entities whose integrity needs to be ensured has grown. These are data flows, hardware configurations, logistics chains, and much more. Integrity began to be understood not only as security against unauthorized modification, but also as the quality of data, their completeness and validity. This was the reason for writing this article. In our opinion, there is no systematic presentation of modern approaches to ensuring integrity in the literature and therefore it would be appropriate. It makes no sense to rank the aspects of information security according to their importance, but we would like to emphasize the role of integrity. Integrity turns out to be the most important aspect of information security in those cases when information is a "guide to action" and serves to make decisions. The prescription of medicines, prescribed medical procedures, the set and characteristics of components, the course of the technological process — all these are examples of information, the violation of the integrity of which can literally be fatal. It is also unpleasant to distort official information, whether it is the text of the law or the page of the website of a government organization. Compromising the integrity of the electronic voting process casts doubt on the legitimacy of the authorities. Unauthorized influence on financial flows leads to material losses. Distortion of navigation data can lead to accidents. The article is an overview of modern approaches to ensuring integrity as an aspect of information security. An attempt is made to analyze the relevant models, policies and security mechanisms, as well as their application in different subject areas.


Author(s):  
В.Н. Келасьев ◽  
О.В. Келасьев ◽  
А.М. Рогова

В статье предложена социальная типология пожилых российских женщин, вынужденных адаптироваться к требованиям жилищно-коммунальной сферы (ЖКС), переполненной проблемами и конфликтами. В основу типологии положено сочетание параметров адекватности отражения пожилыми окружающей их проблемной ситуации в ЖКС и выраженности их активности. Выделены следующие типы: социально адекватные и активно действующие (по отстаиванию личных и коллективных интересов); социально адекватные, но пассивные - группа пожилых, которые хорошо понимают уровень и качество предоставляемых им жилищно-коммунальных услуг, но ничего не предпринимают; социально неадекватные, но активные, предрасположенные к инициации конфликта с управленцами ЖКС; социально неадекватные и пассивные. Из среды пожилых выделены активно действующие и адекватные, располагающие свободным временем и необходимыми компетенциями активистки, которые готовы представлять интересы всех жителей многоквартирного дома. Этот тип активисток старается выйти на стратегию равноправного партнёрства с управленцами ЖКС, но сталкивается с недружественной или безразлично настроенной средой, формально-бюрократическим подходом государственных контролирующих организаций. Теоретико-методологической рамкой исследования послужило рассмотрение пожилого возраста как периода раскрытия, проявления новых возможностей в самореализации, проявляющихся прежде всего в решении повседневных проблем. The article proposes a social typology of elderly Russian women who are forced to adapt to the requirements of the housing and communal services sector, overflowing with problems and conflicts. The typology is based on a combination of the parameters of the adequacy of the reflection by the elderly of the problem situation surrounding them in the housing and communal services and the severity of their activity. The following types are identified: socially adequate and active (in defending personal and collective interests); socially adequate, but passive - a group of elderly people who understand well the level and quality of housing and communal services provided to them, but do nothing; socially inadequate, but active, charged with conflict with managers of the housing and communal sphere; socially inadequate and passive. Active and adequate activists with free time and the necessary competencies who are ready to represent the interests of all residents of an apartment building are singled out from among the elderly. This type of activist is trying to enter into a strategy of equal partnership with managers of the housing and communal services sector, but is faced with an unfriendly or indifferent environment, a formal bureaucratic approach of state regulatory organizations. The theoretical and methodological framework of the study was the consideration of old age as a period of disclosure, the manifestation of new opportunities in self-realization, manifested primarily in solving everyday problems.


2021 ◽  
Vol 27 (3) ◽  
pp. 54-60
Author(s):  
Dilovar S. Safolov ◽  
Vladimir S. Okolotin

In this article, using the example of Rodniki blended-mixture fabric plant “Bolshevik”, one of the largest enterprises of Ivanovo Region, the process of overcoming organisational, economic and social problems by the enterprise in the conditions of the Axis invasion in order to implement the resolutions of the State Defence Committee in the most difficult conditions of 1942 is considered. Considerable attention is paid to the organisation of production at the plant, actions to strengthen labour discipline, the participation of the enterprise's staff in the All-Union Socialist competition, personnel training, solving everyday problems, etc. The article provides statistical, quantitative and documented information. The general situation in the textile industry of Ivanovo Region during this period is considered. An analysis of the chronology of events related to the implementation of the resolutions of the State Defence Committee, the People's Commissariat of the Textile Industry, etc. is undertaken. The article is based on the materials of the State Archive of Ivanovo Region and the local periodical press. A significant part of archival documents has been introduced into scientific circulation for the first time.


2021 ◽  
Author(s):  
David A. Lagnado

How do we make sense of complex evidence? What are the cognitive principles that allow detectives to solve crimes, and lay people to puzzle out everyday problems? To address these questions, David Lagnado presents a novel perspective on human reasoning. At heart, we are causal thinkers driven to explain the myriad ways in which people behave and interact. We build mental models of the world, enabling us to infer patterns of cause and effect, linking words to deeds, actions to effects, and crimes to evidence. But building models is not enough; we need to evaluate these models against evidence, and we often struggle with this task. We have a knack for explaining, but less skill at evaluating. Fortunately, we can improve our reasoning by reflecting on inferential practices and using formal tools. This book presents a system of rational inference that helps us evaluate our models and make sounder judgments.


2021 ◽  
pp. 49-54
Author(s):  
P. K. Chernova ◽  
A. Yu. Korotkova

The article discusses the use of case technology in an informatics lesson in the 9th grade in the theme "Information resources and servicesof Internet". Students can come to the conclusion about the effectiveness of the use of digital resources to solve everyday problems. They makea list of applications that allow them to find a solution in specific situations; analyze advantages and disadvantages of the selected applications;recommend one application for each situation. Students should present the results of the work in the form of a mind map or a table. The articleprovides an analysis of educational and methodological literature on the theme (first of all, the tasks proposed for solving on this theme areanalyzed); the content of the case for conducting a lesson on the specified theme is described; the stages of work, the time allotted for them aredescribed; the competencies that are formed during the realisation of the proposed case are listed.


Sign in / Sign up

Export Citation Format

Share Document