Recent publications
This article aims to clarify the key areas of activity for national security entities. The research employed epistemological, structural-functional, formal-logical, analytical, and dogmatic methods. The findings underscore the significance of the legal domain in ensuring national security, emphasizing the need for effective legal frameworks and institutions. The social dimension focuses on creating conditions for societal well-being and minimizing social risks. The economic aspect involves regulating foreign economic activity and supporting domestic producers. The political dimension centers on minimizing political risks and threats to the state’s functioning. The study concludes that these areas are interconnected and interdependent, and their integration and coordination are crucial for sustainable and secure state development.
The Russian citizenship policy toward Ukrainian citizens, both in Russia and in the occupied Ukrainian territories, underwent significant transformation during periods of grey zone conflict and conventional war. We argue that the citizenship policy, which manifests itself in ‘passportization,’ is a function of Russian military—political tactics on the battlefield and the changing priorities of its policy of entrenchment in occupied territories. Russia’s citizenship policy is a comprehensive set of direct and indirect mechanisms that encourage Ukrainians to obtain Russian citizenship, which, in the long-term perspective, represents an obstacle to any attempts at de-occupation and reintegration of territories with Ukraine.
Free link=> https://www.tandfonline.com/share/MCTDCCRIIED9HYXS9KBW?target=10.1080/17449057.2024.2386794
The distribution of the vast majority of web browsers is actively encouraged by their free use. This is a common practice of web browser developers, as it provides them with great opportunities for their distribution. The flip side of this process is the collection of personal data by web browser developers that the user does not control. The collected data is automatically transferred to leading IT companies such as Google, Microsoft, and Cloudflare, which collect, accumulate, process, and monetize the users’ data in an automated manner. This leads to the fact that any web browser user is profiled in the services of leading IT companies, which receive complete information about the user's actions on the Internet. This state of affairs contradicts Article 32 of the Constitution of Ukraine, which guarantees the right to privacy and the basic provisions of the Law of Ukraine "On Personal Data Protection". The study involved long-term recording and subsequent analysis of the network traffic of Ukraine's most popular web browsers: Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera. The peculiarity of the study was to obtain network traffic initiated by web browsers that have been active for a long time. To increase the reliability, the data on network connections of web browsers were obtained using two independent software tools for monitoring traffic on the network interface of a communication device. The analysis of network connections of web browsers made it possible to establish close ties between companies developing free web browsers and leading IT companies that monopolistically control the actions of users in the Internet space. This state of affairs contradicts the legal norms on ensuring the privacy of web browser users in the context of using their data without their knowledge and consent. This can be prevented using network screens operating at Layers 3, 4, and 7 of the TCP/IP stack OSI model.
Based on the global approaches to the problem of terrorist threat, the state policy in this field should stipulate the introduction of a whole range of measures, which are primarily aimed at identifying and eliminating the causes and conditions that can lead to terrorism. Integration of Ukraine into the global security space leads to the need of improvement and adjustment the system of public administration in this area. The researches defined the role and tasks of public administration bodies in preventing and combating terrorism in Ukraine and proposed creating an effective system of calculating and evaluating terrorism in the context of globalization, European integration, expansion of democracy and civil society.
The World Customs Organization recommends that national customs prioritize branding and reputation management. In Ukraine, the customs authorities have been consistently ranked as one of the most corrupt sectors of public life, leading to negative perceptions. The article discusses the various factors that affect the public perception of customs, such as how the institution portrays itself and how it is perceived by the media, stakeholders, and the general public. Evidence suggests that the perception of Ukrainian customs authorities has improved slightly due to their effective response to the wartime challenges and their success in aligning with EU customs legislation. In addition, Ukrainian customs has recently significantly strengthened its reputation management through media and social networks, close cooperation with stakeholders, and taking an active public stance. However, the reputation risks remain incredibly high.
The article extensively analyzes the project “Scientist from My Region” — an new initiative by the Scientist Support Office aimed at integrating the scientific achievements of Ukrainian researchers into the general secondary education system. This is achieved through various interactive formats such as lectures, webinars, discussions, round tables, thematic games, and more. The article explores the current state and opportunities associated with this project, addressing issues related to students’ insufficient awareness of local scientific contributions, the need for more engaging methods of scientific education, and the importance of mentorship in inspiring future generations with science. Additionally, the potential impact of this project on advancing scientific literacy, improving professional orientation, and fostering a stronger connection between students and the scientific community is discussed.
Background
CPAP, as a method of artificial pulmonary ventilation by constant positive pressure, improves oxygen supply to organs and tissues, including the cells of the cerebral cortex. This effect increases when CPAP and oxygen therapy are combined.
Method
We followed 11 female patients, ages 65 to 75, with Alzheimer’s disease. They were treated for Alzheimer’s disease according to accepted standards. All of them had COVID‐19, and in the rehabilitation program, they were prescribed CPAP therapy in combination with oxygen therapy, which was performed at night when the patients were sleeping, for one month. When they went to bed at a fixed time, a helmet was put on their heads, which allowed them to perform CPAP and oxygen therapy in their sleep. One patient could not get used to sleeping in the helmet, so she was treated differently and was excluded from our study. We also changed the oxygen content of the air in the helmet every three days. The patients themselves also filled out a Quality of Life Rating Scale every two weeks.
Result
After the sessions, the patients subjectively evaluated their condition as being more rested, stronger, and able and willing to do something. Objectively, there were no improvements in patients' activity during the first two weeks of therapy. Already, after a week of therapy, a fixed bedtime led to better sleep. Also, the best effect was observed when the concentration of oxygen in the supplied air was between 35 and 40 percent. After one month of therapy, patients rated their health as good on the Quality of Life Rating Scale, whereas at the beginning of therapy, they rated their health as poor. After one month of therapy hedonic was evaluated as having joy in life, as opposed to a lack of joy in life, at the beginning of therapy. Also, all the patients themselves associated these changes with the CPAP and oxygen therapy.
Conclusion
Complex CPAP and oxygen therapy can be recommended as part of a comprehensive therapy for Alzheimer’s disease to improve their quality of life.
As a rule, in progressive memory disorders, memory impairment occurs in a certain sequence. One of the last things a person forgets is the knowledge and skills he or she acquired during his or her professional activities.
We treated five women with Alzheimer’s disease aged 65‐70 years old. They received standard medication according to medical standards for the treatment of Alzheimer’s disease. They also received daily palliative care based on neuropsychological programs that included a variety of psychological tests and professionally oriented psychological tests. During history taking, patients were asked about their occupation. On special cards containing photos of objects connected with the patient’s profession, the patient found an object he or she could remember and name. This could be done once or every day before palliative neuropsychological programs. Then, during palliative sessions, a photo of this object was attached to all the numbers in this task, and the patient performed the action not just with numbers, but with the number of a particular object. For example, with the professionally oriented Schultz table, the patient, who had worked as a trolleybus driver all her life, found and showed not just numbers but the number of accumulators. As the patient recognized the photo of the battery and was able to name it correctly. And during the professional orientation of the Schultz table, we attached a picture of the battery to each digit. Also, at the end of the class, the patients answered the ten questions of the Patient Quality of Life Test.
During palliative neuropsychological programs if patients could not do the test task because it was difficult for them, the next day we offered the patient to do a professionally oriented task which, as a rule, the patient did. Subjective assessment of the patient’s quality of life was higher if the patient managed to do everything. There was also a desire to stay in the class longer.
The article is devoted to the study of the category of "force majeure" and the characteristics of the exemption from liability in circumstances of force majeure. In addition, the definition of force majeure in international normative acts is studied, the categories of force majeure, irresistible force and state of emergency are compared. The regime of grounds for exemption from liability and the place of force majeure in it are considered. The peculiarities of changing and terminating the contract as a result of a significant change in circumstances in case of force majeure in accordance with the legislation of European countries and Ukraine are analyzed. The article pays special attention to the qualification of circumstances as force majeure in the context of the anti-terrorist operation and the war in Ukraine. It is concluded that the concept of force majeure has its origin in Roman law and today it is known both in the civil and common law systems. From the time of Roman law, there was both a legislative regulation of exemption from liability for the occurrence of force majeure circumstances, as well as a contractual practice of formulating exemption from liability clauses.
Abstract — Developing the skills of writing clean code in novice programmers is an urgent and essential task for today's university teachers. Despite numerous studies of this problem, the optimal solution has not yet been found. The research examines the motivation of students to adhere to the code style without any particular methodological influence. It is shown that students with an average of 2.2 years of programming experience understand code style rules and say they are ready to follow them. However, their code contains numerous style errors, which indicate the need for additional pedagogical efforts. In the second part of the study, we present the results of the experiment with another group of students. We applied the method of penalizing students for violating code style requirements, and it showed a positive impact: the total number of errors decreased. Optimistic results were obtained for many criteria. However, the same approach should be applied in subsequent courses to consolidate a positive impact. The paper proposes a method for developing students' code style skills.
Sorting, as one of the basic algorithms, has a wide range of applications in software development. As the amount of processed data grows, the need for fast and efficient data sorting increases significantly. There are many sorting algorithms and their extensions. However, choosing the best and most versatile among them is impossible. All these algorithms have their specifics, which determine the scope of their effective use. Therefore, the problem of deciding the optimal algorithm for certain specific conditions is relevant. This choice is often a non-trivial task, and an unsuccessful choice of algorithm can cause difficulties with data processing performance. To determine which algorithm will be the best in a particular situation, you need to analyse all the factors that affect the operation of algorithms: the size and structure of the data set, the range of element values, the form of access (random or sequential), the orderliness, the amount of additional memory required to execute the algorithm, etc. In addition, different algorithms have different performance in different programming languages. The study analyses the advantages and disadvantages of nine popular sorting algorithms (Bubble, Insertion, Selection, Shell, Merge, Quick, Counting, Radix, and Heap) due to their specifics and limitations on their possible use. The performance of these algorithms implemented in four popular programming languages (C++, C#, Java and JavaScript) is tested. We experimentally discovered that the performance of sorting algorithms differs depending on the programming language. The applied aspect of the study is that its conclusions and results will allow developers to choose the best algorithm for a particular programming language, depending on the size, range, structure, etc. of the data set to be sorted. Considering this is significant when we have to sort large amounts of data in search engines, scientific and engineering applications. After all, the sorting algorithm's efficiency significantly affects the system's overall performance.
The article analyzes the prerequisites and factors of the functioning of the humanitarian maritime corridor in the Black Sea. New Ukrainian realities caused by Russia’s large-scale armed aggression against Ukraine. The blockade of seaports and ships caused the export of Ukrainian agricultural products and other goods from all ports of Ukraine to stop. The impossibility of exporting grain from Ukraine first of all had a painful impact on world food security. Therefore, the world community and the Ukrainian authorities faced the problem of unblocking sea routes and returning Ukrainian grain crops to foreign markets. Solving this problem required the development of economic, legal, political, and logistical components, taking into account the interests of the participating countries and other countries of the world. It became possible to settle the issue only within the framework of the «Initiative on the Safe Transportation of Grain and Foodstuffs from Ukrainian Ports», which, under the norms of International Maritime Law, established mechanisms for safe maritime commercial transportation, and allowed the creation of a humanitarian («grain») corridor in the Black Sea. The achievement of the «grain corridor» was the stabilization of the food market and the maintenance of food security. At the same time, Russia also received tactical, strategic, economic, and political benefits. Despite this, the Russian Federation continues to obstruct freedom of navigation in the Black Sea and the Danube for political and military purposes to dominate the Black Sea region. In this regard, solving the problem of the effective functioning of the humanitarian corridor in the Black Sea is complex and requires a multilateral approach, which involves a reliable legal and regulatory framework, transparency, and international cooperation to develop political and economic mechanisms to counter Russian aggression and ensure free sea navigation for commercial ships.
The active development of innovative technologies led to the introduction of artificial intelligence in all spheres of human activity, particularly, in education. As an educational technology, artificial intelligence integrates social, cultural, pedagogical, and legal aspects of application, thereby opening up new opportunities for learning and generating knowledge. At the same time, education faces new problems and challenges, one of which is determining the role of artificial intelligence in the generation of knowledge. The article analyzes the main representations of artificial intelligence in education: as a tool of education, an object of learning, and a “simulative subject”. In the complex system of “artificial intelligence & education & knowledge”, representations of artificial intelligence are considered evolving and becoming more complicated by overcoming contradictions embedded in systems. To understand the impact of artificial intelligence on education, its features as a tool of education and as an object of learning are revealed, and productivity and problems that arise are clarified. Special attention is paid to the status of AI as a “simulative subject” in education, whose role in the transformation of “knowledge” into “understanding” is determined by the human teacher. The interdisciplinary theoretical base is represented by studies of thinking, knowledge, and education as complex systems. A phenomenological approach was used to justify the content of learning as a transformation of knowledge into meaning and understanding of the teacher’s role in digital education.
The article examines the principle of primacy of arbitration. It continued the doctrine of «competency of competence» and can be defined as an approach established by international legal obligations of Ukraine and special legislation on international commercial arbitration, according to which consideration of the issue on validity, effectiveness, and enforceability of an arbitration agreement must precede consideration of the corresponding claim in the state court, except for cases caused by clear disregard public order by such an agreement. It has been proven that consideration by the economic court of an separate claim to invalidate the arbitration agreement goes beyond the permissible forms of state court intervention in commercial arbitration. It is justified that the issue of the invalidity of the arbitration agreement can be considered exclusively together with the claim for the protection of the violated/disputed/unrecognized subjective right or legitimate interest of the party to the agreement. However, even in such a case, the principle of primacy of arbitration must be observed. It is substantiated that the admissibility of expanded perception by state courts of the competence to consider claims about the validity of the arbitration agreement significantly limits the competence of commercial arbitrations and creates the risk of assigning Ukraine to jurisdictions unfriendly to arbitration, contradicting the experience of the leading countries of the world, in particular France, Germany, and Britain. It is substantiated that the presentation of an independent lawsuit to the commercial court to declare the arbitration agreement invalid cannot be recognized as a proper and effective way of protecting a subjective right. It is emphasized that the right to apply to the state court with an independent demand to declare the arbitration agreement invalid should be interpreted in a restrictive way due to cases of abuse of procedural rights, when the sole purpose of initiating such cases is to delay the consideration of disputes and stop the arbitration proceedings. Key words: alternative dispute resolution, international commercial arbitration, economic courts, economic procedure, arbitration clause, invalidity of arbitration agreement, principle of primacy of arbitration, doctrine of «competency of competence», public order.
The article reviews certain issues of maritime contractual practice in the Russian-Ukrainian war context. Maritime supply chains have been heavily impacted by the devastating effect of hostilities which have shaped regional crisis practices for eighteen months. Changes in public order concerning the introduction of martial law in Ukraine have posed a significant challenge for the national maritime industry and all foreign actors involved. Military threats have necessitated updating charter-parties’ force majeure and war risk sections. They have also changed insurance policy and formed new judicial practice.
Using a documentary analysis method, it examines the legal issues that exist in the field of application and protection of non-proprietary personal intellectual rights on the Internet. The first section examines the legal consequences of the active development of information technologies and their impact on relations in the field of intellectual property. It identifies some issues that arise when placing intellectual property objects on the Internet. The second section of the article provides an overview of approaches to the legal regulation of intellectual property relations under the legislation of Ukraine. The third section highlights the types and features of violations of non-proprietary personal intellectual rights on the Internet, as well as legislative and technical methods of their protection. It is noted that the main types of violations of non-proprietary personal intellectual rights on the Internet are piracy and plagiarism. It is concluded that, among the problems that hinder the adequate protection of intellectual property rights on the Internet, the main ones are the legal uncertainty of many key concepts or their insufficient development and the lack of effective mechanisms for the protection of personal non-property rights.
The statement of basic materials. The article is devoted to the study of conceptual aspects of the evolution from dynamic digitization to digital human attributes; analysis of digital human rights in the "decentralized" Internet environment/Metauniverse; elucidation of the essence and characteristics of digital human rights; formation of the concept of "digital human rights" and identification of its significance for modernity.
The article examines the model of public administration in the field of national security that meets the requirements of martial law. The purpose of the study is to determine the format of the existing public administration in the national security sector, taking into account the challenges of the legal regime of martial law by solving such research tasks as outlining the essence of public administration in the field of national security; research of subjects endowed with administrative powers in the field of national security; determination of the directions of transformation of public administration in the specified area. The research methods are the method of analysis, the method of observation and study of documents, the method of comparison, the method of modeling, and logical methods. As a result of the conducted research, the expediency of Ukraine taking into account the directions of reforming managerial influence on public relations in the field of national security, which are recognized at the level of the European Union, is substantiated. As a condition for the implementation of the necessary changes in the regulation of the security sphere, it is separated from the sphere of defense and the introduction of appropriate changes to the Law of Ukraine "On National Security". The specifics of the institutional support of social relations in the field of national security are identified and the directions for the implementation of the proper doctrine of national security are outlined.
Institution pages aggregate content on ResearchGate related to an institution. The members listed on this page have self-identified as being affiliated with this institution. Publications listed on this page were identified by our algorithms as relating to this institution. This page was not created or approved by the institution. If you represent an institution and have questions about these pages or wish to report inaccurate content, you can contact us here.
Information