Search Results - "linguistic-combinatorial modeling"
-
1
Authors: Irina Gorbunova
Source: Educação (Santa Maria. Online), Vol 46, Iss 1 (2021)
Subject Terms: Linguistic-combinatorial modeling, Mikhail Borisovich Ignatyev, 4. Education, Music computer technologies, Integrative model for the semantic space of music, Music education, Education
Access URL: https://laplageemrevista.editorialaar.com/index.php/lpg1/article/download/529/487
https://periodicos.ufsm.br/reveducacao/article/download/53329/pdf
https://doaj.org/article/5c9cbe9bce3545339b18ef852f9d3e70
https://periodicos.ufsm.br/reveducacao/article/download/53329/pdf
https://periodicos.ufsm.br/reveducacao/article/view/53329
https://laplageemrevista.editorialaar.com/index.php/lpg1/article/view/529 -
2
Authors: Irina Gorbunova
Source: Educação (Santa Maria. Online), Vol 46, Iss 1 (2021)
Subject Terms: Integrative model for the semantic space of music, Mikhail Borisovich Ignatyev, Linguistic-combinatorial modeling, Music education, Music computer technologies, Education
File Description: electronic resource
-
3
Authors: Тарасенко, Ярослав Володимирович
Source: Ukrainian Scientific Journal of Information Security; Vol. 25 No. 2 (2019); 88-95 ; Безопасность информации; Том 25 № 2 (2019); 88-95 ; Безпека інформації; Том 25 № 2 (2019); 88-95 ; 2411-071X ; 2225-5036
Subject Terms: quantum linguistics, counter propaganda, quantum semantics, cybernetic hermeneutics, linguistic-combinatorial modeling, semantic function, wave properties of the text, state information security, UDC 004.056, квантовая лингвистика, противодействие пропаганде, квантовая семантика, кибернетическая герменевтика, лингво-комбинаторное моделирование, семантическая функция, волновые свойства текста, информационная безопасность государства, УДК 004.056, квантова лінгвістика, протидія пропаганді, квантова семантика, кібернетична герменевтика, лінгво-комбінаторне моделювання, семантична функція, хвилеві властивості тексту, інформаційна безпека держави, 004.056
File Description: application/pdf
Relation: https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19396; https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19397; https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19398; https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671
-
4
Source: Ukrainian Scientific Journal of Information Security; Vol. 25 No. 2 (2019); 88-95; 2411-071X; 2225-5036
Index Terms: quantum linguistics, counter propaganda, quantum semantics, cybernetic hermeneutics, linguistic-combinatorial modeling, semantic function, wave properties of the text, state information security, UDC 004.056, 004.056, info:eu-repo/semantics/article, info:eu-repo/semantics/publishedVersion
URL:
https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19396 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19397 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19398 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19396 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19397 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19398 -
5
Source: Ukrainian Scientific Journal of Information Security; Vol. 25 No. 2 (2019); 88-95; 2411-071X; 2225-5036
Index Terms: quantum linguistics, counter propaganda, quantum semantics, cybernetic hermeneutics, linguistic-combinatorial modeling, semantic function, wave properties of the text, state information security, UDC 004.056, 004.056, info:eu-repo/semantics/article, info:eu-repo/semantics/publishedVersion
URL:
https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19396 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19397 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19398 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19396 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19397 https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13671/19398
Nájsť tento článok vo Web of Science