Results for 'Asha Rao'

37 found
Order:
  1. The theory of liberal dependency care: a reply to my critics.Asha Bhandary - 2021 - Critical Review of International Social and Political Philosophy (6):843-857.
    This author’s reply addresses critiques by Daniel Engster, Kelly Gawel, and Andrea Westlund about my 2020 book, Freedom to Care: Liberalism, Dependency Care, and Culture. I begin with a statement of my commitment to liberalism. In section two, I defend the value of a distinction between conceptions of persons in the real world and in contract theory to track inequalities in care when indexed to legitimate needs. I argue, as well, that my variety of contract theory supplies the normative content (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Rabindranath Tagore on a comparative methodology of religions.Asha Mukherjee - 2014 - Argument: Biannual Philosophical Journal 4 (1):69-80.
    Study of religion describes, analyzes and compares how certain human beings do in fact express their faith in terms of particular scriptures, religious figures, sacred rituals, community solidarity, etc. — and how all these explicitly religious phenomena may relate to other aspects of people’s lives. It also aspires and addresses the questions to be even-handed, objective, based on evidence that may be checked by any competent inquirer, and non-committal on claims to divine revelation and authority. It is in principle comparative, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  3. The Doubt-removing book of Mardānfarrox (شکند گمانیک ویچار یا گزارش گمان‌شکن ).Raham Asha (ed.) - 2015 - Alain Mole.
    he name of he author of treatise Mardānfarrox son of Ohrmazddād He make him know suiter or and researcher of truth who does not like to follow a religion by inheritance, but he seeks that which is more reliable and acceptable before the philosophy and logic.
    Download  
     
    Export citation  
     
    Bookmark  
  4. GREEN PRACTICES AND CORPORATE SUSTAINABILITY PERFORMANCE OF CHEMICAL MANUFACTURING ORGANISATIONS IN MALAYSIA: THE MODERATING ROLE OF ISLAMIC WORK ETHICS, ORGANISATION SIZE, AND ORGANISATION AGE.Maryam Jamilah Asha’Ari - 2020 - Dissertation, Universiti Tenaga Nasional
    Sustainability is a crucial issue for many sectors in Malaysia, including the manufacturing sector. Many businesses, especially the chemical manufacturing industry, aim to achieve a sustainable business through the implementation of green practices. Green practices provide guidelines for the employees to simultaneously sustain the organisation in a sustainable manner and carry out the required manufacturing activities. Focusing on that, this study aimed to examine the effects of green practices on corporate sustainability performance through Islamic work ethics, organisation size, and organisation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Précis: Freedom to Care.Asha Bhandary - 2021 - Critical Review of International Social and Political Philosophy (6):816-819.
    This summary of Freedom to Care begins with the core claims and conceptualizations upon which the theory of liberal dependency care rests. It then summarizes the book’s chapters. The first five chapters (Part I) delineate its theoretical foundations, which include the two-level contract theory approach to distributive justice for caregiving arrangements. In Part II of the book, chapters six through nine, I formulate liberal proposals for justice-enhancing social change before identifying cross-cultural metrics of justice for the internal evaluation of caregiving (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Foreword to special volume in the memory of Professor Joseph T. O’Connell.Asha Mukherjee - 2016 - Argument: Biannual Philosophical Journal 6 (1):11-14.
    Download  
     
    Export citation  
     
    Bookmark  
  7. Encountering Evil: The Evil-god Challenge from Religious Experience.Asha Lancaster-Thomas - 11th July Online - European Journal for Philosophy of Religion 12 (3):0-0.
    It is often thought that religious experiences provide support for the cumulative case for the existence of the God of classical monotheism. In this paper, I formulate an Evil-god challenge that invites classical monotheists to explain why, based on evidence from religious experience, the belief in an omnipotent, omniscient, omnibenevolent god is significantly more reasonable than the belief in an omnipotent, omniscient, evil god. I demonstrate that religious experiences substantiate the existence of Evil-god more so than they do the existence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Cooperative Solutions to Exploration Tasks Under Speed and Budget Constraints.Karishma Lnu & Shrisha Rao - 2023 - Journal of Simulation 17 (6):676--687.
    We present a multi-agent system where agents can cooperate to solve a system of dependent tasks, with agents having the capability to explore a solution space, make inferences, as well as query for information under a limited budget. Re-exploration of the solution space takes place by an agent when an older solution expires and is thus able to adapt to dynamic changes in the environment. We investigate the effects of task dependencies, with highly-dependent graph G_40 (a well-known program graph that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. PREVENTING INSIDER THREATS IN CLOUD ENVIRONMENTS: ANOMALY DETECTION AND BEHAVIORAL ANALYSIS APPROACHES.Sanagana Durga Prasada Rao - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):225-232.
    Insider threats pose a significant risk to cloud environments, where traditional security measures may fall short. This manuscript delves into the use of anomaly detection and behavioral analysis to mitigate these risks. We explore the unique challenges of cloud security, examine current methodologies, and provide practical insights into implementing effective insider threat detection mechanisms. By integrating these advanced techniques, organizations can enhance their security posture and protect sensitive data in the cloud. In today's digital age, the fusion of cybersecurity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. THE SYNERGY OF CYBERSECURITY AND NETWORK ARCHITECTURE: A HOLISTIC APPROACH TO RESILIENCE.Sanagana Durga Prasada Rao - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):218-224.
    In the digital age, the convergence of cybersecurity and network architecture has become pivotal in ensuring organizational resilience. This manuscript explores the intertwined relationship between these two domains, emphasizing a holistic approach to safeguarding information systems. By integrating robust network design principles with advanced cybersecurity measures, organizations can build resilient infrastructures capable of withstanding sophisticated cyber threats. This paper delves into the theoretical foundations, practical implementations, and future directions for achieving synergy between cybersecurity and network architecture.
    Download  
     
    Export citation  
     
    Bookmark  
  11. Ethics, Prosperity, and Society: Moral Evaluation Using Virtue Ethics and Utilitarianism.Aditya Hegde, Vibhav Agarwal & Shrisha Rao - 2020 - 29th International Joint Conference on Artificial Intelligence and the 17th Pacific Rim International Conference on Artificial Intelligence (IJCAI-PRICAI 2020).
    Modelling ethics is critical to understanding and analysing social phenomena. However, prior literature either incorporates ethics into agent strategies or uses it for evaluation of agent behaviour. This work proposes a framework that models both, ethical decision making as well as evaluation using virtue ethics and utilitarianism. In an iteration, agents can use either the classical Continuous Prisoner's Dilemma or a new type of interaction called moral interaction, where agents donate or steal from other agents. We introduce moral interactions to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Bridging eastern and western perspectives on consciousness: Comment.K. Ramakrishna Rao - 2002 - Journal of Consciousness Studies 9 (11):63-68.
    Download  
     
    Export citation  
     
    Bookmark  
  13. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced Persistent Threats (APTs), Automated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. MITIGATING NETWORK THREATS: INTEGRATING THREAT MODELING IN NEXT-GENERATION FIREWALL ARCHITECTURE.Sanagana Durga Prasada Rao - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-209.
    In the face of increasingly sophisticated cyber threats, traditional reactive network security measures are insufficient. This paper explores the integration of threat modeling into next-generation firewall (NGFW) architecture as a proactive strategy to enhance network defenses. Threat modeling involves systematically identifying potential threats and vulnerabilities, allowing organizations to anticipate and mitigate risks before exploitation. NGFWs, with their advanced capabilities such as deep packet inspection, intrusion prevention systems, and application awareness, can leverage threat modeling to analyze traffic patterns and prioritize responses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark  
  16. Egocentric Bias and Doubt in Cognitive Agents.Nanda Kishore Sreenivas & Shrisha Rao - forthcoming - 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), Montreal, Canada, May 2019.
    Modeling social interactions based on individual behavior has always been an area of interest, but prior literature generally presumes rational behavior. Thus, such models may miss out on capturing the effects of biases humans are susceptible to. This work presents a method to model egocentric bias, the real-life tendency to emphasize one's own opinion heavily when presented with multiple opinions. We use a symmetric distribution, centered at an agent's own opinion, as opposed to the Bounded Confidence (BC) model used in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big challenge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Design and Evaluation of a Wireless Electronic Health Records System for Field Care in Mass Casualty Settings.David Kirsh, L. A. Lenert, W. G. Griswold, C. Buono, J. Lyon, R. Rao & T. C. Chan - 2011 - Journal of the American Medical Informatic Association 18 (6):842-852.
    There is growing interest in the use of technology to enhance the tracking and quality of clinical information available for patients in disaster settings. This paper describes the design and evaluation of the Wireless Internet Information System for Medical Response in Disasters (WIISARD).
    Download  
     
    Export citation  
     
    Bookmark  
  19. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve a meaningful (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  92
    Modelling prejudice and its effect on societal prosperity.Deep Inder Mohan, Arjun Verma & Shrisha Rao - 2023 - Journal of Simulation 17 (6):647--657.
    Existing studies of the multi-group dynamics of prejudiced societies focus on the social- psychological knowledge behind the relevant processes. We instead create a multi-agent framework that simulates the propagation of prejudice and measures its tangible impact on prosperity. Levels of prosperity are tracked for individuals as well as larger social structures including groups and factions. We model social interactions using the Continuous Prisoner's Dilemma (CPD) and a new agent type called a prejudiced agent. Our simulations show that even modeling prejudice (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Artificial Leviathan: Exploring Social Evolution of LLM Agents Through the Lens of Hobbesian Social Contract Theory.Gordon Dai, Weijia Zhang, Jinhan Li, Siqi Yang, Chidera Ibe, Srihas Rao, Arthur Caetano & Misha Sra - manuscript
    The emergence of Large Language Models (LLMs) and advancements in Artificial Intelligence (AI) offer an opportunity for computational social science research at scale. Building upon prior explorations of LLM agent design, our work introduces a simulated agent society where complex social relationships dynamically form and evolve over time. Agents are imbued with psychological drives and placed in a sandbox survival environment. We conduct an evaluation of the agent society through the lens of Thomas Hobbes's seminal Social Contract Theory (SCT). We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Asha Bhandary's Freedom to Care— A Kantian Care Engagement. [REVIEW]Helga Varden - 2023 - Dialogue 62 (2):247-260.
    RésuméCette analyse situe la théorie du soin d'Asha Bhandary, telle que définie dans Freedom to Care, dans l'histoire de la philosophie, note certaines caractéristiques distinctives de la théorie qui font clairement évoluer la tradition de la théorie du soin, et soulève des énigmes et des questions concernant des éléments spécifiques de la théorie. Mes remarques portent principalement sur la première partie du livre et sur les quatre sujets suivants : (1) les racines rawlsiennes de la théorie de Bhandary ; (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. ASHA- the Lady Health Activist and Health Status of Rural Women- A Case Study of Karimganj District.Suchitra Das - 2012 - Pratidhwani the Echo (I):57-67.
    Women constituting almost half of the population of a country are the major human resource and accordingly the involvment of women in every sphere - economic, social, political is urgently felt for the development of a country. Health is one of the major infrastructures to constitute a strong human resource and is emerging as a significant element of human capital and a vital indicator of human development. Improvement in the health status of women plays a very important role in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Constructing a hermeneutics of re-cognition: accessing Raja Rao’s corpus.Subhasis Chattopadhyay - manuscript
    Lisa Zunshine stayed at Hotel Laxmi Park at Bishnupur, I do not know whether that hotel exists now or not. I sparred with Rukmani Bhaya Nair at an international literary meet at Dehradun in 2017 and I have that video. In this hurriedly written essay for an FDP conducted by a Central University in India in collaboration with a College in New Delhi, I point out the need to distinguish between philosophy and darśana while accessing the corpus of Raja Rao. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Derivation of the Cramer-Rao Bound.Ryan Reece - manuscript
    I give a pedagogical derivation of the Cramer-Rao Bound, which gives a lower bound on the variance of estimators used in statistical point estimation, commonly used to give numerical estimates of the systematic uncertainties in a measurement.
    Download  
     
    Export citation  
     
    Bookmark  
  26.  98
    Thiếu thốn tài chính đang là rào cản trong công cuộc chống khủng hoảng khí hậu.Phú Kiên Cường Nghiêm - manuscript
    Ông Ban Ki-moon, cựu Tổng thư ký Liên hợp quốc hiện đang đóng vai trò Chủ tịch Global Center on Adaptation (GCA), mới có xác nhận tại Africa Climate Summit diễn ra ở Nairobi, về nguy cơ tình trạng thiếu thốn tài chính sẽ ngăn cản những tiến bộ tiếp theo, thậm chí đe dọa cả những kết quả tích cực về bảo tồn sinh thái đã đạt được, tại Châu Phi.
    Download  
     
    Export citation  
     
    Bookmark  
  27. Thiếu thốn tài chính đang là rào cản trong công cuộc chống khủng hoảng khí hậu tại châu Phi.Phú Kiên Cường Nghiêm - 2023 - Kinh Tế Và Dự Báo 27021.
    Châu Phi hiện được đánh giá là chịu tác động tiêu cực nặng nhất của cuộc khủng hoảng khí hậu, nhưng chỉ được phân bổ 3% tổng lượng tài chính thích ứng khí hậu, tài chính cần thiết để thiết kế chuyển đổi, thích ứng phương thức hoạt động kinh tế.
    Download  
     
    Export citation  
     
    Bookmark  
  28.  93
    Madeleine Albright, Fascismul. Un avertisment, Editura RAO, București, 2019. [REVIEW]Ovidiu Gherasim-Proca - 2023 - Analele Ştiinţifice Ale Universităţii „Alexandru Ioan Cuza” Din Iaşi. Ştiinţe Politice 18:89-95.
    În ciuda faptului că nu contribuie la ordonarea cunoașterii actuale despre fascism, ci dimpotrivă, creează confuzie, lucrarea Madeleinei Albright are unele merite incontestabile. Primul dintre ele este capacitatea de a simplifica, într-o naraţiune scurtă, ușor de parcurs, ideile și faptele liderilor fasciști interbelici. Începând cu capitolul al doilea și până la cel de-al cincilea, istorisirea ar putea să fie folosită ca un foarte accesibil, viu și instructiv rezumat istoric pentru studenţi. Cu certitudine, experienţa profesorală a autoarei în învăţământul politic american (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. واردن، هلگا (۱۴۰۱). جستارهایی در اخلاق و فلسفه سیاسی کانت. ترجمه علی پیرحیاتی. نشر نقد فرهنگ.Helga Varden (ed.) - forthcoming - Naghd-e Farhang Publications.
    This is an anthology that is coming out in Farsi. -/- Table of Contents (in English): -/- 1. (2021). “On a Supposed Right to Lie from Philanthropy.” The Cambridge Kant Lexicon, ed. Julian Wuerth, Cambridge: Cambridge University Press, pp. 691-695. 2. (2010). “Kant and Lying to the Murderer at the Door . . . One More Time: Kant’s Legal Philosophy and Lies to Murderers and Nazis.” The Journal of Social Philosophy, Vol. 41(4), pp. 403-421. 3. (2006). “Kant and Dependency Relations: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Collected Papers (Neutrosophics and other topics), Volume XIV.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This fourteenth volume of Collected Papers is an eclectic tome of 87 papers in Neutrosophics and other fields, such as mathematics, fuzzy sets, intuitionistic fuzzy sets, picture fuzzy sets, information fusion, robotics, statistics, or extenics, comprising 936 pages, published between 2008-2022 in different scientific journals or currently in press, by the author alone or in collaboration with the following 99 co-authors (alphabetically ordered) from 26 countries: Ahmed B. Al-Nafee, Adesina Abdul Akeem Agboola, Akbar Rezaei, Shariful Alam, Marina Alonso, Fran Andujar, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Collected Papers (on Neutrosophic Theory and Applications), Volume VIII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This eighth volume of Collected Papers includes 75 papers comprising 973 pages on (theoretic and applied) neutrosophics, written between 2010-2022 by the author alone or in collaboration with the following 102 co-authors (alphabetically ordered) from 24 countries: Mohamed Abdel-Basset, Abduallah Gamal, Firoz Ahmad, Ahmad Yusuf Adhami, Ahmed B. Al-Nafee, Ali Hassan, Mumtaz Ali, Akbar Rezaei, Assia Bakali, Ayoub Bahnasse, Azeddine Elhassouny, Durga Banerjee, Romualdas Bausys, Mircea Boșcoianu, Traian Alexandru Buda, Bui Cong Cuong, Emilia Calefariu, Ahmet Çevik, Chang Su Kim, Victor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Tiến sĩ Vương Quân Hoàng: Chống “ngộ độc” nguồn lực.Trinh Nguyễn - 2013 - Thanh Niên 2013 (1):1-6.
    Nhiều người vẫn cho thiếu đầu tư là một rào cản phát triển xã hội. TS kinh tế Vương Quân Hoàng lo ngại “ngộ độc” nguồn lực hơn.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Shodasi : Secrets of the Ramayana.Seshendra Sharma & Sharma Seshendra - 2015 - Hyderabad : India: Saatyaki S/o Seshendra Sharma.
    Ramayan Through Kundalini Yoga Shodasi is an ideal read for Sanskrit-literate readers who are open to eclectic yogarthas and connotative meanings -------- So you thought Vyasa was before Valmiki, Mahabharat was before Ramayan, Rama a Vishnu avatar, and tantrism distinct from vedism? Think again. In Shodasi: Secrets of the Ramayana, Telugu poet Seshendra Sharma re-reads the Ramayan to come up with a number of new conclusions. Much of the book sets out to prove that Ramayan was written before the Mahabharat. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Tiến bộ công nghệ, AI: Kỷ nguyên số và an ninh thông tin quốc gia.Vương Quân Hoàng, Lã Việt Phương, Nguyễn Hồng Sơn & Nguyễn Minh Hoàng - manuscript
    Sự tiến bộ nhanh chóng của các nền tảng Công nghệ Thông tin (CNTT) và ngôn ngữ lập trình đã làm thay đổi hình thái vận động và phát triển của xã hội loài người. Không gian mạng và các tiện ích đi kèm ngày càng được mở rộng, dẫn đến sự chuyển dịch dần từ đời sống trong thế giới thực sang đời sống trong thế giới ảo (còn gọi là không gian mạng hay không gian số). Sự mở (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Một số vấn đề an ninh thông tin trọng yếu trong kỷ nguyên AI.Vương Quân Hoàng, Lã Việt Phương, Nguyễn Hồng Sơn & Nguyễn Minh Hoàng - 2024 - Cổng Thông Tin Điện Tử Học Viện Cảnh Sát Nhân Dân.
    Sự tiến bộ nhanh chóng của các nền tảng Công nghệ Thông tin (CNTT) và ngôn ngữ lập trình đã làm thay đổi hình thái vận động và phát triển của xã hội loài người. Không gian mạng và các tiện ích đi kèm ngày càng được mở rộng, dẫn đến sự chuyển dịch dần từ đời sống trong thế giới thực sang đời sống trong thế giới ảo (còn gọi là không gian mạng hay không gian số). Trong bối (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Một số vấn đề an ninh thông tin trọng yếu trong kỷ nguyên AI (Phần 1: Tiến bộ công nghệ - Thách thức).Vương Quân Hoàng, Lã Việt Phương, Nguyễn Hồng Sơn & Nguyễn Minh Hoàng - 2024 - Hội Đồng Lý Luận Trung Ương.
    Sự tiến bộ nhanh chóng của các nền tảng Công nghệ Thông tin (CNTT) và ngôn ngữ lập trình đã làm thay đổi hình thái vận động và phát triển của xã hội loài người. Không gian mạng và các tiện ích đi kèm ngày càng được mở rộng, dẫn đến sự chuyển dịch dần từ đời sống trong thế giới thực sang đời sống trong thế giới ảo (còn gọi là không gian mạng hay không gian số). Sự mở (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Một số vấn đề an ninh thông tin trọng yếu trong kỷ nguyên AI (Phần 2: Con người - Xã hội).Vương Quân Hoàng, Lã Việt Phương, Nguyễn Hồng Sơn & Nguyễn Minh Hoàng - 2024 - Hội Đồng Lý Luận Trung Ương.
    Sự tiến bộ nhanh chóng của các nền tảng Công nghệ Thông tin (CNTT) và ngôn ngữ lập trình đã làm thay đổi hình thái vận động và phát triển của xã hội loài người. Không gian mạng và các tiện ích đi kèm ngày càng được mở rộng, dẫn đến sự chuyển dịch dần từ đời sống trong thế giới thực sang đời sống trong thế giới ảo (còn gọi là không gian mạng hay không gian số). Sự mở (...)
    Download  
     
    Export citation  
     
    Bookmark