This study involved a comparison of the prevalence of two work-related stressors (job-related issues and information and communications technology ICT use) and three situational stress factors ...(COVID-19, geopolitical concerns, and economic conditions) among 40 Grade 2 teachers in Lithuania. Also investigated were associations between the stress factors, the frequency of classroom activities (literacy and mathematics), and teacher interaction styles (affection, behavioral, and psychological control). A total of 40 Grade 2 teachers answered online questionnaires in April–May 2022, a period defined by the ongoing COVID-19 pandemic and the recent (2–3 months prior) start of the Russo–Ukrainian war. The results showed that, of the five stress factors examined, the highest levels of stress expressed by teachers were related to the geopolitical situation, which scored significantly higher than work-related stress factors (job-related issues and ICT use). The results also indicated that all stress factors except geopolitical situation were associated with behavioral and psychological control, suggesting that teachers who report higher levels of stress apply more controlling interaction styles when teaching their second graders. Moreover, the findings revealed that the frequency of classroom activities and the positive dimension of the interaction style of teaching (i.e., affection) were not related to any of the stress factors.
The Tuyuhun Kingdom (AD 313–663) was one of the most famous regimes in northwest China during the early medieval period. However, the lifestyle and spiritual pursuit of their descendants who became ...allied with the Tang Dynasty remain enigmatic. The excavation of the Chashancun cemetery, a Tuyuhun royal descendant (AD 691) cemetery in the Qilian Mountains in northwest China, reveals a large amount of uncharred plant remains. These remains provided a rare opportunity to explore the geographical origin of the buried crops and their social implications. In total, 253,647 crops and 12,071 weeds were identified. Foxtail millet and broomcorn millet represent 61.99 and 30.83% of the total plant remains, with the rest being barley, buckwheat, beans, and hemp. The oxygen isotope and trace elements of the crop and weed remains suggest that broomcorn millet, foxtail millet, barley, buckwheat, and hemp were sourced from different regions. The assemblage of plant remains in the Chashancun cemetery suggests that millet cultivation played an important role in the livelihoods of Tuyuhun descendants, and the location of the elite Tuyuhun cemetery and multisources of different buried crops may reflect their memory of ancestors and homelands. This case study provides a unique perspective to understand the interactions among human subsistence strategy, geopolitical patterns, and local natural environments in northwest China during the late 7th century.
The article discusses the role of international cooperation in relation to advanced space programs, especially in the interests of developing countries. Options for international cooperation in space ...projects such as the ISS and the Tiangong space station. The author of the calculation that China’s defense space project, the Tiangong space station, is a promising area of cooperation between Russia and China. To implement this project, China is emphasizing global cooperation and inviting more advanced space nations to release large amounts of hydrocarbons. In addition, China provides an opportunity to participate in long-term countries in the interest of greater international cooperation. The purpose of this international study is to analyze the situation in the field of relations in the field of space, as well as a forecast on the implementation of promising space projects and the development of international space cooperation. The methodological component of the study of systemic, functional, comparable, normative-value, as well as prognostic methods. The author also came to the conclusion that the current geopolitical situation requires immediate decision-making on making decisions on amending most international acts.
The reconstruction of high-resolution chronologies for prehistoric cultures is a prerequisite for understanding the history of human evolution and its relationship with environmental change, and is ...valuable for exploring the trajectory of transcontinental cultural exchanges in prehistoric time. The Hexi Corridor of northwest China was one of the earliest centers for long-distance culture exchange in the prehistoric world. The timing and sequence of cultural changes in this area remains poorly understood resulting from the lack of radiometric age control. This paper presents a refined radiocarbon (
14
C) chronology to resolve the timing of human occupation and cultural evolution in the Hexi Corridor. Radiocarbon dating of crop remains, which have an annual life cycle, has the advantage of eliminating problems such as the carbon stored in ‘old wood’. As a result,
14
C dates from crop remains are used to test the validity of the
14
C dates derived from charcoal, bone and plant remains. The resultant database of ages is modelled using the Bayesian approach. The updated chronology presented in this paper shows generally good agreement with the original dates used to constrain cultural evolution in the Hexi Corridor. However, the occupation of the corridor by the Shajing and Shanma Late Bronze Age-Early Iron Age cultures appears to have taken place ~300 years later than previously thought. On the basis of comparing this updated chronology of cultural evolution with palaeoclimatic and historical records, it is proposed that the collapse of the Shajing and Shanma cultures occurred as a result of geopolitical impact rather than climate change.
Introduction. With the implementation of state policy aimed at integrating the Russian higher education into the world educational system, universities internationalization has been intensively ...developing in recent decades. However, the unprecedented sanction pressure of unfriendly countries (starting in 2022) affected universities international activity prompting them to search for new foreign partners. The purpose of the research was to study the vectors of Russian universities’ international activity under transformation in the current geopolitical situation. The analysis of new geography and forms of international cooperation in the educational, scientific, cultural and humanitarian spheres was of specific interest.
Materials and Methods. The method of content analysis was employed to study the news on international activity, posted on the websites of leading Russian universities, government authorities and specialized organizations. The results of this analysis were mapped (the mapping method was used). The method of substantive analysis of news reports was used to obtain a characterization of the forms of international cooperation. Statistical data were analyzed in the article by means of quantitative methods. The methods of substantive analysis, systematization and classification of information contained in theoretical sources, normative-legal acts, information and analytical materials were used.
Results. A set of sanction restrictions on the internationalization of Russian universities is characterized. Diagrammatic maps of the new geography of their international cooperation are presented. They indicate the growth of international contacts with universities in the CIS countries, Asia, Africa and Latin America against the backdrop of the decreased contacts with Western countries.
Discussion and Conclusion. The expansion of international cooperation between Russian universities geography can help minimize risks of sanction pressure, as well as open up new opportunities for the long-term international partnership development and the formation of new world scientific and educational superiority centers. The article can be useful for universities in Russia for forming their international strategy in the new geopolitical conditions.
According to the geopolitical dimension, the concept of security is ambiguous. Security usually involves protection from external military threats or risks to a state by another state, as well as ...protection from internal military threats from non-state entities. In recent decades, the traditional concept of security has been completed by other concepts that have expanded the nature of possible threats, joining to the military threats the threat of terrorism, organized crime and diseases, combined with economic, political, social, environmental and biological risks. Accordingly, the list of threats has been revised, in particular for security at the global, national and individual levels. Today, we observe the world’s leading countries struggling to overcome the financial and economic challenges caused by the COVID-19 pandemic. At the end of the twentieth century and in the first twenty years of the twenty-first century the ecological and biological threats and the insidious danger they bring became especially acute. The means of mass destruction include toxic and bacteriological (biological) weapons. The action of the latter is based on the use of pathogenic properties of biological warfare agents – microorganisms that can reproduce in humans, animals and plants and cause mass diseases. The use of infectious agents for base purposes can have not only military but also terrorist and criminal purposes. Therefore, in recent years, the international community has made significant efforts to analyze the effectiveness of compliance with national laws, codes of conduct and ethics, disease surveillance and response, bioprotection and biosecurity. Together with the developed mechanisms of counteraction and security, the development of microbiological and medical technologies, the real challenge of the scale of civilization at the end of 2019 was the spread of the COVID-19 virus.
Suicide bomb attacks are a high priority concern nowadays for every country in the world. They are a massively destructive criminal activity known as terrorism where one explodes a bomb attached to ...himself or herself, usually in a public place, taking the lives of many. Terrorist activity in different regions of the world depends and varies according to geopolitical situations and significant regional factors. There has been no significant work performed previously by utilizing the Pakistani suicide attack dataset and no data mining-based solutions have been given related to suicide attacks. This paper aims to contribute to the counterterrorism initiative for the safety of this world against suicide bomb attacks by extracting hidden patterns from suicidal bombing attack data. In order to analyze the psychology of suicide bombers and find a correlation between suicide attacks and the prediction of the next possible venue for terrorist activities, visualization analysis is performed and data mining techniques of classification, clustering and association rule mining are incorporated. For classification, Naïve Bayes, ID3 and J48 algorithms are applied on distinctive selected attributes. The results exhibited by classification show high accuracy against all three algorithms applied, i.e., 73.2%, 73.8% and 75.4%. We adapt the K-means algorithm to perform clustering and, consequently, the risk of blast intensity is identified in a particular location. Frequent patterns are also obtained through the Apriori algorithm for the association rule to extract the factors involved in suicide attacks.
The article is devoted to the analysis of two dominant security concepts in the modern world. Given the long bipolarity of the world, due to the dominance of the Horde and Westphalian concepts of ...security, the question arises about the place of Ukraine in this coordinate system. In the process of research, a historical analysis of the emergence, formation and dissemination of two, alternative concepts of security, which are characteristic of countries with different governance models. The article argues that at present two concepts of state security are dominant in the world, namely the Westphalian and the Horde. The conducted analysis allows us to state that the strategic partnership between these two concepts of security is illusory, given the great differences in the principles of concept construction.