Psychological And Pedagogical Aspects Of Implementation Of Innovation In The Modern Educational Process |
Hordieiev, Volodymyr
(Rivne State Humanitarian University)
Shcherbakova, Nadiia (Berdyansk State Pedagogical University) Syryatska, Tetyana (Kharkiv I. P. Kotlyarevsky National University of Arts) Popov, Yuriy (Kharkiv I. P. Kotlyarevsky National University of Arts) Сhernyshchuk, Yulia (Bila Tserkva National Agrarian University) Pavlenko, Inna (Sumy State A. S. Makarenko Pedagogical University) |
1 | Confucius. Lunyu. Beijing. 1957. p. 21. |
2 | Sukhomlinsky V.A. Birth of a citizen. "Young guard". 1971, pp. 58-59. |
3 | Post E. Mutual courtesy. 1997. 1026 p. |
4 | McMillan R. Man Builds Twitter Bot That Humans Actually Like. Wired. URL: wired.com/2012/06/twitter_arm/ |
5 | Kotler P., Lee N. Corporate social responsibility: Doing the most good for your company and your cause. Hoboken, New Jersey: John Wiley & Sons, Inc., 2005. |
6 | Rampton S., Stauber. J. Trust us! We're experts: How industry manipulates science and gambles with your future. Tarcher. 2002. |
7 | Iasechko, M., Shelukhin, O., Maranov, A. Evaluation of The Use of Inertial Navigation Systems to Improve The Accuracy of Object Navigation. International Journal Of Computer Science And Network Security, 21:3, 2021, p. 71-75. DOI |
8 | Ktepi B. Deception in political social media // ed. K. Harvey. Encyclopedia of social media and politic. Vol. 4. Thousand Oaks, CA: SAGE Publications. P. 357-359. |
9 | S. Piskunov, M. Iasechko, O. Yukhno, N. Polstiana, Y. Gnusov, K. Bashynskyi, A.Kozyr. (2021). Application Of Probability Filter For Maintenance Of Air Objects. IJCSNS International Journal of Computer Science and Network Security. Vol. 21 No. 5, pp. 31-34. |
10 | Honigman J. Concepts, Personality, Culture, Ethnos: Contemporary Psychological Anthropology, 2001, pp. 51-79. |
11 | Iasechko, M., Shelukhin, O., Maranov, A. Evaluation of The Use of Inertial Navigation Systems to Improve The Accuracy of Object Navigation. International Journal Of Computer Science And Network Security, 21:3, 2021, p. 71-75. DOI |