Articles published on Problem Statement
Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
14302 Search results
Sort by Recency
- New
- Research Article
- 10.1002/num.70077
- Feb 6, 2026
- Numerical Methods for Partial Differential Equations
- Achyuta Ranjan Dutta Mohapatra + 1 more
ABSTRACT This article proposes an optimal convergence analysis of two model problems: the stationary Maxwell equations, which represent the ‐elliptic problem, and the time‐dependent Maxwell equations in cold plasma. We employ skeletal discontinuous Galerkin (DG) methods for spatial discretization. First, we introduce a skeletal DG method for the ‐elliptic problem with variable coefficients and discuss the optimal convergence analysis in the energy and norms. Next, we propose a continuous in time skeletal DG method for the Maxwell problem in cold plasma. The proof of error converging at an optimal rate for the cold plasma equations in and discrete energy norms hinges on a suitably defined Ritz projection derived from the previously discussed stationary Maxwell problem. We also present numerical computations in two and three dimensions for the stationary and time‐dependent Maxwell equations, including implicit and explicit time integration techniques for the time‐dependent case. These computations verify the theoretical rates we have presented.
- New
- Research Article
- 10.1115/1.4071032
- Feb 6, 2026
- ASME Journal of Heat and Mass Transfer
- Shahab Stein + 1 more
Abstract This study presents analytical solutions for transient heat conduction problems in axisymmetric domains. A stepped temperature change and a time-periodic temperature are specified as boundary conditions. The resulting temperature field is obtained as a linear superposition of two distinct components: a transient contribution arising from an initial thermal step and a periodic steady-state component. Each solution is obtained separately using appropriate nondimensional scaling. The spatial and temporal evolution of the temperature fields are examined with particular focus on the thermal penetration depth. Analytical solutions of such heat conduction problems are well known for plane domains and for stationary problems. However, transient and axisymmetric configurations are more complex due to the coupled dependence of temperature on both radial position and time, requiring more elaborate mathematical treatment. In doing so, the present work complements existing eigenfunction-based approaches by providing closed-form, fully nondimensional solutions for transient and time-periodic heat conduction in axisymmetric cylindrical domains.
- New
- Research Article
- 10.71097/ijsat.v17.i1.10014
- Jan 31, 2026
- International Journal on Science and Technology
- Ashish Mahana
Problem Statement Understanding In medical emergencies... time and medical support is very important but sometimes the normal ambulance unable to reach to patient due to several reasons such as busy road , very narrow lane, technical problem and fuel issues. In this cases several patient dies on the way or due to ambulance unable to reach to pickup .
- New
- Research Article
- 10.54097/schj0v87
- Jan 29, 2026
- Academic Journal of Science and Technology
- Muqing Xue
This study aims to conduct a detailed comparison of the performance of three classic Multi-Armed Bandit algorithms: Thompson Sampling, UCB, and ETC. The MAB problem, as an important sequential decision-making framework, primarily challenges lie in how to strike a balance between "exploration" and "exploitation". We quantitatively analyzed each algorithm's long-term performance using 100 independent experiments and cumulative regret as the primary metric. The experimental findings demonstrate that the three algorithms' performance varies significantly in the tested context. The Thompson sampling method performed the best, with the least increase in regret and the lowest final value. The UCB algorithm performed second-best, with regret growing logarithmically. The ETC algorithm saw rapid accumulation of regret in the early stages before stabilizing, but it had the poorest performance because it lacked the ability for continuous exploration. These findings confirm that the Thompson sampling method is the most efficient in balancing exploration and exploitation, and is the best choice for solving such Random Stationary Multi-Armed Bandit Problem.
- New
- Research Article
- 10.1016/j.jaim.2025.101269
- Jan 29, 2026
- Journal of Ayurveda and integrative medicine
- Ramakrishna Allam + 8 more
Virtual herbal garden (Hayushasutra): An educational aid for Ayurveda students.
- New
- Research Article
- 10.63878/jalt1766
- Jan 27, 2026
- Journal of Applied Linguistics and TESOL (JALT)
- Naseem Akhtar Naz
Problem statement: carceral collapse and constitutional blindness. Punjab prison system is in structural inertia, colonial in construction and without undergoing any significant reform. After decades of policy debates, court observations and constitutional assurances, imprisonment in Punjab still acts more as a way of control (as opposed to correction). What has been obtained is a system that continues to act in violation of the fundamental rights and abuses are the rule not exception with overcrowding, lack of classifying those who are detained, administrative secrecy and political interference. The legislative backdrop, in the form of the Prisons Act, 1894, Prisoners Act, 1900, Borstal Act, 1926 and Probation of Offenders Ordinance, 1960 is old, piecemeal, and in every way unsuitable to modern standards of human rights, especially as set out in the United Nations Standard Minimum Rules for the Treatment of Prisoners (the Nelson Mandela Rules). The custodial containment and disciplinary regulation under these statutes are emphasized but no rehabilitative philosophy along with enforceable rights regime of prisoners is established. As opposed to other provinces, Punjab has never elaborated a codified Jail Manual that follows the constitutional requirements or international commitments. Looking at the constitution, the system has gross inconsistencies. The Constitution of Pakistan is security of life, liberty, inviolability of human dignity, and the equality before the law as guaranteed by Articles 9, 14, and 25. Nonetheless, the situation within prisons in Punjab conditions includes medical neglect, mental health problems, a lack of legal assistance, and discrimination in classification of prisoners, which nullifies such assurances both in practice and theory. The fact that there is a difference in how the A-Class, B-Class and C-Class criminals are treated demonstrates an institutional prejudice regarding the socio-political privilege, and therefore the equal protection under the law principle is being violated. In addition, there is an institutional dysfunction which runs through the parole and probation system. There is minimal use of parole release, overworked probation officers and the legislative independence of parole boards is never there or diminished. Such an administrative stasis does not only worsen overcrowding but also does not allow the rationalization of a non-custodial sentence as an alternative as well. Although ocassionally the judiciary has intervened by way of inspections or suo moto measures, a consistent structural approach to the correctional institutions has never been established by the judiciary. Article 199 is still an underutilized authority when it comes to issues of prison conditions, and bail jurisprudence does not bear any resemblance to the reality on the ground in terms of carceral problems of suffering or unaccountability. This judicial disengagement allows carceral injustices to persist in the shadows of the legal system. The problem, therefore, is not merely one of inadequate resources or outdated laws. It is a deeper systemic failure: a collapse of legal, administrative, and constitutional responsibility in the domain of incarceration. Prisons in Punjab operate as closed-off spaces where fundamental rights are suspended and legal oversight is minimal. This research argues that unless the judiciary assumes a catalytic role and the legislative and executive branches embrace rights-based reform, the prison system will continue to function as a constitutional blind spot and a moral failure of the state.
- New
- Research Article
- 10.65136/jati.v3i1.287
- Jan 24, 2026
- Journal of Applied Technology and Innovation
- Adi Perdana Arifin + 1 more
In this paper, the research will be more focusing on Human Resource (HR) department in managing training and development to improve the organization performance in Malaysia IT industry. Some problems occurred in training are development due to organization inefficiency, high cost and lack of time management which leads to low of engagement. In order to solve the issues, e-learning methods will be provided to improve the organization efficiency. On the other hand, the aim is proposed to solve the problems mentioned in the problem statement and objectives will be provided to accomplish the aim. The research methodology will use primary research using questionnaire and interview as the data collection method. Besides, some literature review will be provided as the secondary research to support the fundamental idea theoretically from previous the research, such as, books, journals and reports. As the result analysis, e-learning must provide the methods that can solve the issues in managing training and development. In conclusion, e-learning must provide high level of engagement and the platform to measure employees performance once it has been implemented.
- New
- Research Article
- 10.65136/jati.v5i1.226
- Jan 22, 2026
- Journal of Applied Technology and Innovation
- Harveet Singh + 2 more
Carbon Monoxide Detection Based IoT was selected to be the title for this project. IoT platform in recent year have grown and expanded to different applications. These Carbon Monoxide Detection System was designed and implemented with the use of problem statements, investigating previous work done by other people whilst reviewing the work that was done and proposed methodology was given. The finalised design was built and thus enhanced with real environmental testing that took place in several locations. The overall system was tested and evaluated. Thus, based on the design and implementation of the system, the results were obtained.
- New
- Research Article
- 10.38124/ijisrt/26jan444
- Jan 17, 2026
- International Journal of Innovative Science and Research Technology
- Alma D Espeña + 1 more
This research examined the reading comprehension abilities of Key Stage 2 learners and their impact on proficiency in mathematics word problems. The study sought to evaluate the learners' reading comprehension proficiency, assess their capability in solving word problems, and ascertain the degree to which understanding impacts problem-solving results. The study employed a descriptive research approach, involving selected Key Stage 2 learners who participated in reading comprehension assessments and arithmetic word problem assessments. The results showed that how well learners understand what they read has a big impact on how well they do at problem-solving. The most important things that helped learners solve word problems are knowing the words, being able to pick out important details, being able to make inferences, and being able to spot issue situations. Learners who understood the material better are able to understand the issues, choose the right operations, and get the right answers. The results showed how important reading comprehension is in problem solving. The study suggests that teachers include literacy tactics into Math lessons, offer guided practice in breaking down problem statements, and create interventions that focus on both reading and numeracy skills. To help Key Stage 2 learners do better in Math, they need to work on their understanding process in reading.
- New
- Research Article
- 10.55938/ijgasr.v4i4.245
- Jan 14, 2026
- International Journal for Global Academic & Scientific Research
- Saurabh Pratap Singh Rathore + 4 more
Problem Statement: This study indicates towards the questions like How do awareness of AI and trust in the predictions of components of AI affect consumer perceptions regarding product availability in small-scale sessional e-commerce retail store? And how perceived product availability mediates the relationship between AI trust and customer loyalty Methodology: Using Structural Equation Modelling (SEM) to test the proposed framework, this study looks at how usefulness, efficiency, service responsiveness, and loyalty are related to each other when people shop online. Findings: The final model shows that service responsiveness has a strong positive effect on loyalty (β = 0.864, p < 0.001), while efficiency (β = 0.748, p < 0.001) and usefulness (β = 0.200, p = 0.01) have a strong negative effect on service responsiveness. Also, usefulness is a strong predictor of efficiency (β = 0.816, p < 0.001), which means that perceived usefulness leads to higher efficiency, which leads to higher service responsiveness, which leads to higher customer loyalty. These results are in line with earlier studies on the Technology Acceptance Model ([14]; [56]) and service quality frameworks ([48]). They show how important functional and experiential features are for building long-term customer relationships. Implications: The model gives e-commerce managers useful information, showing that spending money to make things run more smoothly and provide better service can lead to big increases in customer loyalty, no matter what demographic group they belong to.
- Research Article
- 10.26782/jmcms.2026.01.00005
- Jan 13, 2026
- JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
- Julaily Aida Jusoh + 5 more
Introduction: The rapid expansion of Internet of Things (IoT) devices, combined with the widespread adoption of cloud computing, has led to an interconnected digital environment. However, the lack of interoperability and standardization between IoT and cloud systems presents significant challenges. This study explores the importance of addressing interoperability issues and establishing standardized practices to facilitate smoother integration between these technologies. Problem Statement: The diverse range of IoT devices and cloud platforms has created a fragmented ecosystem where interoperability challenges impede the seamless exchange of data and functionality. The absence of universally accepted protocols further complicates compatibility, leading to performance inefficiencies, increased development complexity, and potential security risks. Resolving these issues is essential for unlocking the full capabilities of IoT and cloud integration. Objective: The goal of this research is to examine the current state of interoperability and standardization in IoT and cloud integration. The study aims to identify existing challenges, evaluate current standards and protocols, and propose solutions to enhance interoperability and standardization, fostering a more cohesive and efficient integration between these technologies. Methodology: This study uses a multi-method approach, including a thorough literature review, case studies of existing IoT and cloud integration efforts, and unstructured interviews with industry experts. The analysis focuses on identifying recurring interoperability challenges, evaluating the effectiveness of existing standards, and reviewing successful integration strategies. This comprehensive approach provides a detailed understanding of the complexities surrounding IoT and cloud interoperability. Results: The research identifies key challenges affecting the interoperability of IoT and cloud systems. Through detailed analysis of current standards and successful integration cases, the study offers insights into effective strategies for overcoming these barriers. The results provide actionable recommendations for enhancing interoperability and achieving smoother integration across various IoT and cloud environments. Conclusion: This study emphasizes the urgent need for improved interoperability and standardization in IoT and cloud integration. The research findings, along with proposed solutions, offer valuable direction for industry professionals, policymakers, and researchers working towards creating a more interconnected and efficient digital ecosystem. As IoT and cloud technologies continue to advance, establishing strong, standardized frameworks is crucial to realizing the full potential of these transformative technologies.
- Research Article
- 10.26782/jmcms.2026.01.00001
- Jan 13, 2026
- JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
- M Hafiz Yusoff + 5 more
Introduction: The widespread adoption of Internet of Things (IoT) devices has transformed multiple industries, enhancing operational efficiency and convenience. However, the rapid expansion of IoT ecosystems also brings forth significant security challenges. Traditional security frameworks often fail to adequately protect these systems due to their large scale, diversity, and limited resources. In response, cloud-based security solutions have emerged as a promising alternative, offering centralized management, advanced authentication techniques, and real-time threat monitoring. Problem Statement: IoT environments are vulnerable to various security risks, including unauthorized access, data breaches, and device manipulation. Existing security mechanisms often fall short when it comes to defending against sophisticated cyber-attacks targeting IoT devices and networks. The resource-constrained nature of many IoT devices further limits the implementation of robust local security measures. As a result, there is an urgent need for effective, cloud-based security solutions designed specifically for the unique demands of IoT systems. Objective: This research aims to explore the effectiveness of cloud-based security solutions in mitigating the security challenges faced by IoT environments and devices. The study focuses on evaluating the performance of cloud-based authentication mechanisms, intrusion detection systems, and encryption techniques in strengthening the security and privacy of IoT ecosystems. Methodology: A comprehensive approach is employed, combining a literature review, case studies, and empirical research to assess the current landscape of IoT security in smart environments. Data collection includes unstructured interviews with industry experts and stakeholders, offering insights into current practices and emerging security trends. The research framework incorporates threat modeling, risk assessments, and the development of proactive security strategies. Results: Initial findings indicate that cloud-based security solutions offer several benefits for protecting IoT environments and devices. Centralized management enhances integration and scalability, while advanced authentication methods, such as multi-factor and biometric authentication, improve access control. Real-time threat detection and response capabilities further bolster security by enabling timely interventions to prevent breaches and attacks. Conclusion: Cloud-based security solutions present a highly effective approach to addressing the unique security concerns of IoT environments and devices. By leveraging the scalability, flexibility, and computational power of cloud platforms, organizations can enhance the resilience of their IoT deployments against evolving cyber threats. However, further research is needed to optimize cloud-based security tools to better serve diverse IoT applications and use cases.
- Research Article
- 10.2196/79349
- Jan 12, 2026
- JMIR Perioperative Medicine
- Charlé Steyl + 5 more
BackgroundPerioperative patient-reported outcomes (PROs) allow patients to share their experiences of surgical procedures with their health care teams using standardized measures. Despite increasing recognition of their value, PROs are not routinely used in clinical practice, partly due to limited evidence of their impact on traditional clinical outcomes and uncertainty among clinicians about their use. Digital health tools offer a promising way to integrate PROs into clinical workflows and enhance patient-clinician interaction, but their success depends on person-centered design to ensure usability and relevance. Safe Surgery South Africa, a nonprofit organization, developed the Perioperative Shared Health Record (PSHR), a secure web-based tool that enables patients to share personal health information and PROs with their anesthetist and surgeon before and after surgery. Initial implementation revealed significant user experience challenges, which contributed to poor uptake.ObjectiveThis study aimed to explore factors influencing the PSHR user experience in a low- and middle-income country (LMIC) using human-centered design principles.MethodsThis observational qualitative user experience study followed the 5 design thinking stages: empathize, define, ideate, prototype, and test. Semistructured interviews were conducted with postoperative patients from both the public and private health care sectors, including those with and with no prior experience using the PSHR. Thematic analysis followed the 6-phase framework described by Braun and Clarke and was structured using Karagianni’s Optimized Honeycomb user experience model. A problem statement was developed, followed by ideation to explore solutions. Paper prototypes were created, refined, and tested through observation, interviews, and validated usability questionnaires.ResultsIn the empathize stage, 22 interviews were conducted in the private and public health care sectors in South Africa; 7 participants had previous experience using the PSHR. In the define stage, participants emphasized the need for connection, feedback, information, and support through their surgical journey. Contrary to expectations, patients were not discouraged by the length of questionnaires if they perceived them as purposeful. In the ideate stage, the team considered user expectations and PSHR integration into care processes. In the prototype stage, low-fidelity mock-ups were created and refined into paper prototypes. In the test stage, testing with 5 participants highlighted the importance of trust, communication, and user-friendly interfaces. Feedback loops and clinician engagement were identified as key motivators for sustained use. The mean usability questionnaire scores indicated excellent usability and high levels of user satisfaction across most domains.ConclusionsThis study is one of the first to apply human-centered design principles to a perioperative digital health tool in an LMIC setting, addressing usability challenges and patient engagement. Key user experience factors influencing patient engagement included communication, feedback, and access to information throughout the surgical journey. Digital health tools such as the PSHR can strengthen communication and support person-centered perioperative care by integrating PROs into clinical workflows and care processes.
- Research Article
- 10.63002/asrp.401.1287
- Jan 12, 2026
- Applied Sciences Research Periodicals
- Eme Luke + 2 more
The problems are that the agricultural production in the last five decades has been said to increase more than three times. Other factors responsible for increased agricultural production include technological advancement toward green revolution and expansion of soil for agricultural production. The study is aimed at modeling of biogas energy technologies for cooking and other application in (LIFE-ND) using Bayesian and (H-BAY) algorithms. The objectives of the study were to: quantify the volume of crop residues and processing waste generated from the LIFE-ND intervention program, optimize the crop residue and livestock wastes management practices adopted by beneficiaries of LIFE-ND intervention programme. The method involves: Bayesian and (H-BAY) algorithms and comparing yields. Two sets of structured questionnaires formed the instrument of the study. A total of eighteen (18) questions were carefully developed from the problem statements of this study. The results from the Bayesian model, it shows in table 4 that the maximum yield of 10428 tons is from cassava and the net benefit of farming in the LIFE-ND mandate states for four years (from 2019 to 2023 is N21,704,875,606: 58K or $54.3M , and if the total investment fund of $40M is deducted from the said net benefit, it equals a return on the total investment of $14.3M).The work concluded that maximum yields were from Poultry with energy of 142 KWH and cassava peels mixed of sludge with energy of 229KWH as integrated waste management system with the twin benefits of generating biogas and ensuring no evacuation of sludge. The work recommended the, poultry and cassava technologies for Biogas production to foster social benefits such as: improved waste management practices, creation of local employment opportunities, and promotion of community-led biogas initiatives empower residents to take control of their energy needs, strengthen social cohesion, and enhance overall quality of life.
- Research Article
- 10.71310/pcam.6_70.2025.03
- Jan 11, 2026
- Проблемы вычислительной и прикладной математики
- N Ravshanov + 1 more
The article analyzes the hydrodynamic processes associated with underground mining, in particular, the acid extraction of precious metals from ore deposits. In order to comprehensively study, monitor and predict the behavior of the object, a mathematical model (MM) based on the filtration-convection and diffusion processes characteristic of underground fluid filtration was developed. This model includes the influence of various hydrodynamic parameters, in particular, the filtration coefficient and average porosity, which are functions of the pressure level and process kinetics. Analysis of the problem statement shows that the change in pressure in the ore deposit resulting from the pouring and extraction of the solution directly affects the permeability and porosity coefficients of the layer. The experimental results showed that the change in hydrodynamic parameters was proportional to the change in pressure, with an exponential behavior observed under high pressure and a linear behavior under low pressure. It should be noted that in the process of in-situ leaching (ISL), a chemical reaction occurred as a result of the reagent’s effect on the ore deposits, and the substance passed from one phase to another, as a result of which the hydrodynamic parameters of the pore medium (filtration and porosity coefficients) and pressure changes in the ore reservoir were observed.
- Research Article
- 10.15421/462522
- Jan 9, 2026
- Journal “Ukrainian sense”
- Амер Алі Даххам Ватіфі
Problem statement. In contemporary cultural and political discourse, the phenomenon of cultural usurpation has gained renewed significance, as societies increasingly confront ideological conflicts, identity reconfigurations, and asymmetrical power relations. Literature, functioning as a medium of symbolic expression and social reflection, plays a crucial role in representing and contesting mechanisms of domination, resistance, and coexistence. Across different historical periods, literary narratives have served not only as artistic creations but also as ideological instruments that shape collective memory and articulate responses to cultural pressure. Themes of self-existence, loyalty, emotional affiliation, and communal belonging become especially prominent in contexts where cultural usurpation challenges the balance between individual identity and social coexistence. These circumstances highlight the necessity of reassessing the role of literature as a transformative tool capable of negotiating ethical, political, and cultural tensions within societies undergoing upheaval. Purpose of the article. The aim of this study is to analyze how literary texts interpret and negotiate cultural usurpation in the dynamic relationship between self-existence and coexistence. The research focuses on identifying narrative strategies that reflect structures of power and resistance, exploring how literature constructs ethical perspectives, articulates cultural identity, and mediates tensions between individual survival and collective cohesion. Research methodology and methods. The study employed a comprehensive methodological framework that included analytical methods (to synthesize theoretical perspectives on cultural usurpation and literary representation), interpretive methods (to examine symbolic and emotional layers of the texts), comparative analysis (to identify shared narrative patterns across different literary traditions), and contextual methods (to correlate literary material with socio-political environments). Elements of discourse analysis and hermeneutic interpretation were also utilized to investigate ideological, structural, and emotive components of the selected works. Results. The findings indicate that literature assumes a dual function: it mirrors ideological pressures, cultural domination, and political instability, while simultaneously providing a space for symbolic resistance and the affirmation of identity. Narrative structures—exemplified particularly in Dickens’s works—display a complex interplay between individual agency and hegemonic forces, offering insight into ethical choices, collective memory, and cultural resilience. The analysis demonstrates that literary texts not only reflect socio-political realities but also propose models of coexistence, solidarity, and community-building that counteract hegemonic narratives and support cultural continuity. Conclusions and prospects. The results confirm that the study of cultural usurpation through literature requires the integration of sociological, cultural, and textual approaches. The effectiveness of such analysis lies in literature’s ability to encapsulate collective experience, reflect ideological transformations, and shape ethical strategies of coexistence under conditions of cultural and political pressure. Future research should expand on the examination of literary resistance, intercultural models of coexistence, and the role of narrative representation in preserving cultural identity within globally transforming contexts.
- Research Article
- 10.15421/462528
- Jan 9, 2026
- Journal “Ukrainian sense”
- В Осипенко
Problem statement. A widespread thesis holds that heterogeneity is a defining aspect of modern discourse, reflecting the multiplicity of forms, genres, styles, and contexts in which communication takes place. This phenomenon is determined by socio-cultural, political, and historical factors, and in the digital era – by technological factors that radically transform the nature of discursive practices. Recognizing discourse heterogeneity is essential for improving analytical methodology, as it makes it possible to account for new forms of communication emerging in the digital age. Purpose of the article. The article aims to highlight the phenomenon of discourse heterogeneity, reveal its multidimensionality, and demonstrate how the digital era transforms discursive practices, posing new challenges and methodological perspectives for modern linguistics. Research methodology and methods. The study employs the descriptive method to synthesize and generalize theoretical approaches, the comparative-historical method to analyze the evolution of discursive practices, and discourse analysis to identify the specific features of different regimes and genres. Digital forms are examined through multimodal analysis, which highlights the interaction of textual, visual, and audiovisual elements; corpus methods, which enable the processing of large datasets; and a socio-semiotic approach aimed at uncovering the social meanings embedded in linguistic and visual codes. Results and discussion. Scholarly approaches to discourse study in the twenty-first century differ significantly: some researchers focus on specific aspects, such as spoken discourse, while others view discourse as a more homogeneous category, where the key analytical unit is the “text/genre” pair. Each of these approaches reflects certain traditions. The problem of heterogeneity is evident in differences between spoken and written discourse, institutional and non-institutional genres, and formal and informal registers. Discourse regimes are divided into spoken, written, digital, and multimodal, each with its own stylistic norms and organizational features. While spoken and written forms have a long history, digital and multimodal regimes have only in recent decades become an active subject of scholarly analysis. The development of the Internet and digital technologies has challenged traditional approaches formed in the mid-twentieth century and based mainly on printed texts. In today’s discursive space, genre is no longer a stable category but a dynamic system marked by constant variability and innovation. Comments on social media combine elements of public and private communication, memes integrate verbal and visual resources to convey evaluative or ironic meanings, threads create new forms of coherence reminiscent of journalistic or academic texts while remaining spontaneous, and Instagram/Facebook stories demonstrate multimodal integration of image, text, and sound. All this suggests that the digital era shapes a new dimension of heterogeneity that extends far beyond classical models. Conclusions and prospects. The study has demonstrated that discourse heterogeneity in the twenty-first century manifests itself at interrelated levels. At the level of regimes, it is evident in the coexistence of oral, written, digital, and multimodal forms; at the genre level, in the transformation of traditional genres and the emergence of hybrid formats such as memes, threads, and Instagram/Facebook stories, which combine features of different communicative practices; and at the methodological level, in the need to adopt an integrated approach that combines multimodal analysis, corpus methods, socio-semiotics, and digital ethnography. The digital environment therefore not only expands the spectrum of discursive practices but also underscores the necessity of treating heterogeneity as a key analytical principle of contemporary discourse studies.
- Research Article
- 10.15421/462529
- Jan 9, 2026
- Journal “Ukrainian sense”
- О Панченко + 1 more
Problem statement. Language is a dynamic and constantly evolving phenomenon. It adapts in response to social, cultural, technological, and political changes. One of the most vivid examples of this evolution is the emergence and widespread use of slang, particularly among younger generations. In recent years, a new form of slang has taken hold—Gen Z slang—which stands out due to its creativity, rapid development, and strong digital footprint. Generation Z, typically defined as those born between 1997 and 2012, grew up in an era of global connectivity, social media, and digital communication platforms. For this reason, their language is shaped more by TikTok videos and Discord chats than by newspapers or formal speech. As a result, Gen Z slang is an essential linguistic and cultural marker of the current digital generation. Purpose of the article. The aim of this study is to analyze the phenomenon of Gen Z slang as it appears in English-language digital communication, and to identify effective strategies for translating it into Ukrainian. Research methodology and methods. To achieve the aims and objectives of the study, the following methods are used: descriptive method – to define slang, its features, and typologies; contextual analysis – to examine slang usage in specific digital and media situations; comparative analysis – to evaluate English expressions and their Ukrainian equivalents; translation case studies – to analyze how slang is handled in real translation scenarios; interdisciplinary synthesis – combining theories from linguistics, translation studies, and media studies. Results. Gen Z slang is its hybrid, digital-first nature. It blends meme logic, intertextuality, abbreviations, and code-mixing in ways that are contextually rich but often opaque to outsiders. The digital environment accelerates slang’s mutation and spread. The language of Generation Z is uniquely shaped by globalized internet culture. Unlike previous generations, Gen Z speaks in a way that is text-native: it blends audio-visual cues, meme references, and platform-specific tone. Several distinct linguistic and stylistic features define their slang. In sum, Gen Z slang serves as a collective mirror, humor mechanism, and emotional release valve. It is language shaped by a generation that faces global instability, online hypervisibility, and mental health challenges—and it provides young people with the tools to face these challenges using language that belongs to them. In the digital era, the spread of slang is no longer confined to local communities or subcultures—it is now driven by platform algorithms, viral content, and user-generated memes. Generation Z is especially active on platforms like TikTok, YouTube, Twitter/X, Reddit, and Discord. Conclusions and prospects. Slang is a linguistic mirror of cultural shifts, political engagement, emotional expression, and identity construction in real time. To translate slang is to translate an entire worldview. As the lines between online and offline language continue to blur, translators will face new challenges—and new opportunities to act not just as linguistic mediators, but as interpreters of social meaning, emotion, and culture. Therefore, this topic will only grow in relevance, and its proper study offers essential insights into the future of translation, language teaching, and digital communication.
- Research Article
- 10.15421/462535
- Jan 9, 2026
- Journal “Ukrainian sense”
- А Ходоренко
Problem statement. The present article addresses the transformation of traditional processes of signification in the digital era and the emergence of polysemous meaning in contemporary media. The study investigates how digital media technologies, including social networks, participatory platforms, artificial intelligence, and immersive virtual environments,reshape collective perceptions of reality and reconfigure semiotic processes. Illustrative material includes viral memes, AI-generated content, virtual worlds, and participatory media campaigns. An attempt is made to characterize the mechanisms of digital polysemy, clarify the interplay between human and algorithmic agents, and demonstrate how meaning is continuously negotiated and re-signified in the digital semiosphere. The research situates these phenomena within theoretical frameworks of contemporary semiotics, media ecology, and posthuman theory, providing a conceptual basis for understanding the dynamics of meaning production, circulation, and reception in networked environments. Purpose of the article. The aim of this article is to examine the processes through which digital signs acquire multiple, context-dependent meanings, in order to clarify the theoretical concept of digital polysemy and its implications for contemporary semiotic practice. To achieve this aim, the study addresses several objectives: 1) to describe the axes of polysemous meaning in digital media, including contextual, participatory, and algorithmic dimensions, 2) to illustrate these axes with concrete examples from memes, AI-generated content, and virtual environments, 3) to analyze the interaction between human and machine agents in meaning-making, and 4) to discuss the broader implications of digital polysemy for identity, cultural expression, and humanities research. Research methodology and methods. To meet the aims of this study, descriptive and analytical methods are applied, including semiotic analysis and case-based examination of selected digital media artifacts. This approach allows for the identification of recurring patterns of polysemy, the interrelation between visual and textual elements, and the role of algorithmic mediation in shaping visibility and interpretation. By combining theoretical reflection with empirical illustration, the study provides a coherent framework for understanding how meaning emerges and evolves in networked digital environments. Results. The analysis demonstrates that digital signs are inherently polysemous, circulating across diverse cultural, social, and technological contexts while acquiring multiple, sometimes conflicting, meanings. The Bernie Sanders mittens meme exemplifies this phenomenon, as the image simultaneously signifies humor, political critique, authenticity, and commercial potential depending on the context of reception and the participatory actions of users. Algorithmic mediation further shapes which interpretations gain prominence, creating feedback loops that amplify certain readings while marginalizing others. The interplay between human creativity, participatory engagement, and algorithmic structuring reveals that meaning is not fixed but emergent, continuously negotiated, and contextually contingent. Conclusions and prospects. In examining these examples, several key mechanisms of digital polysemy emerge. Contingent contextual shifts illustrate how a single sign acquires diverse interpretations across cultural and social environments. Participatory practices demonstrate the co-creation of meaning through remix, commentary, and audience engagement. Algorithmic mediation shows how computational processes influence visibility, circulation, and interpretive salience. The study highlights that even simple lexical units, such as the word “mittens,” acquire layered cultural and semiotic significance when integrated into visual and interactive media, revealing the entanglement of human cognition, technological mediation, and social practice. The perspective of the present study suggests that understanding digital polysemy is essential for analyzing contemporary communication, identity formation, and cultural production, and provides a foundation for further research in humanities and media studies.
- Research Article
- 10.1177/09557490251414713
- Jan 7, 2026
- Alexandria: The Journal of National and International Library and Information Issues
- Kennedy Arebamen Eiriemiokhale + 2 more
Problem statement The invention of artificial intelligence (AI) has transformed learning, causing the emergence of different learning patterns which blended learning is part of. This underscores why this study explores undergraduates’ perceptions and anxieties on AI integration into blended learning. Method The population of this study is 1523 undergraduates of Kwara State University, Malete, Nigeria. Krejcie and Morgan Table was used to select 371 respondents who are chosen randomly. A self-developed questionnaire was used for data collection. The Cronbach Alpha reliability of the questionnaire was 0.72. Data collected was downloaded in csv format and analysed with SPSS, using frequencies, percentages and mean ( X ̅). Results Findings revealed that the respondents are apprehensive because the use of AI for learning will cause changes in teaching ( X ̅ = 2.94), lack of control on the use of AI for learning ( X ̅ = 2.85) and use of AI for learning will cause overdependence on it ( X ̅ = 2.80). Furthermore, the respondents perceived that AI is powerful for solving complex learning problems ( X ̅ = 334), enable learning solutions ( X ̅ = 3.34), enhance learning outcomes ( X ̅ = 3.32), personalise learning experience ( X ̅ = 3.32), strengthen digital literacy skills ( X ̅ = 3.27) and make learning efficient ( X ̅ = 3.25). Moreso, AI makes the respondents learn remotely ( X ̅ = 3.37), creates flexible pathways for learning ( X ̅ = 3.30) and allows access to information about their courses ( X ̅ = 3.26). However, poor Internet bandwidth ( X ̅ = 3.40), inadequate funding of the university to acquire AI infrastructure needed for blended learning ( X ̅ = 3.06), lecturers resisted using AI for learning enhancement ( X ̅ = 2.85) and doubt of the quality and accuracy of AI-generated contents ( X ̅ = 2.82) affect the integration of AI into blended learning. Conclusion This study concludes that undergraduates of LIS have different perceptions and anxieties about AI.