Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Language
Region
Virtual Catalogues
Access
  • 1
    Online Resource
    Online Resource
    Manchester, UK ; : Manchester University Press ; | Manchester :Manchester University Press,
    UID:
    almafu_9958063125902883
    Format: 1 online resource (248 pages) : , 1 map; digital, PDF file(s).
    Edition: 1st ed.
    ISBN: 9786610733873 , 9781526137982 , 1526137984 , 9781781700167 , 1781700168 , 9781280733871 , 128073387X , 9781847790248 , 1847790240 , 9781417576371 , 1417576375
    Series Statement: Studies in early modern European history
    Content: This text looks at why witch-trials failed to escalate into ""witch-crazes"" in certain parts of early modern Europe. Using the legal records of Rothenburg ob der Tauber, the book explores the social and psychological conflicts behind the making of accusations and confessions of witchcraft.
    Note: Description based upon print version of record. , Acknowledgements --Map: Place of origin of the sixty-five people involved as accused, self-confessed or reputed witches in witch-trials in Rothenburg ob der Tauber, 1549-1709 --Introduction --1. 'An honourable man should not talk about that which he cannot prove': slander and speech about witchcraft --2. The devil's power to delude: elite beliefs about witchcraft and magic --3. 'One cannot ... hope to obtain the slightest certainty from him': the first child-witch in Rothenburg, 1587 --4. 'When will the burning start here?': the Catholic challenge during the Thirty Years' War -- , 5 Seduction, poison and magical theft: gender and contemporary fantasies of witchcraft6 'God will punish both poor and rich': the idioms and risks of defiance in the trial of Margaretha Horn, 1652; Conclusion; Appendix: trials for witchcraft in Rothenburg ob der Tauber, 1549-1709; Bibliography; Index , Also available in print form. , In English.
    Additional Edition: ISBN 9781847795205
    Additional Edition: ISBN 184779520X
    Additional Edition: ISBN 9780719052590
    Additional Edition: ISBN 0719052599
    Language: English
    Keywords: Electronic book. ; Electronic books. ; History. ; Electronic books.
    URL: DOAB
    URL: JSTOR
    URL: OAPEN
    URL: OAPEN
    URL: Image  (Thumbnail cover image)
    URL: Bibliographic record display  (An electronic book accessible through the World Wide Web; click for information)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Bristol :Bristol University Press,
    UID:
    almahu_9949767407002882
    Format: 1 online resource (311 pages)
    Edition: 1st ed.
    ISBN: 9781529222517
    Content: Available open access digitally under CC-BY-NC-ND licence. This book examines how governments misuse detention to abuse power, suppress dissent and maintain social hierarchies. Proposing solutions for future policy, this is a call for greater respect for the rule of law and human rights.
    Note: Front Cover -- Conceptualising Arbitrary Detention: Power, Punishment and Control -- Copyright information -- Table of Contents -- Detailed Contents -- List of Abbreviations -- About the Author -- Acknowledgements -- Foreword -- 1 Introduction -- 1.1 The impetus for the book -- 1.2 Some of the themes explored in the book -- 1.3 The trajectory -- Part I Theorising and Conceptualising "Arbitrariness" -- 2 Notions of the "Arbitrary" -- 2.1 Introduction -- 2.2 Multiple meanings -- 2.3 Theorising "arbitrariness" -- 2.4 "Arbitrariness" in human rights law -- 2.4.1 "Arbitrariness" and the social conception of rights -- 2.4.2 "Arbitrary interference" and human rights decision-making -- (i) Qualified rights -- (ii) Limited rights: the arbitrary deprivation of the right to life -- 2.4.3 "Arbitrariness" and positive obligations -- 2.5 The "arbitrariness" in arbitrary detention -- 2.5.1 The history and meaning of "arbitrary" in arbitrary detention -- 2.5.2 Arbitrary detention: both qualified and limited -- 2.5.3 States' positive obligations to ensure that detention is non-arbitrary -- 2.5.4 Relationship with other rights -- 2.6 The grey zones of "detention" and their impact on arbitrariness -- 2.7 Conclusions -- 3 "Arbitrariness" as an Indication of Harm -- 3.1 Introduction -- 3.2 The harms of arbitrary detention -- 3.3 Connection to torture and other cruel, inhuman, or degrading treatment or punishment -- 3.3.1 The torture definition and its component parts -- (i) Severity -- (ii) For such purposes as -- (iii) The involvement of the state -- (iv) Does not constitute lawful sanctions -- 3.3.2 Other forms of cruel, inhuman, or degrading treatment or punishment -- 3.4 Conclusions -- Part II The Law and Practice of Arbitrary Detention in Context -- 4 Enforcing Hostility and Social Control -- 4.1 Introduction -- 4.2 Agamben and the theorisation of containment. , 4.3 Methods of containment -- 4.3.1 Detention as criminalisation -- 4.3.2 Detention as pathologisation -- 4.3.3 Detention as deterrence -- 4.4 The arbitrary detention of socially excluded and marginalised groups -- 4.4.1 The "unseen": economic and social "degenerates" -- (i) Detention of persons who are homeless -- (ii) Detention on mental health grounds -- (iii) Detention of people who use drugs -- 4.4.2 The "reviled and resented": racism, xenophobia, and other discriminatory treatment -- (i) Groups discriminated against based on race, ethnicity or religious identity -- (ii) Indigenous peoples -- (iii) Discrimination based on gender or gendered roles -- 4.4.3 The "undeserving": refugees and other migrants -- 4.5 Conclusions -- 5 Deterring Dissent -- 5.1 Introduction -- 5.2 How arbitrary detention is used to deter dissent -- 5.2.1 Criminalisation -- (i) Securitising dissent -- (ii) Criminally defamatory speech acts -- 5.2.2 Pathologising dissent -- 5.2.3 Isolating dissenters and using other non-traditional forms of detention -- 5.3 The dissenters -- 5.3.1 Opposition politicians -- 5.3.2 Environmental activists -- 5.3.3 Mass protest movements -- 5.4 Ulterior or pretextual motives -- 5.5 Interpol and the cross-border persecution of dissenters -- 5.6 Conclusions -- 6 The Securitisation of Detention: Exceptional Regimes, Security Frameworks and Counter-Terrorism Measures -- 6.1 Introduction -- 6.2 The power of the exception and the shunning of the everyday -- 6.2.1 The exigent exception: emergencies, exceptions and derogations -- 6.2.2 The exception of place: denial of extraterritoriality -- 6.2.3 The person as exception: "terrorists", "non-combatants" and other rhetorical labels -- 6.2.4 The exception of law: lawfare and other narrative devices -- 6.3 Detention during armed conflicts -- 6.3.1 Detention by multinational forces. , 6.3.2 "Extraterritorial NIACs", UN Security Council resolutions and the power to detain -- 6.3.3 Challenges with the transfer of detainees -- 6.4 National security, counter-terrorism and indefinite detention -- 6.4.1 Counter-terrorism and forever prisoners -- 6.4.2 Da'esh and quasi-carceral zones of exclusion -- 6.5 Conclusions -- 7 Detention of Dual and Foreign Nationals for Leverage -- 7.1 Introduction -- 7.2 Arbitrary detentions and state-to-state leverage: the practice -- 7.3 The salience of labels: arbitrary detention, hostage-taking and unlawful coercion -- 7.3.1 The human rights violation of arbitrary detention -- 7.3.2 The crime of hostage-taking -- (i) 'Any person' -- (ii) 'In order to compel' -- (iii) Application to dual nationals detained in one of their states of nationality -- 7.3.3 Violating the principle of non-intervention -- 7.4 Negotiating release -- 7.5 Conclusions: the importance of multilateral approaches -- 8 Detention and Pandemic Exceptionality -- 8.1 Introduction -- 8.2 Human rights, infectious diseases and the positive obligation of non-discrimination -- 8.3 The proportionality of anti-COVID measures that deprive persons of their liberty -- 8.4 Quarantines, lockdowns and other pandemic-related restrictions on liberty -- 8.5 Confinement: positive obligations in a state of hyper-engagement -- 8.5.1 Reconciling the equivalence of care principle in a pandemic -- 8.5.2 Anti-COVID measures in detention centres -- 8.5.3 Access to vaccines and treatment for detainees -- 8.5.4 COVID-19 and justifications for early release -- 8.6 Conclusions: the transformative potential of positive obligations -- 9 Conclusions -- Index.
    Additional Edition: Print version: Ferstman, Carla Conceptualising Arbitrary Detention Bristol : Bristol University Press,c2024
    Language: English
    Keywords: Electronic books.
    URL: JSTOR
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Amsterdam/Philadelphia :John Benjamins Publishing Company,
    UID:
    almahu_9949420528702882
    Format: 1 online resource (402 pages)
    Edition: 1st ed.
    ISBN: 9789027257697
    Series Statement: Bilingual Processing and Acquisition Ser. ; v.13
    Content: This edited volume is a collection of theoretical and empirical overview of second language (L2) proficiency based on four skills: reading, writing, listening, and speaking.
    Note: Intro -- Understanding L2 Proficiency -- Editorial page -- Title page -- Copyright page -- Table of contents -- Acknowledgements -- References -- Notes on Authors -- Chapter 1. Introduction -- References -- Chapter 2. L2 reading comprehension: Theory and research -- 1. Introduction -- 2. Linguistic processing in reading -- 2.1 Phonological processing -- 2.2 Orthographic processing -- 2.3 Morphological processing -- 2.4 Lexical processing -- 2.5 Syntactic processing -- 2.6 Reading fluency -- 3. Cognitive processing in reading -- 4. Simple View of Reading -- 5. Differences between L1 and L2 reading in component skills -- 6. Cross-linguistic transfer in L2 reading -- 7. Cross-linguistic transfer in common skills -- 8. Effects of L1 components on L2 reading comprehension -- 8.1 Phonological skills -- 8.2 Orthographic skills -- 8.3 Morphological skills -- 8.4 Reading fluency -- 8.5 Linguistic comprehension skills -- 8.6 Factors affecting transfer -- 9. Conclusion -- References -- Chapter 3. L2 reading comprehension and its correlates: An updated Meta-Analysis -- 1. Introduction: Purpose of the present study -- 2. A review of reading theories and models that influenced the primary studies of L2 reading comprehension between 1979-2017 -- 3. Review of correlates of L2 reading comprehension -- 3.1 High-evidence correlates -- 3.2 Low-evidence correlates -- 4. Method -- 4.1 Literature search and inclusion criteria -- 4.2 Acceptable measures of L2 reading comprehension and its correlates -- 4.3 Analytical procedures -- 4.4 Meta-analytic procedures -- 5. Results -- 5.1 Results on high-evidence correlates and their moderators -- 5.2 Results on low-evidence correlates -- 6. Discussion -- 6.1 Decoding and L2 reading comprehension -- 6.2 Phonological awareness and L2 reading comprehension -- 6.3 Vocabulary knowledge and L2 reading comprehension. , 6.4 Grammar knowledge and L2 reading comprehension -- 6.5 L1 reading comprehension and L2 reading comprehension -- 6.6 L2 Listening comprehension and L2 reading comprehension -- 6.7 Working memory and L2 reading comprehension -- 6.8 Orthographic knowledge and L2 reading comprehension -- 6.9 Morphological knowledge and L2 reading comprehension -- 6.10 Metacognition and L2 reading comprehension -- 6.11 Oral reading fluency and L2 reading comprehension -- 7. Conclusion -- References -- Appendix A. Acceptable measures of included reading correlates and reading comprehension -- Appendix B. Moderator analysis results of high evidence correlates -- Chapter 4. L2 writing: Theory and research -- 1. Introduction -- 2. Defining (L2) writing proficiency -- 3. Sources of individual differences in cognitive models of writing -- 4. Process-product -- 5. L1-L2-FL -- 6. Measuring writing proficiency -- 7. Future (L2) writing and research -- References -- Chapter 5. L2 writing and its internal correlates: A meta-analysis -- 1. Introduction -- 2. Background to the meta-analysis -- 2.1 Review of objective measures -- 2.2 Review of subjective measures -- 2.3 Review of moderator variables -- 3. Research questions for the meta-analysis -- 4. Method -- 4.1 Literature search and inclusion criteria -- 4.2 Acceptable measures of L2 writing performance and internal correlates -- 4.3 Coding the primary studies -- 4.4 Research synthesis -- 5. Results -- 6. Discussion -- 6.1 Objective measures -- 6.2 Subjective measures -- 7. Conclusion -- References -- Appendix A. 103 studies included in the meta-analysis -- Appendix B. Acceptable measures of L2 writing performance and internal correlates -- Appendix B. Acceptable measures of L2 writing performance and internal correlates -- L2 Writing Performance -- Objective internal correlates -- References for Appendix B. , Chapter 6. L2 writing and its external correlates: A meta-analysis -- 1. Introduction -- 2. Background to the meta-analysis -- 2.1 Review of high-evidence correlates -- 2.2 Review of low-evidence correlates -- 2.3 Review of moderator variables -- 3. Research questions for the meta-analysis -- 4. Method -- 4.1 Literature search and inclusion criteria -- 4.2 Acceptable measures of L2 writing performance and external correlates -- 4.3 Coding the primary studies -- 4.4 Research synthesis -- 5. Results -- 6. Discussion -- 6.1 High-evidence correlates -- 6.2 Low-evidence correlates -- 7. Conclusion -- References -- Appendix A. 103 studies included in the meta-analysis -- Appendix B. Acceptable measures of included writing correlates and writing performance -- Appendix B. Acceptable measures of included writing correlates and writing performance -- Chapter 7. L2 listening comprehension: Theory and research -- 1. Background: A conceptual introduction to the key constructs and models of L2 listening -- 1.1 Taxonomies and data-driven examinations of L2 listening ability -- 1.2 Models of second language (L2) listening ability -- 1.3 L2 listening, L1 listening, and reading -- 2. Measurement practices: A critical discussion of how the constructs and their components have been operationalized and measured by empirical researchers -- 2.1 Interactive speaking/listening ability -- 2.2 Differentiating listening from reading -- 2.3 Length of the spoken text -- 2.4 Listening task response -- 2.5 Audio-only versus audio-visual input -- 2.6 Accent and dialect variety -- 2.7 Real-world spoken input -- 3. Conclusion -- References -- Chapter 8. L2 listening and its correlates: A meta-analysis -- 1. Introduction -- 2. Literature review -- 2.1 Linguistic knowledge -- 2.2 Cognitive ability -- 2.3 Affective features -- 2.4 Core and peripheral components of proficiency. , 3. Research questions -- 4. Method -- 4.1 Literature search -- 4.2 Study inclusion criteria -- 4.3 Coding -- 4.4 Analyses -- 5. Results -- 5.1 L2 listening and its overall components -- 5.2 L2 listening and each of its components -- 6. Discussion -- 6.1 Linguistic knowledge -- 6.2 Cognitive Ability -- 6.3 Affective features -- 6.4 Relationship between core and peripheral components of proficiency -- 6.5 Reliability issues -- 7. Conclusion -- References -- Appendix A. Books examined to collect studies for the meta-analysis -- Appendix B. 118 studies included in the meta-analysis -- Appendix C. Coding Sheet -- References for Appendix C -- Chapter 9. L2 speaking: Theory and research -- 1. Introduction -- 2. Theme 1: Models explaining L2 speaking and differences between L1 and L2 speech production -- 3. Theme 2: Representation and operationalization of fluency and vocabulary -- 4. Theme 3: The place and importance of pronunciation and accent -- 5. Theme 4: Accentedness, comprehensibility, and intelligibility -- 6. Might practice make perfect? -- References -- Chapter 10. L2 speaking and its internal correlates: A meta-analysis -- 1. Introduction -- 2. Literature review -- 2.1 Fluency -- 2.2 Accuracy, grammar, and vocabulary -- 2.3 Grammatical complexity and lexical complexity -- 2.4 Pronunciation, comprehensibility, delivery, content, and coherence -- 2.5 Measuring L2 speaking and its internal features -- 2.6 Relative strengths of relationships between L2 speaking and internal features -- 3. Current study and research questions -- 4. Method -- 4.1 Literature search -- 4.2 Study inclusion criteria -- 4.3 Coding -- 4.5 Analyses -- 5. Results -- 6. Discussion -- 6.1 Fluency -- 6.2 Grammatical complexity and lexical complexity -- 6.3 Pronunciation, comprehensibility, delivery, content, and coherence. , 6.4 Relative strengths of relationships between L2 speaking and internal features -- 7. Conclusion -- References -- Appendix A. 39 studies included in the meta-analysis -- Appendix B. Coding sheet -- Chapter 11. L2 speaking and its external correlates: A meta-analysis -- 1. Introduction -- 2. Review of variables -- 2.1 Vocabulary knowledge -- 2.2 Grammar knowledge -- 2.3 Three companion variables of L2 speaking: L2 reading comprehension, L2 listening comprehension, and L2 writing -- 2.4 Working memory -- 2.5 Metacognition -- 2.6 Language aptitude -- 2.7 Anxiety -- 3. Research question -- 4. Method -- 4.1 Literature search and inclusion criteria -- 4.2 Measures of L2 speaking and its correlates included in the study -- 4.3 Analytical procedures -- 4.4 Meta-analytic procedures -- 5. Results -- 5.1 L2 speaking and L2 vocabulary knowledge -- 5.2 L2 speaking and L2 grammar knowledge -- 5.3 L2 speaking and L2 reading comprehension -- 5.4 L2 speaking and L2 listening comprehension -- 5.5 L2 speaking and L2 writing -- 5.6 L2 speaking and working memory -- 5.7 L2 speaking and metacognition -- 5.8 L2 speaking and language aptitude -- 5.9 L2 speaking and anxiety -- 6. Discussion -- 6.1 L2 speaking and L2 knowledge variables: L2 vocabulary and L2 grammar -- 6.2 L2 speaking and language-general cognitive resources: Working memory and metacognition -- 6.3 The relationship between L2 speaking and three proficiency variables: L2 reading comprehension, L2 listening comprehension, and L2 writing -- 6.4 L2 speaking and language aptitude -- 6.5 L2 speaking and anxiety -- 7. Conclusion -- References -- Chapter 12. Discussion, limitations, and future research -- 1. Introduction -- 2. Relevant theories and models of L2 proficiency -- 3. Synthesis of findings of the 4 meta-analyses examining the relationship between L2 skills and their external correlates. , 3.1 Strengths of association between correlates and target L2 skills found across the four meta-analyses.
    Additional Edition: Print version: Jeon, Eun Hee Understanding L2 Proficiency Amsterdam/Philadelphia : John Benjamins Publishing Company,c2022 ISBN 9789027211170
    Language: English
    Subjects: Comparative Studies. Non-European Languages/Literatures
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books. ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    New York ; : Routledge,
    UID:
    almafu_9959020800702883
    Format: 1 online resource (379 pages)
    ISBN: 9781317502364 , 1317502361 , 9781138062740 , 113806274X , 9781315714899 , 1315714892 , 9781317502371 , 131750237X
    Series Statement: Routledge Studies in Contemporary Philosophy ; 67
    Content: Hate speech law can be found throughout the world. But it is also the subject of numerous principled arguments, both for and against. These principles invoke a host of morally relevant features (e.g., liberty, health, autonomy, security, non-subordination, the absence of oppression, human dignity, the discovery of truth, the acquisition of knowledge, self-realization, human excellence, civic dignity, cultural diversity and choice, recognition of cultural identity, intercultural dialogue, participation in democratic self-government, being subject only to legitimate rule) and practical considerations (e.g., efficacy, the least restrictive alternative, chilling effects). The book develops and then critically examines these various principled arguments. It also attempts to de-homogenize hate speech law into different clusters of laws/regulations/codes that constrain uses of hate speech, so as to facilitate a more nuanced examination of the principled arguments.
    Note: Description based upon print version of record. , Cover; Title; Copyright; Dedication; Contents; Table of Cases; Acknowledgments; 1 Introduction; 2 Ten Clusters of Laws/Regulations/Codes That Constrain Uses of Hate Speech; 2.1 Group Defamation; 2.2 Negative Stereotyping or Stigmatization; 2.3 The Expression of Hatred; 2.4 Incitement to Hatred; 2.5 Threats to Public Order; 2.6 Denying, etc. Acts of Mass Cruelty, Violence, or Genocide; 2.7 Dignitary Crimes or Torts; 2.8 Violations of Civil or Human Rights; 2.9 Expression-Oriented Hate Crimes; 2.10 Time, Place, and Manner Restrictions; 3 Principles of Basic Morality; 3.1 Health; 3.2 Autonomy , 3.3 Security3.4 Non-Subordination; 3.5 The Absence of Oppression; 3.6 Human Dignity; 4 Principles of Personal Development; 4.1 The Discovery of Truth; 4.2 The Acquisition of Knowledge; 4.3 Self-Realization; 4.4 Human Excellence; 5 Principles of Civic Morality; 5.1 Civic Dignity; 5.2 Assurance; 5.3 Eligibility; 6 Principles of Cultural Diversity; 6.1 Culture; 6.2 Misrecognition; 6.3 Cultural Specificity; 6.4 Intercultural Dialogue; 7 Principles of Political Morality; 7.1 Democratic Self-Government; 7.2 Political Legitimacy; 7.3 Citizens as Legal Subjects; 8 Principles of Balance , 8.1 Rights-Based Balancing8.2 Interests-Based Balancing; 9 Principia Juris; 9.1 Pressing Social Need; 9.2 Efficacy; 9.3 The Least Restrictive Alternative; 9.4 The Avoidance of Unintended Consequences for Free Speech; 9.5 Neutrality; 10 Toward a Theory of Principled Compromise; 10.1 Why Overall Warrant Should Be Neither about Lexical Priorities among Principles nor Balancing between Principles; 10.2 Overall Warrant as Compromise over Principles; 10.3 Conjunction Compromise; 10.4 Substitution Compromise; 10.5 A Detailed Illustration: The Principle of Neutrality; 10.6 The Ethics of Compromise , 10.7 Two Possible Objections11 Conclusion; References; Index , English
    Additional Edition: ISBN 0-415-88547-7
    Additional Edition: ISBN 1-336-14877-2
    Language: English
    Keywords: Electronic books ; Electronic books
    URL: OAPEN
    URL: OAPEN
    URL: Volltext  (kostenfrei)
    URL: OAPEN
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9948582030902882
    Format: XXVI, 1726 p. 969 illus., 670 illus. in color. , online resource.
    Edition: 1st ed. 2020.
    ISBN: 9783030418625
    Content: This volume gathers selected, peer-reviewed original contributions presented at the International Conference on Computational Vision and Bio-inspired Computing (ICCVBIC) conference which was held in Coimbatore, India, on November 29-30, 2018. The works included here offer a rich and diverse sampling of recent developments in the fields of Computational Vision, Fuzzy, Image Processing and Bio-inspired Computing. The topics covered include computer vision; cryptography and digital privacy; machine learning and artificial neural networks; genetic algorithms and computational intelligence; the Internet of Things; and biometric systems, to name but a few. The applications discussed range from security, healthcare and epidemic control to urban computing, agriculture and robotics. In this book, researchers, graduate students and professionals will find innovative solutions to real-world problems in industry and society as a whole, together with inspirations for further research.
    Note: Chapter 1: Image Encryption based on 3 Dimensional Multi Linear (3D-MLT) Chaotic Transformation -- Chapter 2: A Computer Vision Based Approach for Object Recognition in Smart Buildings -- Chapter 3: A Cascade Color Image Retrieval Framework for Image Retrieval -- Chapter 4: Enhanced Geographical Information System Architecture for Geospatial Data -- Chapter 5: IoT Based Power Management and Condition Monitoring in Microgrid -- Chapter 6: A Comparative performance study of cloud resource scheduling techniques -- Chapter 7: Image Context Based Similarity Retrieval System -- Chapter 8: Emotions Recognition from Spoken Marathi Speech using LPC and PCA Technique -- Chapter 9: Implementation of Point Of Care system Using Bio-Medical Signal Stegano-graphy -- Chapter 10: Privacy assurance with content based access protocol to secure cloud storage -- Chapter 11: Leaf Recognition using Artificial Neural Network -- Chapter 12: Data Security in Cloud Using RSA and GNFS Algorithms - An Integrated Approach -- Chapter 13: Machine Learning Supported Statistical Analysis of IoT Enabled Physical Location Monitoring Data -- Chapter 14: A Genetic Algorithm based System with Different Crossover Operators for Solving the Course Allocation Problem of Universities -- Chapter 15: Detecting Anomalies in Credit Card Transaction Using Efficient Techniques -- Chapter 16: Secure Data Processing System using Decision Tree Architecture -- Chapter 17: A Novel Framework for Detection of Morphed images using Deep Learning Techniques -- Chapter 18: A Novel Non-invasive Framework for Predicting Bilirubin Levels -- Chapter 19: A Comprehensive Study on the Load Assessment Techniques in Cloud Data Center -- Chapter 20: Multimodal biometric system using Ear and Palm Vein recognition based on GwPeSOA - Multi-SVNN for security applications -- Chapter 21: E-Agriculture -- Chapter 22: Ultra Wide Band Monopole Antenna Design by Using Split Ring Resonator -- Chapter 23: Green supply chain management of chemical Industrial development for warehouse and its impact on the environment using artificial bee colony algorithm: A Review Articles -- Chapter 24: A Novel Dyno-Quick Reduct Algorithm For Heart Disease Prediction Using Supervised Learning Algorithm -- Chapter 25: Impact of Meltdown and Spectre Threats in Parallel Processing -- Chapter 26: Algorithm For Finding Minimum Dominating Set Using Sticker Based Model In Dna Computing -- Chapter 27: Assistive Technology Evolving as Intelligent System -- Chapter 28: A Bio Potential Sensor Circuit of AFE DesignWith CT ∑-∆ Modulator -- Chapter 29: Image Encryption based on Transformation and Chaotic Substitution -- Chapter 30: An Efficient Geographical Opportunistic Routing Algorithm Using Diffusion and Sparse Approximation Models for Cognitive Radio Ad Hoc Networks -- Chapter 31: Traffic Violation Tracker and Controller -- Chapter 32: PTCWA: Performance Testing of Cloud based Web Applications -- Chapter 33: Analysis of Regularized Echo State Networks on the Impact of Air Pollutants on Human Health -- Chapter 34: Detection of Cancer by Biosensor through Optical Lithography -- Chapter 35: Paradigms in Computer Vision: Biology Based Carbon Domain Postulates Nano Electronic Devices for Generation Next -- Chapter 36: A Secure Authenticated Bio-Cryptosystem Using Face Attribute Based On Fuzzy Extractor -- Chapter 37: Implementation of Scan logic and Pattern generation for RTL Design -- Chapter 38: Optimization Load Balancing Over Imbalance Datacenter Topology -- Chapter 39: Text Attentional Character Detection using Morphological Operations: A Survey -- Chapter 40: IoT Based Environment Monitoring System -- Chapter 41: Design & Development of Algorithms for Detection of Glaucoma Using Water Shed Algorithm -- Chapter 42: A novel development of glaucoma detection technique using the water shed algorithm -- Chapter 43: Solutions of Viral Dynamics in Hepatitis B Virus Infection using HPM -- Chapter 44: A Mathematıcal Modelıng Of Dengue Fever For The Dynamıcs System Usıng HAM -- Chapter 45: Vision-based Robot for Boiler Tube Inspection -- Chapter 46: Qualitative Study on Data Mining Algorithms for classification of Mammogram Images -- Chapter 47: Designing a framework for data migration of Odoo ERP PostgreSQL database into NoSQL database -- Chapter 48: Juxtaposition on classifiers in modeling Hepatitis Diagnosis Data -- Chapter 49: Voltage Stabilization By Using Buck Converters In The Integration Of Renewable Energy Into The Grid -- Chapter 50: OCR System For Recognition of Used Printed Com-ponents For Recycling -- Chapter 51: Modern WordNet: An Affective Extension of WordNet -- Chapter 52: Analysis of Computational Intelligence Techniques for Path Planning -- Chapter 53: Techniques for Analysis of the Effectiveness of Yoga through EEG Signals: A Review -- Chapter 54: Multiobjective integrated stochastic and deterministic search method for economic emission dispatch problem -- Chapter 55: Enhanced webpage prediction using Rank based Feedback Process -- Chapter 56: A study on distance based representation of molecules for statistical learning -- Chapter 57: Comparative Analysis of Evolutionary Approaches and computational methods for optimization in Data Clustering -- Chapter 58: Bringing Digital Transformation from a Traditional RDBMS Centric Solution to a Big Data Platform with Azure Data Lake Store -- Chapter 59: Smart Assist For Alzheimer's Patients And Elderly People -- Chapter 60: An Unconstrained Rotation Invariant Approach For Document Skew Estimation And Correction -- Chapter 61: Smart Assistive Shoes For Blind -- Chapter 62: Comparative study on Various techniques involved in designing a Computer Aided Diagnosis (CAD) System for mammogram classification -- Chapter 63: Traffic Flow Prediction Using Regression and Deep Learning Approach -- Chapter 64: A Comparative Study on Assessment of Carotid Artery Using various Techniques -- Chapter 65: Evaluation of Fingerprint Minutiae on Ridge Structure Using Gabor and Closed hull Filters -- Chapter 66: A Perspective View on Sybil Attack Defense Mechanisms in Online Social Networks -- Chapter 67: Minor Finger Knuckle Print Image Enhancement using CLAHE Technique -- Chapter 68: Learning Path Construction Based On Ant Colony Optimization and Genetic Algorithm -- Chapter 69: Pneumonia Detection And Classification Using Chest X-Ray Images With Convolutional Neural Network -- Chapter 70: Juxtaposition on classifiers in modeling Hepatitis Diagnosis Data -- Chapter 71: An Optimized Approach Of Outlier Detection Algorithm for Outlier Attributes on Data Streams -- Chapter 72: Indo - Pak Sign Language Translator Using Kinect -- Chapter 73: Semantic interoperability for a defining Query -- Chapter 74: Gestational Diabetics prediction using Logisitic Regression in R -- Chapter 75: IOT Based Gas Pressure Detection for LPG with real time No SQL Database -- Chapter 76: Hybrid Steerable Pyramid with DWT for Multiple Medi-cal Image Watermarking and Extraction using ICA -- Chapter 77: Dimensional & Spatial Analysis of Ultrasound Imaging through Image Processing - A Review -- Chapter 78: A Review on methods to handle Uncertainty -- Chapter 79: Identity-based Hashing and Light Weight Signature Scheme for IoT -- Chapter 80: Adaptive Particle Swarm Optimization Based Wire-length Minimization for Placement in FPGA -- Chapter 81: Clustering of Various Diseases by Collagen Gene Using the Positional Factor -- Chapter 82: Prediction Of Water Demand For Domestic Purpose Using Multiple Linear Regression -- Chapter 83: Implementation of Regression Analysis using Regression Algorithms for Decision Making In Business Domains -- Chapter 84: Blockchain Based System for Human Organ Transplantation Management -- Chapter 85: Identification of Melanoma using Convolutional Neural Networks for Non Dermoscopic Images -- Chapter 86: Exploitation Of Data Mining To Analyse Realistic Facts From Road Traffic Accident Data -- Chapter 87: A Deep Learning Approach f , Detection of Alzheimer's Disease in Brain MR Images using Hybrid Local Graph Structure -- Chapter 93: A Review on Object Tracking Wireless Sensor Network an Approach For Smart Surveilliance -- Chapter 94: A Mini Review on Electrooculogram Based Rehabilitation Methods Using Bioengineering Technique for Neural Disorder Persons -- Chapter 95: Applications Using Machine Learning Algorithms for Developing Smart Systems -- Chapter 96: Benchmarking of Digital Forensic Tools -- Chapter 97: An Item Based Collaborative Filtering For Similar Movie Search -- Chapter 98: Identification of Musical Instruments Using MFCC Features -- Chapter 99: An Instance Identification Using Randomized Ring Matching via Score Generation -- Chapter 100: Performance Improvement of Multi-Channel Speech Enhancement using Modified Intelligent Kalman Filtering Algorithm -- Chapter 101: A Collaborative Method for Minimizing Tampering of Image with commuted concept of Frazile Watermarking -- Chapter 102: Interval Type-2 Fuzzy Logic Based Decision Support System for Cardiac Risk Assessment -- Chapter 103: Classification Of Multi-Retinal Disease Based On Retinal Fundus Image Using Convolutional Neural Network -- Chapter 104: Accurate Techniques of Thickness and Volume Measurement of Cartilage from Knee Joint MRI using Semiautomatic Segmentation Methods -- Chapter 105: A Hybrid Approach Using Machine Learning Algorithm For Prediction Of Stock Arcade Price Index -- Chapter 106: Disease severity diagnosis for rice u.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783030418618
    Additional Edition: Printed edition: ISBN 9783030418632
    Additional Edition: Printed edition: ISBN 9783030418649
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almafu_9958058426302883
    Format: 1 online resource (162 p. ) , ill..
    ISBN: 1-280-08062-0 , 9786610080625 , 92-64-17305-6
    Content: This seminar, which took place on 2-3 October 1997 at the Josefow Conference Centre near Warsaw, set out to define the role and place of communication in the field of road safety, examine the different strategies of communication and identify their limits. The seminar was attended by 130 experts from 23 countries with ECMT membership or observer status. The discussions established that communication is an essential element of a global road safety policy in that it aims to inform, alert, educate, convince and ultimately alter people’s attitudes and behaviour. The resources employed and the channels of communication used can differ from country to country, depending on the topic addressed, the national culture and the goals to be achieved. Communication cannot be an end in itself, however: it can only be the complement of other measures. It must have a time frame within which the objectives set have to be attained. Evaluation of communication effectiveness is likewise essential.
    Note: Bibliographic Level Mode of Issuance: Monograph , Welcome by the Minister of Transport and Maritime Economy of Poland, Mr B. Liberadski -- Opening Speech by the Secretary-General of the ECMT, Mr. G. Aurbach -- Working Session No. 1: Purposes and Strategies of Communication -- 1. Place of Communication on Road Safety Policy -- 1.1. Role and Objectives Pursued by Communication by Mr. M. Ledru -- 1.2 Actors in the Communication Process: Transmitters-Receivers by W. Kelmenjak -- 1.3 Tools and Aids for Communication by Mr. E. PRediger and Mr. R. Trottein -- 2. New Strategies of Communication -- 2.1 Added Value of Social Marketing by Mr. Horn -- 2.2 Strategies in Function of the Level where Transmitter is Situationed: Local, Regional, National, or International -- 2.2.1 Promoting Road Safety in the European Union by G. Preston -- 2.2.2 The Role of Communication in road Safety Activities in Hungary by G. Csaszar -- 2.3 Communication Strategies Adapted to Defined Group of Receivers -- 2.3.1 Children, Teenagers, Adults -- 2.3.1.1 How to Communicate on Road Safety with Children by V. Bartulis -- 2.3.1.2 Mrs. E. Libraire -- 2.3.1.3 Mrs. T. Bernacer -- 2.3.1.4 Project "Personal Communication" Addressing Students in Schools of Further Education by Mr. Maginot -- 2.3.2 Policy Makers, Journalists -- 2.3.2.1 Mrs M. Dabrowska-Loranc -- 2.3.3 Private Partners by B. Gatin -- 2.3.4 Road Haulers by Mr. Kofalvi -- 2.3.5 Particular Groups: Influence of Alcohol, Drugs, or Medicines -- 2.3.5.1 Mr. Mikkonen -- 2.3.5.2 Mr. Allsworth -- 2.3.5.3 Mrs. Schevelenbos -- Working Session No. 2. Constraints and Limits to Communication Strateties -- 3. Constraints and Difficulties to be Taken into Consideration -- 3.1 Obtaining the Political Will to Communicate in Road Safety -- 3.2 Financial Means by Mr. Goos -- 3.3 Officials and Professionals Organizations Examining Public Opinion and Preparing Campaigns by Mr. Mikulik -- 3.4 Evalutaion Methods to the Efficiency of Campaigns by Mr. Jarvinen -- 4. Limits of Communication Strategies -- 4.1 Admission to the Communication Media by Mr. Flensted-Jensen -- 4.2 Why Communication can not be the Only Element of Road Safety Policy by Mr. Rothengatter -- 4.3 Efficiency Comparison Between Environment and Safety Campaigns by Mr. Turcz -- 4.4 Conclusions from the Nordic Conference held in Sandvik by Mr. Lyster -- Closing Session -- Summary of Discussions by Mr. Huguenin -- Follow up -- ECMT Group on Road Safety by Mr.Courtois -- Polish National Road Safety Council by Mr. Grzegorczyk -- Closing by the Director General of Roads Mr. Suwara , English
    Additional Edition: ISBN 92-821-1237-3
    Language: English
    Subjects: Engineering , Economics
    RVK:
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift ; Konferenzschrift ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949319310202882
    Format: 1 online resource (924 pages)
    ISBN: 9783110540048
    Series Statement: De Gruyter Proceedings Ser.
    Note: Intro -- Preface -- Committees -- Keynote Speech I Decentralized SIEPON-Based ONU-Initiated Tx/TRx Energy-Efficiency Mechanism in EPON -- Keynote Speech II A Glass Half Full or Half Empty: Water Resouces in Western China - an Earth Observation and Data Analytics Perspective -- Keynote Speech III Heterogeneous Catalysis and Environmental Nanomaterials for Water Decontamination: Promises, Challenges and Research Needs -- Keynote Speech IV Computational Studies of Molecules and Materials Pertaining to Environmental Science and Sustainable Energy -- Table of Content -- Session l. Environmental Science and Ecology -- Study on Immature Embryos of Sorghum Tissue Culture -- PSO Algorithm Based Shredding Parameter Optimizing for the Body of ELV -- The Effects of Organic Manure Produced by TWR Technology on Rape Growth, Heavy Metals Accumulation and Soil Physical and Chemical Properties -- Study on Establishment of Regeneration System of Sorghum Seed -- Air Pollutants Emitted by Coal Resources City: Health Risks for the Population Living in the Neighborhood -- Evolution of Cold Day Index Based on Minimum Temperature and Its Impact on Crop Yield -- Effect of Oxytetracycline Wastewater on the MDA Contents and SOD Activities in Zebrafish Muscle Tissue -- Thermal Perceptions Responding to a Diversity of Urban Ecological Environments -- A Health Assessment of the Ecosystem in Shuangtaihekou Wetland -- Flammability of Building Thermal Insulation Materials Using Self-designed Adiabatic Specimen Holder in Cone Calorimeter -- Identification of Key Odor Compounds from Three Kinds of Wood Species -- A Study on the Global Carbon Emission -- Seasonal Variability of Calanus Sinicus Brodsky in the Western South Yellow Sea -- Application of Indigenous Microbial Activation System in Ecological Remediation of Nanfeihe River Water Body. , Session 2. Strategy of Sustainable Development -- Climate Change and Externality: Empirical Evidences from the EKC of CO< -- sub> -- 2< -- /sub> -- and PM< -- sub> -- 10< -- /sub> -- -- Study on the Reflection Characteristics of Ceramic Tile Building Materials to Solar Radiation -- Research Status of Sorghum Straw Utilization -- The Technical Method and Key Issues of the Delimitation of Ecological Protection Red Line at County Scale -- Impact of Environmental Regulation on Technological Innovation: Differences among Industries Categories -- On the Relationship between Industrial Growth and Environmental Pollution in Jiangsu Province and Policy Recommendations -- A review on the Usage of Natural Gas and Its Outlook -- Regional Comparison of Air Pollution in China -- An Analysis on Chinese Primary Energy Consumption -- Global Natural Gas Consumption History and Energy Consumption Pattern -- Study on Design Idea of ADB-funded, Integrated Treatment Project of Huainan Urban Water System -- Session 3. Energy Science and Technology -- Research on Popularization and Application of Agricultural Water Saving Technology in China -- Adsorption Properties of Phenol in Aqueous Solution with Different Acidic Adsorption Resins -- Design of the Cabin in the Ultra-Low-Temperature Refrigerated Vessel -- Removal of an Azo Dye Acid Red 114 by Iris Pseudacorus and Its Photosynthetic Response -- The Innovative Design of Lift Type Multi-body Straw Biomass Gasifier -- Research & -- amp -- Development on the EEWT Facility -- Further Analysis on Triple Mode Powertrain for HEV -- Static Characteristic of Self-compensated Hydrostatic Bearing -- Process and Equipment Design for the Dry Slag Granulation Technology -- Research and Application of HTHP Dynamic Linear Swell Meter. , Research on Thin-Walled Components in High Speed Milling for Machining Distortion Control -- Effect of DC Magnetic Biasing on the Temperature Rise of High-voltage Winding of Power Transformer -- Session 4. Control Theory and Application -- Kinematic Analysis of 6-DOF Stewart Platform -- Application of Agricultural Sensors Overview -- Session 5. Materials -- An Analysis on Chinese Graphite Resource and Its Development Suggestions -- Isotope Geochemistry of the Shimensi Deposit: Implication for Ore Genesis -- Simulation of β-stabilised γ-TiAl Alloy Rolling and Its Defects Analyses -- Polarization Dependence of Defect Mode in One-dimensional Magnetic Photonic Crystal -- Preparation and Characterization of TiO< -- sub> -- 2< -- /sub> -- -xNx with High Visible Light Activity -- Session 6. Artificial Intelligence and Computer Science -- An Optimized MaxRPC Algorithm with a New Search Strategy -- Deep Learning based Design Image Management -- The Ultrasonic Detection Terrain Data Processing Based on Adaptive Kalman Filtering -- A Two-phase Heuristic Algorithm for No-wait Flow Shop Scheduling -- Session 7. Sensors -- The Design of Laser Liquid Level Measurement System Based on FPGA and MCU -- On-line Monitoring Long Memory Parameter Change Point in FARIMA Processes -- Detection System of Temperatures and Displacements for CNC Machine Tool Based On Lab VIEW -- A Method of Diagnosing Boiler Four-Tube Leakage Rate -- Research on Fault Detection and Diagnosis for Small Unmanned Aerial Vehicle -- Evaluation of the Uncertainty in the Determination of Arsenic in Cosmetics by Inductively Coupled Plasma-mass Spectrometry (ICP-MS) -- Experimental Study of Residual Stress State of Laser Induced Membrane System -- Session 8. Control System and Automation -- Contouring-Error Reduction by Combination of Tracking-Error Compensation and Cross- Coupled Control. , The Multi-parameter Detection System of Industrial Controller -- Mechatronical Dual-Redundancy Steering Gear System in Vehicle -- The Vector Control System Design of PMSM Based on DSP Motor Controller -- Research on Improvement of Direct Torque Control System for Permanent Magnet Synchronous Motor -- Cascade ADRC Based Robust Flight Control with System Potential Uncertainties -- A Digital Trigger of Thyristor Rectifier for High Voltage Formed Aluminum Foil Based on DSP -- Tcp Congestion Control Strategy Based on Multi-Level Priority Queue -- Power Control of Wireless Power Supply System Based on Fuzzy PID Control -- Load Scheduling Based on Game Theory with Coupled Constraints -- Session 9. Advanced Design and Manufacturing -- Based On the Test Track Minimum Radius of Expressway Ramp -- Modeling and Testing of an ICPTs Used in Dynamic Balancing Device -- Study on the Coordination Principle of Innovative Manufacturing Elements Based on Internet plus -- Design of a Semi-active Heave Compensation System Combined Variable Frequency with Throttle -- Design of Auxiliary Arm for High Voltage Live Working Robot -- Investigation on Integrated Digital Platform of High Power Converter with Power Factor Correction for Formed Aluminium Foil -- Thermal-mechanical Coupling Analysis of Screw Discharge Machine Based on ANSYS -- Improved XY-axis Calibration Based on Bilinear Interpolation -- Research of E36 Steel Welding Process for Jinzhou 9-3 Offshore Platform -- Finite Element Analysis and Optimum Design of a Video Laryngoscope -- An Instrumented Glove for Real Time Feedback on Hand Gripping Pressure and Bending a Pilot Study -- Optimization of Crank Mechanism of Multifunctional Nursing Bed Based on ADAMS -- Research on the Mechanism of Industry Integration between Shaanxi Advanced Manufacturing and Modern Service Industry. , Session 10. Emerging Fields and Other Related Fields -- Application of MATLAB in University Physics Teaching -- The Impact of Innovation Strategy on Firm Financial Performance -- Transverse-Load Characteristics of Long Period Fiber Gratings Fabricated By Femtosecond Laser Pulses.
    Additional Edition: Print version: Wang, Yong Esse 2017 Berlin/Boston : Walter de Gruyter GmbH,c2017 ISBN 9783110539134
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books. ; Conference papers and proceedings. ; Electronic books ; Konferenzschrift
    URL: Full-text  ((OIS Credentials Required))
    URL: Volltext  (Open Access)
    URL: Volltext  (Open Access)
    URL: Cover
    URL: Cover
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Amsterdam University Press | Amsterdam :Amsterdam University Press,
    UID:
    almafu_9958103483302883
    Format: 1 online resource (345 pages) : , illustrations; digital, PDF file(s)..
    Edition: 1st ed.
    ISBN: 9789048519453 , 9048519454
    Series Statement: Open Access e-Books
    Uniform Title: Cinéma, contre spectacle.
    Content: Jean-Louis Comolli’s six-part essay Technique and Ideology had a revolutionary effect on film theory and history when it first appeared in Cahiers du Cinéma in 1971. In 2009, Comolli revisited his earlier text, arguing that the present age, marked by the total dominance of media-filtered spectacle over image production, makes the need for an 'emancipated, critical spectator' more pressing than ever. In this volume, Daniel Fairfax presents annotated translations of these two texts to provide an overview of Comolli’s activity as both a theorist and a filmmaker.
    Note: "Originally published as : Cinema, contre spectacle, Jean-Louis Comolli ;©Editions VERDIER, 2009". , Cinema against Spectacle -- Introduction -- Cinema against Spectacle -- I.Opening the Window? -- II.Inventing the Cinema? -- III.Filming the Disaster? -- IV.Cutting the Figure? -- V.Changing the Spectator? -- Technique and Ideology: Camera, Perspective, Depth of Field -- Introduction -- I.On a Dual Origin -- The ideological place of the "base apparatus" -- Birth = deferral: The invention of the cinema -- II.Depth of Field: The Double Scene -- Bazin's "surplus realism" -- The work of "transparency" -- For a materialist history of the cinema -- "For the first time..." -- III."Primitive" Depth of Field -- IV.Effacement of Depth/Advent of Speech -- V.Which Speech?. , Also available in print form. , Translation from the French of Cinéma, contre spectacle.
    Additional Edition: ISBN 9789089645548
    Additional Edition: ISBN 9089645543
    Language: English
    Keywords: Electronic books.
    URL: OAPEN
    URL: JSTOR
    URL: Image
    URL: Full text available: 2015.  (Available in Books at JSTOR: Open Access.)
    URL: Full text available: 2015.  (Available in De Gruyter Open Access eBooks.)
    URL: Full text available: 2015.  (Available in OAPEN (Open Access Publishing in European Networks).)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Canberra :ANU Press,
    UID:
    almahu_9949319362202882
    Format: 1 online resource (402 pages)
    ISBN: 9781760463434
    Content: Intermediate Ancient Greek Language is a series of Lessons and Exercises intended for students who have already covered most of an introductory course in the ancient Greek language. It aims to broaden and deepen students' understanding of the main grammatical constructions of Greek.
    Note: Intro -- Abbreviations and Symbols -- Introduction -- Lesson 1. Time and Aspect of the Indicative Mood -- 1.1. Tense -- 1.2. Forms and Functions -- 1.3. Time and Aspect (Summary) -- EXERCISE 1 -- Lesson 2. Aspect in the Imperative, Subjunctive and Optative Moods -- 2.1. Introduction -- 2.2. Forms -- 2.3. Functions -- EXERCISE 2 -- Lesson 3. Infinitive -- 3.1. Introduction -- 3.2. Forms -- 3.3. Functions -- 3.4. Infinitive without Article -- 3.5. Infinitive with Article -- EXERCISE 3 -- Lesson 4. Participles -- 4.1. Introduction -- 4.2. Forms -- 4.3. Functions -- 4.4. Negatives -- EXERCISE 4 -- Lesson 5. Genitive Absolute -- 5.1. The Usual Construction -- 5.2. Subject Unexpressed -- 5.3. Improper Genitive Absolute -- EXERCISE 5 -- Lesson 6. Accusative Absolute -- 6.1. Introduction -- 6.2. So-Called Impersonal Verbs -- 6.3. Verbs Used Impersonally in the Passive Voice -- 6.4. Neuter Adjectives -- 6.5. Personal Accusative Absolute -- 6.6. Note -- EXERCISE 6 -- Lesson 7. Verbal Adjectives Ending in -τος, -τη, -τον -- 7.1. Introduction -- 7.2. Formation of Verbal Adjectives Ending in ‑τος, ‑τη, ‑τον -- 7.3. Meaning of Verbal Adjectives Ending in -τος, -τη, -τον -- EXERCISE 7 -- Lesson 8. Verbal Adjectives Ending in -ττ̔̈”ΑΓ·ος, -ττ̔̈”ΑΓ·α, -ττ̔̈”ΑΓ·ον -- 8.1. Formation of Verbal Adjectives Ending in -ττ̔̈”ΑΓ·ος, -ττ̔̈”ΑΓ·α, -ττ̔̈”ΑΓ·ον -- 8.2. Usage of Verbal Adjectives Ending in -ττ̔̈”ΑΓ·ος, -ττ̔̈”ΑΓ·α, -ττ̔̈”ΑΓ·ον -- 8.3. Impersonal Construction -- 8.4. Personal Construction -- 8.5. Ambiguous Constructions -- 8.6. Agent in Accusative -- 8.7. Construction Continued with Infinitive -- 8.8. Impersonal Passive Construction -- EXERCISE 8 -- Lesson 9. Voice -- 9.1. English -- 9.2. Greek -- 9.3. Uses of the Middle Voice -- 9.4. The Development of the Middle Voice -- EXERCISE 9 -- Lesson 10. Commands -- 10.1. Introduction -- 10.2. Negative Commands -- 10.3. Virtual Commands -- 10.4. Reported Commands. , EXERCISE 10 -- Lesson 11. Wishes -- 11.1. Wishes for the Future -- 11.2. Unfulfilled Wishes for the Present and the Past -- 11.3. Reported Wishes -- 11.4. Reported Wishes Instead of Direct Wishes -- 11.5. Interrogative Wishes Combined with Deliberative Subjunctive -- EXERCISE 11 -- Lesson 12. Directly Reported Speech -- 12.1. Homer -- 12.2. Drama -- 12.3. Historiography -- 12.4. Prose Quotation Formulae -- 12.5. ὅτι and ὡς as Quotation Markers -- EXERCISE 12 -- Lesson 13. Reported Statements with ὅτι or ὡς -- 13.1. Introduction -- 13.2. Reported Statements in Primary Sequence -- 13.3. Reported Statements in Past Sequence -- 13.4. Vivid Construction -- EXERCISE 13 -- Lesson 14. Reported Statements with Infinitive -- 14.1. Aspect of the Infinitive -- 14.2. Accusative and Infinitive Phrases -- 14.3. Nominative and Infinitive Phrases -- 14.4. Exceptional Accusative and Infinitive Phrases -- 14.5. Negative -- 14.6. Usage -- 14.7. Passive of λτ̔̈”ΑΓ·γειν -- EXERCISE 14 -- Lesson 15. Reported Knowledge and Perception -- 15.1. Introduction -- 15.2. Reported Knowledge or Perception with ὅτι or ὡς -- 15.3. Reported Knowledge or Perception with a Participial Phrase -- 15.4. Physical Perception -- 15.5. Reported Knowledge or Perception with an Infinitive Phrase -- EXERCISE 15 -- Lesson 16. Reported Thoughts, Hopes, Promises and Oaths -- 16.1. Reported Thoughts -- 16.2. Reported Hopes and Promises -- 16.3. Reported Oaths -- EXERCISE 16 -- Lesson 17. Questions -- 17.1. Ordinary Questions -- 17.2. Alternative Questions -- 17.3. Questions with Interrogative Adjectives or Adverbs -- 17.4. Deliberative Questions -- 17.5. Rhetorical Questions -- EXERCISE 17 -- Lesson 18. Reported Questions -- 18.1. Reported Ordinary Questions -- 18.2. ἆρα in Reported Questions -- 18.3. Reported Alternative Questions -- 18.4. Reported Questions with Interrogative Adjectives or Adverbs. , 18.5. Reported Deliberative Questions -- EXERCISE 18 -- Lesson 19. Conditions -- 19.1. Introduction -- 19.2. Open Conditions -- 19.3. Unfulfilled Conditions -- 19.4. Mixed Conditions -- 19.5. The Negative in If-Clauses -- EXERCISE 19 -- Lesson 20. Homeric Conditions -- 20.1. Introduction -- 20.2. Open Conditions -- 20.3. Unfulfilled Conditions -- EXERCISE 20 -- Lesson 21. Subordinate Clauses in Reported Discourse -- 21.1. Reported Complex Sentences -- 21.2. Reported Subordinate Clauses in Primary Sequence -- 21.3. Reported Subordinate Clauses in Past Sequence -- 21.4. Assimilation of Construction -- 21.5. Vivid Construction -- EXERCISE 21 -- Lesson 22. Result Constructions -- 22.1. Natural Result -- 22.2. Comparative Result -- 22.3. Actual Result -- 22.4. Adjectival Clauses of Result -- 22.5. Provisos -- 22.6. Antecedents for Result Constructions -- 22.7. ὥστε = 'And so' -- EXERCISE 22 -- Lesson 23. Causal Constructions -- 23.1. Adverbial Clauses of Cause -- 23.2. Adjectival Clauses of Cause -- 23.3. Causal Participles -- 23.4. Coordinating Use of ἐπετ̔̈”ΑΕ· and ὡς -- EXERCISE 23 -- Lesson 24. Constructions with Verbs of Effort and Caution -- 24.1. Introduction -- 24.2. Primary Sequence -- 24.3. Past Sequence -- 24.4. Variations of the Constructions in 24.2 and 24.3 -- 24.5. Infinitive Constructions -- 24.6. Omission of Main Clause -- EXERCISE 24 -- Lesson 25. Adjectival Clauses -- 25.1. Introduction -- 25.2. Definite Clauses Introduced by ὅς -- 25.3. Indefinite Clauses Introduced by ὅς -- 25.4. Indefinite Clauses Introduced by ὅστις -- 25.5. Coordinating Use of the Relative Adjective or Pronoun -- 25.6. Parenthetic ὅστις Clause -- 25.7. Special Uses of ὅστις and ος̔̀ αν̓́ -- EXERCISE 25 -- Lesson 26. Concessive Constructions -- 26.1. Introduction -- 26.2. Concessive Participial Phrases -- 26.3. Concessive Clauses -- EXERCISE 26. , Lesson 27. Purpose Constructions -- 27.1. Prepositions -- 27.2. Infinitive -- 27.3. Participles -- 27.4. Adjectival Clauses of Purpose -- 27.5. Adverbial Clauses of Purpose -- EXERCISE 27 -- Lesson 28. Clauses of Comparison -- 28.1. Introduction -- 28.2. Definite Comparison -- 28.3. Indefinite Comparison -- 28.4. Potential, Conditional and Temporal Constructions -- 28.5. Other Correlative Adjectives and Adverbs -- EXERCISE 28 -- Lesson 29. Expressions of Hindering, Forbidding, Denying and Failing -- 29.1. Introduction -- 29.2. Direct Object -- 29.3. Genitive of Separation -- 29.4. Infinitive after a Positive Expression -- 29.5. εμ̓ποδων́ -- 29.6. Infinitive after a Negative Expression -- 29.7. Result Construction -- 29.8. Effort Construction -- 29.9. Conditional Construction -- 29.10. Participial Construction -- 29.11. Passive Constructions -- EXERCISE 29 -- Lesson 30. Temporal Constructions 1: Clauses in Primary Sequence -- 30.1. Introduction -- 30.2. Contemporaneous Action in Temporal Clause -- 30.3. Prior Action in Temporal Clause -- 30.4. Subsequent Action in Temporal Clause: Indefinite -- EXERCISE 30 -- Lesson 31. Temporal Constructions 2: Clauses in Past Sequence -- 31.1. Introduction -- 31.2. Contemporaneous Action in Temporal Clause -- 31.3. Prior Action in Temporal Clause -- 31.4. Subsequent Action in Temporal Clause -- EXERCISE 31 -- Lesson 32. Temporal Constructions with πρτ̔̈”ΑΕ·ν -- 32.1. Introduction -- 32.2. πρτ̔̈”ΑΕ·ν with an Infinitive Phrase -- 32.3. πρτ̔̈”ΑΕ·ν with a Finite Verb -- EXERCISE 32 -- Lesson 33. Adverbial Clauses of Place and Manner -- 33.1. Adverbial Clauses of Place -- 33.2. Adverbial Clauses of Manner -- 33.3. Adverbial Clauses of Place Expressing Purpose -- 33.4. Adverbial Clauses Distinguished from Noun Clauses -- EXERCISE 33 -- Lesson 34. Noun Clauses with Expressions of Emotion -- 34.1. Introduction -- 34.2. Verbs of Emotion. , 34.3. ετ̔̈»Ε”«· Clause as Subject -- 34.4. Negatives with ὅτι and ετ̔̈»Ε”«· Clauses -- 34.5. General Comments -- EXERCISE 34A -- EXERCISE 34B -- Lesson 35. Expressions of Fearing -- 35.1. Introduction -- 35.2. Verbs of Fearing with Noun or Pronoun as Object -- 35.3. Verbs of Fearing with Infinitive Phrase as Object -- 35.4. Verbs of Fearing with a μτ̔̈”ΑΔ· Clause as Object -- 35.5. Fears that Something is (etc.) Actually Happening -- 35.6. Fears Expressed with Other Conjunctions -- 35.7. Introductory Noun Phrases -- 35.8. Note -- EXERCISE 35A -- EXERCISE 35B -- Lesson 36. Nominative and Vocative Cases -- 36.1. Nominative as Subject -- 36.2. Nominative as Complement -- 36.3. Predicate Nominative with Passive Verb -- 36.4. Quoted Nominative -- 36.5. Nominative Address -- 36.6. Nominative Exclamation -- 36.7. Vocative -- 36.8. Hanging Vocative -- EXERCISE 36 -- Lesson 37. Accusative Case -- 37.1. Accusative as Direct Object -- 37.2. Adverbial Uses of the Accusative -- 37.3. Accusative in Apposition to a Sentence -- EXERCISE 37 -- Lesson 38. Genitive Case 1 -- 38.1. Introduction -- 38.2. Simple Possessive Genitive -- 38.3. Subjective Genitive -- 38.4. Objective Genitive -- 38.5. Partitive Genitive -- 38.6. Genitive of Definition (or Apposition) -- 38.7. Genitive of Description (or Quality) -- 38.8. Genitive of Material -- 38.9. Genitive of Measure -- 38.10. Genitive of Price or Value -- EXERCISE 38 -- Lesson 39. Genitive Case 2 -- 39.1. Introduction -- 39.2. Possessive Genitive -- 39.3. Partitive Genitive -- 39.4. Genitive of Separation -- 39.5. Genitive with Compound Verbs -- EXERCISE 39 -- Lesson 40. Dative Case 1 -- 40.1. Introduction -- 40.2. Dative of Interest -- 40.3. Dative of Accompaniment (or Sociative Dative) -- EXERCISE 40 -- Lesson 41. Dative Case 2 -- 41.1. Locative -- 41.2. Means or Instrument -- EXERCISE 41 -- Lesson 42. Prepositions -- 42.1. Adverbs. , 42.2. Compound Verbs.
    Additional Edition: Print version: Palmer, Darryl Intermediate Ancient Greek Language Canberra : ANU Press,c2021 ISBN 9781760463427
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9949552644702882
    Format: XXIII, 557 p. 176 illus., 128 illus. in color. , online resource.
    Edition: 1st ed. 2023.
    ISBN: 9789819936113
    Series Statement: Advances in Intelligent Systems and Computing, 1450
    Content: The volume is a collection of high-quality, peer-reviewed research papers presented at the Third International Conference on Mathematical Modeling and Computational Science (ICMMCS 2023), held during 24 - 25 February 2023 in hybrid mode. The topics covered in the book are mathematical logic and foundations, numerical analysis, neural networks, fuzzy set theory, coding theory, higher algebra, number theory, graph theory and combinatory, computation in complex networks, calculus, differential educations and integration, application of soft computing, knowledge engineering, machine learning, artificial intelligence, big data and data analytics, high performance computing, network and device security, Internet of Things (IoT).
    Note: Chapter 1: Neuro-Fuzzy Logic Application in Speech Recognition -- Chapter 2: A Machine Learning Model for Predicting Covid-19 -- Chapter 3: Thyroid Disease Prediction using a Novel Classification Enhancing MLP and Random Forest Algorithms -- Chapter 4: Youtube Sentimental Analysis using a Combined Approach of KNN and K-Means Clustering Algorithm -- Chapter 5: Big Data Analytics: Hybrid Classification in Brain Images using BSO and SVM -- Chapter 6: Breast Cancer Detection using Hybrid Segmentation using FOA and FCM Clustering -- Chapter 7: Hybrid Optimization using CC and PSO in Cryptography Encryption for Medical Images -- Chapter 8: Boundary Element Method for Water Wave Interaction with Semi-circular Porous Wave Barriers Placed over Stepped Seabed -- Chapter 9: Fostering Stem Education Competency for Elementary Education Students at Universities of Pedagogy in Vietnam -- Chapter 10: Blockchain based E-Medical Data Storage for Privacy Protection. etc.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789819936106
    Additional Edition: Printed edition: ISBN 9789819936120
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages