To see the other types of publications on this topic, follow the link: Yami language.

Journal articles on the topic 'Yami language'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 45 journal articles for your research on the topic 'Yami language.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lai, Li-Fang, and Huiju Hsu. "Contact-induced sound change: analysis of the alveolar lateral fricative in Yami." Eesti ja soome-ugri keeleteaduse ajakiri. Journal of Estonian and Finno-Ugric Linguistics 4, no. 2 (May 21, 2013): 31–50. http://dx.doi.org/10.12697/jeful.2013.4.2.02.

Full text
Abstract:
Language change manifests itself in various ways. The majority of studies on language change in Yami, an endangered Austronesian language spoken on Orchid Island, Taiwan, have centered on the rapid language shift from Yami to Mandarin within the speech community (Chen 1998, Li and Ho 1988, Lin 2007, Rau 1995). The present study, however, aims to explore whether the sound change of [ɮ] to [l] in Yami (e.g., soli [ʂuɮi] > [ʂuli] 'taro') is triggered by language contact between Mandarin and Yami. Three variables were considered: Mandarin competence, Mandarinspeaking frequency, and social network integration. The results showed that the three variables were strongly correlated with sound change. Participants possessing advanced Mandarin competence, higher Mandarin-speaking frequency, and/or weaker social network integration into the Yami community (i.e., greater exposure to Mandarin) tended to exhibit the highest rate of sound change, which might be attributed to a cross-linguistic influence from Mandarin to Yami through extensive language contact.
APA, Harvard, Vancouver, ISO, and other styles
2

Jeon, Kwang-jin. "Hangeul Writing System for Yami Language in Taiwan." Journal of Chinese Literature 73 (November 30, 2018): 239–70. http://dx.doi.org/10.31985/jcl.73.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lai, Li-Fang, and Shelome Gooden. "The spread of raised (ay) and (aw) in Yami: From regional distinctiveness to ethnic identity marker." Journal of Linguistic Geography 6, no. 2 (October 2018): 125–44. http://dx.doi.org/10.1017/jlg.2018.8.

Full text
Abstract:
This article extends previous analyses on (ay) and (aw) raising in Yami, an endangered Austronesian language spoken on Orchid Island, Taiwan. Two patterns of (ay) and (aw) variation co-exist in Yami—the more conservative/unraised variants and the innovative/raised forms—each of which indexes an authentic regional identity. Results from recent data suggest that Yami has undergone significant changes in just one generation as the raised variants are now preferred by younger islanders and have started permeating through non-raising areas. Traumatic shifts in the ecological context on Orchid Island help explain this sound change. Economically, rapid shift from fishing/farming to tourism trades promotes daily face-to-face communications among younger islanders, which has catalyzed the spread of nucleus raising to non-raising areas. Sociopsychologically, ongoing intergroup conflicts between islanders and mainland Taiwanese may further trigger the sound change, altering nucleus raising into a new communal system which highlights Yami identity in opposition to Others.
APA, Harvard, Vancouver, ISO, and other styles
4

Chihjen, Cheng. "Existential, Possessive and Locative Constructions in Yami Language: A comparative study to Formosan languages." Macrolinguistics 8, no. 12 (June 30, 2020): 55–67. http://dx.doi.org/10.26478/ja2020.8.12.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Glock, Hans-Johann. "Logic and natural language: On plural reference and its semantic and logical significance, by Hanoch Ben-Yami (Aldershot: Ashgate, 2004)." Language & Communication 27, no. 1 (January 2007): 28–40. http://dx.doi.org/10.1016/j.langcom.2006.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kulikov, Leonid. "The First Woman Yamī, Her Origin and Her Status in Indo-Iranian Mythology: Demigoddess or Half-human? (Evidence from R̥gveda 10.10, Iranian Parallels and Greek Relatives)." Studia Ceranea 8 (December 30, 2018): 43–75. http://dx.doi.org/10.18778/2084-140x.08.03.

Full text
Abstract:
This paper focuses on the mythology of Yamī and her twin-brother Yama (the first humans according to Indo-Iranian mythology), their non-human origin and some aspects of Yamī’s behaviour which presumably betray a number of features of a female half-deity. The relationships between Yamī and Yama are the central topic of the dialogue hymn Rgveda 10.10, where Yamī attempts to seduce her twin to incest in order to produce offspring and thus continue the human race. This offer is refused by Yama, who refers to the inappropriateness of incest. Although Yamī and Yama are humans according to the Vedic tradition, their origin from two half-deities – a Gandharva father and an Apsara mother – remains inexplicable: how could a couple of non-human beings (half-deities or demons) give birth to humans? Obviously, the mythological status of the twins should be reconsidered. I argue that at least one of them, Yamī, retains immortality and some other features of the non-human (semi-divine) nature. On the basis of the analysis of the Yama and Yamī hymn and some related Vedic texts, I argue that this assumption may account for certain peculiarities of Yamī’s behaviour – particularly her hypersexuality (which can be qualified as demonic type of behaviour), as opposed to the much more constrained, human type of conduct displayed by Yama. Given the notoriously lustful character of the Gandharvas, an origin from this semi-divine creature may account for Yamī’s hypersexuality. Although the word gandharvá- does not have Indo-European etymology, we can find possible Indo-European parallels. In particular, the Gandharvas are comparable with the Centaurs, which cannot be etymologically related but possibly originate in the same non-Indo-European source. There are some reasons to assume that both words are borrowed from the Kassite language and mythology, which, in turn, may have been related to the language and culture of the Proto-North-Caucasians. Although we do not find exact equivalents of Yamī outside of the Indo-Iranian pantheon, indirect parallels can be found in other Indo-European traditions. The Apsaras (water nymphs) can be compared to a variety of water deities (nymphs) in Greek mythology, such as the Naiads, or to the Slavic rusalki.
APA, Harvard, Vancouver, ISO, and other styles
7

Riesberg, Sonja. "Optional ergative, agentivity and discourse prominence – Evidence from Yali (Trans-New Guinea)." Linguistic Typology 22, no. 1 (April 25, 2018): 17–50. http://dx.doi.org/10.1515/lingty-2018-0002.

Full text
Abstract:
Abstract A phenomenon often termed “optional ergative marking” is found in a number of genetically unrelated languages. Yali, a Trans-New Guinea language spoken in West Papua, shows striking similarities to optional ergative systems as described in the literature. This paper focuses on the relation between agentivity and discourse prominence, and argues in favour of a systematic distinction between semantic and syntactic contexts as conditioning factors for optional ergative marking. It further provides new evidence for the close interplay of ergative marking and what has been termed “discourse prominence” in descriptions of some other languages and shows that in Yali, optional ergative marking operates on both the global and the local level of discourse.
APA, Harvard, Vancouver, ISO, and other styles
8

Shigeru, M. "Yagi, Religion and Language, Language of Religino." THEOLOGICAL STUDIES IN JAPAN, no. 35 (1996): 167–72. http://dx.doi.org/10.5873/nihonnoshingaku.1996.167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Davlatova, S. "Official Words in Dictionary Diwan Lughat at-Turk by M. Kashgari and Their Relationship With the Modern Kyrgyz Language." Bulletin of Science and Practice 7, no. 4 (April 15, 2021): 500–507. http://dx.doi.org/10.33619/2414-2948/65/61.

Full text
Abstract:
The relevance of the research: defining the role of the modern Kyrgyz language as one of the ancient Turkic languages and defining the development process of the Kyrgyz language. Purpose of the research: to analyze the types of official words in the written monument of the XI century in the dictionary Diwan Lughat at-Turk by Mahmud Kashgari by types, to compare the facts with the modern Kyrgyz language and determine the level of their use. The object of the research is M. Kashkari’s dictionaries translated into the Kyrgyz language. The research was carried out using the historical-comparative method. The vocabulary of the dictionary has been studied in comparison with the materials of the modern Kyrgyz language. In some cases, facts from related languages were also used. As a result, the words in the M. Kashgari dictionary are divided into the following types: particles, after words, conjunctions, modal words. In addition, the level of use of official words in the dictionary of the modern Kyrgyz language was determined: words that occur in the dictionary and are used in the modern Kyrgyz language without semantic and phonetic changes: köp kök – kөpkөk, sap sarɪğ — yellow, qup–kup, çulq–chylk, ҫaq – dal, chak, üçün — for, etc.; service words used in the case of phonetic change: ҫɪm-chylk, la — yes, taky — one more, shu — chu, ärdi — so, birlän — with someone (something), yana — and so on; unused service words by their appearance in the dictionary: uș — exactly like, yama — yes, — yes, isrä — then, son, ärinç — maybe etc. Dictionary Diwan Lughat at-Turk by Mahmud Kashgari contains information about the history of the Kyrgyz language, historical lexicology, comparative study of the official words of the Turkic languages.
APA, Harvard, Vancouver, ISO, and other styles
10

Althur, Simin. "The Morphosyntactic Properties in Angguruk Dialect of Yali Language." International Journal of Language and Linguistics 5, no. 1 (2017): 6. http://dx.doi.org/10.11648/j.ijll.20170501.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Toth, Robert. "Historias de la Meibukan Gojyu Ryu Karate según Yagi Meitatsu." Revista de Artes Marciales Asiáticas 2, no. 3 (July 18, 2012): 76. http://dx.doi.org/10.18002/rama.v2i3.320.

Full text
Abstract:
<p class="MsoNormal" style="text-align: justify; margin: 0cm 0cm 6pt;"><span style="mso-ansi-language: EN-US;" lang="EN-US"><span style="font-size: small;"><span style="font-family: Calibri;">Gojyu-ryu karate has the distinction of being the first of the Okinawan karate styles to be officially named (Higaonna, 1995: 68). Miyagi Chojun created the style and formally registered the name with the Japanese Government in 1933 (Hiagonna, 1985: 28). The late<span style="mso-spacerun: yes;"> </span>Yagi Meitoku was Miyagi Chojun’s most senior karate student. After Miyagi Chojun’s death, the Miyagi family chose Yagi Meitoku to carry on the style’s traditions. Yagi taught the system to his two sons. The oldest son, Meitatsu, carries on not only the style’s technical finesses and its philosophy, but also the stories that make up its history.</span></span></span></p>
APA, Harvard, Vancouver, ISO, and other styles
12

Siregar, Alvii TB, and Evangeline H. "KEMAMPUAN BERBAHASA INGGRIS, MOTIVASI DAN SIKAP TERHADAP BAHASA INGGRIS MAHASISWA PROGRAM STUDI ILMU KEPERAWATAN (S1) STIKES JENDERAL ACHMAD YANI CIMAHI." Jurnal Skolastik Keperawatan 3, no. 1 (June 12, 2017): 11. http://dx.doi.org/10.35974/jsk.v3i1.575.

Full text
Abstract:
ABSTRAK Latar belakang: Penelitian yang dilaksanakan di STIKes Jendral Achmad Yani Bandung tahun 2010 mengindikasikan mahasiswa keperawatan masih mengalami masalah dalam proses belajar mengajar ketika materi yang diberikan berbahasa Inggris. Khususnya textbook, artikel keperawatan dan materi lain yang berbahasa Inggris, masih dianggap sulit untuk dimengerti oleh sebagaian besar mahasiswa. Walaupun motivasi mahasiwa cukup tinggi serta sikap mereka sangat mendukung terhadap pembelajaran dan penggunaan bahasa Inggris, nyatanya responden mendapatkan skor rendah dalam test kemampuan membaca text keperawatan berbahasa Inggris. Tujuan: Penelitian ini bertujuan mendeskripsikan lebih lanjut motivasi dan sikap mahasiswa keperawatan terhadap bahasa Inggris. Metode: Data dikumpulkan dengan melakukan test kemampuan berbahasa Inggris berstandar internasional, serta memberikan kuisioner yang mengukur motivasi dan sikap terhadap bahasa Inggris, kepada mahasiswa keperawatan tingkat 3 (tiga) semester 6, Programs Studi Ilmu Keperawatan S1 Stikes Jenderal Achmad Yani Cimahi. Hasil: Hasil penelitian didapatkan walaupun responden mendapatkan skor yang rendah dalam test kemampuan berbahasa Inggris, mereka memiliki motivasi tinggi dan sikap yang mendukung terhadap bahasa Inggris. Diskusi: Hal ini menggambarkan dibutuhkan metoda yang lebih inovatif dan efektif dalam pembelajaran bahasa Inggris dengan tujuan adanya peningkatan kemampuan berbahasa Inggris mahasiswa keperawatan, khususnya di STIKes Jenderal Achmad Yani Cimahi.  Kata kunci : kemampuan berbahasa Inggris, motivasi, sikap  ABSTRACT Introduction: A research conducted at STIKes Jenderal Achmad Yani Cimahi in 2010 indicated how students were still experiencing problems with their study where English is mediatory language. In particular, English textbooks, articles, and other resources were considered by the majority of the participants to be difficult to process. Despite their high motivation and attitude towards learning and using English, the participants scored low in their readability tests. Objective: This study continues to investigate factors that influence their ability in using English. It focuses on the factor of the language mastery in relations to the learner’s motivation and attitude towards English. Method: The descriptive investigation was conducted with participants from third year students of STIKes Jenderal Ahmad Yani, Cimahi by measuring their English skills with an international standardized English test and giving questionnaires on their attitude and motivation towards the importance of English. Result: The results showed that despite the low scores in the mastery of the language their high motivation and attitude also exhibited a need to have an approach different from the current methods to aid with their English skills enhancement, especially methods in their learning process. Discussion: Thus, insight gained may prove critical in building a suitable English learning program in the institute or other school with similar conditions. Keywords: attitude, English proficiency, English learning, motivation
APA, Harvard, Vancouver, ISO, and other styles
13

Rahmah, Yuliani. "PERGESERAN MAKNA DALAM CERPEN HACHI NO JI YAMA." KIRYOKU 2, no. 4 (December 4, 2018): 30. http://dx.doi.org/10.14710/kiryoku.v2i4.30-37.

Full text
Abstract:
(Title: Meaning Shift in Japanese Short Story “Hachi No Ji Yama”) A literary work will be translated properly according to the original text if an interpreter does the translation procedure appropriately. The translation procedure itself is divided into 14 types, but in the translation process from Japanese into Indonesian, there are three types which commonly used in procedures of the translation process. It is Transposition, Modulation, and Adaptation. This paper tried to explain the use of that three types of translation procedures in a Japanese short story. The short story used as the object of this paper was a children's short story entitled Hachi no Ji Yama by Tsuchida Kohei. Referring to the translation rules, the results are that the Hachi no Ji Yama short story uses 2 translation procedures, which is transposition and modulation. With the differences in the rules of language and grammatical structure between Indonesian and Japanese, the most widely used of transposition procedures are the first and second types, while the modulation used is free modulation.
APA, Harvard, Vancouver, ISO, and other styles
14

Aichatou, Aboubakar Nana. "Discursive Analysis of Hausa Language Use in a Kannywood Film: Basaja Gidan Yari." Advances in Literary Study 09, no. 02 (2021): 42–52. http://dx.doi.org/10.4236/als.2021.92006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yamashita, Junko. "Possibility of semantic involvement in the L1-L2 congruency effect in the processing of L2 collocations." Journal of Second Language Studies 1, no. 1 (May 7, 2018): 60–78. http://dx.doi.org/10.1075/jsls.17024.yam.

Full text
Abstract:
Abstract A growing body of second language (L2) research has identified the congruency effect in the processing of L2 collocations (L2 collocations that have word-for-word translation equivalents in learners’ first language [L1] are processed more quickly and accurately than those that have no such forms in L1). However, the locus of this effect has yet to be fully understood. This study explored the possibility of semantic involvement in this phenomenon by categorizing congruent and incongruent items used in the past studies according to the semantic transparency of collocations. Results showed a clear dominance of transparent items in the congruent category and that of opaque items in the incongruent category, suggesting the possibility of semantic involvement in the congruency effect. However, considerations of other factors observed in the pertinent studies led to the conclusion that there is something more in the congruency effect beyond semantic transparency.
APA, Harvard, Vancouver, ISO, and other styles
16

Oldfield, Benjamin J. "When You Got the Yams—Kendrick Lamar and the Language of Power in Clinical Encounters." JAMA 319, no. 16 (April 24, 2018): 1642. http://dx.doi.org/10.1001/jama.2018.3768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Wiyatasari, Reny. "Konsep Uchi-Soto Dalam Penerjemahan Yari-Morai." Chi'e: Journal of Japanese Learning and Teaching 8, no. 1 (March 28, 2020): 57–63. http://dx.doi.org/10.15294/chie.v8i1.36808.

Full text
Abstract:
This study aims to describe the understanding of Japanese language students about the ‘uchi-soto’ concept which is the standard for Japanese people when using the ‘yari-morai’ expression. This also relates to the process of translating speeches containing the verb ‘yari-morai’. Data sources are Japanese manga (Japanese) and a questionnaire that lists structured questions. The method used in data collection is the listening method with tapping technique as the basic technique and the listening-free-engaged-conversation technique as an advanced technique. Whereas in the analysis using contextual and descriptive methods, the sentence is analyzed by explaining the context, the concept of ‘uchi-soto’ in relation to the use of ‘yari-morai’ auxiliary verbs, assessing the results of the translation and relating it to the concept of ‘uchi-soto’ in the linguistic realm. The results of this study indicate 1) in the yaru and ageru verbs, it was found that the respondents' understanding of the uchi-soto concept was the same lack. 2) on the morau verb, the authors found that respondents were able to determine the uchi-soto relationship and 3) in the kureru verb, some respondents can distinguish and determine the uchi-soto relationship well, however, when the kureru verb becomes kudasaru, even though the respondent can still recognize the uchi-soto relationship, some 100% of the translating results of the respondent are incorrect. So, from the students' understanding of the concept of uchi-soto which is associated with the results of translation it is known that it does not significantly correlate with student competence in translating utterances that contain yari-morai verbs and vice versa. Although some respondents answered correctly the uchi-soto relationship of the speakers involved in a conversation, it was not in accordance with the translation that resulted from both accuracy and acceptance. On the other hand, although the respondent is able to translate the fragments from the utterances, it is not able to determine the right relationship between speakers with other parties in the given conversation situation. Keywords: expressions; uchi-soto; yari-morai; translation
APA, Harvard, Vancouver, ISO, and other styles
18

Nadzir, Norsaidah Muhamad, M. K. A. Rahim, F. Zubir, A. Zabri, and H. A. Majid. "Wireless Sensor Node with Passive RFID for Indoor Monitoring System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (June 1, 2017): 1459. http://dx.doi.org/10.11591/ijece.v7i3.pp1459-1466.

Full text
Abstract:
This paper discusses the development of an indoor monitoring system based on passive radio frequency identification (RFID) system and Raspberry Pi 3. There are two algorithms designed for this project where the first is to link the RFID module to the Raspberry Pi 3, and the other one is to send the data obtained to a database over wireless network via UDOO Quad as a secondary router. The result is then displayed on a localhost generated using XAMPP. The objective of this project is to realize a monitoring system that incorporates different systems such as Raspberry Pi 3, UDOO Quad, and also RFID module by designing algorithms using Python and C programming language. Plus, the performance of the system is also analyzed using different type of antennas such as the Raspberry Pi 3 Antenna, monopole antenna, and a Yagi Uda antenna in terms of power received versus distance in both line of sight position and non-line of sight position. Finally, antenna that produces the best performance for line-of-sight (LOS) propagation is Yagi Uda antenna while monopole antenna is better when it comes to non-line-of-sight (NLOS) propagation.
APA, Harvard, Vancouver, ISO, and other styles
19

Krikler, Benjamin Edward, Olivier Davignon, Lukasz Kreczko, and Jacob Linacre. "The FAST-HEP toolset: Using YAML to make tables out of trees." EPJ Web of Conferences 245 (2020): 06016. http://dx.doi.org/10.1051/epjconf/202024506016.

Full text
Abstract:
The Faster Analysis Software Taskforce (FAST) is a small, European group of HEP researchers that have been investigating and developing modern software approaches to improve HEP analyses. We present here an overview of the key product of this effort: a set of packages that allows a complete implementation of an analysis using almost exclusively YAML files. Serving as an analysis description language (ADL), this toolset builds on top of the evolving technologies from the Scikit-HEP and IRIS-HEP projects as well as industry-standard libraries such as Pandas and Matplotlib. Data processing starts with event-level data (the trees) and can proceed by adding variables, selecting events, performing complex user-defined operations and binning data, as defined in the YAML description. The resulting outputs (the tables) are stored as Pandas dataframes which can be programmatically manipulated and converted to plots or inputs for fitting frameworks. No longer just a proof-of-principle, these tools are now being used in CMS analyses, the LUX-ZEPLIN experiment, and by students on several other experiments. In this talk we will showcase these tools through examples, highlighting how they address the different experiments’ needs, and compare them to other similar approaches.
APA, Harvard, Vancouver, ISO, and other styles
20

Koroglu, Lenura Ablyamitovna. "Russian lexicon in the lexical-semantic space of the newspaper “Tercüman”." Litera, no. 5 (May 2021): 214–21. http://dx.doi.org/10.25136/2409-8698.2021.5.35534.

Full text
Abstract:
The subject of this article is the Russian lexicon used in the Turkic-language texts of the newspaper &ldquo;Terc&uuml;man&rdquo; (Translator) of the late XIX century. The author determines the following thematic groups of the Russian loanwords: military, journalistic, political vocabulary, legal, pedagogical, economic, and literary studies lexicon, as well as the names of food and consumer goods. The examples of sociopolitical borrowed lexicon are most common, as they are the leading feature of the newspaper language. Description is given to the methods of explaining Russian lexicon in the Turkic-language text. In the provided examples, the Russian lexicon is both explicable and explanatory. Semanticization is carried out via explanatory conjunction &ldquo;yani&rdquo; (that is). In some examples, Russian equivalents are given in parentheses or comma separated. Use of the Russian lexeme in the text without clarification, indicates its earlier borrowing into the Crimean Tatar language. The scientific novelty of this research consists in determination of the Russian loanwords used in the Crimean Tatar written language of the late XIX century, as well as in broadening knowledge in the field of the history of lexicology of the Crimean Tatar language. The conducted research allows tracing the diachrony of infiltration of the Russian loanwords into the Crimean Tatar language, as well as reveals the international lexicon that came into the Crimean Tatar language through the means of Russian language and retains the Russian phonic sounds. Leaning on the provided examples, the author examines grapho-phonetic peculiarities and spelling of the Russian loanwords in Arabic text in the Crimean Tatar language. This work may be valuable for further research of the history infiltration and peculiarities of the use of Russian loanwords in the Crimean Tatar language.
APA, Harvard, Vancouver, ISO, and other styles
21

Yaiche, Sameh, Isabelle Maillochon, and Dominique Bassano. "L’émergence du figement dans la production langagière précoce." Language, Interaction and Acquisition 11, no. 2 (November 25, 2020): 196–231. http://dx.doi.org/10.1075/lia.20002.yai.

Full text
Abstract:
Résumé Malgré l’importance prise par le thème du figement dans la recherche récente, l’étude de la production des séquences figées ou semi-figées au tout début du langage reste encore très peu développée. Le présent article examine l’émergence du figement chez l’enfant en adoptant une approche comparative inter langues. L’étude se base sur les corpus longitudinaux de production spontanée de deux enfants, l’un francophone et l’autre arabophone tunisien, enregistrés entre 18 et 42 mois. L’objectif est d’identifier les unités complexes, de les caractériser et d’en évaluer l’importance dans la production précoce en fonction de la langue en acquisition. Les résultats montrent, malgré les profondes différences structurales opposant les langues examinées, de très nettes tendances communes que l’on peut considérer comme des caractéristiques générales du développement du figement. L’étude fait apparaître aussi des particularités dans le développement des deux enfants, tant au plan des variables générales que du lexique simple et du lexique figé, particularités que nous discutons à la lumière du contraste typologique français/arabe.
APA, Harvard, Vancouver, ISO, and other styles
22

Kusuma, A. B., and R. E. Elson. "A note on the sources for the 1945 constitutional debates in Indonesia." Bijdragen tot de taal-, land- en volkenkunde / Journal of the Humanities and Social Sciences of Southeast Asia 167, no. 2-3 (2011): 196–209. http://dx.doi.org/10.1163/22134379-90003589.

Full text
Abstract:
A close examination of the papers held in the archive of Mr A.K. Pringgodigdo in the Nationaal Archief in The Hague indicates that Muhammad Yamin, presumably for the purpose of his own self-aggrandisement, changed important sections of the original text in his 1959-60 edition of the 1945 constitutional debates in Indonesia. Furthermore, the New Order’s efforts to reduce the legacy and legitimacy of Soekarno led Nugroho Notosusanto, in particular, to use Yamin’s work in an effort to diminish Sukarno’s role in the development of the state ideology of Pancasila.
APA, Harvard, Vancouver, ISO, and other styles
23

Hamsiah, Hamsiah, Muhammad Rafi Tang, Achmad Tolla, and Jufri Jufri. "Teaching Materials Development for Basic General Course of Indonesian Language Class Based on Culture Values Elompungi (Elong) Bugis Literature." Journal of Language Teaching and Research 8, no. 2 (March 1, 2017): 278. http://dx.doi.org/10.17507/jltr.0802.08.

Full text
Abstract:
This research aims to design basic course learning materials (MKDU) Indonesian Language for University students Bosowa Makassar, by integrating the values of local culture in the form of classical poetry (Elompugi) as an alternative, in efforts to preserve the local culture, a way to appreciate literary works become teaching material based on character education. The main problems of this research are: (1) how to identify and develop Elompugi values as course materials for the basic course like Indonesian language course? Model development for teaching materials and learning tools that will be used in this study refers to the design of Jerold E. Kemp in Yamin (2012) divides the nine components: (1) The results are to be achieved, (2) analysis of test subjects, (3) special purpose of learning, (4) learning activities, (5) learning resources, (6) the supporting facilities, (7) the study evaluation, (8) the initial tests, (9) the learning characteristics. This is demonstrated by a mean response of each respondent is 4.00 (respondents 1) and 4.40 (respondent 2) with a mean total of 4.20. This is proved by a mean response of each respondent is 4.00 (respondents 1) and 4.40 (respondent 2) with a total average of 4.30.
APA, Harvard, Vancouver, ISO, and other styles
24

곽형덕. "The Adaptation Process in Kim Sa Ryang’s Japanese-language Novels -with focus on Kusa fukashi and Yama no kamigamii." Journal of Korean Modern Literature ll, no. 38 (June 2009): 245–75. http://dx.doi.org/10.35419/kmlit.2009..38.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Dentan, Robert Knox. "Potential food sources for foragers in Malaysian rainforest; Sago, yams and lots of little things." Bijdragen tot de taal-, land- en volkenkunde / Journal of the Humanities and Social Sciences of Southeast Asia 147, no. 4 (1991): 420–44. http://dx.doi.org/10.1163/22134379-90003176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Pitard, Wayne T. "The Binding of Yamm: A New Edition of the Ugaritic Text KTU 1.83." Journal of Near Eastern Studies 57, no. 4 (October 1998): 261–80. http://dx.doi.org/10.1086/468652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Karakoç, İrfan. "For the love of modernity: adventures of the novel or trails of the genre in the second half of the 19th centuryModernite aşkına: Türkçe romanın sergüzeşti yahut XIX. yüzyılın ikinci yarısında türün izini sürmek." Journal of Human Sciences 16, no. 1 (February 23, 2019): 231. http://dx.doi.org/10.14687/jhs.v16i1.5670.

Full text
Abstract:
During the second half of the 19th century, while the Ottoman press, publishing and literary platforms were flourishing, a need for a more “practical” language of writing arose to convey ideas, and there was a great need to have a new, a more practical language while writing. A language that can convey an idea, a language that can produce information, and a writing style that can spread both. This need for a new language is emphasized by the prominent figures of “New Literature”, and to these writers and prominent figures in the Ottoman state novel as a genre seemed promising for the modernization of Ottoman society as a whole.This article is focusing on the novel’s function during the second half of the 19th century. At the centre of the matter is the reaction of Ottoman –Turkish intelligentsia to the new genre. The article is trying to depict the relationship between classical forms and the new genre and how writers were motivated to merge and create a local novel genre. While doing that we will be mentioning why and how this new genre made local by the names, such as sergüzeşt and hikaye and it’s communication with the “acaib u garaib – supernatural stories” of the Middle Eastern classical literature.Extended English summary is in the end of Full Text PDF (TURKISH) file. ÖzetOsmanlı basın ve edebiyat ortamının 1850’lerden sonra hareketlenmeye başlamasının da etkisiyle, edebiyatın fikri, düşünceyi ifade edebilecek, bilgi üretecek ve onu yayacak bir “yazı dili”ne ihtiyacı açık bir şekilde anlaşılmıştır. Bu ihtiyaç, “yeni edebiyat”ın önemli temsilcileri ve modernleşmeye çalışan devletin yöneticileri tarafından da sıklıkla vurgulanmıştır. İşte bu yönetici/yazarlar, modernleşmek için ihtiyaç duydukları bu yeni dili, çok yönlü bir şekilde kullanabilecekleri bir araç olan romanla kurabileceklerini fark etmişlerdir.Türün XIX. yüzyılın ikinci yarısındaki serüvenine odaklanan bu çalışmada, işte bu yazı dilinin Osmanlı-Türk edebiyatında yazar, okur, matbuat yani edebiyat kamusu tarafından nasıl algılandığı üzerinde düşünülecektir. Makalede, doğayı, insanı, toplumu anlatan romanın, Osmanlı edebiyatına girişine kadar dolaşımda olan hikâye etme pratikleriyle olan ilişkisi de göz önünde bulundurulacaktır. Ayrıca, bu ilişkinin edebiyat tarihi araştırmalarında yorumlanma tarzı, türe gösterilen davranış kalıpları Osmanlı-Türkiye modernleşme refleksleri üzerinden tartışılacaktır. Bu bağlamda türün sergüzeşt, hikâye kelimeleriyle yerelleştirilmesi, ahlâkı temel alan bir yapıyla yazılması ve Ortadoğu klasik edebiyatlarında görülen “acâib ü gâraib” anlatılarıyla bağlantısı tartışılacaktır.
APA, Harvard, Vancouver, ISO, and other styles
28

Jacobsen, M., A. Fritz, R. Dhingra, and R. Postle. "A Psychophysical Evaluation of the Tactile Qualities of Hand Knitting Yarns." Textile Research Journal 62, no. 10 (October 1992): 557–66. http://dx.doi.org/10.1177/004051759206201001.

Full text
Abstract:
A technique based on the semantic differential method of attitude measurement was developed for use with consumers. Using semantic grids derived from consumer preferences, some twenty bipolar attributes pertaining to tactile qualities were evaluated for hand knitting yarns in the ball and fabric states. The yarns and the resultant fabrics used in the evaluations represent six styles of commercially marketed hand knitting yarns. Using consumer concepts of the “ideal” yarn or fabric, commercially available products may be assessed for their worth and market potential. Results indicate a significant consumer preference for yarns containing a small percentage of specialty hair fiber, pure wool, or wool rich blends. Furthermore, responses to yarns in the ball state and the fabric state differ markedly in some instances, indicating that at the point of purchase, initial impressions may prejudice purchasing decisions. From objective measures of yarn and fabric compressional properties and yarn bending properties correlated with the subjective data, a complete picture of the samples under investigation emerges. The results indicate that certain of the bipolar attributes correlate significantly with the objective measurements. This indicates that the human hand is able to detect small mechanical deformations in yams and fabrics and to label these with language constructs, thereby recognizably and meaningfully identifying characteristics of fabric hand.
APA, Harvard, Vancouver, ISO, and other styles
29

Hinüber, O. "Mémorial Ojihara Yutaka. Studia Indologica édité par T. Yagi et M. Hara [Toyo Bunko Research Library 9]." Indo-Iranian Journal 51, no. 1 (March 2008): 79–80. http://dx.doi.org/10.1007/s10783-008-9093-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Ploeg, Anton. "Reuter, Susanne. Yalimo: Die Yali im Bergland von Neu Guinea, West Papua. Ein Portrait. Düsseldorf: Wahine Verlag, 2011, 184 pp. ISBN 9783941387027. Price: EUR 29.90 (Paperback)." Bijdragen tot de Taal-, Land- en Volkenkunde 169, no. 1 (2013): 163–64. http://dx.doi.org/10.1163/22134379-12340014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Andersson, Ellaina, Cari McIlduff, Karen Turner, Sue Thomas, Jadnah Davies, Elizabeth J. Elliott, and Stewart Einfeld. "Jandu Yani U ‘For All Families’ Triple P—positive parenting program in remote Australian Aboriginal communities: a study protocol for a community intervention trial." BMJ Open 9, no. 10 (October 2019): e032559. http://dx.doi.org/10.1136/bmjopen-2019-032559.

Full text
Abstract:
IntroductionThe population-based (Lililwan) study of fetal alcohol spectrum disorder (FASD) revealed a high prevalence of FASD in the remote communities of the Fitzroy Valley, Western Australia (WA) and confirmed anecdotal reports from families and teachers that challenging child behaviours were a significant concern. In response, Marninwarntikura Women’s Resource Centre initiated a partnership with researchers from The University of Sydney to bring the positive parenting program (Triple P) to the Valley. Triple P has been effective in increasing parenting skills and confidence, and improving child behaviour in various Indigenous communities.Methods and analysisExtensive consultation with community leaders, service providers, Aboriginal health networks and academic institutions was undertaken and is ongoing. Based on community consultations, the intervention was adapted to acknowledge local cultural, social and language complexities. Carers of children born after 1 January 2002 and living in the Fitzroy Valley are invited to participate in Group Triple P, including additional Stepping Stones strategies for children with complex needs. Programme are delivered by local community service workers, trained and accredited as Triple P providers or ‘parent coaches’. Assessments for parent coach pretraining and post-training includes their perceived ability to deliver the intervention and the cultural appropriateness of the programme. Carers complete preintervention and postintervention and 6-month follow-up assessments of parenting practices, self-efficacy and child behaviour.Ethics and disseminationApproval was granted by the University of Sydney Human Ethics Committee, WA Aboriginal Health Ethics Committee, WA Country Health Services Ethics Committee and Kimberley Aboriginal Health Planning Forum. Consultation with community is imperative for efficacy, engagement, community ownership and sustainability of the programme, and will be ongoing until findings are disseminated. Anonymous findings will be disseminated through peer-reviewed journals, community feedback sessions and scientific forums.
APA, Harvard, Vancouver, ISO, and other styles
32

Ndraha, Venny Eria, and Mozes Kurniawan. "Playing "CABE" (Searching and Whispering) to Increase Children’s English Vocabulary." JPUD - Jurnal Pendidikan Usia Dini 13, no. 1 (April 30, 2019): 143–57. http://dx.doi.org/10.21009/10.21009/jpud.131.11.

Full text
Abstract:
This study aims to increase children English vocabulary aged 5-6 years old by playing CABE or searching and whispering. This research is classroom action research that was conducted in Marsudirini Sang Timur Kindergarten, Salatiga. The Subjects of the study were 20 B1 kindergarten children. Data was collected by teaching English vocabulary by playing CABE in some cycles which includes four stages in the form of cycles, there are (1) planning; (2) implementation; (3) observation; and (4) reflection. Research instruments used in this research was in sheets observation checklist. The results of a percentage of pre-cycle was 13 %, cycle I was 31 % in first meeting and was 66 % in the second meeting, cycle II was 75 % performed in only one meeting. There is an improvement in pre-action and any action on each meeting until it reaches 75 %. Keywords: Early childhood, English vocabulary, “CABE” method, Learning English References Bawono, Y. (2017). Kemampuan berbahasa pada anak prasekolah : Sebuah kajian pustaka. Prosiding Temu Ilmiah X Ikatan Psikologi Perkembangan Indonesia. Chamot, A. U. (1987). Toward a Functional ESL Curriculum in the Elementary School, in Long, Michael H. & Richards, Jack C. (eds.) Methodology in TESOL. New York: Newburry House Publishers. Fromkin, V., Rodman, R., & H., & N. (1990). An Intoduction to Language. New York, NY: Avon Books. İlin, G., Kutlu, Ö., & Kutluay, A. (2013). An Action Research: Using Videos for Teaching Grammar in an ESP Class. Procedia - Social and Behavioral Sciences. https://doi.org/https://doi.org/10.1016/j.sbspro.2013.01.065 Imam, I. (2016). Meningkatkan Kemampuan Menyimak Siswa Kelas I Melalui Teknik Permainan Pesan Berantai Pada Pembalajaran Bahasa Indonesia. PEDAGOGIA: Jurnal Pendidikan. https://doi.org/https://doi.org/10.21070/pedagogia.v3i2.62 Khairani, A. I. (2016). Pendidikan Bahasa Inggris Untuk Anak Usia Dini. Digilib.Unimed.Ac.Id. Kurniawan, M., & Tanone, R. (2016). Mobile learning in TESOL: A golden bridge for enhancement of grammar awareness and vocabulary mastery? Asian EFL Journal. Kurniawan, M., & Tanone, R. (2016). Mobile learning in TESOL: A golden bridge for enhancement of grammar awareness and vocabulary mastery? Asian EFL Journal. Matondang, E. M. (2005). Menumbuhkan Minat Belajar Bahasa Inggris Anak Usia Dini melalui Lagu dan Gerak. Jakarta: Jurnal Pendidikan Penabur. Montessori, M. (1991). The discovery of the Child. New York: Ballatine Book. Muflihah, M. (2019). Pentingnya Peran BAhasa dalam Pendidikan Usia DIni (PAUD). ThufuLA: Jurnal Inovasi Pendidikan Guru Raudhatul Athfal. https://doi.org/https://doi.org/10.21043/thufula.v2i2.4642 Mustafa, B. (2007). Pendidikan Anak Usia Dini. Musthafa, B. (2010). Teaching English to Young Learners in Indonesia : Essential Requirements. Educationist. Nugrahani, D., Egar, N., Sumardiyani, L., & Wardoyo, S. L. (2017). PENDIDIKAN ANAK USIA DINI BERBASIS LIFE SKILLS. E-DIMAS. https://doi.org/https://doi.org/10.26877/e-dimas.v2i1.102 Nurjanah, N, Dwiastuty, Nina, Susilawati, S. (2015). Mengenalkan Model Pengajaran Edutainment Mengajarkan Bahasa Inggris Pada Anak–Anak Usia Dini. Faktor. Jurnal Ilmiah Kependidikan. Nurmadiah, N. (2018). Strategi Pembelajaran Anak Usia Dini. Al-Afkar : Jurnal Keislaman & Peradaban. https://doi.org/https://doi.org/10.28944/afkar.v3i1.101 Nurvitasari, M. D. (2016). Penerapan Aspek Perkembangan Anak Usia Dini Dalam Media Macca (Balok Susun Interaktif). O’Grady, W. (2008). Innateness, universal grammar, and emergentism. Lingua. https://doi.org/https://doi.org/10.1016/j.lingua.2007.03.005 Santrock, J. (n.d.). Adolesence (Fifth Edit). New York, NY: McGrawHill Company Inc. Sophya, I. V. (2019). Desain Pembelajaran BAhasa Inggris untuk Pendidikan Anak Usia Dini. ThufuLA: Jurnal Inovasi Pendidikan Guru Raudhatul Athfal. https://doi.org/https://doi.org/10.21043/thufula.v2i2.4639 Tomlinson, B. (2012). Materials development for language learning and languange teaching. https://doi.org/https://doi.org/10.1017/S0261444811000528 Vygotsky, L. S. (1986). Thought and Language. Cambridge, M.A.: The MIT Press Wiratno, T., & Santosa, R. (2003). Bahasa, Fungsi Bahasa, dan Konteks Sosial. Bahasa, Fungsi Bahasa, Dan Konteks Sosial Yamin, M. (2010). Panduan Pendidikan Anak Usia Dini. Jakarta: Gaung Persada Pers Zaini, A. (2015). Bermain sebagai metode pembelajaran bagi anak usia dini. ThufuLA: Jurnal Inovasi Pendidikan Guru Raudhatul Athfal
APA, Harvard, Vancouver, ISO, and other styles
33

M, Anit Thomas, and Chinchu Krishna S. "Automated Event-Triggered GUI Testing and Bug Reproduction for Non-Android Applications." International Journal of Innovation in Enterprise System 5, no. 02 (July 31, 2021): 172–81. http://dx.doi.org/10.25124/ijies.v5i02.99.

Full text
Abstract:
Today’s mobile gadgets are seamlessly incorporating innovative features demanded by the users. Most often, the applications contain bugs or functionality issues reported by the customers. The developers are responsible for reproducing such reported bugs, which are written in natural languages. Reproducing bugs from bug reports make the bug resolution inefficient. Nowadays, various methods are adopted to reproduce crash reports for android applications. But bug reproduction for non-android applications is still a challenging task. This paper proposes a novel approach that is capable of doing bug reproduction from bug reports to help the developers to solve the functionality issues of non-android applications in an automated manner. This approach uses a UI tester called the GUI engine, which is an excel sheet. The use cases which are to be tested can be filled in the GUI engine. All the use cases are to be filled based on a particular syntax. For that purpose, the developer can make use of a set of yaml files containing all the GUI information for all the screens of the application under test. The use cases are executed in the GUI engine and conclusions are made based on the test result. The GUI engine displays two colors green and red showing the working and failing of GUI components of the application under test. So that the developer can easily identify the failing components and take actions accordingly. The test has been done with more than 1000 test cases for one region and the result shows that almost all GUI components work for this method except for animation. It has tested for software developed for US, Europe, and German regions. Also, the proposed method is found to be much faster and efficient than the existing as well as manual testing methods.
APA, Harvard, Vancouver, ISO, and other styles
34

KARA, Nimet. "Kitab-ı Melheme'de Dudak Uyumu /Labial Harmony in Kitab al-Malhama." Journal of History Culture and Art Research 2, no. 3 (September 30, 2013): 100. http://dx.doi.org/10.7596/taksad.v2i3.254.

Full text
Abstract:
Öz Dudak uyumu; kelimenin ilk hecesinde düz bir ünlü varsa sonraki hecelerde de düz, yuvarlak ünlü varsa sonraki hecelerde dar-yuvarlak veya düz-geniş ünlülerin bulunmasıdır. Türkçenin dönemleri ve diğer sahalarında dudak uyumu bir kurallaşma eğilimi göstermemiştir. Eski Türkçe döneminde istisnalar dışında genel bir dudak uyumu söz konusu olmasına rağmen Eski Oğuz Türkçesi döneminde bu uyum bozulmuş hatta neredeyse yok olmuştur. Bu dönemde bazı ekler sürekli düz, bazı ekler ise sürekli yuvarlaktır. Eski Oğuz Türkçesinden sonra Osmanlı Türkçesinin büyük bir kısmında da tam olarak bir uyum söz konusu değildir. Dudak uyumunun bir sisteme oturması 18. yüzyılda, Eski Oğuz Türkçesinden Türkiye Türkçesine geçiş evresinde yani Orta Osmanlı Türkçesi döneminin son zamanlarında olmuştur. Bu çalışmada, XVI. yüzyılda yazılmış olan Kitâb-ı Melheme adlı eser, dudak uyumu açısından değerlendirilecektir. Çoğunlukla Eski Oğuz Türkçesi dönemini yansıtan bu metin, özellikle dudak uyumu açısından Eski Oğuz Türkçesinden farklı bir yapı gösterir. Bu farklılık da uyuma geçişi yansıtan kelime tabanları ve eklerde görülür. Kelime tabanları ve ekler, yuvarlaklaşma ve düzleşme olayları çerçevesinde incelenecek, kelime tabanlarının ve eklerin Eski Oğuz Türkçesindeki durumları göz önünde bulundurularak metindeki şekilleri değerlendirecek ve böylece bu dönemde dudak uyumunun gelişimi konusunda bir sonuca ulaşılacaktır. Abstract Labial Harmony occurs when an unrounded vowel in the first syllable is followed by unrounded vowels or when a rounded vowel in the first syllable is followed by narrow rounded or unrounded wide vowels. Labial Harmony doesn’t have the tendency of levelling in the periods of Turkish language and its other areas. Although there was general labial harmony apart from exceptions in the old Turkish period, this harmony was destroyed and it was nearly disappeared in old Oghuz Turkish. In this period, some affixations were permanently unrounded or some of them were permanently rounded. After The Oghuz Turkish period, there was no complete labial harmony in most part of The Ottoman Turkish. Labial Harmony was enabled systematically in the period of passing from Oghuz Turkish to Turkey Turkish, that is, in the late Ottoman Turkish. In this study, Kitab al-Malhama, written in the 16th century, will be assessed in terms of labial harmony. This text reflecting Oghuz Turkish period is different from The Old Oghuz Turkish especially in terms of labial harmony. This difference is seen in the word bases which reflects passing harmony and affixes. Word base and affixes will be studied within the frame of labialization and delabialization. Taking into consideration the situation of word bases and affixes in The Old Oghuz Turkish, their images in the text will be assessed so that a conclusion about the development of labial harmony in this period will be presented.
APA, Harvard, Vancouver, ISO, and other styles
35

Alqahtani, Sarra, and Rose Gamble. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (May 2017): 449–59. http://dx.doi.org/10.25046/aj020358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Abdelhedi, Fatma, and Nabil Derbel. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (June 2016): 513–19. http://dx.doi.org/10.25046/aj020366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Biran, Yahav, George Collins, Borky John M, and Joel Dubow. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 513-519 (2017); View Description Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment Asmaa Darouich, Faddoul Khoukhi, Khadija Douzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 520-531 (2017); View Description Homemade array of surface coils implementation for small animal magnetic resonance imaging Fernando Yepes-Calderon, Olivier Beuf Adv. Sci. Technol. Eng. Syst. J. 2(3), 532-539 (2017); View Description An Encryption Key for Secure Authentication: The Dynamic Solution Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha Adv. Sci. Technol. Eng. Syst. J. 2(3), 540-544 (2017); View Description Multi-Domain Virtual Network Embedding with Coordinated Link Mapping Shuopeng Li, Mohand Yazid Saidi, Ken Chen Adv. Sci. Technol. Eng. Syst. J. 2(3), 545-552 (2017); View Description Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (June 2017): 553–61. http://dx.doi.org/10.25046/aj020371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

McHarry, Mark. "(Un)gendering the homoerotic body: Imagining subjects in boys' love and yaoi." Transformative Works and Cultures 8 (October 4, 2010). http://dx.doi.org/10.3983/twc.2011.0257.

Full text
Abstract:
Language is a condition for a subject's formation, and identity is a factor in a subject's understanding of self. The Japanese-derived literary forms boys' love and yaoi portray male subjects as valorizing and acting on same-sex erotic desire, yet with little or no sense of possessing a same-sex desiring identity. Following Elizabeth Grosz, Julia Kristeva, and Michel Foucault, a reading is performed of a Western yaoi fan fic to explore how subjects in yaoi and boys' love enter into language, and hence subjectivity.
APA, Harvard, Vancouver, ISO, and other styles
39

Septiana, Annisa, Eko Santosa, and Aris Aryanto. "GAYA BAHASA PERBANDINGAN DAN NILAI PENDIDIKAN DALAM PISUNGSUNG ANTOLOGI GEGURITAN LAN CERKAK." Jurnal IKADBUDI 8 (February 19, 2021). http://dx.doi.org/10.21831/ikadbudi.v8i0.38869.

Full text
Abstract:
ABSTRAK Penelitian ini bertujuan untuk: (1) mendeskripsikan macam-macam gaya bahasa perbandingan geguritan karya Muhammad Yamin MS dalam Pisungsung antologi geguritan lan cerkak, (2) mengetahui nilai pendidikan pada geguritan karya Muhammad Yamin MS dalam Pisungsung antologi geguritan lan cerkak. Jenis penelitian adalah deskriptif kualitatif. Subjek penelitian berupa geguritan karya Muhammad Yamin MS dalam pisungsung antologi geguritan lan cerkak tahun 1997. Objek penelitian berupa gaya bahasa perbandingan dan nilai-nilai pendidikan dalam geguritan karya Muhammad Yamin MS. Teknik pengumpulan data menggunakan teknik simak dan catat. Analisis data menggunakan analisis isi. Instrumen penelitian adalah peneliti sendiri dibantu buku-buku yang sesuai dengan fokus penelitian serta kartu pencatat data. Teknik keabsahan data menggunakan ketekunan. Penyajian hasil analisis menggunakan metode informal. Hasil penelitian: (1) gaya bahasa perbandingan geguritan karya Muhammad Yamin MS dalam Pisungsung antologi geguritan lan cerkak meliputi: metafora, personifikasi, perumpamaan epos, sinekdoke, dan allegori. Metafora terdapat 17 indikator, personifikasi terdapat 11 indikator, perumpamaan epos terdapat 13 indikator, sinekdoke terdapat 24 indikator, dan allegori terdapat 8 indikator. (2) Nilai-nilai pendidikan dalam geguritan karya Muhammad Yamin MS meliputi: nilai pendidikan religius, nilai pendidikan moral, nilai pendidikan sosial, nilai pendidikan budaya. Nilai pendidikan religius terdapat 3 indikator, nilai pendidikan moral terdapat 10 indikator, nilai pendidikan sosial terdapat 8 indikator, dan nilai pendidikan budaya terdapat 1 indikator Kata-kata kunci: gaya bahasa, nilai pendidikan. ABSTRACT This study aims to: (1) describe the kinds of comparative language styles of Muhammad Yamin MS in Pisungsung geguritan and cerkak anthology, (2) determine the value of education in geguritan by Muhammad Yamin MS in Pisungsung geguritan and lan cerkak anthology. This type of research is descriptive qualitative. The subject of research is in the form of geguritan by Muhammad Yamin MS in the 1997 anthology of geguritan and cerkak. The object of research is in the form of comparative language style and educational values in geguritan by Muhammad Yamin MS. The data collection technique used the observation and note technique. Data analysis using content analysis. The research instrument was the researcher himself assisted by books that were in accordance with the research focus and data recording cards. The data validity technique uses persistence. Presentation of analysis results using informal methods. The results of the study: (1) the comparative language style of Geguritan by Muhammad Yamin MS in Pisungsung geguritan and cerkak anthology includes: metaphor, personification, parable of epics, synekdoke, and allegories Metaphors have 17 indicators, personification there are 11 indicators, epic parables have 13 indicators, sinekdoke has 24 indicators, and allegories have 8 indicators. (2) The values of education in Geguritan by Muhammad Yamin MS include: the value of religious education, the value of moral education, the value of social education, the value of cultural education. There are 3 indicators of religious education value, 10 indicators of moral education, 8 indicators of social education, and 1 indicator of cultural education.
APA, Harvard, Vancouver, ISO, and other styles
40

Nosáľ, Milan, and Jaroslav Porubän. "Supporting multiple configuration sources using abstraction." Open Computer Science 2, no. 3 (January 1, 2012). http://dx.doi.org/10.2478/s13537-012-0015-7.

Full text
Abstract:
AbstractSoftware engineers have long recognized the need to shift focus from developing systems to developing system families. One way to develop software family is to develop configurable systems. A configuration (initial settings of a program), written in application-specific language, can be expressed using many different formats, such as XML, YAML, attribute-oriented programming, etc., each one having pros and cons. Often the target group of users is too wide to meet their expectations by using only one format. This paper analyzes options that system providers have in supporting multiple configuration languages or sources. An enhanced abstraction tool is chosen as the best solution, and its architecture is briefly presented. The main contribution to the tool’s design is advocation of the declarative representation of mapping of input languages to output format.
APA, Harvard, Vancouver, ISO, and other styles
41

"Decoupling Web Services from the Transistor in Expert Systems." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S3 (August 23, 2019): 893–97. http://dx.doi.org/10.35940/ijitee.i3189.0789s319.

Full text
Abstract:
Replication [7] must work. In fact, few cyberneticists would disagree with the signifi-cant unification of the lookaside buffer and I/O automata, which embodies the practi-cal principles of Bayesian complexity theory. In order to solve this question, we describe a novel methodology for the deployment of object-oriented languages (YAMP), discon-firming that the World Wide Web and robots can collude to realize this intent.
APA, Harvard, Vancouver, ISO, and other styles
42

Yamashita, Taichi. "The impact of one’s response to the teacher’s feedback on the same person’s and the partner’s learning in paired writing." Journal of Second Language Studies, August 20, 2021. http://dx.doi.org/10.1075/jsls.21006.yam.

Full text
Abstract:
Abstract The present study investigated the relationship between one dyad member’s revision in response to written corrective feedback (CF) and the same person’s learning and the other dyad member’s learning during collaborative writing. Twenty-eight English-as-a-Second-Language (ESL) students at an American university were paired up and collaborated on two animation description tasks in Google Docs while receiving the researcher’s written CF on their errors on the indefinite and definite articles. Learners worked individually on an animation description task one week prior to the written CF treatment (pretest), immediately after the treatment (posttest), and two weeks after (delayed posttest). When pretest score and CF frequency were controlled for, the number of one’s revisions was not related to the same person’s or the partner’s posttest score. However, the number of one’s revisions was significantly positively related to the same learner’s delayed posttest score, but not to the partner’s delayed posttest score.
APA, Harvard, Vancouver, ISO, and other styles
43

Sarathan, Indra, Widyo Nugrahanto, and Randy Ridwansyah. "PUISI INDONESIA ABAD KE-5: KAJIAN STRUKTURAL DAN SOSIOLOGI SASTRA TEKS YŪPA MUARAKAMAN." SUAR BETANG 14, no. 1 (August 19, 2019). http://dx.doi.org/10.26499/surbet.v14i1.113.

Full text
Abstract:
The history of modern Indonesian poetry often begins in the 1920s. The first modern Indonesian poem refers to the poem “Tanah Air”/ ‘Motherland’ by Muhammad Yamin. The canonization of M. Yamin (1903-1962) as one of pillar modern Indonesian poetry was known from the contribution of A. Teeuw (1921-2012). And, the results of his research on Indonesian poetry continue to resonate in the spaces of literary and language education to this day (2018). However, there is still little attention that explains the process of transformation from old poetry (mantra, pantun, karmina, seloka, gurindam, syair, etc.) to modern Indonesian poetry. The data only explained the milestones of modern Indonesian poetry starting in the 1920s. Even though the history of world literature dived until the time Before Century in his explanation of the history of poetry. Such as the Gilgamesh epic written on the 3rd century BC stone remains of the Sumerians in Mesopatami or the Beawulf long poem derived from oral literature as the beginning of the history of Anglo-Saxon (ancient English) poetry of the 8th century CE. Referring to the not strict definition of poetry, this paper will review the oldest text of the inscription in the Indonesia archipelago (5th century AD) as a form of old poetry by examining the structure and typology, as well as the social history of Indonesian ancient people that produced the inscription text in viewpoints sociology of literature. Thus, the results of this study are also expected to offer an alternative historiography of the history of Indonesian poetry.
APA, Harvard, Vancouver, ISO, and other styles
44

Setyadharma, Vito Pratama Putra, Emi Iryanti, Indra Hidayatulloh, and Novanda Alim Setya Nugraha. "Designing of english challenge mobile game application as the media of english language learning." Journal of Engineering and Applied Technology 1, no. 1 (October 14, 2020). http://dx.doi.org/10.21831/jeatech.v1i1.34756.

Full text
Abstract:
English became the first foreign language that came to Indonesia in 1967. The human needs of English can already be seen through lots of official scientific works in English and its intense competitions globally. However, still, many people finds it difficult to learn English, for example, the difficulty in understanding tenses, differences between writing, reading and pronouncing. By relying on the latest features on smartphone, which on the mean time, smartphone is one of many gadgets that is the most practical to use in anywhere and anytime, plus, with gaming contents as the best multimedia entertainer application, learning English will be more interactive and easier to use. In this research, Construct 2 is used as The Developer App and Game Development Life Cycle (GDLC) method of Rido Ramadan and Yani Widyani’s version is used as The Development Method. The game system tested by using black box and by giving out Questionnaire for User Interface Satisfaction to 24 respondents, to test the system’s usability. It resulted 80,83% for the whole of the system, meaning that the whole system is quiet interesting in the respondents’s view. Then, the screen display gained 80,41%, this means that the screen display is very interesting and did not confuse the respondents. Technology and information game gained 75,41%, this means that the information contained in the game is quiet good, however, further development is needed. The introduction of the game’s system gained 71,63%, means that some of the system’s ability did not run effectively and needed further repairment and development. The last, usability and user interface gained 76,25%, this means that the game is quiet interactive to the respondents.
APA, Harvard, Vancouver, ISO, and other styles
45

Brennan, Joseph. "Slash Manips: Remixing Popular Media with Gay Pornography." M/C Journal 16, no. 4 (August 11, 2013). http://dx.doi.org/10.5204/mcj.677.

Full text
Abstract:
A slash manip is a photo remix that montages visual signs from popular media with those from gay pornography, creating a new cultural artefact. Slash (see Russ) is a fannish practice that homoeroticises the bonds between male media characters and personalities—female pairings are categorised separately as ‘femslash’. Slash has been defined almost exclusively as a female practice. While fandom is indeed “women-centred” (Bury 2), such definitions have a tendency to exclude male contributions. Remix has been well acknowledged in discussions on slash, most notably video remix in relation to slash vids (Kreisinger). Non-written slash forms such as slash vids (see Russo) and slash fanart (see Dennis) have received increased attention in recent years. This article continues the tradition of moving beyond fiction by considering the non-written form of slash manips, yet to receive sustained scholarly attention. Speaking as a practitioner—my slash manips can be found here—I perform textual analysis from an aca–fan (academic and fan) position of two Merlin slash manips by male Tumblr artist wandsinhand. My textual analysis is influenced by Barthes’s use of image semiotics, which he applies to the advertising image. Barthes notes that “all images are polysemous”, that underlying their signifiers they imply “a ‘floating chain’ of signifieds, the reader able to choose some and ignore others” (274). That said, the advertising image, he argues, constructs an “undoubtedly intentional […] signification”, making it ideally suited for analysis (270). By supplementing my analysis with excerpts from two interviews I conducted with wandsinhand in February and April 2013 (quoted here with permission), I support my readings with respect to the artist’s stated ‘intentional reading’. I then contextualise these readings with respect to canon (Merlin) representations and gay pornography—via the chosen sexual acts/positions, bukkake and doggystyle, of the pornographic base models, as selected by the artist. This approach allows me to examine the photo remix qualities of slash manips with respect to the artist’s intentions as well as how artistic choices of inclusion function to anchor meaning in the works. I describe these choices as the ‘semiotic significance of selection’. Together the readings and interviews in this article help illustrate the value of this form and the new avenues it opens for slash scholars, such as consideration of photo remix and male production, and the importance of gay pornography to slash. My interviews also reveal, via the artist’s own assessment of the ‘value’ of his practice, a tendency to devalue or overlook the significance of this particular slash form, affirming a real need for further critical engagement with this under-examined practice. Slash Photo Remix: Famous Faces, Porny Bodies Lessig defines remix culture as based on an activity of “rip, mix and burn” (12–5); while Navas describes it as a “practice of cut/copy and paste” (159)—the latter being more applicable to photo remix. Whereas Lessig is concerned primarily with issues of copyright, Navas is interested in remix’s role in aesthetics and the political economy. Within fan studies, slash vids—a form of video remix—has been a topic of considerable academic interest in recent years. Slash manips—a form of photo or image remix—however, has not attracted the same degree of interest. Stasi’s description of slash as “a non-hierarchical, rich layering of genres” points to the usefulness of slash manips as an embodiment of the process of slash; whereby artists combine, blend and mutate graphic layers from popular media with those from gay pornography. Aesthetics and the slash manip process are central concerns of this article’s consideration of slash photo remix. Slash manips, or slash photo montage, use image manipulation software (Adobe Photoshop being the community standard, see wandsinhand’s tutorial) to layer the heads of male fictional characters from stills or promotional images with scenes—static or moving—from gay pornography. Once an artist has selected pornographic ‘base models’ anatomically suited to canon characters, these models are often then repositioned into the canon universe, which in the case of Merlin means a medieval setting. (Works not repositioned and without added details from canon are generally categorised as ‘male celebrity fakes’ rather than ‘slash manips’.) Stedman contends that while many fan studies scholars are interested in remix, “studies commonly focus on examples of remixed objects rather than the compositional strategies used by remix composers themselves” (107). He advocates moving beyond an exclusive consideration of “text-centred approaches” to also consider “practice-” and “composer-centred” approaches. Such approaches offer insight into “the detailed choices composers actually make when composing” (107). He refers to recognition of the skills required by a remix composer as “remix literacy” (108). This article’s consideration of the various choices and skills that go into the composition of slash manips—what I term the ‘semiotic significance of selection’—is explored with respect to wandsinhand’s practice, coupling my reading—informed by my experience as a practitioner—with the interpretations of the artist himself. Jenkins defines slash as “reaction against” constructions of male sexuality in both popular media and pornography (189). By their very nature, slash manips also make clear the oft-overlooked connections between slash and gay pornography, and in turn the contributions of gay male participants, who are well represented by the form. This contrasts with a tendency within scholarship to compare slash with heterosexual female forms, such as the romance genre (Salmon and Symons). Gay pornography plays a visible role in slash manips—and slash vids, which often remix scenes from popular media with gay cinema and pornography. Slash as Romance, Slash as Pornography Early scholarship on slash (see Russ; Lamb and Veith) defines it as a form of erotica or pornography, by and for women; a reductive definition that fails to take into account men’s contribution, yet one that many researchers continue to adopt today. As stated above, there has also been a tendency within scholarship to align the practice with heterosexual female forms such as the romance genre. Such a tendency is by and large due to theorisation of slash as heterosexual female fantasy—and concerned primarily with romance and intimacy rather than sex (see Woledge). Weinstein describes slash as more a “fascination with” than a “representation of” homosexual relationships (615); while MacDonald makes the point that homosexuality is not a major political motivator for slash (28–9). There is no refuting that slash—along with most fannish practice—is female dominated, ethnographic work and fandom surveys reveal that is the case. However there is great need for research into male production of slash, particularly how such practices might challenge reigning definitions and assumptions of the practice. In similar Japanese practices, for example, gay male opposition to girls’ comics (shōjo) depicting love between ‘pretty boys’ (bishōunen) has been well documented (see Hori)—Men’s Love (or bara) is a subgenre of Boys’ Love (or shōnen’ai) predominately created by gay men seeking a greater connection with the lived reality of gay life (Lunsing). Dennis finds male slash fanart producers more committed to muscular representations and depiction of graphic male/male sex when compared with female-identifying artists (14, 16). He also observes that male fanart artists have a tendency of “valuing same-sex desire without a heterosexual default and placing it within the context of realistic gay relationships” (11). I have observed similar differences between male and female-identifying slash manip artists. Female-identifying Nicci Mac, for example, will often add trousers to her donor bodies, recoding them for a more romantic context. By contrast, male-identifying mythagowood is known for digitally enlarging the penises and rectums of his base models, exaggerating his work’s connection to the pornographic and the macabre. Consider, for example, mythagowood’s rationale for digitally enlarging and importing ‘lips’ for Sam’s (Supernatural) rectum in his work Ass-milk: 2012, which marks the third anniversary of the original: Originally I wasn’t going to give Sammy’s cunt any treatment (before I determined the theme) but when assmilk became the theme I had to go find a good set of lips to slap on him and I figured, it’s been three years, his hole is going to be MUCH bigger. (personal correspondence, used with permission) While mythagowood himself cautions against gendered romance/pornography slash arguments—“I find it annoying that people attribute certain specific aspects of my work to something ‘only a man’ would make.” (ibid.)—gay pornography occupies an important place in the lives of gay men as a means for entertainment, community engagement and identity-construction (see McKee). As one of the only cultural representations available to gay men, Fejes argues that gay pornography plays a crucial role in defining gay male desire and identity. This is confirmed by an Internet survey conducted by Duggan and McCreary that finds 98% of gay participants reporting exposure to pornographic material in the 30-day period prior to the survey. Further, the underground nature of gay pornographic film (see Dyer) aligns it with slash as a subcultural practice. I now analyse two Merlin slash manips with respect to the sexual positions of the pornographic base models, illustrating how gay pornography genres and ideologies referenced through these works enforce their intended meaning, as defined by the artist. A sexual act such as bukkake, as wandsinhand astutely notes, acts as a universal sign and “automatically generates a narrative for the image without anything really needing to be detailed”. Barthes argues that such a “relation between thing signified and image signifying in analogical representation” is unlike language, which has a much more ‘arbitrary’ relationship between signifier and signified (272). Bukkake and the Assertion of Masculine Power in Merlin Merlin (2008–12) is a BBC reimagining of the Arthurian legend that focuses on the coming-of-age of Arthur and his close bond with his manservant Merlin, who keeps his magical identity secret until Arthur’s final stand in the iconic Battle of Camlann. The homosexual potential of Merlin and Arthur’s story—and of magic as a metaphor for homosexuality—is something slash fans were quick to recognise. During question time at the first Merlin cast appearance at the London MCM Expo in October 2008—just one month after the show’s pilot first aired—a fan asked Morgan and James, who portray Merlin and Arthur, is Merlin “meant to be a love story between Arthur and Merlin?” James nods in jest. Wandsinhand, who is most active in the Teen Wolf (2011–present) fandom, has produced two Merlin slash manips to date, a 2013 Merlin/Arthur and a 2012 Arthur/Percival, both untitled. The Merlin/Arthur manip (see Figure 1) depicts Merlin bound and on his knees, Arthur ejaculating across his face and on his chest. Merlin is naked while Arthur is partially clothed in chainmail and armour. They are both bruised and dirty, Arthur’s injuries suggesting battle given his overall appearance, while Merlin’s suggesting abuse, given his subordinate position. The setting appears to be the royal stables, where we know Merlin spends much of his time mucking out Arthur’s horses. I am left to wonder if perhaps Merlin did not carry out this duty to Arthur’s satisfaction, and is now being punished for it; or if Arthur has returned from battle in need of sexual gratification and the endorsement of power that comes from debasing his manservant. Figure 1: wandsinhand, Untitled (Merlin/Arthur), 2013, photo montage. Courtesy the artist. Both readings are supported by Arthur’s ‘spent’ expression of disinterest or mild curiosity, while Merlin’s face emotes pain: crying and squinting through the semen obscuring his vision. The artist confirms this reading in our interview: “Arthur is using his pet Merlin to relieve some stress; Merlin of course not being too pleased about the aftermath, but obedient all the same.” The noun ‘pet’ evokes the sexual connotations of Merlin’s role as Arthur’s personal manservant, while also demoting Merlin even further than usual. He is, in Arthur’s eyes, less than human, a sexual plaything to use and abuse at will. The artist’s statement also confirms that Arthur is acting against Merlin’s will. Violence is certainly represented here, the base models having been ‘marked up’ to depict sexualisation of an already physically and emotionally abusive relationship, their relative positioning and the importation of semen heightening the humiliation. Wandsinhand’s work engages characters in sadomasochistic play, with semen and urine frequently employed to degrade and arouse—“peen wolf”, a reference to watersports, is used within his Teen Wolf practice. The two wandsinhand works analysed in this present article come without words, thus lacking a “linguistic message” (Barthes 273–6). However even so, the artist’s statement and Arthur’s stance over “his pet Merlin” mean we are still able to “skim off” (270) the meanings the image contains. The base models, for example, invite comparison with the ‘gay bukkake’ genre of gay pornography—admittedly with a single dominant male rather than a group. Gay bukkake has become a popular niche in North American gay pornography—it originated in Japan as a male–female act in the 1980s. It describes a ritualistic sexual act where a group of dominant men—often identifying as heterosexual—fuck and debase a homosexual, submissive male, commonly bareback (Durkin et al. 600). The aggression on display in this act—much like the homosocial insistency of men who partake in a ‘circle jerk’ (Mosher 318)—enables the participating men to affirm their masculinity and dominance by degrading the gay male, who is there to service (often on his knees) and receive—in any orifice of the group’s choosing—the men’s semen, and often urine as well. The equivalencies I have made here are based on the ‘performance’ of the bukkake fantasy in gay niche hazing and gay-for-pay pornography genres. These genres are fuelled by antigay sentiment, aggression and debasement of effeminate males (see Kendall). I wish here to resist the temptation of labelling the acts described above as deviant. As is a common problem with anti-pornography arguments, to attempt to fix a practice such as bukkake as deviant and abject—by, for example, equating it to rape (Franklin 24)—is to negate a much more complex consideration of distinctions and ambiguities between force and consent; lived and fantasy; where pleasure is, where it is performed and where it is taken. I extend this desire not to label the manip in question, which by exploiting the masculine posturing of Arthur effectively sexualises canon debasement. This began with the pilot when Arthur says: “Tell me Merlin, do you know how to walk on your knees?” Of the imported imagery—semen, bruising, perspiration—the key signifier is Arthur’s armour which, while torn in places, still ensures the encoding of particular signifieds: masculinity, strength and power. Doggystyle and the Subversion of Arthur’s ‘Armoured Self’ Since the romanticism and chivalric tradition of the knight in shining armour (see Huizinga) men as armoured selves have become a stoic symbol of masculine power and the benchmark for aspirational masculinity. For the medieval knight, armour reflects in its shiny surface the mettle of the man enclosed, imparting a state of ‘bodilessness’ by containing any softness beneath its shielded exterior (Burns 140). Wandsinhand’s Arthur/Percival manip (see Figure 2) subverts Arthur and the symbolism of armour with the help of arguably the only man who can: Arthur’s largest knight Percival. While a minor character among the knights, Percival’s physical presence in the series looms large, and has endeared him to slash manip artists, particularly those with only a casual interest in the series, such as wandsinhand: Why Arthur and Percival were specifically chosen had really little to do with the show’s plot, and in point of fact, I don’t really follow Merlin that closely nor am I an avid fan. […] Choosing Arthur/Percival really was just a matter of taste rather than being contextually based on their characterisations in the television show. Figure 2: wandsinhand, Untitled (Arthur/Percival), 2012, photo montage. Courtesy the artist. Concerning motivation, the artist explains: “Sometimes one’s penis decides to pick the tv show Merlin, and specifically Arthur and Percival.” The popularity of Percival among manip artists illustrates the power of physicality as a visual sign, and the valorisation of size and muscle within the gay community (see Sánchez et al.). Having his armour modified to display his muscles, the implication is that Percival does not need armour, for his body is already hard, impenetrable. He is already suited up, simultaneously man and armoured. Wandsinhand uses the physicality of this character to strip Arthur of his symbolic, masculine power. The work depicts Arthur with a dishevelled expression, his armoured chest pressed against the ground, his chainmail hitched up at the back to expose his arse, Percival threading his unsheathed cock inside him, staring expressionless at the ‘viewer’. The artist explains he “was trying to show a shift of power”: I was also hinting at some sign of struggle, which is somewhat evident on Arthur’s face too. […] I think the expressions work in concert to suggest […] a power reversal that leaves Arthur on the bottom, a position he’s not entirely comfortable accepting. There is pleasure to be had in seeing the “cocky” Arthur forcefully penetrated, “cut down to size by a bigger man” (wandsinhand). The two assume the ‘doggystyle’ position, an impersonal sexual position, without eye contact and where the penetrator sets the rhythm and intensity of each thrust. Scholars have argued that the position is degrading to the passive party, who is dehumanised by the act, a ‘dog’ (Dworkin 27); and rapper Snoop ‘Doggy’ Dogg exploits the misogynistic connotations of the position on his record Doggystyle (see Armstrong). Wandsinhand is clear in his intent to depict forceful domination of Arthur. Struggle is signified through the addition of perspiration, a trademark device used by this artist to symbolise struggle. Domination in a sexual act involves the erasure of the wishes of the dominated partner (see Cowan and Dunn). To attune oneself to the pleasures of a sexual partner is to regard them as a subject. To ignore such pleasures is to degrade the other person. The artist’s choice of pairing embraces the physicality of the male/male bond and illustrates a tendency among manip producers to privilege conventional masculine identifiers—such as size and muscle—above symbolic, nonphysical identifiers, such as status and rank. It is worth noting that muscle is more readily available in the pornographic source material used in slash manips—muscularity being a recurrent component of gay pornography (see Duggan and McCreary). In my interview with manip artist simontheduck, he describes the difficulty he had sourcing a base image “that complimented the physicality of the [Merlin] characters. […] The actor that plays Merlin is fairly thin while Arthur is pretty built, it was difficult to find one. I even had to edit Merlin’s body down further in the end.” (personal correspondence, used with permission) As wandsinhand explains, “you’re basically limited by what’s available on the internet, and even then, only what you’re prepared to sift through or screencap yourself”. Wandsinhand’s Arthur/Percival pairing selection works in tandem with other artistic decisions and inclusions—sexual position, setting, expressions, effects (perspiration, lighting)—to ensure the intended reading of the work. Antithetical size and rank positions play out in the penetration/submission act of wandsinhand’s work, in which only the stronger of the two may come out ‘on top’. Percival subverts the symbolic power structures of prince/knight, asserting his physical, sexual dominance over the physically inferior Arthur. That such a construction of Percival is incongruent with the polite, impeded-by-my-size-and-muscle-density Percival of the series speaks to the circumstances of manip production, much of which is on a taste basis, as previously noted. There are of course exceptions to this, the Teen Wolf ‘Sterek’ (Stiles/Derek) pairing being wandsinhand’s, but even in this case, size tends to couple with penetration. Slash manips often privilege physicality of the characters in question—as well as the base models selected—above any particular canon-supported slash reading. (Of course, the ‘queering’ nature of slash practice means at times there is also a desire to see such identifiers subverted, however in this example, raw masculine power prevails.) This final point is in no way representative—my practice, for example, combines manips with ficlets to offer a clearer connection with canon, while LJ’s zdae69 integrates manips, fiction and comics. However, common across slash manip artists driven by taste—and requests—rather than connection with canon—the best known being LJ’s tw-31988, demon48180 and Tumblr’s lwoodsmalestarsfakes, all of whom work across many fandoms—is interest in the ‘aesthetics of canon’, the blue hues of Teen Wolf or the fluorescent greens of Arrow (2012–present), displayed in glossy magazine format using services such as ISSUU. In short, ‘the look’ of the work often takes precedent over canonical implications of any artistic decisions. “Nothing Too Serious”: Slash Manips as Objects Worth Studying It had long been believed that the popular was the transient, that of entertainment rather than enlightenment; that which is manufactured, “an appendage of the machinery”, consumed by the duped masses and a product not of culture but of a ‘culture industry’ (Adorno and Rabinbach 12). Scholars such as Radway, Ang pioneered a shift in scholarly practice, advancing the cultural studies project by challenging elitism and finding meaning in traditionally devalued cultural texts and practices. The most surprising outcome of my interviews with wandsinhand was hearing how he conceived of his practice, and the study of slash: If I knew I could get a PhD by writing a dissertation on Slash, I would probably drop out of my physics papers! […] I don’t really think too highly of faking/manip-making. I mean, it’s not like it’s high art, is it? … or is it? I guess if Duchamp’s toilet can be a masterpiece, then so can anything. But I mainly just do it to pass the time, materialise fantasies, and disperse my fantasies unto others. Nothing too serious. Wandsinhand erects various binaries—academic/fan, important/trivial, science/arts, high art/low art, profession/hobby, reality/fantasy, serious/frivolous—as justification to devalue his own artistic practice. Yet embracing the amateur, personal nature of his practice frees him to “materialise fantasies” that would perhaps not be possible without self-imposed, underground production. This is certainly supported by his body of work, which plays with taboos of the unseen, of bodily fluids and sadomasochism. My intention with this article is not to contravene views such as wandsinhand’s. Rather, it is to promote slash manips as a form of remix culture that encourages new perspectives on how slash has been defined, its connection with male producers and its symbiotic relationship with gay pornography. I have examined the ‘semiotic significance of selection’ that creates meaning in two contrary slash manips; how these works actualise and resist canon dominance, as it relates to the physical and the symbolic. This examination also offers insight into this form’s connection to and negotiation with certain ideologies of gay pornography, such as the valorisation of size and muscle. References Adorno, Theodor W., and Anson G. Rabinbach. “Culture Industry Reconsidered.” New German Critique 6 (1975): 12–19. Ang, Ien. 1985. Watching Dallas. London: Methuen, 1985. Armstrong, Edward G. “Gangsta Misogyny: A Content Analysis of the Portrayals of Violence against Women in Rap Music, 1987–93.” Journal of Criminal Justice and Popular Culture 8.2 (2001): 96–126. Barthes, Roland. “Rhetoric of the Image.” Image, Music, Text. London: HarperCollins, 1977. 269–85. Burns, E. Jane. Courtly Love Undressed: Reading through Clothes in Medieval French Culture. Philadelphia: Univ. of Pennsylvania Press, 2002. Bury, Rhiannon. Cyberspaces of Their Own: Female Fandoms Online. New York: Peter Lang, 2005. Cowan, Gloria, and Kerri F. Dunn. “What Themes in Pornography Lead to Perceptions of the Degradation of Women?” The Journal of Sex Research 31.1 (1994): 11–21. Dennis, Jeffery P. “Drawing Desire: Male Youth and Homoerotic Fan Art.” Journal of LGBT Youth 7.1 (2010): 6–28. Duggan, Scott J., and Donald R. McCreary. “Body Image, Eating Disorders, and the Drive for Muscularity in Gay and Heterosexual Men: The Influence of Media Images.” Journal of Homosexuality 47.3/4 (2004): 45–58. Durkin, Keith, Craig J. Forsyth, and James F. Quinn. “Pathological Internet Communities: A New Direction for Sexual Deviance Research in a Post Modern Era.” Sociological Spectrum 26.6 (2006): 595–606. Dworkin, Andrea. “Against the Male Flood: Censorship, Pornography, and Equality.” Letters from a War Zone. London: Martin Secker and Warburg, 1997. 19–38. Fejes, Fred. “Bent Passions: Heterosexual Masculinity, Pornography, and Gay Male Identity.” Sexuality & Culture 6.3 (2002): 95–113. Franklin, Karen. “Enacting Masculinity: Antigay Violence and Group Rape as Participatory Theater.” Sexuality Research & Social Policy 1.2 (2004): 25–40. Hori, Akiko. “On the Response (or Lack Thereof) of Japanese Fans to Criticism That Yaoi Is Antigay Discrimination.” Transformative Works and Cultures 12 (2013). doi:10.3983/twc.2013.0463. Huizinga, Johan. The Waning of the Middle Ages: A Study of Forms of Life, Thought, and Art in France and the Netherlands in the Dawn of the Renaissance. Trans. F. Hopman. London: Edward Arnold & Co, 1924. Jenkins, Henry. Textual Poachers: Television Fans & Participatory Culture. London: Routledge, 1992. Kendall, Christopher N. “‘Real Dominant, Real Fun!’: Gay Male Pornography and the Pursuit of Masculinity.” Saskatchewan Law Review 57 (1993): 21–57. Kreisinger, Elisa. “Queer Video Remix and LGBTQ Online Communities.” Transformative Works and Cultures 9 (2012). doi:10.3983/twc.2012.0395. Lamb, Patricia F., and Diane L. Veith. “Romantic Myth, Transcendence, and Star Trek Zines.” Erotic Universe: Sexuality and Fantastic Literature. Ed. D Palumbo. New York: Greenwood, 1986. 235–57. Lessig, Lawrence. The Future of Ideas. New York: Vintage, 2001. Lunsing, Wim. “Yaoi Ronsō: Discussing Depictions of Male Homosexuality in Japanese Girls’ Comics, Gay Comics and Gay Pornography.” Intersections: Gender, History and Culture in the Asian Context 12 (2006). ‹http://intersections.anu.edu.au/issue12/lunsing.html›. MacDonald, Marianne. “Harry Potter and the Fan Fiction Phenom.” The Gay & Lesbian Review 13.1 (2006): 28–30. McKee, Alan. “Australian Gay Porn Videos: The National Identity of Despised Cultural Objects.” International Journal of Cultural Studies 2.2 (1999): 178–98. Morrison, Todd G., Melanie A. Morrison, and Becky A. Bradley. “Correlates of Gay Men’s Self-Reported Exposure to Pornography.” International Journal of Sexual Health 19.2 (2007): 33–43. Mosher, Donald L. “Negative Attitudes Toward Masturbation in Sex Therapy.” Journal of Sex & Marital Therapy 5.4 (1979): 315–33. Navas, Eduardo. “Regressive and Reflexive Mashups in Sampling Culture.” Mashup Cultures. Ed. Stefan Sonvilla-Weiss. New York: Springer, 2010. 157–77. Radway, Janice. Reading the Romance: Women, Patriarchy, and Popular Literature. Chapel Hill: Univ. of North Carolina Press, 1984. Russ, Joanna. “Pornography by Women for Women, with Love.” Magic Mommas, Trembling Sisters, Puritans, and Perverts: Feminist Essays. Trumansburg: Crossing Press, 1985. 79–99. Russo, Julie Levin. “User-Penetrated Content: Fan Video in the Age of Convergence.” Cinema Journal 48.4 (2009): 125–30. Salmon, Catherine, and Donald Symons. Warrior Lovers: Erotic Fiction, Evolution and Human Sexuality. London: Weidenfeld & Nicolson, 2001. Sánchez, Francisco J., Stefanie T. Greenberg, William Ming Liu, and Eric Vilain. “Reported Effects of Masculine Ideals on Gay Men.” Psychology of Men & Masculinity 10.1 (2009): 73–87. Stasi, Mafalda. “The Toy Soldiers from Leeds: The Slash Palimpsest.” Fan Fiction and Fan Communities in the Age of the Internet. Ed. Karen Hellekson, and Kristina Busse. Jefferson: McFarland, 2006. 115–33. Stedman, Kyle D. “Remix Literacy and Fan Compositions.” Computers and Composition 29.2 (2012): 107–23. Weinstein, Matthew. “Slash Writers and Guinea Pigs as Models for Scientific Multiliteracy.” Educational Philosophy and Theory 38.5 (2006): 607–23. Woledge, Elizabeth. “Intimatopia: Genre Intersections between Slash and the Mainstream.” Fan Fiction and Fan Communities in the Age of the Internet. Ed. Karen Hellekson, and Kristina Busse. Jefferson: McFarland, 2006. 97–114.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography