| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910480818503321 |
|
|
Autore |
Oltman Gretchen A. |
|
|
Titolo |
Violence in student writing : a school administrator's guide / / Gretchen Oltman ; foreword by Allan Osborne |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Thousand Oaks, California : , : Corwin, a SAGE Company, , [2013] |
|
©2013 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-4522-8394-X |
1-4522-7921-7 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (144 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
School violence - United States - Prevention |
Violence in literature |
High school students' writings |
School management and organization - United States |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (pages 103-107) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
The aftermath of Columbine on student writing -- Schooling for citizenship: a legal primer for educators -- School culture and student safety -- Regulating student expression: examining your school policy -- Violent writing within the classroom -- Violent writing beyond the classroom -- Communicating with teachers about student violent writing -- Threat assessment for student violent writing incidents -- Acting and responding to student violent writing. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Your guide to action when student writing crosses the line At what point should violent student expressions be considered a legitimate threat? This legal handbook delves into the real-life experiences of administrators, teachers, and students to help you apply caution and logic in protecting your students' freedom of speech while also protecting the safety of everyone in the building. Gretchen Oltman, an experienced educator and licensed attorney, shows you how to: Prevent violence by creating a positive and safe school environment Guide teachers in assessing written threats of violen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910879596203321 |
|
|
Autore |
Verma Anshul |
|
|
Titolo |
Advanced Network Technologies and Intelligent Computing : Third International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part IV / / edited by Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Sanjay Kumar Dhurandher, Isaac Woungang |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (400 pages) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0937 ; ; 2093 |
|
|
|
|
|
|
|
|
Altri autori (Persone) |
|
VermaPradeepika |
PattanaikKiran Kumar |
DhurandherSanjay Kumar |
WoungangIsaac |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Computer engineering |
Computer networks |
Software engineering |
Cryptography |
Data encryption (Computer science) |
Coding theory |
Information theory |
Computer Engineering and Networks |
Software Engineering |
Cryptology |
Computer Communication Networks |
Coding and Information Theory |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
-- Intelligent Computing. -- Neural Network Approach for Early detection of Sugarcane Diseases. -- Enhanced Residual Network Framework for Robust Classification of Noisy Lung Cancer CT Images. |
|
|
|
|
|
|
|
|
|
|
|
-- Single-Cell Drug Perturbation Prediction Using Machine Learning. -- Underwater Image Enhancement using Convolutional Neural Network and the MultiUnet Model. -- A hybrid time series model for the spatio-temporal analysis of air pollution prediction based on PM2.5. -- Detection of Lung Diseases Using Deep Transfer Learning-Based Convolution Neural Networks. -- DG-GAN: A Deep Neural Network for Real-World Anomaly Detection in Surveillance Videos. -- Auto-LVEF: A novel method to determine Ejection Fraction from 2D echocardiograms. -- Phishing Detection in Browser-In-The-Middle: A Novel Empirical Approach Incorporating Machine Learning Algorithms. -- Feature Engineering for Predicting Consumer Purchase Behavior: A Comprehensive Analysis. -- Enhanced Simulation of Collision Events Using Quantum GANs for Jet Images Generation. -- Class imbalance learning using Fuzzy SVM with Fuzzy Weighted Gaussian Kernel. -- Material Handling Cost (MHC) Minimization through Facility Layout Design (FLD) Using Genetic Algorithm (GA) combined with the Particle Swarm Optimization (PSO) Method. -- Detecting ADHD among children using EEG signals. -- Enhancing Skin Cancer Classification with Ensemble Models. -- Efficient real-time Sign Detection for Autonomous Vehical in Hazy environment using Deep Learning Models. -- Kannada Continuous Speech Recognition using Deep Learning. -- A new type of classification algorithm inspired by the chromatographic separation mechanism. -- Comparative Analysis of ELM and Sparse Bayesian ELM for Healthcare Diagnosis. -- Integration of Generative AI and Deep Tabular Data Learning Architecture for Heart Attack Prediction. -- Navigating the Domain Shift: Object Detection in Indian Road Datasets with Limited Data. -- An Efficient Hybrid Algorithm with Novel Inver-over Operator and Ant Colony Optimization for Traveling Salesman Problem. -- Sparsity Analysis of New Biased Pearson Similarity Measure for Memory Based Collaborative Filtering. -- Advancing Medical Predictive Models with Integrated Approaches. |
|
|
|
|
|
|
Sommario/riassunto |
|
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023. The 87 full papers and 11 short papers included in this book were carefully reviewed and selected from 487 submissions. The conference papers are organized in topical sections on: Part I - Advanced Network Technologies. Part II - Advanced Network Technologies; Intelligent Computing. Part III - IV - Intelligent Computing. . |
|
|
|
|
|
|
|
| |