02782nam0 2200565 i 450 VAN0011354420240806100749.178N978331918347320180111d2015 |0itac50 baengCH|||| |||||Nonlinear data assimilationPeter Jan van Leeuwen, Yuan Cheng, Sebastian Reich[Cham] Springer2015XII, 118 p.ill.24 cm001VAN001135292001 Frontiers in applied dynamical systems: reviews and tutorials210 Berlin [etc.]Springer2015-2VAN00235165Nonlinear data assimilation428621335R30Inverse problems for PDEs [MSC 2020]VANC021918MF62F15Bayesian inference [MSC 2020]VANC024528MF62M20Inference from stochastic processes and prediction; filtering [MSC 2020]VANC033691MF65C05Monte Carlo methods [MSC 2020]VANC020429MF86A22Inverse problems in geophysics [MSC 2020]VANC022119MF93E11Filtering in stochastic control theory [MSC 2020]VANC022653MFApplied dynamical systemsKW:KData AssimilationKW:KNonlinear dataKW:KParticle filtersKW:KProposal densitiesKW:KCHChamVANL001889LeeuwenPeter J. vanVANV087660ChengYuanVANV087661552861ReichSebastianVANV087662599976Springer <editore>VANV108073650van Leeuwen, Peter JanLeeuwen, Peter J. vanVANV208181Jan van Leeuwen, PeterLeeuwen, Peter J. vanVANV208182Leeuwen, Peter J. : vanLeeuwen, Peter J. vanVANV236586van Leeuwen, P. J.Leeuwen, Peter J. vanVANV236587Leeuwen, Peter Jan vanLeeuwen, Peter J. vanVANV236588Leeuwen, P. J. vanLeeuwen, Peter J. vanVANV236589Leeuwen, P.J. vanLeeuwen, Peter J. vanVANV236590van Leeuwen, Peter J.Leeuwen, Peter J. vanVANV236041van Leeuwen, P. J.Leeuwen, Peter J. vanVANV236042ITSOL20250131RICAhttp://dx.doi.org/10.1007/978-3-319-18347-3E-book – Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o ShibbolethBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICAIT-CE0120VAN08NVAN00113544BIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA08DLOAD e-book 0348 08eMF348 20180111 Nonlinear data assimilation4286213UNICAMPANIA05650nam 2200745 a 450 991096932880332120240313232928.097890272715569027271550(CKB)2560000000105274(EBL)1211769(SSID)ssj0000888033(PQKBManifestationID)11472035(PQKBTitleCode)TC0000888033(PQKBWorkID)10847113(PQKB)10567081(MiAaPQ)EBC1211769(Au-PeEL)EBL1211769(CaPaEBR)ebr10718655(CaONFJC)MIL497462(OCoLC)851078430(DE-B1597)721412(DE-B1597)9789027271556(EXLCZ)99256000000010527420130524d2013 uy 0engur|n|---|||||txtccrProximization the pragmatics of symbolic distance crossing /Piotr Cap1st ed.Amsterdam ;Philadelphia John Benjamins Pub. Co.20131 online resource (230 p.)Pragmatics & beyond new series,0922-842X ;v. 232Description based upon print version of record.9789027256379 9027256373 Includes bibliographical references and index.Proximization; Editorial page; Title page; LCC data; Table of contents; Acknowledgements; 1. Introduction; 1.1 Project overview; 1.2 A brief history of proximization; 1.3 Direct goals; 1.4 Theoretical environment and theoretical implications as indirect goals; 1.5 Chapter overview; 2. Proximization as a (linguistic) concept; 2.1 Introduction; 2.2 Paul Chilton: From "representational proximising" in "geopolitical spaces" to Deictic Space Theo; 2.2.1 The 2004 approach: 3-d positioning and representations of the Kosovo war; 2.2.2 Discourse Space Theory or Deictic Space Theory?2.3 Piotr Cap: Proximization for legitimization in search of quantifiable evidence; 2.3.1 The conceptual and "qualitative" stage; 2.3.2 The "qualitative-quantitative" stage; 2.4 Christopher Hart: Proximization and/within coercion, predication, metaphor; 2.5 Patricia Dunmire: Proximization across political genres; 2.6 Other approaches; 2.7 Approaches to proximization versus traditional accounts of deixis and perspective; 2.8 Summary; 3. Proximization and legitimization; 3.1 Introduction; 3.2 Legitimization: A multi-level phenomenon3.2.1 Perspectives from cognitive science, socio-political theory and social psychology3.2.2 Perspectives from linguistic pragmatics, text linguistics and critical discourse studies; 3.3 Legitimization through proximization, proximization for legitimization; 3.3.1 A sample analysis; 3.3.2 Maintaining the (AEI) legitimization: Changes in proximization strategies; 3.3.3 Interventionist discourses; 3.4 Beyond the war-on-terror; 4. Conceptual structure of the (S)patial-(T)emporal-(A)xiological model of proximization; 4.1 Introduction; 4.2 Spatial proximization4.2.1 Threat construal through the ODC characterization4.2.2 Threat construal through the ODC impact speed; 4.2.3 Threat construal through the ODC impact consequences; 4.3 Temporal proximization; 4.3.1 "A September morning"; 4.3.2 Towards more quantifiable markers; 4.4 Axiological proximization; 4.4.1 Axiological proximization with high and explicit impact probability; 4.4.2 Axiological proximization with low(er) and implicit impact probability; 4.5 Conclusions; 5. The STA model and the 2001-2010 decade of the anti-terrorist discourse: Methodology and data; 5.1 Introduction5.2 Three frameworks of proximization5.2.1 The spatial proximization framework; 5.2.1.1 Category assignment of spatial proximization items; 5.2.2 The temporal proximization framework; 5.2.2.1 Category assignment of temporal proximization items; 5.2.3 The axiological proximization framework; 5.2.3.1 Category assignment of axiological proximization items; 5.3 The corpus and the sub-corpora; 5.4 Counts from the proximization frameworks; 5.4.1 Counts from the spatial framework; 5.4.2 Counts from the temporal framework; 5.4.3 Counts from the axiological framework; 5.5 Conclusion6. The STA model and the 2001-2010 decade of the anti-terrorist discourse: DiscussionThis book proposes a new theory ("proximization theory") in the area of political/public legitimization discourse. Located at the intersection of Pragmatics, Cognitive Linguistics and critical approaches, the theory holds that legitimization of broadly consequential political/public policies, such as pre-emptive interventionist campaigns, is best accomplished by forced construals of virtual external threats encroaching upon the speaker and her audience's home territory. The construals, which proceed along spatial, temporal and axiological lines, are forced by strategic deployment of lexico-graPragmatics & beyond companion series ;232.PragmaticsDiscourse analysisPolitical aspectsRhetoricPolitical aspectsEnglish languageRhetoricPragmatics.Discourse analysisPolitical aspects.RhetoricPolitical aspects.English languageRhetoric.320.01/4ER 940rvkCap Piotr751111MiAaPQMiAaPQMiAaPQBOOK9910969328803321Proximization1510561UNINA03412nam 22005173 450 991097824660332120250224120843.01-04-079088-71-003-69354-71-04-079678-890-485-5637-610.1515/9789048556373(CKB)37499099600041(MiAaPQ)EBC31901210(Au-PeEL)EBL31901210(DE-B1597)724990(DE-B1597)9789048556373(OCoLC)1463214172(EXLCZ)993749909960004120250224d2025 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierCultural Security in Contemporary China and Mongolia1st ed.Amsterdam :Amsterdam University Press,2025.©2025.1 online resource (0 pages)94-6372-288-2 Frontmatter -- Table of Contents -- Foreword -- 1. The Cultural Security of Ethnic Groups in Contemporary China and Mongolia -- 2. Cultural Security in the People’s Republic of China : Between Party- State Invocation and Academic Theorization -- 3. Taking Sides : Differences in How the People’s Republic of China Securitizes Uyghur and Hui Muslims -- 4. Muslims with Chinese Characteristics: The Sinicization of Ningxia after 2017 -- 5. Big Bad Wolf: Masculinity and Heroes in Modern Uyghur Literature -- 6. Language Ideologies and Cultural Security : The Status and Meanings of the Uyghur Language -- 7. Local Cultural Inclusion and Partnership Assistance to Tibet : A Case Study on Lunang Township’s Tourism Development Project -- 8. Adaptation of the Offering to the Mountain Deity among the Qiang in Northwest Sichuan: Cultural Security on Multiple Levels -- 9. Against the Flattening of Ridges and Ravines : (Dis)locating Cultural Security through Writing with the Yi of Southwest China -- 10. Hong Kong and Scalable Cultural Security -- 11. Cultural Survival and National Identity in Contemporary Mongolia -- IndexCultural Security in Contemporary China and Mongolia applies the term “cultural security” not exclusively to state- or institution-implemented processes, but also considers the indigenous, bottom-up, and inside-out mechanisms of establishing and maintaining communal cultural security of an ethnic group. Markers of cultural identity differ according to an inside and outside perspective and can be re-defined according to inner or outer circumstances. Importance of these markers increases when a community feels endangered in their cultural existence, or diminishes when perceived cultural identity is not questioned. The dynamics shaping cultural security are illustrated in examples of ethnic communities in the People’s Republic of China and in Mongolia.POLITICAL SCIENCE / Human Rightsbisacshcultural security, identity, ethnic policy, China, Asia.POLITICAL SCIENCE / Human Rights.951.004Ptácková Jarmila1335711Klimes Ondrej1634786MiAaPQMiAaPQMiAaPQBOOK9910978246603321Cultural Security in Contemporary China and Mongolia4335592UNINA