To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Underwater archaeology serves to understand cultural heritage, artifacts, sites, and objects. It advances with technology, enhancing the ability to locate and study shipwrecks. Shipwrecks are a key element under the United Nations Convention on the Law of the Sea (UNCLOS) and the Convention on the Protection of the Underwater Cultural Heritage. This paper examines how underwater archaeology technologies impact the rights of coastal and flag states to access shipwrecks in maritime zones and to collaborate in preserving underwater cultural heritage. It considers wreck locations, vessel types, and the flag state of archaeological ships. The analysis focuses on warships, which may enjoy sovereign immunity, in contrast to other kinds of shipwrecked vessels. Relevant UNCLOS articles, such as 33, 149, and 303, emphasize the protection of objects at sea and warn against infringing upon another state’s rights when retrieving archaeological finds from the seabed. The change is significant as technology increases access to inaccessible sites. The paper explores side-scan sonar, unmanned surface vehicles, and specific underwater imaging technologies. These technologies enable states to study and access shipwrecks across ocean zones. This chapter examines UNCLOS, the Underwater Cultural Heritage Convention, concerning rights to access wrecks within and beyond national jurisdiction amid growing ocean exploration.
The Mercure françois reported that Concini was killed while resisting arrest for treason. The memoirs of twelve contemporaries provide the most detailed accounts of the murder, and contain significant differences. Seven memoirs were first-hand accounts by individuals with a personal knowledge of events including Montpouillan, Chaulnes, Cardinal Richelieu, Guichard Déagent, Pontchartrain, Arnauld d'Andilly, and Lomenie de Brienne. Montpouillan, Chaulnes, and Déagent were actual conspirators but not eyewitnesses to the murder. There are a considerable number of discrepancies and inconsistencies in the twelve accounts of the murder. Contemporary accounts, including those by actual conspirators, stated that Charles d'Albert, duc de Luynes was apprehensive about killing Concini. Richelieu in his memoirs declared that Luynes had persuaded a reluctant king to agree to Concini's murder, and then had convinced him to exile his mother and execute Léonora Galigai, Concini's wife.
This study investigates the use of large language models (LLMs) to classify question utterances within verbal design protocols according to Eris’ (2004) taxonomy. We evaluate the performance of two proprietary LLMs – OpenAI’s GPT-4.1 and Anthropic’s Claude Sonnet 4.5 – across experiments designed to assess classification accuracy, sensitivity to prompt configuration and in-context learning (ICL), and generalization across datasets and models. Using two human-coded datasets of differing size and quality, we measure alignment between LLM-generated labels and human judgments at both question category and subcategory levels. Results show that both LLMs achieved moderate to strong alignment rates at the category level (up to 85.7% for GPT-4.1 and 82.9% for Claude Sonnet 4.5), with substantially lower alignment at the more granular subcategory level. Performance differences across prompt configurations and ICL conditions were small, indicating robust generalization across datasets and transferability of prompt designs. While these results suggest that LLMs can effectively support scalable question classification, human judgment and oversight remain essential. Future research should explore the development and evaluation of alternative hybrid human–LLM workflows in protocol analysis, as well as the use of smaller or open-source models to address data privacy concerns.
Six: I again reverse the focus so as to reflect on the cormorant’s role as an icon of indigeneity providing an unexpected parallel to the role of its cousin the pelican, outlining the latter by way of the Australian children’s book Storm Boy and then turning back to the cormorant to show how it too has at times acquired status both as a marker of indigeneity and as a local victim of human environmental destruction, notably in images of cormorants affected by oil spills, drawing in particular on a Gulf War poem by Tony Harrison and on an image in the writing of Jean Baudrillard. I conclude by returning to the longstanding association of cormorants and China through an analysis of an advert for HSBC (‘The World’s Local Bank’), assessing the co-option by capital of the cormorant’s new-found and hard-earned sense of global belonging.
Chapter 2 continues to explore the ways that, both at home and abroad, shifting Chinese mores demanded that politicians appear in public with their wives. As this change took hold in the new Republic, courtesans and entertainers-turned-concubines emerged as some of the few contemporary women with the social skills and experiences to interact with male strangers. The chapter first presents a case study of Li Benwei, a courtesan who became the concubine of Li Yuanhong, who served twice as President of China. Then, it focuses on Zhou Shunqin, the concubine of Zhou Ziqi, a high-ranking Beiyang official, to illustrate that when a concubine’s social origin was as a courtesan/entertainer, a traditionally degraded category, her public presence could cause unprecedented tensions and sensitivities, especially on the international stage. Finally, it examines the lives of public concubines after the deaths of their husbands. It shows that Li Benwei’s role as a social wife brought societal expectations of her continuous demonstration of wifely virtues after Li’s death, but could not provide her, a sonless concubine, real-life protection against her weak legal status and social prejudices.
We will write an abstract program as a mathematical formula. A program can be quite complex, leading to a long formula. A long formula with a lot of esoteric mathematics would be impossible to understand. So, almost all the math used in our formulas is ordinary math, consisting of arithmetic, simple logic, sets, and functions. You should know most of it already if you took an introductory university math course for computer science or engineering students. Ordinary math does not include the temporal logic introduced in Sections 3.4 and 3.5.
This chapter explores the material practices of filmmaking and to what extent the dreams and representations are reflected in reality. It sketches out the processes through which film is made, concentrating on the organisation of the 'back of camera' activities. The chapter outlines the changing process of film production and the rise of what has been termed 'runaway production'. Runaway production is considered, on the one hand, a threat to Hollywood and, on the other, an opportunity for many global locations that hope to benefit from a migrant film industry. The chapter also explores the contradictions of location shooting for rural areas. It reviews some of the relevant debates in the literature. The chapter considers the potential for different forms of rural film production that are led by cultural rather than economic agendas.
The efforts of Birmingham's intelligentsia to replicate a provincial variant of the pan-European Enlightenment were rooted in increasing affluence, and the pursuit of 'polite' leisure activities. This chapter focuses on the Protestant Dissenters for good historical and historiographical reasons. The Dissenters play an important role in the 'free town' myth of Birmingham's origins and rise to industrial supremacy. Many of the features of the crowd violence against Dissenters would reappear in 1791, during the riots aimed at Dr Joseph Priestley. Contemporaries were keenly aware of the role of Nonconformity in Georgian England, and the Dissenters themselves sedulously cultivated myths about their contributions to scientific knowledge and the industrial economy which historians have mostly endorsed rather uncritically. R. H. Trainor's longitudinal analysis of nineteenth-century political elites reveals a picture in which the strength of the Established Church was rivalled by Nonconformity in the towns of West Bromwich, Dudley and Bilston.
Chapter Three puts forward a two-fold argument about temporality: firstly, that experiences of time and the significance of time may shift as a person ages; secondly, that temporality becomes important in older age because of the uses it is put to against older people in conjunction with narrative. It argues that both narrativity and temporality in ‘disrupted form’ are used against older people to mark a supposed decline into a lesser form of adult selfhood. Temporality has a further level of significance that is explored in this chapter, namely how it is linked to place and to belonging via ‘memory talk’.
Ships rely on Global Navigation Satellite System (GNSS), like the NAVSTAR Global Positioning Systems (GPS), for safe navigation and precise Position, Navigation, and Time (PNT). Based on satellite input, PNT enable shipboard receivers to determine location with precision. As a primary PNT source, GNSS must be accurate and protected from manipulation to ensure safe ship operations. While some GNSS interference is unintentional, threat from State and non-state actors persist. Over the past 20 years, cyberattacks on international shipping by rogue States like China, Iran, and Russia and state-sponsored hackers have increased, threatening maritime safety by disrupting navigation and communication equipment. The proliferation of GNSS interference poses a strategic threat, to global navigation safety, civilian finances, logistics, and communication. This chapter discusses GNSS threats and how States can mitigate jamming and spoofing. It examines efforts by the International Maritime Organization and shipping industry to address these threats and review United States measures to protect its maritime transportation system from cyberattacks. No single solution addresses all GNSS vulnerabilities but combining alternatives can augment GNSS and ensure resilience for critical maritime PNT operations. Regular risk assessments identify vulnerabilities and prioritize mitigation. A clear incident response plan supports cyberattacks, minimizing damage, and expedite recovery.
Plato was the initiator, in the philosophical literature, of the idea that punishment should look to the future, not to the past. It must be beneficial and serve some useful purpose. Beneficial to whom? The first part of Plato’s answer is striking: ‘to the offender’. Punishment should be directed at reforming offenders rather than simply penalizing them because they had offended. This idea was accepted by a succession of (non-abolitionist) thinkers. It is still with us today. Plato was presumably unaware that he was opening a loophole that could be exploited by later reformers who sought a reduction, and then finally abolition, of the death penalty: an offender sentenced to a programme of rehabilitation was not a prime candidate for execution. However, a further possible answer to Plato’s question might be: ‘(beneficial) not for the criminal but for society as a whole’. Plato also held that punishment might serve as a deterrent, and this opened the door to harsh treatment, including death, of some offenders, namely, those who were judged ‘incurable’. One might kill a murderer, or a disparager of the gods, to deter others.
Recognising that there are unmistakable contrasts between classic and neo-noir, this chapter looks at acting choices that tend to be constants, rather than exceptions, in the evolving phenomenon of film noir. It shows that noir narratives require portrayals of tough guys to include a dizzying combination of caricatured and exaggerated performance moments, and occasions of understated gestures and expressions. The chapter clarifies how gestures under pressure work with aspects of film noir narratives to communicate the complex inner life of vulnerable tough guys. It describes certain acting patterns in the classic noirs Maltese Falcon, The Big Sleep and Out of the Past and the neo-noirs Chinatown, Devil in a Blue Dress and Brick. Focusing on noir performances might also be suspect, because the films have been thoroughly identified with their visual style.
The Kindertransport was a voluntary movement organized by the British government in 1938 that brought 10,000 Jewish and other children from Nazi Europe to Britain. This chapter discusses narratives of the Kindertransport journeys, which allowed for the movement of refugee children from Germany, Austria, Czechoslovakia and Poland rescued from Nazi persecution. It highlights the generosity of the British people towards Jewish refugees during the Holocaust period, and explores the reasons why the Kindertransport was subjected to widespread public and media attention since its arrival in 1938.