I denne artikel bliver der med udgangspunkt i forfatterens erfaring fra LegeKunst, undersøgt hvilke nye muligheder for at sanse, eksperimentere, tænke og lege der kan opstå, når børn går deres egne ...veje. Formålet er, at belyse hvordan æstetiske processer kan åbne op for børns eksperimentering. Analysen viser, at der kan opstå nye forståelser for verden gennem æstetisk eksperimentering og at disse kan blive til fantasileg. Derudover viser artiklen hvordan leg kan udspringe af noget kaotisk, men at børn selv er i stand til at regulere fantasilegen. Leg kan fremstå både ordentlig og kaotisk, men begge dimensioner er vigtige, for det er herigennem børn forstår og udfordrer omverdens krav, hvilket giver mulighed for dannelse.
From Xáos to Kaos Nourit Melcer-Padon
Incontri (Amsterdam, Netherlands),
06/2023, Letnik:
37, Številka:
1
Journal Article
Recenzirano
Odprti dostop
Il saggio discute diversi aspetti relativi alla trasposizione cinematografica di sei novelle di Luigi Pirandello nel film Kaos dei fratelli Taviani. La rilevanza dell’argomento emerge dalle posizioni ...di Pirandello nei confronti del mezzo cinematografico, da costui considerato particolarmente adatto a conferire una forma alla propria filosofia artistica. L’arte, racchiusa in una forma permanente e immutabile, è l’unico modo eterno di esistenza, al contrario di quello temporaneo in cui devono vivere i soli mortali. Di conseguenza, Pirandello sostiene che i personaggi immaginari siano più vivi dei loro modelli in carne ed ossa. Il cinema, e in particolare la produzione dei Taviani, è quindi un mezzo particolarmente pertinente da considerare. Si discutono alcune modalità, dispositivi e leitmotiv con cui le trasposizioni cinematografiche rappresentano elementi essenziali dei racconti pirandelliani, tra cui la storia stratificata della Sicilia (dall’antica conquista greca all’attuazione dell’unificazione italiana), e il senso lunare del tempo, il cui andamento ciclico sembra poter essere sovvertito soltanto da una rivoluzione che sconvolga l’ordine sociale. Pur rifiutando di dare una raffigurazione manichea della società, nella rappresentazione delle problematiche sociali siciliane sia Pirandello che i fratelli Taviani chiamano il pubblico ad accorgersi della necessità di un cambiamento.
Teknolojinin ilerlemesi, multimedya ve iletişim araçlarının genişlemesinde veri aktarımı sürecini hızlandırmaktadır. Dijital görüntüler, veri aktarımlarında en sık kullanılan veri türlerinden ...biridir. Bu görüntüler kişisel ve gizli bilgiler içerebilir. Görüntülerin genel bir ağ üzerinden gönderildiğinde, alıcı tarafa şifreli olarak iletilmesi bilgi güvenliği açısından çok önemlidir. Kaos tabanlı yöntemler en yaygın olarak kullanılan görüntü şifreleme teknikleridir. Bu çalışmada, Henon ve Tent kaotik haritaları kullanılarak Jetson Tx2 ve Jetson Nano gömülü sistemler üzerinde gerçek zamanlı olarak karıştırma ve yayılma tabanlı bir görüntü şifreleme yöntemi tasarlanmış ve uygulanmıştır. Uygulanan görüntü şifreleme sisteminin performansını değerlendirmek için literatürde en sık kullanılan yöntemler histogram analizi, korelasyon analizi ve anahtar duyarlılık analizi gibi güvenlik testlerine tabi tutulmaktadır. Ayrıca önerilen sistem, iki farklı gömülü sistemin şifreleme ve şifre çözme süreleri karşılaştırılarak değerlendirilmiştir. Sonuçlar, önerilen görüntü şifreleme sisteminin oldukça güvenli olduğunu açıkça göstermektedir.
The advancement of technology has sped up the process of data transfer in the expansion of multimedia and communication tools. Digital images are one of the most frequently used data types in data transfers. These images may contain personal and confidential information. When images are sent over a public network, it is crucial for information security to transmit them to the receiving party in encryped format. Chaos-based methods are the most commonly used image encryption techniques. In this study, a confusion and diffusion based image encryption method is designed and implemented in real time on Jetson Tx2 and Jetson Nano embedded systems using Henon and Tent chaotic maps. To evaluate the performance of the implemented image encryption system, the most frequently used images in the literature are subjected to security tests such as histogram analysis, correlation analysis, and key sensitivity analysis. Moreover, the proposed system is evaluated by comparing the encryption and decryption times of two different embedded systems. The results clearly demonstrate that proposed image encryption system has a highly secure.
•TOC versus order-up-to inventory policy comparison using the ‘Beer Game’ scenario.•KAOS methodology used to devise the multi-agent simulation model.•Robust SW engineering and TDD techniques used to ...build the model.•Bottleneck managed through DBR methodology, placing the drum at the shop retailer.•TOC philosophy leads the supply chain to a significant decrease of Bullwhip Effect.
In the current environment, Supply Chain Management (SCM) is a major concern for businesses. The Bullwhip Effect is a proven cause of significant inefficiencies in SCM. This paper applies Goldratt’s Theory of Constraints (TOC) to reduce it. KAOS methodology has been used to devise the conceptual model for a multi-agent system, which is used to experiment with the well known ‘Beer Game’ supply chain exercise. Our work brings evidence that TOC, with its bottleneck management strategy through the Drum–Buffer–Rope (DBR) methodology, induces significant improvements. Opposed to traditional management policies, linked to the mass production paradigm, TOC systemic approach generates large operational and financial advantages for each node in the supply chain, without any undesirable collateral effect.
This heavily illustrated book collects in one source most of the mathematically simple systems of differential equations whose solutions are chaotic. It includes the historically important systems of ...van der Pol, Duffing, Ueda, Lorenz, Rössler, and many others, but it goes on to show that there are many other systems that are simpler and more elegant. Many of these systems have been only recently discovered and are not widely known. Most cases include plots of the attractor and calculations of the spectra of Lyapunov exponents. Some important cases include graphs showing the route to chaos. The book includes many cases not previously published as well as examples of simple electronic circuits that exhibit chaos.
This paper presents a specification of the hybrid ERTMS/ETCS level 3 standard in the framework of the case study proposed for ABZ2018. The specification is based on methods and tools, developed in ...the
ANR FORMOSE
project, for the modeling and formal verification of critical and complex system requirements. The requirements are specified with
SysML/KAOS
goal diagrams and are automatically translated into
B System
specifications, in order to obtain the architecture of the formal specification. Domain properties are specified by ontologies with the SysML/KAOS domain modeling language, based on
OWL
and
PLIB
. Their automatic translation completes the structural part of the formal specification. The only part of the specification that must be manually completed is the body of events. The construction is incremental, based on refinement mechanisms that exist within the involved methods. Regarding the case study, the formal specification includes seven refinement levels and all proofs have been discharged under the Rodin platform.
In the past few decades we have come to understand that even motions in simple systems can have complex and surprising properties. Chaotic Dynamics provides a clear introduction to these chaotic ...phenomena, based on geometrical interpretations and simple arguments, without the need for prior in-depth scientific and mathematical knowledge. Richly illustrated throughout, examples are taken from classical mechanics whose elementary laws are familiar to the reader. In order to emphasize the general features of chaos, the most important relations are also given in simple mathematical forms, independent of any mechanical interpretation. A broad range of potential applications are presented, ranging from everyday phenomena through engineering and environmental problems to astronomical aspects. Chaos occurs in a variety of scientific disciplines, and proves to be the rule, not the exception. This book is primarily intended for undergraduate students in science, engineering, and mathematics.
We describe a method of analysis which allows for reconstructing the nonlinear disturbance of a high Q harmonic oscillator. When the oscillator is driven with two or more frequencies, the ...nonlinearity causes intermodulation of the drives, resulting in a complicated spectral response. Analysis of this spectrum allows one to approximate the nonlinearity. The method, which is generally applicable to measurements based on resonant detection, increases the information content of the measurement without requiring a large detection bandwidth, and optimally uses the enhanced sensitivity near resonance to extract information and minimize error due to detector noise.
An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the ...business requirements. The diversity of currently available security requirement engineering methodologies leads security requirements engineers to an open question: How to choose one? We present a global evaluation methodology that we applied during the IREHDO2 project to find a requirement engineering method that could improve network security. Our evaluation methodology includes a process to determine pertinent evaluation criteria and a process to evaluate the requirement engineering methodologies. Our main contribution is to involve stakeholders (i.e., security requirements engineers) in the evaluation process by following a requirement engineering approach. We describe our experiments conducted during the project with security experts and the feedback we obtained. Although we applied it to evaluate three requirements engineering methods (KAOS, STS and SEPP) in the context of network security, our evaluation methodology can be instantiated in other contexts and other methods.