NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.554
1.
  • Mellem orden og kaos: – Når... Mellem orden og kaos: – Når børn går deres egne veje
    Nielsen, Johan Bundgaard BUKS - Tidsskrift for Børne- & Ungdomskultur, 05/2023
    Journal Article
    Recenzirano
    Odprti dostop

    I denne artikel bliver der med udgangspunkt i forfatterens erfaring fra LegeKunst, undersøgt hvilke nye muligheder for at sanse, eksperimentere, tænke og lege der kan opstå, når børn går deres egne ...
Celotno besedilo
2.
  • From Xáos to Kaos From Xáos to Kaos
    Nourit Melcer-Padon Incontri (Amsterdam, Netherlands), 06/2023, Letnik: 37, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Il saggio discute diversi aspetti relativi alla trasposizione cinematografica di sei novelle di Luigi Pirandello nel film Kaos dei fratelli Taviani. La rilevanza dell’argomento emerge dalle posizioni ...
Celotno besedilo
3.
  • Gömülü sistemlerde kaotik h... Gömülü sistemlerde kaotik haritalar kullanılarak gerçek zamanlı görüntü şifreleme uygulaması
    CANDAN, Cagri; ŞAHİN, Muhammet Emin Düzce Üniversitesi bilim ve teknoloji dergisi (Online), 04/2023, Letnik: 11, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Teknolojinin ilerlemesi, multimedya ve iletişim araçlarının genişlemesinde veri aktarımı sürecini hızlandırmaktadır. Dijital görüntüler, veri aktarımlarında en sık kullanılan veri türlerinden ...
Celotno besedilo
4.
  • Applying Goldratt’s Theory ... Applying Goldratt’s Theory of Constraints to reduce the Bullwhip Effect through agent-based modeling
    Costas, José; Ponte, Borja; de la Fuente, David ... Expert systems with applications, 03/2015, Letnik: 42, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    •TOC versus order-up-to inventory policy comparison using the ‘Beer Game’ scenario.•KAOS methodology used to devise the multi-agent simulation model.•Robust SW engineering and TDD techniques used to ...
Celotno besedilo

PDF
5.
  • Elegant chaos Elegant chaos
    Sprott, Julien Clinton; Sprott, Julien Clinton 2010., 2010, 2010-03-22
    eBook

    This heavily illustrated book collects in one source most of the mathematically simple systems of differential equations whose solutions are chaotic. It includes the historically important systems of ...
Celotno besedilo
6.
  • Modeling the hybrid ERTMS/E... Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach
    Tueno Fotso, Steve Jeffrey; Frappier, Marc; Laleau, Régine ... International journal on software tools for technology transfer, 06/2020, Letnik: 22, Številka: 3
    Journal Article
    Recenzirano

    This paper presents a specification of the hybrid ERTMS/ETCS level 3 standard in the framework of the case study proposed for ABZ2018. The specification is based on methods and tools, developed in ...
Celotno besedilo
7.
  • Chaotic Dynamics Chaotic Dynamics
    Tél, Tamás; Gruiz, Márton 08/2006
    eBook

    In the past few decades we have come to understand that even motions in simple systems can have complex and surprising properties. Chaotic Dynamics provides a clear introduction to these chaotic ...
Celotno besedilo
8.
Celotno besedilo

PDF
9.
  • Reconstructing nonlineariti... Reconstructing nonlinearities with intermodulation spectroscopy
    Hutter, Carsten; Platz, Daniel; Tholén, E A ... Physical review letters, 02/2010, Letnik: 104, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    We describe a method of analysis which allows for reconstructing the nonlinear disturbance of a high Q harmonic oscillator. When the oscillator is driven with two or more frequencies, the ...
Celotno besedilo

PDF
10.
  • A Methodological Approach t... A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
    Laborde, Romain; Bulusu, Sravani Teja; Wazan, Ahmad Samer ... Journal of cybersecurity and privacy, 09/2021, Letnik: 1, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 1.554

Nalaganje filtrov