I denne artikel bliver der med udgangspunkt i forfatterens erfaring fra LegeKunst, undersøgt hvilke nye muligheder for at sanse, eksperimentere, tænke og lege der kan opstå, når børn går deres egne ...veje. Formålet er, at belyse hvordan æstetiske processer kan åbne op for børns eksperimentering. Analysen viser, at der kan opstå nye forståelser for verden gennem æstetisk eksperimentering og at disse kan blive til fantasileg. Derudover viser artiklen hvordan leg kan udspringe af noget kaotisk, men at børn selv er i stand til at regulere fantasilegen. Leg kan fremstå både ordentlig og kaotisk, men begge dimensioner er vigtige, for det er herigennem børn forstår og udfordrer omverdens krav, hvilket giver mulighed for dannelse.
Teknolojinin ilerlemesi, multimedya ve iletişim araçlarının genişlemesinde veri aktarımı sürecini hızlandırmaktadır. Dijital görüntüler, veri aktarımlarında en sık kullanılan veri türlerinden ...biridir. Bu görüntüler kişisel ve gizli bilgiler içerebilir. Görüntülerin genel bir ağ üzerinden gönderildiğinde, alıcı tarafa şifreli olarak iletilmesi bilgi güvenliği açısından çok önemlidir. Kaos tabanlı yöntemler en yaygın olarak kullanılan görüntü şifreleme teknikleridir. Bu çalışmada, Henon ve Tent kaotik haritaları kullanılarak Jetson Tx2 ve Jetson Nano gömülü sistemler üzerinde gerçek zamanlı olarak karıştırma ve yayılma tabanlı bir görüntü şifreleme yöntemi tasarlanmış ve uygulanmıştır. Uygulanan görüntü şifreleme sisteminin performansını değerlendirmek için literatürde en sık kullanılan yöntemler histogram analizi, korelasyon analizi ve anahtar duyarlılık analizi gibi güvenlik testlerine tabi tutulmaktadır. Ayrıca önerilen sistem, iki farklı gömülü sistemin şifreleme ve şifre çözme süreleri karşılaştırılarak değerlendirilmiştir. Sonuçlar, önerilen görüntü şifreleme sisteminin oldukça güvenli olduğunu açıkça göstermektedir.
The advancement of technology has sped up the process of data transfer in the expansion of multimedia and communication tools. Digital images are one of the most frequently used data types in data transfers. These images may contain personal and confidential information. When images are sent over a public network, it is crucial for information security to transmit them to the receiving party in encryped format. Chaos-based methods are the most commonly used image encryption techniques. In this study, a confusion and diffusion based image encryption method is designed and implemented in real time on Jetson Tx2 and Jetson Nano embedded systems using Henon and Tent chaotic maps. To evaluate the performance of the implemented image encryption system, the most frequently used images in the literature are subjected to security tests such as histogram analysis, correlation analysis, and key sensitivity analysis. Moreover, the proposed system is evaluated by comparing the encryption and decryption times of two different embedded systems. The results clearly demonstrate that proposed image encryption system has a highly secure.
•TOC versus order-up-to inventory policy comparison using the ‘Beer Game’ scenario.•KAOS methodology used to devise the multi-agent simulation model.•Robust SW engineering and TDD techniques used to ...build the model.•Bottleneck managed through DBR methodology, placing the drum at the shop retailer.•TOC philosophy leads the supply chain to a significant decrease of Bullwhip Effect.
In the current environment, Supply Chain Management (SCM) is a major concern for businesses. The Bullwhip Effect is a proven cause of significant inefficiencies in SCM. This paper applies Goldratt’s Theory of Constraints (TOC) to reduce it. KAOS methodology has been used to devise the conceptual model for a multi-agent system, which is used to experiment with the well known ‘Beer Game’ supply chain exercise. Our work brings evidence that TOC, with its bottleneck management strategy through the Drum–Buffer–Rope (DBR) methodology, induces significant improvements. Opposed to traditional management policies, linked to the mass production paradigm, TOC systemic approach generates large operational and financial advantages for each node in the supply chain, without any undesirable collateral effect.
This heavily illustrated book collects in one source most of the mathematically simple systems of differential equations whose solutions are chaotic. It includes the historically important systems of ...van der Pol, Duffing, Ueda, Lorenz, Rössler, and many others, but it goes on to show that there are many other systems that are simpler and more elegant. Many of these systems have been only recently discovered and are not widely known. Most cases include plots of the attractor and calculations of the spectra of Lyapunov exponents. Some important cases include graphs showing the route to chaos. The book includes many cases not previously published as well as examples of simple electronic circuits that exhibit chaos.
This paper presents a specification of the hybrid ERTMS/ETCS level 3 standard in the framework of the case study proposed for ABZ2018. The specification is based on methods and tools, developed in ...the
ANR FORMOSE
project, for the modeling and formal verification of critical and complex system requirements. The requirements are specified with
SysML/KAOS
goal diagrams and are automatically translated into
B System
specifications, in order to obtain the architecture of the formal specification. Domain properties are specified by ontologies with the SysML/KAOS domain modeling language, based on
OWL
and
PLIB
. Their automatic translation completes the structural part of the formal specification. The only part of the specification that must be manually completed is the body of events. The construction is incremental, based on refinement mechanisms that exist within the involved methods. Regarding the case study, the formal specification includes seven refinement levels and all proofs have been discharged under the Rodin platform.
The KAOS (Knowledge Acquisition in Automated Specification) goals diagram is one of the most important diagrams during software requirements elicitation, that is to say, the first phase of a ...program's life cycle, since it helps stakeholders (users) to understand the importance of future software. In the studies in order to identify the traceability that should exist between natural language and the goals that have been identified to avoid inaccuracies between them was not possible. This paper presents a method for extracting and classifying goals in KAOS approach through the processing of textual requirements in Spanish. In this method, the phrases found in a text are broken down and a morphological and syntactical analysis is carried out for each phrase, using the classification of Spanish verbs as reference. Furthermore, morphosyntactic structures are defined which allow the goals to be typified and classified, based on the following types: (i) Maintain; (ii) Achieve; (iii) Cease and (iv) Avoid. This classification aims to list all of the goals and to represent them according to the KAOS goal model. This method will serve as a starting point for identifying the other components that make up the KAOS goal diagram and the semiautomatic rendering of said diagram.
An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the ...business requirements. The diversity of currently available security requirement engineering methodologies leads security requirements engineers to an open question: How to choose one? We present a global evaluation methodology that we applied during the IREHDO2 project to find a requirement engineering method that could improve network security. Our evaluation methodology includes a process to determine pertinent evaluation criteria and a process to evaluate the requirement engineering methodologies. Our main contribution is to involve stakeholders (i.e., security requirements engineers) in the evaluation process by following a requirement engineering approach. We describe our experiments conducted during the project with security experts and the feedback we obtained. Although we applied it to evaluate three requirements engineering methods (KAOS, STS and SEPP) in the context of network security, our evaluation methodology can be instantiated in other contexts and other methods.
CorelDraw is an application programs that much used by professionals in graphic design. CorrelDraw can be used for designing, creating various shapes, and managing the colours. This program is easy ...to handle and operate therefore it can be applied for designing the distro (distribution outlet) t-shirt. Designing skills of the distro t-shirt using CorelDraw is required for being distro designer. The important things that could be counted in designing distro t-shirt is creativity of ideas and inspirations. Meanwhile, there are several factors influenced the successfulness on distro business. The factors could be the capital, promotion, marketing, and distribution. CorelDraw merupakan program aplikasi yang banyak dimanfaatkan oleh kalangan profesional dalam pembuatan desain grafis. CorelDraw dapat digunakan untuk mendesain, membuat berbagai bentuk, dan memberi warna. Program ini mudah untuk dipahami dan dioperasikan sehingga dapat dimanfaatkan untuk mendesain kaos distro (distribution outlet). Keterampilan dalam membuat desain kaos distro menggunakan CorelDraw diperlukan untuk menjadi desainer kaos distro. Hal yang perlu diperhatikan adalah kreatifitas dalam menciptakan ide atau inspirasi yang dituangkan dalam bentuk desain kaos distro. Sementara itu terdapat beberapa faktor yang mempengaruhi keberhasilan dalam bisnis distro. Faktor-faktor tersebut antara lain modal, produksi, promosi, pemasaran, dan distribusi.