“Black Box” Theatre: Second-Order Cybernetics and Naturalism in Rehearsal and Performance

Author(s):  
Tom Scholte
Multilingua ◽  
2018 ◽  
Vol 37 (3) ◽  
pp. 225-253
Author(s):  
Reem Bassiouney

Abstract ‘Saʿidi dialect’ is a general phrase used by Egyptians to refer to a group of dialects spoken in an area that stretches from the south of Cairo to the border of the Sudan. Of all the dialects found throughout Egypt and the Arab world, Saʿidi Arabic is one of the most ridiculed, stigmatised and stereotyped in the media. Salient phonological and semantic features of Saʿidi are associated with undesirable attributes such as ignorance, stupidity and a lack of sophistication. These negative indexes are often emphasised by the media. However, some Saʿidi intellectuals and public figures employ these very features to perform their identity, thus creating a positive stance and highlighting the favourable traits of Saʿidis. This article examines data from the media, including soap operas, poetry – both written and performed – postcards and songs. It utilises the concepts of indexicality and stance-taking to explore the metalinguistic discourse of Saʿidis and non-Saʿidis in the media. In addition, the article examines indexes of Saʿidi features that are considered second order indexes, but that are used by performers who employ a Saʿidi dialect to create a stance that is remarkably distinct from the rest of Egypt.


2020 ◽  
Author(s):  
yunxiu ye ◽  
Zhenfu Cao ◽  
Jiachen Shen

Abstract Attribute-based encryption received widespread attention as soon as it proposes. However, due to its specific characteristics, the attribute-based access control method is not flexible enough in actual operation. In addition, since access authorities are determined according to users' attributes, users sharing the same attributes are difficult to distinguish. Once a malicious user makes illicit gains by their decryption authorities, it is difficult to trace specific users. This paper follows the practical demand to propose a more flexible key-policy attribute-based encryption scheme with black-box traceability. The scheme has a constant number of constant parameters which can be utilized to construct attribute-related parameters flexibly, and the method of traitor tracing in broadcast encryption is introduced to achieve effective malicious user tracing. In addition, the security and feasibility can be proved by the security proofs and performance evaluation in this paper.


Kybernetes ◽  
2019 ◽  
Vol 49 (8) ◽  
pp. 2073-2090 ◽  
Author(s):  
Andrei Cretu

Purpose W. Ross Ashby’s elementary non-trivial machine, known in the cybernetic literature as the “Ashby Box,” has been described as the prototypical example of a black box system. As far as it can be ascertained from Ashby’s journal, the intended purpose of this device may have been to exemplify the environment where an “artificial brain” may operate. This paper describes the construction of an elementary observer/controller for the class of systems exemplified by the Ashby Box – variable structure black box systems with parallel input. Design/methodology/approach Starting from a formalization of the second-order assumptions implicit in the design of the Ashby Box, the observer/controller system is synthesized from the ground up, in a strictly system-theoretic setting, without recourse to disciplinary metaphors or current theories of learning and cognition, based mainly on guidance from Heinz von Foerster’s theory of self-organizing systems and W. Ross Ashby’s own insights into adaptive systems. Findings Achieving and maintaining control of the Ashby Box requires a non-trivial observer system able to use the results of its interactions with the non-trivial machine to autonomously construct, deconstruct and reconstruct its own function. The algorithm and the dynamical model of the Ashby Box observer developed in this paper define the basic specifications of a general purpose, unsupervised learning architecture able to accomplish this task. Originality/value The problem exemplified by the Ashby Box is fundamental and goes to the roots of cybernetic theory; second-order cybernetics offers an adequate foundation for the mathematical modeling of this problem.


2018 ◽  
Vol 88 ◽  
pp. 397-406 ◽  
Author(s):  
Mercedes Úbeda-García ◽  
Enrique Claver-Cortés ◽  
Bartolomé Marco-Lajara ◽  
Patrocinio Zaragoza-Sáez ◽  
Francisco García-Lillo

2006 ◽  
Vol 23 (4) ◽  
pp. 529-545 ◽  
Author(s):  
Markus Schwaninger ◽  
Matej Janovjak ◽  
Kristjan Ambroz

Sign in / Sign up

Export Citation Format

Share Document