Chabrol and Genres

Author(s):  
Catherine Dousteyssier-Khoze

This chapter investigates the various ways in which Chabrol’s cinema engages with genre(s). Although his output is generically diverse, Chabrol remains mostly associated with the crime thriller. The focus is on how Chabrol works broadly within the confines of a generic frame while managing to reflect it in very different ways. The first case study, on Le Boucher, shows how a generically stable thriller transcends the genre at the end in order to become a philosophical investigation into civilisation and the human. In so doing, it identifies Stanley Kubrick’s 2001 A Space Odyssey as a key, undiscovered intertext for Le Boucher. The other films examined in this chapter, Masques, La Fille coupé en deux and Bellamy show how Chabrol resorts to reflexive modes (parody, theatricality) in order to raise questions about spectatorship. Finally, by examining the fortunes of the adjective ‘chabrolien’ in film reviews and identifying a number of Chabrolean markers through two case studies (films by Anne Fontaine and Denis Dercourt), this chapter explores Chabrol’s lasting legacy on the contemporary French thriller.

2010 ◽  
Vol 3 (3) ◽  
Author(s):  
Bim Riddersporre

Title: Normative control in the pre-school: A Swedish case studyAbstract: The project “Normative leadership in the pre-school” is a series of case-studies which aims at clarifying how normative leadership is practiced and negotiated, as well as which norms are created by leaders and co-workers. The amount of research into leadership in pre-schools is currently low, despite the comprehensive nature and significance of the institution. Relation to theory is often weak, as is the connection to more general research on leadership. I have chosen the theory of normative control of organisations as a framework for my analysis. The empirical methods are a combination of interviews and observations. In this first case study, the subject is an unusual leadership task. A number of new pre-schools are to be established, and the leader is to create a vision for these. Tension arises between vision and daily reality, however. It is the vision that must confront everyday life, and not the other way around. A common understanding must gradually be established, with its foundation just as much in norms and ideas as in security and common experience. The results indicate that negotiation and re-negotiation are important aspects of normative control in the pre-school. I propose the concept distributed normative control as the collaborators and the leader share the normative power in the daily round. Keywords: Pre-school leadership, Normative control, Distributed leadership, Case studyEmail: [email protected]


Author(s):  
Ashish Singla ◽  
Jyotindra Narayan ◽  
Himanshu Arora

In this paper, an attempt has been made to investigate the potential of redundant manipulators, while tracking trajectories in narrow channels. The behavior of redundant manipulators is important in many challenging applications like under-water welding in narrow tanks, checking the blockage in sewerage pipes, performing a laparoscopy operation etc. To demonstrate this snake-like behavior, redundancy resolution scheme is utilized using two different approaches. The first approach is based on the concept of task priority, where a given task is split and prioritize into several subtasks like singularity avoidance, obstacle avoidance, torque minimization, and position preference over orientation etc. The second approach is based on Adaptive Neuro Fuzzy Inference System (ANFIS), where the training is provided through given datasets and the results are back-propagated using augmentation of neural networks with fuzzy logics. Three case studies are considered in this work to demonstrate the redundancy resolution of serial manipulators. The first case study of 3-link manipulator is attempted with both the approaches, where the objective is to track the desired trajectory while avoiding multiple obstacles. The second case study of 7-link manipulator, tracking trajectory in a narrow channel, is investigated using the concept of task priority. The realistic application of minimum-invasive surgery (MIS) based trajectory tracking is considered as the third case study, which is attempted using ANFIS approach. The 5-link spatial redundant manipulator, also known as a patient-side manipulator being developed at CSIR-CSIO, Chandigarh is used to track the desired surgical cuts. Through the three case studies, it is well demonstrated that both the approaches are giving satisfactory results.


Author(s):  
Alex Ryan ◽  
Mark Leung

This paper introduces two novel applications of systemic design to facilitate a comparison of alternative methodologies that integrate systems thinking and design. In the first case study, systemic design helped the Procurement Department at the University of Toronto re-envision how public policy is implemented and how value is created in the broader university purchasing ecosystem. This resulted in an estimated $1.5 million in savings in the first year, and a rise in user retention rates from 40% to 99%. In the second case study, systemic design helped the clean energy and natural resources group within the Government of Alberta to design a more efficient and effective resource management system and shift the way that natural resource departments work together. This resulted in the formation of a standing systemic design team and contributed to the creation of an integrated resource management system. A comparative analysis of the two projects identifies a shared set of core principles for systemic design as well as areas of differentiation that reveal potential for learning across methodologies. Together, these case studies demonstrate the complementarity of systems thinking and design thinking, and show how they may be integrated to guide positive change within complex sociotechnical systems.


Risks ◽  
2021 ◽  
Vol 9 (11) ◽  
pp. 204
Author(s):  
Chamay Kruger ◽  
Willem Daniel Schutte ◽  
Tanja Verster

This paper proposes a methodology that utilises model performance as a metric to assess the representativeness of external or pooled data when it is used by banks in regulatory model development and calibration. There is currently no formal methodology to assess representativeness. The paper provides a review of existing regulatory literature on the requirements of assessing representativeness and emphasises that both qualitative and quantitative aspects need to be considered. We present a novel methodology and apply it to two case studies. We compared our methodology with the Multivariate Prediction Accuracy Index. The first case study investigates whether a pooled data source from Global Credit Data (GCD) is representative when considering the enrichment of internal data with pooled data in the development of a regulatory loss given default (LGD) model. The second case study differs from the first by illustrating which other countries in the pooled data set could be representative when enriching internal data during the development of a LGD model. Using these case studies as examples, our proposed methodology provides users with a generalised framework to identify subsets of the external data that are representative of their Country’s or bank’s data, making the results general and universally applicable.


1997 ◽  
Vol 15 (1) ◽  
pp. 40-53 ◽  
Author(s):  
E. G. Bradshaw ◽  
M. Lester

Abstract. The characteristics of substorm-associated Pi2 pulsations observed by the SABRE coherent radar system during three separate case studies are presented. The SABRE field of view is well positioned to observe the differences between the auroral zone pulsation signature and that observed at mid-latitudes. During the first case study the SABRE field of view is initially in the eastward electrojet, equatorward and to the west of the substorm-enhanced electrojet current. As the interval progresses, the western, upward field-aligned current of the substorm current wedge moves westward across the longitudes of the radar field of view. The westward motion of the wedge is apparent in the spatial and temporal signatures of the associated Pi2 pulsation spectra and polarisation sense. During the second case study, the complex field-aligned and ionospheric currents associated with the pulsation generation region move equatorward into the SABRE field of view and then poleward out of it again after the third pulsation in the series. The spectral content of the four pulsations during the interval indicate different auroral zone and mid-latitude signatures. The final case study is from a period of low magnetic activity when SABRE observes a Pi2 pulsation signature from regions equatorward of the enhanced substorm currents. There is an apparent mode change between the signature observed by SABRE in the ionosphere and that on the ground by magnetometers at latitudes slightly equatorward of the radar field of view. The observations are discussed in terms of published theories of the generation mechanisms for this type of pulsation. Different signatures are observed by SABRE depending on the level of magnetic activity and the position of the SABRE field of view relative to the pulsation generation region. A twin source model for Pi2 pulsation generation provides the clearest explanation of the signatures observed.


2008 ◽  
Vol 63 (3) ◽  
pp. 479-501 ◽  
Author(s):  
Dominique Peyrat-Guillard

This article proposes a study of the violation of contract process through a case study. The study is based on a discourse of the union, SUD Michelin, which is contrasted both with those of another union, the CFE-CGC Michelin and of the senior management of the corporation. The results highlight the possibility of applying Morrison and Robinson’s (1997) Psychological Contract Violation model at the social contract level. The emotional reactions appearing in the literature, which are associated with contract violations, can be seen in the union discourse of the SUD. The other union does not perceive any breach of contract. These differences may be attributed to the very nature of social contracts—relational in the first case, and more balanced in the second.


Author(s):  
Roi Wagner

This chapter examines two case studies that illustrate the limitations of the cognitive theory of mathematical metaphor in accounting for the formation of actual historical mathematical life worlds. The first case study deals with four medieval and early modern examples of relating algebra to geometry. These examples show that when two mathematical domains are linked, what passes between them cannot be reduced to “inferences,” as assumed by the theory of mathematical metaphor. The second case study reviews notions of infinity since early modernity and demonstrates that these notions are far too variegated and complex to be subsumed under a single metaphor—namely, George Lakoff and Rafael Núñez's basic metaphor of infinity, which tries to read all mathematical infinities as metaphorically projecting final destinations on indefinite sequences.


Author(s):  
Roi Wagner

This chapter presents two case studies that highlight the problems of mathematical semiosis: how mathematical signs obtain and change their senses. The first case study follows the paradigmatic mathematical sign, x, as it is used in applications of powers series to combinatorics via generating functions. The second case study concerns gender role stereotypes involving the so-called “stable marriage problem.” Both case studies open up questions of how meaning is transferred within and across mathematical contexts and try to substantiate the book's claims about interpretation, formalization, and constraints over mathematical objects and statements. The chapter also considers gender-neutral mathematical language in the context of sexuality.


Author(s):  
Gencer Erdogan ◽  
Phu H. Nguyen ◽  
Fredrik Seehusen ◽  
Ketil Stølen ◽  
Jon Hofstad ◽  
...  

Risk-driven testing and test-driven risk assessment are two strongly related approaches, though the latter is less explored. This chapter presents an evaluation of a test-driven security risk assessment approach to assess how useful testing is for validating and correcting security risk models. Based on the guidelines for case study research, two industrial case studies were analyzed: a multilingual financial web application and a mobile financial application. In both case studies, the testing yielded new information, which was not found in the risk assessment phase. In the first case study, new vulnerabilities were found that resulted in an update of the likelihood values of threat scenarios and risks in the risk model. New vulnerabilities were also identified and added to the risk model in the second case study. These updates led to more accurate risk models, which indicate that the testing was indeed useful for validating and correcting the risk models.


Author(s):  
Grant Goodall

Courses on invented languages can do much more than just introduce students to linguistics. Through three case studies, it is shown that as students learn how to design a language, they also learn about the design of human language in a way that is unlikely to occur in other courses. The first case study involves the creation of a lexicon, in relation to John Wilkins’ invented language of 1668 and to Saussurean arbitrariness, commonly regarded as a fundamental design property of human language. The second case study concerns phonemic inventories. By designing their own from scratch, students see the competing pressures that phonemic inventories must satisfy in all languages. The third case study concerns inflectional morphology and the pressures that determine the form of particular morphemes. All of these case studies are accessible to students and help them engage with important aspects of the design properties of human language.


Sign in / Sign up

Export Citation Format

Share Document