Refine
Departments, institutes and facilities
- Fachbereich Informatik (32)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (32)
- Fachbereich Wirtschaftswissenschaften (27)
- Fachbereich Ingenieurwissenschaften und Kommunikation (25)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (22)
- Institut für Verbraucherinformatik (IVI) (14)
- Institut für Cyber Security & Privacy (ICSP) (11)
- Sprachenzentrum (4)
- Institut für IT-Service (ITS) (2)
- Institute of Visual Computing (IVC) (2)
Document Type
- Conference Object (160) (remove)
Year of publication
Has Fulltext
- yes (160) (remove)
Keywords
- Entrepreneurship (6)
- Ghana (5)
- Risk-based Authentication (3)
- Sustainability (3)
- Usable Security (3)
- WiLD (3)
- document similarity (3)
- 802.11 (2)
- Augmented Reality (2)
- Big Data Analysis (2)
The continuously increasing number of biomedical scholarly publications makes it challenging to construct document recommendation algorithms that can efficiently navigate through literature. Such algorithms would help researchers in finding similar, relevant, and related publications that align with their research interests. Natural Language Processing offers various alternatives to compare publications, ranging from entity recognition to document embeddings. In this paper, we present the results of a comparative analysis of vector-based approaches to assess document similarity in the RELISH corpus. We aim to determine the best approach that resembles relevance without the need for further training. Specifically, we employ five different techniques to generate vectors representing the text in the documents. These techniques employ a combination of various Natural Language Processing frameworks such as Word2Vec, Doc2Vec, dictionary-based Named Entity Recognition, and state-of-the-art models based on BERT. To evaluate the document similarity obtained by these approaches, we utilize different evaluation metrics that account for relevance judgment, relevance search, and re-ranking of the relevance search. Our results demonstrate that the most promising approach is an in-house version of document embeddings, starting with word embeddings and using centroids to aggregate them by document.
Computers can help us to trigger our intuition about how to solve a problem. But how does a computer take into account what a user wants and update these triggers? User preferences are hard to model as they are by nature vague, depend on the user’s background and are not always deterministic, changing depending on the context and process under which they were established. We pose that the process of preference discovery should be the object of interest in computer aided design or ideation. The process should be transparent, informative, interactive and intuitive. We formulate Hyper-Pref, a cyclic co-creative process between human and computer, which triggers the user’s intuition about what is possible and is updated according to what the user wants based on their decisions. We combine quality diversity algorithms, a divergent optimization method that can produce many, diverse solutions, with variational autoencoders to both model that diversity as well as the user’s preferences, discovering the preference hypervolume within large search spaces.
In the context of the Franco-German research project Re(h)strain, this work focuses on a global system analysis integrating both safety and security analysis of international and/or urban railway stations. The Re(h)strain project focuses on terrorist attacks on high speed train systems and investigates prevention and mitigation measures to reduce the overall vulnerability and strengthen the system resilience. One main criterion regarding public transport issues is the number of passengers. For example, the railway station of Paris “Gare du Nord” deals with a bigger number of passengers than the biggest airport in the world (SNCF open Data 2014), the Atlanta airport, but in terms of passengers, it is only around the 23rd rank railway station in the world. Due to the enormous mass of people, this leads to the system approach of breaking out the station into several classes of zones, e.g. entrance, main hall, quays, trains, etc. All classes are analysed considering state-of-the-art parameters, like targets attractiveness, feasibility of attack, possible damage, possible mitigation and defences. Then, safety incidence of security defence is discussed in order to refine security requirement with regard to the considered zone. Finally, global requirements of security defence correlated to the corresponding class of zones are proposed.
One of the biggest challenges faced by many tech start-ups from developed markets is to have validated market-fit products/services and to see their solutions implemented. In several sectors, stringent regulations, and the law of handicap of head start at home can be hurdles that limit the development and even the survival potential of theses start-ups. Tech start-ups seeking implementation, learning, and legitimacy may have a solution in expanding into emerging markets. Emerging markets offer both business opportunities in sectors in need of new technologies as they are “fertile grounds” for developing and testing internationalisation business models. We present here a process designed to help tech start-ups to identify, access, shape and seize these opportunities and to overcome their own specificities and emerging markets specificities. The three phases of the proposed process cover entry node concept, partnership, and business, operating and revenue joint models’ development. DesignScience Research Paradigm is used for the design and evaluation of the process. To show the relevance of this process, a case study on the expansion in Morocco of a Dutch start-up active in e-health is used. The study shows the importance of the process for the embeddedness in a local relevant value network with a relevant adopter’s system, a key enabler to achieve time and cost-effective expansion in that specific business and institutional contexts. A pilot to assess the proposed models and evidence of benefits is under development. To boost their chances of growth tech start-ups from developed markets should consider expansion into emerging markets in their strategy. It would be beneficial that policy makers adopt a strategy by which to assist tech start-ups in accessing value networks in emerging markets. It is also important for policy makers from emerging markets to consider developing schemes to attract tech start-ups from developed markets.
Mobile technologies have evolved into the means of gaining access to information for learning. Its application in higher education is still a novel concept, particularly in underdeveloped countries. This study is aimed at exploring the views of doctoral students regarding their learning experiences with mobile technologies. Student focus group interviews of 24 doctoral students from 3 different academic institutions were interviewed. The participants’ responses were recorded, transcribed, and analyzed to make conclusions. According to the findings of this study, mobile devices play an important part in the learning experiences of doctoral students. The participating students engaged in collaborative learning using mobile technologies. Given the benefits of adopting mobile technologies for learning activities, academic institutions should focus on teaching faculty members to use this to involve students in their learning process. The implications of this study call for the continued advancement of mobile technologies to facilitate effective learning experience for the multitude of mobile learners in developing countries. Another implication is that academic institutions with collaboration with libraries should see the need to develop user friendly mobile app that is linked to the library management system. Such an application would allow the students to optimally use their smartphones and tablets to search the library’s resources from their mobile devices. Training should be offered to the teaching faculty members to come to terms with the benefits of mobile technologies for learning activities.
This paper introduces a random number generator (RNG) based on the avalanche noise of two diodes. A true random number generator (TRNG) generates true random numbers with the use of the electronic noise produced by two avalanche diodes. The amplified outputs of the diodes are sampled and digitized. The difference between the two concurrently sampled and digitized outputs is calculated and used to select a seed and to drive a pseudo-random number generator (PRNG). The PRNG is an xorshift generator that generates 1024 bits in each cycle. Every sequence of 1024 bits is moderately modified and output. The TRNG delivers the next seed and the next cycle begins. The statistical behavior of the generator is analyzed and presented.
For research in audiovisual interview archives often it is not only of interest what is said but also how. Sentiment analysis and emotion recognition can help capture, categorize and make these different facets searchable. In particular, for oral history archives, such indexing technologies can be of great interest. These technologies can help understand the role of emotions in historical remembering. However, humans often perceive sentiments and emotions ambiguously and subjectively. Moreover, oral history interviews have multi-layered levels of complex, sometimes contradictory, sometimes very subtle facets of emotions. Therefore, the question arises of the chance machines and humans have capturing and assigning these into predefined categories. This paper investigates the ambiguity in human perception of emotions and sentiment in German oral history interviews and the impact on machine learning systems. Our experiments reveal substantial differences in human perception for different emotions. Furthermore, we report from ongoing machine learning experiments with different modalities. We show that the human perceptual ambiguity and other challenges, such as class imbalance and lack of training data, currently limit the opportunities of these technologies for oral history archives. Nonetheless, our work uncovers promising observations and possibilities for further research.
WiFi-based Long Distance (WiLD) networks have emerged as a promising alternative approach for Internet in rural areas. However, the MAC layer, which is based on the IEEE802.11 standard, comprises contiguous stations in a cell and is spatially restricted to a few hundred meters at most. In this work, we summarize efforts by different researchers to use IEEE802.11 over long-distances. In addition, we introduce WiLDToken, our solution to optimizing the throughput and fairness and reducing the delay on WiLD links. Compared to previous alternative MAC layers protocols for WiLD, our focus is on optimizing a single link in a multi-radio multi-channel mesh. We implement our protocol in the ns-3 network simulator and show thatWiLDToken is superior to an adapted version of the Distributed Coordination Function (DCF) for different link distances. We find that the throughput on a single link is close to the physical data-rate without a major decrease over longer distances.
This study sought to apply the Structure Conduct Performance paradigm to Africa´s air transport landscape in general. To do that, it examines the past, present, and future expectations of four of Sub-Saharan Africa’s biggest aviation economies, namely South Africa, Kenya, Ethiopia, and Nigeria. Secondary data containing historical passenger traffic was analysed, and predictions for growth in the next ten years were proposed. The findings suggest that the experience of the existing liberalization initiatives, such as the Yamoussoukro Declaration (YD), has produced less than expected benefits. However, the future of aviation in Africa is somewhat positive, with a growth trajectory expected to follow a linear and gradual path supported by various initiatives, including the Single African Air Transport Market (SAATM) and the African Continental Free Trade Area (AFCTA). The study’s contribution is to illuminate the current discourse on the aviation sector in Africa through the Structure-Conduct-Performance theory paradigm and suggests a conceptual model that could be applied to future studies relating to aviation in Africa.
For years, the common logic that underpinned entrepreneurship was to find a niche within in a market/sector and then solidify business practice to achieve success in the market segment. The dawn of technologically-based disruptive enterprises, such as Uber and Air B&B, coupled with the nearing Fourth Industrial revolution seriously call into question the conventional business logic. In this article, the projected impact of these forces on African entrepreneurs is explored. We look at the role of government, business and education systems to prepare for the impact of the Fourth Industrial revolution. Specific focus is placed on the need for entrepreneurial skills and training to prepare for the impact of the Fourth Industrial revolution. We also explore the importance of innovation, both in terms of products and processes to mitigate against the impact of these forces.