Refine
H-BRS Bibliography
- yes (221) (remove)
Departments, institutes and facilities
- Fachbereich Wirtschaftswissenschaften (58)
- Fachbereich Informatik (43)
- Fachbereich Sozialpolitik und Soziale Sicherung (37)
- Fachbereich Ingenieurwissenschaften und Kommunikation (32)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (28)
- Fachbereich Angewandte Naturwissenschaften (26)
- Institut für Verbraucherinformatik (IVI) (11)
- Institut für Cyber Security & Privacy (ICSP) (9)
- Institute of Visual Computing (IVC) (8)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (7)
- Graduierteninstitut (6)
- Institut für Medienentwicklung und -analyse (IMEA) (6)
- Zentrum für Innovation und Entwicklung in der Lehre (ZIEL) (6)
- Institut für funktionale Gen-Analytik (IFGA) (5)
- Bibliothek (4)
- Zentrum für Ethik und Verantwortung (ZEV) (4)
- Centrum für Entrepreneurship, Innovation und Mittelstand (CENTIM) (3)
- Institut für Sicherheitsforschung (ISF) (2)
- Institut für Detektionstechnologien (IDT) (1)
- Präsidium (1)
- Sprachenzentrum (1)
Document Type
- Conference Object (53)
- Article (50)
- Part of a Book (50)
- Book (monograph, edited volume) (18)
- Preprint (12)
- Contribution to a Periodical (8)
- Research Data (6)
- Doctoral Thesis (6)
- Master's Thesis (5)
- Report (4)
- Conference Proceedings (2)
- Other (2)
- Book review (2)
- Working Paper (2)
- Part of Periodical (1)
Year of publication
- 2022 (221) (remove)
Has Fulltext
- no (221) (remove)
Keywords
- Lehrbuch (4)
- Medienästhetik (4)
- Medien (3)
- Medienwissenschaft (3)
- usable privacy (3)
- Cathepsin K (2)
- Chemometrics (2)
- Control Systems and Automation (2)
- Design (2)
- Electrical Machines and Power Electronics (2)
Sensoren können verschiedene Aufgaben erfüllen, wie beispielsweise die Optimierung von Prozessen, die Interaktion zwischen Geräten oder die Verbesserung der zivilen Sicherheit. [1–3] Ihr Bedarf für die Industrie oder den Alltag wächst seit Jahren stetig. Besonders mobile Gassensoren sind von großem Interesse. Jedoch ist ihre Anwendung meist durch ihre integrierte Batterie begrenzt. Gassensoren ohne oder mit einem nur sehr geringen Energieverbrauch stehen daher im Interesse bei neuen Anwendungsgebieten, beispielsweise im Brandschutz oder in der Textilindustrie. [4,5] Die Sensoren könnten zum Beispiel in die Textilien einer persönlichen Schutzausrüstung eingearbeitet werden und durch einen Farbumschlag die Anwesenheit eines Gases oder die Überschreitung des Grenzwertes toxischer Substanzen anzeigen.
Digitalisierung in zentralen Feldern der Sozialpolitik: Entwicklungstendenzen, Chancen und Risiken
(2022)
Mobiles Laser-Schneidsystem zur Unterstützung der USBV-Entschärfung und Beweissicherung (mobiLaS)
(2022)
Robots applied in therapeutic scenarios, for instance in the therapy of individuals with Autism Spectrum Disorder, are sometimes used for imitation learning activities in which a person needs to repeat motions by the robot. To simplify the task of incorporating new types of motions that a robot can perform, it is desirable that the robot has the ability to learn motions by observing demonstrations from a human, such as a therapist. In this paper, we investigate an approach for acquiring motions from skeleton observations of a human, which are collected by a robot-centric RGB-D camera. Given a sequence of observations of various joints, the joint positions are mapped to match the configuration of a robot before being executed by a PID position controller. We evaluate the method, in particular the reproduction error, by performing a study with QTrobot in which the robot acquired different upper-body dance moves from multiple participants. The results indicate the method's overall feasibility, but also indicate that the reproduction quality is affected by noise in the skeleton observations.
Entrepreneurial Leadership
(2022)
Start-ups und Unternehmensgründungen ebenso wie Projekt- oder Innovationsmanagement brauchen gleichermaßen neben dem einschlägigen Fachwissen und -erfahrungen Leadership-Skills als Erweiterung klassischer Managementanforderungen. Während diese prozessorientiert konkrete Ziele der strategischen oder operativen Planung umsetzen und optimieren, legt Leadership wie Entrepreneurship den Fokus auf Vision mit entsprechender Motivation zur Gründung oder Veränderung. (Verlagsangaben)
Wie KI Innere Führung lernt
(2022)
Dass sich künstliche Intelligenz (KI) weltweit ausgebreitet hat, ist eine Binsenwahrheit. Die rasche und unaufhaltsame Proliferation von KI der letzten zehn Jahre spricht für sich, und längst ziehen auch Gesetzgeber und Regulierungsbehörden nach, um KI und ihre Technikfolgen einzuhegen. Für Deutschland relevante Gestaltungsanforderungen haben die High-Level Expert Group on Artificial Intelligence der Europäischen Kommission (HLEG AI) und auf nationaler Ebene die Datenethikkommission der Bundesregierung (DEK) und die Enquetekommission Künstliche Intelligenz des Deutschen Bundestags (EKKI) geäußert.
P30 - Das Elektrospinnen von halbleitenden Zinndioxidfasern für die Detektion von Wasserstoff
(2022)
Das Ziel dieser Arbeit ist die Entwicklung von dünnen keramischen Fasern als halbleitendes Sensormaterial zum Nachweis von Wasserstoff, möglichst bei Zimmertemperatur. Die elektrische Leitfähigkeit halbleitender Metalloxide ändert sich durch die Einwirkung von oxidierenden und reduzierenden Gasen auf die Oberfläche des Metalloxids. Dieser Effekt kann zur Messung der Gaskonzentration genutzt werden. Die Reaktion von Zinn(IV)-oxid mit Wasserstoff basiert auf der Reduktion des Zinn(IV)-oxids zum Zinn, wobei die Elektronen des Zinn(IV)-oxids im metallischen Zinn verbleiben und dort im nicht gebundenen Zustand zu einer Leitfähigkeitserhöhung beitragen. Die Reaktion des Wasserstoffes kann sowohl mit den Sauerstoffatomen des Oxids als auch mit adsorbierten Sauerstoffatomen an der Oxidoberfläche stattfinden.[ 6] Da die Reaktionen an der Oberfläche des Oxids stattfinden, sollten Sensoren mit einer großen Oberfläche im Vergleich zu metalloxidischen Bulkmaterialien eine höhere Empfindlichkeit aufweisen. [3] Die Verwendung von Fasern anstelle von Dünn- oder Dickschichten führt dabei zu einer besseren Sensitivität gegenüber Gasen.
Using a life-cycle approach, we identify key gaps for social reform in Georgia. The reduction of informal work is the most pressing of these, since formal employment is the backbone of any robust and reliable social insurance scheme. At the same time, greater financial resources are required through taxation in order to enable systematic social reform in Georgia. Both interventions are needed in order to fill the gaps in the current social protection system, which include the limited scope of pension and health insurance, as well as the lack of permanent unemployment insurance and universal child benefits.
Against the background of Germany’s long experience with social protection, we outline the main principles of the German welfare state and present the design of three main social insurance branches (pensions, health and unemployment). Based on the mixed experience that has emerged in Germany, in particular due to path dependencies and political deadlock, we derive lessons that inform a clear and coherent vision for social reform in Georgia.
The aim of this master thesis was to probe the view of Bonn’s citizens on the smart city project of the German city. A literature review helped defining the smart city term and identifying the smart city concept that is mostly used in Germany. This can be summarized as an urban planning concept using information and communication technology to build citizen centric, sustainable cities. According to this, a smart city should include transparent communication and participation of its citizens. The websites and different publications of Bonn were researched to understand its smart city strategy and vision. This revealed inconsistencies. To resolve these inconsistencies, three representatives of the city were inter-viewed. Based on the knowledge gained up to this point, two groups of Bonn’s inhabitants discussed the Smart City Bonn and presented their perception of it. With the help of this methodology, the following results were obtained. Communication and participation of the city are in many cases in line with the current recommendations for a smart city. Bonn has apparently recognized the relevance of these aspects in theory but should also implement them more consistently in practice. Currently the city council publishes contradictory information and does not plan to incorporate the sight of Bonn’s citizens to develop the smart city strat-egy in the first place, as it is recommended in common literature.
Digitaltechnik
(2022)
Moderne Digitaltechnik, umfassend und kompakt: Dieses Lehr- und Übungsbuch spannt den Bogen von den Grundlagen der Digitaltechnik über den Entwurf mit VHDL und Komponenten digitaler Systeme bis zu modernen Mikrocontrollern der STM32-Serie.
Die 8. Auflage wurde aktualisiert und die Themenbereiche Mikroprozessoren und Mikrocontroller grundlegend überarbeitet.
Harald Schmidt
(2022)
Als Medien- und insbesondere Fernsehphänomen hat Harald Schmidt die TV-Kultur im deutschsprachigen Raum maßgeblich beeinflusst. So ist es etwa der Harald Schmidt Show gelungen, halbironische Sprechweisen diskursfähig zu machen, die sich bis in die Gegenwart der Social Media verfolgen lassen. Die Beiträger*innen des Bandes untersuchen vor diesem Hintergrund die »Methode Harald Schmidt«, d.h. die Unterminierung gängiger sozialer Vorstellungen bei gleichzeitiger Affirmation derselben. Die zentrale These lautet: Harald Schmidt hat grundlegende Voraussetzungen dafür geschaffen, eine weitestgehend neue Populärkultur ästhetisch wie kulturpraktisch zu etablieren.
Buch-Aisthesis
(2022)
Literatur kann auch als Verbund von Medien betrachtet werden, die in Kooperations- und Konkurrenzverhältnissen auftreten. Dies wird umso deutlicher, wenn aus literatur- und designwissenschaftlicher Perspektive auf die Beobachtung der Differenz von typographischen und anderen, grundsätzlich nonverbalen visuellen Daten abgestellt wird. Die Beiträger*innen des Bandes leiten daraus ein Verhältnis von Literatur- und Kunstwissenschaft zu ihren Gegenständen ab, das nicht zuletzt zu einer neuen Aufmerksamkeit für die skripturale und typographische Materialität und Medialität der Literatur führt. Dabei geht es um die Theorie der Reflexion und die Praxis der Erzeugung einer je spezifischen Buch-Ästhetik.
Technik-Ästhetik
(2022)
Von Technik und Ästhetik zu sprechen, heißt, sich bereits begrifflich auf ein Feld einzulassen, das mindestens zwei divergente Perspektiven gemeinsam denkt. Dabei haben das Technische wie das Ästhetische die Bedeutung einer Interdependenz aufzuweisen: Das Technische konstituiert einerseits Funktionen, Formen und Gebrauchsaspekte - ästhetische Zustände evozieren andererseits zeichenhafte Realisierungen, phantasmatische Urteile und wahrnehmungsvermittelte Phänomene des Erscheinens. Die Beiträger*innen des Bandes zeigen, wie bei der Konfrontation von Technik und Ästhetik eine Art Verkopplung und intrinsische Dynamik qua techno-ästhetischer Evokation entstehen kann.
Thermo-chemical conversion of cucumber peel waste for biobased energy and chemical production
(2022)
The human enzymes GLYAT (glycine N-acyltransferase), GLYATL1 (glutamine N-phenylacetyltransferase) and GLYATL2 (glycine N-acyltransferase-like protein 2) are not only important in the detoxification of xenobiotics via the human liver, but are also involved in the elimination of acyl residues that accumulate in the form of their coenzyme A (coA) esters in some rare inborn errors of metabolism. This concerns, for example, disorders in the degradation of branched-chain amino acids, such as isovaleric acidemia or propionic acidemia. In addition, they also assist in the elimination of ammonium, which is produced during the transamination of amino acids and accumulates in urea cycle defects. Sequence variants of the enzymes have also been investigated, which may provide evidence of impaired enzyme activities, from which therapy adjustments can potentially be derived. A modified Escherichia coli strain was chosen for the overexpression and partial biochemical characterization of the enzymes, which may allow solubility and proper folding. Since post-translational protein modifications are very limited in bacteria, we also attempted to overexpress the enzymes in HEK293 cells (human-derived). In addition to characterization via immunoblots and activity assays, intracellular localization of the enzymes was also performed using GFP coupling and confocal laser scanning microscopy in transfected HEK293 cells. The GLYATL2 enzyme may have tasks beyond detoxification and metabolic defects and the preliminary molecular biology work has been performed as part of this project - the enzyme activity determinations were outsourced to a co-supervised bachelor thesis. The enzyme activity determinations with purified recombinant human enzyme from Escherichia coli provided a threefold higher activity of the sequence variant p.(Asn156Ser) for GLYAT, which should be considered as the probably authentic wild type of the enzyme. In addition, a reduced activity of the GLYAT variant p.(Gln61Leu), which is very common in South Africa, was shown, which could be of particular importance in the treatment of isovaleric acidemia, which is also common in South Africa. Intracellularly, GLYAT and GLYATL1 could be localized mitochondrially. As the analyses have shown, sequence variations of GLYAT and GLYATL1 influence their enzyme activity. As an example, the GLYAT variant p.(Gln61Leu) is frequently found in South Africa. In the case of reduced GLYAT activity, patients could be increasingly treated with L-carnitine in the sense of an individualized therapy, since the conjugation of the toxic isovaleryl-coA with glycine is restricted by the GLYAT sequence variation. Activity-reducing variants identified in this project are of particular interest, as they may influence the treatment of certain metabolic defects.
State-of-the-art object detectors are treated as black boxes due to their highly non-linear internal computations. Even with unprecedented advancements in detector performance, the inability to explain how their outputs are generated limits their use in safety-critical applications. Previous work fails to produce explanations for both bounding box and classification decisions, and generally make individual explanations for various detectors. In this paper, we propose an open-source Detector Explanation Toolkit (DExT) which implements the proposed approach to generate a holistic explanation for all detector decisions using certain gradient-based explanation methods. We suggests various multi-object visualization methods to merge the explanations of multiple objects detected in an image as well as the corresponding detections in a single image. The quantitative evaluation show that the Single Shot MultiBox Detector (SSD) is more faithfully explained compared to other detectors regardless of the explanation methods. Both quantitative and human-centric evaluations identify that SmoothGrad with Guided Backpropagation (GBP) provides more trustworthy explanations among selected methods across all detectors. We expect that DExT will motivate practitioners to evaluate object detectors from the interpretability perspective by explaining both bounding box and classification decisions.
21 pages, with supplementary
In this paper, modeling of piston and generic type gas compressors for a globally convergent algorithm for solving stationary gas transport problems is carried out. A theoretical analysis of the simulation stability, its practical implementation and verification of convergence on a realistic gas network have been carried out. The relevance of the paper for the topics of the conference is defined by a significance of gas transport networks as an advanced application of simulation and modeling, including the development of novel mathematical and numerical algorithms and methods.
Dieses Buch zeigt konkret auf, was Geschäftsprozessmanagement ist und wie man es nutzen kann. Hierzu werden die zentralen Aspekte erklärt und praxistaugliche Tools anhand von Beispielen vorgestellt. Erleichtern Sie sich die tägliche Praxis der Analyse und Optimierung von Geschäftsprozessen! Der Inhalt Durchgängiges Fallbeispiel Überblick über praxisrelevante Modellierungsmethoden Modellierung von Prozesslandkarten, Swimlanes, BPMN- und eEPK-Diagrammen Analyse und Optimierung von Prozessen Prozesscontrolling mit Kennzahlen
This open access book brings together the latest developments from industry and research on automated driving and artificial intelligence.
Environment perception for highly automated driving heavily employs deep neural networks, facing many challenges. How much data do we need for training and testing? How to use synthetic data to save labeling costs for training? How do we increase robustness and decrease memory usage? For inevitably poor conditions: How do we know that the network is uncertain about its decisions? Can we understand a bit more about what actually happens inside neural networks? This leads to a very practical problem particularly for DNNs employed in automated driving: What are useful validation techniques and how about safety?
This book unites the views from both academia and industry, where computer vision and machine learning meet environment perception for highly automated driving. Naturally, aspects of data, robustness, uncertainty quantification, and, last but not least, safety are at the core of it. This book is unique: In its first part, an extended survey of all the relevant aspects is provided. The second part contains the detailed technical elaboration of the various questions mentioned above.
Vietnam requires a sustainable urbanization, for which city sensing is used in planning and de-cision-making. Large cities need portable, scalable, and inexpensive digital technology for this purpose. End-to-end air quality monitoring companies such as AirVisual and Plume Air have shown their reliability with portable devices outfitted with superior air sensors. They are pricey, yet homeowners use them to get local air data without evaluating the causal effect. Our air quality inspection system is scalable, reasonably priced, and flexible. Minicomputer of the sys-tem remotely monitors PMS7003 and BME280 sensor data through a microcontroller processor. The 5-megapixel camera module enables researchers to infer the causal relationship between traffic intensity and dust concentration. The design enables inexpensive, commercial-grade hardware, with Azure Blob storing air pollution data and surrounding-area imagery and pre-venting the system from physically expanding. In addition, by including an air channel that re-plenishes and distributes temperature, the design improves ventilation and safeguards electrical components. The gadget allows for the analysis of the correlation between traffic and air quali-ty data, which might aid in the establishment of sustainable urban development plans and poli-cies.
Focus on what matters: improved feature selection techniques for personal thermal comfort modelling
(2022)
Occupants' personal thermal comfort (PTC) is indispensable for their well-being, physical and mental health, and work efficiency. Predicting PTC preferences in a smart home can be a prerequisite to adjusting the indoor temperature for providing a comfortable environment. In this research, we focus on identifying relevant features for predicting PTC preferences. We propose a machine learning-based predictive framework by employing supervised feature selection techniques. We apply two feature selection techniques to select the optimal sets of features to improve the thermal preference prediction performance. The experimental results on a public PTC dataset demonstrated the efficiency of the feature selection techniques that we have applied. In turn, our PTC prediction framework with feature selection techniques achieved state-of-the-art performance in terms of accuracy, Cohen's kappa, and area under the curve (AUC), outperforming conventional methods.
Fatigue strength estimation is a costly manual material characterization process in which state-of-the-art approaches follow a standardized experiment and analysis procedure. In this paper, we examine a modular, Machine Learning-based approach for fatigue strength estimation that is likely to reduce the number of experiments and, thus, the overall experimental costs. Despite its high potential, deployment of a new approach in a real-life lab requires more than the theoretical definition and simulation. Therefore, we study the robustness of the approach against misspecification of the prior and discretization of the specified loads. We identify its applicability and its advantageous behavior over the state-of-the-art methods, potentially reducing the number of costly experiments.
Safety-critical applications like autonomous driving use Deep Neural Networks (DNNs) for object detection and segmentation. The DNNs fail to predict when they observe an Out-of-Distribution (OOD) input leading to catastrophic consequences. Existing OOD detection methods were extensively studied for image inputs but have not been explored much for LiDAR inputs. So in this study, we proposed two datasets for benchmarking OOD detection in 3D semantic segmentation. We used Maximum Softmax Probability and Entropy scores generated using Deep Ensembles and Flipout versions of RandLA-Net as OOD scores. We observed that Deep Ensembles out perform Flipout model in OOD detection with greater AUROC scores for both datasets.
Zum Geleit
(2022)
Forschungsdatenmanagement (FDM) nimmt im Forschungsalltag der Hochschulen für angewandte Wissenschaften (HAW) eine zunehmende größere Rolle ein und stellt an viele Forschende bisher unbekannte Anforderungen. So gilt es ein FAIRes und nachhaltiges Datenmanagement im Sinne des Kodex „Leitlinien zur Sicherung guter wissenschaftlicher Praxis“ der DFG zu betreiben – für sich selbst, für die eigene Forschungsgruppe und für die Forschungsgemeinschaft. In dieser Veranstaltung anlässlich des Tags der Forschungsdaten in NRW am 15.11.2022 wurden die wesentlichen Grundzüge des Forschungsdatenmanagements anhand des Forschungsdatenlebenszyklus nähergebracht und Praxisbeispiele und nützliche Links vorgestellt.
Buchbesprechung
(2022)
Login Data Set for Risk-Based Authentication
Synthesized login feature data of >33M login attempts and >3.3M users on a large-scale online service in Norway. Original data collected between February 2020 and February 2021.
This data sets aims to foster research and development for <a href="https://riskbasedauthentication.org">Risk-Based Authentication (RBA) systems. The data was synthesized from the real-world login behavior of more than 3.3M users at a large-scale single sign-on (SSO) online service in Norway.
In the field of autonomous robotics, sensors have played a major role in defining the scope of technology and to a great extent, limitations of it as well. This cycle of constant updates and hence technological advancement has made given birth to some serious industries which were once inconceivable. Industries like autonomous driving which has a serious impact on safety and security of people, also has an equally harsh implication on the dynamics and economics of the market. With sensors like LiDAR and RADAR delivering 3D measurements as point clouds, there is a necessity to process the raw measurements directly and many research groups are working on the same. A sizable research has gone in solving the task of object detection on 2D images. In this thesis we aim to develop a LiDAR based 3D object detection scheme. We combine the ideas of PointPillars and feature pyramid networks from 2D vision to propose Pillar-FPN. The proposed method directly takes 3D point clouds as input and outputs a 3D bounding box. Our pipeline consists of multiple variations of proposed Pillar-FPN at the feature fusion level that are described in the results section. We have trained our model on the KITTI train dataset and evaluated it on KITTI validation dataset.
This project focuses on object detection in dense volume data. There are several types of dense volume data, namely Computed Tomography (CT) scan, Positron Emission Tomography (PET), Magnetic Resonance Imaging (MRI). This work focuses on CT scans. CT scans are not limited to the medical domain; they are also used in industries. CT scans are used in airport baggage screening, assembly lines, and the object detection systems in these places should be able to detect objects fast. One of the ways to address the issue of computational complexity and make the object detection systems fast is to use low-resolution images. Low-resolution CT scanning is fast. The entire process of scanning and detection can be made faster by using low-resolution images. Even in the medical domain, to reduce the rad iation dose, the exposure time of the patient should be reduced. The exposure time of patients could be reduced by allowing low-resolution CT scans. Hence it is essential to find out which object detection model has better accuracy as well as speed at low-resolution CT scans. However, the existing approaches did not provide details about how the model would perform when the resolution of CT scans is varied. Hence in this project, the goal is to analyze the impact of varying resolution of CT scans on both the speed and accuracy of the model. Three object detection models, namely RetinaNet, YOLOv3, and YOLOv5, were trained at various resolutions. Among the three models, it was found that YOLOv5 has the best mAP and f1 score at multiple resolutions on the DeepLesion dataset. RetinaNet model h as the least inference time on the DeepLesion dataset. From the experiments, it could be asserted that sacrificing mean average precision (mAP) to improve inference time by reducing resolution is feasible.
Professor Dr. Dietmar Fink, Inhaber des Lehrstuhls für Unternehmensberatung an der Hochschule Bonn-Rhein-Sieg und Geschäftsführender Direktor der Wissenschaftlichen Gesellschaft für Management und Beratung (WGMB) in Bonn, über den Mehrwert von Consulting-Rankings und den Sinn von Beraterprojekten bei Versicherern
Eintreten und abschalten
(2022)
Social protection has been increasingly recognized by experts from different fields as a key instrument for social, economic, political, and environmental development. It is also known for tackling multiple goals related to the reduction of risk, poverty and inequality at once. Yet, its instruments are often seen in isolation, programmes are still managed in silos and the systemic aspect is often overlooked. Engaging in critical discussions about the systemic aspect of social protection and outlining what it really takes to pursue a systemic approach has motivated the two editors, Prof. Dr. Esther Schüring from H-BRS and Dr. Markus Loewe from the German Institute of Development and Sustainability (IDOS) to launch the very first Handbook on Social Protection Systems in late 2021.
Ziel der achten Auflage des wissenschaftlichen Workshops “Usable Security and Privacy” auf der Mensch und Computer 2022 ist es, aktuelle Forschungs- und Praxisbeiträge zu präsentieren und anschließend mit den Teilnehmenden zu diskutieren. Der Workshop soll ein etabliertes Forum fortführen und weiterentwickeln, in dem sich Experten aus verschiedenen Bereichen, z. B. Usability und Security Engineering, transdisziplinär austauschen können.
Haut und Design
(2022)
Internationale Patienten
(2022)
Dienstleister
(2022)
Ethik im Medizintourismus
(2022)
Marketingmaßnahmen
(2022)
Interkulturelles Management
(2022)
Praxisbuch Medizintourismus
(2022)
Das Standardwerk vermittelt einen ausführlichen, fundierten Gesamtüberblick über das Phänomen Medizintourismus, welches besonders in Europa immer mehr an Relevanz gewinnt. Aufgrund der Bedeutung des deutschen Gesundheitssystems mit Behandlungsangeboten für jede Erkrankung finden einerseits zahlreiche Patientenbewegungen in Richtung Deutschland statt, andererseits sind neue Märkte in Europa entstanden, die eine hervorragende medizinische Behandlungsqualität anbieten. (Verlagsangaben)
Im Rahmen des 55. Jour Fixe FDM der Landesinitiative fdm.nrw gaben die Mitglieder der Förderlinie FDMScouts.nrw einen Einblick in ihre Zusammenarbeit und stellten die Ergebnisse ihrer bisherigen Arbeit vor. Ziel der Förderlinie ist es, bedarfsgerechte Möglichkeiten zu schaffen, das Thema FDM sowohl strategisch als auch operativ nachhaltig an Hochschulen für angewandte Wissenschaften in NRW zu verankern. 10 Hochschulen in 5 Verbünden arbeiten seit 2020 gemeinsam an Diensten und Angeboten. Koordiniert werden die Aktivitäten von der Landesinitiative fdm.nrw.
Die Originalpräsentation ist über Conceptboard einsehbar: https://app.conceptboard.com/board/c87t-okqh-6utn-74xg-n182
Die Autor*innen sind alphabetisch sortiert und teilen sich die Erstautorschaft.
Im Rahmen der Förderlinie „FDMScouts.nrw“ arbeiten zehn Hochschulen kooperativ an Strukturen und Prozessen für einen nachhaltigen Aufbau des Forschungsdatenmanagements an den betreffenden Hochschulen für angewandte Wissenschaften und Fachhochschulen.
Hierbei ist ausschlaggebend, das Forschungsdatenmanagement zielgerichtet und bedarfsorientiert zu konzipieren und sowohl strategisch als auch operativ zu verankern. Ausgangspunkt dieser Bemühungen bildet daher eine Bedarfserhebung, die bestehende Datenworkflows, Vorwissen und Bedarfe der Forschenden zum FDM erfassen soll. In Abstimmung innerhalb der Förderlinie „FDMScouts.nrw“ wurde der vorliegende Umfragebogen erstellt.
Der Erhebungsbogen basiert auf der Vorlage „Fragenkatalog zur Bedarfserhebung zur Archivierung und Bereitstellung von Forschungsdaten an den rheinland-pfälzischen Universitäten und Hochschulen für angewandte Wissenschaften“ (Lemaire et al. 2022). Darüber hinaus wurden Aspekte aus „UNEKE: Forschungsdatenspeicherung - Praxis und Bedarfe: Online-Survey 2019“ (Brenger et al. 2019) und aus „Anforderungserhebung bei den brandenburgischen Hochschulen“ (Radtke et al. 2020) entnommen. Als weitere Quelle diente der „Interviewleitfaden zur Bestands- und Bedarfserhebung im Forschungsdatenmanagement (FDM) - Projekt FDM-TUDO“ der TU Dortmund (Kletke et al. 2022).
The Chemotype of Chromanones as a Privileged Scaffold for Multineurotarget Anti-Alzheimer Agents
(2022)
This 2nd edition compendium contains and explains essential statistical formulas within an economic context. Expanded by more than 100 pages compared to the 1st edition, the compendium has been supplemented with numerous additional practical examples, which will help readers to better understand the formulas and their practical applications. This statistical formulary is presented in a practice-oriented, clear, and understandable manner, as it is needed for meaningful and relevant application in global business, as well as in the academic setting and economic practice. (Verlagsangaben)
The processing of employee personal data is dramatically increasing. To protect employees' fundamental right to privacy, the law provides for the implementation of privacy controls, including transparency and intervention. At present, however, the stakeholders responsible for putting these obligations into action, such as employers and software engineers, simply lack the fundamental knowledge needed to design and implement the necessary controls. Indeed, privacy research has so far focused mainly on consumer relations in the private context. In contrast, privacy in the employment context is less well studied. However, since privacy is highly context-dependent, existing knowledge and privacy controls from other contexts cannot simply be adopted to the employment context. In particular, privacy in employment is subject to different legal and social norms, which require a different conceptualization of the right to privacy than is usual in other contexts. To adequately address these aspects, there is broad consensus that privacy must be regarded as a socio-technical concept in which human factors must be considered alongside technical-legal factors. Today, however, there is a particular lack of knowledge about human factors in employee privacy. Disregarding the needs and concerns of individuals or lack of usability, though, are common reasons for the failure of privacy and security measures in practice. This dissertation addresses key knowledge gaps on human factors in employee privacy by presenting the results of a total of three in-depth studies with employees in Germany. The results provide insights into employees' perceptions of the right to privacy, as well as their perceptions and expectations regarding the processing of employee personal data. The insights gained provide a foundation for the human-centered design and implementation of employee-centric privacy controls, i.e., privacy controls that incorporate the views, expectations, and capabilities of employees. Specifically, this dissertation presents the first mental models of employees on the right to informational self-determination, the German equivalent of the right to privacy. The results provide insights into employees' (1) perceptions of categories of data, (2) familiarity and expectations of the right to privacy, and (3) perceptions of data processing, data flow, safeguards, and threat models. In addition, three major types of mental models are presented, each with a different conceptualization of the right to privacy and a different desire for control. Moreover, this dissertation provides multiple insights into employees' perceptions of data sensitivity and willingness to disclose personal data in employment. Specifically, it highlights the uniqueness of the employment context compared to other contexts and breaks down the multi-dimensionality of employees' perceptions of personal data. As a result, the dimensions in which employees perceive data are presented, and differences among employees are highlighted. This is complemented by identifying personal characteristics and attitudes toward employers, as well as toward the right to privacy, that influence these perceptions. Furthermore, this dissertation provides insights into practical aspects for the implementation of personal data management solutions to safeguard employee privacy. Specifically, it presents the results of a user-centered design study with employees who process personal data of other employees as part of their job. Based on the results obtained, a privacy pattern is presented that harmonizes privacy obligations with personal data processing activities. The pattern is useful for designing privacy controls that help these employees handle employee personal data in a privacy-compliant manner, taking into account their skills and knowledge, thus helping to protect employee privacy. The outcome of this dissertation benefits a wide range of stakeholders who are involved in the protection of employee privacy. For example, it highlights the challenges to be considered by employers and software engineers when conceptualizing and designing employee-centric privacy controls. Policymakers and researchers gain a better understanding of employees' perceptions of privacy and obtain fundamental knowledge for future research into theoretical and abstract concepts or practical issues of employee privacy. Employers, IT engineers, and researchers gain insights into ways to empower data processing employees to handle employee personal data in a privacy-compliant manner, enabling employers to improve and promote compliance. Since the basic principles underlying informational self-determination have been incorporated into European privacy legislation, we are confident that our results are also of relevance to stakeholders outside Germany.
For most people, using their body to authenticate their identity is an integral part of daily life. From our fingerprints to our facial features, our physical characteristics store the information that identifies us as "us." This biometric information is becoming increasingly vital to the way we access and use technology. As more and more platform operators struggle with traffic from malicious bots on their servers, the burden of proof is on users, only this time they have to prove their very humanity and there is no court or jury to judge, but an invisible algorithmic system. In this paper, we critique the invisibilization of artificial intelligence policing. We argue that this practice obfuscates the underlying process of biometric verification. As a result, the new "invisible" tests leave no room for the user to question whether the process of questioning is even fair or ethical. We challenge this thesis by offering a juxtaposition with the science fiction imagining of the Turing test in Blade Runner to reevaluate the ethical grounds for reverse Turing tests, and we urge the research community to pursue alternative routes of bot identification that are more transparent and responsive.
The cube in cube approach was used by Paul and Ishai-Cohen to model and derive formulas for filler content dependent Young´s moduli of particle filled composites assuming perfect filler matrix adhesion. Their formulas were chosen because of their simplicity, recalculated using an elementary volume approach which transforms spherical inclusions to cubic inclusions. The EV approach led to expression for the composites moduli that allow for introducing an adhesion factor kadh ranging from 0 and 1 to take into account none perfect reduced filler matrix adhesion. This adhesion factor scales the edge length of the cubic inclusions, thus, reducing the stress transfer area between matrix and filler. Fitting the experimental data with the modified Paul model provides reasonable kadh for PA66, PBT, PP, PE-LD and BR which are in line with their surface energies. Further analysis showed that stiffening only occurs if kadh exceeds <span class="math-tex">\( { \ \sqrt{E^M/E^F} \ }\) and depends on the ratio of matrix modulus and filler modulus. The modified model allows for a quick calculation of any particle filled composites for known matrix modulus EM, filler modulus EF, filler volume content vF and adhesion factor kadh. Thus, finite element analysis (FEA) simulations of any particle filled polymer parts as well as materials selection are significantly eased. FEA of cubic and hexagonal EV arrangements show that stress distributions within the EV exhibit more shear stresses if one deviates from the cubic arrangement. At high filler contents the assumption that the property of the EV is representative for the whole composite, holds only for filler volume contents up to 15 or 20 % (corresponding to 30 to 40 weight %). Thus, for vast majority of commercially available particulate composites, the modified model can be applied. Furthermore, this indicates that the cube in cube approach reaches two limits: i) the occurrence of increasing shear stresses at filler contents above 20 % due to deviations of EV arrangements or spatial filler distribution from cubic arrangements (singular), and ii) increasing interaction between particles with the formation of particle network within the matrix violating the EV assumption of their homogeneous dispersion.