Refine
H-BRS Bibliography
- yes (265) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (265) (remove)
Document Type
- Article (265) (remove)
Year of publication
Keywords
- Virtual reality (5)
- virtual reality (5)
- 3D user interface (3)
- ARRs (3)
- Augmented Reality (3)
- Datenanalyse (3)
- Sicherheitslücke (3)
- post-buckling (3)
- ARIMA (2)
- Artificial Intelligence (2)
- BPMS (2)
- Cognition (2)
- Computer Graphics (2)
- Datenschutz (2)
- Datensicherheit (2)
- ERP (2)
- FDI (2)
- Force field (2)
- Humans (2)
- Hybrid systems (2)
- Incremental bond graph (2)
- Intelligent Transport System (2)
- Machine Learning (2)
- Navigation (2)
- Optimization (2)
- Perception (2)
- Performance (2)
- Privacy (2)
- Ray Tracing (2)
- Security (2)
- Software (2)
- Software-Werkzeug (2)
- UAV (2)
- Unternehmen (2)
- Usable Security (2)
- Vehicular Ad hoc Networks (2)
- Virtual Reality (2)
- Visualization (2)
- YAWL (2)
- adaptive fault thresholds (2)
- automated sensor-screening (2)
- biometrics (2)
- bond graph modelling (2)
- computer vision (2)
- confidence level (2)
- data filtering (2)
- fault detection (2)
- foveated rendering (2)
- haptics (2)
- incremental bond graphs (2)
- neural network (2)
- nonlinear stability (2)
- optical sensor (2)
- parallel breadth-first search (2)
- power electronic systems (2)
- semiconducting metal oxide gas sensor array (2)
- short-term load forecasting (2)
- simulation (2)
- spatial updating (2)
- usable privacy (2)
- 16S rRNA gene sequencing (1)
- 3D navigation (1)
- 3D nucleus (1)
- 3D real-time echocardiography (1)
- 3D user interfaces (1)
- ABT-737 (1)
- ACPYPE (1)
- AD (1)
- AI usage in sports (1)
- ALPS (1)
- AMBER (1)
- AML (1)
- API Documentation (1)
- AR (1)
- Absolute nodal coordinate formulation (1)
- Active vision interface (1)
- Acute lymphoblastic leukemia (1)
- Adaptive Control (1)
- Advanced Driver Assistance Systems (1)
- Affordances (1)
- Algorithms (1)
- Alkane (1)
- Altenhilfe (1)
- Antifuse memory (1)
- Assekuranz (1)
- Auditory Cueing (1)
- Augmented reality (1)
- Automation (1)
- Automatisierte Prozesse Rekonstruktio (1)
- Autonomy (1)
- Autotuning (1)
- Available Bandwidth (1)
- B-cell leukemia (1)
- B-cell lymphoma (1)
- B2T (1)
- BCL2 (1)
- BFS (1)
- BH3-mimetic inhibitor (1)
- Background music (1)
- Bacteria, Anaerobic (1)
- Ball tracking (1)
- Bandwidth Estimation (1)
- Basis set (1)
- Bayesian Network (1)
- Bayesian optimization (1)
- Bayessches Netz (1)
- Begriffsbestimmung (1)
- Behörde (1)
- Benchmarking (1)
- Bewertung (1)
- Big Data Analysis (1)
- Blasendiagramm (1)
- Blocking (1)
- Bond Graph modelling and simulation (1)
- Bond graph (1)
- Bond graph modelling (1)
- Bond graphs (1)
- Bundesrepublik Deutschland (1)
- Bundesverfassungsgericht (1)
- Business (1)
- Business Process Intelligence (1)
- Business-to-Thing (1)
- CAS (1)
- CC (1)
- CEHL (1)
- CIBERSORT (1)
- CMMN (1)
- CREBBP (1)
- Camera selection (1)
- Camera view analysis (1)
- Canonical form of state equations and standard interconnection form for robustness study (1)
- Capability framework (1)
- Capacity (1)
- Carbohydrate (1)
- Case Management Model and Notation (1)
- Centrifugation (1)
- Cervical cancer screening (1)
- Cervicovaginal microbiome (1)
- Chalcogenide glass sensor (1)
- Challenges (1)
- Change-Prozess (1)
- Chemical imaging (1)
- Chip ID (1)
- Circular saws (1)
- Classifiers (1)
- Cloud computing (1)
- Co-rotational formulation (1)
- Code Generation (1)
- Cognitive informatics (1)
- Colposcopy (1)
- Company (1)
- Complexity (1)
- Computational causality (1)
- Computational chemistry (1)
- Computational modeling (1)
- Computer (1)
- Computer Automated Design (1)
- Computer Vision System (1)
- Computerkriminalitaet (1)
- Conformation (1)
- Congenital heart disease (1)
- Content Security Policies (1)
- Cooperative Awareness Message (1)
- Counterfeit protection (1)
- Coupled process (1)
- Creative Commons (1)
- Cross-sensitivity (1)
- Crystal structure (1)
- Current research information systems (1)
- Curriculum (1)
- Cutting sticks problem (1)
- Cybersickness (1)
- DNA extraction protocols (1)
- DNA profile (1)
- DOI (1)
- Data Publication (1)
- DataCite (1)
- Database Management Systems (1)
- Datenbanksysteme (1)
- Datenbasierte Prozessanalyse (1)
- Decision Diagram (1)
- Decision Network (1)
- Decision Support (1)
- Demenz (1)
- Demonstration-based training (1)
- Developer Centered Security (1)
- Diagnostic bond graphs (1)
- Dienstgütevereinbarung (1)
- Digital Object Identifier (1)
- Digitale Lehre (1)
- Digitisation (1)
- Disco (1)
- Discrete cosine transform (1)
- Displacement (1)
- Domain-Specific Languages (1)
- Domain-Specific Modeling Languages, (1)
- Domestic service robots (1)
- Drosophila (1)
- Drug resistance (1)
- EEG (1)
- ELM (1)
- EM leakage (1)
- EN-12299 (1)
- ERP system (1)
- ETV6-RUNX1 (1)
- Earth Observation (1)
- Ecosystem simulation (1)
- Educational Data Mining (1)
- Educational Process Mining (1)
- Edutainment (1)
- Efficiency (1)
- Einflussdiagramm (1)
- Electric mobility (1)
- Electromagnetic Fields (1)
- Electronic commerce (1)
- Electronic tongue (1)
- Elephantiasis (1)
- Emotion (1)
- Empfehlung (1)
- Empirical formula (1)
- Encryption (1)
- Enterprise Resource Planning Software (1)
- Enterprise Resource Planning System (1)
- Entropy (1)
- Entscheidungsunterstützung (1)
- Environmental Data (1)
- Escape analysis (1)
- Euler–Bernoulli beam (1)
- Evaluation (1)
- Evaluation als Kommunikationsanlass (1)
- Event detection (1)
- Ewing´s Sarcoma Family of Tumors (1)
- Exchange and reuse of bond graph models (1)
- Executive functions (1)
- Exercise (1)
- Expert system (1)
- External faults (1)
- FGR (1)
- Face and hand gesture recognition (1)
- Factory instrumentation (1)
- Fallbeschreibung (1)
- Fas (1)
- Fault detection and isolation (1)
- Fault handling (1)
- Feedback (1)
- Fehlertoleranz (1)
- Female (1)
- Field sequential imaging (1)
- Finite element modelling (1)
- First-order frequency domain sensitivities (1)
- Flexible multibody system (1)
- Fluency (1)
- Focus plus context (1)
- Foreground segmentation (1)
- Formal definition and validation of the content of a model description (1)
- Forms of mathematical models (1)
- Functional Programming (1)
- Funktionsprinzip (1)
- Fuzzy Mining (1)
- Fuzzy logic (1)
- Fuzzy-System (1)
- GDPR (1)
- GLI (1)
- Gabor filter (1)
- Games (1)
- Garbage collection (1)
- Gaze-contingent depth-of-field (1)
- Genetic Predisposition to Disease (1)
- Genetic algorithm (1)
- Genomics (1)
- Genomics/methods (1)
- Gesamt-Exom-Sequenzierung (1)
- Geschäftsprozess (1)
- Glycam06 (1)
- Goal Programming (1)
- Graph embeddings (1)
- Graph theory (1)
- Gromacs (1)
- Group behavior analysis (1)
- HDAC inhibitor (1)
- HDBR (1)
- HIF1α (1)
- HPV diagnostic (1)
- HSP70 (1)
- HSP90 (1)
- Hacker-Angriff (1)
- Hacking-Technik (1)
- Hand injuries (1)
- Handlungsempfehlung (1)
- Head Mounted Display (1)
- Head-mounted Display (1)
- High hyperdiploidy (1)
- High-resolution displays (1)
- High-speed railway track (1)
- Histograms (1)
- Hochschulehre (1)
- Hochschullehre (1)
- Human computer interaction (1)
- Human factors (1)
- Human orientation perception (1)
- Human robot interaction (1)
- Hybrid models of engineering systems (1)
- Hydraulic orifices (1)
- Hydrocarbon (1)
- IC identification (1)
- IEEE 802.11 (1)
- IT professionals (1)
- IT-Verfügbarkeit (1)
- IaaS (1)
- Ikaros (1)
- Image Processing (1)
- Immersion (1)
- Immersive analytics (1)
- Inductive Visual Mining (1)
- Industry 4.0 (1)
- Influence Diagram (1)
- Informations-, Kommunikations- und Medientechnologie (1)
- Informationssicherheit (1)
- Informationstechnik (1)
- Instantiation (1)
- Instruction design (1)
- Integral backstepping technique (1)
- Intel Xeon Phi (1)
- Interaction Patterns (1)
- Interaction devices (1)
- Internet (1)
- Internet of Things (1)
- Interventionstudie (1)
- It-Diensteanbieter (1)
- Java virtual machine (1)
- Kartographie (1)
- Key recovery (1)
- KiBP (1)
- Knowledge Graphs (1)
- Knowledge Worker (1)
- Knowledge-intensive Business Process (1)
- Kopie digitaler Daten (1)
- Laminar and turbulent flow (1)
- Language Engineering (1)
- Language learning (1)
- Langzeitbehandlung (1)
- Large display interaction (1)
- Large-Scale Online Services (1)
- Lattice Boltzmann Method (1)
- Leakage circuits (1)
- Leg (1)
- Lehr-Lernpsychologie (1)
- Leistungsdaten (1)
- Lernen (1)
- Lernumgebung (1)
- Library model (1)
- Ligands (1)
- Light curtain (1)
- Linear Optimization (1)
- Linear Programming (1)
- Linear quadratic regulator (1)
- Lineare Optimierung (1)
- Locomotion (1)
- Lymphedema (1)
- MAP-Elites (1)
- MBZ (1)
- MOX gas sensors (1)
- MP2.5 (1)
- Machine learning (1)
- Male (1)
- Malware (1)
- Manipulation tasks (1)
- Materialwissenschaften (1)
- Mathematical methods (1)
- Maximal covering location problem (1)
- Measurement (1)
- Media in education (1)
- Memory (1)
- Memory management (1)
- Meteorological Data (1)
- Methodenanalyse (1)
- Methodologies (1)
- Microsoft CRM 2013 (1)
- Mobile robotics (1)
- Mode switching LTI model (1)
- Mode-dependent ARRs (1)
- Model-Driven Engineering (1)
- Model-based failure prognosis (1)
- Model-free control (1)
- Modellbildung (1)
- Modelling (1)
- Molecular rotation (1)
- Molecular structure (1)
- Monitoring (1)
- Motion (1)
- Motion Sickness (1)
- Multi-camera (1)
- Multi-component heavy metal solution (1)
- Multi-objective (1)
- Multi-stage (1)
- Multibody systems (1)
- Multidisciplinary systems (1)
- Multimodal hyperspectral data (1)
- Multisensory cues (1)
- N200 (1)
- NFKB (1)
- NGS (1)
- NLP (1)
- NUMA (1)
- Naive physics (1)
- Neuroscience (1)
- Nonbonded scaling factor (1)
- Nonlinear control quadrotor uav (1)
- Nutzung (1)
- Nvidia graphic processors (1)
- OCT (1)
- OCU (1)
- OER (1)
- Object detection (1)
- Object recognition (1)
- Object-oriented physical systems modelling (1)
- Older adults (1)
- Online-Überwachung (1)
- Ontology (1)
- Open Educational Ressources (1)
- Open innovation (1)
- Open source software (1)
- OpenFlow (1)
- OpenMP (1)
- Optical flow (1)
- Organic compounds and Functional groups (1)
- Out-of-view Objects (1)
- Outside-in process (1)
- P300 (1)
- PAD (1)
- PCR inhibitors (1)
- PSD (1)
- PaaS (1)
- Parameter degradation model (1)
- Parameter uncertainties (1)
- Pattern recognition (1)
- Pedigree (1)
- Perceptual Upright (1)
- Pflegepersonal (1)
- Physical activity (1)
- Plan-based robot control (1)
- Poisson Disc Distribution (1)
- Polymorphism, Single Nucleotide (1)
- Precursor B-Cell Lymphoblastic Leukemia-Lymphoma/genetics (1)
- Prescriptive Analytics (1)
- Presence (1)
- Pressure wire (1)
- Pressure-volume relation (1)
- ProM (1)
- Process Mining (1)
- Process Models (1)
- Process views (1)
- Programmsicherheit (1)
- Pronunciation (1)
- Protective system (1)
- Proximity (1)
- Prozessanalyse (1)
- Prozessmanagement (1)
- Prozessoptimierung (1)
- Präskriptive Analytik (1)
- Pseudonym Concept (1)
- Psychology (1)
- Public Key Infrastructure (1)
- Quality Diversity (1)
- Quality diversity (1)
- Quality of Service (1)
- Qualitätspakt Lehre (1)
- Quantum mechanical methods (1)
- RAS (1)
- RFID (1)
- RMS acceleration (1)
- Raman spectroscopy (1)
- Rapid Prototyping (1)
- RapidMiner (1)
- Ray tracing (1)
- Reader (1)
- Real-time image processing (1)
- Reasoning (1)
- Recht (Gesetzgebung) (1)
- Recommendation (1)
- Recommender systems (1)
- Relapse (1)
- Remaining Useful Life (1)
- Rendering (1)
- Risk-based Authentication (1)
- RoboCup industrial (1)
- Robotersteuerung (1)
- Robotics (1)
- Robustness (1)
- Rule-based production systems (1)
- SAHA (1)
- SIMPACK (1)
- SMPA loop (1)
- SOA (1)
- STAT3 (1)
- SVM (1)
- SaaS (1)
- Saccades (1)
- Saccadic suppression (1)
- Safety guard (1)
- Schadenanalyse (1)
- Schadensprozess (1)
- School experiments (1)
- Schutzmaßnahme (1)
- Secure Coding Practices (1)
- Security architecture (1)
- Security level (1)
- Semantic scene understanding (1)
- Semantic search (1)
- Sense of presence (1)
- Sensitivity matrix in symbolic form (1)
- Service-Level-Agreement (1)
- Service-Roboter (1)
- Service-based cloud computing (1)
- Set partition problem (1)
- Shadow detection (1)
- Sicherheit (1)
- Sicherheitsarchitektur (1)
- Sicherheitsniveau (1)
- Side channels (1)
- Signal detection (1)
- Signal processing (1)
- Simulation (1)
- Single Instruction Multiple Data (SIMD) (1)
- Single-objective (1)
- Skalierbarkeit (1)
- Skin (1)
- Skin detection (1)
- Smart Card (1)
- Smart Card User Interface Design, Interactive Smart Card Applications (1)
- Smart factory (1)
- Social intelligence (1)
- Sociomateriality (1)
- Software Architecture (1)
- Software Framework (1)
- Software-Fehler (1)
- Software-Lebenszyklus (1)
- Software-Sicherheit (1)
- Software-Test (1)
- Software-Testautomatisierung (1)
- Somatogravic Illusion (1)
- SpMV (1)
- Sparse Matrix Vector Multiplication (1)
- Sparse Matrix Vector multiply (SpMV) (1)
- Spectroscopy (1)
- Spherical treadmill (1)
- Stabilitätsanalyse (1)
- Stream cipher (1)
- Studenten (1)
- Studienverlauf (1)
- Supervised classification (1)
- Support Vector Machine (1)
- Surrogate Modeling (1)
- System health monitoring (1)
- TEL-AML1 (1)
- TP53 (1)
- Tag (1)
- Taxonomie (1)
- Taxonomy (1)
- Teaching Quality Pact (1)
- Technologie (1)
- Teleconferencing system (1)
- Terrain rendering (1)
- Testing (1)
- Text detection (1)
- Text recognition (1)
- Therapy (1)
- Throughput (1)
- Tracking (1)
- Transformations between various description formats (1)
- Translocation (1)
- Transponder (1)
- Travel Techniques (1)
- Treatment of discontinuities and singularities in ordinary differential equations (1)
- UGV (1)
- USAR (1)
- Umgebung (Umwelt) (1)
- Unity (1)
- Unknown parameter degradation (1)
- Unterstützung (1)
- Usability (1)
- User engagement (1)
- User interface (1)
- User interfaces (1)
- User-Computer Interface (1)
- VR (1)
- VR-based systems (1)
- Vector Units (1)
- Vehicle-2-Vehicle Communication (1)
- Vehicle-to-Infrastructure Communication (1)
- Vehicle-to-Vehicle Com- munication (1)
- Verfassungsbeschwerde (1)
- Verschlüsselung (1)
- Versicherung (1)
- Vertrag (1)
- Vertragsbeendigung (1)
- Vertragspartner (1)
- Vertriebssysteme (1)
- Vibrational microspectroscopy (1)
- Video surveillance (1)
- View selection (1)
- Virtual Environment (1)
- Virtual Memory Palace (1)
- Virtuelle Realität (1)
- Visual Computing (1)
- Visual Cueing (1)
- Visual Discrimination (1)
- Visual perception (1)
- Wang-tiles (1)
- Watermarking (1)
- WiFi (1)
- Wireless backhaul (1)
- Wissensarbeiter (1)
- Wissensintensiver Geschäftsprozess (1)
- Workflow (1)
- Workflow Management (1)
- XML schema for bond graph models (1)
- Young adults (1)
- Zielprogrammierung (1)
- accelerometer (1)
- acute (1)
- adaptive trigger (1)
- aerodynamics (1)
- allopurinol (1)
- analog/digital signal processing (1)
- analytical redundancy relation residuals (1)
- antibody deficiency (1)
- apoptosis (1)
- architectural distortion (1)
- assistive robotics (1)
- atomic operation (1)
- authentication (1)
- autoimmune lymphoproliferative syndrome (1)
- autoinflammatory disease (1)
- automated 3D scanning (1)
- automatic measurement validation (1)
- automation of sample processing (1)
- averaged bond graph models (1)
- back-of-device interaction (1)
- bicausal diagnostic Bond Graphs (1)
- bioinformatics (1)
- bond graph (1)
- bond graphs (1)
- bond-graph-based physical systems modelling (1)
- bootstrapping (1)
- breast cancer (1)
- built environment (1)
- cancer (1)
- change process (1)
- childhood (1)
- childhood cancer syndrome (1)
- closed kinematic chain (1)
- collision (1)
- complete basis set limit (1)
- concrete plate (1)
- constitutional mismatch repair syndrome (1)
- constructive process deviance (1)
- controller design (1)
- curved shell (1)
- cyanide (1)
- cybersickness (1)
- data analysis (1)
- data locality (1)
- deep learning (1)
- degraded DNA (1)
- design process (1)
- detection (1)
- diagnostic bond graphs (1)
- differential algebraic equation systems (1)
- displacement measurement (1)
- distance perception (1)
- dynamic vector fields (1)
- e-Research (1)
- electrochemical sensor (1)
- elite sports (1)
- employee privacy (1)
- enterprise software (1)
- erbliche Krebssyndrome (1)
- estimation (1)
- evaluation as a mean to communication (1)
- execution (1)
- explainable AI (1)
- extraction-linked bias (1)
- extreme learning machine (1)
- eye movement (1)
- eye tracking (1)
- eye-tracking (1)
- factor analysis (1)
- failure prognostic (1)
- fault indicators (1)
- fault scenarios (1)
- feature (1)
- felt obligations (1)
- fingerprint (1)
- finite element method (1)
- fitness-fatigue model (1)
- fixed causalities generation of analytical redundancy relations (1)
- flight zone (1)
- flying (1)
- force sensing (1)
- forensic (1)
- free and open source software (1)
- frequency (1)
- fuel (1)
- gaze (1)
- general plate theory (1)
- genes (1)
- genetic testing (1)
- genetics (1)
- genetische Testung (1)
- geofence (1)
- graphene oxide powder (1)
- graphene oxide powders (1)
- gravito-inertial force (1)
- guidance (1)
- haptic interfaces (1)
- head down bed rest (1)
- heart rate control (1)
- heart rate modeling (1)
- heart rate prediction (1)
- heavy metal (1)
- high degree of diagnostic coverage and reliability (1)
- high diagnostic coverage and reliability (1)
- high dynamic range resistance readout (1)
- high speed railway vehicle (1)
- high-throughput DNA sequencing (1)
- high-throughput sequencing (1)
- hospital environment (1)
- hospital-acquired infections (1)
- human computer interaction (1)
- human microbiome (1)
- human-centred design (1)
- hybrid system models (1)
- hydrocarbon (1)
- ideal switches (1)
- immunodeficiency (1)
- indicators calculation (1)
- informational self-determination (1)
- interactive computer graphics (1)
- intervention mechanisms (1)
- intrinsics (1)
- ion-selective electrodes (1)
- irregularity amplitude (1)
- isolation (1)
- large-high-resolution displays (1)
- latent class analysis (1)
- leaning (1)
- leaning-based interfaces (1)
- learning traces (1)
- leukemia (1)
- lipid (1)
- load control (1)
- locomotion (1)
- locomotion interface (1)
- long short-term memory (1)
- lymphocytic (1)
- massive parallel sequencing (1)
- mathematical modeling (1)
- mebendazole (1)
- memory bandwidth (1)
- mental models (1)
- micro-benchmarks (1)
- microbial community structure (1)
- microbial ecology (1)
- microbiome (1)
- microbiome analyses (1)
- mixed reality (1)
- mobile applications (1)
- mobiler Roboter (1)
- modal superposition (1)
- mode-dependent implicit state space model (1)
- mode-switching linear time-invariant models (1)
- model exchange (1)
- modelling methodology (1)
- monitoring (1)
- mood (1)
- motion estimation (1)
- motion sickness (1)
- mp2 (1)
- multi-channel power sourcing (1)
- multi-solution optimization (1)
- multibody system (1)
- multibond graphs (1)
- multisensory cues (1)
- mutation (1)
- nano-composite (1)
- natural language processing (1)
- navigational search (1)
- near infrared (1)
- neuro-cognitive performance (1)
- next generation sequencing (1)
- numerical computation of residuals (1)
- object-oriented modelling (1)
- octane (1)
- operation mode independent causalities (1)
- optic flow (1)
- optical coherence tomography (1)
- optical flow (1)
- optical triangulation (1)
- opto-electronic protective device (1)
- optoelectronic (1)
- parallel work queue (1)
- parameter estimation (1)
- parameter sensitivity of residuals (1)
- perceived quality (1)
- perception of upright (1)
- performance modeling (1)
- performance prediction (1)
- peripheral vision (1)
- phenomenological approaches (1)
- physical activity (1)
- plasma-enhanced CVD (PECVD) (deposition) (1)
- porous material (1)
- posture analysis (1)
- power spectral density (1)
- pre-optimization (1)
- predictive maintenance (1)
- prefrontal cortex (1)
- presentation attack detection (1)
- presentation attack detection (PAD) (1)
- prioritizable ranking (1)
- privacy at work (1)
- privacy by design (1)
- process (1)
- prognosis (1)
- projection based systems (1)
- propan-2-ol (1)
- psychophysics (1)
- quantitative model-based fault detection (1)
- quantum mechanics (1)
- rapid prototyping tool (1)
- ray tracing (1)
- redundant work (1)
- refined beam theory (1)
- region of interest (1)
- regression testing (1)
- reinforcement learning (1)
- remaining useful life (1)
- repeated trend projection (1)
- residual bond graph sinks (1)
- residual sinks (1)
- reuse of indicators (1)
- ride comfort (1)
- robot behaviour model (1)
- robot control architecture (1)
- robot execution failures (1)
- robot introspection (1)
- robot personalisation (1)
- routing (1)
- run-time adaptation (1)
- scalability (1)
- schädliches Programm (1)
- security and privacy literacy (1)
- self-motion perception (1)
- semi-continuous locomotion (1)
- sensemaking (1)
- sensor fusion (1)
- sensor resilience (1)
- server processors (1)
- shared memory (1)
- shell theory (1)
- short tandem repeat (1)
- signal processing algorithm (1)
- simulation of fault scenarios (1)
- situation awareness (1)
- skill execution models (1)
- slip detection (1)
- slope based signature (1)
- software engineering (1)
- software testing (1)
- software-defined networking (1)
- space flight analog (1)
- spatial augmented reality (1)
- spatial orientation (1)
- spinal posture (1)
- stiffeners (1)
- structural equation modeling (1)
- subjective visual vertical (1)
- switched three-phase power inverter (1)
- system mode independent bond graph representation (1)
- system modes (1)
- tactile sensing (1)
- task planning (1)
- teleoperation (1)
- teleportation (1)
- telomeres (1)
- test case reduction (1)
- text mining (1)
- textual model description languages (1)
- thread mapping (1)
- time series analysis (1)
- tools for education (1)
- trace model (1)
- trace-based system (1)
- track irregularity (1)
- training monitoring (1)
- training performance relationship (1)
- transparency-enhancing technologies (1)
- travel techniques (1)
- tumor microenvironment (1)
- tumor-infiltrating immune cells (1)
- uncertainties (1)
- unrolling (1)
- usable privacy controls (1)
- user modelling (1)
- user study (1)
- vection (1)
- vector units (1)
- vestibular system (1)
- vibration (1)
- view management (1)
- visual attention (1)
- water dimer (1)
- wavelet (1)
- wearable sensor (1)
- wearable sensors (1)
- web services (1)
- weight perception (1)
- whole-exome sequencing (1)
- wind nuisance (1)
- wireless mesh networks (1)
- workday breaks (1)
- zooming interfaces (1)
- Überwachung (1)
- Wavenet (1)
Zur Erreichung des Sachziels Vertraulichkeit werden Daten (Dokumente, Dateien, E-Mails etc.) bei der Speicherung und Übertragung in lokalen Netzen, Intranets und im Internet häufig vom Endanwender verschlüsselt. Die dazu benutzten Schlüssel müssen bei Bedarf für den Endanwender genauso verfügbar sein wie für das Unternehmen bei Nicht-Verfügbarkeit des Endanwenders. Unternehmensinterne Schlüssel-Archive speichern die benutzten Schlüssel oder speichern die Adressen benutzter Schlüssel oder stellen auf andere Weise die benutzten Schlüssel auf Anforderung Berechtigten wieder bereit. Schlüssel-Archive sind aus der auf dem Escrowed Encryption Standard (EES) basierenden Clipper-Initiative der Vereinigten Staaten entstanden und werden dort als Key Recovery Center bezeichnet.
Bond graph modelling was devised by Professor Paynter at the Massachusetts Institute of Technology in 1959 and subsequently developed into a methodology for modelling multidisciplinary systems at a time when nobody was speaking of object-oriented modelling. On the other hand, so-called object-oriented modelling has become increasingly popular during the last few years. By relating the characteristics of both approaches, it is shown that bond graph modelling, although much older, may be viewed as a special form of object-oriented modelling. For that purpose the new object-oriented modelling language Modelica is used as a working language which aims at supporting multiple formalisms. Although it turns out that bond graph models can be described rather easily, it is obvious that Modelica started from generalized networks and was not designed to support bond graphs. The description of bond graph models in Modelica is illustrated by means of a hydraulic drive. Since VHDL-AMS as an important language standardized and supported by IEEE has been extended to support also modelling of non-electrical systems, it is briefly investigated as to whether it can be used for description of bond graphs. It turns out that currently it does not seem to be suitable.
Multidisciplinary systems are described most suitably by bond graphs. In order to determine unnormalized frequency domain sensitivities in symbolic form, this paper proposes to construct in a systematic manner a bond graph from another bond graph, which is called the associated incremental bond graph in this paper. Contrary to other approaches reported in the literature the variables at the bonds of the incremental bond graph are not sensitivities but variations (incremental changes) in the power variables from their nominal values due to parameter changes. Thus their product is power. For linear elements their corresponding model in the incremental bond graph also has a linear characteristic. By deriving the system equations in symbolic state space form from the incremental bond graph in the same way as they are derived from the initial bond graph, the sensitivity matrix of the system can be set up in symbolic form. Its entries are transfer functions depending on the nominal parameter values and on the nominal states and the inputs of the original model. The sensitivities can be determined automatically by the bond graph preprocessor CAMP-G and the widely used program MATLAB together with the Symbolic Toolbox for symbolic mathematical calculation. No particular program is needed for the approach proposed. The initial bond graph model may be non-linear and may contain controlled sources and multiport elements. In that case the sensitivity model is linear time variant and must be solved in the time domain. The rationale and the generality of the proposed approach are presented. For illustration purposes a mechatronic example system, a load positioned by a constant-excitation d.c. motor, is presented and sensitivities are determined in symbolic form by means of CAMP-G/MATLAB.
Im vorliegenden Beitrag wird ein prozess- und serviceorientiertes Rahmenmodell vorgeschlagen, das eine strukturelle und begriffliche Orientierung für das Gebiet der elektronischen Bezahlung bietet. Das Rahmenmodell erlaubt eine ganzheitliche Betrachtung über die Merkmale eines einzelnen Zahlungssystems hinaus. Die systemspezifische Sicht auf die elektronische Zahlung wird zu einem prozessorientierten Phasenmodell verallgemeinert. Mit diesem lassen sich die unterstützenden Services für die elektronische Bezahlung aus Kunden- und Händlersicht systematisch zusammenstellen und beschreiben. Die organisatorische Umsetzung der Serviceprozesse führt zur Rolle des Payment Service Providers, der als Mittler zwischen Anbietern und Anwendern elektronischer Zahlungssysteme agiert.
Finding good Echo State Networks to control an underwater robot using evolutionary computations
(2004)
RFID security
(2004)
Honeypots und Honeynets
(2004)
The Virtual Memory Palace
(2006)
The intention of the Virtual Memory Palace is to help people memorize information by addressing their visual memory. The concept is based on the “Memory Palace” as an ancient Greek memorization technique, where symbols are placed in a certain way within an imaginative building in order to remember the original information whenever the mind goes through the vision of this building again. The goal of this work was to create such a Memory Palace in a virtual environment, so it requires less creative effort of the contemporary learner than was necessary in ancient Greece. The Virtual Memory Palace offers the possibility to freely explore a virtual 3d architectural model and to place icons at various locations within this model. Specific behaviors were assigned to these locations to make them more memorable. To test the benefit of this concept, an experiment with 15 subjects was conducted. The results show a higher remembrance rate of items learned in the Virtual Memory Palace compared to a wordlist. The observations made during the test showed that most of the subjects enjoyed the memorization environment and were astonished how well the Virtual Memory Palace worked for them.
BGML - a novel XML format for the exchange and the reuse of bond graph models of engineering systems
(2006)
Bond graph modelling
(2006)
This paper introduces our robotic system named UGAV (Unmanned Ground-Air Vehicle) consisting of two semi-autonomous robot platforms, an Unmanned Ground Vehicle (UGV) and an Unmanned Aerial Vehicles (UAV). The paper focuses on three topics of the inspection with the combined UGV and UAV: (A) teleoperated control by means of cell or smart phones with a new concept of automatic configuration of the smart phone based on a RKI-XML description of the vehicles control capabilities, (B) the camera and vision system with the focus to real time feature extraction e.g. for the tracking of the UAV and (C) the architecture and hardware of the UAV.
The automated annotation of data from high throughput sequencing and genomics experiments is a significant challenge for bioinformatics. Most current approaches rely on sequential pipelines of gene finding and gene function prediction methods that annotate a gene with information from different reference data sources. Each function prediction method contributes evidence supporting a functional assignment. Such approaches generally ignore the links between the information in the reference datasets. These links, however, are valuable for assessing the plausibility of a function assignment and can be used to evaluate the confidence in a prediction. We are working towards a novel annotation system that uses the network of information supporting the function assignment to enrich the annotation process for use by expert curators and predicting the function of previously unannotated genes. In this paper we describe our success in the first stages of this development. We present the data integration steps that are needed to create the core database of integrated reference databases (UniProt, PFAM, PDB, GO and the pathway database Ara-Cyc) which has been established in the ONDEX data integration system. We also present a comparison between different methods for integration of GO terms as part of the function assignment pipeline and discuss the consequences of this analysis for improving the accuracy of gene function annotation. The methods and algorithms presented in this publication are an integral part of the ONDEX system which is freely available from http://ondex.sf.net/.
We have designed an inexpensive intelligent pedestrian counting system. The pedestrian counting system consists of several counters that can be connected together in a distributed fashion and communicate over the wireless channel. The motion pattern is recorded using a set of passive infrared (PIR) sensors. Each counter has one wireless sensor node that processes the PIR sensor data and transmits it to a base station. Then echo state network, a special kind of recurrent neural network, is used to predict the pedestrian count from the input pattern. The evaluation of the performance of such networks in a novel kind of application is one focus of this work. The counter gave a performance of 80.4% which is better than the commercially available low-priced pedestrian counters. The article reports the experiments we did for analyzing the counterperformance and lists the strengths and limitations of the current implementation. It will also report the preliminary test results obtained by substituting the PIR sensors with low-cost active IR distance sensors which can improve the counter performance further.
In this paper, residual sinks are used in bond graph model-based quantitative fault detection for the coupling of a model of a faultless process engineering system to a bond graph model of the faulty system. By this way, integral causality can be used as the preferred computational causality in both models. There is no need for numerical differentiation. Furthermore, unknown variables do not need to be eliminated from power continuity equations in order to obtain analytical redundancy relations (ARRs) in symbolic form. Residuals indicating faults are computed numerically as components of a descriptor vector of a differential algebraic equation system derived from the coupled bond graphs. The presented bond graph approach especially aims at models with non-linearities that make it cumbersome or even impossible to derive ARRs from model equations by elimination of unknown variables. For illustration, the approach is applied to a non-controlled as well as to a controlled hydraulic two-tank system. Finally, it is shown that not only the numerical computation of residuals but also the simultaneous numerical computation of their sensitivities with respect to a parameter can be supported by bond graph modelling.
Simultaneous detection of cyanide and heavy metals for environmental analysis by means of µISEs
(2010)
Zentrale Archivierung und verteilte Kommunikation digitaler Bilddaten in der Pneumokoniosevorsorge
(2010)
Pneumokoniose-Vorsorgeuntersuchungen erfordern die Befundung einer Röntgenthoraxaufnahme nach ILO-Staublungenklassifikation. Inzwischen werden die benötigten Aufnahmen bereits in großem Umfang digital angefertigt und kommuniziert. Hierdurch entstehen neue Anforderungen an verwendete Technik und Workflow-Mechanismen, um einen effizienten Ablauf von Untersuchung, Befundung und Dokumentation zu gewährleisten.
Die Tool-gestützte Identifizierung von Sicherheitslücken kann in verschiedenen Stadien des Software-Entwicklungsprozesses und -Lebenszyklus durchgeführt werden. Mit Fuzzing und Threat-Modeling stehen beispielsweise zwei Methoden zur Verfügung, welche zum Finden von Sicherheitsproblemen auch in produktiv betriebenen Anwendungen eingesetzt werden können. Beim Threat-Modeling handelt es sich um ein heuristisches Verfahren, das die methodische Entwicklung eines vertrauenswürdigen Systementwurfs unterstützt. Mit der Fuzzing-Methode lässt sich die Robustheit der untersuchten Software sowohl mit willkürlichen als auch mit zielgerichteten Daten überprüfen. Im Beitrag werden die Vorgehensweisen beim Einsatz der beiden Methoden skizziert sowie Hinweise auf entsprechende Tools gegeben.
Novel Automated Three-Dimensional Genome Scanning Based on the Nuclear Architecture of Telomeres
(2011)
Ein SLA (Service Level Agreement) legt alle Punkte einer vertraglichen Zusammenarbeit zwischen Unternehmen und Service Provider verbindlich fest. Ein SLA muss sorgfältig erstellt werden, um ein Vertrauensverhältnis zwischen beiden Seiten herzustellen. Dabei geht es um inhaltliche, organisatorische und technische Anforderungen sowie um eine exakte Festlegung auf verwendete Fachbegriffe und Leistungskriterien. Der vorliegende Beitrag beschreibt Punkt für Punkt den Inhalt eines SLA. Das sind u.a. die Benennung der Vetragspartner, die Leistungskriterien, die die Qualität des Dienstes sicherstellen sowie die Überwachung der Erbringung der vereinbarten Leistung und die Dauer des Vertrages.
At present, data publication is one of the most dynamic topics in e-Research. While the fundamental problems of electronic text publication have been solved in the past decade, standards for the external and internal organisation of data repositories are advanced in some research disciplines but underdeveloped in others. We discuss the differences between an electronic text publication and a data publication and the challenges that result from these differences for the data publication process. We place the data publication process in the context of the human knowledge spiral and discuss key factors for the successful acquisition of research data from the point of view of a data repository. For the relevant activities of the publication process, we list some of the measures and best practices of successful data repositories.
Die Fachhochschulen haben sich als Hochschulen für angewandte Wissenschaften seit ihrer Gründung Anfang der 70er Jahre deutlich gewandelt. Das Fächerportfolio vieler Fachhochschulen ist inzwischen mit jenem der Universitäten vergleichbar. In einigen Fächern bilden die Fachhochschulen sogar den überwiegenden Anteil von Absolventen aus. Die anwendungsorientierte Spitzenforschung gehört zum Selbstverständnis vieler Fachhochschulen. Vor diesem Hintergrund ist es unverständlich und für die wirtschaftliche Zukunftsfähigkeit schädlich, dass Fachhochschulen immer noch deutliche Wettbewerbsnachteile in der Weiterqualifizierung des wissenschaftlichen Nachwuchses haben. Dies gilt umso mehr, wenn mit Fachhochschulen vergleichbaren privaten Hochschulen das Promotionsrecht zugestanden wird.
Fuzzelarbeit: Identifizierung unbekannter Sicherheitslücken und Software-Fehler durch Fuzzing
(2011)
Fuzzing als toolgestützte Identifizierung von Sicherheitslücken wird in der Regel im letzten Stadium der Softwareentwicklung zum Einsatz kommen. Es eignet sich zur Suche nach Sicherheitslücken in jeder Art Software. Die Robustheit der untersuchten Zielsoftware wird beim Fuzzing mit zielgerichteten, unvorhergesehenen Eingabedaten überprüft. Der Fuzzing-Prozess wird im Artikel beschrieben, ebenso die Taxometrie von Fuzzern, die in "dumme" und "intelligente" Fuzzer eingeteilt werden. Die Identifizierung von Sicherheitslücken oder Fehlern in der Zielsoftware erfolgt durch ein umfassendes Monitoring (Debugger, Profiler, Tracker). Die meist große Zahl identifizierter Schwachstellen und Verwundbarkeiten macht eine Bewertung jeder einzelnen erforderlich, weil in der Regel aus Wirtschaftlichkeitsgründen nicht alle behoben werden können. Als wichtige Bewertungsparameter werden genannt: Erkennbarkeit für Dritte, Reproduzierbarkeit, Ausnutzbarkeit, benötigte Zugriffsrechte und generierbarer Schaden. Im Internet werden etwa 300 Tools angeboten. Die Qualität eines Fuzzers lässt sich jedoch nicht pauschal angeben. Die Wirksamkeit und Eignung eines Fuzzers hängen von der Zielsoftware und den individuellen Anforderungen des Testers ab.
In a research project funded by the German Research Foundation, meteorologists, data publication experts, and computer scientists optimised the publication process of meteorological data and developed software that supports metadata review. The project group placed particular emphasis on scientific and technical quality assurance of primary data and metadata. At the end, the software automatically registers a Digital Object Identifier at DataCite. The software has been successfully integrated into the infrastructure of the World Data Center for Climate, but a key was to make the results applicable to data publication processes in other sciences as well.
The relative contributions of radial and laminar optic flow to the perception of linear self-motion
(2012)
When illusory self-motion is induced in a stationary observer by optic flow, the perceived distance traveled is generally overestimated relative to the distance of a remembered target (Redlick, Harris, & Jenkin, 2001): subjects feel they have gone further than the simulated distance and indicate that they have arrived at a target's previously seen location too early. In this article we assess how the radial and laminar components of translational optic flow contribute to the perceived distance traveled. Subjects monocularly viewed a target presented in a virtual hallway wallpapered with stripes that periodically changed color to prevent tracking. The target was then extinguished and the visible area of the hallway shrunk to an oval region 40° (h) × 24° (v). Subjects either continued to look centrally or shifted their gaze eccentrically, thus varying the relative amounts of radial and laminar flow visible. They were then presented with visual motion compatible with moving down the hallway toward the target and pressed a button when they perceived that they had reached the target's remembered position. Data were modeled by the output of a leaky spatial integrator (Lappe, Jenkin, & Harris, 2007). The sensory gain varied systematically with viewing eccentricity while the leak constant was independent of viewing eccentricity. Results were modeled as the linear sum of separate mechanisms sensitive to radial and laminar optic flow. Results are compatible with independent channels for processing the radial and laminar flow components of optic flow that add linearly to produce large but predictable errors in perceived distance traveled.
We present our approach to extend a Virtual Reality software framework towards the use for Augmented Reality applications. Although VR and AR applications have very similar requirements in terms of abstract components (like 6DOF input, stereoscopic output, simulation engines), the requirements in terms of hardware and software vary considerably. In this article we would like to share the experience gained from adapting our VR software framework for AR applications. We will address design issues for this task. The result is a VR/AR basic software that allows us to implement interactive applications without fixing their type (VR or AR) beforehand. Switching from VR to AR is a matter of changing the configuration file of the application. We also give an example of the use of the extended framework: Augmenting the magnetic field of bar magnets in physics classes. We describe the setup of the system and the real-time calculation of the magnetic field, using a GPU.
For the case when the abstraction of instantaneous state transitions is adopted, this paper proposes to start fault detection and isolation in an engineering system from a single time-invariant causality bond graph representation of a hybrid model. To that end, the paper picks up on a long-known proposal to model switching devices by a transformer modulated by a Boolean variable and a resistor in fixed conductance causality accounting for its ON resistance. Bond graph representations of hybrid system models developed in this way have been used so far mainly for the purpose of simulation. The paper shows that they can well constitute an approach to the bond-graph-based quantitative fault detection and isolation of hybrid models. Advantages are that the standard sequential causality assignment procedure can be a used without modification. A single set of analytical redundancy relations valid for all physically feasible system modes can be (automatically) derived from the bond graph. Stiff model equations due to small values of the ON resistance in the switch model may be avoided by symbolic reformulation of equations and letting the ON resistance of some switches tend to zero, turning them into ideal switches.
First, for two examples considered in the literature, it is shown that the approach proposed in this paper can produce the same analytical redundancy relations as were obtained from a hybrid bond graph with controlled junctions and the use of a sequential causality assignment procedure especially for fault detection and isolation purpose. Moreover, the usefulness of the proposed approach is illustrated in two case studies by its application to standard switching circuits extensively used in power electronic systems and by simulation of some fault scenarios. The approach, however, is not confined to the fault detection and isolation of such systems. Analytically validated simulation results obtained by means of the program Scilab give confidence in the approach.
A bond graph representation of switching devices known for a long time has been a modulated transformer with a modulus b(t)∈{0,1}∀t≥0 in conjunction with a resistor R:Ron accounting for the ON-resistance of a switch considered non-ideal. Besides other representations, this simple model has been used in bond graphs for simulation of the dynamic behaviour of hybrid systems. A previous article of the author has proposed to use the transformer–resistor pair in bond graphs for fault diagnosis in hybrid systems. Advantages are a unique bond graph for all system modes, the application of the unmodified standard Sequential Causality Assignment Procedure, fixed computational causalities and the derivation of analytical redundancy relations incorporating ‘Boolean’ transformer moduli so that they hold for all system modes. Switches temporarily connect and disconnect model parts. As a result, some independent storage elements may temporarily become dependent, so that the number of state variables is not time-invariant. This article addresses this problem in the context of modelling and simulation of fault scenarios in hybrid systems. In order to keep time-invariant preferred integral causality at storage ports, residual sinks previously introduced by the author are used. When two storage elements become dependent at a switching time instance ts, a residual sink is activated. It enforces that the outputs of two dependent storage elements become immediately equal by imposing the conjugate3 power variable of appropriate value on their inputs. The approach is illustrated by the bond graph modelling and simulation of some fault scenarios in a standard three-phase switched power inverter supplying power into an RL-load in a delta configuration. A well-developed approach to model-based fault detection and isolation is to evaluate the residual of analytical redundancy relations. In this article, analytical redundancy relation residuals have been computed numerically by coupling a bond graph of the faulty system to one of the non-faulty systems by means of residual sinks. The presented approach is not confined to power electronic systems but can be used for hybrid systems in other domains as well. In further work, the RL-load may be replaced by a bond graph model of an alternating current motor in order to study the effect of switch failures in the power inverter on to the dynamic behaviour of the motor.
Using virtual environment systems for road safety education requires a realistic simulation of road traffic. Current traffic simulations are either too restricted in their complexity of agent behavior or focus on aspects not important in virtual environments. More importantly, none of them are concerned with modeling misbehavior of traffic participants which is part of every-day traffic and should therefore not be neglected in this context. We present a concept for a traffic simulation that addresses the need for more realistic agent behavior with regard to road safety education. The two major components of this concept are a simulation of persistent agents which minimizes computational overhead and a model of cognitive processes of human drivers combined with psychological personality profiles to allow for individual behavior and misbehavior.
Software testing in web services environment faces different challenges in comparison with testing in traditional software environments. Regression testing activities are triggered based on software changes or evolutions. In web services, evolution is not a choice for service clients. They have always to use the current updated version of the software. In addition test execution or invocation is expensive in web services and hence providing algorithms to optimize test case generation and execution is vital. In this environment, we proposed several approach for test cases' selection in web services' regression testing. Testing in this new environment should evolve to be included part of the service contract. Service providers should provide data or usage sessions that can help service clients reduce testing expenses through optimizing the selected and executed test cases.
Open Source ERP-Systeme
(2012)
Mit Free and Open Source Software können die IT-Kosten in erheblichem Umfang gesenkt werden. Wegen ihres hohen Durchdringungsgrades in Unternehmen und des damit verbundenen Kostenblocks gilt dies insbesondere für Free and Open Source (FOS-) ERP-Systeme. Zwar sind die Verbreitung und die Akzeptanz von FOS-ERP-Systemen in den letzten Jahren schon stark angewachsen, durch eine verbesserte Markttransparenz lassen sich aber noch weitere Potenziale erschließen. Bestehende Marktübersichten für FOS-ERP-Systeme sind jedoch wenig umfassend. Vor diesem Hintergrund wurde ein Marktspiegel mit detaillierten Angaben zu den verschiedenen FOS-ERP-Systemen erstellt.
ERP systems are being used throughout the whole enterprise and are therefore responsible for a high percentage of IT expenses. The use of Free and Open Source ERP systems (FOS ERP systems) can help to reduce these IT costs. Though the acceptance of FOS ERP systems has increased enormously in the last years, even more entreprises would use FOS ERP systems to support their order processing, if the FOS ERP market was more transparent. Existing market surveys are less comprehensive. Therefore, a detailed market guide was developed.
This paper presents recent research on an active multispectral scanning sensor capable of classifying an object's surface material in order to distinguish between different kinds of materials and human skin. The sensor itself has already been presented in previous work and can be used in conjunction with safeguarding equipment at manually-fed machines or robot workplaces, for example. This work shows how an extended sensor system with advanced material classifiers can be used to provide additional value by distinguishing different materials of work pieces in order to suggest different tools or parameters for the machine (e.g. the use of a different saw blade or rotation speed at table saws). Additionally, a first implementation and evaluation of an active multispectral camera system addressing new safety applications is described. Both approaches intend to increase the productivity and the user's acceptance of the sensor technology.
Generating and visualizing large areas of vegetation that look natural makes terrain surfaces much more realistic. However, this is a challenging field in computer graphics, because ecological systems are complex and visually appealing plant models are geometrically detailed. This work presents Silva (System for the Instantiation of Large Vegetated Areas), a system to generate and visualize large vegetated areas based on the ecological surrounding. Silva generates vegetation on Wang-tiles with associated reusable distributions enabling multi-level instantiation. This paper presents a method to generate Poisson Disc Distributions (PDDs) with variable radii on Wang-tile sets (without a global optimization) that is able to generate seamless tilings. Because Silva has a freely configurable generation pipeline and can consider plant neighborhoods it is able to incorporate arbitrary abiotic and biotic components during generation. Based on multi-levelinstancing and nested kd-trees, the distributions on the Wang-tiles allow their acceleration structures to be reused during visualization. This enables Silva to visualize large vegetated areas of several hundred square kilometers with low render times and a small memory footprint.
In this paper we present the steps towards a well-designed concept of a 5VR6 system for school experiments in scientific domains like physics, biology and chemistry. The steps include the analysis of system requirements in general, the analysis of school experiments and the analysis of input and output devices demands. Based on the results of these steps we show a taxonomy of school experiments and provide a comparison between several currently available devices which can be used for building such a system. We also compare the advantages and shortcomings of 5VR6 and 5AR6 systems in general to show why, in our opinion, 5VR6 systems are better suited for school-use.
The reciprocal translocation t(12;21)(p13;q22), the most common structural genomic alteration in B-cell precursor acute lymphoblastic leukaemia in children, results in a chimeric transcription factor TEL-AML1 (ETV6-RUNX1). We identified directly and indirectly regulated target genes utilizing an inducible TEL-AML1 system derived from the murine pro B-cell line BA/F3 and a monoclonal antibody directed against TEL-AML1. By integration of promoter binding identified with chromatin immunoprecipitation (ChIP)-on-chip, gene expression and protein output through microarray technology and stable labelling of amino acids in cell culture, we identified 217 directly and 118 indirectly regulated targets of the TEL-AML1 fusion protein. Directly, but not indirectly, regulated promoters were enriched in AML1-binding sites. The majority of promoter regions were specific for the fusion protein and not bound by native AML1 or TEL. Comparison with gene expression profiles from TEL-AML1-positive patients identified 56 concordantly misregulated genes with negative effects on proliferation and cellular transport mechanisms and positive effects on cellular migration, and stress responses including immunological responses. In summary, this work for the first time gives a comprehensive insight into how TEL-AML1 expression may directly and indirectly contribute to alter cells to become prone for leukemic transformation.
Die Vorstandsperspektive
(2013)
The contribution of the most common reciprocal translocation in childhood B-cell precursor leukemia t(12;21)(p13;q22) to leukemia development is still under debate. Direct as well as secondary indirect effects of the TEL-AML1 fusion protein are commonly recorded by using cell lines and patient samples, often bearing the TEL-AML1 fusion protein for decades. To identify direct targets of the fusion protein a short-term induction of TEL-AML1 is needed. We here describe in detail the experimental procedure, quality controls and contents of the ChIP, mRNA expression and SILAC datasets associated with the study published by Linka and colleagues in the Blood Cancer Journal [1] utilizing a short term induction of TEL-AML1 in an inducible precursor B-cell line model.
We are happy to present you the special issue on Best Practice in Robot Software Development of the Journal on Software Engineering for Robotics! The spark for this special issue came during the eighth workshop on Software Development and Integration in Robotics (SDIR) at the 2013 IEEE International Conference on Robotics and Automation. The workshop focused on Robot Software Architectures, and the fruitful discussions made it clear that the design, development, and deployment of robot software is always an interplay between competing aspects. These are often couched in antagonistic pairs, such as dependability versus performance, and prominently include quality attributes as well as functional, nonfunctional, and application requirements.
Might the gravity levels found on other planets and on the moon be sufficient to provide an adequate perception of upright for astronauts? Can the amount of gravity required be predicted from the physiological threshold for linear acceleration? The perception of upright is determined not only by gravity but also visual information when available and assumptions about the orientation of the body. Here, we used a human centrifuge to simulate gravity levels from zero to earth gravity along the long-axis of the body and measured observers' perception of upright using the Oriented Character Recognition Test (OCHART) with and without visual cues arranged to indicate a direction of gravity that differed from the body's long axis. This procedure allowed us to assess the relative contribution of the added gravity in determining the perceptual upright. Control experiments off the centrifuge allowed us to measure the relative contributions of normal gravity, vision, and body orientation for each participant. We found that the influence of 1 g in determining the perceptual upright did not depend on whether the acceleration was created by lying on the centrifuge or by normal gravity. The 50% threshold for centrifuge-simulated gravity's ability to influence the perceptual upright was at around 0.15 g, close to the level of moon gravity but much higher than the threshold for detecting linear acceleration along the long axis of the body. This observation may partially explain the instability of moonwalkers but is good news for future missions to Mars.
Current computer architectures are multi-threaded and make use of multiple CPU cores. Most garbage collections policies for the Java Virtual Machine include a stop-the-world phase, which means that all threads are suspended. A considerable portion of the execution time of Java programs is spent in these stop-the-world garbage collections. To improve this behavior, a thread-local allocation and garbage collection that only affects single threads, has been proposed. Unfortunately, only objects that are not accessible by other threads ("do not escape") are eligible for this kind of allocation. It is therefore necessary to reliably predict the escaping of objects. The work presented in this paper analyzes the escaping of objects based on the line of code (program counter – PC) the object was allocated at. The results show that on average 60-80% of the objects do not escape and can therefore be locally allocated.
Hybrid system models exploit the modelling abstraction that fast state transitions take place instantaneously so that they encompass discrete events and the continuous time behaviour for the while of a system mode. If a system is in a certain mode, e.g. two rigid bodies stick together, then residuals of analytical redundancy relations (ARRs) within certain small bounds indicate that the system is healthy. An unobserved mode change, however, invalidates the current model for the dynamic behaviour. As a result, ARR residuals may exceed current thresholds indicating faults in system components that have not happened. The paper shows that ARR residuals derived from a bond graph cannot only serve as fault indicators but may also be used for bond graph model-based system mode identification. ARR residuals are numerically computed in an off-line simulation by coupling a bond graph of the faulty system to a non-faulty system bond graph through residual sinks. In real-time simulation, the faulty system model is to be replaced by measurements from the real system. As parameter values are uncertain, it is important to determine adaptive ARR thresholds that, given uncertain parameters, allow to decide whether the dynamic behaviour in a current system mode is the one of the healthy system so that false alarms or overlooking of true faults can be avoided. The paper shows how incremental bond graphs can be used to determine adaptive mode-dependent ARR thresholds for switched linear time-invariant systems with uncertain parameters in order to support robust fault detection. Bond graph-based hybrid system mode identification as well as the determination of adaptive fault thresholds is illustrated by application to a power electronic system easy to survey. Some simulation results have been analytically validated.
Structure-activity relationships of thiostrepton derivatives: implications for rational drug design
(2014)
Breadth-First Search is a graph traversal technique used in many applications as a building block, e.g., to systematically explore a search space or to determine single source shortest paths in unweighted graphs. For modern multicore processors and as application graphs get larger, well-performing parallel algorithms are favorable. In this paper, we systematically evaluate an important class of parallel algorithms for this problem and discuss programming optimization techniques for their implementation on parallel systems with shared memory. We concentrate our discussion on level-synchronous algorithms for larger multicore and multiprocessor systems. In our results, we show that for small core counts many of these algorithms show rather similar performance behavior. But, for large core counts and large graphs, there are considerable differences in performance and scalability influenced by several factors, including graph topology. This paper gives advice, which algorithm should be used under which circumstances.
Dysregulation of IL12 Signaling As a Novel Cause of an Autoimmune Lymphoproliferative like Syndrome
(2014)
Updating a shared data structure in a parallel program is usually done with some sort of high-level synchronization operation to ensure correctness and consistency. The realization of such high-level synchronization operations is done with appropriate low-level atomic synchronization instructions that the target processor architecture provides. These instructions are costly and often limited in their scalability on larger multi-core / multi-processor systems. In this paper, a technique is discussed that replaces atomic updates of a shared data structure with ordinary and cheaper read/write operations. The necessary conditions are specified that must be fulfilled to ensure overall correctness of the program despite missing synchronization. The advantage of this technique is the reduction of access costs as well as more scalability due to elided atomic operations. But on the other side, possibly more work has to be done caused by missing synchronization. Therefore, additional work is traded against costly atomic operations. A practical application is shown with level-synchronous parallel Breadth-First Search on an undirected graph where two vertex frontiers are accessed in parallel. This application scenario is also used for an evaluation of the technique. Tests were done on four different large parallel systems with up to 64-way parallelism. It will be shown that for the graph application examined the amount of additional work caused by missing synchronization is neglectible and the performance is almost always better than the approach with atomic operations.
Improving the study entry supports students in a decisive phase of their university education. Implementing improvements is a change process and can only be successful if the relevant stakeholders are addressed and convinced. In the described Teaching Quality Pact project evaluation data is used as a mean to discuss in the university the situation of the study programs. As these discussions were based on empirical data rather than on opinion, it was possible to achieve an open discussion about measures that are implemented. The open discussion is maintained during the project when results of the measures taken are analyzed.
The latest advances in the field of smart card technologies allow modern cards to be more than just simple security tokens. Recent developments facilitate the use of interactive components like buttons, displays or even touch-sensors within the card's body thus conquering whole new areas of application. With interactive functionalities the usability aspect becomes the most important one for designing secure and popularly accepted products. Unfortunately, the usability can only be tested fully with completely integrated hence expensive smart card prototypes. This restricts severely application specific research, case studies of new smart card user interfaces and the optimization of design aspects, as well as hardware requirements by making usability and acceptance tests in smart card development very costly and time-consuming. Rapid development and simulation of smart card interfaces and applications can help to avoid this restriction. This paper presents a rapid development process for new smart card interfaces and applications based on common smartphone technology using a tool called SCUID^Sim. We will demonstrate the variety of usability aspects that can be analyzed with such a simulator by discussing some selected example projects.
We present a system that combines voxel and polygonal representations into a single octree acceleration structure that can be used for ray tracing. Voxels are well-suited to create good level-of-detail for high-frequency models where polygonal simplifications usually fail due to the complex structure of the model. However, polygonal descriptions provide the higher visual fidelity. In addition, voxel representations often oversample the geometric domain especially for large triangles, whereas a few polygons can be tested for intersection more quickly.
Virtual reality environments are increasingly being used to encourage individuals to exercise more regularly, including as part of treatment in those with mental health or neurological disorders. The success of virtual environments likely depends on whether a sense of presence can be established, where participants become fully immersed in the virtual environment. Exposure to virtual environments is associated with physiological responses, including cortical activation changes. Whether the addition of a real exercise within a virtual environment alters sense of presence perception, or the accompanying physiological changes, is not known. In a randomized and controlled study design, trials of moderate-intensity exercise (i.e. self-paced cycling) and no-exercise (i.e. automatic propulsion) were performed within three levels of virtual environment exposure. Each trial was 5-min in duration and was followed by post-trial assessments of heart rate, perceived sense of presence, EEG, and mental state. Changes in psychological strain and physical state were generally mirrored by neural activation patterns. Furthermore these change indicated that exercise augments the demands of virtual environment exposures and this likely contributed to an enhanced sense of presence.