Refine
Departments, institutes and facilities
- Fachbereich Wirtschaftswissenschaften (48)
- Fachbereich Informatik (42)
- Institut für funktionale Gen-Analytik (IFGA) (24)
- Fachbereich Ingenieurwissenschaften und Kommunikation (18)
- Institute of Visual Computing (IVC) (18)
- Institut für Cyber Security & Privacy (ICSP) (15)
- Präsidium (14)
- Fachbereich Angewandte Naturwissenschaften (12)
- Fachbereich Sozialpolitik und Soziale Sicherung (5)
- Institut für Verbraucherinformatik (IVI) (5)
Document Type
- Article (84)
- Conference Object (60)
- Part of a Book (54)
- Book (monograph, edited volume) (14)
- Part of Periodical (14)
- Report (9)
- Bachelor Thesis (3)
- Lecture (2)
- Preprint (2)
- Conference Proceedings (1)
Year of publication
- 2010 (248) (remove)
Keywords
- Entwicklungspolitik (6)
- internationale Politik (5)
- Entwicklungsland (4)
- Europa (4)
- Globalisierung (3)
- Management (3)
- Sicherheitspolitik (3)
- Außenpolitik (2)
- Bundesrepublik Deutschland (2)
- Diskurs (2)
As competition for tourists becomes more global, understanding and accommodating the needs of international tourists, with their different cultural backgrounds, has become increasingly important. This study highlights the variations in tourist industry service--particularly as they relate to different cultures. Specifically, service failures experienced by Japanese and German tourists in the U.S. were categorized using the Critical Incident Technique (CIT). The results were compared with earlier studies of service failures experienced by American consumers in the tourist industry. The sample consists of 128 Japanese and 94 “Germanic” (German, Austrian, Swiss-German) respondents. The Japanese and German sample rated “Inappropriate employee behavior” most significant category of service failure. More than half of these respondents said that, because of the failure, they would avoid the offending U.S. business. This is a much stronger response than an American sample had reported in an earlier study. The implications for managers and researchers are discussed.
Suppose we have n keys, n access probabilities for the keys, and n+1 access probabilities for the gaps between the keys. Let h_min(n) be the minimal height of a binary search tree for n keys. We consider the problem to construct an optimal binary search tree with near minimal height, i.e.\ with height h <= h_min(n) + Delta for some fixed Delta. It is shown, that for any fixed Delta optimal binary search trees with near minimal height can be constructed in time O(n^2). This is as fast as in the unrestricted case. So far, the best known algorithms for the construction of height-restricted optimal binary search trees have running time O(L n^2), whereby L is the maximal permitted height. Compared to these algorithms our algorithm is at least faster by a factor of log n, because L is lower bounded by log n.
Insolvenzanfechtung von Beitragszahlungen an Sozialversicherungsträger – aktuelle Rechtsprechung
(2010)
Zentrale Archivierung und verteilte Kommunikation digitaler Bilddaten in der Pneumokoniosevorsorge
(2010)
Pneumokoniose-Vorsorgeuntersuchungen erfordern die Befundung einer Röntgenthoraxaufnahme nach ILO-Staublungenklassifikation. Inzwischen werden die benötigten Aufnahmen bereits in großem Umfang digital angefertigt und kommuniziert. Hierdurch entstehen neue Anforderungen an verwendete Technik und Workflow-Mechanismen, um einen effizienten Ablauf von Untersuchung, Befundung und Dokumentation zu gewährleisten.
This report presents the implementation and evaluation of a computer vision problem on a Field Programmable Gate Array (FPGA). This work is based upon [5] where the feasibility of application specific image processing algorithms on a FPGA platform have been evaluated by experimental approaches. The results and conclusions of that previous work builds the starting point for the work, described in this report. The project results show considerable improvement of previous implementations in processing performance and precision. Different algorithms for detecting Binary Large OBjects (BLOBs) more precisely have been implemented. In addition, the set of input devices for acquiring image data has been extended by a Charge-Coupled Device (CCD) camera. The main goal of the designed system is to detect BLOBs in continuous video image material and compute their center points.
This work belongs to the MI6 project from the Computer Vision research group of the University of Applied Sciences Bonn-Rhein-Sieg1 . The intent is the invention of a passive tracking device for an immersive environment to improve user interaction and system usability. Therefore the detection of the users position and orientation in relation to the projection surface is required. For a reliable estimation a robust and fast computation of the BLOB's center-points is necessary. This project has covered the development of a BLOB detection system on an Altera DE2 Development and Education Board with a Cyclone II FPGA. It detects binary spatially extended objects in image material and computes their center points. Two different sources have been applied to provide image material for the processing. First, an analog composite video input, which can be attached to any compatible video device. Second, a five megapixel CCD camera, which is attached to the DE2 board. The results are transmitted on the serial interface of the DE2 board to a PC for validation of their ground truth and further processing. The evaluation compares precision and performance gain dependent on the applied computation methods and the input device, which is providing the image material.
Die Internetpräsenz einer Hochschule ist für ausländische Studierende häufig die erste Informationsquelle auf der Suche nach einem geeigneten Studienstandort. Um die Website für die Nutzer besonders verständlich zu gestalten, sollten neben den grundlegenden Regeln des Webdesigns einige elementare Gestaltungshinweise beachtet werden. Der Leitfaden gibt dazu Anregungen und wertvolle Tipps.
Bond Graph Methodology
(2010)
Nowadays, engineering systems are becoming increasingly complex and, for design purposes, must be considered as multidisciplinary systems made up of components from different engineering disciplines. With regard to the systematic development and the analysis of models, interdisciplinary methodologies supported by software become more and more important. Bond graphs are a graphical description formalism particularly suited for multidisciplinary systems and used by modellers across the world.
Bond Graph Methodology gives a comprehensive, in-depth representation of the state of the art, including recent results gathered from research articles, dissertations and contributions by the author on a number of topics. The structured and rigorous presentation systematically covers model development, analysis of models, numerical computation of models and modern software that can be used for a bond graph approach. The book also includes a range of case studies illustrating various applications of the methodology and provides a glossary.
Bond Graph Methodology addresses fundamentals, as well as advanced topics, e.g., models of variable structure, bond graphs for sensitivity analysis and generation of equations for the study of robustness. The compilation and presentation of the material has been inspired by the author's extensive experience in research and teaching.
A useful text for advanced courses in modelling, simulation and control, Bond Graph Methodology can also be used for self-study. It has been designed to serve readers interested in the subject of bond graph modelling and those with expertise in related areas, as well as members of the worldwide community of bond graph modellers.
Robots integrated into a social environment with humans need the ability to locate persons in their surrounding area. This is also the case for the WelcomeBot which is developed at the Fraunhofer Institute IAIS. In the future, the robot should follow persons in the buildings and guide them to certain areas. Therefore, it needs the capability to detect and track a person in the environment. In this master thesis, an approach for fast and reliable tracking of a person via a mobile robotic platform is presented. Based on the investigation of different methods and sensors, a laser scanner and a camera are selected as the primary two sensors.
This work presents a person independent pointing gesture recognition application. It uses simple but effective features for the robust tracking of the head and the hand of the user in an undefined environment. The application is able to detect if the tracking is lost and can be reinitialized automatically. The pointing gesture recognition accuracy is improved by the proposed fingertip detection algorithm and by the detection of the width of the face. The experimental evaluation with eight different subjects shows that the overall average pointing gesture recognition rate of the system for distances up to 250 cm (head to pointing target) is 86.63% (with a distance between objects of 23 cm). Considering just frontal pointing gestures for distances up to 250 cm the gesture recognition rate is 90.97% and for distances up to 194 cm even 95.31%. The average error angle is 7.28◦.
TK-Markt 2010 ff
(2010)
Die Erfindung befasst sich mit einer Sicherheitsvorrichtung zur Verhinderung von Unfällen mit Personenschäden durch Maschinen, die ein Flächenelement enthält, welches auf der Oberfläche des Bereichs des Roboters, innerhalb dessen ein Unfall verhindert werden soll, durch ein Gelenk beweglich angeordnet ist. Des Weiteren weist die Sicherheitsvorrichtung Sensoren auf, die unter dem Flächenelement angeordnet sind und die Verkippung des Flächenelements erfassen.
In the past RE research targeted mainly the needs of RE practice in the context of larger enterprises. However, Small and Medium Enterprises (SME) develop, customize and maintain a considerable part of software. Often, these companies are unable to apply RE methods and techniques without modifications. Besides, shortcomings in applying RE methods due to time constraints or limited resources may arise.
The introduction of new steering conceptsSteer-by-Wire (SBW) gives possibility to replace theconventional steering wheel by an alternative userinterface such as a sidestick. In SBW system the sidestickcan be used as user input element instead of a steeringwheel. The implementation of sidestick in the Human-Machine-Interface (HMI) allows combiningthe conventional steering consisting of a steeringwheel, an accelerator and a brake pedal into a singleelement. Also the implementation of the sidestickcreates new, interesting and flexible design optionswhich can be used to transform the driver’s spatialenvironment. This article describes an active sidestickfor a vehicle which has been developed, integrated andtested in accordance of haptic, ergonomic and safetyrelevant requirements. The control strategies used forthe active attenuators of the sidestick have beeninvestigated and optimised using a Simulink model.
Schwungrad des Wissens: Ein ganzheitliches Innovationsmanagement lohnt sich auch für Universitäten
(2010)
Mess- und Bewertungsinstrument zur Feststellung des Gefährdungspotentials von Glücksspielprodukten
(2010)
Internet-Ökonomie
(2010)
Internationale Zusammenarbeit ist schwieriger und unübersichtlicher geworden. In den vergangenen zwei Jahrzehnten hat sich nach dem Fall des Eisernen Vorhangs die Themenpalette verschoben, die die internationale Politik herausfordert. Das Verhältnis zwischen Industrie- und Entwicklungsländern hat sich dramatisch verändert.
Nowadays perception is still an up-to-date scienti fic issue on a mobile robot system. This thesis introduces an approach on how to recognize objects, namely numbers, using a digital camera on a Volksbot robot. The robot used in this thesis has been specifi cally designed for the SICK robot day. The development of the vision algorithm was done in two stages: the region of interest detection and the actual number recognition. Diff erent algorithms had been tested and evaluated and the Canny edge detector with contour finding has been proven to be the best choice for the region of interest detection and the Tesseract OCR engine was the best decision for number recognition. To integrate the vision component on an existing robot system, ROS was used. This thesis also discusses the integration of the EPOS motor controller into ROS.
Usable Security und Privacy
(2010)
Enterprise Resource Planning
(2010)
Sourcing
(2010)
Geschäftsprozessmodellierung
(2010)
Business Process Management
(2010)
Geschäftsprozess
(2010)
Customizing
(2010)
Prozessarchitektur
(2010)
Standard Software
(2010)
Outsourcing
(2010)
Offshoring
(2010)
Green IT
(2010)
Unter Green IT kann der energiesparende Umgang mit IT-Ressourcen verstanden werden. Hierzu gehören energiesparende Investitionen in Hardware, Software und Services, aber auch Veränderungen in der Geschäfts- und IT-Strategie. Eine aktuelle Umfrage hat ergeben, dass ein Drittel der Unternehmen ihre Energiekosten für den Betrieb der IT nicht kennen. Zudem werden bei Investitionsentscheidungen die Energiekosten nur rudimentär oder gar nicht in den Entscheidungsprozess einbezogen. Nach Untersuchungen der Experten Group fallen mehr als 60% der IT-getriebenen Energiekosten außerhalb des Rechenzentrums an, also in Büros und anderen Unternehmensbereichen. Es kann davon ausgegangen werden, dass sich die Thematik Green IT noch in der Anfangsphase befindet und noch ausbaufähige Weiterentwicklungsmöglichkeiten bestehen. Eine zentrale Aufgabe für die Unternehmen wird der Aufbau ganzheitlicher Umweltmanagementkonzepte sein, die u.a. Green IT integrieren. Die bisherigen Einzelmaßnahmen reichen nicht aus, weil eine strategische Zielsteuerung fehlt. Hierzu ist eine Erweiterung bzw. Anpassung der Geschäfts- und IT-Strategie erforderlich. Strategiesteuerungskonzepte, wie die Balanced Scorecard, sind um geeignete Kenngrößen (Ziele, Keimzahlen, Messgrößen und Maßnahmen) zu erweitern. Das Umweltbewusstsein der Mitarbeiter ist zu schärfen. Ein weiterer Aspekt ist die Frage der Messung des Fortschritts in den Unternehmen und auch aus gesamtwirtschaftlicher Sicht. Die Entwicklung von Reifegradmodellen und Zertifizierungskonzepten steht ebenfalls noch am Anfang. Hier bestehen noch ein erhebliches Forschungspotenzial und vor allem Möglichkeiten der Umsetzung. Unternehmen sollten jetzt bereits vorhandene Zertifizierungskonzepte unabhängiger Anbieter aufgreifen und nutzen. Forscher sollten Zertifizierungskonzepte entwickeln bzw. weiterentwickeln und mit den Managementinstrumenten der Betriebswirtschaftslehre abstimmen bzw. diese dort integrieren.
Workflow Management
(2010)
Prozessmodell
(2010)
Prozess
(2010)
Nachhaltig gestiegene Energiepreise haben vor dem Hintergrund begrenzter IT-Budgets zum Nach- und teilweise auch Umdenken geführt. Ähnlich der „Bio-Welle“ im Lebensmittelbereich ist derzeit eine „Grüne-Welle“ unter IT-Anbietern und deren Kunden zu verspüren. Unter Green IT kann der energiesparende Umgang mit IT-Ressourcen verstanden werden. Hierzu gehören energiesparende Investitionen in Hardware, Software und Services, aber auch Veränderungen in der Geschäfts- und IT-Strategie. Allerdings zeigen verschiedene Studien, dass noch kein durchgängiges Verständnis über Green IT existiert. In vielen Fällen sind dem IT-Management die Energiekosten für den Betrieb zentraler IT-Systeme (Server im Rechenzentrum u. a.) und dezentraler Arbeitsplatzsysteme (Desktops, Laptops u. a.) weitgehend unbekannt. Eine aktuelle Umfrage hat ergeben, dass ein Drittel der Unternehmen ihre Energiekosten für den Betrieb der IT nicht kennen. Zudem werden bei Investitionsentscheidungen die Energiekosten nur rudimentär oder gar nicht in den Entscheidungsprozess einbezogen. Gleichzeitig prognostizieren Analysten wie die Gartner Group einen stark steigenden Markt für IT-Leistungen, die unter dem Schlagwort „Green IT“ vermarktet werden. Stand bislang die Einsparung von Energiekosten im zentralen Rechenzentrum im Vordergrund, weiten sich die Bemühungen auch im dezentralen IT-Umfeld, also in den Büros mit ihren Arbeitsplatzsystemen (Desktops, Laptops etc.) aus. Nach Untersuchungen der Experton Group fallen mehr als 60 % der IT-getriebenen Energiekosten außerhalb des Rechenzentrums an, also in Büros und anderen Unternehmensbereichen.
Green IT (Green IS, Green ICT) is a concept of saving energy consumption to reduce IT costs. A current survey shows that only few companies in German speaking countries consider this aspect in their daily business. This is important facing the current situation of attempts of cost saving during the current economic crisis worldwide. This paper introduces into Green IT and presents an IT management and controlling concept. Then the main results of a currently presented survey are used to modify the concept. Finally an agenda for future research is given.
Masterkurs IT-Controlling
(2010)
Green IT is one of the most recent buzzwords in the IT business. Often it is considered as the key to all future IT problems by one half of IT experts and as an overestimated hype by the other half. Green IT aims to integrate information and communication technologies into a business wide sustainability strategy without any productivity drawbacks. It includes measures and tactics to reduce the IT's environmental impact e.g. by reducing the power consumption and using energy from renewable sources, and by using technologies such as virtualisation.
When entering a password (or other secrets) the typed input is most commonly masked, i.e. the characters are hidden behind bullets or asterisks. This, however, complicates the input and highly decreases the user's confident causing several issues such as login failure attempts. On the other hand, password masking is an important security requirement for a lot of applications and contexts to prevent a third person to read the password. Thus, simply dropping password masking is not feasible in general. A common solution provides the user with the choice of toggling password masking on and off, but due to distinct defaults (in dependency of the application and context) this is rather complex and confusing. Enhanced password visualization technologies beyond the simple masking of passwords can provide more sophisticated solutions from both a usability and security perspective. In this paper, available password visualization technologies are presented and discussed. Furthermore a novel password visualization approach is introduced, the TransparentMask, which provides unique properties in comparison to the existing schemes. Amongst these are the ability to detect mistakes while typing and being able to localize and correct the typo within a certain range. Finally, a security analysis of the TransparentMask shows that the protection level given by a certain password length is slightly decreased in comparison to the fully masked approach.
Dieses Buch befasst sich mit schweren Problemen auf Graphen, für die es vermutlich keine effizienten Algorithmen gibt, und stellt verschiedene Methoden vor, wie man mit der algorithmischen Härte solcher Probleme umgehen kann. Einerseits kann man effiziente Algorithmen entwerfen, die sich eine geeignete Baumstruktur der Graphen zunutze machen; andererseits erlauben Fest-Parameter-Algorithmen eine effiziente Lösung, wenn gewisse Graphenparameter klein sind.
The perceived distance of self motion induced in a stationary observer by optic flow is overestimated (Redlick et al., Vis Res. 2001 41: 213). Here we assessed how different components of translational optic flow contribute to perceived distance traveled. Subjects sat on a stationary bicycle in front of a virtual reality display that extended beyond 90deg on each side. They monocularly viewed a target presented in a virtual hallway wallpapered with stripes that changed colour to prevent tracking individual stripes. Subjects then looked centrally or 30, 60 or 90° eccentrically while their view was restricted to an ellipse with faded edges (25 x 42deg) centered on their fixation. Subjects judged when they had reached the target’s remembered position. Perceptual gain (perceived/actual distance traveled) was highest when subjects were looking in a direction that depended on the simulated speed of motion. Results were modeled as the sum of separate mechanisms sensitive to radial and laminar optic flow. In our display distances were perceived as compressed. However, there was no correlation between perceptual compression and perceived speed of motion. These results suggest that visually induced self motion in virtual displays can be subject to large but predictable error.
Action planning has been used in the field of robotics for solving long-running tasks. In the robot architectures field, it is also known as the deliberative layer. However, there is still a gap between the symbolic representation on the one hand and the low-level control and sensor representation on the other. In addition, the definition of a planning problem for a complex, real-world robot is not trivial. The planning process could become intractable as its search spaces become large.
In this paper, we describe an approach to academic teaching in computer science using storytelling as a means to investigate to hypermedia and virtual reality topics. Indications are shown that narrative activity within the context of a Hypermedia Novel related to educational content can enhance motivation for self-conducted learning and in parallel lead to an edutainment system of its own. In contrast to existing approaches the Hypermedia Novel environment allows an iterative approach to the narrative content, thereby integrating story authoring and story reception not only in the beginning but at any time. The narrative practice and background research as well as the resulting product can supplement lecture material with comparable success to traditional academic teaching approaches. On top of this there is the added value of soft skill training and a gain of expert knowledge in areas of personal background research.
Im Zeitalter der internationalen Bilanzierung hat das System der Rechnungslegung im Allgemeinen und im Speziellen mit Blick auf Finanzinstrumente eine Detailtiefe angenommen, die man so bisher unter HGB nicht kannte. Zielsetzung des Buches ist es daher, einen Leitfaden an die Hand zu geben, mit dem sich Praktiker in Kreditinstituten und Nicht-Kreditinstituten (u.a. Mittelstand, Kommunen, Stadtwerke) in der komplexen Welt der Rechnungslegung orientieren können, um so zu verstehen, wie sich Finanzinstrumente-Transaktionen auf Bilanz, GuV und Geschäftsbericht auswirken.
Publikation von Umweltdaten
(2010)
On an Integration of an Information Security Management System into an Enterprise Architecture
(2010)
In this contribution, we describe the activities and promotion programs installed at the Bonn-Rhein-Sieg University as an institution and at the Department of Computer Science respectively for increasing the total number of computer science students and in particular the female rate. We report about our experiences in addressing gender aspects in education and try to evaluate the outcome of our programs with respect to our equal rights for women strategy. We propose a closer look at mental self-theories enabled by E-portfolios to address also gender issues in Computer Science. Moreover, reasons are identified and discussed which may be responsible for the reduced interest in particular of female young adults to choose a computer science study program.