Refine
Departments, institutes and facilities
- Fachbereich Wirtschaftswissenschaften (1241)
- Fachbereich Informatik (1148)
- Fachbereich Angewandte Naturwissenschaften (766)
- Fachbereich Ingenieurwissenschaften und Kommunikation (636)
- Institut für funktionale Gen-Analytik (IFGA) (584)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (485)
- Präsidium (404)
- Fachbereich Sozialpolitik und Soziale Sicherung (402)
- Institute of Visual Computing (IVC) (313)
- Institut für Cyber Security & Privacy (ICSP) (307)
Document Type
- Article (2431)
- Conference Object (1806)
- Part of a Book (942)
- Book (monograph, edited volume) (452)
- Part of Periodical (411)
- Report (201)
- Contribution to a Periodical (118)
- Doctoral Thesis (106)
- Working Paper (94)
- Preprint (90)
Year of publication
Keywords
- Lehrbuch (88)
- Deutschland (34)
- Nachhaltigkeit (30)
- Controlling (25)
- Unternehmen (25)
- Management (20)
- Corporate Social Responsibility (18)
- Betriebswirtschaftslehre (17)
- Digitalisierung (17)
- Machine Learning (17)
Treatment options for acute myeloid leukemia (AML) remain extremely limited and associated with significant toxicity. Nicotinamide phosphoribosyltransferase (NAMPT) is involved in the generation of NAD+ and a potential therapeutic target in AML. We evaluated the effect of KPT-9274, a p21-activated kinase 4/NAMPT inhibitor that possesses a unique NAMPT-binding profile based on in silico modeling compared with earlier compounds pursued against this target. KPT-9274 elicited loss of mitochondrial respiration and glycolysis and induced apoptosis in AML subtypes independent of mutations and genomic abnormalities. These actions occurred mainly through the depletion of NAD+, whereas genetic knockdown of p21-activated kinase 4 did not induce cytotoxicity in AML cell lines or influence the cytotoxic effect of KPT-9274. KPT-9274 exposure reduced colony formation, increased blast differentiation, and diminished the frequency of leukemia-initiating cells from primary AML samples; KPT-9274 was minimally cytotoxic toward normal hematopoietic or immune cells. In addition, KPT-9274 improved overall survival in vivo in 2 different mouse models of AML and reduced tumor development in a patient-derived xenograft model of AML. Overall, KPT-9274 exhibited broad preclinical activity across a variety of AML subtypes and warrants further investigation as a potential therapeutic agent for AML.
In recent years, the ability of intelligent systems to be understood by developers and users has received growing attention. This holds in particular for social robots, which are supposed to act autonomously in the vicinity of human users and are known to raise peculiar, often unrealistic attributions and expectations. However, explainable models that, on the one hand, allow a robot to generate lively and autonomous behavior and, on the other, enable it to provide human-compatible explanations for this behavior are missing. In order to develop such a self-explaining autonomous social robot, we have equipped a robot with own needs that autonomously trigger intentions and proactive behavior, and form the basis for understandable self-explanations. Previous research has shown that undesirable robot behavior is rated more positively after receiving an explanation. We thus aim to equip a social robot with the capability to automatically generate verbal explanations of its own behavior, by tracing its internal decision-making routes. The goal is to generate social robot behavior in a way that is generally interpretable, and therefore explainable on a socio-behavioral level increasing users' understanding of the robot's behavior. In this article, we present a social robot interaction architecture, designed to autonomously generate social behavior and self-explanations. We set out requirements for explainable behavior generation architectures and propose a socio-interactive framework for behavior explanations in social human-robot interactions that enables explaining and elaborating according to users' needs for explanation that emerge within an interaction. Consequently, we introduce an interactive explanation dialog flow concept that incorporates empirically validated explanation types. These concepts are realized within the interaction architecture of a social robot, and integrated with its dialog processing modules. We present the components of this interaction architecture and explain their integration to autonomously generate social behaviors as well as verbal self-explanations. Lastly, we report results from a qualitative evaluation of a working prototype in a laboratory setting, showing that (1) the robot is able to autonomously generate naturalistic social behavior, and (2) the robot is able to verbally self-explain its behavior to the user in line with users' requests.
In general, mathematics plays a central role in our lives because today mathematics regulates our everyday life with techniques, technologies and procedures, for example coding techniques for credit cards or the drafting of curves and surfaces for construction procedures [5]. Obviously, mathematics continues to be an important element of engineering education and it still represents a major obstacle for the students. Lacking the knowledge of several topics, changing learning behavior and inadequate overall conditions at universities for the repetition of school mathematics were mentioned to be causes for the constantly increasing gap between the initial level of mathematics at university and the prior knowledge of the first semester students [2].
Self-supervised learning has proved to be a powerful approach to learn image representations without the need of large labeled datasets. For underwater robotics, it is of great interest to design computer vision algorithms to improve perception capabilities such as sonar image classification. Due to the confidential nature of sonar imaging and the difficulty to interpret sonar images, it is challenging to create public large labeled sonar datasets to train supervised learning algorithms. In this work, we investigate the potential of three self-supervised learning methods (RotNet, Denoising Autoencoders, and Jigsaw) to learn high-quality sonar image representation without the need of human labels. We present pre-training and transfer learning results on real-life sonar image datasets. Our results indicate that self-supervised pre-training yields classification performance comparable to supervised pre-training in a few-shot transfer learning setup across all three methods. Code and self-supervised pre-trained models are be available at https://github.com/agrija9/ssl-sonar-images
TinyECC 2.0 is an open source library for Elliptic Curve Cryptography (ECC) in wireless sensor networks. This paper analyzes the side channel susceptibility of TinyECC 2.0 on a LOTUS sensor node platform. In our work we measured the electromagnetic (EM) emanation during computation of the scalar multiplication using 56 different configurations of TinyECC 2.0. All of them were found to be vulnerable, but to a different degree. The different degrees of leakage include adversary success using (i) Simple EM Analysis (SEMA) with a single measurement, (ii) SEMA using averaging, and (iii) Multiple-Exponent Single-Data (MESD) with a single measurement of the secret scalar. It is extremely critical that in 30 TinyECC 2.0 configurations a single EM measurement of an ECC private key operation is sufficient to simply read out the secret scalar. MESD requires additional adversary capabilities and it affects all TinyECC 2.0 configurations, again with only a single measurement of the ECC private key operation. These findings give evidence that in security applications a configuration of TinyECC 2.0 should be chosen that withstands SEMA with a single measurement and, beyond that, an addition of appropriate randomizing countermeasures is necessary.
Semantic Image Segmentation Combining Visible and Near-Infrared Channels with Depth Information
(2015)
Image understanding is a vital task in computer vision that has many applications in areas such as robotics, surveillance and the automobile industry. An important precondition for image understanding is semantic image segmentation, i.e. the correct labeling of every image pixel with its corresponding object name or class. This thesis proposes a machine learning approach for semantic image segmentation that uses images from a multi-modal camera rig. It demonstrates that semantic segmentation can be improved by combining different image types as inputs to a convolutional neural network (CNN), when compared to a single-image approach. In this work a multi-channel near-infrared (NIR) image, an RGB image and a depth map are used. The detection of people is further improved by using a skin image that indicates the presence of human skin in the scene and is computed based on NIR information. It is also shown that segmentation accuracy can be enhanced by using a class voting method based on a superpixel pre-segmentation. Models are trained for 10-class, 3-class and binary classification tasks using an original dataset. Compared to the NIR-only approach, average class accuracy is increased by 7% for 10-class, and by 22% for 3-class classification, reaching a total of 48% and 70% accuracy, respectively. The binary classification task, which focuses on the detection of people, achieves a classification accuracy of 95% and true positive rate of 66%. The report at hand describes the proposed approach and the encountered challenges and shows that a CNN can successfully learn and combine features from multi-modal image sets and use them to predict scene labeling.
Traffic simulations are generally used to forecast traffic behavior or to simulate non-player characters in computer games and virual environments. These systems are usually modeled in such a way that traffic rules are strictly followed. However, rule violations are a common part of real-life traffic and thus should be integrated into such models.
The topic of this PhD project is in the context of cross-reality, a term that defines mixed reality environments that tunnel dense real-world data acquired through the use of sensor/actuator device networks into virtual worlds. It is part of the ongoing academia and industry efforts to achieve interoperability between virtual and real devices and services.
Für die Durchführung größerer Projekte innerhalb des DLR ist es häufig notwendig, dass sich Wissenschaftler fachübergreifend in Themengebiete einarbeiten müssen. Im Rahmen dieser Einarbeitung führen Wissenschaftler Recherchen in fremden Fachbereichen durch. Das DLR hat zu diesem Zweck das Wissensportal KnowledgeFinder entwickelt. Dieses Framework setzt klassische Suchverfahren zum Auffinden von Informationen in beliebigen Datenbeständen ein. Wenn Wissenschaftler in fremden Fachbereichen recherchieren, dann fällt es ihnen aufgrund des oberflächlichen Einblicks oftmals schwer, zielgerichtet nach Informationen zu suchen. Die im KnowledgeFinder eingesetzten klassischen Suchverfahren, die auf textueller und struktureller Ähnlichkeit basieren, können bei diesen unspezifischen Suchanfragen nur bedingt beim Auffinden von relevanten Informationen helfen. Aufgrund von Mehrdeutigkeiten und unterschiedlichen Kontexten stoße solche Verfahren oftmals an ihre Grenzen. Semantische Technologien haben zum Ziel diesen Mangel zu beheben. Hier wird neben der textuellen und strukturellen Ähnlichkeit zusätzlich die Dimension der Bedeutung betrachtet. In dieser Masterthesis wurde untersucht, ob die Suchergebnisqualität des KnowledgeFinder durch den Einsatz semantischer Technologien verbessert werden kann. Innerhalb einer Machbarkeitsstudie wurde dazu das KnowledgeFinder Framework um semantische Suchverfahren erweitert. Diese Verfahren sollen die fachübergreifende Recherche von DLR-Wissenschaftlern erleichtern, indem sie ihnen helfen, passende Suchergebnisse in den entsprechenden Fachbereichen zu finden.
Die vorliegende Arbeit beschäftigt sich mit der numerischen Behandlung Differential-Algebraischer Gleichungen (DAE" s). DAE" s treten beispielsweise bei der Modellierung der Dynamik mechanischer System, der Schaltkreissimulation sowie der chemischen Reaktionskinetik auf. Es werden Rosenbrock-Wanner ähnliche Verfahren zu deren Lösung hergeleitet und an technischen Modellen (Fahrzeugachse und Verstärker) getestet.
This work thoroughly investigates a semi-Lagrangian lattice Boltzmann (SLLBM) solver for compressible flows. In contrast to other LBM for compressible flows, the vertices are organized in cells, and interpolation polynomials up to fourth order are used to attain the off-vertex distribution function values. Differing from the recently introduced Particles on Demand (PoD) method , the method operates in a static, non-moving reference frame. Yet the SLLBM in the present formulation grants supersonic flows and exhibits a high degree of Galilean invariance. The SLLBM solver allows for an independent time step size due to the integration along characteristics and for the use of unusual velocity sets, like the D2Q25, which is constructed by the roots of the fifth-order Hermite polynomial. The properties of the present model are shown in diverse example simulations of a two-dimensional Taylor-Green vortex, a Sod shock tube, a two-dimensional Riemann problem and a shock-vortex interaction. It is shown that the cell-based interpolation and the use of Gauss-Lobatto-Chebyshev support points allow for spatially high-order solutions and minimize the mass loss caused by the interpolation. Transformed grids in the shock-vortex interaction show the general applicability to non-uniform grids.
This work introduces a semi-Lagrangian lattice Boltzmann (SLLBM) solver for compressible flows (with or without discontinuities). It makes use of a cell-wise representation of the simulation domain and utilizes interpolation polynomials up to fourth order to conduct the streaming step. The SLLBM solver allows for an independent time step size due to the absence of a time integrator and for the use of unusual velocity sets, like a D2Q25, which is constructed by the roots of the fifth-order Hermite polynomial. The properties of the proposed model are shown in diverse example simulations of a Sod shock tube, a two-dimensional Riemann problem and a shock-vortex interaction. It is shown that the cell-based interpolation and the use of Gauss-Lobatto-Chebyshev support points allow for spatially high-order solutions and minimize the mass loss caused by the interpolation. Transformed grids in the shock-vortex interaction show the general applicability to non-uniform grids.
The article improves understanding on leveraging new technology for DT (digital transformation) of grape harvest in SME wineries. It provides evidence on technologies used and workplace types deployed in grape harvesting, as well as strategic paths in deploying new technology, thereby contributing to the literature on networked sensing and seizing capabilities in the wine industry 4.0. The research approach is explorative and qualitative drawing on 31 interviews with wine industry 4.0 experts and managers, mostly owners of SMEs: wineries, wine software and wine machinery enterprises. Resulting findings serve as a roadmap for digital transformation of grape harvest process in SME wineries explaining technologies and work roles necessary for DWT (digital workplace transformation), as well as strategic paths of deployment of novel grape harvest technology. Previous research on the wine industry 4.0 has focused on BMI, while this research expands the focus to include a wider concept of technology adoption strategy as well as DWT. The research identifies two types of factors impacting the strategic deployment of grape harvest technology: pull factors, also termed servitization factors, as well as push factors, termed also digital transformation factors.
The article presents a solution to detect rotor position at stand still condition for all types of permanent magnet brushless dc motors. The solution provides both secure and fast method for starting of the brushless motor, that is independent on the sensorless control scheme used. Nonlinearities found in standard three phase permanent magnet dc motor are used to derive the rotor position at stand still. The described solution assumes that there is availability of the neutral point of the three phase star motor windings.
A precise characterization of substances is essential for the safe handling of explosives. One parameter regularly characterized is the impact sensitivity. This is typically determined using a drop hammer. However, the results can vary depending on the test method and even the operator, and it is not possible to distinguish the type of decomposition such as detonation and deflagration. This study monitors the reaction progress by constructing a drop hammer to measure the decomposition reaction of four different primary explosives (tetrazene, silver azide, lead azide, lead styphnate) in order to determine the reproducibility of this method. Additionally, further possible evaluation methods are explored to improve on the current binary statistical analysis. To determine whether classification was possible based on extracted features, the responses of equipped sensor arrays, which measure and monitor the reactions, were studied and evaluated. Features were extracted from this data and were evaluated using multivariate methods such as principal component analysis (PCA) and linear discriminant analysis (LDA). The results indicate that although the measurements show substance specific trends, they also show a large scatter for each substance. By reducing the dimensions of the extracted features, different sample clusters can be represented and the calculated loadings allow significant parameters to be determined for classification. The results also suggest that differentiation of different reaction mechanisms is feasible. Testing of the regressor function shows reliable results considering the comparatively small amount of data.
Sequencing Problems
(2024)
The overall goal of this paper is to contribute to the research on customer satisfaction at airports. Existing studies have focussed on airport service experience in America, Europe and Asia. Specifically it contributes to the development of the knowledge of service quality expectations at a major airport hub in Africa.
The exploratory study integrated elements of the 22 item SERVQUAL scale developed by Parasuraman et al., (1988). A quantitative research was conducted and responses from 280 departing international travellers at the Jomo Kenyatta International Airport was used to test five hypotheses. An independent samples t-test was utilised to assess whether the means of two groups are statistically significant from one another. The variables to be tested were service performance against the respective service expectation. The findings indicate atmosphere related aspects of the airport experience showed a significant influence on the respondents’ customer satisfaction. The feeling of being safe in the airport, ease of way finding, facilities for people with reduced mobility and the availability of leisure rooms were the most significant elements in the traveller’s positive experience while at the airport. The study was not without limitations. In utilising the gap analysis model, this study focused on understanding what the customers want. Other elements of the gap analysis model require further illumination. The findings of this study will help contribute to the development of a conceptual model for a much more exhaustive study on airport passenger satisfaction at other Kenyan airports and internationally.
Service Security Revisited
(2014)
The title of the annual report 2013 "Shaping change: The University Addresses Society‘s Probing Challenges" reveals the great importance placed on social, economic and technological changes at the university.
This key aspect thus runs through the contents of the 90-page annual report like a common thread, without losing track of the enormous variety of research and teaching at Bonn-Rhein-Sieg University. Whether the exploration of gaps in robot safety during a European Intensive Programme, a report about the Philipines crisis region from a graduate who has worked as an organizer for Care International, or the chapter "What does change look like?" – The annual report provides the full spectrum of opportunities, activities and findings of university members.
Shared Autonomous Vehicles: Potentials for a Sustainable Mobility and Risks of Unintended Effects
(2018)
Automated and connected cars could significantly reduce congestion and emissions through a more efficient flow of traffic and a reduction in the number of vehicles. An increase in demand for driving with autonomous vehicles is also conceivable due to higher comfort and improved quality of time using driverless cars. So far, empirical evidence supporting this hypothesis is missing. To analyze the influence of autonomous driving on mobility behavior and to uncover user preferences, which serve as an indicator for future travel mode choices, we conducted an online survey with a paired comparison of current and future travel modes with 302 German participants. The results do not confirm the hypothesis that ownership will become an outdated model in the future. Instead they suggest that private cars, whether traditional or fully automated, will remain the preferred travel mode. At the same time, carsharing will benefit from full automation more than private cars. However, findings indicate that the growth of carsharing will mainly be at the expense of public transport, showing that more effort should be placed in making public transportation more attractive if sustainable mobility is to be developed.
Viele Bereiche des Wirtschaftslebens werden heute durch die Digitalisierung beeinflusst. Sowohl auf Grundlage neuer technischer Möglichkeiten und der damit einhergehenden Vernetzung, als auch mit einem Wandel im Konsumverhalten hat sich die Sharing Economy entwickelt. Auf dem Gebiet der urbanen Mobilität ergibt sich für Anbieter und Nachfrager eine Vielzahl neuer Möglichkeiten im Rahmen der Sharing Economy. Die Arbeit setzt sich sowohl mit den aktuellen Mobilitätstrends, als auch mit dem Wandel im Konsumverhalten auseinander. Im Fokus steht hierbei das Ridesourcing, also die entgeltlichen Personenbeförderung von privaten Fahrern mit eigenem Fahrzeug, bei der der Fahrgast das Fahrziel bestimmt und die Vorteile die ein Markteintritt dieser Anbieter mit sich bringt.
Sharpening the Educational Toolset - Promoting Professional Development of University Lecturers
(2016)
Companies investing in the occupied Palestinian territories are faced with a dilemma. Undoubtedly, the creation of jobs helps to put young Palestinians to work. Experience shows that especially young males are less likely to radicalise and commit crimes when having an occupation. However, negative press coverage due to the disputed status of the territory can force companies to withdraw. CSR activities can help to demonstrate that a company has a genuine interest in its employees and community at large. Our article looks into one particular case of an Israeli company that had to withdraw their operation due to public pressure, mainly Western media. We give recommendations how such failure could have been avoided by using the right kind of CSR activities that address the needs of the Palestinians.
The utilization of simulation procedures is gaining increasing attention in the product development of extrusion blow molded parts. However, some simulation steps, like the simulation of shrinkage and warpage, are still associated with uncertainties. The reason for this is on the one hand a lack of standardized interfaces for the transfer of simulation data between different simulation tools, and on the other hand the complex time-, temperature- and process-dependent material behavior of the used semi crystalline polymers. Using a new vendor neutral interface standard for the data transfer, the shrinkage analysis of a simple blow molded part is investigated and compared to experimental data. A linear viscoelastic material model in combination with an orthotropic process- and temperature-dependent thermal expansion coefficient is used for the shrinkage prediction. A good agreement is observed. Finally, critical parameters in the simulation models that strongly influence the shrinkage analysis are identified by a sensitivity study.
Dieser Beitrag betrachtet den Stand der Entwicklung bei der Vernetzung von Fahrzeugen aus Sicht der IT-Sicherheit. Etablierte Kommunikationssysteme und Verkehrstelematikanwendungen im Automobil werden ebenso vorgestellt und diskutiert wie auch zukünftige Kommunikationstechnologien Car-2-Car und Car-2-X. IT-Sicherheit im Automobil ist ein schwieriges Feld, da es hier um eine Integration von neuen innovativen Anwendungen in eine hochkomplexe bestehende Fahrzeugarchitektur geht, die zu keinen neuen Gefährdungen für die Fahrzeuginsassen führen darf. Zudem bleibt die Funktionsweise dieser Anwendungen mit ihren Auswirkungen auf das informationelle Selbstbestimmungsrecht oft intransparent. Die abschließende Diskussion gibt Handlungsempfehlungen aus Sicht der Verbraucher.
Sicherheit im Fährverkehr
(2012)
Fast täglich werden neue Angriffe auf IT-Systeme bekannt, bei denen sensible Daten entwendet werden. Das vorliegende Buch vermittelt die wesentlichen Grundlagen und Technologien, die zur Absicherung von Computernetzwerken benötigt werden. Stets legen die Autoren dabei Wert auf eine verständliche Darstellung, die – soweit möglich – auf abstrakte Modelle und formalen Notationen verzichtet. Zu jedem Kapitel werden Aufgaben zur Kontrolle von Wissensstand und Verständnis angeboten.
Verschiedene intelligente Heimautomatisierungsgeräte wie Lampen, Schlösser und Thermostate verbreiten sich rasant im privaten Umfeld. Ein typisches Kommunikationsprotokoll für diese Geräteklasse ist Bluetooth Low Energy (BLE). In dieser Arbeit wird eine strukturierte Sicherheitsanalyse für BLE vorgestellt. Die beschriebene Vorgehensweise kategorisiert bekannte Angriffsvektoren und beschreibt einen möglichen Aufbau für eine Analyse. Im Zuge dieser Arbeit wurden einige sicherheitsrelevante Probleme aufgedeckt, die es Angreifern ermöglichen die Geräte vollständig zu übernehmen. Es zeigte sich, dass im Standard vorgesehene Sicherheitsfunktionen wie Verschlüsselung und Integritätsprüfungen häufig gar nicht oder fehlerhaft implementiert sind.
Unternehmen im Maschinenbau realisieren Sicherheitsfunktionen immer mehr durch die Anwendungsprogrammierung von sicherheitsgerichteten Steuerungen. Die aktuellen Normen DIN EN ISO 13849 und DIN EN 62061 definieren erstmals auch Anforderungen an die Softwareentwicklung von Sicherheitsfunktionen. Dadurch sollen gefährliche systematische Fehler in der sicherheitsbezogenen Anwendungssoftware für eine Maschine vermieden werden. Wesentliche Anforderung dieser Normen ist, einen strukturierten Entwicklungsprozess einzuhalten: das V-Modell. Auch die weiteren Anforderungen zu fehlervermeidenden und -beherrschenden Maßnahmen bei der Entwicklung sind in den Normen wie üblich sehr allgemein gehalten. Zudem gibt es bislang wenige publizierte Beispiele und Vorschläge für die Umsetzung dieser Anforderungen. Daher ist die Interpretation der Normen bei der Softwareentwicklung im Maschinenbau oft unklar und bereitet Schwierigkeiten in der Umsetzung. Dies war der Anlass für ein von der DGUV gefördertes und an der Hochschule Bonn-Rhein-Sieg durchgeführtes Projekt (FF-FP0319, Laufzeit 2011 bis 2013). In dem Projekt wurde gemeinsam mit regionalen Maschinenbauunternehmen eine praktisch anwendbare Entwicklungsmethode – die Matrixmethode des IFA – hergeleitet und in einem Forschungsbericht mit vielen Beispielen dokumentiert. Dieser Forschungsbericht bildet den Kern des vorliegenden IFA Reports. Mit der hier dargestellten Matrixmethode des IFA kann Anwendungssoftware von Sicherheitsfunktionen normgerecht spezifiziert, validiert und dokumentiert werden. Darüber hinaus vermittelt der Report weitere Informationen rund um Anwendungsprogrammierung für sicherheitsbezogene Maschinensteuerungen. Der Aufwand für die Anwendungsprogrammierung ist bei Standardsteuerungen typischerweise höher als für zertifizierte Sicherheitssteuerungen. Daher beziehen sich mehrere Kapitel des Reports auf die Anwendung von Standardsteuerungen. Zur effizienten Anwendung der Matrixmethode entwickelt das IFA ein Softwaretool namens SOFTEMA. Die Beispiele des Reports sind zum Download verfügbar und können mit SOFTEMA betrachtet werden.
Die Erfindung befasst sich mit einer Sicherheitsvorrichtung zur Verhinderung von Unfällen mit Personenschäden durch Maschinen, die ein Flächenelement enthält, welches auf der Oberfläche des Bereichs des Roboters, innerhalb dessen ein Unfall verhindert werden soll, durch ein Gelenk beweglich angeordnet ist. Des Weiteren weist die Sicherheitsvorrichtung Sensoren auf, die unter dem Flächenelement angeordnet sind und die Verkippung des Flächenelements erfassen.
Sicherung des Jugend- und Spielerschutzes innerhalb des gewerblichen Geldspiels in Deutschland - 2.0
(2017)
Eine wissenschaftliche Analyse zur Zertifizierung des gewerblichen Geldspiels in Deutschland. Die Basis bildet die international und interdisziplinär validierte wissenschaftliche Expertise "Safeguarding the Protection of Minors and Players with Respect to Commercial Gambling in Germany - 2.0". Ziel ist die Qualitätssicherung für einen verantwortlichen Umgang mit Glücks- und Gewinnspielangeboten (Responsible Gaming). Dazu wird ein Prüfkatalog für das gewerbliche Geldspiel in Spielhallen und in Gaststätten vorgestellt und durch Musterformulare unterstützt. Dieses Zertifizierungsverfahren kann auch im internationalen Kontext Impulse geben und gegebenenfalls einen Standard setzen, auch zur Regulierung nicht-regulierter Glücks- und Gewinnspielangebote.
Sicherung des Jugend- und Spielerschutzes innerhalb des gewerblichen Geldspiels in Deutschland – 2.1
(2019)
Ein zentrales, gleichrangiges Ziel des Glücksspielstaatsvertrags (GlüStV) ist "den Jugend- und den Spielerschutz zu gewährleisten" (§ 1 Satz 1 Nr. 3 GlüStV). Seit 2014 werden Spielangebote des gewerblichen Geldspiels in Spielhallen und Gaststätten in Deutschland von staatlich akkreditierten Gesellschaften des Technischen Überwachungsvereins (TÜV) hinsichtlich der Einhaltung rechtlicher Pflichten und wissenschaftlicher Gebote zur Gewährleistung des Jugend- und Spielerschutzes individuell geprüft und bei Erfolg sichtbar zertifiziert. Eine solche Zertifizierung kann dazu beitragen, den Jugend- und den Spielerschutz gemäß § 1 Satz 1 Nr. 3 GlüStV und dessen Vollzug in hohem Maße zu gewährleisten.
A way of combining a relatively new sensor-technology, that is optical analog VLSI devices, with a standard digital omni-directional vision system is investigated. The sensor used is a neuromorphic analog VLSI sensor that estimates the global visual image motion. The sensor provides two analog output voltages that represent the components of the global optical flow vector. The readout is guided by an omni-directional mirror that maps the location of the ball and directs the robot to align its position so that a sensor-actuator module that includes the analog VLSI optical flow sensor can be activated. The purpose of the sensor-actuator module is to operate with a higher update rate than the standard vision system and thus increase the reactivity of the robot for very specific situations. This paper will demonstrate an application example where the robot is a goalkeeper with the task of defending the goal during a penalty kick.
In dieser Arbeit wird eine Methode zur Darstellung und Generierung von natürlich wirkendem Bewuchs auf besonders großen Arealen und unter Berücksichtigung ökologischer Faktoren vorgestellt. Die Generierung und Visualisierung von Bewuchs ist aufgrund der Komplexität biologischer Systeme und des Detailreichtums von Pflanzenmodellen ein herausforderndes Gebiet der Computergrafik und ermöglicht es, den Realismus von Landschaftsvisualisierungen erheblich zu steigern. Aufbauend auf [DMS06] wird bei Silva der Bewuchs so generiert, dass die zur Darstellung benötigten Wang-Kacheln und die mit ihnen assoziierten Teilverteilungen wiederverwendet werden können. Dazu wird ein Verfahren vorgestellt, um Poisson Disk Verteilungen mit variablen Radien auf nahtlosen Wang-Kachelmengen ohne rechenintensive globale Optimierung zu erzeugen. Durch die Einbeziehung von Nachbarschaften und frei konfigurierbaren Generierungspipelines können beliebige abiotische und biotische Faktoren bei der Bewuchsgenerierung berücksichtigt werden. Die durch Silva auf Wang-Kacheln erzeugten Pflanzenverteilungen ermöglichen, die darauf aufgebauten beschleunigenden Datenstrukturen bei der Visualisierung wieder zu verwenden. Durch Multi-Level Instancing und eine Schachtelung von Kd-Bäumen ist eine Visualisierung von großen bewachsenen Arealen mit geringen Renderzeiten und geringem Memoryfootprint von Hunderten Quadratkilometern Größe möglich.
Modern engineering relies heavily on utilizing computer technologies. This is especially true for thermoplastic manufacturing, such as blow molding. A crucial milestone for digitalization is the continuous integration of data in unified or interoperable systems. While new simulation technologies are constantly developed, data management standards such as STEP fail at integrating them. On the other hand, industrial standards such as ”VMAP” manage to improve interoperability for Small and Medium-sized Enterprises. However, they do not provide Simulation Process and Data Management (SPDM) technologies. For SPDM integration of VMAP data, Ontology-Based Data Access is used to allow continuing the digital thread in custom semantic-based open-source solutions. An ontology of the database format (VMAP) was generated alongside an expandable knowledge graph of data access methods. A Python-based software architecture was developed, automatically using the semantic representations of database format and data access to query data and metadata within the VMAP file. The result is a software architecture template that can be adapted for other data standards and integrated into semantic data management systems. It allows semantic queries on simulation data down to element-wise resolution without integrating the whole model information. The architecture can instantiate a file in a knowledge graph, query a file’s metadatum and, in case it is not yet available, find a semantically represented process that allows the creation and instantiation of the required metadatum. See Figure 1. The results of this thesis can be expected to form a basis for semantic SPDM tools.
Bond graph software can simulate bond graph models without the user needing to manually derive equations. This offers the power to model larger and more complex systems than in the past. Multibond graphs (those with vector bonds) offer a compact model which further eases handling multibody systems. Although multibond graphs can be simulated successfully, the use of vector bonds can present difficulties. In addition, most qualitative, bond graph–based exploitation relies on the use of scalar bonds. This article discusses the main methods for simulating bond graphs of multibody systems, using a graphical software platform. The transformation between models with vector and scalar bonds is presented. The methods are then compared with respect to both time and accuracy, through simulation of two benchmark models. This article is a tutorial on the existing methods for simulating three-dimensional rigid and holonomic multibody systems using bond graphs and discusses the difficulties encountered. It then proposes and adapts methods for simulating this type of system directly from its bond graph within a software package. The value of this study is in giving practical guidance to modellers, so that they can implement the adapted method in software.
The transport of carbon dioxide through pipelines is one of the important components of Carbon dioxide Capture and Storage (CCS) systems that are currently being developed. If high flow rates are desired a transportation in the liquid or supercritical phase is to be preferred. For technical reasons, the transport must stay in that phase, without transitioning to the gaseous state. In this paper, a numerical simulation of the stationary process of carbon dioxide transport with impurities and phase transitions is considered. We use the Homogeneous Equilibrium Model (HEM) and the GERG-2008 thermodynamic equation of state to describe the transport parameters. The algorithms used allow to solve scenarios of carbon dioxide transport in the liquid or supercritical phase, with the detection of approaching the phase transition region. Convergence of the solution algorithms is analyzed in connection with fast and abrupt changes of the equation of state and the enthalpy function in the region of phase transitions.
Simulation of thermal behavior during friction stir welding process for predicting residual stresses
(2014)
Simultaneous detection of cyanide and heavy metals for environmental analysis by means of µISEs
(2010)
Simultaneous determination of selected catechins and pyrogallol in deer intoxications by HPLC-MS/MS
(2021)
Simultaneous multifrequency radio observations of the Galactic Centre magnetar SGR J1745-2900
(2015)
Sind kleinere und mittlere Unternehmen (KMU) bereits auf die Digitale Transformation vorbereitet?
(2018)
Eine von den Autoren durchgeführte Untersuchung konnte deutliche Indizien dafür ausmachen, dass viele kleinere und mittlere Unternehmen (KMU) aktuell noch keine ausreichende Reife zur Digitalen Transformation haben. Zur Lösung des Problems wird vorgeschlagen, ein agiles IT-Management-Konzept zu entwickeln, um den IT-Bereich dynamisch und ohne formalen Ballast des klassischen IT-Managements zu steuern.
Damit nachhaltiger Konsum möglich ist, müssen Verbraucherinnen und Verbraucher die Nachhaltigkeit von Produkten angemessen einschätzen können. Ausgehend von der Annahme, dass Greenwashing-Slogans solche Einschätzungen möglicherweise behindern, untersucht dieses zweiteilige quantitative Online-Experiment Schlussfolgerungen von Verbraucherinnen und Verbrauchern, die statische Werbeanzeigen betrachteten. Dabei wurden konkrete, d.h. quantifizierte Umweltaussagen mit vagen Botschaften (Greenwashing-Kondition) bezüglich eines fiktiven TV-Produktes bzw. TV-Herstellers verglichen. Ein Drittel der jungen und gebildeten Stichprobe (N = 163) zog nach Ansicht einer Produktanzeige, die den geringen Stromverbrauch des „Omro UHD-Fernsehers“ bewarb, den Schluss, dass weitere, in der Werbung nicht beobachtbare Umweltmerkmale eher wahrscheinlich als unwahrscheinlich sind. Unternehmensanzeigen zur Energieeffizienz der Produktion von „Nextvision“ entlockten diese Schlussfolgerung sogar 73 Prozent der Probanden. Vage und konkrete Behauptungen unterschieden sich hinsichtlich dieser sog. Halo-Effekte kaum. Dazu berechnete Indizes korrelierten signifikant positiv mit der eingeschätzten Produktqualität, was für die Wirksamkeit eines Gesamteindruckes (General Impression Halos) spricht. Dies galt insbesondere für vage Botschaften. Sie eignen sich daher besonders für Werbetreibende, weil Anzeigen in der Regel nur für kurze Zeit Aufmerksamkeit erhalten. Verbraucherinnen und Verbrauchern kann auf Basis der Ergebnisse geraten werden, stärker auf die theoretische Überprüfbarkeit von Werbeslogans zu achten.
This contribution presents an easy to implement 3D tracking approach that works with a single standard webcam. We describe the algorithm and show that it is well suited for being used as an intuitive interaction method in 3D video games. The algorithm can detect and distinguish multiple objects in real-time and obtain their orientation and position relative to the camera. The trackable objects are equipped with planar patterns of five visual markers. By tracking (stereo) glasses worn by the user and adjusting the in-game camera's viewing frustum accordingly, the well-known immersive "screen as a window" effect can be achieved, even without the use of any special tracking equipment.