Refine
H-BRS Bibliography
- no (1295) (remove)
Departments, institutes and facilities
Document Type
- Article (628)
- Conference Object (508)
- Part of a Book (59)
- Report (22)
- Lecture (16)
- Book (monograph, edited volume) (14)
- Doctoral Thesis (12)
- Patent (7)
- Conference Proceedings (6)
- Master's Thesis (6)
Year of publication
Language
- English (1295) (remove)
Keywords
- ENaC (9)
- Entrepreneurship (7)
- Malus domestica (7)
- Culture (6)
- E-Learning (6)
- apoptosis (6)
- sustainability (6)
- Mal d 1 (5)
- OER (5)
- Cloud (4)
„from stable to table“
(2008)
XML Encryption and XML Signature are fundamental security standards forming the core for many applications which require to process XML-based data. Due to the increased usage of XML in distributed systems and platforms such as in SOA and Cloud settings, the demand for robust and effective security mechanisms increased as well. Recent research work discovered, however, substantial vulnerabilities in these standards as well as in the vast majority of the available implementations. Amongst them, the so-called XML Signature Wrapping attack belongs to the most relevant ones. With the many possible instances of this attack type, it is feasible to annul security systems relying on XML Signature and to gain access to protected resources as has been successfully demonstrated lately for various Cloud infrastructures and services. This paper contributes a comprehensive approach to robust and effective XML Signatures for SOAP-based Web Services. An architecture is proposed, which integrates the r equired enhancements to ensure a fail-safe and robust signature generation and verification. Following this architecture, a hardened XML Signature library has been implemented. The obtained evaluation results show that the developed concept and library provide the targeted robustness against all kinds of known XML Signature Wrapping attacks. Furthermore the empirical results underline, that these security merits are obtained at low efficiency and performance costs as well as remain compliant with the underlying standards.
This paper describes a codesign environment based on the WWW (World Wide Web) and its implementation. Tool invocations and their respective results are linked using hypertext documents. We show how to configure a WWW browser for spawning design tools and how frequent tasks like documentation generation and retrieval are facilitated. The design flow can be adopted to the given application very easily. In addition we introduce the concept of a work flow called ‘design by documentation’. A WWW link to the results is given and experience using it in a codesign project is described.
Routing Attacks are a serious threat to communication in tactical MANETs. TOGBAD is a centralised approach, using topology graphs to detect such attacks. In this paper, we present TOGBAD's newly added wormhole detection capability. It is an adaptation of a wormhole detection method developed by Hu et al. This method is based on nodes' positions. We adapted it to the specific properties of tactical environments. Furthermore, we present simulation results which show TOGBAD's performance regarding the detection of wormhole attacks.
The ability to breathe air represents a fundamental step in vertebrate evolution that was accompanied by several anatomical and physiological adaptations. The morphology of the air-blood barrier is highly conserved within air-breathing vertebrates. It is formed by three different plies, which are represented by the alveolar epithelium, the basal lamina, and the endothelial layer. Besides these conserved morphological elements, another common feature of vertebrate lungs is that they contain a certain amount of fluid that covers the alveolar epithelium. The volume and composition of the alveolar fluid is regulated by transepithelial ion transport mechanisms expressed in alveolar epithelial cells. These transport mechanisms have been reviewed extensively. Therefore, the present review focuses on the properties and functional significance of the alveolar fluid. How does the fluid enter the alveoli? What is the fate of the fluid in the alveoli? What is the function of the alveolar fluid in the lungs? The review highlights the importance of the alveolar fluid, its volume and its composition. Maintenance of the fluid volume and composition within certain limits is critical to facilitate gas exchange. We propose that the alveolar fluid is an essential element of the air-blood barrier. Therefore, it is appropriate to refer to this barrier as being formed by four plies, namely (1) the thin fluid layer covering the apical membrane of the epithelial cells, (2) the epithelial cell layer, (3) the basal membrane, and (4) the endothelial cells.
In education, finding the appropriate learning pace that fits to the members of a large group is a challenging task. This becomes especially evident when teaching multidisciplinary subjects such as epidemiology in medicine or computer science in most study programs, since lecturers have to face a very heterogeneous state of previous knowledge. Approaching this issue requires an individual supervision of each and every student, which is obviously bounded by the available resources. Moreover, when referring back to the second example, writing computer programs requires a complex installation and configuration of development tools. Many beginning programmers already become stuck at this entry stage. This paper introduces WHELP, a Web-based Holistic E-Learning Platform, which provides an integrated environment enabling the learning and teaching of computer science topics without the need to install any software. Moreover, WHELP includes an interactive feedback system for each programming exercise, where lecturers or tutors can supply comments, improvements, code assistance or tips helping the students to accomplish their tasks. Furthermore, WHELP offers a statistical analysis module as well as a real-time classroom polling system both promoting an overview of the state of knowledge of a course. In addition to that, WHELP enables collaborative working including code-sharing and peer-to-peer learning. This feature enables students to work on exercises simultaneously at distinct places. WHELP has been successfully deployed in the winter term 2013 at the Cologne University of Applied Sciences supporting the 120 students and 3 lecturers to learn and teach basic topics of computer science in an engineering study program.
This paper aspires to develop a deeper understanding of the sharing/collaborative/platform economy, and in particular of the technical mechanisms upon which the digital platforms supporting it are built. In surveying the research literature, the paper identifies a gap between studies from economical, social or socio-technical angles, and presentations of detailed technical solutions. Most cases study larger, ‘monotechnological’ platforms, rather than local platforms that lend components from several technologies. Almost no literature takes a design perspective. Rooted in Sharing & Caring, an EU COST Action (network), the paper presents work to systematically map out functionalities across domains of the sharing economy. The 145 technical mechanisms we collected illustrate how most platforms are depending on a limited number of functionalities that lack in terms of holding communities together. The paper points to the necessity of a better terminology and concludes by discussing challenges and opportunities for the design of future and more inclusive platforms.
Software development is a complex task. Merely focussing on functional requirements is not sufficient any more. Developers are responsible to take many non-functional requirements carefully into account. Security is amongst the most challenging, as getting it wrong will result in a large user-base being potentially at risk. A similar situation exists for administrators. Security defaults have been put into place here to encounter lacking security controls. As first attempts to establish security by default in software development are flourishing, the question on their usability for developers arises.
In this paper we study the effectiveness and efficiency of Content Security Policy (CSP) enforced as security default in a web framework. When deployed correctly, CSP is a valid protection mean in a defence-in-depth strategy against code injection attacks. In this paper we present a first qualitative laboratory study with 30 participants to discover how developers deal with CSP when deployed as security default. Our results emphasize that the deployment as security default has its benefits but requires careful consideration of a comprehensive information flow in order to improve and not weaken security. We provide first insights to inform research about aiding developers in the creation of secure web applications with usable security by default.
This article analyzes how humanitarian and/or development organizations acting as intermediaries between scientists and vulnerable populations aim to make environmental changes visible while trying to meet local needs and demands for sustainable livelihoods. Based on an in-depth organizational case study in Southern Thailand, the research analyses the use of visualization tools to foster environmental knowledge and literacy while supporting both policymaking as well as citizen engagement. Drawing on insights from sociology of organizations, the study discusses the organizational reasons for the use of visualization tools, outlining the underlying coercive, mimetic and normative pressures that facilitate their proliferation in the context of environmental communication. The results show that both the participatory approach as well as the use of audiovisual and digital tools to communicate project goals and results have become indispensable and institutionalized tools in the organizational field of humanitarian and development aid. In this context, organizations have become intermediaries and translators between ‘climate risk’ scientists and ‘at risk’ people, thus, facilitating environmental communication. The results show that questions of trust and ownership of ideas play an important role in the context of livelihood related projects linked to climate change adaptation. In this context, not only does the style and content of communication, but also the relationship between the parties who communicate, have an impact upon the success or failure of managing options in climate change adaptation.
The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR 2016), held between November 13-17, 2016 - Barcelona, Spain, continued the inaugural event considering the state-of-the-art technologies for information dissemination in vehicle-to-vehicle and vehicle-to-infrastructure and focusing on advances in vehicular systems, technologies and applications.
Introduction: Antimicrobial resistance (AMR) has emerged as one of the leading threats to public health. AMR possesses a multidimensional challenge that has social, economic, and environmental dimensions that encompass the food production system, influencing human and animal health. The One Health approach highlights the inextricable linkage and interdependence between the health of people, animals, agriculture, and the environment. Antibiotic use in any of these One Health areas can potentially impact the health of other areas. There is a dearth of evidence on AMR from the natural environment, such as the plant-based agriculture sector. Antibiotics, antibiotic-resistant bacteria (ARB), and related AMR genes (ARGs) are assumed to present in the natural environment and disseminate resistance to fresh produce/vegetables and thus to human health upon consumption. Therefore, this study aims to investigate the role of vegetables in the spread of AMR through an agroecosystem exploration from a One Health perspective in Ahmedabad, India.
Protocol: The present study will be executed in Ahmedabad, located in Gujarat state in the Western part of India, by adopting a mixed-method approach. First, a systematic review will be conducted to document the prevalence of ARB and ARGs on fresh produce in South Asia. Second, agriculture farmland surveys will be used to collect the general farming practices and the data on common vegetables consumed raw by the households in Ahmedabad. Third, vegetable and soil samples will be collected from the selected agriculture farms and analyzed for the presence or absence of ARB and ARGs using standard microbiological and molecular methods.
Discussion: The analysis will help to understand the spread of ARB/ARGs through the agroecosystem. This is anticipated to provide an insight into the current state of ARB/ARGs contamination of fresh produce/vegetables and will assist in identifying the relevant strategies for effectively controlling and preventing the spread of AMR.
This paper describes the development of a Pedelec controller whose performance level (PL) conforms to European standard on safety of machinery [9] and whose soft- ware is verified to conform to EPAC standard [6] by means of a software verification technique called model checking. In compliance with the standard [9] the hardware needs to implement the required properties corresponding to categories “C” and “D”. The latter is used if the breaks are not able to bring the velomobile with a broken motor controller to a full stop. Therefore the controller needs to implement a test unit, which verifies the functionality of the components and, in case of an emergency, shuts the whole hardware down to prevent injuries of the cyclist. The MTTFd can be measured through a failure graph, which is the result of a FMEA analysis, and can be used to proof that the Pedelec controller meets the regulations of the system specification. The analysis of the system in compliance with [9] usually treats the software as a black box thus ignoring its inner workings and validating its correctness by means of testing. In this paper we present a temporal logic specification according to [6], based on which the software for the Pedelec controller is implemented, and verify instead of only testing its functionality. By means of model checking [1] we proof that the software fulfills all requirements which are regulated by its specification.
UTRAN Internet Access
(1999)
Scientific or statistical research has long been the domain of dedicated programming languages such as R, SPSS or SAS. A few years other competitors entered the arena, among them Python with its powerful SciPy package. The following article introduces SciPy by applying a small subset of its functionality to a well-known dataset.
This paper gives necessary foundations to understand the mechanism of warning processing and summarizes the state of the art in warning development. That includes a description of tools, researchers use to work in this scientific field. In detail these are models that describes the human way of processing warnings and mental models. Both are presented detailed with relevant examples. The paper tells how these tools are connected and how they are used to improve the effectiveness of warnings.
While universities are mandated to teach, research and do community outreach, studies reveal that typical university communities live in relative isolation where research is more basic than applied. This study focused on; 1) determining how WWE could be fostered through linkages between universities and external agencies (communities, public and private sectors); 2) establishing how universities’ resources could be optimized to promote research and capacity building for WWE. The dimensions of WWE studied were; 1) Technical & Business Models; 2) Capacity building; and 3) institutional frameworks. Baseline studies were conducted in which qualitative and quantitative data was collected through questionnaires, interviews, documents analysis. Experimentations were carried out whereby Laboratory tests on Bio-methane Potential (BMP) for different biomass types was conducted. A complete chain of briquettes production and consumption has been successfully piloted at St Kizito High School in Namugongo, near Kampala. The 20,000 kg of briquettes produced (from municipal bio-waste) by students monthly are used to cook in three schools whose total population is 2000 students. With an average net profit of $ 3000, the project makes business sense even in absence of social-benefit accounting. Based on start-up capital of $ 12,250, the payback period on investment is 14.7 months. Bio-char (from carbonized waste) and briquette-ash are used as organic fertilizers and biocide in vegetable gardens at the schools. New pathways for municipal waste management based on stakeholder engagement and entrepreneurship are demonstrated; departing from the conventional waste collection and disposal models. This circular enterprise which enhances Food, Agriculture, Biodiversity, Land-use and Energy (FABLE) nexus will scale-up to incorporate non-student communities (youths/women), private waste-collectors and entrepreneurs. The application of entrepreneurial models for engaging students in green enterprises integrates technological, social, economic and governance dimensions for promoting municipal sanitation, environment; energy and food security.
The formulation of transport network problems is represented as a translation between two domain specific languages: from a network description language, used by network simulation community, to a problem description language, understood by generic non-linear solvers. A universal algorithm for this translation is developed, an estimation of its computational complexity given, and an efficient application of the algorithm demonstrated on a number of realistic examples. Typically, for a large gas transport network with about 10K elements the translation and solution of non-linear system together require less than 1 sec on the common hardware. The translation procedure incorporates several preprocessing filters, in particular, topological cleaning filters, which accelerate the solution procedure by factor 8.
Recent advances in digital game technology are making stereoscopic games more popular. Stereoscopic 3D graphics promise a better gaming experience but this potential has not yet been proven empirically. In this paper, we present a comprehensive study that evaluates player experience of three stereoscopic games in comparison with their monoscopic counterparts. We examined 60 participants, each playing one of the three games, using three self-reporting questionnaires and one psychophysiological instrument. Our main results are (1) stereoscopy in games increased experienced immersion, spatial presence, and simulator sickness; (2) the effects strongly differed across the three games and for both genders, indicating more affect on male users and with games involving depth animations; (3) results related to attention and cognitive involvement indicate more direct and less thoughtful interactions with stereoscopic games, pointing towards a more natural experience through stereoscopy.
Two distinct sequence elements mediate retroviral gene expression in embryonal carcinoma cells
(1987)
Trust and Social Capital: Revisiting an Offshoring Failure Story of a Small German Software Company
(2009)
The Waveform Relaxation Method (WRM) is introduced as a generalization of different methods used in circuit simulation. Next we present an algorithm to partition the network using so called signal flow graphs and its implementation in the experimental simulator SISAL. At last some new concepts to enhance the performance of the WRM are presented and first results are reported.
Transcription factor AP-2gamma, a novel marker of gonocytes and seminomatous germ cell tumors
(2005)
Plant sap-feeding insects are widespread, having evolved to occupy diverse environmental niches despite exclusive feeding on an impoverished diet lacking in essential amino acids and vitamins. Success depends exquisitely on their symbiotic relationships with microbial symbionts housed within specialized eukaryotic bacteriocyte cells. Each bacteriocyte is packed with symbionts that are individually surrounded by a host-derived symbiosomal membrane representing the absolute host-symbiont interface. The symbiosomal membrane must be a dynamic and selectively permeable structure to enable bidirectional and differential movement of essential nutrients, metabolites, and biosynthetic intermediates, vital for growth and survival of host and symbiont. However, despite this crucial role, the molecular basis of membrane transport across the symbiosomal membrane remains unresolved in all bacteriocyte-containing insects. A transport protein was immuno-localized to the symbiosomal membrane separating the pea aphid Acyrthosiphon pisum from its intracellular symbiont Buchnera aphidicola. The transporter, A. pisum nonessential amino acid transporter 1, or ApNEAAT1 (gene: ACYPI008971), was characterized functionally following heterologous expression in Xenopus oocytes, and mediates both inward and outward transport of small dipolar amino acids (serine, proline, cysteine, alanine, glycine). Electroneutral ApNEAAT1 transport is driven by amino acid concentration gradients and is not coupled to transmembrane ion gradients. Previous metabolite profiling of hemolymph and bacteriocyte, alongside metabolic pathway analysis in host and symbiont, enable prediction of a physiological role for ApNEAAT1 in bidirectional host-symbiont amino acid transfer, supplying both host and symbiont with indispensable nutrients and biosynthetic precursors to facilitate metabolic complementarity.
For protection from inhaled pathogens many strategies have evolved in the airways such as mucociliary clearance and cough. We have previously shown that protective respiratory reflexes to locally released bacterial bitter taste substances are most probably initiated by tracheal brush cells (BC). Our single-cell RNA-seq analysis of murine BC revealed high expression levels of cholinergic and bitter taste signaling transcripts (Tas2r108, Gnat3, Trpm5). We directly demonstrate the secretion of acetylcholine (ACh) from BC upon stimulation with the Tas2R agonist denatonium. Inhibition of the taste transduction cascade abolished the increase in [Ca2+](i) in BC and subsequent ACh-release. ACh-release is regulated in an autocrine manner. While the muscarinic ACh-receptors M3R and M1R are activating, M2R is inhibitory. Paracrine effects of ACh released in response to denatonium included increased [Ca2+](i) in ciliated cells. Stimulation by denatonium or with Pseudomonas quinolone signaling molecules led to an increase in mucociliary clearance in explanted tracheae that was Trpm5- and M3R-mediated. We show that ACh-release from BC via the bitter taste cascade leads to immediate paracrine protective responses that can be boosted in an autocrine manner. This mechanism represents the initial step for the activation of innate immune responses against pathogens in the airways.
Application Programming Interfaces (APIs) are a vital link between software components as well as between software and developers. Security APIs deliver crucial functionalities for programmers who see themselves in the increasing need for integrating security services into their software products. The ignorant or incorrect use of Security APIs leads to critical security flaws, as has been revealed by recent security studies. One major reason for this is rooted in usability issues. API Usability research has been deriving recommendations for designing usable APIs in general. Facing the growing relevance of Security APIs, the question arises, whether the observed usability aspects in the general space are already sufficient enough for building usable Security APIs. The currently available findings in the API Usability domain are selective fragments only, though. This still emerging field has not produced a comprehensive model yet. As a consequence, a first contribution of this paper is such a model that provides a consolidated view on the current research coverage of API Usability. On this baseline, the paper continues by conducting an analysis of relevant security studies, which give insights on usability problems developers had, when using Security APIs. This analysis leads to a proposal of eleven specific usability characteristics relevant for Security APIs. These have to be followed up by usability studies in order to evaluate how Security APIs need to be designed in a usable way and which potential trade-offs have to be balanced.
Towards self-explaining social robots. Verbal explanation strategies for a needs-based architecture
(2019)
In order to establish long-term relationships with users, social companion robots and their behaviors need to be comprehensible. Purely reactive behavior such as answering questions or following commands can be readily interpreted by users. However, the robot's proactive behaviors, included in order to increase liveliness and improve the user experience, often raise a need for explanation. In this paper, we provide a concept to produce accessible “why-explanations” for the goal-directed behavior an autonomous, lively robot might produce. To this end we present an architecture that provides reasons for behaviors in terms of comprehensible needs and strategies of the robot, and we propose a model for generating different kinds of explanations.
This dissertation presents a probabilistic state estimation framework for integrating data-driven machine learning models and a deformable facial shape model in order to estimate continuous-valued intensities of 22 different facial muscle movements, known as Action Units (AU), defined in the Facial Action Coding System (FACS). A practical approach is proposed and validated for integrating class-wise probability scores from machine learning models within a Gaussian state estimation framework. Furthermore, driven mass-spring-damper models are applied for modelling the dynamics of facial muscle movements. Both facial shape and appearance information are used for estimating AU intensities, making it a hybrid approach. Several features are designed and explored to help the probabilistic framework to deal with multiple challenges involved in automatic AU detection. The proposed AU intensity estimation method and its features are evaluated quantitatively and qualitatively using three different datasets containing either spontaneous or acted facial expressions with AU annotations. The proposed method produced temporally smoother estimates that facilitate a fine-grained analysis of facial expressions. It also performed reasonably well, even though it simultaneously estimates intensities of 22 AUs, some of which are subtle in expression or resemble each other closely. The estimated AU intensities tended to the lower range of values, and were often accompanied by a small delay in onset. This shows that the proposed method is conservative. In order to further improve performance, state-of-the-art machine learning approaches for AU detection could be integrated within the proposed probabilistic AU intensity estimation framework.
As soon as data is noisy, knowledge as it is represented in an information system becomes unreliable. Features in databases induce equivalence relations—but knowledge discovery takes the other way round: given a relation, what could be a suitable functional description? But the relations we work on are noisy again. If we expect to record data for learning a classification of objects then it can well be the real data does not create a reflexive, symmetric and transitive relation although we know it should be. The usual approach taken here is to build the closure in order to ensure desired properties. This, however, leads to overgeneralisation rather quickly.
Towards explaining deep learning networks to distinguish facial expressions of pain and emotions
(2018)
Deep learning networks are successfully used for object and face recognition in images and videos. In order to be able to apply such networks in practice, for example in hospitals as a pain recognition tool, the current procedures are only suitable to a limited extent. The advantage of deep learning methods is that they can learn complex non-linear relationships between raw data and target classes without limiting themselves to a set of hand-crafted features provided by humans. However, the disadvantage is that due to the complexity of these networks, it is not possible to interpret the knowledge that is stored inside the network. It is a black-box learning procedure. Explainable Artificial Intelligence (AI) approaches mitigate this problem by extracting explanations for decisions and representing them in a human-interpretable form. The aim of this paper is to investigate the explainable AI method Layer-wise Relevance Propagation (LRP) and apply it to explain how a deep learning network distinguishes facial expressions of pain from facial expressions of emotions such as happiness and disgust.
Despite the lack of standardisation for building REST-ful HTTP applications, the deployment of REST-based Web Services has attracted an increased interest. This gap causes, however, an ambiguous interpretation of REST and induces the design and implementation of REST-based systems following proprietary approaches instead of clear and agreed upon definitions. Issues arising from these shortcomings have an influence on service properties such as the loose coupling of REST-based services via a unitary service contract and the automatic generation of code. To overcome such limitations, at least two prerequisites are required: the availability of specifications for implementing REST-based services and auxiliaries for auditing the compliance of those services with such specifications. This paper introduces an approach for conformance testing of REST-based Web Services. This appears conflicting at the first glance, since there are no specifications available for implementing REST by, e.g., t he prevalent technology set HTTP/URI to test against. Still, by providing a conformance test tool and leaning it on the current practice, the exploration of service properties is enabled. Moreover, the real demand for standardisation gets explorable by such an approach. First investigations conducted with the developed conformance test system targeting major Cloud-based storage services expose inconsistencies in many respects which emphasizes the necessity for further research and standardisation.
Towards an Interaction-Centered and Dynamically Constructed Episodic Memory for Social Robots
(2020)
Formal concept analysis (FCA) as introduced in [4] deals with contexts and concepts. Roughly speaking, a context is an environment that is equipped with some kind of "knowledge". Such contexts are also known as information or knowledge representation systems where the knowledge consists of (intensional) descriptions relating sets of objects to sets of properties. Given extsensional and intensional descriptions (the latter one in terms of binary attributes), they can be arranged in a taxonomy or concept lattice.