Refine
Departments, institutes and facilities
- Fachbereich Wirtschaftswissenschaften (48)
- Fachbereich Informatik (42)
- Institut für funktionale Gen-Analytik (IFGA) (24)
- Fachbereich Ingenieurwissenschaften und Kommunikation (18)
- Institute of Visual Computing (IVC) (18)
- Institut für Cyber Security & Privacy (ICSP) (15)
- Präsidium (14)
- Fachbereich Angewandte Naturwissenschaften (12)
- Fachbereich Sozialpolitik und Soziale Sicherung (5)
- Institut für Verbraucherinformatik (IVI) (5)
Document Type
- Article (84)
- Conference Object (60)
- Part of a Book (54)
- Book (monograph, edited volume) (14)
- Part of Periodical (14)
- Report (9)
- Bachelor Thesis (3)
- Lecture (2)
- Preprint (2)
- Conference Proceedings (1)
Year of publication
- 2010 (248) (remove)
Keywords
- Entwicklungspolitik (6)
- internationale Politik (5)
- Entwicklungsland (4)
- Europa (4)
- Globalisierung (3)
- Management (3)
- Sicherheitspolitik (3)
- Außenpolitik (2)
- Bundesrepublik Deutschland (2)
- Diskurs (2)
- EU (2)
- Entwicklung (2)
- Governance (2)
- Human-Robot Interaction (2)
- Lehrbuch (2)
- Leitbild (2)
- Lennard-Jones potential (2)
- Malaria (2)
- Multilateralität (2)
- Navigation (2)
- Sicherheitslücke (2)
- Software (2)
- Strategie (2)
- Verfassung (2)
- Weltordnung (2)
- Weltpolitik (2)
- Wirtschaftskrise (2)
- internationale Beziehungen (2)
- internationale Sicherheit (2)
- politischer Einfluss (2)
- politischer Wandel (2)
- 21. Jahrhundert (1)
- Acceptance (1)
- Accuracy (1)
- Actuator and Sensor Systems (1)
- AdoMETDC (1)
- Afrika (1)
- Algorithmus (1)
- Analysis of Bond Graph Models (1)
- Anionic surfactant (1)
- Asien (1)
- Attentat (1)
- Automated Modelling (1)
- Automotive Systems (1)
- Balanced Scorecard (1)
- Barriers (1)
- Bedrohung (1)
- Begriff (1)
- Benzyl alkyl ammonium chloride (1)
- Beta strands (1)
- Betriebliches Rechnungswesen (1)
- Betriebswirtschaft (1)
- Bilanzierung (1)
- Bio-active compounds (1)
- Blob Detection (1)
- Block copolymer (1)
- Bond graph modelling (1)
- Bondgraph (1)
- Cationic surfactant (1)
- Computer architecture (1)
- Computersicherheit (1)
- Computersimulation (1)
- Computing Milieux (1)
- Consulting (1)
- DNSSEC (1)
- Data fusion (1)
- Datenschutz (1)
- Datensicherheit (1)
- Demokratisierung (1)
- Deoxyhypusine hydroxylase (1)
- Deutschland (1)
- Diabetes mellitus (1)
- Displacement (1)
- Drug target (1)
- ED IAS 19 (1)
- EIF-5A (1)
- ENaC (1)
- Eigenkapital (1)
- Eigentumsrecht (1)
- Elderly People (1)
- Electromagnetic wave propagation (1)
- Electronic Commerce (1)
- Elektrizitätswirtschaft (1)
- Encryption (1)
- Energie (1)
- Energieersparnis (1)
- Energiehandel (1)
- Energiekosten (1)
- Energieverbrauch (1)
- Engineering (1)
- Entwicklungshilfe (1)
- Entwicklungszusammenarbeit (1)
- Epithelial Na+ channel (1)
- Esterquat (1)
- Estimation (1)
- Ethik (1)
- Euronorm (1)
- Europapolitik (1)
- Event detection (1)
- Expert system (1)
- FDI (1)
- FPGA (1)
- Fatty alcohol alkoxylate (1)
- Fatty alcohol alkoxylates (1)
- Fehlertoleranz (1)
- Festschrift (1)
- Finanzkrise (1)
- Foreground segmentation (1)
- Fourier optics (1)
- Fourier transform spectra (1)
- Frequency conversion (1)
- Fundamentalismus (1)
- Funktionsprinzip (1)
- Fuzzing (1)
- Fuzzy-System (1)
- GC × GC (1)
- GC×GC (1)
- Gender Issues in Computer Science Education (1)
- Geo-tagging (1)
- Geopolitik (1)
- Gesture Recognition (1)
- Gesture-based HRI (1)
- Gesundheitswesen (1)
- Global Player (1)
- Gradient-based algorithms (1)
- Graphentheorie (1)
- Green IT (1)
- GuV (1)
- HRI (1)
- Hardware (1)
- Hazardous material detection (1)
- High speed tensile testing (1)
- High strain rate (1)
- Hochschule (1)
- Holographic interferometry (1)
- Human Factors (1)
- IT-Ressourcen (1)
- Image Processing (1)
- Innovation (1)
- Integrationspolitik (1)
- Internationales Management (1)
- Internationales Marketing (1)
- Internet (1)
- Investition (1)
- Investitionskosten (1)
- Islamismus (1)
- Jahresabschluss (1)
- Kartographie (1)
- Konsolidierung (Konzernabschluss) (1)
- Konzernabschluss (1)
- Korruption (1)
- Kriegsführung (1)
- Kryptologie (1)
- Legitimation (1)
- Leitkultur (1)
- Measurement (1)
- Mechanosensitive (1)
- Mehrebenensystem (1)
- Menschenrechte (1)
- Metal oxide gas sensors (1)
- Methodenanalyse (1)
- Minerals (1)
- Mitarbeiter (1)
- Mobile devices (1)
- Mobile robots (1)
- Mobility modeling (1)
- Modellbildung (1)
- Models of Variable Structure (1)
- Molecular models (1)
- Motion (1)
- Motion Generator (1)
- Motivators (1)
- Multidisciplinary Dynamic Systems (1)
- Multivariate Time Series (1)
- Nachhaltige Entwicklung (1)
- Nation (1)
- Numerical optimization (1)
- OECD-Staat (1)
- Offshoring (1)
- Online-Marketing (1)
- Open Educational Practices (1)
- Open Educational Resources (1)
- Open-ended Robotic Discovery (1)
- Parallelization (1)
- Parameter sensitivities of transfer functions (1)
- Password Masking (1)
- Password Visualization (1)
- Passwords (1)
- Patriotismus (1)
- Pensionsverpflichtung (1)
- Performance Evaluation (1)
- Photosystem (1)
- Plasmodium (1)
- Pointing Gesture Detection (1)
- Pointing Gesture Recognition (1)
- Principal component analysis (1)
- Projektmanagement (1)
- Protein folding (1)
- Prototypes (1)
- Pulmonary epithelium (1)
- Radio-frequency (1)
- Radiofrequency identification (1)
- Random copolymer (1)
- Rapid Prototyping (1)
- Ratifizierung (1)
- Rechenzentrum (1)
- Rechnungslegungsgesetz (1)
- Reformpolitik (1)
- Regionalismus (1)
- Relational Learning (1)
- Repositories (1)
- Risikoanalyse (1)
- Robot sensing systems (1)
- Robotersteuerung (1)
- Robotics (1)
- Robustness (1)
- Role conflicts (1)
- Role theory (1)
- Rollenkonflikte (1)
- Rollentheorie (1)
- SAM486A (1)
- SME (1)
- Saccades (1)
- Saccadic suppression (1)
- Safety and security (1)
- Scholarly workbench (1)
- Scientific workbench (1)
- Semiconductor lasers (1)
- Service Robot (1)
- Service-Roboter (1)
- Shadow detection (1)
- Shear force (1)
- Sicherheitsanalyse (1)
- Singapur (1)
- Smartphones (1)
- SoftScheck (1)
- Software Development (1)
- Software-Engineering (1)
- Software-Entwicklung (1)
- Software-Lebenszyklus (1)
- Software-Sicherheit (1)
- Software-Validierung (1)
- Software-Werkzeug (1)
- Software-Zertifizierung (1)
- Staatszerfall (1)
- Stress strain relation (1)
- Stromerzeugung (1)
- Strommarkt (1)
- Studierende (1)
- Supply chains (1)
- Surveillance (1)
- SystemVerilog (1)
- Südostasien (1)
- Telematik (1)
- Telematik-Software (1)
- Terrorismus (1)
- Terrorismusbekämpfung (1)
- Theorie (1)
- Threat Modeling (1)
- Tracking (1)
- Trichosanthes cucumerina L. (1)
- Umgebung (Umwelt) (1)
- Umweltmanagement (1)
- Umweltpolitik (1)
- Unternehmensberatung (1)
- Unternehmensethik (1)
- Unternehmensführung (1)
- Vapor–liquid equilibrium (1)
- Verfassungsgebung (1)
- Verifizierung (1)
- Video surveillance (1)
- Visual perception (1)
- Volksentscheid (1)
- Warencode (1)
- Website (1)
- Weltwirtschaft (1)
- Wertschöpfung (1)
- Wettbewerb (1)
- Wireless sensor network (1)
- Wirtschaftsethik (1)
- Wirtschaftstheorie (1)
- Wissen (1)
- Wissensgesellschaft (1)
- Yield stress (1)
- Young’s modulus (1)
- Zertifizierung (1)
- Zukunftsperspektive (1)
- angiodiabetes (1)
- angiogenesis (1)
- bioactive factors (1)
- biomarker profile (1)
- biomaterials (1)
- bolometers (1)
- bone (1)
- cardiodiabetes (1)
- cardiovascular risk (1)
- cartilage (1)
- ceramics (1)
- circumstellar matter (1)
- critical incidents (1)
- cross-cultural (1)
- cyanide (1)
- dental polymers (1)
- dielectric analysis (DEA) (1)
- differential scanning calorimetry (DSC) (1)
- differentiation (1)
- dynamic mechanic analysis (DMA) (1)
- educational methods (1)
- edutainment (1)
- electrochemical sensor (1)
- electronics (1)
- europäische Integration (1)
- feature selection (1)
- force field development (1)
- gas lasers (1)
- gradient-based algorithms (1)
- hard and soft tissue (1)
- harmonic generation (1)
- harmonic generation including higher-order harmonic generation (1)
- heavy metal (1)
- hot carriers (1)
- hypermedia (1)
- incremental bond graphs (1)
- innere Sicherheit (1)
- instrumentation: detectors (1)
- interferometers (1)
- internationale Führungsmacht (1)
- internationale Zusammenarbeit (1)
- internationales Abkommen (1)
- inverse model (1)
- ion-selective electrodes (1)
- kulturelle Vielfalt (1)
- laser diodes (1)
- life-long learning (1)
- magnetic resonance spectrometers auxiliary equipment (1)
- mesenchymal stem cells (1)
- microwave propagation (1)
- microwave spectra (1)
- mobiler Roboter (1)
- modeling (1)
- molecular dynamics (1)
- multikulturelle Gesellschaft (1)
- nationale Identität (1)
- numerical optimisation (1)
- organic compounds (1)
- other holographic techniques (1)
- parameter sensitivities of residuals of ARRs (1)
- photo-curing of polymers (1)
- politische Strategie (1)
- politischer Akteur (1)
- polymers (1)
- quantum cascade lasers (1)
- radiowave propagation (1)
- radiowave spectrometers (1)
- serum and glucocorticoid-induced kinase 1 (1)
- software (1)
- software engineering (1)
- sozioökonomische Faktoren (1)
- spectral line broadening (1)
- stars: individual: RXJ1856.5-3754 (1)
- story authoring (1)
- submillimeter wave microwave (1)
- submillimeter: general (1)
- techniques (1)
- technological literacy (1)
- terahertz spectroscopy (1)
- terahertz wave spectra (1)
- tourism services (1)
- voltage-independent Na+ channel (1)
- westliche Welt (1)
As competition for tourists becomes more global, understanding and accommodating the needs of international tourists, with their different cultural backgrounds, has become increasingly important. This study highlights the variations in tourist industry service--particularly as they relate to different cultures. Specifically, service failures experienced by Japanese and German tourists in the U.S. were categorized using the Critical Incident Technique (CIT). The results were compared with earlier studies of service failures experienced by American consumers in the tourist industry. The sample consists of 128 Japanese and 94 “Germanic” (German, Austrian, Swiss-German) respondents. The Japanese and German sample rated “Inappropriate employee behavior” most significant category of service failure. More than half of these respondents said that, because of the failure, they would avoid the offending U.S. business. This is a much stronger response than an American sample had reported in an earlier study. The implications for managers and researchers are discussed.
Suppose we have n keys, n access probabilities for the keys, and n+1 access probabilities for the gaps between the keys. Let h_min(n) be the minimal height of a binary search tree for n keys. We consider the problem to construct an optimal binary search tree with near minimal height, i.e.\ with height h <= h_min(n) + Delta for some fixed Delta. It is shown, that for any fixed Delta optimal binary search trees with near minimal height can be constructed in time O(n^2). This is as fast as in the unrestricted case. So far, the best known algorithms for the construction of height-restricted optimal binary search trees have running time O(L n^2), whereby L is the maximal permitted height. Compared to these algorithms our algorithm is at least faster by a factor of log n, because L is lower bounded by log n.
Insolvenzanfechtung von Beitragszahlungen an Sozialversicherungsträger – aktuelle Rechtsprechung
(2010)
Zentrale Archivierung und verteilte Kommunikation digitaler Bilddaten in der Pneumokoniosevorsorge
(2010)
Pneumokoniose-Vorsorgeuntersuchungen erfordern die Befundung einer Röntgenthoraxaufnahme nach ILO-Staublungenklassifikation. Inzwischen werden die benötigten Aufnahmen bereits in großem Umfang digital angefertigt und kommuniziert. Hierdurch entstehen neue Anforderungen an verwendete Technik und Workflow-Mechanismen, um einen effizienten Ablauf von Untersuchung, Befundung und Dokumentation zu gewährleisten.
This report presents the implementation and evaluation of a computer vision problem on a Field Programmable Gate Array (FPGA). This work is based upon [5] where the feasibility of application specific image processing algorithms on a FPGA platform have been evaluated by experimental approaches. The results and conclusions of that previous work builds the starting point for the work, described in this report. The project results show considerable improvement of previous implementations in processing performance and precision. Different algorithms for detecting Binary Large OBjects (BLOBs) more precisely have been implemented. In addition, the set of input devices for acquiring image data has been extended by a Charge-Coupled Device (CCD) camera. The main goal of the designed system is to detect BLOBs in continuous video image material and compute their center points.
This work belongs to the MI6 project from the Computer Vision research group of the University of Applied Sciences Bonn-Rhein-Sieg1 . The intent is the invention of a passive tracking device for an immersive environment to improve user interaction and system usability. Therefore the detection of the users position and orientation in relation to the projection surface is required. For a reliable estimation a robust and fast computation of the BLOB's center-points is necessary. This project has covered the development of a BLOB detection system on an Altera DE2 Development and Education Board with a Cyclone II FPGA. It detects binary spatially extended objects in image material and computes their center points. Two different sources have been applied to provide image material for the processing. First, an analog composite video input, which can be attached to any compatible video device. Second, a five megapixel CCD camera, which is attached to the DE2 board. The results are transmitted on the serial interface of the DE2 board to a PC for validation of their ground truth and further processing. The evaluation compares precision and performance gain dependent on the applied computation methods and the input device, which is providing the image material.