Refine
Departments, institutes and facilities
- Fachbereich Wirtschaftswissenschaften (92)
- Fachbereich Angewandte Naturwissenschaften (62)
- Fachbereich Informatik (55)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (41)
- Fachbereich Sozialpolitik und Soziale Sicherung (33)
- Fachbereich Ingenieurwissenschaften und Kommunikation (32)
- Institut für Verbraucherinformatik (IVI) (28)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (25)
- Präsidium (25)
- Institute of Visual Computing (IVC) (22)
Document Type
- Article (110)
- Part of a Book (94)
- Conference Object (93)
- Part of Periodical (26)
- Book (monograph, edited volume) (20)
- Report (13)
- Contribution to a Periodical (9)
- Working Paper (8)
- Doctoral Thesis (4)
- Preprint (3)
Year of publication
- 2018 (389) (remove)
Keywords
- Digitalisierung (5)
- ICT (5)
- Lehrbuch (4)
- Betriebswirtschaftslehre (3)
- Dementia (3)
- FPGA (3)
- Qualitätsmanagement (3)
- User Experience (3)
- drug release (3)
- lignin (3)
Die im Jahre 2013 begonnene Workshop-Reihe „Usability in der betrieblichen Praxis“ auf der Mensch und Computer wird mit diesem Workshop als Aktivität des Mittelstand 4.0-Kompetenzzentrums Usability des BMWi fortgesetzt. Unter dem Stichwort „Digitalisierung“ ergeben sich neue Herausforderungen der Umsetzung von Usability und positiver User Experience (UUX) in der betrieblichen Praxis kleiner und mittelständischer Unternehmen (UUX-Praxis). Diese werden in vier Schwerpunktthemen im Workshop behandelt: „UUX - Erfolgsfaktor für Innovation und Zukunft der Arbeit“, „UUX und digitale Nutzerforschung“, „UUX und Agilität“ sowie „UUX - Unterstützung mittelständischer Unternehmensnetzwerke“. Der Workshop richtet sich an Entwicklungs- und UUX-Praktiker aus Softwareentwicklungs-, Anwendungs- und UUX-Beratungsunternehmen sowie Wissenschaftler, die sich mit Umsetzung der UUX-Praxis in Unternehmen beschäftigen.
Innovative Technologien, veränderte Anbieterstrukturen, stets neue Leistungsangebote und wandelnde Kundenanforderungen prägen und verändern von Beginn an das Erscheinungsbild des TK-Marktes. Unter Berücksichtigung einer Betrachtung im Zeitablauf lässt sich der Markt in drei aufeinanderfolgende Phasen einteilen: 1. Marktöffnung, 2. Konsolidierung und Optimierung, 3. Automatisierung. Die Phasen sind selbstverständlich nicht Überschneidungsfrei, geben jedoch einen Hinweis auf die strukturellen Veränderungen des Marktes.
Amaç: Keton cisim oluşumu (ketogenez) bozuklukları; mitokondriyel 3-hidroksi-3metil glutaril CoA sentaz (Mhs) ve 3-hidroksi-3-metil glutaril CoA liyaz (HL) enzim eksiklikleri sonucu oluşur. Keton cisim yıkımı (ketoliz) bozuklukları ise suksinil CoA: 3 oksoasit CoA transferaz (SCOT) ve asetoasetil CoA thiolaz-beta ketotiolaz (MAT) enzim eksiklikleri sonucu oluşmaktadır. Keton metabolizma bozukluğu tanısıyla izlenen hastaların klinik ve laboratuvar bulguları ile değerlendirilmesi amaçlandı.
Yöntem: Keton metabolizması bozukluğu tanısıyla izlenen hasta verileri retrospektif olarak incelendi.
Bulgular: Dört hastada HL eksikliği, 3 hastada MAT eksikliği ve 2 hastada SCOT eksikliği tanısı mevcuttu. Hastaların ortanca yaşı 5 yıl (6 ay-15,5 yıl), ilk metabolik dekompanzasyon atak yaşı ortalama 7,7 ay (22 gün-19 ay) idi. MAT eksikliği olan bir hasta, kardeş taraması ile asemptomatik dönemde tanı aldı. İki hastada spastik tetraparezi gibi ağır nörolojik defisit gelişti. Dekompanzasyon ataklarının beslenememe, kusma ve gastroenterit gibi infeksiyon sonrası geliştiği görüldü.
Sonuç: Açıklanamayan metabolik asidoz atakları durumunda keton metabolizma bozuklukları akılda tutulmalıdır. Akut dekompanzasyon değişik yaşlarda ortaya çıkabilir, klinik şiddeti değişken olabilir. Erken tanı ve uygun tedavi mortalite ve morbidite açısından çok önemlidir.
Further development on globally convergent algorithms for solution of stationary network problems is presented. The algorithms make use of global non-degeneracy of Jacobi matrix of the system, composed of Kirchhoff's flow conservation conditions and transport element equations. This property is achieved under certain monotonicity conditions on element equations and guarantees an existence of a unique solution of the problem as well as convergence to this solution from an arbitrary starting point. In application to gas transport networks, these algorithms are supported by a proper modeling of gas compressors, based on individually calibrated physical characteristics. This paper extends the modeling of compressors by hierarchical methods of topological reduction, combining the working diagrams for parallel and sequential connections of compressors. Estimations are also made for application of topological reduction methods beyond the compressor stations in generic network problems. Efficiency of the methods is tested by numerical experiments on realistic networks.
In the context of the Franco-German research project Re(h)strain, this work focuses on a global system analysis integrating both safety and security analysis of international and/or urban railway stations. The Re(h)strain project focuses on terrorist attacks on high speed train systems and investigates prevention and mitigation measures to reduce the overall vulnerability and strengthen the system resilience. One main criterion regarding public transport issues is the number of passengers. For example, the railway station of Paris “Gare du Nord” deals with a bigger number of passengers than the biggest airport in the world (SNCF open Data 2014), the Atlanta airport, but in terms of passengers, it is only around the 23rd rank railway station in the world. Due to the enormous mass of people, this leads to the system approach of breaking out the station into several classes of zones, e.g. entrance, main hall, quays, trains, etc. All classes are analysed considering state-of-the-art parameters, like targets attractiveness, feasibility of attack, possible damage, possible mitigation and defences. Then, safety incidence of security defence is discussed in order to refine security requirement with regard to the considered zone. Finally, global requirements of security defence correlated to the corresponding class of zones are proposed.
The Fragile X Syndrome (FXS) is one of the most common forms of inherited intellectual disability in all human societies. Caused by the transcriptional silencing of a single gene, the fragile x mental retardation gene FMR1, FXS is characterized by a variety of symptoms, which range from mental disabilities to autism and epilepsy. More than 20 years ago, a first animal model was described, the Fmr1 knock-out mouse. Several other models have been developed since then, including conditional knock-out mice, knock-out rats, a zebrafish and a drosophila model. Using these model systems, various targets for potential pharmaceutical treatments have been identified and many treatments have been shown to be efficient in preclinical studies. However, all attempts to turn these findings into a therapy for patients have failed thus far. In this review, I will discuss underlying difficulties and address potential alternatives for our future research.
Gesellschaftliche Verantwortung von Familienunternehmen – theoretische Zusammenhänge und Messung
(2018)
Variable Sterne sind Sterne, welche in bestimmten Messparametern variabel sind. In unserem Fall ist dies die Helligkeit der Sterne. Grundsätzlich gibt es hier zwei Arten der Variabilität, intrinsiche und extrinsische Prozesse. Unter intrinischen Prozessen versteht man Variabilität, deren Ursache im Stern selbst liegt.
This policy brief is part of a wider research project entitled ‘Building the Economic Case for Investments in Social Protection’. The research aims at demonstrating the potential impacts of social protection on inclusive growth. The project is a collaborative effort between the Maastricht Graduate School of Governance at the University of Maastricht and United Nations University-MERIT, NL; the Global Development Institute at the University of Manchester, UK; the School of Social Science at the University of Makerere, Uganda; and the Expanding Social Protection Programme of the Ugandan Ministry of Gender, Labour and Social Development. This project is part of the research agenda of the Knowledge Platform Inclusive Development Policies and funded by the Ministry of Foreign Affairs of the Netherlands through the NWO-WOTRO programme.
Anne Dreller shows that data sharing offers great opportunities and huge value creation potential for the business world. Despite many opportunities that data sharing promises, the business world has not fully operationalized this fact yet, due to various existing challenges. Thus, an exemplary, future-oriented, and platform-based data sharing business model is developed for the startup Quemey. This business model is also equipped with prioritized implementation advice, including measures like focusing on strong values for all platform participants, growing their business into a powerful monopolist position, and eliminating barriers of technological, contractual and legal or data privacy uncertainties.
A Method for the Sustainable Documentation of Operations Processes in Parcel Distribution Centers
(2018)
There is often no common understanding on operational processes in logistics companies as they are not properly documented. Hence, people execute the same process differently and training is conducted by experienced operators on an ad-hoc basis. Furthermore, continuous process improvement is hampered as neither the ideal process nor current issues in as-is processes are visible. A major reason for the missing documentation is the complexity of existing business process modelling languages. Modelling experts are required for initially describing the processes and also for updating the models after process changes. Furthermore, operations people are usually not used to read complex process models in EPCs or BPMN diagrams. In order to overcome these limitations, a domain-specific modelling language which facilitates maintaining up-to-date process models has been designed with a large logistics company in Germany. The paper at hand briefly describes this language and illustrates the method on how to apply it in operations environments.
Persons with disabilities have much lower employment rates than the population as a whole and are at a significantly higher risk of living in poverty (OECD, 2011, pp. 50-56 and WHO, 2011, pp. 237-239). However, many of the barriers people with disabilities face, with regards to labor market reintegration, are in fact avoidable. There has for quite some time been evidence that differences in employment and wages, between disabled and non-disabled workers, can only to a limited extent be explained by differences in human capital endowments and productivity (Kidd, Sloane, & Ferko, 2000). Instead, factors such as the absence of access to education and training, and the lack of financial assistance provided are actually significant drivers of labor market exclusion (OECD, 2009, p.15; WHO, 2011, p.239).
Die Diskussion um die Nachhaltigkeit von Dienstleistungen im öffentlichen Sektor steht in einem engen Zusammenhang mit der Frage, ob sich der Einsatz finanzieller Mittel für die Beteiligten lohnt. Daher besteht ein breites Interesse, herauszufinden, ob der Nutzen von Rehabilitationsarbeit auch finanziell messbar ist, und falls ja, wie hoch das ökonomische Potential der Investitionen ist. Um diese Frage zu beantworten, ist es notwendig Leistungen sowie die dadurch anfallenden Ausgaben statistisch zu erfassen und in einem ökonomischen Modell zu bewerten.
This paper introduces a random number generator (RNG) based on the avalanche noise of two diodes. A true random number generator (TRNG) generates true random numbers with the use of the electronic noise produced by two avalanche diodes. The amplified outputs of the diodes are sampled and digitized. The difference between the two concurrently sampled and digitized outputs is calculated and used to select a seed and to drive a pseudo-random number generator (PRNG). The PRNG is an xorshift generator that generates 1024 bits in each cycle. Every sequence of 1024 bits is moderately modified and output. The TRNG delivers the next seed and the next cycle begins. The statistical behavior of the generator is analyzed and presented.
Project Overview
(2018)
The project "German-African University Partnership Platform for the Development of Entrepreneurs and Small/Medium Enterprises" started in 2015 within the framework of the program "University-Business-Partnerships between Higher Education Institutions and Business Partners in Germany and in Developing Countries", funded by the German Ministry of Economic Cooperation and Development (BMZ), and the German Academic Exchange Service (DAAD). It is carried out by Hochschule Bonn-Rhein-Sieg, University of Applied Sciences in Germany (H-BRS), the University of Cape Coast (UCC) in Ghana, and the University of Nairobi (UoN) in Kenya.
Argentina substantially contributes to the global organic agriculture and food sector due to its large areas of organically managed agricultural land. However, most of the organic production is intended for export. Overall, food supply for the domestic organic market is hardly tapped. Based on this, we investigate the current importance of organic agriculture and food production as well as consumption attitudes and behavior within the country. The novelty of the study also lies in the observation, documentation and analysis of latest stakeholder‐driven developments towards organic agriculture and food. Furthermore, the publication allows the Argentinean organic market to be significantly more visible for the international audience.
The Life Cycle Assessment (LCA) approach is the most important tool in the evaluation of environmental (sustainability) impacts of products and processes. We used the method to conduct an impact analysis with regard to raw material inputs (pulp) for the German paper production industry. In our analysis, we compare the environmental effects of primary sulphate pulp, scrap paper pulp and grass-based pulp and estimate their impacts in the impact categories "greenhouse gas emissions", "eutrophication" as well as "energy and water consumption". Furthermore, we discuss the opportunities of the methodical approach and some general problems and limits of the application of a LCA. In conclusion, we found environmental advantages for the use of grass as an alternative resource in the German paper production industry, especially in the fields of transport and water consumption.
Design optimization techniques are often used at the beginning of the design process to explore the space of possible designs. In these domains illumination algorithms, such as MAP-Elites, are promising alternatives to classic optimization algorithms because they produce diverse, high-quality solutions in a single run, instead of only a single near-optimal solution. Unfortunately, these algorithms currently require a large number of function evaluations, limiting their applicability. In this article we introduce a new illumination algorithm, Surrogate-Assisted Illumination (SAIL), that leverages surrogate modeling techniques to create a map of the design space according to user-defined features while minimizing the number of fitness evaluations. On a two-dimensional airfoil optimization problem SAIL produces hundreds of diverse but high-performing designs with several orders of magnitude fewer evaluations than MAP-Elites or CMA-ES. We demonstrate that SAIL is also capable of producing maps of high-performing designs in realistic three-dimensional aerodynamic tasks with an accurate flow simulation. Data-efficient design exploration with SAIL can help designers understand what is possible, beyond what is optimal, by considering more than pure objective-based optimization.
Surrogate-assistance approaches have long been used in computationally expensive domains to improve the data-efficiency of optimization algorithms. Neuroevolution, however, has so far resisted the application of these techniques because it requires the surrogate model to make fitness predictions based on variable topologies, instead of a vector of parameters. Our main insight is that we can sidestep this problem by using kernel-based surrogate models, which require only the definition of a distance measure between individuals. Our second insight is that the well-established Neuroevolution of Augmenting Topologies (NEAT) algorithm provides a computationally efficient distance measure between dissimilar networks in the form of "compatibility distance", initially designed to maintain topological diversity. Combining these two ideas, we introduce a surrogate-assisted neuroevolution algorithm that combines NEAT and a surrogate model built using a compatibility distance kernel. We demonstrate the data-efficiency of this new algorithm on the low dimensional cart-pole swing-up problem, as well as the higher dimensional half-cheetah running task. In both tasks the surrogate-assisted variant achieves the same or better results with several times fewer function evaluations as the original NEAT.
Social Assistance
(2018)
If the first Sustainable Development Goal (SDG) to “End poverty in all its forms everywhere” is to be taken seriously, most low- and middle-income countries face a huge challenge. An estimated 1 billion people have indeed escaped extreme poverty since the early 1990s, and the global poverty rate fell from 35% in 1990 to 10.7% in 2013, but the absolute number of people living below the international poverty line of $1.90 at purchasing power parity has hardly changed. Countries in Asia contributed greatly to the overall decline in poverty rates: from 2012 to 2013, over 100 million people in Asia left extreme poverty behind, notably in India, Indonesia, and the People’s Republic of China (PRC) (World Bank 2016). Yet the living standards of those still below that line have hardly improved (Ravallion 2016). The achievement of the first SDG requires additional efforts at global and national levels, particularly on policies that address chronic poverty traps and that improve the outcomes of poor and vulnerable populations.
This policy brief investigates the costs of child poverty in the Balkans, including deprivation in terms of education, health, and social mobility. It then lays out the potential of social protection, most notably in terms of building resilence and fostering development. Set against recent case studies from around the world, including Cambodia and Uganda, the brief gives policy recommendations on various critical issues including transfer schemes, transformative measures, and (alternative) care for children with disabilities.
Mehr machen, weniger planen!
(2018)
Im Zusammenhang mit der Rhythmisierung des Schulalltags spielen Pausen eine wichtige Rolle. Dass Pausen für die Regeneration und Wiederherstellung der Leistungsfähigkeit bedeutsam sind, scheint allgemein anerkannt. Die Autoren fassen im folgenden Beitrag zusammen, welche wissenschaftlichen Erkenntnisse es über die Effekte der Gestaltung und der Dauer von Pausen gibt.
The main objective of this chapter is to give insights into how H-BRS as a German University of Applied Sciences supports small and medium-sized enterprises (SMEs) in exploring African markets. The university achieves this objective by engaging its Bachelor and Master level students in applied market research. Students engage in this research as part of their final thesis writing. This chapter lays out a process for successful marketing research projects for German SMEs in nine steps.
Internships and professional experience are becoming more and more important requisites for students and graduates and are almost taken for granted by many HR officials. In opposition to this, many newly created Bachelor and Master programmes make it difficult for students to integrate internships into their studies without having to add another semester and thereby "losing" valuable time. This becomes all the more relevant with private universities or universities generally that charge considerable tuition fees.
Kontemporäre Service-orientierte Systeme sind hochgradig vernetzt und haben zudem die Eigenschaft massiv-skalierbar zu sein. Diese Charakteristiken stellen im besonderen Maße Anforderungen an die Datensicherheit der Anwender solcher Systeme und damit primär an alle Stakeholder der Softwareentwicklung, die in der Verantwortung sind, passgenaue Sicherheitsmechanismen effektiv in die Softwareprodukte zu bringen. Die Effektivität von Sicherheitsarchitekturen in service-orientierten Systemen hängt maßgeblich von der richtigen Nutzung und Integration von Security-APIs durch eine heterogene Gruppe von Softwareentwicklern ab, bei der nicht per se ein fundiertes Hintergrundwissen über komplexe digitale Sicherheitsmechanismen vorausgesetzt werden kann. Die Diskrepanz zwischen komplexen und in der Anwendung fehleranfälligen APIs und einem fehlenden Verständnis für die zugrundeliegenden Sicherheitskonzepte auf Seiten der Nutzer begünstigt in der Praxis unsichere Softwaresysteme. Aus diesem Grund ist die Gebrauchstauglichkeit von Security-APIs besonders relevant, damit Programmierer den benötigten Funktionsumfang effektiv, effizient und zufriedenstellend verwenden können. Abgeleitet von dieser Problemstellung, konzentriert sich das Dissertationsvorhaben auf die gebrauchstaugliche Ausgestaltung von Security-APIs und den Herausforderungen die sich aus den Methoden zur Evaluation der Usability in typischen Umgebungen der Softwareentwicklung ergeben.
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many cases developers are overburdened by the complex set of programming choices and their security implications. Past studies have identified significant challenges when using cryptographic APIs that lack a certain set of usability features (e.g. easy-to-use documentation or meaningful warning and error messages) leading to an especially high likelihood of writing functionally correct but insecure code.
To support software developers in writing more secure code, this work investigates a novel approach aimed at these hard-to-use cryptographic APIs. In a controlled online experiment with 53 participants, we study the effectiveness of API-integrated security advice which informs about an API misuse and places secure programming hints as guidance close to the developer. This allows us to address insecure cryptographic choices including encryption algorithms, key sizes, modes of operation and hashing algorithms with helpful documentation in the guise of warnings. Whenever possible, the security advice proposes code changes to fix the responsible security issues. We find that our approach significantly improves code security. 73% of the participants who received the security advice fixed their insecure code.
We evaluate the opportunities and challenges of adopting API-integrated security advice and illustrate the potential to reduce the negative implications of cryptographic API misuse and help developers write more secure code.
Software development is a complex task. Merely focussing on functional requirements is not sufficient any more. Developers are responsible to take many non-functional requirements carefully into account. Security is amongst the most challenging, as getting it wrong will result in a large user-base being potentially at risk. A similar situation exists for administrators. Security defaults have been put into place here to encounter lacking security controls. As first attempts to establish security by default in software development are flourishing, the question on their usability for developers arises.
In this paper we study the effectiveness and efficiency of Content Security Policy (CSP) enforced as security default in a web framework. When deployed correctly, CSP is a valid protection mean in a defence-in-depth strategy against code injection attacks. In this paper we present a first qualitative laboratory study with 30 participants to discover how developers deal with CSP when deployed as security default. Our results emphasize that the deployment as security default has its benefits but requires careful consideration of a comprehensive information flow in order to improve and not weaken security. We provide first insights to inform research about aiding developers in the creation of secure web applications with usable security by default.
Evaluation is of crucial importance and should meet professional standards in its design. In practice, organizational peculiarities and available resources characterize the search for the "right" approach. When used as a quality development tool, internal or self-evaluation should primarily be useful. It should generate information to answer organizational questions and provide results as a basis for discussion in decision-making processes.
One of the main aims of current social robotic research is to improve the robots’ abilities to interact with humans. In order to achieve an interaction similar to that among humans, robots should be able to communicate in an intuitive and natural way and appropriately interpret human affects during social interactions. Similarly to how humans are able to recognize emotions in other humans, machines are capable of extracting information from the various ways humans convey emotions-including facial expression, speech, gesture or text-and using this information for improved human computer interaction. This can be described as Affective Computing, an interdisciplinary field that expands into otherwise unrelated fields like psychology and cognitive science and involves the research and development of systems that can recognize and interpret human affects. To leverage these emotional capabilities by embedding them in humanoid robots is the foundation of the concept Affective Robots, which has the objective of making robots capable of sensing the user’s current mood and personality traits and adapt their behavior in the most appropriate manner based on that. In this paper, the emotion recognition capabilities of the humanoid robot Pepper are experimentally explored, based on the facial expressions for the so-called basic emotions, as well as how it performs in contrast to other state-of-the-art approaches with both expression databases compiled in academic environments and real subjects showing posed expressions as well as spontaneous emotional reactions. The experiments’ results show that the detection accuracy amongst the evaluated approaches differs substantially. The introduced experiments offer a general structure and approach for conducting such experimental evaluations. The paper further suggests that the most meaningful results are obtained by conducting experiments with real subjects expressing the emotions as spontaneous reactions.