Refine
Departments, institutes and facilities
- Fachbereich Informatik (74)
- Fachbereich Wirtschaftswissenschaften (70)
- Fachbereich Ingenieurwissenschaften und Kommunikation (67)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (61)
- Fachbereich Angewandte Naturwissenschaften (44)
- Fachbereich Sozialpolitik und Soziale Sicherung (36)
- Institut für funktionale Gen-Analytik (IFGA) (25)
- Institut für Verbraucherinformatik (IVI) (20)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (20)
- Graduierteninstitut (12)
Document Type
- Article (121)
- Conference Object (86)
- Part of a Book (44)
- Book (monograph, edited volume) (18)
- Doctoral Thesis (13)
- Preprint (13)
- Video (9)
- Master's Thesis (8)
- Research Data (6)
- Report (5)
Year of publication
- 2023 (343) (remove)
Keywords
- Normen (9)
- Normen-ABC (9)
- Normenkompetenz (9)
- Normenwissen (9)
- Virtual Reality (4)
- Global horizontal irradiance (3)
- Lehrbuch (3)
- Machine Learning (3)
- Quality diversity (3)
- Wirtschaftsmathematik (3)
Die Projektverbünde in der Förderlinie FDMScouts.nrw haben am 28.03.2023 die Online-Veranstaltung "#datendienstag: Datenmanagementpläne und Forschungsdatenmanagement in Forschungsanträgen" angeboten. Der Vortrag richtete sich an Forschende und Infrastrukturangehörige – vor allem aus der Forschungsförderung, welche die Antragsstellung begleiten.
Viele Drittmittelgeber erwarten als Teil eines Förderantrags Informationen zum Umgang mit Forschungsdaten. Ein formeller Datenmanagementplan (DMP) wird nur in den seltensten Fällen verlangt. Dennoch ist ein DMP für die Arbeit in einem Forschungsprojekt von Vorteil. Welche Vorteile dies sind und welche Anforderungen Forschende bei der Antragstellung bezüglich des FDMs zu erwarten haben, waren – neben Tipps und Tricks – Gegenstand dieser Veranstaltung.
Ziel der neunten Ausgabe des wissenschaftlichen Workshops "Usable Security und Privacy" auf der Mensch und Computer 2023 ist es, aktuelle Forschungs- und Praxisbeiträge auf diesem Gebiet zu präsentieren und mit den Teilnehmer:innen zu diskutieren. Getreu dem Konferenzmotto "Building Bridges" soll mit dem Workshop ein etabliertes Forum fortgeführt und weiterentwickelt werden, in dem sich Expert:innen, Forscher:innen und Praktiker:innen aus unterschiedlichen Domänen transdisziplinär zum Thema Usable Security und Privacy austauschen können. Das Thema betrifft neben dem Usability- und Security-Engineering unterschiedliche Forschungsgebiete und Berufsfelder, z. B. Informatik, Ingenieurwissenschaften, Mediengestaltung und Psychologie. Der Workshop richtet sich an interessierte Wissenschaftler:innen aus all diesen Bereichen, aber auch ausdrücklich an Vertreter:innen der Wirtschaft, Industrie und öffentlichen Verwaltung.
The continuously increasing number of biomedical scholarly publications makes it challenging to construct document recommendation algorithms that can efficiently navigate through literature. Such algorithms would help researchers in finding similar, relevant, and related publications that align with their research interests. Natural Language Processing offers various alternatives to compare publications, ranging from entity recognition to document embeddings. In this paper, we present the results of a comparative analysis of vector-based approaches to assess document similarity in the RELISH corpus. We aim to determine the best approach that resembles relevance without the need for further training. Specifically, we employ five different techniques to generate vectors representing the text in the documents. These techniques employ a combination of various Natural Language Processing frameworks such as Word2Vec, Doc2Vec, dictionary-based Named Entity Recognition, and state-of-the-art models based on BERT. To evaluate the document similarity obtained by these approaches, we utilize different evaluation metrics that account for relevance judgment, relevance search, and re-ranking of the relevance search. Our results demonstrate that the most promising approach is an in-house version of document embeddings, starting with word embeddings and using centroids to aggregate them by document.
Electrical signal transmission in power electronic devices takes place through high-purity aluminum bonding wires. Cyclic mechanical and thermal stresses during operation lead to fatigue loads, resulting in premature failure of the wires, which cannot be reliably predicted. The following work presents two fatigue lifetime models calibrated and validated based on experimental fatigue results of an aluminum bonding wire and subsequently transferred and applied to other wire types. The lifetime modeling of Wöhler curves for different load ratios shows good but limited applicability for the linear model. The model can only be applied above 10,000 cycles and within the investigated load range of R = 0.1 to R = 0.7. The nonlinear model shows very good agreement between model prediction and experimental results over the entire investigated cycle range. Furthermore, the predicted Smith diagram is not only consistent in the investigated load range but also in the extrapolated load range from R = −1.0 to R = 0.8. A transfer of both model approaches to other wire types by using their tensile strengths can be implemented as well, although the nonlinear model is more suitable since it covers the entire load and cycle range.
Climate change is increasingly affecting vulnerable groups and resulting in dire social and economic consequences, especially for those in the Global South. Managing current and emerging climate-related risks will require increasing individual’s and communities’ resilience, including enhancing absorptive, adaptive, and transformative capacities. Policymakers are now considering the role that social protection policies and programmes can play in building climate resilience by contributing to these capacities. However, there is a limited understanding of the extent to which social protection instruments can influence these three resilience-related capacities. Lack of assessment tools or frameworks might contribute to limited evidence of social protection’s ability to increase climate resilience. In particular, there appear to be no frameworks or tools that help assess the role of social cash transfers (SCT) in building adaptive capacity. Based on a multi-staged literature review, we develop an adaptive capacity outcomes framework (ACOF) that can help assess SCT’s contribution to building adaptive capacity, and, consequently, resilience. The framework is then tested using impact evaluation and assessment reports from SCT programmes in Indonesia, Zambia, Ethiopia, Bangladesh, and Tanzania. The exercise finds that SCTs alone have a limited contribution to adaptive capacity outcomes, but interventions that combine cash transfers with other components such as nutrition or livelihood training show positive impacts. We find that the ACOF can support assessments of SCT’s contribution towards adaptive capacity. It can help build evidence, evaluate impacts, and through further research, can facilitate learning on SCTs' role in increasing climate resilience.
In the design of robot skills, the focus generally lies on increasing the flexibility and reliability of the robot execution process; however, typical skill representations are not designed for analysing execution failures if they occur or for explicitly learning from failures. In this paper, we describe a learning-based hybrid representation for skill parameterisation called an execution model, which considers execution failures to be a natural part of the execution process. We then (i) demonstrate how execution contexts can be included in execution models, (ii) introduce a technique for generalising models between object categories by combining generalisation attempts performed by a robot with knowledge about object similarities represented in an ontology, and (iii) describe a procedure that uses an execution model for identifying a likely hypothesis of a parameterisation failure. The feasibility of the proposed methods is evaluated in multiple experiments performed with a physical robot in the context of handle grasping, object grasping, and object pulling. The experimental results suggest that execution models contribute towards avoiding execution failures, but also represent a first step towards more introspective robots that are able to analyse some of their execution failures in an explicit manner.
Neuromorphic computing aims to mimic the computational principles of the brain in silico and has motivated research into event-based vision and spiking neural networks (SNNs). Event cameras (ECs) capture local, independent changes in brightness, and offer superior power consumption, response latencies, and dynamic ranges compared to frame-based cameras. SNNs replicate neuronal dynamics observed in biological neurons and propagate information in sparse sequences of ”spikes”. Apart from biological fidelity, SNNs have demonstrated potential as an alternative to conventional artificial neural networks (ANNs), such as in reducing energy expenditure and inference time in visual classification. Although potentially beneficial for robotics, the novel event-driven and spike-based paradigms remain scarcely explored outside the domain of aerial robots.
To investigate the utility of brain-inspired sensing and data processing in a robotics application, we developed a neuromorphic approach to real-time, online obstacle avoidance on a manipulator with an onboard camera. Our approach adapts high-level trajectory plans with reactive maneuvers by processing emulated event data in a convolutional SNN, decoding neural activations into avoidance motions, and adjusting plans in a dynamic motion primitive formulation. We conducted simulated and real experiments with a Kinova Gen3 arm performing simple reaching tasks involving static and dynamic obstacles. Our implementation was systematically tuned, validated, and tested in sets of distinct task scenarios, and compared to a non-adaptive baseline through formalized quantitative metrics and qualitative criteria.
The neuromorphic implementation facilitated reliable avoidance of imminent collisions in most scenarios, with 84% and 92% median success rates in simulated and real experiments, where the baseline consistently failed. Adapted trajectories were qualitatively similar to baseline trajectories, indicating low impacts on safety, predictability and smoothness criteria. Among notable properties of the SNN were the correlation of processing time with the magnitude of perceived motions (captured in events) and robustness to different event emulation methods. Preliminary tests with a DAVIS346 EC showed similar performance, validating our experimental event emulation method. These results motivate future efforts to incorporate SNN learning, utilize neuromorphic processors, and target other robot tasks to further explore this approach.
This paper presents a novel approach to address noise, vibration, and harshness (NVH) issues in electrically assisted bicycles (e-bikes) caused by the drive unit. By investigating and optimising the structural dynamics during early product development, NVH can decisively be improved and valuable resources can be saved, emphasising its significance for enhancing riding performance. The paper offers a comprehensive analysis of the e-bike drive unit’s mechanical interactions among relevant components, culminating—to the best of our knowledge—in the development of the first high-fidelity model of an entire e-bike drive unit. The proposed model uses the principles of elastic multi body dynamics (eMBD) to elucidate the structural dynamics in dynamic-transient calculations. Comparing power spectra between measured and simulated motion variables validates the chosen model assumptions. The measurements of physical samples utilise accelerometers, contactless laser Doppler vibrometry (LDV) and various test arrangements, which are replicated in simulations and provide accessibility to measure vibrations onto rotating shafts and stationary structures. In summary, this integrated system-level approach can serve as a viable starting point for comprehending and managing the NVH behaviour of e-bikes.
A PM2.5 concentration prediction framework with vehicle tracking system: From cause to effect
(2023)
AI systems pose unknown challenges for designers, policymakers, and users which aggravates the assessment of potential harms and outcomes. Although understanding risks is a requirement for building trust in technology, users are often excluded from legal assessments and explanations of AI hazards. To address this issue we conducted three focus groups with 18 participants in total and discussed the European proposal for a legal framework for AI. Based on this, we aim to build a (conceptual) model that guides policymakers, designers, and researchers in understanding users’ risk perception of AI systems. In this paper, we provide selected examples based on our preliminary results. Moreover, we argue for the benefits of such a perspective.
Mobile technologies have evolved into the means of gaining access to information for learning. Its application in higher education is still a novel concept, particularly in underdeveloped countries. This study is aimed at exploring the views of doctoral students regarding their learning experiences with mobile technologies. Student focus group interviews of 24 doctoral students from 3 different academic institutions were interviewed. The participants’ responses were recorded, transcribed, and analyzed to make conclusions. According to the findings of this study, mobile devices play an important part in the learning experiences of doctoral students. The participating students engaged in collaborative learning using mobile technologies. Given the benefits of adopting mobile technologies for learning activities, academic institutions should focus on teaching faculty members to use this to involve students in their learning process. The implications of this study call for the continued advancement of mobile technologies to facilitate effective learning experience for the multitude of mobile learners in developing countries. Another implication is that academic institutions with collaboration with libraries should see the need to develop user friendly mobile app that is linked to the library management system. Such an application would allow the students to optimally use their smartphones and tablets to search the library’s resources from their mobile devices. Training should be offered to the teaching faculty members to come to terms with the benefits of mobile technologies for learning activities.
Host-derived succinate accumulates in the airways during bacterial infection. Here, we show that luminal succinate activates murine tracheal brush (tuft) cells through a signaling cascade involving the succinate receptor 1 (SUCNR1), phospholipase Cβ2, and the cation channel transient receptor potential channel subfamily M member 5 (TRPM5). Stimulated brush cells then trigger a long-range Ca2+ wave spreading radially over the tracheal epithelium through a sequential signaling process. First, brush cells release acetylcholine, which excites nearby cells via muscarinic acetylcholine receptors. From there, the Ca2+ wave propagates through gap junction signaling, reaching also distant ciliated and secretory cells. These effector cells translate activation into enhanced ciliary activity and Cl- secretion, which are synergistic in boosting mucociliary clearance, the major innate defense mechanism of the airways. Our data establish tracheal brush cells as a central hub in triggering a global epithelial defense program in response to a danger-associated metabolite.
Background
Consumers rely heavily on online user reviews when shopping online and cybercriminals produce fake reviews to manipulate consumer opinion. Much prior research focuses on the automated detection of these fake reviews, which are far from perfect. Therefore, consumers must be able to detect fake reviews on their own. In this study we survey the research examining how consumers detect fake reviews online.
Methods
We conducted a systematic literature review over the research on fake review detection from the consumer-perspective. We included academic literature giving new empirical data. We provide a narrative synthesis comparing the theories, methods and outcomes used across studies to identify how consumers detect fake reviews online.
Results
We found only 15 articles that met our inclusion criteria. We classify the most often used cues identified into five categories which were (1) review characteristics (2) textual characteristics (3) reviewer characteristics (4) seller characteristics and (5) characteristics of the platform where the review is displayed.
Discussion
We find that theory is applied inconsistently across studies and that cues to deception are often identified in isolation without any unifying theoretical framework. Consequently, we discuss how such a theoretical framework could be developed.
Users should always play a central role in the development of (software) solutions. The human-centered design (HCD) process in the ISO 9241-210 standard proposes a procedure for systematically involving users. However, due to its abstraction level, the HCD process provides little guidance for how it should be implemented in practice. In this chapter, we propose three concrete practical methods that enable the reader to develop usable security and privacy (USP) solutions using the HCD process. This chapter equips the reader with the procedural knowledge and recommendations to: (1) derive mental models with regard to security and privacy, (2) analyze USP needs and privacy-related requirements, and (3) collect user characteristics on privacy and structure them by user group profiles and into privacy personas. Together, these approaches help to design measures for a user-friendly implementation of security and privacy measures based on a firm understanding of the key stakeholders.
Loading of shipping containers for dairy products often includes a press-fit task, which involves manually stacking milk cartons in a container without using pallets or packaging. Automating this task with a mobile manipulator can reduce worker strain, and also enhance the efficiency and safety of the container loading process. This paper proposes an approach called Adaptive Compliant Control with Integrated Failure Recovery (ACCIFR), which enables a mobile manipulator to reliably perform the press-fit task. We base the approach on a demonstration learning-based compliant control framework, such that we integrate a monitoring and failure recovery mechanism for successful task execution. Concretely, we monitor the execution through distance and force feedback, detect collisions while the robot is performing the press-fit task, and use wrench measurements to classify the direction of collision; this information informs the subsequent recovery process. We evaluate the method on a miniature container setup, considering variations in the (i) starting position of the end effector, (ii) goal configuration, and (iii) object grasping position. The results demonstrate that the proposed approach outperforms the baseline demonstration-based learning framework regarding adaptability to environmental variations and the ability to recover from collision failures, making it a promising solution for practical press-fit applications.
Introduction: The paper analyses – basing itself on reports and other documents created by different parts of the International Labour Organisation (ILO) – the process which led to the adoption of Social Protection Floor Recommendation No. 202 and the shift in focus of social policy advice towards basic protection and to the Global South countries. We look at the actions of different actors which shape the standard setting and policy stand of the organisation. Objective: To provide a comprehensive analysis of the historical trajectory of ILO social security standards, examining the evolution of principles, conventions, and the global dynamics that have shaped the organization's approach to social protection over time. Materials and methods: The methods include examining ILO documents, relevant subject literature, and the author's participant observations from over twenty-years of service in the ILO's Social Security Department, aiming to provide insights into the decision-making processes within the organization. Conclusion: We conclude that change was brought by: 1) shift in the membership of the ILO and of its decision-making bodies towards the increased presence and powers of representatives from countries of the Global South, 2) the shift in the global development community policy priorities towards poverty reduction, 3) emergence of experimental social assistance schemes in Global South countries, with designs often ignoring principles embedded in the ILO standards. The Social Protection Floor Recommendation complements previous standards in response to the challenges of widespread poverty and informality and spreading atypical forms of employment. It provides two directions of policy responses: 1) formalizing informal employment relationships and 2) expanding universal or targeted rights-based social assistance schemes. Assistance provided by ILO to member states focuses now more on building the non-contributory schemes and on identifying the fiscal space necessary to close the coverage gaps. Nowadays, the ILO must collaborate more than before with other development partners and the main challenge is to build among them awareness and acceptance of the principles of the ILO social security standards.
Recent findings in South Africa have once again underlined the fact that the oldest people in the world obviously came from Africa. Thus, historically, this continent has a very special significance. However, its history in more recent times, especially from the mid-19th century onwards, was strongly influenced by colonisation by European states. Many deep wounds from that time still have an impact on society as a whole today. However, the continent is currently also confronted with a greater number of challenges of a different nature.
On the one hand, Africa is trying to strengthen internal cohesion by means of a number of regional organisations and the African Union as a globally active institution; on the other hand, the continent has been marked by political and military conflicts between neighbouring states over the past decades until the recent present. In addition, there are regular internal social upheavals in individual countries due to violent or manipulated political change.
Yet the continent could well be on a good development path, since it has a large number of important raw materials - also in comparison to other continents. However, the individual African states - and especially their citizens - often do not benefit from this to an adequate extent. This results in a social imbalance in large parts of the continent (data collection until the end of June 2023), which leads to considerable internal tensions. To make matters worse, Africa is the continent most affected by climate change.
A closer look at the partly very different economic, political and social situations of the large continent leads to an overall predominantly critical assessment of Africa's further development, which is explained in more detail in the final chapter with regard to the foreseeable consequences for the continent.
Neueste Funde in Südafrika haben nochmals unterstrichen, dass die ältesten Menschen der Welt offensichtlich aus Afrika abstammen. Somit kommt diesem Kontinent historisch gesehen ganz besondere Bedeutung zu. Allerdings war seine Geschichte in der jüngeren Zeit, insbesondere ab Mitte des 19. Jahrhunderts, von der Kolonialisierung durch europäische Staaten stark geprägt. Viele tiefe Wunden aus der damaligen Zeit haben noch heute Auswirkungen auf die Gesellschaft insgesamt. Allerdings ist der Kontinent derzeit auch mit einer größeren Zahl anders gelagerter Herausforderungen konfrontiert.
Zum einen versucht Afrika mittels einer Anzahl von Regionalorganisationen sowie der Afrikanischen Union als global agierender Institution den inneren Zusammenhalt zu stärken, zum anderen ist der Kontinent über die letzten Jahrzehnte bis in die jüngste Gegenwart durch politische und militärische Konflikte zwischen Nachbarstaaten geprägt. Hinzu kommen regelmäßig innere gesellschaftliche Umwälzungen einzelner Länder durch einen gewaltsamen oder manipulierten politischen Wechsel.
Dabei könnte der Kontinent sich durchaus auf einem guten Entwicklungspfad befinden, verfügt er doch – auch im Vergleich zu anderen Kontinenten – über eine Vielzahl von wichtigen Rohstoffen. Allerdings profitieren die einzelnen afrikanischen Staaten – und insbesondere ihre Bürgerinnen und Bürger - hiervon oft nicht in einem angemessenen Rahmen. Somit ergibt sich in großen Teilen des Kontinents ein soziales Ungleichgewicht, das zu erheblichen inneren Spannungen führt. Erschwerend kommt hinzu, dass Afrika weltweit am stärksten vom Klimawandel betroffen ist.
Bei näherer Betrachtung der z.T. sehr unterschiedlichen wirtschaftlichen, politischen und sozialen Situation des großen Kontinents (Datenerhebung bis Ende Juni 2023) führt die vorliegende Untersuchung zu einer insgesamt überwiegend kritischen Einschätzung hinsichtlich der weiteren Entwicklung Afrikas, die im Schlusskapitel bzgl. der absehbaren Konsequenzen für den Kontinent näher dargelegt wird.
Wenn von Nachrichtenauswahl und Thematisierungsfunktion der Medien die Rede ist, fällt schnell das Fachwort Agenda-Setting. Der gegenteilige Begriff, das Agenda-Cutting, ist dagegen viel seltener Gegenstand von wissenschaftlichen oder gesellschaftlichen Diskussionen. Dabei ist das Agenda-Cutting eine weitflächig geübte Praxis in Medien, Politik und Gesellschaft, bei der Themen bewusst oder unbewusst aus den gesellschaftlichen Diskursen entfernt oder herausgehalten werden. Die Initiative Nachrichtenaufklärung beschäftigt sich schon lange intensiv mit der Frage der Vernachlässigung von Themen und Nachrichten. Mit diesem Sammelband wird erstmals das Thema wissenschaftlich tiefgehend von verschiedenen Seiten aus betrachtet.
The paper investigates the nature of Kenya's entrepreneurship education ecosystem (EEE) through a comparative analysis of three entrepreneurship education programs and an examination of how the institutions foster a favourable entrepreneurial environment. This study looks at the entrepreneurship education ecosystem through the lens of universities, NGO's and private institutes in Kenya.
A systemic analysis of EEE is provided by utilizing the Actiotope Model as a conceptual framework. The exploratory research adopts a pragmatic mixed-method methodological approach best suited to understand the research problem.
The results reveal that entrepreneurship education at higher education institutions was primarily theoretical and relied on traditional forms of entrepreneurship education. Recurring rigid patterns show minimal personalization of content and learning styles within the University, with more personalization reported in the Mully Model of education and the more specialized entrepreneurship program of the Identity Projects.
The adaptation of the Actiotope Model provided a new and unique approach to analyzing entrepreneurship ecosystems. The person-centred approach of the model provides valuable insights to learners and to entrepreneurship education institutions and researchers.
Enhanced collaboration between the different entrepreneurial education stakeholders could be a more effective short to medium-term solution to addressing the gaps in entrepreneurial education at tertiary institutions.
In the long term, the study recommends adopting practical-based and goal-oriented entrepreneurship teaching models.
Nitrosamines have been identified as a probable human carcinogen and thus are of high concern in many manufacturing industries and various matrices (for example pharmaceutical, cosmetic and food products, workplace air or potable- and wastewater). This study aims to analyse nine nitrosamines relevant in the field of occupational safety using a gas chromatography-drift tube ion mobility spectrometry (GC-DT-IMS) system. To do this, single nitrosamine standards as well as a standard mix, each at 0.1 g/L, were introduced via liquid injection. A GC-DT-IMS method capable of separating the nitrosamine signals according to retention time (first dimension) and drift time (second dimension) in 10 min was developed. The system shows excellent selectivity as each nitrosamine gives two signals pertaining to monomer and dimer in the second dimension. For the first time, reduced ion mobility values for nitrosamines were determined, ranging from 1.18 to 2.03 cm2s−1V−1. The high selectivity of the GC-DT-IMS method could provide a definite advantage for monitoring nitrosamines in different manufacturing industries and consumer products.
PURPOSE
Cervical cancer (CC) is caused by a persistent high-risk human papillomavirus (hrHPV) infection. The cervico-vaginal microbiome may influence the development of (pre)cancer lesions. Aim of the study was (i) to evaluate the new CC screening program in Germany for the detection of high-grade CC precursor lesions, and (ii) to elucidate the role of the cervico-vaginal microbiome and its potential impact on cervical dysplasia.
METHODS
The microbiome of 310 patients referred to colposcopy was determined by amplicon sequencing and correlated with clinicopathological parameters.
RESULTS
Most patients were referred for colposcopy due to a positive hrHPV result in two consecutive years combined with a normal PAP smear. In 2.1% of these cases, a CIN III lesion was detected. There was a significant positive association between the PAP stage and Lactobacillus vaginalis colonization and between the severity of CC precursor lesions and Ureaplasma parvum.
CONCLUSION
In our cohort, the new cervical cancer screening program resulted in a low rate of additional CIN III detected. It is questionable whether these cases were only identified earlier with additional HPV testing before the appearance of cytological abnormalities, or the new screening program will truly increase the detection rate of CIN III in the long run. Colonization with U. parvum was associated with histological dysplastic lesions. Whether targeted therapy of this pathogen or optimization of the microbiome prevents dysplasia remains speculative.
Analytical Chemistry I
(2023)
This workbook takes you through the successful work Harris, Textbook of Quantitative Analysis and is designed primarily for self-study. In five parts, the lecture content of analytical chemistry is summarized and explained using selected examples. Basic concepts of analytical chemistry are presented as well as the principle and various techniques of dimensional analysis and chromatography. UV/VIS, infrared and Raman spectroscopy are used to explain the investigation of molecularly present compounds, and selected techniques of atomic spectroscopy conclude the introduction to the fundamentals of analysis. The textbook's essential sections and illustrations are repeatedly referred to, which facilitates independent learning of the fundamentals of analytical chemistry.
Angewandte Makroökonomie
(2023)
Arten von Normen
(2023)
Dieses Video aus der Videoreihe „Normen-ABC“ erklärt die Herkunft und Arten von Normen. Es werden Beispiele für Normen von A bis Z gezeigt. Anhand der Planungsnorm für Projektmanagement, der ersten deutschen DIN 1 als Ausführungsnorm und der weltweit verbreiteten Prüfnorm sowie Managementnormen zur Förderung von Nachhaltigkeit wird eine Einordnung im PDCA-Zyklus gezeigt.
Intelligent virtual agents provide a framework for simulating more life-like behavior and increasing plausibility in virtual training environments. They can improve the learning process if they portray believable behavior that can also be controlled to support the training objectives. In the context of this thesis, cognitive agents are considered a subset of intelligent virtual agents (IVA) with the focus on emulating cognitive processes to achieve believable behavior. The complexity of employed algorithms, however, is often limited since multiple agents need to be simulated in real-time. Available solutions focus on a subset of the indicated aspects: plausibility, controllability, or real-time capability (scalability). Within this thesis project, an agent architecture for attentive cognitive agents is developed that considers all three aspects at once. The result is a lightweight cognitive agent architecture that is customizable to application-specific requirements. A generic trait-based personality model influences all cognitive processes, facilitating the generation of consistent and individual behavior. An additional mapping process provides a formalized mechanism to transfer results of psychological studies to the architecture. Personality profiles are combined with an emotion model to achieve situational behavior adaptation. Which action an agent selects in a situation also influences plausibility. An integral element of this selection process is an agent's knowledge about its world. Therefore, synthetic perception is modeled and integrated into the architecture to provide a credible knowledge base. The developed perception module includes a unified sensor interface, a memory hierarchy, and an attention process. With the presented realization of the architecture (CAARVE), it is possible for the first time to simulate cognitive agents, whose behaviors are simultaneously computable in real-time and controllable. The architecture's applicability is demonstrated by integrating an agent-based traffic simulation built with CAARVE into a bicycle simulator for road-safety education. The developed ideas and their realization are evaluated within this work using different strategies and scenarios. For example, it is shown how CAARVE agents utilize personality profiles and emotions to plausibly resolve deadlocks in traffic simulations. Controllability and adaptability are demonstrated in additional scenarios. Using the realization, 200 agents can be simulated in real-time (50 FPS), illustrating scalability. The achieved results verify that the developed architecture can generate plausible and controllable agent behavior in real-time. The presented concepts and realizations provide sound fundamentals to everyone interested in simulating IVA in real-time environments.
A company's financial documents use tables along with text to organize the data containing key performance indicators (KPIs) (such as profit and loss) and a financial quantity linked to them. The KPI’s linked quantity in a table might not be equal to the similarly described KPI's quantity in a text. Auditors take substantial time to manually audit these financial mistakes and this process is called consistency checking. As compared to existing work, this paper attempts to automate this task with the help of transformer-based models. Furthermore, for consistency checking it is essential for the table's KPIs embeddings to encode the semantic knowledge of the KPIs and the structural knowledge of the table. Therefore, this paper proposes a pipeline that uses a tabular model to get the table's KPIs embeddings. The pipeline takes input table and text KPIs, generates their embeddings, and then checks whether these KPIs are identical. The pipeline is evaluated on the financial documents in the German language and a comparative analysis of the cell embeddings' quality from the three tabular models is also presented. From the evaluation results, the experiment that used the English-translated text and table KPIs and Tabbie model to generate table KPIs’ embeddings achieved an accuracy of 72.81% on the consistency checking task, outperforming the benchmark, and other tabular models.