Refine
H-BRS Bibliography
- no (60) (remove)
Departments, institutes and facilities
Document Type
- Part of a Book (27)
- Conference Object (19)
- Article (8)
- Book (monograph, edited volume) (3)
- Patent (2)
- Contribution to a Periodical (1)
Year of publication
- 2018 (60) (remove)
Keywords
The nature of the program was an exchange program between Hochschule Bonn-Rhein-Sieg, University of Applied Sciences and the University of Cape Coast. The program was advertised and we applied. We were shortlisted for interview and we were selected as the candidates for the exchange program. The program took a period of five months. We set off from Accra, Ghana to Germany on 7th September 2015, and returned to Ghana on 25th January 2016.
Competency-Based Teaching Using Simulation Exercises: Evidence of the University of Cape Coast
(2018)
Tertiary institutions exist to train manpower to solve local, national, and international problems. Products from such institutions should not be a problem to countries as in the case of some Sub-Saharan African countries including Ghana which has a high level of graduate unemployment. Among the causes of the problem is the nature of teaching or the syllabus or the programs students pursue while in such institutions. The paper discusses one of the teaching strategies used to make a course relevant for a program and for the working world. In this course, students are introduced to practice-oriented learning through simulation exercises. The project activities specifically seek to assess the students’ understanding of business formation; examine students’ understanding of sustainability, creativity and innovation of business ideas; assess their understanding of the functional areas of business including marketing & sales, finance, human resource management, operations, and accounting, among others. Feedback from students who have participated indicates the exercise gave much more exposure and meaning to the concepts they learned in class. In this exercise, students build teams, develop a product, learn to set up a business, and design organogram, business vision, mission, and core values. The exercise empowers students to learn by doing. It accords students the opportunity to review their own knowledge and skills with respect to the concepts they have learned in the course. More than 3000 students have participated in this project since its inception in the academic year 2013/2014. It is estimated that 1000 students will participate in this project in the academic year 2017/2018.
The exchange program was aimed at giving students an international exposure through teaching and intercultural communication and to also enhance the existing relationship among the partner schools. The program lasted for a period of six months from September 2016 to February 2017. The main part of the program was the International Management program which comprised of four courses. The program offered us an opportunity to travel to four European countries to broaden our academic and social network.
I had an opportunity to visit Germany in 2016/2017 during which period I was on an exchange staff program between the University of Nairobi, Hochschule Bonn-Rhein-Sieg, University of Applied Sciences, Germany, and the University of Cape Coast, Ghana. My visit took me to the city of Bonn where the University of Bonn-Rhein-Sieg is located in the suburban area in the cities of Sankt Augustin, Rheinbach, and Hennef. I was able to interact with faculty members and students. During this period, the discussion I had with faculty mainly focused on various programs offered by the university and how they have been able to interact and partner with the industry and create linkages with various firms in Germany. It emerged from our discussion that the development of the curriculum by the university depends on such partnerships.
Evolutionary conservation of the antimicrobial function of mucus: a first defence against infection
(2018)
Mucus layers often provide a unique and multi-functional hydrogel interface between the epithelial cells of organisms and their external environment. Mucus has exceptional properties including elasticity, changeable rheology and an ability to self-repair by reannealing, and is therefore an ideal medium for trapping and immobilising pathogens and serving as a barrier to microbial infection. The ability to produce a functional surface mucosa was an important evolutionary step, which evolved first in the Cnidaria, which includes corals, and the Ctenophora. This allowed the exclusion of non-commensal microbes and the subsequent development of the mucus-lined digestive cavity seen in higher metazoans. The fundamental architecture of the constituent glycoprotein mucins is also evolutionarily conserved. Although an understanding of the biochemical interactions between bacteria and the mucus layer are important to the goal of developing new antimicrobial strategies, they remain relatively poorly understood. This review summarises the physicochemical properties and evolutionary importance of mucus, which make it so successful in the prevention of bacterial infection. In addition, the strategies developed by bacteria to counteract the mucus layer are also explored.
The formulation of transport network problems is represented as a translation between two domain specific languages: from a network description language, used by network simulation community, to a problem description language, understood by generic non-linear solvers. A universal algorithm for this translation is developed, an estimation of its computational complexity given, and an efficient application of the algorithm demonstrated on a number of realistic examples. Typically, for a large gas transport network with about 10K elements the translation and solution of non-linear system together require less than 1 sec on the common hardware. The translation procedure incorporates several preprocessing filters, in particular, topological cleaning filters, which accelerate the solution procedure by factor 8.
Due to regionalization and global competition, many companies have turned their attention to other markets outside the domestic ones in anticipation of securing profitable market(s) for their products. Cormart (Nigeria) Limited is one of such companies, seeking to expand beyond its domestic borders. Cormart is a Nigerian trading company specializing in Industrial Raw Materials and Chemicals. It represents the business interests of top Multinational Companies that wish to do business in Nigeria. In line with its expansion strategy, Cormart seeks to introduce its newly developed spray starch product (RENEW) into the Ghanaian market.
Further development on globally convergent algorithms for solution of stationary network problems is presented. The algorithms make use of global non-degeneracy of Jacobi matrix of the system, composed of Kirchhoff's flow conservation conditions and transport element equations. This property is achieved under certain monotonicity conditions on element equations and guarantees an existence of a unique solution of the problem as well as convergence to this solution from an arbitrary starting point. In application to gas transport networks, these algorithms are supported by a proper modeling of gas compressors, based on individually calibrated physical characteristics. This paper extends the modeling of compressors by hierarchical methods of topological reduction, combining the working diagrams for parallel and sequential connections of compressors. Estimations are also made for application of topological reduction methods beyond the compressor stations in generic network problems. Efficiency of the methods is tested by numerical experiments on realistic networks.
Variable Sterne sind Sterne, welche in bestimmten Messparametern variabel sind. In unserem Fall ist dies die Helligkeit der Sterne. Grundsätzlich gibt es hier zwei Arten der Variabilität, intrinsiche und extrinsische Prozesse. Unter intrinischen Prozessen versteht man Variabilität, deren Ursache im Stern selbst liegt.
Anne Dreller shows that data sharing offers great opportunities and huge value creation potential for the business world. Despite many opportunities that data sharing promises, the business world has not fully operationalized this fact yet, due to various existing challenges. Thus, an exemplary, future-oriented, and platform-based data sharing business model is developed for the startup Quemey. This business model is also equipped with prioritized implementation advice, including measures like focusing on strong values for all platform participants, growing their business into a powerful monopolist position, and eliminating barriers of technological, contractual and legal or data privacy uncertainties.
The main objective of this chapter is to give insights into how H-BRS as a German University of Applied Sciences supports small and medium-sized enterprises (SMEs) in exploring African markets. The university achieves this objective by engaging its Bachelor and Master level students in applied market research. Students engage in this research as part of their final thesis writing. This chapter lays out a process for successful marketing research projects for German SMEs in nine steps.
Kontemporäre Service-orientierte Systeme sind hochgradig vernetzt und haben zudem die Eigenschaft massiv-skalierbar zu sein. Diese Charakteristiken stellen im besonderen Maße Anforderungen an die Datensicherheit der Anwender solcher Systeme und damit primär an alle Stakeholder der Softwareentwicklung, die in der Verantwortung sind, passgenaue Sicherheitsmechanismen effektiv in die Softwareprodukte zu bringen. Die Effektivität von Sicherheitsarchitekturen in service-orientierten Systemen hängt maßgeblich von der richtigen Nutzung und Integration von Security-APIs durch eine heterogene Gruppe von Softwareentwicklern ab, bei der nicht per se ein fundiertes Hintergrundwissen über komplexe digitale Sicherheitsmechanismen vorausgesetzt werden kann. Die Diskrepanz zwischen komplexen und in der Anwendung fehleranfälligen APIs und einem fehlenden Verständnis für die zugrundeliegenden Sicherheitskonzepte auf Seiten der Nutzer begünstigt in der Praxis unsichere Softwaresysteme. Aus diesem Grund ist die Gebrauchstauglichkeit von Security-APIs besonders relevant, damit Programmierer den benötigten Funktionsumfang effektiv, effizient und zufriedenstellend verwenden können. Abgeleitet von dieser Problemstellung, konzentriert sich das Dissertationsvorhaben auf die gebrauchstaugliche Ausgestaltung von Security-APIs und den Herausforderungen die sich aus den Methoden zur Evaluation der Usability in typischen Umgebungen der Softwareentwicklung ergeben.
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many cases developers are overburdened by the complex set of programming choices and their security implications. Past studies have identified significant challenges when using cryptographic APIs that lack a certain set of usability features (e.g. easy-to-use documentation or meaningful warning and error messages) leading to an especially high likelihood of writing functionally correct but insecure code.
To support software developers in writing more secure code, this work investigates a novel approach aimed at these hard-to-use cryptographic APIs. In a controlled online experiment with 53 participants, we study the effectiveness of API-integrated security advice which informs about an API misuse and places secure programming hints as guidance close to the developer. This allows us to address insecure cryptographic choices including encryption algorithms, key sizes, modes of operation and hashing algorithms with helpful documentation in the guise of warnings. Whenever possible, the security advice proposes code changes to fix the responsible security issues. We find that our approach significantly improves code security. 73% of the participants who received the security advice fixed their insecure code.
We evaluate the opportunities and challenges of adopting API-integrated security advice and illustrate the potential to reduce the negative implications of cryptographic API misuse and help developers write more secure code.
Software development is a complex task. Merely focussing on functional requirements is not sufficient any more. Developers are responsible to take many non-functional requirements carefully into account. Security is amongst the most challenging, as getting it wrong will result in a large user-base being potentially at risk. A similar situation exists for administrators. Security defaults have been put into place here to encounter lacking security controls. As first attempts to establish security by default in software development are flourishing, the question on their usability for developers arises.
In this paper we study the effectiveness and efficiency of Content Security Policy (CSP) enforced as security default in a web framework. When deployed correctly, CSP is a valid protection mean in a defence-in-depth strategy against code injection attacks. In this paper we present a first qualitative laboratory study with 30 participants to discover how developers deal with CSP when deployed as security default. Our results emphasize that the deployment as security default has its benefits but requires careful consideration of a comprehensive information flow in order to improve and not weaken security. We provide first insights to inform research about aiding developers in the creation of secure web applications with usable security by default.