Refine
H-BRS Bibliography
- yes (4915) (remove)
Departments, institutes and facilities
- Fachbereich Wirtschaftswissenschaften (1241)
- Fachbereich Informatik (1148)
- Fachbereich Angewandte Naturwissenschaften (766)
- Fachbereich Ingenieurwissenschaften und Kommunikation (636)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (480)
- Präsidium (404)
- Fachbereich Sozialpolitik und Soziale Sicherung (402)
- Institute of Visual Computing (IVC) (313)
- Institut für funktionale Gen-Analytik (IFGA) (241)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (195)
Document Type
- Article (1603)
- Conference Object (1119)
- Part of a Book (689)
- Part of Periodical (410)
- Book (monograph, edited volume) (370)
- Report (145)
- Preprint (88)
- Working Paper (87)
- Contribution to a Periodical (83)
- Doctoral Thesis (70)
Year of publication
Keywords
- Lehrbuch (85)
- Deutschland (27)
- Nachhaltigkeit (27)
- Controlling (23)
- Unternehmen (23)
- Digitalisierung (17)
- Management (17)
- Betriebswirtschaftslehre (16)
- Machine Learning (16)
- Corporate Social Responsibility (15)
Berufsgenossenschaft
(2004)
Solid-Phase Microextraction (SPME) is a very simple and efficient, solventless sample preparation method, invented by Pawliszyn and coworkers at the University of Waterloo (Canada) in 1989. This method has been widely used in different fields of analytical chemistry since its first applications to environmental and food analysis. SPME integrates sampling, extraction, concentration and sample introduction into a single solvent-free step. The method saves preparation time, disposal costs and can improve detection limits. It has been routinely used in combination with gas chromatography (GC) and gas chromatography/mass spectrometry (GC/MS) and successfully applied to a wide variety of ompounds, especially for the extraction of volatile and semi-volatile organic compounds from environmental, biological and food samples.
Since the last twenty years, SPME in headspace (HS) mode is used as a valuable sample preparation technique for identifying degradation products in polymers and for determination of rest monomers and other light-boiling substances in polymeric materials. For more than ten years, our laboratory has been involved in projects focused on the application of HS-SPME-GC/MS for the characterization of polymeric materials from many branches of manufacturing and building industries. This book chapter describes the application examples of this technique for identifying volatile organic compounds (VOCs), additives and degradation products in industrial plastics, rubber, and packaging materials.
Elektronik für Entscheider
(2017)
Dieses Buch gibt Nichtingenieuren, die sich beruflich mit Elektronik beschäftigen, die Möglichkeit, sich ein Stück auf dieses Fachgebiet zu begeben, um Aufgaben, Sprache und Vorgehensweise von Ingenieuren zu verstehen. Ziel ist es dabei nicht, nach dem Lesen dieses Buches eine elektronische Schaltung entwickeln zu können. Im Vordergrund steht vielmehr ein generelles Verständnis für die Zusammenhänge und Grundbegriffe der Elektronik.
Emotional communication is a key element of habilitation care of persons with dementia. It is, therefore, highly preferable for assistive robots that are used to supplement human care provided to persons with dementia, to possess the ability to recognize and respond to emotions expressed by those who are being cared-for. Facial expressions are one of the key modalities through which emotions are conveyed. This work focuses on computer vision-based recognition of facial expressions of emotions conveyed by the elderly.
Although there has been much work on automatic facial expression recognition, the algorithms have been experimentally validated primarily on young faces. The facial expressions on older faces has been totally excluded. This is due to the fact that the facial expression databases that were available and that have been used in facial expression recognition research so far do not contain images of facial expressions of people above the age of 65 years. To overcome this problem, we adopt a recently published database, namely, the FACES database, which was developed to address exactly the same problem in the area of human behavioural research. The FACES database contains 2052 images of six different facial expressions, with almost identical and systematic representation of the young, middle-aged and older age-groups.
In this work, we evaluate and compare the performance of two of the existing imagebased approaches for facial expression recognition, over a broad spectrum of age ranging from 19 to 80 years. The evaluated systems use Gabor filters and uniform local binary patterns (LBP) for feature extraction, and AdaBoost.MH with multi-threshold stump learner for expression classification. We have experimentally validated the hypotheses that facial expression recognition systems trained only on young faces perform poorly on middle-aged and older faces, and that such systems confuse ageing-related facial features on neutral faces with other expressions of emotions. We also identified that, among the three age-groups, the middle-aged group provides the best generalization performance across the entire age spectrum. The performance of the systems was also compared to the performance of humans in recognizing facial expressions of emotions. Some similarities were observed, such as, difficulty in recognizing the expressions on older faces, and difficulty in recognizing the expression of sadness.
The findings of our work establish the need for developing approaches for facial expression recognition that are robust to the effects of ageing on the face. The scientific results of our work can be used as a basis to guide future research in this direction.
Population ageing and growing prevalence of disability have resulted in a growing need for personal care and assistance. The insufficient supply of personal care workers and the rising costs of long-term care have turned this phenomenon into a greater social concern. This has resulted in a growing interest in assistive technology in general, and assistive robots in particular, as a means of substituting or supplementing the care provided by humans, and as a means of increasing the independence and overall quality of life of persons with special needs. Although many assistive robots have been developed in research labs world-wide, very few are commercially available. One of the reasons for this, is the cost. One way of optimising cost is to develop solutions that address specific needs of users. As a precursor to this, it is important to identify gaps between what the users need and what the technology (assistive robots) currently provides. This information is obtained through technology mapping.
The current literature lacks a mapping between user needs and assistive robots, at the level of individual systems. The user needs are not expressed in uniform terminology across studies, which makes comparison of results difficult. In this research work, we have illustrated the technology mapping of assistive robots using the International Classification of Functioning, Disability and Health (ICF). ICF provides standard terminology for expressing user needs in detail. Expressing the assistive functions of robots also in ICF terminology facilitates communication between different stakeholders (rehabilitation professionals, robotics researchers, etc.).
We also investigated existing taxonomies for assistive robots. It was observed that there is no widely accepted taxonomy for classifying assistive robots. However, there exists an international standard, ISO 9999, which classifies commercially available assistive products. The applicability of the latest revision of ISO 9999 standard for classifying mobility assistance robots has been studied. A partial classification of assistive robots based on ISO 9999 is suggested. The taxonomy and technology mapping are illustrated with the help of four robots that have the potential to provide mobility assistance. These are the SmartCane, the SmartWalker, MAid and Care-O-bot (R) 3. SmartCane, SmartWalker and MAid provide assistance by supporting physical movement. Care-O-bot (R) 3 provides assistance by reducing the need to move.
Recent work in image captioning and scene-segmentation has shown significant results in the context of scene-understanding. However, most of these developments have not been extrapolated to research areas such as robotics. In this work we review the current state-ofthe- art models, datasets and metrics in image captioning and scenesegmentation. We introduce an anomaly detection dataset for the purpose of robotic applications, and we present a deep learning architecture that describes and classifies anomalous situations. We report a METEOR score of 16.2 and a classification accuracy of 97 %.
Smart home systems change the way we experience the home. While there are established research fields within HCI for visualizing specific use cases of a smart home, studies targeting user demands on visualizations spanning across multiple use cases are rare. Especially, individual data-related demands pose a challenge for usable visualizations. To investigate potentials of an end-user development (EUD) approach for flexibly supporting such demands, we developed a smart home system featuring both pre-defined visualizations and a visualization creation tool. To evaluate our concept, we installed our prototype in 12 households as part of a Living Lab study. Results are based on three interview studies, a design workshop and system log data. We identified eight overarching interests in home data and show how participants used pre-defined visualizations to get an overview and the creation tool to not only address specific use cases but also to answer questions by creating temporary visualizations.
Smart home systems are becoming an integral feature of the emerging home IT market. Under this general term, products mainly address issues of security, energy savings and comfort. Comprehensive systems that cover several use cases are typically operated and managed via a unified dashboard. Unfortunately, research targeting user experience (UX) design for smart home interaction that spans several use cases or covering the entire system is scarce. Furthermore, existing comprehensive and user-centered longterm studies on challenges and needs throughout phases of information collection, installation and operation of smart home systems are technologically outdated. Our 18-month Living Lab study covering 14 households equipped with smart home technology provides insights on how to design for improving smart home appropriation. This includes a stronger sensibility for household practices during setup and configuration, flexible visualizations for evolving demands and an extension of smart home beyond the location.
Von Spechten, Regentropfen und Herzschlägen: Vergleichende Frequenzanalyse periodischer Signale
(2017)
Nahezu jede Einleitung allgemeinverständlicher Publikationen zur Herzratenvariabilität beginnt mit dem Wang Shu-He zugeschriebenen Zitat: "Wenn das Herz so regelmäßig wie das Klopfen eines Spechtes oder das Tröpfeln des Regens auf dem Dach wird, wird der Patient innerhalb von 4 Tagen sterben". Trotz der häufigen Verwendung dieses Zitats sind keine vergleichenden Analysen von Herzratenvariabilität, Spechttrommlern und Regentropfen verfügbar. Dies war Anlass zu den hier vorgestellten Messungen und dem Versuch, die gewonnenen Registrierungen durch geeignete Aufbereitung mit dem menschlichen Herzschlag vergleichen und zum Zitat ins Verhältnis setzen zu können.
Advances in computer graphics enable us to create digital images of astonishing complexity and realism. However, processing resources are still a limiting factor. Hence, many costly but desirable aspects of realism are often not accounted for, including global illumination, accurate depth of field and motion blur, spectral effects, etc. especially in real‐time rendering. At the same time, there is a strong trend towards more pixels per display due to larger displays, higher pixel densities or larger fields of view. Further observable trends in current display technology include more bits per pixel (high dynamic range, wider color gamut/fidelity), increasing refresh rates (better motion depiction), and an increasing number of displayed views per pixel (stereo, multi‐view, all the way to holographic or lightfield displays). These developments cause significant unsolved technical challenges due to aspects such as limited compute power and bandwidth. Fortunately, the human visual system has certain limitations, which mean that providing the highest possible visual quality is not always necessary. In this report, we present the key research and models that exploit the limitations of perception to tackle visual quality and workload alike. Moreover, we present the open problems and promising future research targeting the question of how we can minimize the effort to compute and display only the necessary pixels while still offering a user full visual experience.
Within qualitative interviews we examine attitudes towards driverless cars in order to investigate new mobility services and explore the impact of such services on everyday mobility. We identified three main issues that we would like to discuss in the workshop: (I) Designing beyond a driver-centric approach; (II) Developing mobility services for cars which drive themselves; and (III) Exploring self-driving practices.
Mobilitäts- und Nachhaltigkeitsforscher sehen sich bei der Erforschung des Mobilitätsverhaltens von Personen mit einer bunten Palette an Erhebungsmethoden konfrontiert. Erweitert wird diese Vielfalt in der letzten Zeit durch die Möglichkeit, dieses Verhalten direkt über die Smartphones der Probanden zu erfassen. Um die Auswahl geeigneter Methoden zu erleichtern, liefert die vorliegende Literaturstudie einen detaillierten Überblick zu Fragestellungen, Daten und Erhebungsmethoden, die im Bereich der Mobilitätsforschung zur Erfassung von Alltagsmobilität eingesetzt werden.
Dieser Artikel stützt sich auf das vom 13.10.2015 bis 12.01.2016 gemeinsam durchgeführten Praxisprojekt von ORBIT und der Hochschule Bonn-Rhein-Sieg. Thema des Projekts waren die Methodenevaluation und Automatisierung von Auswertungsprozessen. Speziell ging es um die Überprüfung der von ORBIT entwickelten Methodik zur Anforderungsanalyse und Standortbestimmung – dem ORBIT-Navigator.
This paper introduces our robotic system named UGAV (Unmanned Ground-Air Vehicle) consisting of two semi-autonomous robot platforms, an Unmanned Ground Vehicle (UGV) and an Unmanned Aerial Vehicles (UAV). The paper focuses on three topics of the inspection with the combined UGV and UAV: (A) teleoperated control by means of cell or smart phones with a new concept of automatic configuration of the smart phone based on a RKI-XML description of the vehicles control capabilities, (B) the camera and vision system with the focus to real time feature extraction e.g. for the tracking of the UAV and (C) the architecture and hardware of the UAV.
The MAP-Elites algorithm produces a set of high-performing solutions that vary according to features defined by the user. This technique to 'illuminate' the problem space through the lens of chosen features has the potential to be a powerful tool for exploring design spaces, but is limited by the need for numerous evaluations. The Surrogate-Assisted Illumination (SAIL) algorithm, introduced here, integrates approximative models and intelligent sampling of the objective function to minimize the number of evaluations required by MAP-Elites.
The ability of SAIL to efficiently produce both accurate models and diverse high-performing solutions is illustrated on a 2D airfoil design problem. The search space is divided into bins, each holding a design with a different combination of features. In each bin SAIL produces a better performing solution than MAP-Elites, and requires several orders of magnitude fewer evaluations. The CMA-ES algorithm was used to produce an optimal design in each bin: with the same number of evaluations required by CMA-ES to find a near-optimal solution in a single bin, SAIL finds solutions of similar quality in every bin.
A new method for design space exploration and optimization, Surrogate-Assisted Illumination (SAIL), is presented. Inspired by robotics techniques designed to produce diverse repertoires of behaviors for use in damage recovery, SAIL produces diverse designs that vary according to features specified by the designer. By producing high-performing designs with varied combinations of user-defined features a map of the design space is created. This map illuminates the relationship between the chosen features and performance, and can aid designers in identifying promising design concepts. SAIL is designed for use with compu-tationally expensive design problems, such as fluid or structural dynamics, and integrates approximative models and intelligent sampling of the objective function to minimize the number of function evaluations required. On a 2D airfoil optimization problem SAIL is shown to produce hundreds of diverse designs which perform competitively with those found by state-of-the-art black box optimization. Its capabilities are further illustrated in a more expensive 3D aerodynamic optimization task.
Multiple myeloma is the second most common hematological malignancy. Despite all the progress made in treating multiple myeloma, it still remains an incurable disease. Patients are left with a median survival of 4-5 years. The combined treatment of multiple myeloma with histone deacetylase inhibitors and cytokine-induced killer cells provides a promising targeted treatment option for patients. This study investigated the impact of a combined treatment compared to treatment with histone deacetylase inhibitors. The experiments revealed that a treatment with histone deacetylase (HDAC) inhibitors could reduce cell viability to 59% for KMS 18 cell line and 46% for the U-266 cell line. The combined treatment led to a decrease of cell viability to 33% for KMS 18 and 27% for the U-266 cell line, thus showing a significantly better efficacy than the single treatment.
WiFi-based Long Distance (WiLD) networks have emerged as a promising alternative approach for Internet in rural areas. The main hardware components of these networks are commercial off-the-shelf WiFi radios and directional antennas. During our experiences with real-world WiLD networks, we encountered that interference among long-distance links is a major issue even with high gain directional antennas. In this work, we are providing an in-depth analysis of these interference effects by conducting simulations in ns-3. To closely match the real-world interference effects, we implemented a module to load radiation pattern of commonly used antennas. We analyze two different interference scenarios typically present as a part of larger networks. The results show that side-lobes of directional antennas significantly influence the throughput of long-distance WiFi links depending on the orientation. This work emphasizes that the usage of simple directional antenna models needs to be considered carefully.
This study contributes to the growing body of research concerning management consultancies by linking two previously disparate fields of study: (1) the examination of the effectiveness of consulting interventions and (2) the examination of the social processes that aim to create and legitimize the insights, knowledge and capabilities of management consultancies. We propose that consulting firms accumulate social authority in the course of pre-intervention discourse processes that is reflected in their reputation and celebrity. With respect to intervention, this social authority affects change recipients’ commitment to and compliance with the requirements of change implementation. We test the proposed relationships by conducting a measured variable path analysis of 117 change initiatives in German companies that were set up and implemented with the assistance of external consultancies. Our findings indicate that a consulting firm’s levels of both celebrity and reputation affect the change recipients’ commitment to proposed change strategies and thus, indirectly affect their behavioral compliance with the explicit requirements of change implementation.
Was ist dran am Hype um die Cloud? Während Gartner Research bereits von einem Abwärts trend spricht, sehen Prof. Alda und Prof. Bonne von der Hochschule Bonn-Rhein-Sieg viele gewinnbringende Anwendungsszenarien in der Praxis. Insbesondere auf den Finance- und Accounting-Bereich lassen sich die positiven Vorteile einer Cloud- Lösung übertragen.
Die Forschung zur kontrovers diskutierten Robotik in der Pflege und Begleitung von Personen mit Demenz steht noch am Anfang, wenngleich bereits erste Systeme auf dem Markt sind. Der Beitrag gibt entlang beispielhafter, fallbezogener Auszüge Einblicke in das laufende multidisziplinäre Projekt EmoRobot, das sich explorativ und interpretativ mit der Erkundung des Einsatzes von Robotik in der emotionsorientierten Pflege und Versorgung von Personen mit Demenz befasst. Fokussiert werden dabei die je eigenen Relevanzen der Personen mit Demenz.
Sicherung des Jugend- und Spielerschutzes innerhalb des gewerblichen Geldspiels in Deutschland - 2.0
(2017)
Eine wissenschaftliche Analyse zur Zertifizierung des gewerblichen Geldspiels in Deutschland. Die Basis bildet die international und interdisziplinär validierte wissenschaftliche Expertise "Safeguarding the Protection of Minors and Players with Respect to Commercial Gambling in Germany - 2.0". Ziel ist die Qualitätssicherung für einen verantwortlichen Umgang mit Glücks- und Gewinnspielangeboten (Responsible Gaming). Dazu wird ein Prüfkatalog für das gewerbliche Geldspiel in Spielhallen und in Gaststätten vorgestellt und durch Musterformulare unterstützt. Dieses Zertifizierungsverfahren kann auch im internationalen Kontext Impulse geben und gegebenenfalls einen Standard setzen, auch zur Regulierung nicht-regulierter Glücks- und Gewinnspielangebote.
Wirtschaftspolitik
(2017)
Wirtschaftspolitik beschäftigt sich mit den spannungsvollen Beziehungen zwischen Wirtschaft und Politik. Bei wirtschaftspolitischen Fragestellungen gibt es häufig Zielkonflikte, sodass meistens keine Patentlösungen existieren. In der öffentlichen Diskussion wirtschaftspolitischer Maßnahmen treffen zudem Ideologien, Werturteile und Einzelinteressen aufeinander. Das Buch macht Wirtschaftspolitik erlebbar, indem es die Entscheidungen der Akteure mit Theorieansätzen und Fakten verknüpft.
Die Kenntnis wirtschaftspolitischer Grundlagen ist wichtiger Teil der Managementausbildung an Hochschulen. Dieses Buch stellt dazu die wesentlichen Teilbereiche der Wirtschaftspolitik aus didaktischen Gründen getrennt dar. Die Einteilung ist auf die übliche Länge eines Semesters zugeschnitten. Die Wissensvermittlung erfolgt theoretisch fundiert, praxis- und problemorientiert. Jedes Kapitel enthält Literaturempfehlungen zur Nacharbeitung und Vertiefung sowie Übungsaufgaben mit Lösungsverweisen.
Die allgemeine Konnotation von Technik mit Männlichkeit hat Auswirkungen auf die Berufswahlentscheidungen und das Technikverständnis von jungen Frauen. Nur gut 22 Prozent aller Studierenden in den Ingenieurswissenschaften waren 2014 in Deutschland weiblich (vgl. MonitorING)1. Seit Jahren wird versucht, diese Zahlen nach oben zu korrigieren, indem man Programme für Mädchen und junge Frauen anbietet, die erste Kontakte zu technischen Arbeitsfeldern her stellen. Auch für bereits berufstätige Ingenieurinnen gibt es zahlreiche Förderprogramme, um den Drop-out hochqualiizierter Frauen auf der Karriere leiter zu verhindern. Dennoch verändern sich die prozentualen Anteile von Frauen in ingenieurswissenschaftlichen Studiengängen und Berufen kaum. Aktuelle Studien belegen, dass vor allem kulturell bedingte Erwartungen und Einstellungen hierfür verantwortlich sind (vgl. Paulitz 2012).
IT-Sicherheit
(2017)
Andreas Gadatsch und Markus Mangiapane erläutern zentrale Aspekte der Digitalisierung und der IT-Sicherheit, ohne die digitale Geschäftsmodelle und -prozesse nicht realisierbar sind. Die Autoren möchten den Leser für aktuelle Trends im Informationsmanagement und deren Auswirkungen auf IT-Sicherheit sensibilisieren. Wenn man von jedem Punkt der Welt aus einen Prozess nutzen kann, so kann man ihm auch jederzeit von jedem Ort aus schaden, ihn stoppen, verändern oder Daten manipulieren. IT-Sicherheit ist daher die Grundlage zur Realisierung digitaler Prozesse. (Verlagsangaben)
Evolutionary illumination is a recent technique that allows producing many diverse, optimal solutions in a map of manually defined features. To support the large amount of objective function evaluations, surrogate model assistance was recently introduced. Illumination models need to represent many more, diverse optimal regions than classical surrogate models. In this PhD thesis, we propose to decompose the sample set, decreasing model complexity, by hierarchically segmenting the training set according to their coordinates in feature space. An ensemble of diverse models can then be trained to serve as a surrogate to illumination.
Ressourceneffiziente Optimierung von Hohlkörpern aus Kunststoff mittels Multiskalensimulation
(2017)
Neuroevolution methods evolve the weights of a neural network, and in some cases the topology, but little work has been done to analyze the effect of evolving the activation functions of individual nodes on network size, an important factor when training networks with a small number of samples. In this work we extend the neuroevolution algorithm NEAT to evolve the activation function of neurons in addition to the topology and weights of the network. The size and performance of networks produced using NEAT with uniform activation in all nodes, or homogenous networks, is compared to networks which contain a mixture of activation functions, or heterogenous networks. For a number of regression and classification benchmarks it is shown that, (1) qualitatively different activation functions lead to different results in homogeneous networks, (2) the heterogeneous version of NEAT is able to select well performing activation functions, (3) the produced heterogeneous networks are significantly smaller than homogeneous networks.
„Big Data“, „Industrie 4.0“ und „Digitalisierung“ sind in aller Munde und das nicht nur als Heilsbringer. Der „Jobkiller Digitalisierung“ führt in vielen Branchen und auch im Controlling zu einem potenziellen Ersatz des Menschen. Glaubt man diesen düsteren Szenarien, so übernehmen Algorithmen zukünftig weitgehend die Steuerung der Geschäftsprozesse. Der Manager entscheidet allein auf Basis der Informationen, die in Echtzeit automatisch auf sein Handy übermittelt werden. Den Controller sucht man in diesen Prognosen vergeblich.
Geschäftsprozessmanagement
(2017)
While executing actions, service robots may experience external faults because of insufficient knowledge about the actions' preconditions. The possibility of encountering such faults can be minimised if symbolic and geometric precondition models are combined into a representation that specifies how and where actions should be executed. This work investigates the problem of learning such action execution models and the manner in which those models can be generalised. In particular, we develop a template-based representation of execution models, which we call delta models, and describe how symbolic template representations and geometric success probability distributions can be combined for generalising the templates beyond the problem instances on which they are created. Our experimental analysis, which is performed with two physical robot platforms, shows that delta models can describe execution-specific knowledge reliably, thus serving as a viable model for avoiding the occurrence of external faults.
From video games to mobile augmented reality, 3D interaction is everywhere. But simply choosing to use 3D input or 3D displays isn't enough: 3D user interfaces (3D UIs) must be carefully designed for optimal user experience. 3D User Interfaces: Theory and Practice, Second Edition is today's most comprehensive primary reference to building outstanding 3D UIs. Four pioneers in 3D user interface research and practice have extensively expanded and updated this book, making it today's definitive source for all things related to state-of-the-art 3D interaction.
Das Buch schlägt die Brücke zwischen den betriebswirtschaftlich-organisatorischen Methoden und deren IT-gestützter Umsetzung. Prozessmanagement heißt Gestaltung betrieblicher Aufgaben. Neben methodischen Grundlagen bietet das Werk Praxisbeispiele und Übungen. Das Buch von Prof. Gadatsch gilt mittlerweile als der "aktuelle Klassiker", DAS maßgebliche Standardwerk zur IT-gestützten Gestaltung von Geschäftsprozessen.Die achte Auflage wurde vollständig überarbeitet und an die Anforderungen der Digitalisierung angepasst. Das Werk deckt den gesamten „Business Process Management Life-Cycle“ ab. Es behandelt die Entwicklung und das Controlling der Prozessstrategie, die fachliche Modellierung der Prozesse sowie die Unterstützung des Prozessmanagements durch Informationssysteme.
This paper describes the security mechanisms of several wireless building automation technologies, namely ZigBee, EnOcean, ZWave, KNX, FS20, and Home-Matic. It is shown that none of the technologies provides the necessary measure ofsecurity that should be expected in building automation systems. One of the conclusions drawn is that software embedded in systems that are build for a lifetime of twenty years or more needs to be updatable.
The knowledge of Software Features (SFs) is vital for software developers and requirements specialists during all software engineering phases: to understand and derive software requirements, to plan and prioritize implementation tasks, to update documentation, or to test whether the final product correctly implements the requested SF. In most software projects, SFs are managed in conjunction with other information such as bug reports, programming tasks, or refactoring tasks with the aid of Issue Tracking Systems (ITSs). Hence ITSs contains a variety of information that is only partly related to SFs. In practice, however, the usage of ITSs to store SFs comes with two major problems: (1) ITSs are neither designed nor used as documentation systems. Therefore, the data inside an ITS is often uncategorized and SF descriptions are concealed in rather lengthy. (2) Although an SF is often requested in a single sentence, related information can be scattered among many issues. E.g. implementation tasks related to an SF are often reported in additional issues. Hence, the detection of SFs in ITSs is complicated: a manual search for the SFs implies reading, understanding and exploiting the Natural Language (NL) in many issues in detail. This is cumbersome and labor intensive, especially if related information is spread over more than one issue. This thesis investigates whether SF detection can be supported automatically. First the problem is analyzed: (i) An empirical study shows that requests for important SFs reside in ITSs, making ITSs a good tar- get for SF detection. (ii) A second study identifies characteristics of the information and related NL in issues. These characteristics repre- sent opportunities as well as challenges for the automatic detection of SFs. Based on these problem studies, the Issue Tracking Software Feature Detection Method (ITSoFD), is proposed. The method has two main components and includes an approach to preprocess issues. Both components address one of the problems associated with storing SFs in ITSs. ITSoFD is validated in three solution studies: (I) An empirical study researches how NL that describes SFs can be detected with techniques from Natural Language Processing (NLP) and Machine Learning. Issues are parsed and different characteristics of the issue and its NL are extracted. These characteristics are used to clas- sify the issue’s content and identify SF description candidates, thereby approaching problem (1). (II) An empirical study researches how issues that carry information potentially related to an SF can be detected with techniques from NLP and Information Retrieval. Characteristics of the issue’s NL are utilized to create a traceability network vii of related issues, thereby approaching problem (2). (III) An empirical study researches how NL data in issues can be preprocessed using heuristics and hierarchical clustering. Code, stack traces, and other technical information is separated from NL. Heuristics are used to identify candidates for technical information and clustering improves the heuristic’s results. The technique can be applied to support components, I. and II.
p53 is a crucial regulator of cell response to DNA damage. MDM4 and MDM2 are the two main negative regulators of p53 activity. Upon DNA damage, their constraint is released and p53 becomes activated and exerts its safeguard function by arresting cell growth or by killing excessively damaged cells. Under these conditions, increasing data suggest that MDM4 and MDM2 play novel roles. In this respect, we recently published that MDM4 exerts a positive activity towards p53 mitochondrial apoptosis. We observed that a fraction of MDM4 stably localizes at the mitochondria where upon lethal stress conditions, promotes the mitochondrial localization of p53 phosphorylated at Ser46 (p53Ser46(P)) and facilitates its binding to BCL2, cytochrome C release and apoptosis. Most importantly, we observed a correlation of MDM4 expression with cisplatin-resistance in a group of human ovarian cancers suggesting that MDM4 proapoptotic activity may have in vivo relevance. Here, we discuss about these and some new findings and compare them with previous data trying to settle some apparent contradictions. In addition, this review discusses the potential relevance of our data to the field of human cancer.
Exploring Gridmap-based Interfaces for the Remote Control of UAVs under Bandwidth Limitations
(2017)
SpMV Runtime Improvements with Program Optimization Techniques on Different Abstraction Levels
(2016)
The multiplication of a sparse matrix with a dense vector is a performance critical computational kernel in many applications, especially in natural and engineering sciences. To speed up this operation, many optimization techniques have been developed in the past, mainly focusing on the data layout for the sparse matrix. Strongly related to the data layout is the program code for the multiplication. But even for a fixed data layout with an accommodated kernel, there are several alternatives for program optimizations. This paper discusses a spectrum of program optimization techniques on different abstraction layers for six different sparse matrix data format and kernels. At the one end of the spectrum, compiler options can be used that hide from the programmer all optimizations done by the compiler internally. On the other end of the spectrum, a multiplication kernel can be programmed that use highly sophisticated intrinsics on an assembler level that ask for a programmer with a deep understanding of processor architectures. These special instructions can be used to efficiently utilize hardware features in processors like vector units that have the potential to speed up sparse matrix computations. The paper compares the programming effort and required knowledge level for certain program optimizations in relation to the gained runtime improvements.
With the rising interest in vehicular communication systems many proposals for secure vehicle-to-vehicle commu- nication were made in recent years. Also, several standard- ization activities concerning the security and privacy measures in these communication systems were initiated in Europe and in US. Here, we discuss some limitations for secure vehicle- to-infrastructure communication in the existing standards of the European Telecommunications Standards Institute. Next, a vulnerability analysis for roadside stations on one side and security and privacy requirements for roadside stations on the other side are given. Afterwards, a proposal for a multi-domain public key architecture for intelligent transport systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, is introduced. The domains of the public key infrastructure are cryptographically linked based on local trust lists. In addition, a crypto agility concept is suggested, which takes adaptation of key length and cryptographic algorithms during PKI operation into account.
A deployment of the Vehicle-to-Vehicle communication technology according to ETSI is in preparation in Europe. Currently, a Public Key Infrastructure policy for Intelligent Transport Systems in Europe is in discussion to enable V2V communication. This policy set aside two classes of keys and certificates for ITS vehicle stations: long term authentication keys and pseudonymous keys and certificates. We show that from our point of view the periodic sent Cooperative Awareness Messages with extensive data have technical limitations and together with the pseudonym concept cause privacy problems.
The latest advances in the field of smart card technologies allow modern cards to be more than just simple security tokens. Recent developments facilitate the use of interactive components like buttons, displays or even touch-sensors within the card's body thus conquering whole new areas of application. With interactive functionalities the usability aspect becomes the most important one for designing secure and popularly accepted products. Unfortunately, the usability can only be tested fully with completely integrated hence expensive smart card prototypes. This restricts severely application specific research, case studies of new smart card user interfaces and the optimization of design aspects, as well as hardware requirements by making usability and acceptance tests in smart card development very costly and time-consuming. Rapid development and simulation of smart card interfaces and applications can help to avoid this restriction. This paper presents a rapid development process for new smart card interfaces and applications based on common smartphone technology using a tool called SCUID^Sim. We will demonstrate the variety of usability aspects that can be analyzed with such a simulator by discussing some selected example projects.
Secure vehicular communication has been discussed over a long period of time. Now,- this technology is implemented in different Intelligent Transportation System (ITS) projects in europe. In most of these projects a suitable Public Key Infrastructure (PKI) for a secure communication between involved entities in a Vehicular Ad hoc Network (VANET) is needed. A first proposal for a PKI architecture for Intelligent Vehicular Systems (IVS PKI) is given by the car2car communication consortium. This architecture however mainly deals with inter vehicular communication and is less focused on the needs of Road Side Units. Here, we propose a multi-domain PKI architecture for Intelligent Transportation Systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, today. The PKI domains are cryptographically linked based on local trust lists. In addition, a crypto agility concept is suggested, which takes adaptation of key length and cryptographic algorithms during PKI operation into account.
Wer heute eine beliebige Publikumszeitschrift durchblättert, wird regelmäßig auf Inhalte und Beilagen (z.B. CD-ROM) stoßen, die vor allem dem Interesse von Anzeigenkunden oder Vertriebspartnern dienen und dennoch als redaktionelle Dienstleistung erscheinen. Im Fernsehen haben wir uns an vielfältige Medien- und Produktpartnerschaften gewöhnt, bei denen sich journalistische und werbliche Ziele unauflösbar vereinen. So werden beliebte TV-Sendungen durch eine umfangreiche Begleitpublizistik oder durch Merchandising-Produkte weit über das Fernsehpublikum hinaus vermarktet. In den neuen Online-Medien (Online-Dienste und WWW) schließlich ist es gang und gäbe, dass redaktionelle und kommerzielle Angebote auf identischen Webseiten erscheinen, weil die Bewertung und der Verkauf von Gütern und Dienstleistungen hier ohne Medienwechsel möglich sind. Ist es angesichts dieser Entwicklungen noch sinnvoll, auf einer Trennung von Werbung und Programm zu bestehen, wie sie das Pressegesetz allen an die allgemeine Öffentlichkeit gerichteten Medien vorschreibt?
The latest advances in the field of smart card technologies allow modern cards to be more than just simple security tokens. Recent developments facilitate the use of interactive components like buttons, displays or even touch-sensors within the cards body thus conquering whole new areas of application. With interactive functionalities the usability aspect becomes the most important one for designing secure and popularly accepted products. Unfortunately the usability can only be tested fully with completely integrated hence expensive smart card prototypes. This restricts application specific research, case studies of new smart card user interfaces, concerning applications and the performance of useability tests in smart card development. Rapid development and simulation of smart card interfaces and applications can help to avoid this restriction. This paper presents SCUIDtextsuperscript{Sim} a tool for rapid user-centric development of new smart card interfaces and applications based on common smartphone technology.
Rehabilitation wirkt
(2014)
Die medizinische Rehabilitation bildet im bundesdeutschen Gesundheitssystem eine wichtige Säule. Sie wird weltweit immer wieder als vorbildlich angesehen und ist im internationalen Vergleich mit Mitteln, Infrastruktur, Know-how und Behandlungsqualität hervorragend ausgestattet. Dies ist gut so, aber ist es gut genug?
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Smart Card Research and Advanced Applications, CARDIS 2016, held in Cannes, France, in November 2016. The 15 revised full papers presented in this book were carefully reviewed and selected from 29 submissions. The focus of the conference was on all aspects of the design, development, deployment, validation, and application of smart cards or smart personal devices.
Unternehmen stehen oft vor der Frage, nach welchen Kriterien Investitionsentscheidungen in anderen Ländern und an ausländischen Standorten – ggf. im Wettbewerb zu anderen Geografien – zu treffen sind. Aufgrund der schwierigen Revidierbarkeit von Standortentscheidungen ist zu erwarten, dass die Unternehmen eine Vielzahl von Kriterien in ihre Überlegungen einbeziehen und die in Betracht kommenden Standorte diesbezüglich komparativ prüfen.
The MAP-Elites algorithm produces a set of high-performing solutions that vary according to features defined by the user. This technique has the potential to be a powerful tool for design space exploration, but is limited by the need for numerous evaluations. The Surrogate-Assisted Illumination algorithm (SAIL), introduced here, integrates approximative models and intelligent sampling of the objective function to minimize the number of evaluations required by MAP-Elites.
The ability of SAIL to efficiently produce both accurate models and diverse high performing solutions is illustrated on a 2D airfoil design problem. The search space is divided into bins, each holding a design with a different combination of features. In each bin SAIL produces a better performing solution than MAP-Elites, and requires several orders of magnitude fewer evaluations. The CMA-ES algorithm was used to produce an optimal design in each bin: with the same number of evaluations required by CMA-ES to find a near-optimal solution in a single bin, SAIL finds solutions of similar quality in every bin.
Embodied artificial agents operating in dynamic, real-world environments need architectures that support the special requirements that exist for them. Architectures are not always designed from scratch and the system then implemented all at once, but rather, a step-wise integration of components is often made to increase functionality. Our work aims to increase flexibility and robustness by integrating a task planner into an existing architecture and coupling the planning process with the preexisting execution and the basic monitoring processes. This involved the conversion of monolithic SMACH scenario scripts (state-machine execution scripts) into modular states that can be called dynamically based on the plan that was generated by the planning process. The procedural knowledge encoded in such state machines was used to model the planning domain for two RoboCup@Home scenarios on a Care-O-Bot 3 robot [GRH+08]. This was done for the JSHOP2 [IN03] hierarchical task network (HTN) planner. A component which iterates through a generated plan and calls the appropriate SMACH states [Fie11] was implemented, thus enabling the scenarios. Crucially, individual monitoring actions which enable the robot to monitor the execution of the actions were designed and included, thus providing additional robustness.
RPSL meets lightning: A model-based approach to design space exploration of robot perception systems
(2017)
Mit dem Projekt Pro-MINT-us hat sich die Hochschule Bonn-Rhein-Sieg erfolgreich im „Qualitätspakt Lehre“ beworben. Im Fokus steht dabei eine bessere Begleitung der Studierenden im Übergang von der Schule zur Hochschule. Mit Hilfe der Projektmittel konnten u.a. zwei Stellen geschaffen werden, die die Studierenden im Bereich „wissenschaftliches Schreiben“ unterstützen sollen.
Insolvenzanfechtung von Beitragszahlungen an Sozialversicherungsträger – aktuelle Rechtsprechung
(2010)
Kurz vor Vollendung ihres 100-jährigen Forschungsjubiläums haben die Berufsgenossenschaften durch die Einführung eines Bachelor-Studiengangs für die Ausbildung zu gehobenen Funktionen im Verwaltungsbereich historische Weichen gestellt: Mit der Entscheidung, ab dem Jahre 2003 in Kooperation mit der Fachhochschule Bonn-Rhein-Sieg eine auch formelle Fachhochschulausbildung durchzuführen, ist der sich allein schon aus Hochschulrecht ergebende Auftrag verbunden, nun auch im nicht technischen Bereich Forschungskapazitäten aufzubauen und anwendungsorientiert Forschung/Entwicklung zu betreiben. Im Zuge seiner Gründung wurde darüber hinaus die Erwartung geäußert, der neue Fachbereich könne sich zu einem wissenschaftlichen Think tank der Berufsgenossenschaften entwickeln.
Big Data für Entscheider
(2017)
Andreas Gadatsch und Holm Landrock zeigen an typischen Beispielen aus der Praxis, wie datengetriebene Geschäftsmodelle entstehen. Sie erläutern, wie sich Big-Data-Projekte rechnen und wie man am einfachsten an die Analyse großer Datenmengen herangeht. Eine Bewertung der zentralen Aspekte von Projekten und der dort eingesetzten Technologien erleichtert den Lesern die tägliche Praxis im IT-Management. Die Autoren stellen Hadoop als eine der wichtigen Big-Data-Technologien vor.
Tracelets and Specifications
(2017)
In the accompanying paper [1] the authors study a model of concurrent programs in terms of events and a dependence relation, i.e., a set of arrows, between them. There also two simplifying interface models are presented; they abstract in different ways from the intricate network of internal points and arrows of program components. This report supplements [1] by presenting full proofs for the properties of the interface models, in particular, that both models exhibit homomorphic behaviour w.r.t. sequential and concurrent composition. [1] B. Möller, C.A.R. Hoare, M.E. Müller, G. Struth: A discrete geometric model of concurrent program execution. In H. Zhu, J. Bowen: Proc. UTP 16. LNCS 10134. Springer 2017, 1-25
Die Klausur: VWL
(2016)
IT-Controlling
(2016)