Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (1112) (entfernen)
Sprache
- Deutsch (872)
- Englisch (237)
- Französisch (2)
- Spanisch (1)
Schlagworte
- Geldpolitik (6)
- Arbeitsrecht (4)
- Building Information Modeling (4)
- Deutschland (4)
- Energiepolitik (4)
- Kühllastberechnung (4)
- E-Learning (3)
- Europäische Union (3)
- Europäische Zentralbank (3)
- GmbH (3)
Institut
- Wirtschaftsrecht (448)
- Institut für Internetsicherheit (160)
- Wirtschaft und Informationstechnik Bocholt (68)
- Institut für Innovationsforschung und -management (55)
- Westfälisches Energieinstitut (55)
- Westfälisches Institut für Gesundheit (47)
- Wirtschaft Gelsenkirchen (36)
- Elektrotechnik und angewandte Naturwissenschaften (33)
- Informatik und Kommunikation (32)
- Wirtschaftsingenieurwesen (25)
Die Ukrainekrise und coronabedingte Lieferkettenprobleme treiben derzeitdie Rohstoff-, Material- und Lebensmittelpreise hoch. Auch die Inflationser-wartungen steigen; es drohen Zweitrundeneffekte imGefolge höhererLohnforderungen und Lohnabschlüsse. Langfristig könnten in der Eurozoneweitere Faktoren die Inflation treiben, z.B. angebotsseitig der Fachkräfte-mangel sowie globale Nahrungsmittelknappheiten und politikseitig diegewollten Effekte der Klimapolitik. Der Beitrag diskutiert vor diesemHinter-grund geldpolitische Implikationen.
Ein größerer Anteil der in den letzten Jahren vorgenommenen Unternehmensakquisitionen wurde maßgeblich mit attraktiven Synergieerwartungen begründet. Bei näherer Betrachtung können diese Synergien oft nur wenig präzise quantifiziert und der Zeitpunkt ihrer Realisierung nur ungenau eingeordnet werden. Der vorliegende Beitrag zeigt die Bedeutung von Synergien in Verbindung mit dem Goodwill, grenzt die Kosten- und Umsatzsynergien inhaltlich ab und befasst sich auf der Basis zahlreicher Studien mit dem aktuellen Erkenntnisstand in Verbindung mit der Vorbereitung und Realisierung von Kosten- und Umsatzsynergien.
Biomimetics is a well-known approach for technical innovation. However, most of its influence remains in the academic field. One option for increasing its application in the practice of technical design is to enhance the use of the biomimetic process with a step-by-step standard, building a bridge to common engineering procedures. This article presents the endeavor of an interdisciplinary expert panel from the fields of biology, engineering science, and industry to develop a standard that links biomimetics to the classical processes of product development and engineering design. This new standard, VDI 6220 Part 2, proposes a process description that is compatible and connectable to classical approaches in engineering design. The standard encompasses both the solution-based and the problem-driven process of biomimetics. It is intended to be used in any product development process for more biomimetic applications in the future.
Robot arms are one of many assistive technologies used by people with motor impairments. Assistive robot arms can allow people to perform activities of daily living (ADL) involving grasping and manipulating objects in their environment without the assistance of caregivers. Suitable input devices (e.g., joysticks) mostly have two Degrees of Freedom (DoF), while most assistive robot arms have six or more. This results in time-consuming and cognitively demanding mode switches to change the mapping of DoFs to control the robot. One option to decrease the difficulty of controlling a high-DoF assistive robot arm using a low-DoF input device is to assign different combinations of movement-DoFs to the device’s input DoFs depending on the current situation (adaptive control). To explore this method of control, we designed two adaptive control methods for a realistic virtual 3D environment. We evaluated our methods against a commonly used non-adaptive control method that requires the user to switch controls manually. This was conducted in a simulated remote study that used Virtual Reality and involved 39 non-disabled participants. Our results show that the number of mode switches necessary to complete a simple pick-and-place task decreases significantl when using an adaptive control type. In contrast, the task completion time and workload stay the same. A thematic analysis of qualitative feedback of our participants suggests that a longer period of training could further improve the performance of adaptive control methods.
Nowadays, robots are found in a growing number of areas where they collaborate closely with humans. Enabled by lightweight materials and safety sensors, these cobots are gaining increasing popularity in domestic care, where they support people with physical impairments in their everyday lives. However, when cobots perform actions autonomously, it remains challenging for human collaborators to understand and predict their behavior, which is crucial for achieving trust and user acceptance. One significant aspect of predicting cobot behavior is understanding their perception and comprehending how they “see” the world. To tackle this challenge, we compared three different visualization techniques for Spatial Augmented Reality. All of these communicate cobot perception by visually indicating which objects in the cobot’s surrounding have been identified by their sensors. We compared the well-established visualizations Wedge and Halo against our proposed visualization Line in a remote user experiment with participants suffering from physical impairments. In a second remote experiment, we validated these findings with a broader non-specific user base. Our findings show that Line, a lower complexity visualization, results in significantly faster reaction times compared to Halo, and lower task load compared to both Wedge and Halo. Overall, users prefer Line as a more straightforward visualization. In Spatial Augmented Reality, with its known disadvantage of limited projection area size, established off-screen visualizations are not effective in communicating cobot perception and Line presents an easy-to-understand alternative.
Fruits (follicles) of Hakea salicifolia and Hakea sericea (Proteaceae) are characterised by pronounced lignification and open via a ventral suture and the dorsal side. The opening along both sides is unique within the Proteaceae. Both serotinous species are obligate seeders, whose spreading benefits from bush fire events. The different tissues and the course of the vascular bundles must allow the opening mechanism. While their 2D-arrangements are known to some extent from light-microscopy images of cross-sections, this work presents their three-dimensional structures and discusses their contribution to the opening of Hakea fruits. For this purpose, 3D greyscale images, reconstructed from µCT-projection data of both fruits are segmented, assisted by a deep learning algorithm (AI algorithm). 3D renderings from these segmentations show strongly interconnected vascular bundles that build a double-dome shaped network in each valve of H. salicifolia and a dome shaped honeycomb-structure in each valve of H. sericea. However, the vascular bundles of both species show no interconnection between the two lateral valves of the fruit but leave gaps for predetermined fracture tissues on the ventral and dorsal side. The opening of the fruits after a fire or after separation from the mother plant can be explained by the anisotropic shrinkage in the two valves of the fruit.
We investigated the formation of Artemia franciscana swarms of freshly hatched instar I nauplii larvae. Nauplii were released into light gradients but then interrupted by light-direction changes, small obstacles, or long barriers. All experiments were carried out horizontally. Each experiment used independent replicates. Freshly produced Artemia broods were harvested from independent incubators thus providing true replicate cohorts of Artemia subjected as replicates to the experimental treatments.
We discovered that Artemia nauplii swarms can: 1. repeatedly react to non-obstructed light gradients that undergo repeated direction-changes and do so in a consistent way, 2. find their way to a light source within maze-like arrangements made from small transparent obstacles, 3. move as a swarm around extended transparent barriers, following a light gradient. This paper focuses on the recognition of whole-swarm behaviors, the description thereof and the recognition of differences in whole-swarm movements comparing non-obstructed swarming with swarms encountering obstacles. Investigations of the within-swarm behaviors of individual Artemia nauplii and their interactions with neighboring nauplii are in progress, e.g. in order to discover the underlying swarming algorithms and differences
thereof comparing non-obstructed vs. obstructed pathways.
The concept of molecular scaffolds as defining core structures of organic molecules is utilised in many areas of chemistry and cheminformatics, e.g. drug design, chemical classification, or the analysis of high-throughput screening data. Here, we present Scaffold Generator, a comprehensive open library for the generation, handling, and display of molecular scaffolds, scaffold trees and networks. The new library is based on the Chemistry Development Kit (CDK) and highly customisable through multiple settings, e.g. five different structural framework definitions are available. For display of scaffold hierarchies, the open GraphStream Java library is utilised. Performance snapshots with natural products (NP) from the COCONUT (COlleCtion of Open Natural prodUcTs) database and drug molecules from DrugBank are reported. The generation of a scaffold network from more than 450,000 NP can be achieved within a single day.
Im zweiten Corona-Winter sollen die Schulen offenbleiben. Neben Fenster- und mechanischer Lüftung werden mobile Raumluftreiniger als sinnvolle Maßnahmen angesehen, um das Infektionsrisiko zu reduzieren. Dabei stellt sich die Frage, wie deren sicherer und zuverlässiger Betrieb gestalten sein muss. Gibt es bevorzugte Aufstellpositionen im Raum und wie wirkt sich die Luftbewegung auf die Behaglichkeit aus? Die Datenlage hierzu ist noch unzureichend (vgl. HLH-Interview mit Dr. Gommel, HLH 10/2021). Diese Fragen werden für einen typischen Seminar- und Klassenraum näher beleuchtet.
Zentrale Raumlufttechnische Anlagen (RLT-Anlagen) sind für Betriebszeiten von fünfzehn und mehr Jahren konzipiert. Nicht selten werden die Geräte auch nach 25 Jahren Dank Retrofit weiterbetrieben. Unberücksichtigt bleibt dabei, ob die zukünftigen, klimatischen Bedingungen noch der Auslegung entsprechen. Zur Überprüfung der klimatischen Änderungen können sogenannte Testreferenzjahre (TRY – Test Reference Year) genutzt werden. Diese basieren für die heutige Auslegung auf den lokalen, stündlichen Wetterbedingungen im Bezugsjahr 2012 und zusätzlich auf modellbasierten Wetterdaten für das Bezugsjahr 2045.
Das Zentralluftgerät einer Krankenhaus-Intensivstation wurde für die 15 Wetter¬stationen der VDI 4710, Blatt 3 in Deutschland auf die Leistungsanforderungen von heute und für das Jahr 2045 untersucht. Zusätzlich wurden für den Standort Berlin die aktuellen Wetteraufzeichnungen im Sommer 2020 betrachtet. Daraus lassen sich Rückschlüsse ziehen, wie sich städtische Wärmeinseln (UHI – Urban Heat Islands) zukünftig auf den Energie- und Leistungsbedarf zur Gebäudeklimatisierung auswirken werden.
Die Auswirkungen auf die Wärme- und Kältespitzenleistung sowie der kumulierte Energiebedarf werden genauso analysiert wie der Befeuchtungsbedarf. Hieraus lassen sich die potenziellen Leistungsreserven abschätzen und die Klimaresilienz der Anlagentechnik bewerten.
We study the dynamics of a quantum two-state system driven through an avoided crossing under the influence of a super-Ohmic environment. We determine the Landau–Zener probability employing the numerical exact quasi-adiabatic path integral and a Markovian weak coupling approach. Increasing the driving time in the numerical protocol, we find converged results which shows that super-Ohmic environments only influence the Landau Zener probability within a finite crossing time window. This crossing time is qualitatively determined by the environmental cut-off energy. At weak coupling, we show that the Markovian weak coupling approach provides an accurate description. Since pure dephasing of a super-Ohmic bath is non-Markovian, this highlights that pure dephasing hardly influences the Landau–Zener probability. The finite crossing time window, thus, results from the suppression of relaxation once the energy splitting exceeds the environmental cut-off energy.
A quantum two-level system immersed in a sub-Ohmic bath experiences enhanced low-frequency quantum statistical fluctuations which render the nonequilibrium quantum dynamics highly non-Markovian. Upon using the numerically exact time-evolving matrix product operator approach, we investigate the phase diagram of the polarization dynamics. In addition to the known phases of damped coherent oscillatory dynamics and overdamped decay, we identify a new third region in the phase diagram for strong coupling showing an aperiodic behavior. We determine the corresponding phase boundaries. The dynamics of the quantum two-state system herein is not coherent by itself but slaved to the oscillatory bath dynamics.
We propose a quantum-mechanical model to calculate the nonlinear differential conductance of a single molecular junction immersed in a solvent, either in pure form or as a binary mixture with varying volume fraction. The solvent mixture is captured by a dielectric continuum model for which the resulting spectral density is determined within the Gladstone-Dale approach. The conductance of the molecular junction is calculated by a real-time diagrammatic technique. We find a strong variation of the conductance maximum for varying volume fraction of the solvent mixture. Importantly, the calculated molecular nonlinear conductance shows a very good agreement with experimentally measured data for common molecular junctions in various polar solvent mixtures.
To address the question which neocortical layers and cell types are important for the perception of a sensory stimulus, we performed multielectrode recordings in the barrel cortex of head-fixed mice performing a single-whisker go/no-go detection task with vibrotactile stimuli of differing intensities. We found that behavioral detection probability decreased gradually over the course of each session, which was well explained by a signal detection theory-based model that posits stable psychometric sensitivity and a variable decision criterion updated after each reinforcement, reflecting decreasing motivation. Analysis of multiunit activity demonstrated highest neurometric sensitivity in layer 4, which was achieved within only 30 ms after stimulus onset. At the level of single neurons, we observed substantial heterogeneity of neurometric sensitivity within and across layers, ranging from nonresponsiveness to approaching or even exceeding psychometric sensitivity. In all cortical layers, putative inhibitory interneurons on average proffered higher neurometric sensitivity than putative excitatory neurons. In infragranular layers, neurons increasing firing rate in response to stimulation featured higher sensitivities than neurons decreasing firing rate. Offline machine-learning-based analysis of videos of behavioral sessions showed that mice performed better when not moving, which at the neuronal level, was reflected by increased stimulus-evoked firing rates.
Daten sind heute die Schlüsselkomponente in der Wertschöpfung. Ihre sichere und vertrauenswürdige Verarbeitung sind daher essenziell - auch in Cloud-Infrastrukturen, die per se erst mal nicht vertrauenswürdig sind. Während die Daten und der Code der sie verarbeitenden Anwendung hier in gespeicherter Form und bei der Übertragung in der Regel verschlüsselt sind, liegt beides während der Verarbeitung von Anwendungen in einer Cloud-Infrastruktur im Klartext vor und ist somit angreifbar. Auf der Basis von Sicherheitsfunktionen der CPU sorg Confidential Computing dafür, dass Anwendungen mit Code und Daten auf Cloud-Infrastrukturen in isolierter und verschlüsselter Form in sicheren Enklaven verarbeitet werden. Die Inhalte der Anwendung in einer Enklave werden so vor unbefugten Zugriff durch Systemadministratoren und weiteren Personen, die prinzipiell Zugriff auf die Cloud-Infrastruktur haben, geschützt. Technik unterstützt auf diese Weise die sichere und vertrauenswürdige Umsetzung des Datenschutzes.
Das Internet hat sich als globale Kommunikations-, Informations-, Commerce- und Businessinfrastruktur fest in der Gesellschaft etabliert. Mit jedem Grad Zuwachs bei der Digitalisierung wird das Leben einfacher und schneller - aber auch gefährlicher. Die konkrete Gefährlichkeit bleibt dabei bislang oft ein Mysterium - Strategien für die IT-Sicherheit müssen auf Basis von Annahmen und Erfahrungen entwickelt werden. Internet-Kennzahlen und deren systematische Auswertung sollen nun dabei helfen, Probleme, Risiken und Schwachstellen als Trend zu erkennen, um Sicherheitsstrategien proaktiv fokussierter zu gestalten. Auch der Stand der IT-Sicherheit lässt sich durch Messung der Kennzahlen ermitteln und bewerten. Internet-Kennzahlen werden von lokalen und globalen Anbietern bereitgestellt.
Supply-Chain-Angriffe sind eine akute Bedrohung für jedes Unternehmen. Einen Softwarelieferanten auszunutzen, um eine große Anzahl seiner Kunden zu erreichen, ist eine ausgeklügelte und erfolgreiche Methode aktueller Hacker. Die Spezialisierung der Unternehmen auf ihre Kernkompetenzen, die Globalisierung der Lieferketten (im folgendem wird Supply Chain und Lieferkette synonym verwendet), sowie die Digitalisierung entlang der Wertschöpfungskette sind nur einige Beispiele, wieso Angreifer vermehrt die Vertrauensbeziehung zwischen Kunden und Lieferanten verstärkt für Angriffe ausnutzen. Dieser Artikel erläutert Cyber-Angriffe in Bezug auf eine Supply Chain und zeigt Sicherheitsmechanismen für die erfolgreiche Verteidigung.
Das Gesundheitswesen in Deutschland, Europa, aber auch weltweit steht gerade erst am Beginn eines notwendigen und besonderen Digitalisierungsschubs. Ein wichtiger Schritt im Rahmen dieser Digitalisierung wird es sein, sämtliche medizinische Daten leistungsträgerübergreifend einfach verfügbar zu machen. Dies ermöglicht neue Methoden der Behandlung wie durch KI-Ansätze oder die Vermeidung von Doppelbehandlungen. Zur Erreichung dieser Ziele ist es unabdingbar, dass moderne medizintechnische IT-Geräte miteinander vernetzt werden und die anfallenden Daten sicher verarbeitet und hinterlegt werden. Durch diesen Prozess entstehen aber auch neue Angriffsvektoren und die Risiken steigen erheblich an.
Diese Arbeit beschreibt zunächst grundlegende Cyber-Sicherheitsstrategien, die helfen die vorhandenen Risiken zu minimieren und mit den verbleibenden Risiken umzugehen. Zusätzlich werden konkrete Sicherheitsbedürfnisse- und Anforderungen, die zur Vernetzung von Medizintechnik und zur Verarbeitung von Daten in der Cloud, nötig sind diskutiert. Abschließend wird eine Gesamtarchitektur vorgestellt, die diese Sicherheitsbedürfnisse umsetzt.
Digitale Sprachassistenten wie Alexa, Google, Siri & Co erfreuen sich auch in Deutschland hoher Beliebtheit - Tendenz steigend. Bei allen genannten und vielen weiteren Systemen handelt es sich um cloudbasierte Architekturen - die gesprochenen Befehle werden in Rechenzentren rund um den Globus übertragen und dort interpretiert. Aus Sicht des Datenschutzes und der Privatsphäre ist das problematisch. Auch die Abhängigkeit zu Cloud-Anbietern kann zu Schwierigkeiten führen, z.B. wenn sich die Sprachassistenten oder Smart-Home-Geräte nicht mehr nutzen lassen, weil der Anbieter seinen Dienst einstellt. Im Rahmen eines internen Forschungsprojekts hat das Institut für Internet-Sicherheit nun einen "dezentralen" Sprachassistenten entwickelt, der im Offline-Betrieb operiert und die Sprachdaten lokal auf dem Gerät verarbeitet, ohne sie in eine entfernte Cloud übertragen zu müssen.
Im Prinzip wollen und müssen Menschen auch in der digitalen Welt vertrauen (können) – nicht zuletzt, um grundsätzlich handlungsfähig zu sein. Aber auch, weil teilweise gar keine andere Wahl besteht, als einfach zu vertrauen, da die IT-Technologien mittlerweile nicht nur so allgegenwärtig, sondern auch so komplex geworden sind, dass der Nutzer sie vielfach gar nicht mehr einschätzen kann. Daher ist es – insbesondere im Sinne der Digitalisierung – wichtig und auch notwendig, dass Nutzern verschiedene Alternativen zur Verfügung stehen, anhand derer sie individuell die Vertrauenswürdigkeit von Unternehmen sowie IT-Lösungen – also jeglicher Produkte, Anwendungen und Dienste – beurteilen können. Aufgrund der steigenden Zahl an Sicherheitsvorfällen in der digitalen Welt sollte speziell die Cyber-Sicherheit dabei im Fokus stehen.
In dieser Arbeit wird eine ganzheitliche Bedrohung für Business-Chat-Anwendungen aufgezeigt und bewertet: Chishing – Phishing über Business-Chats. Die Bedrohung hat ihren Ursprung in den Anfängen der heutigen vernetzten Welt und das zugrunde liegende Problem wird als Spoofing in seiner einfachsten Form bezeichnet. In vier von sechs Business-Chat-Tools, die in dieser Arbeit analysiert werden, ist es möglich, Anzeigenamen, Profilbilder und weitere persönliche Informationen erfolgreich zu fälschen. Dies stellt eine Bedrohung für Unternehmen dar, da es Insider-Bedrohungen Vorschub leistet und unter Umständen auch externen Entitäten dazu einlädt, sich als interne Mitarbeiterin auszugeben.
Web measurement studies can shed light on not yet fully understood phenomena and thus are essential for analyzing how the modern Web works. This often requires building new and adjustinng existing crawling setups, which has led to a wide variety of analysis tools for different (but related) aspects. If these efforts are not sufficiently documented, the reproducibility and replicability of the measurements may suffer—two properties that are crucial to sustainable research. In this paper, we survey 117 recent research papers to derive best practices for Web-based measurement studies and specify criteria that need to be met in practice. When applying these criteria to the surveyed papers, we find that the experimental setup and other aspects essential to reproducing and replicating results are often missing. We underline the criticality of this finding by performing a large-scale Web measurement study on 4.5 million pages with 24 different measurement setups to demonstrate the influence of the individual criteria. Our experiments show that slight differences in the experimental setup directly affect the overall results and must be documented accurately and carefully.
Third-party tracking is a common and broadly used technique on the Web. Different defense mechanisms have emerged to counter these practices (e.g. browser vendors that ban all third-party cookies). However, these countermeasures only target third-party trackers and ignore the first party because the narrative is that such monitoring is mostly used to improve the utilized service (e.g. analytical services). In this paper, we present a large-scale measurement study that analyzes tracking performed by the first party but utilized by a third party to circumvent standard tracking preventing techniques. We visit the top 15,000 websites to analyze first-party cookies used to track users and a technique called “DNS CNAME cloaking”, which can be used by a third party to place first-party cookies. Using this data, we show that 76% of sites effectively utilize such tracking techniques. In a long-running analysis, we show that the usage of such cookies increased by more than 50% over 2021.
Aufgrund der zunehmenden IT-Technisierung und damit einhergehend stetigen Veränderung der Lebensbedingungen ist es notwendig, dass Menschen den IT-Lösungen und Unternehmen weiterhin und kontinuierlich vertrauen können. Denn durch den höheren Grad der IT-Technisierung steigt die Komplexität, wodurch es für den Nutzer zunehmend schwieriger wird, einzelne IT-Lösungen und deren Hintergründe zu verstehen sowie zu bewerten. Diese Veränderung hat Auswirkungen: Zum einen macht sie grundsätzlich den Nutzern – den Menschen – Angst, da gewohnte Vorgänge beständig ihre Gültigkeit verlieren. Zum anderen entsteht dadurch sowie durch die Komplexität latent das Gefühl, eine falsche Entscheidung zu treffen, weil nicht alles bedacht werden kann. So fällt dem Aspekt der Interdependenz von Vertrauen und Vertrauenswürdigkeit für deutsche und europäische Unternehmen eine hohe Bedeutung zu, insbesondere auch da sich internationale Tech-Unternehmen zunehmend weniger vertrauenswürdig im komplexen Cyber-Raum verhalten. Dies eröffnet die Möglichkeit, sich über den Aufbau von Vertrauen weltweit gegen internationale Unternehmen nachhaltig zu profilieren und positionieren. Um dieses Ziel zu realisieren, bedarf es einer strategischen Vorgehensweise – zum Beispiel auf Basis des Vertrauenswürdigkeitsmodells.
Damit die medizinische Versorgung weiterhin flächendeckend gewährleistet werden kann und den explodierenden Kosten Einhalt geboten wird, muss ein Gesundheitswesen der Zukunft auf digitalen Technologien basieren. Die Kritikalität der entsprechenden Health-Services ruft Cyber-Sicherheit auf den Plan – die Sensibilität der im Gesundheitswesen verarbeiteten Daten den Datenschutz. Ein zukunftsfähiges Gesundheitswesen braucht einen stringenten Rechtsrahmen, eine moderne cloudbasierte Telematikinfrastruktur, die je nach Sicherheitsbedarf in verschiedenen Modellen umgesetzt werden kann, einen restriktiven Umgang mit globalen Public-Cloud-Providern, eine besonders gesicherte, leistungsstarke Forschungsdateninfrastruktur – etwa zur Optimierung von KI-Fähigkeiten, sichere Gesundheitsanwendungen und einiges mehr. Hier ein Ausblick.
Die ehemals vom Grundsatz her separierten Welten der Information Technology (IT) und Operational Technology (OT) wachsen im Zuge der Digitalisierung vermehrt zusammen. Doch was ist dabei aus Sicht der IT/IT-Sicherheit zu berücksichtigen und wem kann oder muss die letztendliche Verantwortung für eine durchgängige IT-Sicherheit des Unternehmens obliegen?
Eine nicht ganz leicht zu klärende Aufgabenstellung – insbesondere mit Blick auf den Aspekt, dass die Schutzziele der beiden Unternehmensbereiche nicht einheitlich sind.
Keine Landesgesetzgebungskompetenz für ausnahmsloses Verbot von Windenergieanlagen in Waldgebieten
(2022)
Der Aufsatz untersucht die Frage des Vorrangverhältnisses zwischen Europäischem und nationalem Recht sowie daraus folgend der Kontrolle der Kompetenzausübung der Union durch nationale Gerichte anhand der unterschiedlichen Auffassungen des BVerfG und des EuGH und diskutiert den Lösungsansatz durch ein Kompetenzgericht
Short Selling
(2022)
For proton exchange membrane water electrolysis (PEMWE) to become competitive, the cost of stack components, such as bipolar plates (BPP), needs to be reduced. This can be achieved by using coated low-cost materials, such as copper as alternative to titanium. Herein we report on highly corrosion-resistant copper BPP coated with niobium. All investigated samples showed excellent corrosion resistance properties, with corrosion currents lower than 0.1 µA cm−2 in a simulated PEM electrolyzer environment at two different pH values. The physico-chemical properties of the Nb coatings are thoroughly characterized by scanning electron microscopy (SEM), electrochemical impedance spectroscopy (EIS), X-ray photoelectron spectroscopy (XPS), and atomic force microscopy (AFM). A 30 µm thick Nb coating fully protects the Cu against corrosion due to the formation of a passive oxide layer on its surface, predominantly composed of Nb2O5. The thickness of the passive oxide layer determined by both EIS and XPS is in the range of 10 nm. The results reported here demonstrate the effectiveness of Nb for protecting Cu against corrosion, opening the possibility to use it for the manufacturing of BPP for PEMWE. The latter was confirmed by its successful implementation in a single cell PEMWE based on hydraulic compression technology.
The present paper presents one- and two-step approaches for electrochemical Pt and Ir deposition on a porous Ti-substrate to obtain a bifunctional oxygen electrode. Surface pre-treatment of the fiber-based Ti-substrate with oxalic acid provides an alternative to plasma treatment for partially stripping TiO2 from the electrode surface and roughening the topography. Electrochemical catalyst deposition performed directly onto the pretreated Ti-substrates bypasses unnecessary preparation and processing of catalyst support structures. A single Pt constant potential deposition (CPD), directly followed by pulsed electrodeposition (PED), created nanosized noble agglomerates. Subsequently, Ir was deposited via PED onto the Pt sub-structure to obtain a successively deposited PtIr catalyst layer. For the co-deposition of PtIr, a binary PtIr-alloy electrolyte was used applying PED. Micrographically, areal micro- and nano-scaled Pt sub-structure were observed, supplemented by homogenously distributed, nanosized Ir agglomerates for the successive PtIr deposition. In contrast, the PtIr co-deposition led to spherical, nanosized PtIr agglomerates. The electrochemical ORR and OER activity showed increased hydrogen desorption peaks for the Pt-deposited substrate, as well as broadening and flattening of the hydrogen desorption peaks for PtIr deposited substrates. The anodic kinetic parameters for the prepared electrodes were found to be higher than those of a polished Ir-disc.
Flame-sprayed NiCrBSi/WC-12Co composite coatings were deposited in different ratios on the surface of stainless steel. Oxyacetylene flame remelting treatment was applied to surfaces for refinement of the morphology of the layers and improvement of the coating/substrate adhesion.
The performance of the coated specimens to cavitation erosion and electrochemical corrosion was evaluated by an ultrasonic vibratory method and, respectively, by polarization measurements. The microstructure was investigated by means of scanning electron microscopy (SEM) combined with energy dispersive X-ray analysis (EDX). The obtained results demonstrated that the addition of 15 wt.% WC-12Co to the self-fluxing alloy improves the resistance to cavitation erosion (the terminal erosion rate (Vs) decreased with 15% related to that of the NiCrBSi coating) without influencing the good corrosion resistance in NaCl solution. However, a further increase in WC-Co content led to a deterioration of these coating properties (the Vs has doubled related to that of the NiCrBSi coating).
Moreover, the corrosion behavior of the latter composite coating was negatively influenced, a fact confirmed by increased values for the corrosion current density (icorr). Based on the achieved experimental results, one may summarize that NiCrBSi/WC-Co composite coatings are able to increase the life cycle of expensive, high-performance components exposed to severe cavitation conditions.
The printing variable least addressed in previous research aiming to reveal the effect of the FFF process parameters on the printed PLA part’s quality and properties is the filament color. Moreover, the color of the PLA, as well as its manufacturer, are rarely mentioned when the experimental conditions for the printing of the samples are described, although current existing data reveal that their influence on the final characteristics of the print should not be neglected. In order to point out the importance of this influential parameter, a natural and a black-colored PLA filament, produced by the same manufacturer, were selected. The dimensional accuracy, tensile strength, and friction properties of the samples were analyzed and compared for printing temperatures ranging from 200 C up to 240 C. The experimental results clearly showed different characteristics depending on the polymer color of samples printed under the same conditions. Therefore, the optimization of the FFF process parameters for the 3D-printing of PLA should always start with the proper selection of the type of the PLA material, regarding both its color and the fabricant.
Tape brazing constitutes a cost-effective alternative surface protection technology for complex-shaped surfaces. The study explores the characteristics of high-temperature brazed coatings using a cobalt-based powder deposited on a stainless-steel substrate in order to protect parts subjected to hot temperatures in a wear-exposed environment. Microstructural imaging corroborated with x-ray diffraction analysis showed a complex phased structure consisting of intermetallic Cr-Ni, C-Co-W Laves type, and chromium carbide phases. The surface properties of the coatings, targeting hot corrosion behavior, erosion, wear resistance, and microhardness, were evaluated. The high-temperature corrosion test was performed for 100 h at 750 C in a salt mixture consisting of 25 wt.% NaCl + 75 wt.% Na2SO4. The degree of corrosion attack was closely connected with the exposure temperature, and the degradation of the material corresponding to the mechanisms of low-temperature hot corrosion. The erosion tests were carried out using alumina particles at a 90 impingement angle. The results, correlated with the microhardness measurements, have shown that Co-based coatings exhibited approximately 40% lower material loss compared to that of the steel substrate.
In this study, the characteristics of HVOF sprayed WC/Co-Cr and WC/Cr3C2/Ni coatings were investigated in correlation with the variation of the powder feed rate. For this purpose, the mass flow was adjusted to four different levels. The other process parameters were all kept constant. The morphological and mechanical properties as well as the electrochemical corrosion behaviour were investigated and associated with the achieved microstructure.
Both scanning electron microscopy and confocal laser scanning microscopical images of the cross sections demonstrated a good correlation between the selected powder feed rate and the degree of internal porosity produced, which can be attributed to the deposition process. The coatings which fulfilled the requirements of the pre-qualification step were selected for further hardness measurements, tribological tests and electrochemical corrosion measurements in a 3.5 wt% NaCl aqueous solution.
It was found that the powder feed rate strongly influenced the characteristics of the HVOF-sprayed cermet coatings. The tendency to crack formation, especially at the interface coating/substrate, was lower for the samples coated with a lower mass flow rate. These studies have shown that the applied powder feed rates had an important influence on the coatings microstructure and implicitly on the sliding wear behavior respectively on the electrochemical corrosion resistance of the investigated cermet coatings.
In this work, a novel polymer electrolyte membrane water electrolyzer (PEMWE) test cell based on hydraulic single-cell compression is described. In this test cell, the current density distribution is almost homogeneous over the active cell area due to hydraulic cell clamping. As the hydraulic medium entirely surrounds the active cell components, it is also used to control cell temperature resulting in even temperature distribution. The PEMWE single-cell test system based on hydraulic compression offers a 25 cm2 active surface area (5.0 × 5.0 cm) and can be operated up to 80°C and 6.0 A/cm2. Construction details and material selection for the designed test cell are given in this document. Furthermore, findings related to pressure distribution analyzed by utilizing a pressure-sensitive foil, the cell performance indicated by polarization curves, and the reproducibility of results are described. Experimental data indicate the applicability of the presented testing device for relevant PEMWE component testing and material analysis.
Even though we live in a period when the word digitization is prevalent in many social areas, the COVID-19 pandemic has divided mankind into two main categories: some people have seen this crisis as an opportunity to move the activities online and, furthermore, to accelerate digitization in as many areas as possible, while others have been reluctant, keeping their preferences for face-to-face activities. The current work presents the results of an analysis on 249 students from 11 engineering faculties. The study aims to identify the impact of the COVID-19 pandemic on students’ educational experiences when switching from face-to-face to online education during a public health emergency or COVID 19-related state of alert. The overall conclusion was that, although the pandemic has brought adverse consequences on the health and life quality of many people, the challenges that humankind has been subjected to have led to personal and professional development and have opened up new perspectives for carrying out the everyday activities.
Impact of cobalt content and grain growth inhibitors in laser-based powder bed fusion of WC-Co
(2022)
Processing of tungsten carbide‑cobalt (WC-Co) by laser-based powder bed fusion (PBF-LB) can result in characteristic microstructure defects such as cracks, pores, undesired phases and tungsten carbide (WC) grain growth, due to the heterogeneous energy input and the high thermal gradients. Besides the processing conditions, the material properties are affected by the initial powder characteristics. In this paper, the impact of powder composition on microstructure, phase formation and mechanical properties in PBF-LB of WC-Co is studied.
Powders with different cobalt contents from 12 wt.-% to 25 wt.-% are tested under variation of the laser parameters.
Furthermore, the impact of vanadium carbide (VC) and chromium (Cr) additives is investigated. Both are known as grain growth inhibitors for conventional sintering processes. The experiments are conducted at a pre-heating temperature of around 800 ◦C to prevent crack formation in the samples. Increasing laser energy input reduces porosity but leads to severe embrittlement for low cobalt content and to abnormal WC grain growth for high cobalt content. It is found that interparticular porosity at low laser energy is more severe for low cobalt content due to poor wetting of the liquid phase. Maximum bending strength of σB > 1200 MPa and Vickers hardness of approx. 1000 HV3 can be measured for samples generated from WC-Co 83/17 powder with medium laser energy input. The addition of V and Cr leads to increased formation of additional phases such as Co3W3C, Co3V and Cr23C6 and to increased lateral and multi-laminar growth of the WC grains. In contrast to conventional sintering, a grain growth inhibiting effect of V and Cr in the laser molten microstructure is not achieved.
Developing and implementing computational algorithms for the extraction of specific substructures from molecular graphs (in silico molecule fragmentation) is an iterative process. It involves repeated sequences of implementing a rule set, applying it to relevant structural data, checking the results, and adjusting the rules. This requires a computational workflow with data import, fragmentation algorithm integration, and result visualisation. The described workflow is normally unavailable for a new algorithm and must be set up individually. This work presents an open Java rich client Graphical User Interface (GUI) application to support the development of new in silico molecule fragmentation algorithms and make them readily available upon release. The MORTAR (MOlecule fRagmenTAtion fRamework) application visualises fragmentation results of a set of molecules in various ways and provides basic analysis features. Fragmentation algorithms can be integrated and developed within MORTAR by using a specific wrapper class. In addition, fragmentation pipelines with any combination of the available fragmentation methods can be executed. Upon release, three fragmentation algorithms are already integrated: ErtlFunctionalGroupsFinder, Sugar Removal Utility, and Scaffold Generator. These algorithms, as well as all cheminformatics functionalities in MORTAR, are implemented based on the Chemistry Development Kit (CDK).
The influence of molecular fragmentation and parameter settings on a mesoscopic dissipative particle dynamics (DPD) simulation of lamellar bilayer formation for a C10E4/water mixture is studied. A “bottom-up” decomposition of C10E4 into the smallest fragment molecules (particles) that satisfy chemical intuition leads to convincing simulation results which agree with experimental findings for bilayer formation and thickness. For integration of the equations of motion Shardlow’s S1 scheme proves to be a favorable choice with best overall performance. Increasing the integration time steps above the common setting of 0.04 DPD units leads to increasingly unphysical temperature drifts, but also to increasingly rapid formation of bilayer superstructures without significantly distorted particle distributions up to an integration time step of 0.12. A scaling of the mutual particle–particle repulsions that guide the dynamics has negligible influence within a considerable range of values but exhibits apparent lower thresholds beyond which a simulation fails. Repulsion parameter scaling and molecular particle decomposition show a mutual dependence. For mapping of concentrations to molecule numbers in the simulation box particle volume scaling should be taken into account. A repulsion parameter morphing investigation suggests to not overstretch repulsion parameter accuracy considerations.
Recent years have seen a sharp increase in the development of deep learning and artificial intelligence-based molecular informatics. There has been a growing interest in applying deep learning to several subfields, including the digital transformation of synthetic chemistry, extraction of chemical information from the scientific literature, and AI in natural product-based drug discovery. The application of AI to molecular informatics is still constrained by the fact that most of the data used for training and testing deep learning models are not available as FAIR and open data. As open science practices continue to grow in popularity, initiatives which support FAIR and open data as well as open-source software have emerged. It is becoming increasingly important for researchers in the field of molecular informatics to embrace open science and to submit data and software in open repositories. With the advent of open-source deep learning frameworks and cloud computing platforms, academic researchers are now able to deploy and test their own deep learning models with ease. With the development of new and faster hardware for deep learning and the increasing number of initiatives towards digital research data management infrastructures, as well as a culture promoting open data, open source, and open science, AI-driven molecular informatics will continue to grow. This review examines the current state of open data and open algorithms in molecular informatics, as well as ways in which they could be improved in future.
The German supply chain law ( Lieferkettensorgfaltspflichtengesetz, abbreviated: LkSG) which enters into force on 1 January 2023 is part of the developing legal framework for human rights in global supply chains. Like the French vigilance law, it represents a new generation of supply chain laws which impose mandatory human rights due diligence obligations. The LkSG requires enterprises to exercise a number of due diligence obligations – from conducting risk analysis to undertaking preventive measures or remedial actions. The law is based on public enforcement via a competent authority, the Federal Office for Economic Affairs and Export Control (BAFA). The BAFA monitors and enforces compliance with the due diligence obligations. Non-compliant enterprises can be fined with up to 800,000 Euros and, in some cases, up to 2% of the annual turnover. Whilst the LkSG is an important step towards achieving greater corporate sustainability, it also has limitations. It was a political compromise and, as such, it does not include a new civil liability for non-compliance. Moreover, by default, it only applies to the enterprise’s own business area and its direct suppliers, whereas indirect suppliers are only included where the enterprise has substantiated knowledge that an obligation has been violated.
Dephasing in quantum systems is typically the result of their interaction with environmental degrees of freedom. We investigate within a spin-boson model the influence of a super-Ohmic environment on the dynamics of a quantum two-state system. A super-Ohmic environment thereby models typical bulk phonons which are a common disturbance for solid state quantum systems as, for example, nitrogen-vacancy centers. By applying the numerically exact quasiadiabatic path-integral approach we show that for strong system-bath coupling, pseudocoherent dynamics emerges, i.e., oscillatory dynamics at short times due to slaving of the quantum system to the bath dynamics. We extend the phase diagram known for sub-Ohmic and Ohmic environments into the super-Ohmic regime and observe a pronounced nonmonotonous behavior. Super-Ohmic purely dephasing fluctuations strongly suppress the amplitude of coherent dynamics at very short times with no subsequent further decay at later times. Nevertheless, they render the dynamics overdamped. The corresponding phase separation line shows also a nonmonotonous behavior, very similar to the pseudocoherent dynamics.
We propose a quantum-mechanical model to calculate the current through a single molecular junction immersed in a solvent and surrounded by a thin shell of bound water under an applied ac voltage. The solvent plus hydration shell are captured by a dielectric continuum model for which the resulting spectral density is determined. Here the dielectric properties, e.g., the Debye relaxation time and the dielectric constant, of the bulk solvent and the hydration shell as well as the shell thickness directly enter. We determine the charge current through the molecular junction under an ac voltage in the sequential tunneling regime where we solve a quantum master equation by a real-time diagrammatic technique. Interestingly, the Fourier components of the charge current show an exponential-like decline when the hydration shell thickness increases. Finally, we apply our findings to binary solvent mixtures with varying volume fractions and find that the current is highly sensitive to both the hydration shell thickness as well as the volume fraction of the solvent mixture, giving rise to possible applications as shell and concentration sensors on the molecular scale.
Design and Development of a Bioreactor System for Mechanical Stimulation of Musculoskeletal Tissue
(2023)
We report on the development of a bioreactor system for mechanical stimulation of musculoskeletal tissues. The ultimate object is to improve the quality of medical treatment following injuries of the enthesis tissue. To this end, the tissue formation process through the effect of mechanical stimulation is investigated. A six-well system was designed, 3D printed and tested. An integrated actuator creates strain by applying a force. A contactless position sensor monitors the travels. An electronic circuit controls the bioreactor using a microcontroller. An IoT platform connects the microcontroller to a smartphone, enabling the user to alter variables, trigger actions and monitor the system. The system was stabilised by implementing two PID controllers and safety measures. The results show that the bioreactor design is suited to execute mechanical stimulation and to investigate the tissue formation and regeneration process …
In this paper, we investigate the influence of different disease groups on the size of different 1 anatomical structures. To this end, we first modify and improve an existing anatomical segmentation 2 model. Then, we use this model to segment 104 anatomical structures from computed tomography 3 (CT) scans and compute their volumes from the segmentation. After correlating the results with each 4 other, we find no new significant correlations. After correlating the volume data with known diseases 5 for each case, we find two weak correlations, one of which has not been described before and for 6 which we present a possible explanation.
Sowohl im Online-, aber auch im stationären Handel sind schon etliche innovative immersive Anwendungen entstanden, die neue kognitive und affektive Interaktions- und Informationsmöglichkeiten bieten. In den Bereichen Kunst, Immobilien, Architektur, Gaming, Fashion, Stadtplanung und -führungen finden sich ebenfalls mehr und mehr AR/VR Anwendungen. In diesem Beitrag wird nach einer Sichtung ausgewählter immersiver Projekte ein Konzept zur Nutzung von AR bzw. VR für Leerstände in einer ehemals attraktiven Einkaufsmeile in Gelsenkirchen vorgestellt.
The number of publications describing chemical structures has increased steadily over the last decades. However, the majority of published chemical information is currently not available in machine-readable form in public databases. It remains a challenge to automate the process of information extraction in a way that requires less manual intervention - especially the mining of chemical structure depictions. As an open-source platform that leverages recent advancements in deep learning, computer vision, and natural language processing, DECIMER.ai (Deep lEarning for Chemical IMagE Recognition) strives to automatically segment, classify, and translate chemical structure depictions from the printed literature. The segmentation and classification tools are the only openly available packages of their kind, and the optical chemical structure recognition (OCSR) core application yields outstanding performance on all benchmark datasets. The source code, the trained models and the datasets developed in this work have been published under permissive licences. An instance of the DECIMER web application is available at https://decimer.ai.
Die Beschaffung von IT-Sicherheitslösungen ist für Unternehmen oft eine Herausforderung. So führt die Komplexität der Systeme dazu, dass die für eine Kaufentscheidung erforderlichen Kompetenzen und Informationen nicht immer vorhanden sind. Grundvoraussetzung für eine erfolgreiche Geschäftsbeziehung ist deswegen ein valides Vertrauensverhältnis zwischen Anwender- und Herstellerunternehmen. Das setzt jedoch voraus, dass die Herstellerunternehmen vertrauenswürdig auftreten und im Interesse ihrer Kunden handeln. Eine Studie der Westfälischen Hochschule Gelsenkirchen hat untersucht, welche Vertrauenskriterien Kunden bei Herstellern und deren Produkten wichtig sind. So ist zum Beispiel ein Hersteller bei den Kunden unten durch, wenn er zu viele Buzzwords nutzt.
Wie Datenräume helfen, neue Geschäftsmodelle zu entwickeln : sicher, vertrauenswürdig und dezentral
(2023)
In der heutigen Zeit werden sehr große Datenmengen generiert und verwaltet, dennoch wird der Wert der Daten in Deutschland und Europa noch nicht voll ausgeschöpft. Die gemeinsame Nutzung von Daten kann und soll datengetriebene Anwendungen noch weiter vorantreiben, bei der Erfüllung regulatorischer Anforderungen helfen sowie einen finanziellen Mehrwert für Firmen schaffen. Viele kleine bis mittelständische Unternehmen zögern derzeit jedoch, Daten untereinander auszutauschen, weil sie befürchten, die Hoheit über ihre Daten zu verlieren und nicht wissen, wer Zugriff auf die Daten hat und wofür die Daten verwendet werden.
Künstliche Intelligenz (KI) ermöglicht es, komplexe Zusammenhänge und Muster aus großen Datenmengen zu extrahieren und in einem statistischen Modell zu erfassen. Dieses KI-Modell kann anschließend Aussagen über zukünftig auftretende Daten treffen. Mit dem zunehmenden Einsatz von Künstlicher Intelligenz rücken solche Systeme auch immer mehr ins Visier von Cyberkriminellen. Der Artikel beschreibt umfassend Angriffsszenarien und mögliche Abwehrmaßnahmen.
Vor vier Jahren betrat die Datenschutz-Grundverordnung (DS-GVO) die Bühne und brachte für Unternehmen und Nutzer gleichermaßen Veränderungen mit sich. Doch gerade im dynamischen Umfeld des Online-Marketings tauchen ständig neue und oft knifflige Fragen auf – Fragen, die nun im Rahmen einer wissenschaftlichen Studie etwas genauer unter die Lupe genommen wurden.
Viele Unternehmen beginnen damit, Standards "wild" umzusetzen oder verschiedene Sicherheitsprodukte zu kaufen. Cybersicherheit muss aber auf einem soliden Fundament stehen. Dazu sollten die Verantwortlichen die eigenen Organisationsstrukturen kennen und die drei Schlüsselfaktoren Menschen, Prozesse und Technologie sorgfältig ausbalancieren.
Among all additive manufacturing processes, Directed Energy Deposition-Arc (DED-Arc) shows significantly shorter production times and is particularly suitable for large-volume components of simple to medium complexity. To exploit the full potential of this process, the microstructural, mechanical and corrosion behavior have to be studied. High stickout distances lead to a large offset, which leads to an instable electric arc and thus defects such as lack of fusion. Since corrosion preferentially occurs at such defects, the main objective of this work is to investigate the influence of the stickout distance on the corrosion
behavior and microstructure of stainless steel manufactured by DED-Arc.
Within the heterogenous structure of the manufactured samples lack of fusion defects were detected. The quantity of such defects was reduced by applying a shorter stickout distance. The corrosion behavior of the additively manufactured specimens was investigated by means of potentiodynamic polarization measurements. The semi-logarithmic current density potential curves showed a similar course and thus similar corrosion resistance like that of the conventionally forged sample. The polarization curve of the reference material shows numerous current peaks, both in the anodic and cathodic regions. This metastable behavior is induced by the presence of manganese sulfides. On the sample surface a local attack by pitting corrosion was identified.