Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (237)
- Konferenzveröffentlichung (216)
- Teil eines Buches (Kapitel) (32)
- Sonstiges (31)
- Video (14)
- Buch (Monographie) (13)
- Preprint (12)
- Dissertation (4)
- Bericht (4)
- Arbeitspapier (4)
Sprache
- Englisch (572) (entfernen)
Schlagworte
- Robotik (8)
- Flugkörper (7)
- UAV (7)
- Rettungsrobotik (5)
- Dissipative Particle Dynamics (4)
- Polymer-Elektrolytmembran-Brennstoffzelle (4)
- adhesion (4)
- Bionik (3)
- Deep Learning (3)
- Erweiterte Realität <Informatik> (3)
- Gespenstschrecken (3)
- Haftorgan (3)
- OCSR (3)
- stick insects (3)
- Augmented Reality (2)
- CDK (2)
- Competency-Oriented Exams (2)
- DECIMER (2)
- Deep learning (2)
- Electrodeposition (2)
- Field measurement (2)
- Human-Robot Interaction (2)
- OCSR, Optical Chemical Structure Recognition (2)
- Solar modules (2)
- Transformer (2)
- Twitter <Softwareplattform> (2)
- biomimicry (2)
- hydraulic compression (2)
- modular stack design (2)
- open quantum systems (2)
- social innovation (2)
- water electrolysis (2)
- carbon nanofibers, platinum electrodeposition, ele ctrochemical surface area (1)
- 360 degree Feedback (1)
- 360° Panorama (1)
- AEM-Electrolysis (1)
- AI (1)
- API 1130 (1)
- Additive manufacturing Directed energy deposition-arc 316L stainless steel Corrosion behavior Electrochemical corrosion (1)
- Aerosol (1)
- Aggregation-prone (1)
- Air handling unit (1)
- AlphaFold, ColabFold, PyMOL (1)
- Alternative Geschäftsmodelle (1)
- Amylase, Enzymcharakterisierung (1)
- Anorganische Analyse (1)
- Artificial Intelligence (1)
- Assessment Center (1)
- Assisted living technologies (1)
- Assistive robotics (1)
- Augmented (1)
- Augmented Electromagnetic Accelerators (1)
- Augmented Multiphase (1)
- Augmented Multiphase Rail Launcher (1)
- Augmented Three-Phase AC-Railgun (1)
- Autonomous Agents (1)
- Bildverarbeitung (1)
- Biomechanics (1)
- Biomedical monitoring, Hospitals, Electrocardiography, Wireless communication, Patient monitoring, Wireless sensor networks (1)
- Biomimetics (1)
- Bone Morphogenetic Protein, BMP, BMP2 (1)
- Bone morphogenetic protein 2 (1)
- Brand theory (1)
- CFD Simulation (1)
- COIL (1)
- CPM (1)
- Carboxylate (1)
- Case-Study (1)
- Catalysis (1)
- Cell-free implant (1)
- Chemical image depiction (1)
- Chemical space (1)
- Chemical structure depictions (1)
- Cheminformatics (1)
- Chemistry Development Kit (1)
- Chemistry Development Kit, CDK, Molecule fragmentation, In silico fragmentation, Scaffolds, Functional groups, Glycosidic moieties, Rich client, Graphical user interface, GUI (1)
- Chief Executive Officer (1)
- Climate change (1)
- Clustering (1)
- Codegenerierung (1)
- Communication management (1)
- Constructive Alignment (1)
- Continuous Assessment (1)
- Continuous Queries (1)
- Cookie <Internet> (1)
- Cr(VI) and Zn(II) cations (1)
- Crowdfunding (1)
- Current Pulses (1)
- DPD, Dissipative Particle Dynamics (1)
- Data Collection (1)
- Data Journalism (1)
- Datalog (1)
- Datenjournalismus (1)
- Datensatz (1)
- Datenschutz (1)
- Deductive Databases (1)
- Depiction generator image augmentation (1)
- Deutschland / Technische Regeln für brennbare Flüssigkeiten (1)
- Dissipative particle dynamics, DPD, Surfactant, Bilayer, Lamellar, Simulation, Mesoscopic (1)
- Distributed Software Development (1)
- E. coli SHuffle® T7 (1)
- Elastizitätsmodul (1)
- Electrolysis (1)
- Electromagnetic Launcher (1)
- Elektrodenvorbereitung (1)
- Energy Storage Mode (1)
- Enterprise JavaBeans (1)
- Erneuerbare Energien (1)
- Europe (1)
- Evidence-based Management (1)
- Exams with Third-Party Applications (1)
- Fehlererkennung (1)
- Fehlerortung (1)
- Flat-Channel (1)
- Flipped Classroom (1)
- Flory-Huggins parameter (1)
- Flügelform (1)
- Formative Assessment (1)
- Fragmentation (1)
- Future capacity needs (1)
- Gas Diffusion Electrode (1)
- Greek dept crisis (1)
- Hand-drawn chemical structures (1)
- Hand-drawn images (1)
- Hands-free Interaction (1)
- High Reynold Numer (1)
- Homogene Kühlung (1)
- Human-centered computing (1)
- Hydraulic cell compression (1)
- Hydraulic compression, Carbon Nano Fibers, PEM Fuel Cells, Catalyst utilization (1)
- Hydrogen evolution reaction (1)
- Hydrophilicity enhanced hBMP2 variant (1)
- ICP-Massenspektrometrie (1)
- Implantat (1)
- In-silico-design (1)
- Incremental Evaluation (1)
- Indigo (1)
- Interactive Voting Systems (1)
- Intercultural Collaboration (1)
- Journalismus (1)
- Juristenausbildung (1)
- Kalman filter (1)
- Kernspintomografie (1)
- Kohlenstoff (1)
- Kohlenstoff-Nanoröhre (1)
- Laser Synthesis Electrocatalytic Water Splitting (1)
- Launcher (1)
- Leadership Competencies (1)
- Leak detection (1)
- Leckerkennung (1)
- Leckortung (1)
- Lecksuchgerät (1)
- Lecküberwachung (1)
- Linear Electromagnetic Accelerator (1)
- Lüftungsanlage (1)
- MITRE (1)
- Machine Learning (1)
- Magnetic Pressure (1)
- Mapping (1)
- Maus (1)
- Media Brands (1)
- Media brand characteristics (1)
- Media positioning (1)
- Membrane (1)
- Methodology (1)
- Middle-range Theory (1)
- Mikrofotografie (1)
- Mixed Reality (1)
- Modular Augmented Launcher (1)
- Modular Design (1)
- Molecule images (1)
- Multi-Agent System (1)
- Multiphase Rail Launcher (1)
- Mund-Nasen-Schutz (1)
- Muzzle Velocity (1)
- N,N,O Ligands (1)
- N,N′ Ligands (1)
- Nanofaser (1)
- Natural products (1)
- Naturstoff (1)
- NeRF (1)
- New Public Governance (1)
- New Public Management (1)
- New Work, Information and Communication Industry, Innovation, Organizational Goals, Survey (1)
- Ni-Mo alloy Catalyst (1)
- NiCrBSi coatings; flame spraying; induction remelting; wear resistance (1)
- Normalisierung (1)
- ORR OER (1)
- OSINT (1)
- Object Recognition (1)
- Object-relational Mapping (1)
- Objektverfolgung (1)
- Ohrwurm (1)
- Online Programming Exams (1)
- Online Supervision (1)
- Online-Werbung (1)
- Optical Chemical Structure Recognition (1)
- Ortsbestimmung (1)
- PEM Electrolysis, Hydrogen, Hydraulic Compression, High Pressure (1)
- PEM electrolysis (1)
- PEM fuel cell (1)
- PEM fuel cell electrocatalysts, Carbon nanofibers, Oxygen plasma activation, Pulsed electroplating. (1)
- PEM fuel cells (1)
- PEM water electrolysis (1)
- PEM-Brennstoffzelle (1)
- PEMWE (1)
- Peer Assessment (1)
- Peer Instruction (1)
- People with disabilities (1)
- Performance prediction (1)
- Persistenz <Informatik> (1)
- Physics-Informed Deep Learning (1)
- Physics-informed deep learning; unsupervised learning; Reynolds-averaged Navier-Stokesequations; high Reynolds number flow; turbulence modeling (1)
- Politische Berichterstattung (1)
- Polymere (1)
- Porous Transport Layers (1)
- Powder feed rate HVOF Cermet Wear Corrosion (1)
- Privatsphäre (1)
- Project-based Learning (1)
- PtCoMn (1)
- RDKit (1)
- RIS (1)
- Rail Launcher (1)
- Railgun (1)
- Regeln der Technik (1)
- Rescue Robotics (1)
- Robot assistive drinking (1)
- Robot assistive eating (1)
- Rwanda (1)
- SARS-CoV-2 (1)
- Sauerstoffplasmaaktivierung (1)
- Scaffold (1)
- Scaffold network (1)
- Scaffold tree (1)
- Segmentation; Correlation; Diseases; Convolutional Neural Networks (1)
- Semi-Infinite Plate (1)
- Sinusoidal (1)
- Small UAVs (1)
- Smart Grid (1)
- Social Innovation (1)
- Social Learning (1)
- Social Media (1)
- Spondylodese (1)
- Stack <Brennstoffzelle> (1)
- Stellite 6; HVOF-spraying; Laser remelting; Cavitation erosion; Coatings (1)
- Student Activation (1)
- TRFL (1)
- Temperature coefficients (1)
- Ternary alloy catalyst preparation (1)
- Tetraplegie (1)
- Thermal Performance (1)
- Thermal Stress (1)
- Titanium; Al2O3–TiO2 coatings; Nanoindentation (1)
- Tracking (1)
- Transformative Teaching (1)
- Twitter (1)
- Update Propagation (1)
- Upscaling laboratory models (1)
- Urban heat island (1)
- Visual Monocular SLAM (1)
- Young´s modulus (1)
- Zinc (1)
- Zustandsmaschine (1)
- academic and job-related self-control demands (1)
- activated sludge (1)
- additive manufacturing; polylactic acid (PLA); fused filament fabrication (FFF); fused deposition modeling (FDM); printing temperature; filament color; dimensional accuracy; tensile strength; friction performance; wear (1)
- advanced persistent threats (1)
- aerosol (1)
- air hygiene (1)
- airborne infection (1)
- antecedents (1)
- artificial intelligence (1)
- assistive robotics (1)
- augmented reality (1)
- bacterial toxicity (1)
- balance (1)
- barrel cortex, cell types, multielectrode recordings, perception, psychophysics (1)
- bio-inspired functional surface (1)
- bioinspired (1)
- biomimetic (1)
- biomimetic materials (1)
- biomimetics; functional morphology; plant biomechanics; plant motion; strain analysis; structure–function relationship; 3D digital image correlation (3D-DIC); Hakea sericea; Hakea salicifolia (1)
- bipolar plate (1)
- blockchain (1)
- bloxberg (1)
- carbon nano fibres (1)
- carbon nanofibers, platinum electrodeposition, electrocatalysts (1)
- cartilage defect (1)
- cartilage regeneration (1)
- chlorinated phenols (1)
- cluster (1)
- co-based alloys; hot corrosion; solid particle erosion; microstructure; brazing (1)
- coatings (1)
- cobot (1)
- collaborative online international learning (COIL) (1)
- compassionate love (1)
- composition (1)
- conical intersection (1)
- consent banner (1)
- cookie banner (1)
- cookies (1)
- corrosion resistance (1)
- corrosion; self-fluxing alloys; NiCrBSi; WC-12Co; cavitation; hard metals (1)
- critical review (1)
- cyber kill chain (1)
- demagnetization cooling (1)
- design process (1)
- distributed software development (1)
- diversity (1)
- dlt (1)
- dynamic capabilities (1)
- education; skills; competences; pandemic; online or face-to-face (1)
- efficiency of exciton transfer (1)
- electrode preparation (1)
- empowerment (1)
- entrepreneurial diversity (1)
- entrepreneurship (1)
- ethereum (1)
- ethics (1)
- excitation energy transfer (1)
- expert interviews (1)
- face mask (1)
- farming (1)
- fused deposition modeling (FDM); fused filament fabrication (FFF); polylactic acid (PLA); layer height; layer thickness; filament color; PLA color; dimensional accuracy; tensile strength (1)
- gender stereotypes (1)
- gender-sensitive design (1)
- gender-specific design (1)
- human robot interaction (1)
- human-centered design (1)
- human-robot collaboration (1)
- hybrid sensor system (1)
- hydraulic cell compression (1)
- infrared heating panel (1)
- ingots (1)
- innovation (1)
- intercultural collaboration (1)
- interdisciplinary students project (1)
- intermolecular interaction (1)
- international comparative study (1)
- intersectionality (1)
- irritation (1)
- leak locating (1)
- leak monitoring (1)
- long-term toxicity (1)
- luminescent bacteria (1)
- machine learning (1)
- managerial vs. non-managerial actors (1)
- measurement study (1)
- media accountability (1)
- microfoundations (1)
- molecular force field (1)
- multi-level model of competence (1)
- narcissism (1)
- neutrality (1)
- nonadiabatic dynamics (1)
- noncommuting fluctuations (1)
- nonequilibrium quantum transport (1)
- normalisation (1)
- novel (1)
- open science (1)
- optical chemical structure recognition (1)
- oxygen plasma activation (1)
- pH-shift elution (1)
- participatory design (1)
- phishing (1)
- photovoltaic power systems (1)
- poa (1)
- poe (1)
- policymakers (1)
- political journalism (1)
- polymer electrolyte membrane (1)
- privacy (1)
- product development (1)
- project-based learning (1)
- projection (1)
- protein structure prediction (1)
- public policy (1)
- quality standards (1)
- quantum dissipation (1)
- reconnaissance (1)
- relevance (1)
- respiration inhibition (1)
- risk management (1)
- role identity (1)
- self-fluxing; ZrO2; NiCrBSi; vacuum post-treatment; thermal spraying (1)
- sensor fusion (1)
- servant leadership (1)
- shared user control (1)
- silicon (1)
- solar cells (1)
- solution finding (1)
- spatial policy (1)
- state machine (1)
- study and working time per week (1)
- sustainable development (1)
- television news coverage (1)
- theorising (1)
- trait self-control (1)
- transport (1)
- tree frog (1)
- user acceptance (1)
- ventilation (1)
- vibronic coupling (1)
- virtual reality (1)
- visual cues (1)
- visualization techniques (1)
- watchblogs (1)
- web measurement (1)
- Änderung (1)
Institut
- Westfälisches Institut für Gesundheit (115)
- Westfälisches Energieinstitut (61)
- Institut für Internetsicherheit (56)
- Informatik und Kommunikation (51)
- Elektrotechnik und angewandte Naturwissenschaften (50)
- Wirtschaft und Informationstechnik Bocholt (46)
- Institut für biologische und chemische Informatik (44)
- Maschinenbau Bocholt (37)
- Institut Arbeit und Technik (15)
- Wirtschaftsingenieurwesen (15)
- Maschinenbau und Facilities Management (13)
- Institut für Innovationsforschung und -management (11)
- Fachbereiche (9)
- Wirtschaftsrecht (9)
- Mechatronik-Institut Bocholt (2)
- Strategische Projekte (2)
- Institute (1)
We report on investigations that illustrate the interaction between the specific immune system and a young avascular tumor growing due to a diffusive nutrient supply. We formulate a hybrid cellular automata-partial differential equation (CA-PDE) model which includes cell cycle dynamics and allows for tracking the spatial and temporal evolution of this elaborate biological system. We present results of two dimensional numerical simulations that, specifically in this work, include special cases of the spherical and papillary tumor growth, the infiltration of immune system cells into the tumor and the escape of tumor cells from the regime of the immune cells.
Stereotactic frame systems are widely used in neurosurgery. The accuracy of frame devices is considered as a gold standard to which the accuracy of new frameless stereotactic navigation systems is compared. The purpose of this study is to develop a general approach for the prediction of the application accuracy of stereotactic systems. The approach will be applied to the frame‐based biopsy performed with three frame devices: Leksell G, Cosman–Roberts–Wells (CRW), and Brown–Roberts–Wells (BRW). A work‐flow analysis will be carried out demonstrating that the accuracy relevant for a clinical application comprises several error sources including imaging, target and entry point selection, image to frame coordinates registration, and the setting of mechanical parameters of the frame. These error sources will be postulated to obey a Gaussian distribution probability density. The linear, i.e., Gaussian, error propagation, will be used to link all error contributions thus to calculate the cumulative accuracy of the frame used in the application. Although the Gaussian approach is an approximation, it allows for an analytical treatment of the accuracy. Both the accuracy at the target point and the accuracy of the probe needle guidance along the planned trajectory have been investigated. Of great significance is the relationship found between accuracy, pixel dimension, and image slice thickness, the latter being the dominant factor for slices of more than 1.5 mm thickness, yielding inaccuracies larger than 1.5 mm. For target points the predictions for the application accuracy have been compared to the results of measurements, showing good agreement with the experimental data.
A qualitative work‐flow analysis of a neurosurgical procedure indicates that the resolution of the image used to plan the intervention is the major source of inaccuracy. Quantitative experimental measurements confirm this observation. They fail, however, to explain the relationship between the accuracy of the frame components involved in a stereotactic procedure and the overall application accuracy. This investigation shows that the novel Gaussian approach is a flexible framework for the calculation of the application accuracy of frame systems. Therefore, the Gaussian approach provides a detailed understanding of the interplay between the various factors affecting accuracy. The basic ideas and limitations of the Gaussian approach are briefly explained. The effect of fiducial marker distribution and registration is investigated and shown to introduce a spatial dependence to the accuracy. The results of the Gaussian approach are compared with experimental data for three stereotactic frame devices: Leksell G, Cosman–Roberts–Wells, and Brown–Roberts–Wells. Although the Gaussian approach is an approximation, it reproduces the accuracy measured in the experiment within the statistical error of that experiment. Comp Aid Surg 4:77–86 (1999). © 1999 Wiley‐Liss, Inc.
An automated pipeline for comprehensive calculation of intermolecular interaction energies based on molecular force-fields using the Tinker molecular modelling package is presented. Starting with non-optimized chemically intuitive monomer structures, the pipeline allows the approximation of global minimum energy monomers and dimers, configuration sampling for various monomer-monomer distances, estimation of coordination numbers by molecular dynamics simulations, and the evaluation of differential pair interaction energies. The latter are used to derive Flory-Huggins parameters and isotropic particle-particle repulsions for Dissipative Particle Dynamics (DPD). The computational results for force fields MM3, MMFF94, OPLSAA and AMOEBA09 are analyzed with Density Functional Theory (DFT) calculations and DPD simulations for a mixture of the non-ionic polyoxyethylene alkyl ether surfactant C10E4 with water to demonstrate the usefulness of the approach.
SPICES (Simplified Particle Input ConnEction Specification) is a particle-based molecular structure representation derived from straightforward simplifications of the atom-based SMILES line notation. It aims at supporting tedious and error-prone molecular structure definitions for particle-based mesoscopic simulation techniques like Dissipative Particle Dynamics by allowing for an interplay of different molecular encoding levels that range from topological line notations and corresponding particle-graph visualizations to 3D structures with support of their spatial mapping into a simulation box. An open Java library for SPICES structure handling and mesoscopic simulation support in combination with an open Java Graphical User Interface viewer application for visual topological inspection of SPICES definitions are provided.
Jdpd is an open Java simulation kernel for Molecular Fragment Dissipative Particle Dynamics with parallelizable force calculation, efficient caching options and fast property calculations. It is characterized by an interface and factory-pattern driven design for simple code changes and may help to avoid problems of polyglot programming. Detailed input/output communication, parallelization and process control as well as internal logging capabilities for debugging purposes are supported. The new kernel may be utilized in different simulation environments ranging from flexible scripting solutions up to fully integrated “all-in-one” simulation systems.
CIP is an open-source high-level function library for (non-linear) curve fitting and data smoothing (with cubic splines), clustering (k-medoids, ART-2a) and machine learning (multiple linear/polynomial regression, feed-forward perceptron-type shallow and deep neural networks and support vector machines). In addition it provides several heuristics for the selection of training and test data or methods to estimate the relevance of data input components. CIP is built on top of the computing platform Mathematica to exploit its algorithmic and graphical capabilities.
CIP is an open-source high-level function library for (non-linear) curve fitting and data smoothing (with cubic splines), clustering (k-medoids, ART-2a) and machine learning (multiple linear/polynomial regression, feed-forward perceptron-type shallow and deep neural networks and support vector machines). In addition it provides several heuristics for the selection of training and test data or methods to estimate the relevance of data input components. CIP is built on top of the computing platform Mathematica to exploit its algorithmic and graphical capabilities.
The algorithm for automated functional groups detection and extraction of organic molecules developed by Peter Ertl is implemented on the basis of the Chemistry Development Kit (CDK).
Folder Basic contains the basic ErtlFunctionalGroupsFinder code and test code for integration in Java projects.
Folder CDK contains CDK library jar file cdk-2.2.jar that ErtlFunctionalGroupsFinder works with.
Folder Evaluation contains sample code for evaluation of functional groups with ErtlFunctionalGroupsFinder.
Folder JUnit 4 contains library jar files for unit testing.
Folder Performance contains a jar library for performance tests.
ErtlFunctionalGroupsFinder is described in the scientific literature
Jdpd - An open Java Simulation Kernel for Molecular Fragment Dissipative Particle Dynamics (DPD)
Jdpd is an open Java simulation kernel for Molecular Fragment Dissipative Particle Dynamics (DPD) with parallelizable force calculation, efficient caching options and fast property calculations. It is characterized by an interface and factory-pattern driven design for simple code changes and may help to avoid problems of polyglot programming. Detailed input/output communication, parallelization and process control as well as internal logging capabilities for debugging purposes are supported. The kernel may be utilized in different simulation environments ranging from flexible scripting solutions up to fully integrated “all-in-one” simulation systems like MFsim.
Since Jdpd version 1.6.1.0 Jdpd is available in a (basic) double-precision version and a (derived) single-precision version (= JdpdSP) for all numerical calculations, where the single precision version needs about half the memory of the double precision version.
Jdpd uses the Apache Commons Math and Apache Commons RNG libraries and is published as open source under the GNU General Public License version 3. This repository comprises the Java bytecode libraries (including the Apache Commons Math and RNG libraries), the Javadoc HTML documentation and the Netbeans source code packages including Unit tests.
Jdpd has been described in the scientific literature (the final manuscript 2018 - van den Broek - Jdpd - Final Manucsript.pdf is added to the repository) and used for DPD studies (see references below).
See text file JdpdVersionHistory.txt for a version history with more detailed information.
MFsim - An open Java all-in-one rich-client simulation environment for mesoscopic simulation
MFsim is an open Java all-in-one rich-client computing environment for mesoscopic simulation with Jdpd as its default simulation kernel for Molecular Fragment Dissipative Particle Dynamics (DPD). The environment integrates and supports the complete preparation-simulation-evaluation triad of a mesoscopic simulation task. Productive highlights are a SPICES molecular structure editor, a PDB-to-SPICES parser for particle-based peptide/protein representations, a support of polymer definitions, a compartment editor for complex simulation box start configurations, interactive and flexible simulation box views including analytics, simulation movie generation or animated diagrams. As an open project, MFsim enables customized extensions for different fields of research.
MFsim uses several open libraries (see MFSimVersionHistory.txt for details and references below) and is published as open source under the GNU General Public License version 3 (see LICENSE).
MFsim has been described in the scientific literature and used for DPD studies.
From https://github.com/zielesny/Jdpd:
Jdpd - An open Java Simulation Kernel for Molecular Fragment Dissipative Particle Dynamics (DPD)
Jdpd is an open Java simulation kernel for Molecular Fragment Dissipative Particle Dynamics (DPD) with parallelizable force calculation, efficient caching options and fast property calculations. It is characterized by an interface and factory-pattern driven design for simple code changes and may help to avoid problems of polyglot programming. Detailed input/output communication, parallelization and process control as well as internal logging capabilities for debugging purposes are supported. The kernel may be utilized in different simulation environments ranging from flexible scripting solutions up to fully integrated “all-in-one” simulation systems like MFsim.
Since Jdpd version 1.6.1.0 Jdpd is available in a (basic) double-precision version and a (derived) single-precision version (= JdpdSP) for all numerical calculations, where the single precision version needs about half the memory of the double precision version.
Jdpd uses the Apache Commons Math and Apache Commons RNG libraries and is published as open source under the GNU General Public License version 3. This repository comprises the Java bytecode libraries (including the Apache Commons Math and RNG libraries), the Javadoc HTML documentation and the Netbeans source code packages including Unit tests.
Jdpd has been described in the scientific literature (the final manuscript 2018 - van den Broek - Jdpd - Final Manucsript.pdf is added to the repository) and used for DPD studies (see references below).
See text file JdpdVersionHistory.txt for a version history with more detailed information.
From https://github.com/zielesny/MFsim:
MFsim - An open Java all-in-one rich-client simulation environment for mesoscopic simulation
MFsim is an open Java all-in-one rich-client computing environment for mesoscopic simulation with Jdpd as its default simulation kernel for Molecular Fragment Dissipative Particle Dynamics (DPD). The environment integrates and supports the complete preparation-simulation-evaluation triad of a mesoscopic simulation task. Productive highlights are a SPICES molecular structure editor, a PDB-to-SPICES parser for particle-based peptide/protein representations, a support of polymer definitions, a compartment editor for complex simulation box start configurations, interactive and flexible simulation box views including analytics, simulation movie generation or animated diagrams. As an open project, MFsim enables customized extensions for different fields of research.
MFsim uses several open libraries (see MFSimVersionHistory.txt for details and references below) and is published as open source under the GNU General Public License version 3 (see LICENSE).
MFsim has been described in the scientific literature and used for DPD studies (see references below).
A Robust Interface for Head Motion based Control of a Robot Arm using MARG and Visual Sensors
(2018)
Head-controlled human machine interfaces have gained popularity over the past years, especially in the restoration of the autonomy of severely disabled people, like tetraplegics. These interfaces need to be reliable and robust regarding the environmental conditions to guarantee safety of the user and enable a direct interaction between a human and a machine. This paper presents a hybrid MARG and visual sensor system for head orientation estimation which is in this case used to teleoperate a robotic arm. The system contains a Magnetic Angular Rate Gravity (MARG)-sensor and a Tobii eye tracker 4C. A MARG sensor consists of tri-axis accelerometer, gyroscope as well as a magnetometer which enable a complete measurement of orientation relative to the direction of gravity and magnetic field of the earth. The tri-axis magnetometer is sensitive to external magnetic fields which result in incorrect orientation estimation from the sensor fusion process. In this work the Tobii eye tracker 4C is used to increase head orientation estimation because it also features head tracking even though it is commonly used for eye tracking. This type of visual sensor does not suffer magnetic drift. However, it computes orientation data only, if a user is detectable. Within this work a state machine is presented which enables data fusion of the MARG and visual sensor to improve orientation estimation. The fusion of the orientation data of MARG and visual sensors enables a robust interface, which is immune against external magnetic fields. Therefore, it increases the safety of the human machine interaction.
The set of transactions that occurs on the public ledger of an Ethereum network in a specific time frame can be represented as a directed graph, with vertices representing addresses and an edge indicating the interaction between two addresses.
While there exists preliminary research on analyzing an Ethereum network by the means of graph analysis, most existing work is focused on either the public Ethereum Mainnet or on analyzing the different semantic transaction layers using static graph analysis in order to carve out the different network properties (such as interconnectivity, degrees of centrality, etc.) needed to characterize a blockchain network. By analyzing the consortium-run bloxberg Proof-of-Authority (PoA) Ethereum network, we show that we can identify suspicious and potentially malicious behaviour of network participants by employing statistical graph analysis. We thereby show that it is possible to identify the potentially malicious
exploitation of an unmetered and weakly secured blockchain network resource. In addition, we show that Temporal Network Analysis is a promising technique to identify the occurrence of anomalies in a PoA Ethereum network.
With ongoing developments in the field of smart cities and digitalization in general, data is becoming a driving factor and value stream for new and existing economies alike. However, there exists an increasing centralization and monopolization of data holders and service providers, especially in the form of the big US-based technology companies in the western world and central technology providers with close ties to the government in the Asian regions. Self Sovereign Identity (SSI) provides the technical building blocks to create decentralized data-driven systems, which bring data autonomy back to the users. In this paper we propose a system in which the combination of SSI and token economy based incentivisation strategies makes it possible to unlock the potential value of data-pools without compromising the data autonomy of the users.
Proof of Existence as a blockchain service has first been published in 2013 as a public notary service on the Bitcoin network and can be used to verify the existence of a particular file in a specific point of time without sharing the file or its content itself. This service is also available on the Ethereum based bloxberg network, a decentralized research infrastructure that is governed, operated and developed by an international consortium of research facilities. Since it is desirable to integrate the creation of this proof tightly into the research workflow, namely the acquisition and processing of research data, we show a simple to integrate MATLAB extension based solution with the concept being applicable to other programming languages and environments as well.
A Crypto-Token Based Charging Incentivization
Scheme for Sustainable Light Electric Vehicle
Sharing
(2021)
The ecological impact of shared light electric vehicles (LEV) such as kick scooters is still widely discussed. Especially the fact that the vehicles and batteries are collected using diesel vans in order to charge empty batteries with electricity of unclear origin is perceived as unsustainable. A better option could be to let the users charge the vehicles themselves whenever it is necessary. For this, a decentralized,flexible and easy to install network of off-grid solar charging stations could bring renewable electricity where it is needed without sacrificing the convenience of a free float sharing system. Since the charging stations are powered by solar energy the most efficient way to utilize them would be to charge the vehicles when the sun is shining. In order to make users charge the vehicle it is necessary to provide some form of benefit for
them doing so. This could be either a discount or free rides. A
particularly robust and well-established mechanism is controlling incentives via means of blockchain-based cryptotokens. This paper demonstrates a crypto-token based scheme for incentivizing users to charge sharing vehicles during times of considerable solar irradiation in order to contribute to more sustainable mobility services.
In this experimental work we present a novel electrolyzer system for the production of hydrogen and oxygen at high pressure levels without an additional mechanical compressor. Due to its control strategies, the operation conditions for this electrolyzer can be kept optimal for each load situation of the system. Furthermore, the novel system design allows for dynamic long-term operation as well as for easy maintainability. Therefore, the device meets the requirements for prospective power-to-gas applications, especially, in order to store excess energy from renewable sources. A laboratory scale device has been developed and high-pressure operation was validated. We also studied the long-term stability of the system by applying dynamic load cycles with load changes every 30 sec. After 80 h of operation the used membrane electrode assembly (MEA) was investigated by means of SEM, EDX and XRD analysis.
The technology of polymer electrolyte membrane (PEM) electrolysis provides an efficient way to produce hydrogen. In combination with renewable energy sources, it promises to be one of the key factors towards a carbon-free energy infrastructure in the future. Today, PEM electrolyzers with a power consumption higher than 1 MW and a gas output pressure of 30 bar (or even higher) are already commercially available. Nevertheless, fundamental research and development for an improved efficiency is far from being finally accomplished, and mostly takes place on a laboratory scale. Upscaling the laboratory prototypes to an industrial size usually cannot be achieved without facing further problems and/or losing efficiency. With our novel system design based on hydraulic cell compression, a lot of the commonly occurring problems like inhomogeneous temperature and current distribution can be avoided. In this study we present first results of an upscaling by a factor of 30 in active cell area.
Performance enhancing study for large scale PEM electrolyzer cells based on hydraulic compression
(2017)
A compact and efficient PEM electrolyser stack design based on hydraulic single cell compression
(2019)
Purpose
Although courage has generally been understood as a powerful virtue, research to establish it as a psychological construct is in its infancy. We examined courage in organizations against the backdrop of positive psychology with a design in the Grounded Theory tradition that connects Positive Organizational Behavior and Positive Organizational Scholarship.
Method
The sample consists of organizations that define courage in their mission statement and organizations without such a definition. It includes employees and executives, exploring workplace courage on the macro as well as the micro level. Eleven organizations and 23 participants contributed to the interview study.
Results
Applying Glaser's theoretical coding, specifically the C-family, we propose that courage arises from a decisional conflict in three major domains: the self, social interaction, and performance. It is located on a continuum between apathy and foolhardiness and can take on reactive, proactive, or autonomous forms. Whether and to what extent courage manifests, is a dynamic process contingent upon organizational structure, culture, and communication climate as well as individual cognitiveaffective personality systems.
Limitations
The model depicts the complexity of the phenomenon, rather than details of its individual components. It goes beyond pre-defined categories and prevailing definitions.
Implications
Modern organizations are characterized by volatility, uncertainty, complexity, and ambiguity (VUCA).
Courage is crucial in such an environment and can be systematically fostered across the whole human
resource management cycle.
Value
The study advances theory building on courage in the workplace and highlights its potential to be
measured, developed and managed for more effective work performance.
Article 134 TFEU
(2023)
Article 135 TFEU
(2023)
Biomimetics is a well-known approach for technical innovation. However, most of its influence remains in the academic field. One option for increasing its application in the practice of technical design is to enhance the use of the biomimetic process with a step-by-step standard, building a bridge to common engineering procedures. This article presents the endeavor of an interdisciplinary expert panel from the fields of biology, engineering science, and industry to develop a standard that links biomimetics to the classical processes of product development and engineering design. This new standard, VDI 6220 Part 2, proposes a process description that is compatible and connectable to classical approaches in engineering design. The standard encompasses both the solution-based and the problem-driven process of biomimetics. It is intended to be used in any product development process for more biomimetic applications in the future.
Biomimetics is the interdisciplinary co-operation of various scientific disciplines and fields of innovation, and it aims to solve practical problems using biological models. Biomimetic research and its fields of application are manifold, and the community is made up of a wide range of disciplines, from biologists and engineers to designers. Guidelines and standards can build a common ground for understanding of the field, communication across disciplines, present and future projects and implementation of biomimetic knowledge. Since 2015, three international standards have been published and defined terms and definitions, as well as specific applications. The scientific literature and patents in several databases were searched for citations of the published standards. Standards or technical guidelines on biomimetics are represented both in the scientific literature and in patents. However, taking into account the increasing number of publications in biomimetics, the number of publications (52) citing the international standards is low. This shows that the perception of technical rules is still underrepresented in the academic field. Greater awareness and acceptance of the importance of standards for quality assurance even in the academic environment is discussed, and active participation in the corresponding International Organization for Standardization committee on biomimetics is asked for.
As a rule, an experiment carried out at school or in undergraduate study
courses is rather simple and not very informative. However, when the experiments
are to be performed using modern methods, they are often abstract and
difficult to understand. Here, we describe a quick and simple experiment,
namely the enzymatic characterization of ptyalin (human salivary amylase)
using a starch degradation assay. With the experimental setup presented here,
enzyme parameters, such as pH optimum, temperature optimum, chloride
dependence, and sensitivity to certain chemicals can be easily determined. This
experiment can serve as a good model for enzyme characterization in general,
as modern methods usually follow the same principle: determination of the
activity of the enzyme under different conditions. As different alleles occur in
humans, a random selection of test subjects will be quite different with regard
to ptyalin activities. Therefore, when the students measure their own ptyalin
activity, significant differences will emerge, and this will give them an idea of
the genetic diversity in human populations. The evaluation has shown that the
pupils have gained a solid understanding of the topic through this experiment.
To address the question which neocortical layers and cell types are important for the perception of a sensory stimulus, we performed multielectrode recordings in the barrel cortex of head-fixed mice performing a single-whisker go/no-go detection task with vibrotactile stimuli of differing intensities. We found that behavioral detection probability decreased gradually over the course of each session, which was well explained by a signal detection theory-based model that posits stable psychometric sensitivity and a variable decision criterion updated after each reinforcement, reflecting decreasing motivation. Analysis of multiunit activity demonstrated highest neurometric sensitivity in layer 4, which was achieved within only 30 ms after stimulus onset. At the level of single neurons, we observed substantial heterogeneity of neurometric sensitivity within and across layers, ranging from nonresponsiveness to approaching or even exceeding psychometric sensitivity. In all cortical layers, putative inhibitory interneurons on average proffered higher neurometric sensitivity than putative excitatory neurons. In infragranular layers, neurons increasing firing rate in response to stimulation featured higher sensitivities than neurons decreasing firing rate. Offline machine-learning-based analysis of videos of behavioral sessions showed that mice performed better when not moving, which at the neuronal level, was reflected by increased stimulus-evoked firing rates.
In this paper, we investigate the influence of different disease groups on the size of different 1 anatomical structures. To this end, we first modify and improve an existing anatomical segmentation 2 model. Then, we use this model to segment 104 anatomical structures from computed tomography 3 (CT) scans and compute their volumes from the segmentation. After correlating the results with each 4 other, we find no new significant correlations. After correlating the volume data with known diseases 5 for each case, we find two weak correlations, one of which has not been described before and for 6 which we present a possible explanation.
Improved Plasma Membrane Models as Test Systems for the Membrane
Disrupting Activity of Kalata B1
(2017)
Steps Towards an Open All-in-one Rich-Client Environment for Particle-Based Mesoscopic Simulation
(2018)
Tape brazing constitutes a cost-effective alternative surface protection technology for complex-shaped surfaces. The study explores the characteristics of high-temperature brazed coatings using a cobalt-based powder deposited on a stainless-steel substrate in order to protect parts subjected to hot temperatures in a wear-exposed environment. Microstructural imaging corroborated with x-ray diffraction analysis showed a complex phased structure consisting of intermetallic Cr-Ni, C-Co-W Laves type, and chromium carbide phases. The surface properties of the coatings, targeting hot corrosion behavior, erosion, wear resistance, and microhardness, were evaluated. The high-temperature corrosion test was performed for 100 h at 750 C in a salt mixture consisting of 25 wt.% NaCl + 75 wt.% Na2SO4. The degree of corrosion attack was closely connected with the exposure temperature, and the degradation of the material corresponding to the mechanisms of low-temperature hot corrosion. The erosion tests were carried out using alumina particles at a 90 impingement angle. The results, correlated with the microhardness measurements, have shown that Co-based coatings exhibited approximately 40% lower material loss compared to that of the steel substrate.
Based on the fact that titanium and titanium alloys have poor fretting fatigue resistance and poor tribological properties, it is necessary to apply some surface engineering methods in order to increase the exploitation characteristics of these materials. One may either implement some surface treatment technologies or even deposit overlay coatings by thermal spraying.
The present study is focused on the achieved properties of the ceramic coatings (Al2O3 + 13 wt.% TiO2) deposited onto a titanium substrate using high velocity oxygen fuel (HVOF) and plasma spraying (APS) respectively.
The effect of the deposition method on the microstructure, phase constituents, and mechanical properties of the ceramic coatings was investigated by means of scanning electron microscopy (SEM), X-ray diffraction technique (XRD) and nanoindentation tests. The sliding wear performances of the Al2O3–TiO2 coatings were tested using a pin on disk wear tester.
Web advertisements are the primary financial source for many online services, but also for cybercriminals. Successful ad campaigns rely on good online profiles of their potential customers. The financial potentials of displaying ads have led to the rise of malware that injects or replaces ads on websites, in particular, so-called adware. This development leads to always further optimized and customized advertising. For these customization's, various tracking methods are used. However, only sparse work has gone into privacy issues emerging from adware. In this paper, we investigate the tracking capabilities and related privacy implications of adware and potentially unwanted programs (PUPs). Therefore, we developed a framework that allows us to analyze any network communication of the Firefox browser on the application level to circumvent encryption like TLS. We use this to dynamically analyze the communication streams of over 16,000 adware or potentially unwanted programs samples that tamper with the users' browser session. Our results indicate that roughly 37% of the requests issued by the analyzed samples contain private information and are accordingly able to track users. Additionally, we analyze which tracking techniques and services are used.
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation’s definition of personal data applies to every company that collects data from European Internet users. This includes tracking services that, until then, argued that they were collecting anonymous information and data protection requirements would not apply to their businesses.
Previous studies have analyzed the impact of the GDPR on the prevalence of online tracking, with mixed results. In this paper, we go beyond the analysis of the number of third parties and focus on the underlying information sharing networks between online advertising companies in terms of client-side cookie syncing. Using graph analysis, our measurement shows that the number of ID syncing connections decreased by around 40 % around the time the GDPR went into effect, but a long-term analysis shows a slight rebound since then. While we can show a decrease in information sharing between third parties, which is likely related to the legislation, the data also shows that the amount of tracking, as well as the general structure of cooperation, was not affected. Consolidation in the ecosystem led to a more centralized infrastructure that might actually have negative effects on user privacy, as fewer companies perform tracking on more sites.
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they provide their users. However, in reality, they often do not know which third parties are embedded, for example, when these third parties request additional content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the magnitude of these new challenges. To better reflect the connectedness of third parties, we measured their relations in a model we call third party trees, which reflects an approximation of the loading dependencies of all third parties embedded into a given website. Using this concept, we show that including a single third party can lead to subsequent requests from up to eight additional services. Furthermore, our findings indicate that the third parties embedded on a page load are not always deterministic, as 50 % of the branches in the third party trees change between repeated visits. In addition, we found that 93 % of the analyzed websites embedded third parties that are located in regions that might not be in line with the current legal framework. Our study also replicates previous work that mostly focused on landing pages of websites. We show that this method is only able to measure a lower bound as subsites show a significant increase of privacy-invasive techniques. For example, our results show an increase of used cookies by about 36 % when crawling websites more deeply.
Renewable and sustainable energy production by many small and distributed producers is revolutionizing the energy landscape as we know it. Consumers produce energy, making them to prosumers in the smart grid. The interaction between prosumers and other entities in the grid and the optimal utilization of new smart grid components (electric cars, freezers, solar panels, etc.) are crucial for the success of the smart grid. The Power Trading Agent Competition is an open simulation platform that allows researchers to conduct low risk studies in this new energy market. In this work we present Maxon16, an autonomous energy broker and champion of the 2016's Power Trading Agent Competition. We present the strategies the broker used in the final round and evaluate the effectiveness of the strategies by analyzing the tournament's results.
This thesis evaluates the effects of the GDPR using a technical and human-centric approach. We assess challenges service providers face when they want to design GDPR-proof web applications. On the technical side, we perform two large-scale measurement studies. The first study aims to illuminate third party loading dependencies in web applications. The second study provides a detailed analysis of the information-sharing networks between online adver-tising companies. The human-centric analysis studies how companies implemented the Right to Access and if users can profit from the new right.