Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (212)
- Konferenzveröffentlichung (210)
- Teil eines Buches (Kapitel) (31)
- Sonstiges (29)
- Video (14)
- Buch (Monographie) (13)
- Preprint (9)
- Dissertation (4)
- Arbeitspapier (4)
- Bericht (3)
Sprache
- Englisch (534) (entfernen)
Schlagworte
- Robotik (8)
- Flugkörper (7)
- UAV (7)
- Rettungsrobotik (5)
- Polymer-Elektrolytmembran-Brennstoffzelle (4)
- adhesion (4)
- Bionik (3)
- Erweiterte Realität <Informatik> (3)
- Gespenstschrecken (3)
- Haftorgan (3)
Institut
- Westfälisches Institut für Gesundheit (115)
- Institut für Internetsicherheit (56)
- Informatik und Kommunikation (51)
- Elektrotechnik und angewandte Naturwissenschaften (50)
- Wirtschaft und Informationstechnik Bocholt (46)
- Westfälisches Energieinstitut (44)
- Institut für biologische und chemische Informatik (37)
- Maschinenbau Bocholt (37)
- Institut Arbeit und Technik (15)
- Wirtschaftsingenieurwesen (15)
In this paper, we present a method for detecting objects of interest, including cars, humans, and fire, in aerial images captured by unmanned aerial vehicles (UAVs) usually during vegetation fires. To achieve this, we use artificial neural networks and create a dataset for supervised learning. We accomplish the assisted labeling of the dataset through the implementation of an object detection pipeline that combines classic image processing techniques with pretrained neural networks. In addition, we develop a data augmentation pipeline to augment the dataset with utomatically labeled images. Finally, we evaluate the performance of different neural networks.
We show that strong non-Markovian effects can be revealed by the steady-state two-dimensional (2D) photon echo spectra at asymptotic waiting times. For this, we use a simple dimer toy model that is strongly coupled to a harmonic bath with parameters typical for photoactive biomolecules. We calculate the 2D photon echo spectra employing both the numerically exact hierarchy equation of motion and the quasiadiabatic path integral approach and compare these results with approximate results from a time-nonlocal quantum master equation approach. While the latter correctly reproduces the exact population dynamics at long times, it fails at the same time to correctly describe the 2D photon echo spectra at long waiting times. The differences show that non-Markovian effects are much more important for the steady-state 2D photon echoes than for the equilibrium populations. Thus, accurate theoretical descriptions of the energy transfer dynamics in biomolecular complexes have to be based on numerically exact simulations of the environmental fluctuations when nonlinear response functions are analyzed.
This thesis evaluates the effects of the GDPR using a technical and human-centric approach. We assess challenges service providers face when they want to design GDPR-proof web applications. On the technical side, we perform two large-scale measurement studies. The first study aims to illuminate third party loading dependencies in web applications. The second study provides a detailed analysis of the information-sharing networks between online adver-tising companies. The human-centric analysis studies how companies implemented the Right to Access and if users can profit from the new right.
Web advertisements are the primary financial source for many online services, but also for cybercriminals. Successful ad campaigns rely on good online profiles of their potential customers. The financial potentials of displaying ads have led to the rise of malware that injects or replaces ads on websites, in particular, so-called adware. This development leads to always further optimized and customized advertising. For these customization's, various tracking methods are used. However, only sparse work has gone into privacy issues emerging from adware. In this paper, we investigate the tracking capabilities and related privacy implications of adware and potentially unwanted programs (PUPs). Therefore, we developed a framework that allows us to analyze any network communication of the Firefox browser on the application level to circumvent encryption like TLS. We use this to dynamically analyze the communication streams of over 16,000 adware or potentially unwanted programs samples that tamper with the users' browser session. Our results indicate that roughly 37% of the requests issued by the analyzed samples contain private information and are accordingly able to track users. Additionally, we analyze which tracking techniques and services are used.
Third-party tracking is a common and broadly used technique on the Web. Different defense mechanisms have emerged to counter these practices (e.g. browser vendors that ban all third-party cookies). However, these countermeasures only target third-party trackers and ignore the first party because the narrative is that such monitoring is mostly used to improve the utilized service (e.g. analytical services). In this paper, we present a large-scale measurement study that analyzes tracking performed by the first party but utilized by a third party to circumvent standard tracking preventing techniques. We visit the top 15,000 websites to analyze first-party cookies used to track users and a technique called “DNS CNAME cloaking”, which can be used by a third party to place first-party cookies. Using this data, we show that 76% of sites effectively utilize such tracking techniques. In a long-running analysis, we show that the usage of such cookies increased by more than 50% over 2021.
The Unfitted Discontinuous Galerkin Method for Solving the EEG Forward Problem: A Second Order Study
(2016)
The disruptive nature of the changing media landscape and technology-driven advances in communication have led to innovative ways of organizing work in the information and communication industry. This reorganization of work is reflected in the concept of New Work, which rethinks working concepts, styles, and employee behavior. Based on a survey among staff in the information and communication industry (n = 380), this study investigates the status quo of the implementation of New Work measures and their effectiveness in helping companies reach organizational goals. The results show that New Work measures are widely adopted although there is still unused potential. Moreover, the study demonstrates that the implementation of New Work measures supports companies in achieving New Work goals as well as overall organizational goals in the contexts of agile management, change management, internal communication, and evaluation.
The article highlights gender codes in design, particularly in web design, by means of current examples. Different aspects of gender-specific design are looked at in detail and their inherent problems discussed: on the one hand the development of a special solution (gender-specific for women), on the other hand, web design with reduced functionality and simplification of information (i.e. image representation) which sometimes even leads to a negation of technology. The article illustrates that gender codes and stereotypical role models can be embodied on different design levels of web design (use and artefact): in structure/navigation, in creative elements by the use of shape, colour and imagery and on a textual level. These design decisions have an impact on the power of users to act, their individual gender identity and the structural gender identity/social perception of gender. The article demonstrates that gender codes in current web design are very present and aims to sensitize the topic.