Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (237)
- Konferenzveröffentlichung (216)
- Teil eines Buches (Kapitel) (32)
- Sonstiges (31)
- Video (14)
- Buch (Monographie) (13)
- Preprint (12)
- Dissertation (4)
- Bericht (4)
- Arbeitspapier (4)
Sprache
- Englisch (572) (entfernen)
Schlagworte
- Robotik (8)
- Flugkörper (7)
- UAV (7)
- Rettungsrobotik (5)
- Dissipative Particle Dynamics (4)
- Polymer-Elektrolytmembran-Brennstoffzelle (4)
- adhesion (4)
- Bionik (3)
- Deep Learning (3)
- Erweiterte Realität <Informatik> (3)
Institut
- Westfälisches Institut für Gesundheit (115)
- Westfälisches Energieinstitut (61)
- Institut für Internetsicherheit (56)
- Informatik und Kommunikation (51)
- Elektrotechnik und angewandte Naturwissenschaften (50)
- Wirtschaft und Informationstechnik Bocholt (46)
- Institut für biologische und chemische Informatik (44)
- Maschinenbau Bocholt (37)
- Institut Arbeit und Technik (15)
- Wirtschaftsingenieurwesen (15)
Background: Priority during the SARS-CoV2 pandemic is that employees need to be protected from infection risks and business activities need to be ensured. New virus variants with increased infection risks require an evolved risk strategy.
Material and methods: Several standard measures such as testing, isolation and quarantine are com-bined to a novel risk strategy. Epidemiological model calculations and scientific knowledge about the course of SARS-CoV2 infectivity are used to optimize this strategy. The procedure is implemented in an easy-to-use calculator based on Excel.
Layout in practice and results: Alternative combinations of measures and practical aspects are dis-cussed. Example calculations are used to demonstrate the effect of the discussed measures.
Conclusion: That quarantine calculator derived from these principles enables even non-specialists to perform a differentiated risk analysis and to introduce optimized measures. Targeted testing routines and alternative measures ensure staff availability.
Web Service Security - XKMS
(2004)
The adsorption of water on r-TiO2(110) has been investigated with thermal desorption spectroscopy (TDS) and helium atom scattering. Conventional TDS using a mass spectrometer and He-TDS monitoring reflected He beam intensity consistently show the existence of a structurally well-defined monolayer as well as a highly ordered second layer of water and a disordered multilayer phase. He diffraction patterns recorded along the high symmetry [001], equation image, and equation image directions reveal a well-ordered superstructure with (1x1) symmetry, providing strong evidence for the absence of a partially dissociated monolayer on the perfect parts of the substrate. No changes in the diffraction patterns are observed after irradiation with UV-light.
Autonomy and self-determination are fundamental aspects of living in our society. Supporting people for whom this freedom is limited due to physical impairments is the fundamental goal of this thesis. Especially for people who are paralyzed, even working at a desk job is often not feasible. Therefore, in this thesis a prototype of a robot assembly workstation was constructed that utilizes a modern Augmented Reality (AR)-Head-Mounted Display (HMD) to control a robotic arm. Through the use of object pose recognition, the objects in the working environment are detected and this information is used to display different visual cues at the robotic arm or in its vicinity. Providing the users with additional depth information and helping them determine object relations, which are often not easily discernible from a fixed perspective.
To achieve this a hands-free AR-based robot-control scheme was developed, which uses speech and head-movement for interaction. Additionally, multiple advanced visual cues were designed that utilize object pose detection for spatial-visual support. The pose recognition system is adapted from state-of-the-art research in computer vision to allow the detection of arbitrary objects with no regard for texture or shape.
Two evaluations were performed, a small user study that excluded the object recognition, which confirms the general usability of the system and gives an impression on its performance. The participants were able to perform difficult pick and place tasks with a high success rate. Secondly, a technical evaluation of the object recognition system was conducted, which revealed an adequate prediction precision, but is too unreliable for real-world scenarios as the prediction quality is highly variable and depends on object orientations and occlusion.
Venice 2018: Tradr Review
(2018)
The video shows an orthopoto and a textured 3D model of the location. 300 images were recorded in two short flights with a Mavic Pro in 50 meter height. The first one was a single grid while the camera facing down and the second one was a double grid facing the camera at an 60 degree angle. The 3D model is computed with OpenDroneMap.
Upgrade of Bioreactor System Providing Physiological Stimuli
to Engineered Musculoskeletal Tissues
(2017)
A novel central control interface (CCI) is developed to improve the modular bioreactor system with regard to extendability and modifiability in Tissue Engineering (TE) applications. This paper presents the results developed in the project with open-source hardware and the graphical programming system LabVIEW. A new platform independent User Interface was further developed to contribute to the new flexibility of the device.
Ultrafast Energy Transfer in Excitonically Coupled Molecules Induced by a Nonlocal Peierls Phonon
(2019)
Molecular vibration can influence exciton transfer via either a local (intramolecular) Holstein or a nonlocal (intermolecular) Peierls mode. We show that a strong vibronic coupling to a nonlocal mode dramatically speeds up the transfer by opening an additional transfer channel. This Peierls channel is rooted in the formation of a conical intersection of the excitonic potential energy surfaces. For increasing Peierls coupling, the electronically coherent transfer for weak coupling turns into an incoherent transfer of a localized exciton through the intersection for strong coupling. The interpretation in terms of a conical intersection intuitively explains recent experiments of ultrafast energy transfer in photosynthetic and photovoltaic molecular systems.
In this paper, we present a method for detecting objects of interest, including cars, humans, and fire, in aerial images captured by unmanned aerial vehicles (UAVs) usually during vegetation fires. To achieve this, we use artificial neural networks and create a dataset for supervised learning. We accomplish the assisted labeling of the dataset through the implementation of an object detection pipeline that combines classic image processing techniques with pretrained neural networks. In addition, we develop a data augmentation pipeline to augment the dataset with utomatically labeled images. Finally, we evaluate the performance of different neural networks.
We show that strong non-Markovian effects can be revealed by the steady-state two-dimensional (2D) photon echo spectra at asymptotic waiting times. For this, we use a simple dimer toy model that is strongly coupled to a harmonic bath with parameters typical for photoactive biomolecules. We calculate the 2D photon echo spectra employing both the numerically exact hierarchy equation of motion and the quasiadiabatic path integral approach and compare these results with approximate results from a time-nonlocal quantum master equation approach. While the latter correctly reproduces the exact population dynamics at long times, it fails at the same time to correctly describe the 2D photon echo spectra at long waiting times. The differences show that non-Markovian effects are much more important for the steady-state 2D photon echoes than for the equilibrium populations. Thus, accurate theoretical descriptions of the energy transfer dynamics in biomolecular complexes have to be based on numerically exact simulations of the environmental fluctuations when nonlinear response functions are analyzed.
This thesis evaluates the effects of the GDPR using a technical and human-centric approach. We assess challenges service providers face when they want to design GDPR-proof web applications. On the technical side, we perform two large-scale measurement studies. The first study aims to illuminate third party loading dependencies in web applications. The second study provides a detailed analysis of the information-sharing networks between online adver-tising companies. The human-centric analysis studies how companies implemented the Right to Access and if users can profit from the new right.
Web advertisements are the primary financial source for many online services, but also for cybercriminals. Successful ad campaigns rely on good online profiles of their potential customers. The financial potentials of displaying ads have led to the rise of malware that injects or replaces ads on websites, in particular, so-called adware. This development leads to always further optimized and customized advertising. For these customization's, various tracking methods are used. However, only sparse work has gone into privacy issues emerging from adware. In this paper, we investigate the tracking capabilities and related privacy implications of adware and potentially unwanted programs (PUPs). Therefore, we developed a framework that allows us to analyze any network communication of the Firefox browser on the application level to circumvent encryption like TLS. We use this to dynamically analyze the communication streams of over 16,000 adware or potentially unwanted programs samples that tamper with the users' browser session. Our results indicate that roughly 37% of the requests issued by the analyzed samples contain private information and are accordingly able to track users. Additionally, we analyze which tracking techniques and services are used.
Third-party tracking is a common and broadly used technique on the Web. Different defense mechanisms have emerged to counter these practices (e.g. browser vendors that ban all third-party cookies). However, these countermeasures only target third-party trackers and ignore the first party because the narrative is that such monitoring is mostly used to improve the utilized service (e.g. analytical services). In this paper, we present a large-scale measurement study that analyzes tracking performed by the first party but utilized by a third party to circumvent standard tracking preventing techniques. We visit the top 15,000 websites to analyze first-party cookies used to track users and a technique called “DNS CNAME cloaking”, which can be used by a third party to place first-party cookies. Using this data, we show that 76% of sites effectively utilize such tracking techniques. In a long-running analysis, we show that the usage of such cookies increased by more than 50% over 2021.
For proton exchange membrane water electrolysis (PEMWE) to become competitive, the cost of stack components, such as bipolar plates (BPP), needs to be reduced. This can be achieved by using coated low-cost materials, such as copper as alternative to titanium. Herein we report on highly corrosion-resistant copper BPP coated with niobium. All investigated samples showed excellent corrosion resistance properties, with corrosion currents lower than 0.1 µA cm−2 in a simulated PEM electrolyzer environment at two different pH values. The physico-chemical properties of the Nb coatings are thoroughly characterized by scanning electron microscopy (SEM), electrochemical impedance spectroscopy (EIS), X-ray photoelectron spectroscopy (XPS), and atomic force microscopy (AFM). A 30 µm thick Nb coating fully protects the Cu against corrosion due to the formation of a passive oxide layer on its surface, predominantly composed of Nb2O5. The thickness of the passive oxide layer determined by both EIS and XPS is in the range of 10 nm. The results reported here demonstrate the effectiveness of Nb for protecting Cu against corrosion, opening the possibility to use it for the manufacturing of BPP for PEMWE. The latter was confirmed by its successful implementation in a single cell PEMWE based on hydraulic compression technology.
Thermal Stress at the Surface of Thick Conductive Plates Induced by Sinusoidal Current Pulses
(2016)
The Unfitted Discontinuous Galerkin Method for Solving the EEG Forward Problem: A Second Order Study
(2016)
The disruptive nature of the changing media landscape and technology-driven advances in communication have led to innovative ways of organizing work in the information and communication industry. This reorganization of work is reflected in the concept of New Work, which rethinks working concepts, styles, and employee behavior. Based on a survey among staff in the information and communication industry (n = 380), this study investigates the status quo of the implementation of New Work measures and their effectiveness in helping companies reach organizational goals. The results show that New Work measures are widely adopted although there is still unused potential. Moreover, the study demonstrates that the implementation of New Work measures supports companies in achieving New Work goals as well as overall organizational goals in the contexts of agile management, change management, internal communication, and evaluation.
The article highlights gender codes in design, particularly in web design, by means of current examples. Different aspects of gender-specific design are looked at in detail and their inherent problems discussed: on the one hand the development of a special solution (gender-specific for women), on the other hand, web design with reduced functionality and simplification of information (i.e. image representation) which sometimes even leads to a negation of technology. The article illustrates that gender codes and stereotypical role models can be embodied on different design levels of web design (use and artefact): in structure/navigation, in creative elements by the use of shape, colour and imagery and on a textual level. These design decisions have an impact on the power of users to act, their individual gender identity and the structural gender identity/social perception of gender. The article demonstrates that gender codes in current web design are very present and aims to sensitize the topic.