Filtern
Erscheinungsjahr
- 2021 (67) (entfernen)
Dokumenttyp
- Wissenschaftlicher Artikel (67) (entfernen)
Schlagworte
- Journalismus (2)
- Aerosol (1)
- Aggregation-prone (1)
- Bewertung (1)
- Bone morphogenetic protein 2 (1)
- COVID-19 (1)
- Deutschland. Bundeskartellamt (1)
- Due Diligence (1)
- E. coli SHuffle® T7 (1)
- ESZB-Mandat (1)
Institut
- Wirtschaftsrecht (20)
- Institut für biologische und chemische Informatik (7)
- Wirtschaft Gelsenkirchen (5)
- Elektrotechnik und angewandte Naturwissenschaften (4)
- Informatik und Kommunikation (4)
- Westfälisches Energieinstitut (4)
- Wirtschaft und Informationstechnik Bocholt (3)
- Maschinenbau Bocholt (2)
- Wirtschaftsingenieurwesen (2)
- Maschinenbau und Facilities Management (1)
A Crypto-Token Based Charging Incentivization
Scheme for Sustainable Light Electric Vehicle
Sharing
(2021)
The ecological impact of shared light electric vehicles (LEV) such as kick scooters is still widely discussed. Especially the fact that the vehicles and batteries are collected using diesel vans in order to charge empty batteries with electricity of unclear origin is perceived as unsustainable. A better option could be to let the users charge the vehicles themselves whenever it is necessary. For this, a decentralized,flexible and easy to install network of off-grid solar charging stations could bring renewable electricity where it is needed without sacrificing the convenience of a free float sharing system. Since the charging stations are powered by solar energy the most efficient way to utilize them would be to charge the vehicles when the sun is shining. In order to make users charge the vehicle it is necessary to provide some form of benefit for
them doing so. This could be either a discount or free rides. A
particularly robust and well-established mechanism is controlling incentives via means of blockchain-based cryptotokens. This paper demonstrates a crypto-token based scheme for incentivizing users to charge sharing vehicles during times of considerable solar irradiation in order to contribute to more sustainable mobility services.
Serviceangebote aus der Public Cloud schießen derzeit förmlich durch die Decke. Obwohl Coroana in einzelnen Bereichen Cloud-Projekte verzögert, gehören die Digitalisierung und damit auch Cloud Services zu den eindeutigen Gewinnersn in der Krise: Doch mit der Auslagerung von IT-Services im großen Maßstab in die Cloud, nehmen auch Cyberkriminelle dieses Umfeld mehr und mehr ins Visier. Cloud Service Provider sind zwar in der Regel sicherheitstechnisch immer auf dem neuesten Stand - aber auch sie sind angreifbar. Damit Cyberkriminelle in Cloud-Umgebungen keine Chance haben, den Blicken von Unternehemen und Strafverfolgungsbehörden zu entgehen, ist eine umfassende digitale Forensik erforderlich. In der Praxis bestehen dafür jedoch große Hürden. Deshalb müssen hier jetzt schnell neue, kreative Ansätze gefunden werden.
Die Art und Weise wie wir leben und wohnen hat sich in den vergangenen Jahren stark verändert, daraus haben sich einige neue Trends für den häuslichen Alltag ergeben. Dies ist unter anderem darauf zurückzuführen, dass das steigende Umweltbewusstsein viele Handlungsentscheidungen beeinflusst. Zudem bedingt die demografische Entwicklung, dass nach neuen Lösungsansätzen für ein eigenständiges Leben im Alter gesucht werden muss. Mittlerweile ist auch das Homeoffice so etabliert, dass daraus neue Gegebenheiten für das heutige und künftige Arbeiten von Zuhause resultieren, die technologische Veränderungen notwendig machen. Insgesamt wird ein Wandel hin zum smarten Zuhause als Chance gesehen, diesen aktuellen Herausforderungen zu begegnen. Aber was
bedeutet Smart Home tatsächlich im täglichen Leben und wie wird dieses in der Zukunft gestaltet werden? Für die Einschätzung hier gilt es, die Vorteile von Smart Home ebenso zu betrachten, wie mögliche Risiken und was berücksichtigt werden muss, um Schäden zu vermeiden. Denn nur so lässt sich eine Akzeptanz in der digitalen Zukunft zu erzielen.
Background: By reviewing image quality and diagnostic perception, the suitability of a statistical model-based iterative reconstruction algorithm in conjunction with low-dose computed tomography for lung cancer screening is investigated.
Methods: Artificial lung nodules shaped as spheres and spiculated spheres made from material with calibrated Hounsfield units were attached on marked positions in the lung structure of anthropomorphic phantoms. The phantoms were scanned using standard high contrast, and two low-dose computed tomography protocols: low-dose and ultra-low-dose. For the reconstruction, the filtered back projection and the iterative reconstruction algorithm ADMIRE at different strength levels (S1–S5) and the kernels Bl57, Br32, Br69 were used. Expert radiologists assessed image quality by performing 4-field-ranking tests and reading all image series to examine the aptitude for the detectability of lung nodules. Signal-to-noise ratio was investigated as objective image quality parameter.
Results: In ranking tests for lung foci detection expert radiologists prefer medium to high iterative reconstruction strength levels. For the standard clinical kernel Bl57 and varying phantom diameter, a noticeable preference for S4 was detected. Experienced radiologists graded filtered back projection reconstructed images with the highest perceptibility. Less experienced readers assessed filtered back projection and iterative reconstruction equally with the highest grades for the Bl57 kernel. Independently of the dose protocol, the signal-to-noise ratio increases with the iterative reconstruction strength level, specifically for Br69 and Bl57.
Conclusions: Subjective image perception does not significantly correlate with the experience of the radiologist, which presumably mirrors reader’s training and accustomed reading adjustments. Regarding signal-to-noise ratio, iterative reconstruction outperforms filtered back projection for spheres and spiculated spheres. Iterative reconstruction matters. It promises to be an alternative to filtered back projection allowing for lung-cancer screening at markedly decreased radiation exposure but comparable or even improved image quality.
This introduction to a special issue about concepts and facets of entrepreneurial diversity serves as a starting point for further discussion and research in this field. For this purpose, we provide information about the roots of the study of diversity and current trends in entrepreneurship research and present a frame for (researching) entrepreneurial diversity. Additionally, we briefly summarize the three papers selected for inclusion in this special issue. Together, they offer insights into the intersections of different diversity dimensions, personality as a deep dimension of team composition, and a general critical reflection on the conceptualization of entrepreneurial diversity. Taken together, the papers in this special issue present new findings and contribute to further advancing the long overdue research on and discussion about diversity in the field of entrepreneurship.
Description and Analysis of Glycosidic Residues in the Largest Open Natural Products Database
(2021)
Flying insects employ elegant optical-flow-based strategies to solve complex tasks such as landing or obstacle avoidance. Roboticists have mimicked these strategies on flying robots with only limited success, because optical flow (1) cannot disentangle distance from velocity and (2) is less informative in the highly important flight direction. Here, we propose a solution to these fundamental shortcomings by having robots learn to estimate distances to objects by their visual appearance. The learning process obtains supervised targets from a stability-based distance estimation approach. We have successfully implemented the process on a small flying robot. For the task of landing, it results in faster, smooth landings. For the task of obstacle avoidance, it results in higher success rates at higher flight speeds. Our results yield improved robotic visual navigation capabilities and lead to a novel hypothesis on insect intelligence: behaviours that were described as optical-flow-based and hardwired actually benefit from learning processes.
Cyber-Sicherheit spielt für unsere digitale Zukunft, sowohl im Alltag, als auch im Berufsleben, eine zentrale Rolle. Aus diesem Grund wird es immer wichtiger, dass wir ausreichend Cyber-Sicherheitsexperten haben, um die Zukunft für unsere Gesellschaft sicher und vertrauenswürdig zu gestalten. Vor diesem Hintergrund wird im folgenden Beitrag die Wichtigkeit der Cyber-Sicherheit aus verschiedenen Blickwinkeln diskutiert und die Möglichkeit der Aus- und Weiterbildung dargestellt.
Cardiac and liver computed tomography (CT) perfusion has not been routinely implemented in the clinic and requires high radiation doses. The purpose of this study is to examine the radiation exposure and technical settings for cardiac and liver CT perfusion scans at different CT scanners. Two cardiac and three liver CT perfusion protocols were examined with the N1 LUNGMAN phantom at three multi-slice CT scanners: a single-source (I) and second- (II) and third-generation (III) dual-source CT scanners. Radiation doses were reported for the CT dose index (CTDIvol) and dose–length product (DLP) and a standardised DLP (DLP10cm) for cardiac and liver perfusion. The effective dose (ED10cm) for a standardised scan length of 10 cm was estimated using conversion factors based on the International Commission on Radiological Protection (ICRP) 110 phantoms and tissue-weighting factors from ICRP 103. The proposed total lifetime attributable risk of developing cancer was determined as a function of organ, age and sex for adults. Radiation exposure for CTDIvol, DLP/DLP10 cm and ED10 cm during CT perfusion was distributed as follows: for cardiac perfusion (II) 144 mGy, 1036 mGy·cm/1440 mGy·cm and 39 mSv, and (III) 28 mGy, 295 mGy·cm/279 mGy·cm and 8 mSv; for liver perfusion (I) 225 mGy, 3360 mGy·cm/2249 mGy·cm and 54 mSv, (II) 94 mGy, 1451 mGy·cm/937 mGy·cm and 22 mSv, and (III) 74 mGy, 1096 mGy·cm/739 mGy·cm and 18 mSv. The third-generation dual-source CT scanner applied the lowest doses. Proposed total lifetime attributable risk increased with decreasing age. Even though CT perfusion is a high-dose examination, we observed that new-generation CT scanners could achieve lower doses. There is a strong impact of organ, age and sex on lifetime attributable risk. Further investigations of the feasibility of these perfusion scans are required for clinical implementation.
The aim of this phantom study is to examine radiation doses of dual- and single-energy computed tomography (DECT and SECT) in the chest and upper abdomen for three different multi-slice CT scanners. A total of 34 CT protocols were examined with the phantom N1 LUNGMAN. Four different CT examination types of different anatomic regions were performed both in single- and dual-energy technique: chest, aorta, pulmonary arteries for suspected pulmonary embolism and liver. Radiation doses were examined for the CT dose index CTDIvol and dose-length product (DLP). Radiation doses of DECT were significantly higher than doses for SECT. In terms of CTDIvol, radiation doses were 1.1–3.2 times higher, and in terms of DLP, these were 1.1–3.8 times higher for DECT compared with SECT. The third-generation dual-source CT applied the lowest dose in 7 of 15 different examination types of different anatomic regions.
Als Identifikations- und Authentisierungsverfahren gewinnen biometrische Systeme immer mehr an Bedeutung. Waren sie bisher eher nur aus Filmen bekannt, wo sie für einen kleinen Mitarbeiterkreis als Zugangskontrolle zu wichtigen Räumen oder Tresoren mit kostbaren Inhalten dienten, finden biometrische Systeme immer mehr Einzug in unseren Alltag. Im elektronischem Pass ist die Speicherung biometrischer Daten bereits Pflicht. Im öffentlichen und kommerziellen Bereich werden biometrische Systeme immer mehr als zusätzliche Option angeboten, um den Zugriff auf Daten, Dienste und den Zutritt zu Räumen zu kontrollieren. Mit der Entsperrung des Smartphones sind biometrische Systeme auch im privaten Bereich angekommen. Erschwingliche Sensoren machen es sogar möglich, privat biometrische Systeme zu entwickeln.
Im Sinne der Gesellschaft : Wissenschaft als Helfer für angewandte Ethik in der KI-unterstützten IT
(2021)
Im Kontext der Digitalisierung, und insbesondere vor dem Hintergrund der dadurch prädizierten Effizienzsteigerung, wird der Künstlichen Intelligenz (KI) eine hohe Bedeutung beigemessen. Ebenso in Bezug auf die IT-Sicherheit gehen Experten davon aus, dass KI entscheidend dazu beitragen wird, die strategische Abwehr von Cyber-Angriffen zu optimieren. Doch trotz aller Euphorie sollten hier neben den Chancen auch die daraus potenziell resultierenden Risiken in Betracht gezogen werden. Denn der Einsatz von KI ist mit Implikationen verbunden, die auf die gesamte Gesellschaft wirken, von daher ist es nicht nur ratsam, sondern sogar erforderlich Anwendungen – auch im Bereich IT-Sicherheit – unter ethischen Aspekten zu analysieren und bewerten.
Digitale Werte benötigen ein weitaus höheres und vor allem spezifisches Schutzniveau. Da es für Anwender mittlerweile nicht mehr einfach ist, dieses effektiv nachzuprüfen, müssen sie darauf vertrauen, dass die Hersteller alles tun, um den Anforderungen gerecht zu werden. Andererseits sind die Hersteller darauf angewiesen, dass Anwender ihnen Vertrauen gewähren und ihre IT-/Sicherheits-Lösungen tatsächlich nutzen. Um eine hohe Vertrauenswürdigkeit zu erreichen können, müssen Unternehmen Vorgehensweisen wählen, die einigen bestimmten Kriterien erfüllen.
The diffusion of hydrogen adsorbed inside layered MoS2 crystals has been studied by means of quasi- elastic neutron scattering, neutron spin-echo spectroscopy, nuclear reaction analysis, and X-ray photoelectron spectroscopy. The neutron time-of-flight and neutron spin-echo measurements demonstrate fast diffusion of hydrogen molecules parallel to the basal planes of the two dimensional crystal planes. At room temperature and above, this intra-layer diffusion is of a similar speed to the surface diffusion that has been observed in earlier studies for hydrogen atoms on Pt surfaces. A significantly slower hydrogen diffusion was observed perpendicular to the basal planes using nuclear reaction analysis.
Welding and joining of components processed by additive manufacturing (AM) to other AMas well as conventionally produced components is of high importance for industry as thisallows to combine advantages of either technique and to produce large-scale structures,respectively. One of the key influencing factors with respect to weldability and mechanicalproperties of AM components was found to be the inherent microstructural anisotropy ofthese components. In present work, the precipitation-hardenable AleSi10Mg was fabri-cated in different build orientations using selective laser melting (SLM) and subsequentlyjoined by friction stir welding (FSW) in different combinations. Microstructural analysisshowed considerable grain refinement in the friction stir zone, however, pronouncedsoftening occurred in this area. The latter can be mainly attributed to changes in themorphology and size of Si particles. Upon combination of different build orientations aremarkable influence on the tensile strength of FSW joints was seen. Cyclic deformationresponses of SLM and FSW samples were examined in depth. Fatigue properties of thisalloy in the low-cycle fatigue (LCF) regime imply that SLM samples with the building di-rection parallel to the loading direction show superior performance under cyclic loading ascompared to the other conditions and the FSW joints. From results presented solid process-microstructure-property relationships are drawn.
Bone morphogenetic protein 2 (BMP21) is a highly interesting therapeutic growth factor due to its strong osteogenic/osteoinductive potential. However, its pronounced aggregation tendency renders recombinant and soluble production troublesome and complex. While prokaryotic expression systems can provide BMP2 in large amounts, the typically insoluble protein requires complex denaturation-renaturation procedures with medically hazardous reagents to obtain natively folded homodimeric BMP2. Based on a detailed aggregation analysis of wildtype BMP2, we designed a hydrophilic variant of BMP2 additionally containing an improved heparin binding site (BMP2-2Hep-7M). Consecutive optimization of BMP2-2Hep-7M expression and purification enabled production of soluble dimeric BMP2-2Hep-7M in high yield in E. coli. This was achieved by a) increasing protein hydrophilicity via introducing seven point mutations within aggregation hot spots of wildtype BMP2 and a longer N-terminus resulting in higher affinity for heparin, b) by employing E. coli strain SHuffle® T7, which enables the structurally essential disulfide-bond formation in BMP2 in the cytoplasm, c) by using BMP2 variant characteristic soluble expression conditions and application of L-arginine as solubility enhancer. The BMP2 variant BMP2-2Hep-7M shows strongly attenuated although not completely eliminated aggregation tendency.
Software updates take an essential role in keeping IT environments secure. If service providers delay or do not install updates, it can cause unwanted security implications for their environments. This paper conducts a large-scale measurement study of the update behavior of websites and their utilized software stacks. Across 18 months, we analyze over 5.6M websites and 246 distinct client- and server-side software distributions. We found that almost all analyzed sites use outdated software. To understand the possible security implications of outdated software, we analyze the potential vulnerabilities that affect the utilized software. We show that software components are getting older and more vulnerable because they are not updated. We find that 95 % of the analyzed websites use at least one product for which a vulnerability existed.
Biomimetics is the interdisciplinary co-operation of various scientific disciplines and fields of innovation, and it aims to solve practical problems using biological models. Biomimetic research and its fields of application are manifold, and the community is made up of a wide range of disciplines, from biologists and engineers to designers. Guidelines and standards can build a common ground for understanding of the field, communication across disciplines, present and future projects and implementation of biomimetic knowledge. Since 2015, three international standards have been published and defined terms and definitions, as well as specific applications. The scientific literature and patents in several databases were searched for citations of the published standards. Standards or technical guidelines on biomimetics are represented both in the scientific literature and in patents. However, taking into account the increasing number of publications in biomimetics, the number of publications (52) citing the international standards is low. This shows that the perception of technical rules is still underrepresented in the academic field. Greater awareness and acceptance of the importance of standards for quality assurance even in the academic environment is discussed, and active participation in the corresponding International Organization for Standardization committee on biomimetics is asked for.
Hydrogen produced via water electrolysis powered by renewable electricity or green H2 offers new decarbonization pathways. Proton exchange membrane water electrolysis (PEMWE) is a promising technology although the current density, temperature, and H2 pressure of the PEMWE will have to be increased substantially to curtail the cost of green H2. Here, a porous transport layer for PEMWE is reported, that enables operation at up to 6 A cm−2, 90 °C, and 90 bar H2 output pressure. It consists of a Ti porous sintered layer (PSL) on a low‐cost Ti mesh (PSL/mesh‐PTL) by diffusion bonding. This novel approach does not require a flow field in the bipolar plate. When using the mesh‐PTL without PSL, the cell potential increases significantly due to mass transport losses reaching ca. 2.5 V at 2 A cm−2 and 90 °C.
Das neuartige Coronavirus SARS-COV-2 wird insbesondere in Innenräumen übertragen. Dabei spielen Aerosole, also kleinste Schwebeteilchen, eine wichtige Rolle. Der längere Aufenthalt in Räumen begünstigt die Wahrscheinlichkeit einer Übertragung auch über eine Distanz von mehr als 1,5 m.
Eine Möglichkeit, um die Schwebeteilchen aus der Raumluft zu entfernen sind Raumluftreiniger. Diese gibt es in verschiedenen Ausführungen und Funktionsprinzipien. Das vorliegende Dokument soll dabei helfen den richtigen Gerätetyp für die jeweilige Anwendung zu finden. Dabei geht es zum einen um große Räume hoher Belegungsdichte (z. B. Schulklassen), zum anderen um Restaurants und Freizeitstätten im öffentlichen Raum. Zu guter Letzt kann der Einsatz dieser Geräte auch im privaten Umfeld sinnvoll sein.
Für alle Geräte gilt: Sie unterstützen die Vermeidung von hohen Virenkonzentrationen im Raum. Das ist jedoch kein Ersatz zum regelmäßigen Lüften und der Zufuhr von „frischer Luft“ und damit mehr Sauerstoff für den Raum.
Cone-Beam computed tomography (CBCT) has become the most important component of modern radiotherapy for positioning tumor patients directly before treatment. In this work we investigate alternations to standard acquisition protocol, called preset, for patients with a tumor in the thoracic region. The effects of the changed acquisition parameters on the image quality are evaluated using the Catphan Phantom and the image analysis software Smári. The weighted CT dose index (CTDIW) is determined in each case and the effects of the different acquisition protocols on the patient dose are classified accordingly. Additionally, the clinical suitability of alternative presets is tested by investigating correctness of image registration using the CIRS thorax phantom. The results show that a significant dose reduction can be achieved. It can be reduced by 51% for a full rotation by adjusting the gantry speed.
The purpose of the paper is to contribute to the inner workings of transformational leadership in the context of organizational change. According to the organizational role theory, role conflict is proposed as a mediator between transformational leadership and affective commitment to change and irritation. Cross-sectional data were collected in a German company in the textiles sector, undergoing a pervasive IT-related change. Confirmatory factor analysis and structural equation modeling was performed for validity and hypothesis testing. The findings suggest that role conflict acts as a full mediator in the relationship between transformational leadership and affective commitment to change, as well as irritation. Transformational leadership is often discussed in terms of change-oriented leadership. Surprisingly, only a few studies have examined the specific impact of transformational leadership on attitudinal outcomes during change processes, yet. Consequently, research on the underlying psychological mechanisms of the relationship is scarce, too.
Self-Sovereign Identity (SSI) sorgt für eine sichere und vertrauenswürdige Digitalisierung. Nutzer können selbstbestimmt ihre digitale Identität und Nachweise wie Ausweis oder Bescheinigungen an Anwendungen weitergeben. Das europäische SSI-Ökosystem löst Abhängigkeiten von Monopolisten und gibt uns die Freiheit, die digitale Zukunft souverän und zügig zu gestalten.