Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (209)
- Konferenzveröffentlichung (207)
- Teil eines Buches (Kapitel) (30)
- Sonstiges (27)
- Video (14)
- Buch (Monographie) (13)
- Preprint (9)
- Dissertation (4)
- Arbeitspapier (4)
- Bericht (3)
Sprache
- Englisch (525) (entfernen)
Schlagworte
- Robotik (8)
- Flugkörper (7)
- UAV (7)
- Rettungsrobotik (5)
- Polymer-Elektrolytmembran-Brennstoffzelle (4)
- adhesion (4)
- Bionik (3)
- Erweiterte Realität <Informatik> (3)
- Gespenstschrecken (3)
- Haftorgan (3)
- OCSR (3)
- stick insects (3)
- Augmented Reality (2)
- CDK (2)
- Deep learning (2)
- Field measurement (2)
- Human-Robot Interaction (2)
- Solar modules (2)
- Twitter <Softwareplattform> (2)
- biomimicry (2)
- hydraulic compression (2)
- modular stack design (2)
- open quantum systems (2)
- social innovation (2)
- carbon nanofibers, platinum electrodeposition, ele ctrochemical surface area (1)
- 360 degree Feedback (1)
- 360° Panorama (1)
- AI (1)
- API 1130 (1)
- Aerosol (1)
- Aggregation-prone (1)
- Air handling unit (1)
- Alternative Geschäftsmodelle (1)
- Amylase, Enzymcharakterisierung (1)
- Anorganische Analyse (1)
- Artificial Intelligence (1)
- Assessment Center (1)
- Assisted living technologies (1)
- Assistive robotics (1)
- Autonomous Agents (1)
- Bildverarbeitung (1)
- Biomechanics (1)
- Biomedical monitoring, Hospitals, Electrocardiography, Wireless communication, Patient monitoring, Wireless sensor networks (1)
- Biomimetics (1)
- Bone morphogenetic protein 2 (1)
- Brand theory (1)
- COIL (1)
- CPM (1)
- Carboxylate (1)
- Case-Study (1)
- Cell-free implant (1)
- Chemical image depiction (1)
- Chemical space (1)
- Chemical structure depictions (1)
- Cheminformatics (1)
- Chemistry Development Kit (1)
- Chemistry Development Kit, CDK, Molecule fragmentation, In silico fragmentation, Scaffolds, Functional groups, Glycosidic moieties, Rich client, Graphical user interface, GUI (1)
- Chief Executive Officer (1)
- Climate change (1)
- Clustering (1)
- Codegenerierung (1)
- Communication management (1)
- Competency-Oriented Exams (1)
- Constructive Alignment (1)
- Continuous Queries (1)
- Cookie <Internet> (1)
- Cr(VI) and Zn(II) cations (1)
- Crowdfunding (1)
- Data Collection (1)
- Data Journalism (1)
- Datalog (1)
- Datenjournalismus (1)
- Datensatz (1)
- Datenschutz (1)
- Deductive Databases (1)
- Deep Learning (1)
- Depiction generator image augmentation (1)
- Deutschland / Technische Regeln für brennbare Flüssigkeiten (1)
- Dissipative particle dynamics, DPD, Surfactant, Bilayer, Lamellar, Simulation, Mesoscopic (1)
- Distributed Software Development (1)
- E. coli SHuffle® T7 (1)
- Elastizitätsmodul (1)
- Elektrodenvorbereitung (1)
- Enterprise JavaBeans (1)
- Erneuerbare Energien (1)
- Europe (1)
- Evidence-based Management (1)
- Exams with Third-Party Applications (1)
- Fehlererkennung (1)
- Fehlerortung (1)
- Flügelform (1)
- Fragmentation (1)
- Future capacity needs (1)
- Greek dept crisis (1)
- Hand-drawn images (1)
- Hands-free Interaction (1)
- Homogene Kühlung (1)
- Human-centered computing (1)
- Hydraulic cell compression (1)
- Hydraulic compression, Carbon Nano Fibers, PEM Fuel Cells, Catalyst utilization (1)
- Hydrogen evolution reaction (1)
- Hydrophilicity enhanced hBMP2 variant (1)
- ICP-Massenspektrometrie (1)
- Implantat (1)
- In-silico-design (1)
- Incremental Evaluation (1)
- Indigo (1)
- Intercultural Collaboration (1)
- Journalismus (1)
- Juristenausbildung (1)
- Kalman filter (1)
- Kernspintomografie (1)
- Kohlenstoff (1)
- Kohlenstoff-Nanoröhre (1)
- Leadership Competencies (1)
- Leak detection (1)
- Leckerkennung (1)
- Leckortung (1)
- Lecksuchgerät (1)
- Lecküberwachung (1)
- Lüftungsanlage (1)
- MITRE (1)
- Machine Learning (1)
- Mapping (1)
- Maus (1)
- Media Brands (1)
- Media brand characteristics (1)
- Media positioning (1)
- Methodology (1)
- Middle-range Theory (1)
- Mikrofotografie (1)
- Mixed Reality (1)
- Molecule images (1)
- Multi-Agent System (1)
- Mund-Nasen-Schutz (1)
- N,N,O Ligands (1)
- N,N′ Ligands (1)
- Nanofaser (1)
- Natural products (1)
- Naturstoff (1)
- NeRF (1)
- New Public Governance (1)
- New Public Management (1)
- New Work, Information and Communication Industry, Innovation, Organizational Goals, Survey (1)
- Normalisierung (1)
- OSINT (1)
- Object Recognition (1)
- Object-relational Mapping (1)
- Objektverfolgung (1)
- Ohrwurm (1)
- Online Programming Exams (1)
- Online Supervision (1)
- Online-Werbung (1)
- Optical Chemical Structure Recognition (1)
- Ortsbestimmung (1)
- PEM Electrolysis, Hydrogen, Hydraulic Compression, High Pressure (1)
- PEM electrolysis (1)
- PEM fuel cell (1)
- PEM fuel cell electrocatalysts, Carbon nanofibers, Oxygen plasma activation, Pulsed electroplating. (1)
- PEM fuel cells (1)
- PEM water electrolysis (1)
- PEM-Brennstoffzelle (1)
- People with disabilities (1)
- Performance prediction (1)
- Persistenz <Informatik> (1)
- Politische Berichterstattung (1)
- Polymere (1)
- Privatsphäre (1)
- Project-based Learning (1)
- PtCoMn (1)
- RDKit (1)
- RIS (1)
- Regeln der Technik (1)
- Rescue Robotics (1)
- Robot assistive drinking (1)
- Robot assistive eating (1)
- Rwanda (1)
- SARS-CoV-2 (1)
- Sauerstoffplasmaaktivierung (1)
- Scaffold (1)
- Scaffold network (1)
- Scaffold tree (1)
- Segmentation; Correlation; Diseases; Convolutional Neural Networks (1)
- Small UAVs (1)
- Smart Grid (1)
- Social Innovation (1)
- Social Media (1)
- Spondylodese (1)
- Stack <Brennstoffzelle> (1)
- Stellite 6; HVOF-spraying; Laser remelting; Cavitation erosion; Coatings (1)
- TRFL (1)
- Temperature coefficients (1)
- Ternary alloy catalyst preparation (1)
- Tetraplegie (1)
- Thermal Performance (1)
- Titanium; Al2O3–TiO2 coatings; Nanoindentation (1)
- Tracking (1)
- Transformative Teaching (1)
- Twitter (1)
- Update Propagation (1)
- Upscaling laboratory models (1)
- Urban heat island (1)
- Visual Monocular SLAM (1)
- Young´s modulus (1)
- Zinc (1)
- Zustandsmaschine (1)
- academic and job-related self-control demands (1)
- activated sludge (1)
- advanced persistent threats (1)
- aerosol (1)
- air hygiene (1)
- airborne infection (1)
- antecedents (1)
- artificial intelligence (1)
- assistive robotics (1)
- augmented reality (1)
- bacterial toxicity (1)
- balance (1)
- barrel cortex, cell types, multielectrode recordings, perception, psychophysics (1)
- bio-inspired functional surface (1)
- bioinspired (1)
- biomimetic (1)
- biomimetic materials (1)
- blockchain (1)
- bloxberg (1)
- carbon nano fibres (1)
- carbon nanofibers, platinum electrodeposition, electrocatalysts (1)
- cartilage defect (1)
- cartilage regeneration (1)
- chlorinated phenols (1)
- cluster (1)
- cobot (1)
- collaborative online international learning (COIL) (1)
- compassionate love (1)
- composition (1)
- conical intersection (1)
- consent banner (1)
- cookie banner (1)
- cookies (1)
- critical review (1)
- cyber kill chain (1)
- demagnetization cooling (1)
- design process (1)
- distributed software development (1)
- diversity (1)
- dlt (1)
- dynamic capabilities (1)
- efficiency of exciton transfer (1)
- electrode preparation (1)
- empowerment (1)
- entrepreneurial diversity (1)
- entrepreneurship (1)
- ethereum (1)
- ethics (1)
- excitation energy transfer (1)
- expert interviews (1)
- face mask (1)
- farming (1)
- gender stereotypes (1)
- gender-sensitive design (1)
- gender-specific design (1)
- human robot interaction (1)
- human-centered design (1)
- human-robot collaboration (1)
- hybrid sensor system (1)
- innovation (1)
- intercultural collaboration (1)
- interdisciplinary students project (1)
- international comparative study (1)
- intersectionality (1)
- irritation (1)
- leak locating (1)
- leak monitoring (1)
- long-term toxicity (1)
- luminescent bacteria (1)
- machine learning (1)
- managerial vs. non-managerial actors (1)
- measurement study (1)
- media accountability (1)
- microfoundations (1)
- multi-level model of competence (1)
- narcissism (1)
- neutrality (1)
- nonadiabatic dynamics (1)
- noncommuting fluctuations (1)
- nonequilibrium quantum transport (1)
- normalisation (1)
- open science (1)
- optical chemical structure recognition (1)
- oxygen plasma activation (1)
- pH-shift elution (1)
- participatory design (1)
- phishing (1)
- poa (1)
- poe (1)
- policymakers (1)
- political journalism (1)
- privacy (1)
- product development (1)
- project-based learning (1)
- projection (1)
- public policy (1)
- quality standards (1)
- quantum dissipation (1)
- reconnaissance (1)
- relevance (1)
- respiration inhibition (1)
- risk management (1)
- role identity (1)
- sensor fusion (1)
- servant leadership (1)
- shared user control (1)
- solution finding (1)
- spatial policy (1)
- state machine (1)
- study and working time per week (1)
- television news coverage (1)
- theorising (1)
- trait self-control (1)
- transport (1)
- tree frog (1)
- user acceptance (1)
- ventilation (1)
- vibronic coupling (1)
- virtual reality (1)
- visual cues (1)
- visualization techniques (1)
- watchblogs (1)
- web measurement (1)
- Änderung (1)
Institut
- Westfälisches Institut für Gesundheit (115)
- Institut für Internetsicherheit (56)
- Informatik und Kommunikation (51)
- Elektrotechnik und angewandte Naturwissenschaften (50)
- Wirtschaft und Informationstechnik Bocholt (46)
- Westfälisches Energieinstitut (42)
- Institut für biologische und chemische Informatik (35)
- Maschinenbau Bocholt (35)
- Institut Arbeit und Technik (15)
- Wirtschaftsingenieurwesen (15)
In this work a mathematical approach to calculate solar panel temperature based on measured irradiance, temperature and wind speed is applied. With the calculated module temperature, the electrical solar module characteristics is determined. A program developed in MatLab App Designer allows to import measurement data from a weather station and calculates the module temperature based on the mathematical NOCT and stationary approach with a time step between the measurements of 5 minutes. Three commercially available solar panels with different cell and interconnection technologies are used for the verification of the established models. The results show a strong correlation between the measured and by the stationary model predicted module temperature with a coefficient of determination R2 close to 1 and a root mean square deviation (RMSE) of ≤ 2.5 K for a time period of three months. Based on the predicted temperature, measured irradiance in module plane and specific module information the program models the electrical data as time series in 5-minute steps. Predicted to measured power for a time period of three months shows a linear correlation with an R2 of 0.99 and a mean absolute error (MAE) of 3.5, 2.7 and 4.8 for module ID 1, 2 and 3. The calculated energy (exemplarily for module ID 2) based on the measured, calculated by the NOCT and stationary model for this time period is 118.4 kWh, resp. 116.7 kWh and 117.8 kWh. This is equivalent to an uncertainty of 1.4% for the NOCT and 0.5% for the stationary model.
Advanced Determination of Temperature Coefficients of Photovoltaic Modules by Field Measurements
(2023)
In this work data from outdoor measurements, acquired over the course of up to three years on commercially available solar panels, is used to determine the temperature coefficients and compare these to the information as stated by the producer in the data sheets. A program developed in MatLab App Designer allows to import the electrical and ambient measurement data. Filter algorithms for solar irradiance narrow the irradiance level down to ~1000 W/m2 before linear regression methods are applied to obtain the temperature coefficients. A repeatability investigation proves the accuracy of the determined temperature coefficients which are in good agreement to the supplier specification if the specified values for power are not larger than -0.3%/K. Further optimization is achieved by applying wind filter techniques and days with clear sky condition. With the big (measurement) data on hand it was possible to determine the change of the temperature coefficients for varying irradiance. As stated in literature we see an increase of the temperature coefficient of voltage and a decline for the temperature coefficient of power with increasing irradiance.
As a rule, an experiment carried out at school or in undergraduate study
courses is rather simple and not very informative. However, when the experiments
are to be performed using modern methods, they are often abstract and
difficult to understand. Here, we describe a quick and simple experiment,
namely the enzymatic characterization of ptyalin (human salivary amylase)
using a starch degradation assay. With the experimental setup presented here,
enzyme parameters, such as pH optimum, temperature optimum, chloride
dependence, and sensitivity to certain chemicals can be easily determined. This
experiment can serve as a good model for enzyme characterization in general,
as modern methods usually follow the same principle: determination of the
activity of the enzyme under different conditions. As different alleles occur in
humans, a random selection of test subjects will be quite different with regard
to ptyalin activities. Therefore, when the students measure their own ptyalin
activity, significant differences will emerge, and this will give them an idea of
the genetic diversity in human populations. The evaluation has shown that the
pupils have gained a solid understanding of the topic through this experiment.
With ongoing developments in the field of smart cities and digitalization in general, data is becoming a driving factor and value stream for new and existing economies alike. However, there exists an increasing centralization and monopolization of data holders and service providers, especially in the form of the big US-based technology companies in the western world and central technology providers with close ties to the government in the Asian regions. Self Sovereign Identity (SSI) provides the technical building blocks to create decentralized data-driven systems, which bring data autonomy back to the users. In this paper we propose a system in which the combination of SSI and token economy based incentivisation strategies makes it possible to unlock the potential value of data-pools without compromising the data autonomy of the users.
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation’s definition of personal data applies to every company that collects data from European Internet users. This includes tracking services that, until then, argued that they were collecting anonymous information and data protection requirements would not apply to their businesses.
Previous studies have analyzed the impact of the GDPR on the prevalence of online tracking, with mixed results. In this paper, we go beyond the analysis of the number of third parties and focus on the underlying information sharing networks between online advertising companies in terms of client-side cookie syncing. Using graph analysis, our measurement shows that the number of ID syncing connections decreased by around 40 % around the time the GDPR went into effect, but a long-term analysis shows a slight rebound since then. While we can show a decrease in information sharing between third parties, which is likely related to the legislation, the data also shows that the amount of tracking, as well as the general structure of cooperation, was not affected. Consolidation in the ecosystem led to a more centralized infrastructure that might actually have negative effects on user privacy, as fewer companies perform tracking on more sites.
In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they provide their users. However, in reality, they often do not know which third parties are embedded, for example, when these third parties request additional content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the magnitude of these new challenges. To better reflect the connectedness of third parties, we measured their relations in a model we call third party trees, which reflects an approximation of the loading dependencies of all third parties embedded into a given website. Using this concept, we show that including a single third party can lead to subsequent requests from up to eight additional services. Furthermore, our findings indicate that the third parties embedded on a page load are not always deterministic, as 50 % of the branches in the third party trees change between repeated visits. In addition, we found that 93 % of the analyzed websites embedded third parties that are located in regions that might not be in line with the current legal framework. Our study also replicates previous work that mostly focused on landing pages of websites. We show that this method is only able to measure a lower bound as subsites show a significant increase of privacy-invasive techniques. For example, our results show an increase of used cookies by about 36 % when crawling websites more deeply.
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
The set of transactions that occurs on the public ledger of an Ethereum network in a specific time frame can be represented as a directed graph, with vertices representing addresses and an edge indicating the interaction between two addresses.
While there exists preliminary research on analyzing an Ethereum network by the means of graph analysis, most existing work is focused on either the public Ethereum Mainnet or on analyzing the different semantic transaction layers using static graph analysis in order to carve out the different network properties (such as interconnectivity, degrees of centrality, etc.) needed to characterize a blockchain network. By analyzing the consortium-run bloxberg Proof-of-Authority (PoA) Ethereum network, we show that we can identify suspicious and potentially malicious behaviour of network participants by employing statistical graph analysis. We thereby show that it is possible to identify the potentially malicious
exploitation of an unmetered and weakly secured blockchain network resource. In addition, we show that Temporal Network Analysis is a promising technique to identify the occurrence of anomalies in a PoA Ethereum network.
Software updates take an essential role in keeping IT environments secure. If service providers delay or do not install updates, it can cause unwanted security implications for their environments. This paper conducts a large-scale measurement study of the update behavior of websites and their utilized software stacks. Across 18 months, we analyze over 5.6M websites and 246 distinct client- and server-side software distributions. We found that almost all analyzed sites use outdated software. To understand the possible security implications of outdated software, we analyze the potential vulnerabilities that affect the utilized software. We show that software components are getting older and more vulnerable because they are not updated. We find that 95 % of the analyzed websites use at least one product for which a vulnerability existed.
A Crypto-Token Based Charging Incentivization
Scheme for Sustainable Light Electric Vehicle
Sharing
(2021)
The ecological impact of shared light electric vehicles (LEV) such as kick scooters is still widely discussed. Especially the fact that the vehicles and batteries are collected using diesel vans in order to charge empty batteries with electricity of unclear origin is perceived as unsustainable. A better option could be to let the users charge the vehicles themselves whenever it is necessary. For this, a decentralized,flexible and easy to install network of off-grid solar charging stations could bring renewable electricity where it is needed without sacrificing the convenience of a free float sharing system. Since the charging stations are powered by solar energy the most efficient way to utilize them would be to charge the vehicles when the sun is shining. In order to make users charge the vehicle it is necessary to provide some form of benefit for
them doing so. This could be either a discount or free rides. A
particularly robust and well-established mechanism is controlling incentives via means of blockchain-based cryptotokens. This paper demonstrates a crypto-token based scheme for incentivizing users to charge sharing vehicles during times of considerable solar irradiation in order to contribute to more sustainable mobility services.