Filtern
Erscheinungsjahr
- 2020 (18) (entfernen)
Dokumenttyp
- Wissenschaftlicher Artikel (18) (entfernen)
Sprache
- Englisch (18) (entfernen)
Volltext vorhanden
- nein (18) (entfernen)
Schlagworte
- Hydrogen evolution reaction (1)
- MITRE (1)
- OSINT (1)
- PEM water electrolysis (1)
- PtCoMn (1)
- Ternary alloy catalyst preparation (1)
- advanced persistent threats (1)
- antecedents (1)
- compassionate love (1)
- cyber kill chain (1)
We study the impact of underdamped intramolecular vibrational modes on the efficiency of the excitation energy transfer in a dimer in which each state is coupled to its own underdamped vibrational mode and, in addition, to a continuous background of environmental modes. For this, we use the numerically exact hierarchy equation of motion approach. We determine the quantum yield and the transfer time in dependence of the vibronic coupling strength, and in dependence of the damping of the incoherent background. Moreover, we tune the vibrational frequencies out of resonance with the excitonic energy gap. We show that the quantum yield is enhanced by up to 10% when the vibrational frequency of the donor is larger than at the acceptor. The vibronic energy eigenstates of the acceptor acquire then an increased density of states, which leads to a higher occupation probability of the acceptor in thermal equilibrium. We can conclude that an underdamped vibrational mode which is weakly coupled to the dimer fuels a faster transfer of excitation energy, illustrating that long-lived vibrations can, in principle, enhance energy transfer, without involving long-lived electronic coherence.
In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they provide their users. However, in reality, they often do not know which third parties are embedded, for example, when these third parties request additional content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the magnitude of these new challenges. To better reflect the connectedness of third parties, we measured their relations in a model we call third party trees, which reflects an approximation of the loading dependencies of all third parties embedded into a given website. Using this concept, we show that including a single third party can lead to subsequent requests from up to eight additional services. Furthermore, our findings indicate that the third parties embedded on a page load are not always deterministic, as 50 % of the branches in the third party trees change between repeated visits. In addition, we found that 93 % of the analyzed websites embedded third parties that are located in regions that might not be in line with the current legal framework. Our study also replicates previous work that mostly focused on landing pages of websites. We show that this method is only able to measure a lower bound as subsites show a significant increase of privacy-invasive techniques. For example, our results show an increase of used cookies by about 36 % when crawling websites more deeply.
With ongoing developments in the field of smart cities and digitalization in general, data is becoming a driving factor and value stream for new and existing economies alike. However, there exists an increasing centralization and monopolization of data holders and service providers, especially in the form of the big US-based technology companies in the western world and central technology providers with close ties to the government in the Asian regions. Self Sovereign Identity (SSI) provides the technical building blocks to create decentralized data-driven systems, which bring data autonomy back to the users. In this paper we propose a system in which the combination of SSI and token economy based incentivisation strategies makes it possible to unlock the potential value of data-pools without compromising the data autonomy of the users.