Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (212)
- Konferenzveröffentlichung (210)
- Teil eines Buches (Kapitel) (31)
- Sonstiges (29)
- Video (14)
- Buch (Monographie) (13)
- Preprint (9)
- Dissertation (4)
- Arbeitspapier (4)
- Bericht (3)
Sprache
- Englisch (534) (entfernen)
Schlagworte
- Robotik (8)
- Flugkörper (7)
- UAV (7)
- Rettungsrobotik (5)
- Polymer-Elektrolytmembran-Brennstoffzelle (4)
- adhesion (4)
- Bionik (3)
- Erweiterte Realität <Informatik> (3)
- Gespenstschrecken (3)
- Haftorgan (3)
Institut
- Westfälisches Institut für Gesundheit (115)
- Institut für Internetsicherheit (56)
- Informatik und Kommunikation (51)
- Elektrotechnik und angewandte Naturwissenschaften (50)
- Wirtschaft und Informationstechnik Bocholt (46)
- Westfälisches Energieinstitut (44)
- Institut für biologische und chemische Informatik (37)
- Maschinenbau Bocholt (37)
- Institut Arbeit und Technik (15)
- Wirtschaftsingenieurwesen (15)
360° Camera at a small UAV
(2021)
We study the nonequilibrium dynamics of a quantum system under the influence of two noncommuting fluctuation sources, i.e., purely dephasing fluctuations and relaxational fluctuations. We find that increasing purely dephasing fluctuations suppress increasing relaxation in the quantum system. This effect is further enhanced when both fluctuation sources are fully correlated. These effects arise for medium to strong primary fluctuations already when the secondary fluctuations are weak due to their noncommuting coupling to the quantum system. Dephasing, in contrast, is increased by increasing any of the two fluctuations. Fully correlated fluctuations result in overdamping at much lower system-bath coupling than uncorrelated noncommuting fluctuations. In total, we observe that treating subdominant secondary environmental fluctuations perturbatively leads, as neglecting them, to erroneous conclusions.
Competency-oriented exams offer a wide range of advantages, especially where the use and mastery of third-party applications and tools play an important role. Therefore, we developed a competency-oriented setup for both our programming classes and exams ensuring their constructive alignment.
Exams were moved to the computer lab and designed to test both conceptional skills as well as the use of state-of-the-art programming tools. At the peak of the COVID-19 pandemic, when exams had to be moved from lab to online, we needed to design an online setup for our practical programming exams preserving the competency-oriented approach and its constructive alignment as well as the validity, reliability and fairness of the exams. The key was to use the same online tools that have been introduced
for running lectures and practical classes offering almost the same learning experience as before the pandemic. However, to ensure the validity and fairness of the exams, some kind of online supervision needed to be implemented as technical solutions were found to be either unusable or not working
properly in our case. This paper discusses the driving factors, the resulting technical and organizational setup as well as students’ feedback and lessons learned for further improvements. Therefore, COVID-19 has not been able to ruin our competency-oriented programming exams.
This paper describes a new concept and experiences of a distributed interdisciplinary learning programme for students across continents. The aim is to provide students with a truly Global Intercultural Project Experience (GIPE) by working together with peers from around the world, and solving real-life client’s problems. We have received seed-funding for four annual projects to engage students from Germany (Europe), Namibia (Africa), Indonesia (Asia), and Peru (Latin-America). In 2020, 30 students from four continents engaged in a one-semester distributed software development project for a Namibian client. Despite Covid-19 they successfully completed the project expressing deep appreciation for the learning opportunities overcoming challenges of working across wide-spread time zones, cultures, changing requirements, and various technical challenges. Considering the vast learning benefits, we suggest to incorporate such projects in all tertiary education curricula across the globe.
The purpose of the paper is to contribute to the inner workings of transformational leadership in the context of organizational change. According to the organizational role theory, role conflict is proposed as a mediator between transformational leadership and affective commitment to change and irritation. Cross-sectional data were collected in a German company in the textiles sector, undergoing a pervasive IT-related change. Confirmatory factor analysis and structural equation modeling was performed for validity and hypothesis testing. The findings suggest that role conflict acts as a full mediator in the relationship between transformational leadership and affective commitment to change, as well as irritation. Transformational leadership is often discussed in terms of change-oriented leadership. Surprisingly, only a few studies have examined the specific impact of transformational leadership on attitudinal outcomes during change processes, yet. Consequently, research on the underlying psychological mechanisms of the relationship is scarce, too.
A Crypto-Token Based Charging Incentivization
Scheme for Sustainable Light Electric Vehicle
Sharing
(2021)
The ecological impact of shared light electric vehicles (LEV) such as kick scooters is still widely discussed. Especially the fact that the vehicles and batteries are collected using diesel vans in order to charge empty batteries with electricity of unclear origin is perceived as unsustainable. A better option could be to let the users charge the vehicles themselves whenever it is necessary. For this, a decentralized,flexible and easy to install network of off-grid solar charging stations could bring renewable electricity where it is needed without sacrificing the convenience of a free float sharing system. Since the charging stations are powered by solar energy the most efficient way to utilize them would be to charge the vehicles when the sun is shining. In order to make users charge the vehicle it is necessary to provide some form of benefit for
them doing so. This could be either a discount or free rides. A
particularly robust and well-established mechanism is controlling incentives via means of blockchain-based cryptotokens. This paper demonstrates a crypto-token based scheme for incentivizing users to charge sharing vehicles during times of considerable solar irradiation in order to contribute to more sustainable mobility services.
Software updates take an essential role in keeping IT environments secure. If service providers delay or do not install updates, it can cause unwanted security implications for their environments. This paper conducts a large-scale measurement study of the update behavior of websites and their utilized software stacks. Across 18 months, we analyze over 5.6M websites and 246 distinct client- and server-side software distributions. We found that almost all analyzed sites use outdated software. To understand the possible security implications of outdated software, we analyze the potential vulnerabilities that affect the utilized software. We show that software components are getting older and more vulnerable because they are not updated. We find that 95 % of the analyzed websites use at least one product for which a vulnerability existed.
A systematic method for obtaining a novel electrode structure based on PtCoMn ternary alloy catalyst supported on graphitic carbon nanofibers (CNF) for hydrogen evolution reaction (HER) in acidic media is proposed. Ternary alloy nanoparticles (Co0.6Mn0.4 Pt), with a mean crystallite diameter under 10 nm, were electrodeposited onto a graphitic support material using a two-step pulsed deposition technique. Initially, a surface functionalisation of the carbon nanofibers is performed with the aid of oxygen plasma. Subsequently, a short galvanostatic pulse electrodeposition technique is applied. It has been demonstrated that, if pulsing current is employed, compositionally controlled PtCoMn catalysts can be achieved. Variations of metal concentration ratios in the electrolyte and main deposition parameters, such as current density and pulse shape, led to electrodes with relevant catalytic activity towards HER. The samples were further characterised using several physico-chemical methods to reveal their morphology, structure, chemical and electrochemical properties. X-ray diffraction confirms the PtCoMn alloy formation on the graphitic support and energy dispersive X-ray spectroscopy highlights the presence of the three metallic components from the alloy structure. The preliminary tests regarding the electrocatalytic activity of the developed electrodes display promising results compared to commercial Pt/C catalysts. The PtCoMn/CNF electrode exhibits a decrease in hydrogen evolution overpotential of about 250 mV at 40 mA cm−2 in acidic solution (0.5 M H2SO4) when compared to similar platinum based electrodes (Pt/CNF) and a Tafel slope of around 120 mV dec−1, indicating that HER takes place under the Volmer-Heyrovsky mechanism.
Autonomy and self-determination are fundamental aspects of living in our society. Supporting people for whom this freedom is limited due to physical impairments is the fundamental goal of this thesis. Especially for people who are paralyzed, even working at a desk job is often not feasible. Therefore, in this thesis a prototype of a robot assembly workstation was constructed that utilizes a modern Augmented Reality (AR)-Head-Mounted Display (HMD) to control a robotic arm. Through the use of object pose recognition, the objects in the working environment are detected and this information is used to display different visual cues at the robotic arm or in its vicinity. Providing the users with additional depth information and helping them determine object relations, which are often not easily discernible from a fixed perspective.
To achieve this a hands-free AR-based robot-control scheme was developed, which uses speech and head-movement for interaction. Additionally, multiple advanced visual cues were designed that utilize object pose detection for spatial-visual support. The pose recognition system is adapted from state-of-the-art research in computer vision to allow the detection of arbitrary objects with no regard for texture or shape.
Two evaluations were performed, a small user study that excluded the object recognition, which confirms the general usability of the system and gives an impression on its performance. The participants were able to perform difficult pick and place tasks with a high success rate. Secondly, a technical evaluation of the object recognition system was conducted, which revealed an adequate prediction precision, but is too unreliable for real-world scenarios as the prediction quality is highly variable and depends on object orientations and occlusion.
This thesis evaluates the effects of the GDPR using a technical and human-centric approach. We assess challenges service providers face when they want to design GDPR-proof web applications. On the technical side, we perform two large-scale measurement studies. The first study aims to illuminate third party loading dependencies in web applications. The second study provides a detailed analysis of the information-sharing networks between online adver-tising companies. The human-centric analysis studies how companies implemented the Right to Access and if users can profit from the new right.
The activated sludge respiration inhibition test and the luminescent bacteria test with Vibrio fischeri are important bacterial test systems for evaluation of the toxicity of chemical compounds. These test systems were further optimized to result in better handling, reliability and sensitivity. Concerning the Vibrio fischeri test, media components such as yeast extract and bivalent cation concentrations like Ca2+ and Mg2+ were optimized. The cultivation, storage conditions and reactivation process of the stored bacteria were also improved, which enabled simpler handling and led to good reproducibility. Additionally, the respiration inhibition test with a prolonged incubation time was further analyzed using different chlorinated phenols as reference compounds. It could be stated that a longer incubation period significantly improved the sensitivity of the test system.
We study the impact of underdamped intramolecular vibrational modes on the efficiency of the excitation energy transfer in a dimer in which each state is coupled to its own underdamped vibrational mode and, in addition, to a continuous background of environmental modes. For this, we use the numerically exact hierarchy equation of motion approach. We determine the quantum yield and the transfer time in dependence of the vibronic coupling strength, and in dependence of the damping of the incoherent background. Moreover, we tune the vibrational frequencies out of resonance with the excitonic energy gap. We show that the quantum yield is enhanced by up to 10% when the vibrational frequency of the donor is larger than at the acceptor. The vibronic energy eigenstates of the acceptor acquire then an increased density of states, which leads to a higher occupation probability of the acceptor in thermal equilibrium. We can conclude that an underdamped vibrational mode which is weakly coupled to the dimer fuels a faster transfer of excitation energy, illustrating that long-lived vibrations can, in principle, enhance energy transfer, without involving long-lived electronic coherence.
Challenging visual localization of an UAV while flying out of a room into a snowy environment (~ 4:50). The UAV is equipped with a 360° camera. The localization is done with OpenVSLAM.
The video was recorded in Jan. 2019 at the Fire Brigade training center in Dortmund
To achieve nearly real time conditions the original resolution of 5k (30 fps) was reduced to 2k (ffmpeg -i video.mp4 -vf scale=1920:-1 -crf 25 vido-small.mp4) with high compression (-crf 25). This reduce the original size from 3.2 GB to 93MB (~ 4 MBit/s which could be transmitted online via a radio link). The localization shown did not use frameskip. With a frameskip above 1 the localization fails while the UAV is flying through the window. Indoor localization can be done with a frameskip of 3 in real time.
Leadership Beyond Narcissism: On the Role of Compassionate Love as Antecedent of Servant Leadership
(2020)
While we already know a lot about the outcomes and boundary conditions of servant leadership, there is still a need for research on its antecedents. Building on the theory of purposeful work behavior and further theorizing by van Dierendonck and Patterson (2015), we examine if leaders’ propensity for compassionate love will evoke servant leadership behavior. At the same time, we contrast compassionate love to leaders’ narcissism as psychological counterpart to compassionate love, because narcissism is not associated with leader effectiveness, but with leader emergence instead. We collected data from 170 leader-follower-dyads in a field study in Germany, while measuring leaders’ compassionate love and narcissism, and followers’ perceptions of servant leadership. We found a positive association between leaders’ compassionate love and servant leadership behavior, while narcissism was negatively associated with servant leadership. Theoretical and practical implications, as well as pathways for future research are discussed.
Proof of Existence as a blockchain service has first been published in 2013 as a public notary service on the Bitcoin network and can be used to verify the existence of a particular file in a specific point of time without sharing the file or its content itself. This service is also available on the Ethereum based bloxberg network, a decentralized research infrastructure that is governed, operated and developed by an international consortium of research facilities. Since it is desirable to integrate the creation of this proof tightly into the research workflow, namely the acquisition and processing of research data, we show a simple to integrate MATLAB extension based solution with the concept being applicable to other programming languages and environments as well.
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
The set of transactions that occurs on the public ledger of an Ethereum network in a specific time frame can be represented as a directed graph, with vertices representing addresses and an edge indicating the interaction between two addresses.
While there exists preliminary research on analyzing an Ethereum network by the means of graph analysis, most existing work is focused on either the public Ethereum Mainnet or on analyzing the different semantic transaction layers using static graph analysis in order to carve out the different network properties (such as interconnectivity, degrees of centrality, etc.) needed to characterize a blockchain network. By analyzing the consortium-run bloxberg Proof-of-Authority (PoA) Ethereum network, we show that we can identify suspicious and potentially malicious behaviour of network participants by employing statistical graph analysis. We thereby show that it is possible to identify the potentially malicious
exploitation of an unmetered and weakly secured blockchain network resource. In addition, we show that Temporal Network Analysis is a promising technique to identify the occurrence of anomalies in a PoA Ethereum network.
In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they provide their users. However, in reality, they often do not know which third parties are embedded, for example, when these third parties request additional content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the magnitude of these new challenges. To better reflect the connectedness of third parties, we measured their relations in a model we call third party trees, which reflects an approximation of the loading dependencies of all third parties embedded into a given website. Using this concept, we show that including a single third party can lead to subsequent requests from up to eight additional services. Furthermore, our findings indicate that the third parties embedded on a page load are not always deterministic, as 50 % of the branches in the third party trees change between repeated visits. In addition, we found that 93 % of the analyzed websites embedded third parties that are located in regions that might not be in line with the current legal framework. Our study also replicates previous work that mostly focused on landing pages of websites. We show that this method is only able to measure a lower bound as subsites show a significant increase of privacy-invasive techniques. For example, our results show an increase of used cookies by about 36 % when crawling websites more deeply.
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation’s definition of personal data applies to every company that collects data from European Internet users. This includes tracking services that, until then, argued that they were collecting anonymous information and data protection requirements would not apply to their businesses.
Previous studies have analyzed the impact of the GDPR on the prevalence of online tracking, with mixed results. In this paper, we go beyond the analysis of the number of third parties and focus on the underlying information sharing networks between online advertising companies in terms of client-side cookie syncing. Using graph analysis, our measurement shows that the number of ID syncing connections decreased by around 40 % around the time the GDPR went into effect, but a long-term analysis shows a slight rebound since then. While we can show a decrease in information sharing between third parties, which is likely related to the legislation, the data also shows that the amount of tracking, as well as the general structure of cooperation, was not affected. Consolidation in the ecosystem led to a more centralized infrastructure that might actually have negative effects on user privacy, as fewer companies perform tracking on more sites.
With ongoing developments in the field of smart cities and digitalization in general, data is becoming a driving factor and value stream for new and existing economies alike. However, there exists an increasing centralization and monopolization of data holders and service providers, especially in the form of the big US-based technology companies in the western world and central technology providers with close ties to the government in the Asian regions. Self Sovereign Identity (SSI) provides the technical building blocks to create decentralized data-driven systems, which bring data autonomy back to the users. In this paper we propose a system in which the combination of SSI and token economy based incentivisation strategies makes it possible to unlock the potential value of data-pools without compromising the data autonomy of the users.
The algorithm for automated functional groups detection and extraction of organic molecules developed by Peter Ertl is implemented on the basis of the Chemistry Development Kit (CDK).
Folder Basic contains the basic ErtlFunctionalGroupsFinder code and test code for integration in Java projects.
Folder CDK contains CDK library jar file cdk-2.2.jar that ErtlFunctionalGroupsFinder works with.
Folder Evaluation contains sample code for evaluation of functional groups with ErtlFunctionalGroupsFinder.
Folder JUnit 4 contains library jar files for unit testing.
Folder Performance contains a jar library for performance tests.
ErtlFunctionalGroupsFinder is described in the scientific literature
In this paper, the effect of computed tomography (CT) values of metals in 12-bit and 16-bit extended Hounsfield Unit (EHU) scale on dose calculations in radiotherapy treatment planning systems (TPS) were quantified. Dose simulations for metals in water environment were performed with the software PRIMO in 6MV photon mode. The depth dose profiles were analysed and the relative dose differences between the metals determined with 12-bit and 16-bit CT imaging, respectively, were calculated. Maximum dose differences of ΔAl= 3.0%, ΔTi= 4.5%, ΔCr= 6.2% and ΔCu= 11.6% were measured. In order to increase the accuracy of dose calculation on patients with implants, CT imaging in the EHU scale is recommended.
The purpose of this work was to develop and investigate a radiofrequency (RF) coil to perform image studies on small animals using the 7T magnetic resonance imaging (MRI) system, installed in the imaging platform in the autopsy room (Portuguese acronym PISA), at the University of Sao Paulo, Brazil, which is the unique 7T MRI scanner installed in South America. Due to a high demand to create new specific coils for this 7T system, it is necessary to carefully assess the distribution of electromagnetic (EM) fields generated by the coils and evaluate the patient/object safety during MRI procedures. To achieve this goal 3D numerical methods were used to design and analyse a 8-rungs transmit/receive linearly driven birdcage coil for small animals. Calculated magnetic field (B 1) distributions generated by the coil were crosschecked with measured results, indicating good confidence in the simulated results.
In this research computer tomography (CT) iterative reconstruction (IR) algorithms are investigated, specifically the impact of their statistical and model-based strength on image quality in low-dose lung screening CT protocols in comparison to filtered back projection (FBP). It has been probed whether statistical, model-based IR in conjunction with low-dose, and ultra-low-dose protocols are suitable for lungcancer screening. To this end, artificial lung nodules shaped as spheres and spicules made from material with calibrated Hounsfield units (HU) were attached on marked positions in the lung structure of an anthropomorphic phantom. Nodule positions were selected by distinguished radiologists. The phantom with nodules was scanned on a CT Scanner using standard high contrast (SHC), low-dose (LD) and ultra low-dose (ULD) protocol. For reconstruction FBP and the IR algorithm ADMIRE at three different …
The article highlights gender codes in design, particularly in web design, by means of current examples. Different aspects of gender-specific design are looked at in detail and their inherent problems discussed: on the one hand the development of a special solution (gender-specific for women), on the other hand, web design with reduced functionality and simplification of information (i.e. image representation) which sometimes even leads to a negation of technology. The article illustrates that gender codes and stereotypical role models can be embodied on different design levels of web design (use and artefact): in structure/navigation, in creative elements by the use of shape, colour and imagery and on a textual level. These design decisions have an impact on the power of users to act, their individual gender identity and the structural gender identity/social perception of gender. The article demonstrates that gender codes in current web design are very present and aims to sensitize the topic.
When a hydrophilic solute in water is suddenly turned into a hydrophobic species, for instance, by photoionization, a layer of hydrated water molecules forms around the solute on a time scale of a few picoseconds. We study the dynamic buildup of the hydration shell around a hydrophobic solute on the basis of a time-dependent dielectric continuum model. Information about the solvent is spectroscopically extracted from the relaxation dynamics of a test dipole inside a static Onsager sphere in the nonequilibrium solvent. The growth process is described phenomenologically within two approaches. First, we consider a time-dependent thickness of the hydration layer that grows from zero to a finite value over a finite time. Second, we assume a time-dependent complex permittivity within a finite layer region around the Onsager sphere. The layer is modeled as a continuous dielectric with a much slower fluctuation dynamics. We find a time-dependent frequency shift down to the blue of the resonant absorption of the dipole, together with a dynamically decreasing line width, as compared to bulk water. The blue shift reflects the work performed against the hydrogen-bonded network of the bulk solvent and is a directly measurable quantity. Our results are in agreement with an experiment on the hydrophobic solvation of iodine in water.
Ultrafast Energy Transfer in Excitonically Coupled Molecules Induced by a Nonlocal Peierls Phonon
(2019)
Molecular vibration can influence exciton transfer via either a local (intramolecular) Holstein or a nonlocal (intermolecular) Peierls mode. We show that a strong vibronic coupling to a nonlocal mode dramatically speeds up the transfer by opening an additional transfer channel. This Peierls channel is rooted in the formation of a conical intersection of the excitonic potential energy surfaces. For increasing Peierls coupling, the electronically coherent transfer for weak coupling turns into an incoherent transfer of a localized exciton through the intersection for strong coupling. The interpretation in terms of a conical intersection intuitively explains recent experiments of ultrafast energy transfer in photosynthetic and photovoltaic molecular systems.
We study a quantum two-level system under the influence of two independent baths, i.e., a sub-Ohmic pure dephasing bath and an Ohmic or sub-Ohmic relaxational bath. We show that cooling such a system invariably polarizes one of the two baths. A polarized relaxational bath creates an effective asymmetry. This asymmetry can be suppressed by additional dephasing noise. This being less effective, the more dominant low frequencies are in the dephasing noise. A polarized dephasing bath generates a large shift in the coherent oscillation frequency of the two-level system. This frequency shift is little affected by additional relaxational noise nor by the frequency distribution of the dephasing noise itself. As our model reflects a typical situation for superconducting phase qubits, our findings can help optimize cooling protocols for future quantum electronic devices.
A compact and efficient PEM electrolyser stack design based on hydraulic single cell compression
(2019)
This technical report is about the architecture and integration of commercial UAVs in Search and Rescue missions. We describe a framework that consists of heterogeneous UAVs, a UAV task planner, a bridge to the UAVs, an intelligent image hub, and a 3D point cloud generator. A first version of the framework was developed and tested in several training missions in the EU project TRADR.
Purpose
Although courage has generally been understood as a powerful virtue, research to establish it as a psychological construct is in its infancy. We examined courage in organizations against the backdrop of positive psychology with a design in the Grounded Theory tradition that connects Positive Organizational Behavior and Positive Organizational Scholarship.
Method
The sample consists of organizations that define courage in their mission statement and organizations without such a definition. It includes employees and executives, exploring workplace courage on the macro as well as the micro level. Eleven organizations and 23 participants contributed to the interview study.
Results
Applying Glaser's theoretical coding, specifically the C-family, we propose that courage arises from a decisional conflict in three major domains: the self, social interaction, and performance. It is located on a continuum between apathy and foolhardiness and can take on reactive, proactive, or autonomous forms. Whether and to what extent courage manifests, is a dynamic process contingent upon organizational structure, culture, and communication climate as well as individual cognitiveaffective personality systems.
Limitations
The model depicts the complexity of the phenomenon, rather than details of its individual components. It goes beyond pre-defined categories and prevailing definitions.
Implications
Modern organizations are characterized by volatility, uncertainty, complexity, and ambiguity (VUCA).
Courage is crucial in such an environment and can be systematically fostered across the whole human
resource management cycle.
Value
The study advances theory building on courage in the workplace and highlights its potential to be
measured, developed and managed for more effective work performance.
Purpose
Although the systemic approach to the leadership concept seems to fit well into our modern complex and dynamic work environment, only little research has been conducted to define and assess systemic leadership. In this study we therefore developed and assessed criterion validity of the
multidimensional systemic leadership inventory (SLI, Sülzenbrück & Externbrink, 2017).
Methodology
We conducted two cross-sectional survey among managers and employees of various organizations (N = 143 and N = 150).
Results
We found a robust five-factor structure of the SLI, comprising systemic thinking, self-knowledge, solution-oriented communication, creating meaning and delegation. Regarding criterion validity, a significant positive correlation of systemic leadership was found with affective commitment, while a significant negative correlation with emotional strain in occupational contexts occurred. These overall positive outcomes for employees were not undermined by negative personality traits of the employee (Machiavellianism), while strong growth need strength further enhanced positive effects on affective commitment.
Limitations
Since all variables were measured as self-reports, common method variance could limit our findings.
Practical Implications
Systemic leadership is a very promising new approach for leaders to ensure committed and less strained employees.
Value
Systemic leadership, especially in terms of a leaders’ understanding of organizational and private systems influencing work behaviour of all members of an organization, is a promising novel leadership model suitable to address challenges of complex and dynamic work environments.
Purpose
So far, there are several approaches of measuring the Dark Triad traits, but still all of them are
personality questionnaires with at least questionable usability for applied contexts such as Human
Resource Management.
The purpose of the study is the development of a structured interview with the aim of measuring the Dark Triad in a rather qualitative way that increases social validity for the respondents.
Design/Methodology/Approach/Intervention
In the present study, 15 executives from the telecommunications industry were interviewed on their personal evaluation of management success and derailment. Afterwards, their personality traits of the Dark Triad were measured with the help of the Short Dark Triad Scale. Subsequently, the data from qualitative and quantitative research were examined for correlations using the mixed-method approach.
Results
The results of the mixed-method approach showed a statistically significant correlation between the Short Dark Triad Scale and the ratings for narcissism, Machiavellianism and subclinical psychopathy in the Dark Triad interview.
Limitations
Replicating the results in a bigger sample and a deeper investigation of the criterion-related validity as well as an integration of multiple raters can provide more confidence in our results.
Research/Practical Implications
Structured interviews allow the measurement of personality traits in a more convenient way especially in personnel selection and development processes. Identifying subclinical traits in leadership candidates can, e.g. prevent management derailment.
Originality/Value
The present study advances the measurement methods of the Dark Triad.
Streptavidin is a 58 kDa tetrameric protein with the highest known affinity to biotin with a wide range of applications in bionanotechnology and molecular biology. Dissolved streptavidin is stable at a broad range of temperature, pH, proteolytic enzymes and exhibits low non‐specific binding. In this study, a streptavidin monolayer was assembled directly on a biotinylated TiO2‐surface to investigate its stability against proteolytic digestion and its suppression of initial bacterial adsorption of Escherichia coli, Bacillus subtilis, and Streptococcus intermedius. In contrast to nonmodified TiO2 surfaces, streptavidin‐coated substrates showed only a negligible non‐specific protein adsorption at physiological protein concentrations as well as a significantly reduced bacterial adhesion. The antiadhesive properties were demonstrated to be the main reason for the suppression of bacterial adhesion, which makes this approach a promising option for future surface biofunctionalization applications.
Web advertisements are the primary financial source for many online services, but also for cybercriminals. Successful ad campaigns rely on good online profiles of their potential customers. The financial potentials of displaying ads have led to the rise of malware that injects or replaces ads on websites, in particular, so-called adware. This development leads to always further optimized and customized advertising. For these customization's, various tracking methods are used. However, only sparse work has gone into privacy issues emerging from adware. In this paper, we investigate the tracking capabilities and related privacy implications of adware and potentially unwanted programs (PUPs). Therefore, we developed a framework that allows us to analyze any network communication of the Firefox browser on the application level to circumvent encryption like TLS. We use this to dynamically analyze the communication streams of over 16,000 adware or potentially unwanted programs samples that tamper with the users' browser session. Our results indicate that roughly 37% of the requests issued by the analyzed samples contain private information and are accordingly able to track users. Additionally, we analyze which tracking techniques and services are used.
Venice 2018: Tradr Review
(2018)
The video shows an orthopoto and a textured 3D model of the location. 300 images were recorded in two short flights with a Mavic Pro in 50 meter height. The first one was a single grid while the camera facing down and the second one was a double grid facing the camera at an 60 degree angle. The 3D model is computed with OpenDroneMap.
Steps Towards an Open All-in-one Rich-Client Environment for Particle-Based Mesoscopic Simulation
(2018)
SPICES (Simplified Particle Input ConnEction Specification) is a particle-based molecular structure representation derived from straightforward simplifications of the atom-based SMILES line notation. It aims at supporting tedious and error-prone molecular structure definitions for particle-based mesoscopic simulation techniques like Dissipative Particle Dynamics by allowing for an interplay of different molecular encoding levels that range from topological line notations and corresponding particle-graph visualizations to 3D structures with support of their spatial mapping into a simulation box. An open Java library for SPICES structure handling and mesoscopic simulation support in combination with an open Java Graphical User Interface viewer application for visual topological inspection of SPICES definitions are provided.
Neuroscientists want to inspect the data their simulations are producing while these are still running. This will on the one hand save them time waiting for results and therefore insight. On the other, it will allow for more efficient use of CPU time if the simulations are being run on supercomputers. If they had access to the data being generated, neuroscientists could monitor it and take counter-actions, e.g., parameter adjustments, should the simulation deviate too much from in-vivo observations or get stuck.
As a first step toward this goal, we devise an in situ pipeline tailored to the neuroscientific use case. It is capable of recording and transferring simulation data to an analysis/visualization process, while the simulation is still running. The developed libraries are made publicly available as open source projects. We provide a proof-of-concept integration, coupling the neuronal simulator NEST to basic 2D and 3D visualization.