Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (237) (entfernen)
Sprache
- Englisch (237) (entfernen)
Schlagworte
- CDK (2)
- Deep Learning (2)
- OCSR (2)
- Polymer-Elektrolytmembran-Brennstoffzelle (2)
- hydraulic compression (2)
- modular stack design (2)
- open quantum systems (2)
- water electrolysis (2)
- carbon nanofibers, platinum electrodeposition, ele ctrochemical surface area (1)
- 360 degree Feedback (1)
- AI (1)
- Additive manufacturing Directed energy deposition-arc 316L stainless steel Corrosion behavior Electrochemical corrosion (1)
- Aerosol (1)
- Aggregation-prone (1)
- Amylase, Enzymcharakterisierung (1)
- Anorganische Analyse (1)
- Assessment Center (1)
- Augmented (1)
- Augmented Electromagnetic Accelerators (1)
- Augmented Multiphase (1)
- Augmented Multiphase Rail Launcher (1)
- Augmented Three-Phase AC-Railgun (1)
- Biomechanics (1)
- Biomedical monitoring, Hospitals, Electrocardiography, Wireless communication, Patient monitoring, Wireless sensor networks (1)
- Bone morphogenetic protein 2 (1)
- Carboxylate (1)
- Case-Study (1)
- Catalysis (1)
- Cell-free implant (1)
- Chemical image depiction (1)
- Chemical space (1)
- Cheminformatics (1)
- Chemistry Development Kit (1)
- Chemistry Development Kit, CDK, Molecule fragmentation, In silico fragmentation, Scaffolds, Functional groups, Glycosidic moieties, Rich client, Graphical user interface, GUI (1)
- Clustering (1)
- Cr(VI) and Zn(II) cations (1)
- DECIMER (1)
- Data Collection (1)
- Depiction generator image augmentation (1)
- Dissipative particle dynamics, DPD, Surfactant, Bilayer, Lamellar, Simulation, Mesoscopic (1)
- E. coli SHuffle® T7 (1)
- Electrodeposition (1)
- Electrolysis (1)
- Electromagnetic Launcher (1)
- Energy Storage Mode (1)
- Erweiterte Realität <Informatik> (1)
- Europe (1)
- Evidence-based Management (1)
- Flügelform (1)
- Fragmentation (1)
- Gas Diffusion Electrode (1)
- Greek dept crisis (1)
- Hand-drawn chemical structures (1)
- Homogene Kühlung (1)
- Hydraulic cell compression (1)
- Hydrogen evolution reaction (1)
- Hydrophilicity enhanced hBMP2 variant (1)
- ICP-Massenspektrometrie (1)
- Implantat (1)
- In-silico-design (1)
- Indigo (1)
- Kernspintomografie (1)
- Laser Synthesis Electrocatalytic Water Splitting (1)
- Leadership Competencies (1)
- Linear Electromagnetic Accelerator (1)
- Lüftungsanlage (1)
- MITRE (1)
- Magnetic Pressure (1)
- Mapping (1)
- Membrane (1)
- Methodology (1)
- Modular Augmented Launcher (1)
- Modular Design (1)
- Multiphase Rail Launcher (1)
- Mund-Nasen-Schutz (1)
- Muzzle Velocity (1)
- N,N,O Ligands (1)
- N,N′ Ligands (1)
- Natural products (1)
- NiCrBSi coatings; flame spraying; induction remelting; wear resistance (1)
- Normalisierung (1)
- OCSR, Optical Chemical Structure Recognition (1)
- ORR OER (1)
- OSINT (1)
- Ohrwurm (1)
- PEM electrolysis (1)
- PEM fuel cell (1)
- PEM fuel cell electrocatalysts, Carbon nanofibers, Oxygen plasma activation, Pulsed electroplating. (1)
- PEM water electrolysis (1)
- PEMWE (1)
- Physics-informed deep learning; unsupervised learning; Reynolds-averaged Navier-Stokesequations; high Reynolds number flow; turbulence modeling (1)
- Politische Berichterstattung (1)
- Polymere (1)
- Porous Transport Layers (1)
- Powder feed rate HVOF Cermet Wear Corrosion (1)
- PtCoMn (1)
- RDKit (1)
- Rail Launcher (1)
- Railgun (1)
- Rwanda (1)
- SARS-CoV-2 (1)
- Scaffold (1)
- Scaffold network (1)
- Scaffold tree (1)
- Segmentation; Correlation; Diseases; Convolutional Neural Networks (1)
- Semi-Infinite Plate (1)
- Social Innovation (1)
- Spondylodese (1)
- Stack <Brennstoffzelle> (1)
- Stellite 6; HVOF-spraying; Laser remelting; Cavitation erosion; Coatings (1)
- Ternary alloy catalyst preparation (1)
- Thermal Performance (1)
- Titanium; Al2O3–TiO2 coatings; Nanoindentation (1)
- Transformer (1)
- Twitter (1)
- Twitter <Softwareplattform> (1)
- Upscaling laboratory models (1)
- Zinc (1)
- academic and job-related self-control demands (1)
- activated sludge (1)
- additive manufacturing; polylactic acid (PLA); fused filament fabrication (FFF); fused deposition modeling (FDM); printing temperature; filament color; dimensional accuracy; tensile strength; friction performance; wear (1)
- adhesion (1)
- advanced persistent threats (1)
- aerosol (1)
- air hygiene (1)
- airborne infection (1)
- antecedents (1)
- artificial intelligence (1)
- assistive robotics (1)
- augmented reality (1)
- bacterial toxicity (1)
- balance (1)
- barrel cortex, cell types, multielectrode recordings, perception, psychophysics (1)
- bio-inspired functional surface (1)
- bioinspired (1)
- biomimetic (1)
- biomimetic materials (1)
- biomimetics; functional morphology; plant biomechanics; plant motion; strain analysis; structure–function relationship; 3D digital image correlation (3D-DIC); Hakea sericea; Hakea salicifolia (1)
- biomimicry (1)
- bipolar plate (1)
- blockchain (1)
- bloxberg (1)
- carbon nanofibers, platinum electrodeposition, electrocatalysts (1)
- cartilage defect (1)
- cartilage regeneration (1)
- chlorinated phenols (1)
- co-based alloys; hot corrosion; solid particle erosion; microstructure; brazing (1)
- coatings (1)
- cobot (1)
- compassionate love (1)
- composition (1)
- conical intersection (1)
- corrosion resistance (1)
- corrosion; self-fluxing alloys; NiCrBSi; WC-12Co; cavitation; hard metals (1)
- cyber kill chain (1)
- demagnetization cooling (1)
- design process (1)
- diversity (1)
- dlt (1)
- dynamic capabilities (1)
- education; skills; competences; pandemic; online or face-to-face (1)
- efficiency of exciton transfer (1)
- empowerment (1)
- entrepreneurial diversity (1)
- entrepreneurship (1)
- ethereum (1)
- ethics (1)
- excitation energy transfer (1)
- expert interviews (1)
- face mask (1)
- farming (1)
- fused deposition modeling (FDM); fused filament fabrication (FFF); polylactic acid (PLA); layer height; layer thickness; filament color; PLA color; dimensional accuracy; tensile strength (1)
- gender stereotypes (1)
- gender-sensitive design (1)
- gender-specific design (1)
- human robot interaction (1)
- human-robot collaboration (1)
- hydraulic cell compression (1)
- innovation (1)
- international comparative study (1)
- intersectionality (1)
- irritation (1)
- long-term toxicity (1)
- luminescent bacteria (1)
- machine learning (1)
- managerial vs. non-managerial actors (1)
- measurement study (1)
- media accountability (1)
- microfoundations (1)
- multi-level model of competence (1)
- narcissism (1)
- neutrality (1)
- nonadiabatic dynamics (1)
- noncommuting fluctuations (1)
- nonequilibrium quantum transport (1)
- normalisation (1)
- novel (1)
- open science (1)
- optical chemical structure recognition (1)
- pH-shift elution (1)
- phishing (1)
- poa (1)
- poe (1)
- political journalism (1)
- polymer electrolyte membrane (1)
- product development (1)
- projection (1)
- quality standards (1)
- quantum dissipation (1)
- reconnaissance (1)
- relevance (1)
- respiration inhibition (1)
- role identity (1)
- self-fluxing; ZrO2; NiCrBSi; vacuum post-treatment; thermal spraying (1)
- servant leadership (1)
- shared user control (1)
- solution finding (1)
- study and working time per week (1)
- television news coverage (1)
- trait self-control (1)
- transport (1)
- tree frog (1)
- ventilation (1)
- vibronic coupling (1)
- virtual reality (1)
- visual cues (1)
- visualization techniques (1)
- watchblogs (1)
- Änderung (1)
Institut
- Westfälisches Institut für Gesundheit (38)
- Westfälisches Energieinstitut (35)
- Wirtschaft und Informationstechnik Bocholt (32)
- Elektrotechnik und angewandte Naturwissenschaften (28)
- Institut für biologische und chemische Informatik (19)
- Maschinenbau und Facilities Management (13)
- Wirtschaftsingenieurwesen (13)
- Maschinenbau Bocholt (12)
- Institut Arbeit und Technik (7)
- Informatik und Kommunikation (6)
Stereo Camera Setup for 360° Digital Image Correlation to Reveal Smart Structures of Hakea Fruits
(2024)
About forty years after its first application, digital image correlation (DIC) has become an established method for measuring surface displacements and deformations of objects under stress. To date, DIC has been used in a variety of in vitro and in vivo studies to biomechanically characterise biological samples in order to reveal biomimetic principles. However, when surfaces of samples strongly deform or twist, they cannot be thoroughly traced. To overcome this challenge, different DIC setups have been developed to provide additional sensor perspectives and, thus, capture larger parts of an object’s surface. Herein, we discuss current solutions for this multi-perspective DIC, and we present our own approach to a 360 DIC system based on a single stereo-camera setup. Using this setup, we are able to characterise the desiccation-driven opening mechanism of two woody Hakea fruits over their entire surfaces. Both the breaking mechanism and the actuation of the two valves in predominantly dead plant material are models for smart materials. Based on these results, an evaluation of the setup for 360 DIC regarding its use in deducing biomimetic principles is given. Furthermore, we propose a way to improve and apply the method for future measurements.
As a rule, an experiment carried out at school or in undergraduate study
courses is rather simple and not very informative. However, when the experiments
are to be performed using modern methods, they are often abstract and
difficult to understand. Here, we describe a quick and simple experiment,
namely the enzymatic characterization of ptyalin (human salivary amylase)
using a starch degradation assay. With the experimental setup presented here,
enzyme parameters, such as pH optimum, temperature optimum, chloride
dependence, and sensitivity to certain chemicals can be easily determined. This
experiment can serve as a good model for enzyme characterization in general,
as modern methods usually follow the same principle: determination of the
activity of the enzyme under different conditions. As different alleles occur in
humans, a random selection of test subjects will be quite different with regard
to ptyalin activities. Therefore, when the students measure their own ptyalin
activity, significant differences will emerge, and this will give them an idea of
the genetic diversity in human populations. The evaluation has shown that the
pupils have gained a solid understanding of the topic through this experiment.
With ongoing developments in the field of smart cities and digitalization in general, data is becoming a driving factor and value stream for new and existing economies alike. However, there exists an increasing centralization and monopolization of data holders and service providers, especially in the form of the big US-based technology companies in the western world and central technology providers with close ties to the government in the Asian regions. Self Sovereign Identity (SSI) provides the technical building blocks to create decentralized data-driven systems, which bring data autonomy back to the users. In this paper we propose a system in which the combination of SSI and token economy based incentivisation strategies makes it possible to unlock the potential value of data-pools without compromising the data autonomy of the users.
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation’s definition of personal data applies to every company that collects data from European Internet users. This includes tracking services that, until then, argued that they were collecting anonymous information and data protection requirements would not apply to their businesses.
Previous studies have analyzed the impact of the GDPR on the prevalence of online tracking, with mixed results. In this paper, we go beyond the analysis of the number of third parties and focus on the underlying information sharing networks between online advertising companies in terms of client-side cookie syncing. Using graph analysis, our measurement shows that the number of ID syncing connections decreased by around 40 % around the time the GDPR went into effect, but a long-term analysis shows a slight rebound since then. While we can show a decrease in information sharing between third parties, which is likely related to the legislation, the data also shows that the amount of tracking, as well as the general structure of cooperation, was not affected. Consolidation in the ecosystem led to a more centralized infrastructure that might actually have negative effects on user privacy, as fewer companies perform tracking on more sites.
In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they provide their users. However, in reality, they often do not know which third parties are embedded, for example, when these third parties request additional content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the magnitude of these new challenges. To better reflect the connectedness of third parties, we measured their relations in a model we call third party trees, which reflects an approximation of the loading dependencies of all third parties embedded into a given website. Using this concept, we show that including a single third party can lead to subsequent requests from up to eight additional services. Furthermore, our findings indicate that the third parties embedded on a page load are not always deterministic, as 50 % of the branches in the third party trees change between repeated visits. In addition, we found that 93 % of the analyzed websites embedded third parties that are located in regions that might not be in line with the current legal framework. Our study also replicates previous work that mostly focused on landing pages of websites. We show that this method is only able to measure a lower bound as subsites show a significant increase of privacy-invasive techniques. For example, our results show an increase of used cookies by about 36 % when crawling websites more deeply.
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
The set of transactions that occurs on the public ledger of an Ethereum network in a specific time frame can be represented as a directed graph, with vertices representing addresses and an edge indicating the interaction between two addresses.
While there exists preliminary research on analyzing an Ethereum network by the means of graph analysis, most existing work is focused on either the public Ethereum Mainnet or on analyzing the different semantic transaction layers using static graph analysis in order to carve out the different network properties (such as interconnectivity, degrees of centrality, etc.) needed to characterize a blockchain network. By analyzing the consortium-run bloxberg Proof-of-Authority (PoA) Ethereum network, we show that we can identify suspicious and potentially malicious behaviour of network participants by employing statistical graph analysis. We thereby show that it is possible to identify the potentially malicious
exploitation of an unmetered and weakly secured blockchain network resource. In addition, we show that Temporal Network Analysis is a promising technique to identify the occurrence of anomalies in a PoA Ethereum network.
Software updates take an essential role in keeping IT environments secure. If service providers delay or do not install updates, it can cause unwanted security implications for their environments. This paper conducts a large-scale measurement study of the update behavior of websites and their utilized software stacks. Across 18 months, we analyze over 5.6M websites and 246 distinct client- and server-side software distributions. We found that almost all analyzed sites use outdated software. To understand the possible security implications of outdated software, we analyze the potential vulnerabilities that affect the utilized software. We show that software components are getting older and more vulnerable because they are not updated. We find that 95 % of the analyzed websites use at least one product for which a vulnerability existed.
A Crypto-Token Based Charging Incentivization
Scheme for Sustainable Light Electric Vehicle
Sharing
(2021)
The ecological impact of shared light electric vehicles (LEV) such as kick scooters is still widely discussed. Especially the fact that the vehicles and batteries are collected using diesel vans in order to charge empty batteries with electricity of unclear origin is perceived as unsustainable. A better option could be to let the users charge the vehicles themselves whenever it is necessary. For this, a decentralized,flexible and easy to install network of off-grid solar charging stations could bring renewable electricity where it is needed without sacrificing the convenience of a free float sharing system. Since the charging stations are powered by solar energy the most efficient way to utilize them would be to charge the vehicles when the sun is shining. In order to make users charge the vehicle it is necessary to provide some form of benefit for
them doing so. This could be either a discount or free rides. A
particularly robust and well-established mechanism is controlling incentives via means of blockchain-based cryptotokens. This paper demonstrates a crypto-token based scheme for incentivizing users to charge sharing vehicles during times of considerable solar irradiation in order to contribute to more sustainable mobility services.
Third-party tracking is a common and broadly used technique on the Web. Different defense mechanisms have emerged to counter these practices (e.g. browser vendors that ban all third-party cookies). However, these countermeasures only target third-party trackers and ignore the first party because the narrative is that such monitoring is mostly used to improve the utilized service (e.g. analytical services). In this paper, we present a large-scale measurement study that analyzes tracking performed by the first party but utilized by a third party to circumvent standard tracking preventing techniques. We visit the top 15,000 websites to analyze first-party cookies used to track users and a technique called “DNS CNAME cloaking”, which can be used by a third party to place first-party cookies. Using this data, we show that 76% of sites effectively utilize such tracking techniques. In a long-running analysis, we show that the usage of such cookies increased by more than 50% over 2021.
Proof of Existence as a blockchain service has first been published in 2013 as a public notary service on the Bitcoin network and can be used to verify the existence of a particular file in a specific point of time without sharing the file or its content itself. This service is also available on the Ethereum based bloxberg network, a decentralized research infrastructure that is governed, operated and developed by an international consortium of research facilities. Since it is desirable to integrate the creation of this proof tightly into the research workflow, namely the acquisition and processing of research data, we show a simple to integrate MATLAB extension based solution with the concept being applicable to other programming languages and environments as well.
The number of publications describing chemical structures has increased steadily over the last decades. However, the majority of published chemical information is currently not available in machine-readable form in public databases. It remains a challenge to automate the process of information extraction in a way that requires less manual intervention - especially the mining of chemical structure depictions. As an open-source platform that leverages recent advancements in deep learning, computer vision, and natural language processing, DECIMER.ai (Deep lEarning for Chemical IMagE Recognition) strives to automatically segment, classify, and translate chemical structure depictions from the printed literature. The segmentation and classification tools are the only openly available packages of their kind, and the optical chemical structure recognition (OCSR) core application yields outstanding performance on all benchmark datasets. The source code, the trained models and the datasets developed in this work have been published under permissive licences. An instance of the DECIMER web application is available at https://decimer.ai.
To address the question which neocortical layers and cell types are important for the perception of a sensory stimulus, we performed multielectrode recordings in the barrel cortex of head-fixed mice performing a single-whisker go/no-go detection task with vibrotactile stimuli of differing intensities. We found that behavioral detection probability decreased gradually over the course of each session, which was well explained by a signal detection theory-based model that posits stable psychometric sensitivity and a variable decision criterion updated after each reinforcement, reflecting decreasing motivation. Analysis of multiunit activity demonstrated highest neurometric sensitivity in layer 4, which was achieved within only 30 ms after stimulus onset. At the level of single neurons, we observed substantial heterogeneity of neurometric sensitivity within and across layers, ranging from nonresponsiveness to approaching or even exceeding psychometric sensitivity. In all cortical layers, putative inhibitory interneurons on average proffered higher neurometric sensitivity than putative excitatory neurons. In infragranular layers, neurons increasing firing rate in response to stimulation featured higher sensitivities than neurons decreasing firing rate. Offline machine-learning-based analysis of videos of behavioral sessions showed that mice performed better when not moving, which at the neuronal level, was reflected by increased stimulus-evoked firing rates.