Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (237)
- Konferenzveröffentlichung (216)
- Teil eines Buches (Kapitel) (32)
- Sonstiges (31)
- Video (14)
- Buch (Monographie) (13)
- Preprint (12)
- Dissertation (4)
- Bericht (4)
- Arbeitspapier (4)
Sprache
- Englisch (572) (entfernen)
Schlagworte
- Robotik (8)
- Flugkörper (7)
- UAV (7)
- Rettungsrobotik (5)
- Dissipative Particle Dynamics (4)
- Polymer-Elektrolytmembran-Brennstoffzelle (4)
- adhesion (4)
- Bionik (3)
- Deep Learning (3)
- Erweiterte Realität <Informatik> (3)
- Gespenstschrecken (3)
- Haftorgan (3)
- OCSR (3)
- stick insects (3)
- Augmented Reality (2)
- CDK (2)
- Competency-Oriented Exams (2)
- DECIMER (2)
- Deep learning (2)
- Electrodeposition (2)
- Field measurement (2)
- Human-Robot Interaction (2)
- OCSR, Optical Chemical Structure Recognition (2)
- Solar modules (2)
- Transformer (2)
- Twitter <Softwareplattform> (2)
- biomimicry (2)
- hydraulic compression (2)
- modular stack design (2)
- open quantum systems (2)
- social innovation (2)
- water electrolysis (2)
- carbon nanofibers, platinum electrodeposition, ele ctrochemical surface area (1)
- 360 degree Feedback (1)
- 360° Panorama (1)
- AEM-Electrolysis (1)
- AI (1)
- API 1130 (1)
- Additive manufacturing Directed energy deposition-arc 316L stainless steel Corrosion behavior Electrochemical corrosion (1)
- Aerosol (1)
- Aggregation-prone (1)
- Air handling unit (1)
- AlphaFold, ColabFold, PyMOL (1)
- Alternative Geschäftsmodelle (1)
- Amylase, Enzymcharakterisierung (1)
- Anorganische Analyse (1)
- Artificial Intelligence (1)
- Assessment Center (1)
- Assisted living technologies (1)
- Assistive robotics (1)
- Augmented (1)
- Augmented Electromagnetic Accelerators (1)
- Augmented Multiphase (1)
- Augmented Multiphase Rail Launcher (1)
- Augmented Three-Phase AC-Railgun (1)
- Autonomous Agents (1)
- Bildverarbeitung (1)
- Biomechanics (1)
- Biomedical monitoring, Hospitals, Electrocardiography, Wireless communication, Patient monitoring, Wireless sensor networks (1)
- Biomimetics (1)
- Bone Morphogenetic Protein, BMP, BMP2 (1)
- Bone morphogenetic protein 2 (1)
- Brand theory (1)
- CFD Simulation (1)
- COIL (1)
- CPM (1)
- Carboxylate (1)
- Case-Study (1)
- Catalysis (1)
- Cell-free implant (1)
- Chemical image depiction (1)
- Chemical space (1)
- Chemical structure depictions (1)
- Cheminformatics (1)
- Chemistry Development Kit (1)
- Chemistry Development Kit, CDK, Molecule fragmentation, In silico fragmentation, Scaffolds, Functional groups, Glycosidic moieties, Rich client, Graphical user interface, GUI (1)
- Chief Executive Officer (1)
- Climate change (1)
- Clustering (1)
- Codegenerierung (1)
- Communication management (1)
- Constructive Alignment (1)
- Continuous Assessment (1)
- Continuous Queries (1)
- Cookie <Internet> (1)
- Cr(VI) and Zn(II) cations (1)
- Crowdfunding (1)
- Current Pulses (1)
- DPD, Dissipative Particle Dynamics (1)
- Data Collection (1)
- Data Journalism (1)
- Datalog (1)
- Datenjournalismus (1)
- Datensatz (1)
- Datenschutz (1)
- Deductive Databases (1)
- Depiction generator image augmentation (1)
- Deutschland / Technische Regeln für brennbare Flüssigkeiten (1)
- Dissipative particle dynamics, DPD, Surfactant, Bilayer, Lamellar, Simulation, Mesoscopic (1)
- Distributed Software Development (1)
- E. coli SHuffle® T7 (1)
- Elastizitätsmodul (1)
- Electrolysis (1)
- Electromagnetic Launcher (1)
- Elektrodenvorbereitung (1)
- Energy Storage Mode (1)
- Enterprise JavaBeans (1)
- Erneuerbare Energien (1)
- Europe (1)
- Evidence-based Management (1)
- Exams with Third-Party Applications (1)
- Fehlererkennung (1)
- Fehlerortung (1)
- Flat-Channel (1)
- Flipped Classroom (1)
- Flory-Huggins parameter (1)
- Flügelform (1)
- Formative Assessment (1)
- Fragmentation (1)
- Future capacity needs (1)
- Gas Diffusion Electrode (1)
- Greek dept crisis (1)
- Hand-drawn chemical structures (1)
- Hand-drawn images (1)
- Hands-free Interaction (1)
- High Reynold Numer (1)
- Homogene Kühlung (1)
- Human-centered computing (1)
- Hydraulic cell compression (1)
- Hydraulic compression, Carbon Nano Fibers, PEM Fuel Cells, Catalyst utilization (1)
- Hydrogen evolution reaction (1)
- Hydrophilicity enhanced hBMP2 variant (1)
- ICP-Massenspektrometrie (1)
- Implantat (1)
- In-silico-design (1)
- Incremental Evaluation (1)
- Indigo (1)
- Interactive Voting Systems (1)
- Intercultural Collaboration (1)
- Journalismus (1)
- Juristenausbildung (1)
- Kalman filter (1)
- Kernspintomografie (1)
- Kohlenstoff (1)
- Kohlenstoff-Nanoröhre (1)
- Laser Synthesis Electrocatalytic Water Splitting (1)
- Launcher (1)
- Leadership Competencies (1)
- Leak detection (1)
- Leckerkennung (1)
- Leckortung (1)
- Lecksuchgerät (1)
- Lecküberwachung (1)
- Linear Electromagnetic Accelerator (1)
- Lüftungsanlage (1)
- MITRE (1)
- Machine Learning (1)
- Magnetic Pressure (1)
- Mapping (1)
- Maus (1)
- Media Brands (1)
- Media brand characteristics (1)
- Media positioning (1)
- Membrane (1)
- Methodology (1)
- Middle-range Theory (1)
- Mikrofotografie (1)
- Mixed Reality (1)
- Modular Augmented Launcher (1)
- Modular Design (1)
- Molecule images (1)
- Multi-Agent System (1)
- Multiphase Rail Launcher (1)
- Mund-Nasen-Schutz (1)
- Muzzle Velocity (1)
- N,N,O Ligands (1)
- N,N′ Ligands (1)
- Nanofaser (1)
- Natural products (1)
- Naturstoff (1)
- NeRF (1)
- New Public Governance (1)
- New Public Management (1)
- New Work, Information and Communication Industry, Innovation, Organizational Goals, Survey (1)
- Ni-Mo alloy Catalyst (1)
- NiCrBSi coatings; flame spraying; induction remelting; wear resistance (1)
- Normalisierung (1)
- ORR OER (1)
- OSINT (1)
- Object Recognition (1)
- Object-relational Mapping (1)
- Objektverfolgung (1)
- Ohrwurm (1)
- Online Programming Exams (1)
- Online Supervision (1)
- Online-Werbung (1)
- Optical Chemical Structure Recognition (1)
- Ortsbestimmung (1)
- PEM Electrolysis, Hydrogen, Hydraulic Compression, High Pressure (1)
- PEM electrolysis (1)
- PEM fuel cell (1)
- PEM fuel cell electrocatalysts, Carbon nanofibers, Oxygen plasma activation, Pulsed electroplating. (1)
- PEM fuel cells (1)
- PEM water electrolysis (1)
- PEM-Brennstoffzelle (1)
- PEMWE (1)
- Peer Assessment (1)
- Peer Instruction (1)
- People with disabilities (1)
- Performance prediction (1)
- Persistenz <Informatik> (1)
- Physics-Informed Deep Learning (1)
- Physics-informed deep learning; unsupervised learning; Reynolds-averaged Navier-Stokesequations; high Reynolds number flow; turbulence modeling (1)
- Politische Berichterstattung (1)
- Polymere (1)
- Porous Transport Layers (1)
- Powder feed rate HVOF Cermet Wear Corrosion (1)
- Privatsphäre (1)
- Project-based Learning (1)
- PtCoMn (1)
- RDKit (1)
- RIS (1)
- Rail Launcher (1)
- Railgun (1)
- Regeln der Technik (1)
- Rescue Robotics (1)
- Robot assistive drinking (1)
- Robot assistive eating (1)
- Rwanda (1)
- SARS-CoV-2 (1)
- Sauerstoffplasmaaktivierung (1)
- Scaffold (1)
- Scaffold network (1)
- Scaffold tree (1)
- Segmentation; Correlation; Diseases; Convolutional Neural Networks (1)
- Semi-Infinite Plate (1)
- Sinusoidal (1)
- Small UAVs (1)
- Smart Grid (1)
- Social Innovation (1)
- Social Learning (1)
- Social Media (1)
- Spondylodese (1)
- Stack <Brennstoffzelle> (1)
- Stellite 6; HVOF-spraying; Laser remelting; Cavitation erosion; Coatings (1)
- Student Activation (1)
- TRFL (1)
- Temperature coefficients (1)
- Ternary alloy catalyst preparation (1)
- Tetraplegie (1)
- Thermal Performance (1)
- Thermal Stress (1)
- Titanium; Al2O3–TiO2 coatings; Nanoindentation (1)
- Tracking (1)
- Transformative Teaching (1)
- Twitter (1)
- Update Propagation (1)
- Upscaling laboratory models (1)
- Urban heat island (1)
- Visual Monocular SLAM (1)
- Young´s modulus (1)
- Zinc (1)
- Zustandsmaschine (1)
- academic and job-related self-control demands (1)
- activated sludge (1)
- additive manufacturing; polylactic acid (PLA); fused filament fabrication (FFF); fused deposition modeling (FDM); printing temperature; filament color; dimensional accuracy; tensile strength; friction performance; wear (1)
- advanced persistent threats (1)
- aerosol (1)
- air hygiene (1)
- airborne infection (1)
- antecedents (1)
- artificial intelligence (1)
- assistive robotics (1)
- augmented reality (1)
- bacterial toxicity (1)
- balance (1)
- barrel cortex, cell types, multielectrode recordings, perception, psychophysics (1)
- bio-inspired functional surface (1)
- bioinspired (1)
- biomimetic (1)
- biomimetic materials (1)
- biomimetics; functional morphology; plant biomechanics; plant motion; strain analysis; structure–function relationship; 3D digital image correlation (3D-DIC); Hakea sericea; Hakea salicifolia (1)
- bipolar plate (1)
- blockchain (1)
- bloxberg (1)
- carbon nano fibres (1)
- carbon nanofibers, platinum electrodeposition, electrocatalysts (1)
- cartilage defect (1)
- cartilage regeneration (1)
- chlorinated phenols (1)
- cluster (1)
- co-based alloys; hot corrosion; solid particle erosion; microstructure; brazing (1)
- coatings (1)
- cobot (1)
- collaborative online international learning (COIL) (1)
- compassionate love (1)
- composition (1)
- conical intersection (1)
- consent banner (1)
- cookie banner (1)
- cookies (1)
- corrosion resistance (1)
- corrosion; self-fluxing alloys; NiCrBSi; WC-12Co; cavitation; hard metals (1)
- critical review (1)
- cyber kill chain (1)
- demagnetization cooling (1)
- design process (1)
- distributed software development (1)
- diversity (1)
- dlt (1)
- dynamic capabilities (1)
- education; skills; competences; pandemic; online or face-to-face (1)
- efficiency of exciton transfer (1)
- electrode preparation (1)
- empowerment (1)
- entrepreneurial diversity (1)
- entrepreneurship (1)
- ethereum (1)
- ethics (1)
- excitation energy transfer (1)
- expert interviews (1)
- face mask (1)
- farming (1)
- fused deposition modeling (FDM); fused filament fabrication (FFF); polylactic acid (PLA); layer height; layer thickness; filament color; PLA color; dimensional accuracy; tensile strength (1)
- gender stereotypes (1)
- gender-sensitive design (1)
- gender-specific design (1)
- human robot interaction (1)
- human-centered design (1)
- human-robot collaboration (1)
- hybrid sensor system (1)
- hydraulic cell compression (1)
- infrared heating panel (1)
- ingots (1)
- innovation (1)
- intercultural collaboration (1)
- interdisciplinary students project (1)
- intermolecular interaction (1)
- international comparative study (1)
- intersectionality (1)
- irritation (1)
- leak locating (1)
- leak monitoring (1)
- long-term toxicity (1)
- luminescent bacteria (1)
- machine learning (1)
- managerial vs. non-managerial actors (1)
- measurement study (1)
- media accountability (1)
- microfoundations (1)
- molecular force field (1)
- multi-level model of competence (1)
- narcissism (1)
- neutrality (1)
- nonadiabatic dynamics (1)
- noncommuting fluctuations (1)
- nonequilibrium quantum transport (1)
- normalisation (1)
- novel (1)
- open science (1)
- optical chemical structure recognition (1)
- oxygen plasma activation (1)
- pH-shift elution (1)
- participatory design (1)
- phishing (1)
- photovoltaic power systems (1)
- poa (1)
- poe (1)
- policymakers (1)
- political journalism (1)
- polymer electrolyte membrane (1)
- privacy (1)
- product development (1)
- project-based learning (1)
- projection (1)
- protein structure prediction (1)
- public policy (1)
- quality standards (1)
- quantum dissipation (1)
- reconnaissance (1)
- relevance (1)
- respiration inhibition (1)
- risk management (1)
- role identity (1)
- self-fluxing; ZrO2; NiCrBSi; vacuum post-treatment; thermal spraying (1)
- sensor fusion (1)
- servant leadership (1)
- shared user control (1)
- silicon (1)
- solar cells (1)
- solution finding (1)
- spatial policy (1)
- state machine (1)
- study and working time per week (1)
- sustainable development (1)
- television news coverage (1)
- theorising (1)
- trait self-control (1)
- transport (1)
- tree frog (1)
- user acceptance (1)
- ventilation (1)
- vibronic coupling (1)
- virtual reality (1)
- visual cues (1)
- visualization techniques (1)
- watchblogs (1)
- web measurement (1)
- Änderung (1)
Institut
- Westfälisches Institut für Gesundheit (115)
- Westfälisches Energieinstitut (61)
- Institut für Internetsicherheit (56)
- Informatik und Kommunikation (51)
- Elektrotechnik und angewandte Naturwissenschaften (50)
- Wirtschaft und Informationstechnik Bocholt (46)
- Institut für biologische und chemische Informatik (44)
- Maschinenbau Bocholt (37)
- Institut Arbeit und Technik (15)
- Wirtschaftsingenieurwesen (15)
- Maschinenbau und Facilities Management (13)
- Institut für Innovationsforschung und -management (11)
- Fachbereiche (9)
- Wirtschaftsrecht (9)
- Mechatronik-Institut Bocholt (2)
- Strategische Projekte (2)
- Institute (1)
With ongoing developments in the field of smart cities and digitalization in general, data is becoming a driving factor and value stream for new and existing economies alike. However, there exists an increasing centralization and monopolization of data holders and service providers, especially in the form of the big US-based technology companies in the western world and central technology providers with close ties to the government in the Asian regions. Self Sovereign Identity (SSI) provides the technical building blocks to create decentralized data-driven systems, which bring data autonomy back to the users. In this paper we propose a system in which the combination of SSI and token economy based incentivisation strategies makes it possible to unlock the potential value of data-pools without compromising the data autonomy of the users.
The European General Data Protection Regulation (GDPR), which went into effect in May 2018, brought new rules for the processing of personal data that affect many business models, including online advertising. The regulation’s definition of personal data applies to every company that collects data from European Internet users. This includes tracking services that, until then, argued that they were collecting anonymous information and data protection requirements would not apply to their businesses.
Previous studies have analyzed the impact of the GDPR on the prevalence of online tracking, with mixed results. In this paper, we go beyond the analysis of the number of third parties and focus on the underlying information sharing networks between online advertising companies in terms of client-side cookie syncing. Using graph analysis, our measurement shows that the number of ID syncing connections decreased by around 40 % around the time the GDPR went into effect, but a long-term analysis shows a slight rebound since then. While we can show a decrease in information sharing between third parties, which is likely related to the legislation, the data also shows that the amount of tracking, as well as the general structure of cooperation, was not affected. Consolidation in the ecosystem led to a more centralized infrastructure that might actually have negative effects on user privacy, as fewer companies perform tracking on more sites.
In the modern Web, service providers often rely heavily on third parties to run their services. For example, they make use of ad networks to finance their services, externally hosted libraries to develop features quickly, and analytics providers to gain insights into visitor behavior.
For security and privacy, website owners need to be aware of the content they provide their users. However, in reality, they often do not know which third parties are embedded, for example, when these third parties request additional content as it is common in real-time ad auctions.
In this paper, we present a large-scale measurement study to analyze the magnitude of these new challenges. To better reflect the connectedness of third parties, we measured their relations in a model we call third party trees, which reflects an approximation of the loading dependencies of all third parties embedded into a given website. Using this concept, we show that including a single third party can lead to subsequent requests from up to eight additional services. Furthermore, our findings indicate that the third parties embedded on a page load are not always deterministic, as 50 % of the branches in the third party trees change between repeated visits. In addition, we found that 93 % of the analyzed websites embedded third parties that are located in regions that might not be in line with the current legal framework. Our study also replicates previous work that mostly focused on landing pages of websites. We show that this method is only able to measure a lower bound as subsites show a significant increase of privacy-invasive techniques. For example, our results show an increase of used cookies by about 36 % when crawling websites more deeply.
Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.
In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80 %) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83 % of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
The set of transactions that occurs on the public ledger of an Ethereum network in a specific time frame can be represented as a directed graph, with vertices representing addresses and an edge indicating the interaction between two addresses.
While there exists preliminary research on analyzing an Ethereum network by the means of graph analysis, most existing work is focused on either the public Ethereum Mainnet or on analyzing the different semantic transaction layers using static graph analysis in order to carve out the different network properties (such as interconnectivity, degrees of centrality, etc.) needed to characterize a blockchain network. By analyzing the consortium-run bloxberg Proof-of-Authority (PoA) Ethereum network, we show that we can identify suspicious and potentially malicious behaviour of network participants by employing statistical graph analysis. We thereby show that it is possible to identify the potentially malicious
exploitation of an unmetered and weakly secured blockchain network resource. In addition, we show that Temporal Network Analysis is a promising technique to identify the occurrence of anomalies in a PoA Ethereum network.
Software updates take an essential role in keeping IT environments secure. If service providers delay or do not install updates, it can cause unwanted security implications for their environments. This paper conducts a large-scale measurement study of the update behavior of websites and their utilized software stacks. Across 18 months, we analyze over 5.6M websites and 246 distinct client- and server-side software distributions. We found that almost all analyzed sites use outdated software. To understand the possible security implications of outdated software, we analyze the potential vulnerabilities that affect the utilized software. We show that software components are getting older and more vulnerable because they are not updated. We find that 95 % of the analyzed websites use at least one product for which a vulnerability existed.
A Crypto-Token Based Charging Incentivization
Scheme for Sustainable Light Electric Vehicle
Sharing
(2021)
The ecological impact of shared light electric vehicles (LEV) such as kick scooters is still widely discussed. Especially the fact that the vehicles and batteries are collected using diesel vans in order to charge empty batteries with electricity of unclear origin is perceived as unsustainable. A better option could be to let the users charge the vehicles themselves whenever it is necessary. For this, a decentralized,flexible and easy to install network of off-grid solar charging stations could bring renewable electricity where it is needed without sacrificing the convenience of a free float sharing system. Since the charging stations are powered by solar energy the most efficient way to utilize them would be to charge the vehicles when the sun is shining. In order to make users charge the vehicle it is necessary to provide some form of benefit for
them doing so. This could be either a discount or free rides. A
particularly robust and well-established mechanism is controlling incentives via means of blockchain-based cryptotokens. This paper demonstrates a crypto-token based scheme for incentivizing users to charge sharing vehicles during times of considerable solar irradiation in order to contribute to more sustainable mobility services.
Third-party tracking is a common and broadly used technique on the Web. Different defense mechanisms have emerged to counter these practices (e.g. browser vendors that ban all third-party cookies). However, these countermeasures only target third-party trackers and ignore the first party because the narrative is that such monitoring is mostly used to improve the utilized service (e.g. analytical services). In this paper, we present a large-scale measurement study that analyzes tracking performed by the first party but utilized by a third party to circumvent standard tracking preventing techniques. We visit the top 15,000 websites to analyze first-party cookies used to track users and a technique called “DNS CNAME cloaking”, which can be used by a third party to place first-party cookies. Using this data, we show that 76% of sites effectively utilize such tracking techniques. In a long-running analysis, we show that the usage of such cookies increased by more than 50% over 2021.
Measurement studies are essential for research and industry alike to understand the Web’s inner workings better and help quantify specific phenomena. Performing such studies is demanding due to the dynamic nature and size of the Web. An experiment’s careful design and setup are complex, and many factors might affect the results. However, while several works have independently observed differences in
the outcome of an experiment (e.g., the number of observed trackers) based on the measurement setup, it is unclear what causes such deviations. This work investigates the reasons for these differences by visiting 1.7M webpages with five different measurement setups. Based on this, we build ‘dependency trees’ for each page and cross-compare the nodes in the trees. The results show that the measured trees differ considerably, that the cause of differences can be attributed to specific nodes, and that even identical measurement setups can produce different results.
Proof of Existence as a blockchain service has first been published in 2013 as a public notary service on the Bitcoin network and can be used to verify the existence of a particular file in a specific point of time without sharing the file or its content itself. This service is also available on the Ethereum based bloxberg network, a decentralized research infrastructure that is governed, operated and developed by an international consortium of research facilities. Since it is desirable to integrate the creation of this proof tightly into the research workflow, namely the acquisition and processing of research data, we show a simple to integrate MATLAB extension based solution with the concept being applicable to other programming languages and environments as well.
The number of publications describing chemical structures has increased steadily over the last decades. However, the majority of published chemical information is currently not available in machine-readable form in public databases. It remains a challenge to automate the process of information extraction in a way that requires less manual intervention - especially the mining of chemical structure depictions. As an open-source platform that leverages recent advancements in deep learning, computer vision, and natural language processing, DECIMER.ai (Deep lEarning for Chemical IMagE Recognition) strives to automatically segment, classify, and translate chemical structure depictions from the printed literature. The segmentation and classification tools are the only openly available packages of their kind, and the optical chemical structure recognition (OCSR) core application yields outstanding performance on all benchmark datasets. The source code, the trained models and the datasets developed in this work have been published under permissive licences. An instance of the DECIMER web application is available at https://decimer.ai.
Cookie notices (or cookie banners) are a popular mechanism for websites to provide (European) Internet users a tool to choose which cookies the site may set. Banner implementations range from merely providing information that a site uses cookies over offering the choice to accepting or denying all cookies to allowing fine-grained control of cookie usage. Users frequently get annoyed by the banner’s pervasiveness as they interrupt “natural” browsing on the Web. As a remedy, different browser extensions have been developed to automate the interaction with cookie banners.
In this work, we perform a large-scale measurement study comparing the effectiveness of extensions for “cookie banner interaction.” We configured the extensions to express different privacy choices (e.g., accepting all cookies, accepting functional cookies, or rejecting all cookies) to understand their capabilities to execute a user’s preferences. The results show statistically significant differences in which cookies are set, how many of them are set, and which types are set—even for extensions that aim to implement the same cookie choice. Extensions for “cookie banner interaction” can effectively reduce the number of set cookies compared to no interaction with the banners. However, all extensions increase the tracking requests significantly except when rejecting all cookies.
To address the question which neocortical layers and cell types are important for the perception of a sensory stimulus, we performed multielectrode recordings in the barrel cortex of head-fixed mice performing a single-whisker go/no-go detection task with vibrotactile stimuli of differing intensities. We found that behavioral detection probability decreased gradually over the course of each session, which was well explained by a signal detection theory-based model that posits stable psychometric sensitivity and a variable decision criterion updated after each reinforcement, reflecting decreasing motivation. Analysis of multiunit activity demonstrated highest neurometric sensitivity in layer 4, which was achieved within only 30 ms after stimulus onset. At the level of single neurons, we observed substantial heterogeneity of neurometric sensitivity within and across layers, ranging from nonresponsiveness to approaching or even exceeding psychometric sensitivity. In all cortical layers, putative inhibitory interneurons on average proffered higher neurometric sensitivity than putative excitatory neurons. In infragranular layers, neurons increasing firing rate in response to stimulation featured higher sensitivities than neurons decreasing firing rate. Offline machine-learning-based analysis of videos of behavioral sessions showed that mice performed better when not moving, which at the neuronal level, was reflected by increased stimulus-evoked firing rates.
Moderating Role of Self-control Strength with Transformational Leadership and Adaptive Performance
(2013)
Based on a longitudinal sample of employees from the U.S. financial services industry (N=121), the present research examined the impact of transformational leadership on followers’ adaptive performance in change processes. Follower personality was taken into account as boundary condition by testing, if follower self-control strength as an individual trait moderated the relationship between transformational leadership and adaptive performance. In line with the developed hypothesis, results from a latent moderated structural equation model showed that followers’ self-control strength attenuated the relationship between transformational leadership and adaptive performance. Implications for research and practice are discussed.
Psychological Capital as Mediator between Transformational Leadership and Adaptive Performance
(2013)
In the realm of digital situational awareness during disaster situations, accurate digital representations,
like 3D models, play an indispensable role. To ensure the
safety of rescue teams, robotic platforms are often deployed
to generate these models. In this paper, we introduce an
innovative approach that synergizes the capabilities of compact Unmaned Arial Vehicles (UAVs), smaller than 30 cm, equipped with 360° cameras and the advances of Neural Radiance Fields (NeRFs). A NeRF, a specialized neural network, can deduce a 3D representation of any scene using 2D images and then synthesize it from various angles upon request. This method is especially tailored for urban environments which have experienced significant destruction, where the structural integrity of buildings is compromised to the point of barring entry—commonly observed post-earthquakes and after severe fires. We have tested our approach through recent post-fire scenario, underlining the efficacy of NeRFs even in challenging outdoor environments characterized by water, snow, varying light conditions, and reflective surfaces.
In this paper, we present a method for detecting objects of interest, including cars, humans, and fire, in aerial images captured by unmanned aerial vehicles (UAVs) usually during vegetation fires. To achieve this, we use artificial neural networks and create a dataset for supervised learning. We accomplish the assisted labeling of the dataset through the implementation of an object detection pipeline that combines classic image processing techniques with pretrained neural networks. In addition, we develop a data augmentation pipeline to augment the dataset with utomatically labeled images. Finally, we evaluate the performance of different neural networks.