Refine
Year of publication
Document Type
- Article (429) (remove)
Language
- English (218)
- German (209)
- Multiple languages (2)
Keywords
- (Strict) sign-regularity (1)
- 1D-CNN (1)
- 3D urban planning (1)
- AAL (2)
- Aboriginal people (1)
- Abstract interpretation (1)
- Accelerometer calibration (1)
- Accelerometer sensor (1)
- Accelerometers (1)
- Actuators (1)
Institute
- Fakultät Architektur und Gestaltung (5)
- Fakultät Bauingenieurwesen (25)
- Fakultät Elektrotechnik und Informationstechnik (1)
- Fakultät Informatik (9)
- Fakultät Maschinenbau (9)
- Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (43)
- Institut für Angewandte Forschung - IAF (30)
- Institut für Optische Systeme - IOS (9)
- Institut für Strategische Innovation und Technologiemanagement - IST (14)
- Institut für Systemdynamik - ISD (27)
Mechanical properties after stretching testings were calcu-lated and experimentally determined via Tempcore method for bar core, bar surface and whole bar cross section. It was displayed on the base of experiments and imitating simulation that deformation in core and surface areas of a bar are equal and therefore influence of structural parameters in the core area is principally decisive for initiating of neck forming in the surface area. The results showed that resistance to destruction of martensite surface layer has rather less effect on bar properties in general in comparison with previous investigations. It is concluded that improvement of core structure quality can help to lower brittleness of the whole bar. It was also proved that used techniques provide good concordance between the obtained results and experimental data. Therefore, the additivity rule for structural components can be used successfully for determination of whole bar parameters, taking into account thickness of surface layer that can be measured easily using hardness sensor. It will simplify practically quality control of products.
The massive use of patient data for the training of artificial intelligence algorithms is common nowadays in medicine. In this scientific work, a statistical analysis of one of the most used datasets for the training of artificial intelligence models for the detection of sleep disorders is performed: sleep health heart study 2. This study focuses on determining whether the gender and age of the patients have a relevant influence to consider working with differentiated datasets based on these variables for the training of artificial intelligence models.
The corrosion resistance of stainless steels is massively influenced by the condition of their surface. The surface quality includes the topography of the surface, the structure and composition of the passive layer, and the surface near structure of the base material. These factors are influenced by final physical/chemical surface treatments. The presented work shows significantly lower corrosion resistance for mechanical machined specimens than for etched specimens. It also turns out that the rougher the surface, the lower the corrosion resistance gets. However, there is no general finding which shows if blasted or grinded surfaces are more appropriate, but a dependency on process parameters and the characteristics on corrosive exposure in terms of corrosion behavior. The results show that not only the surface roughness Ra has an influence on corrosion behavior but also the shape of peaks and valleys which are evolved by surface treatments. Imperfections in the base material, like sulfidic inclusions lead to a weaker passive layer, respectively, to a decrease of the corrosion resistance. By using special passivating techniques the corrosion resistance of stainless steels can be increased to a higher level in comparison to common passivation.
Dieser Beitrag untersucht, ob externe Interventionen, in Form von Forschung und/oder Wissenschaftskommunikation, als Mediator für Innovationen in Krisenzeiten in der Tourismusbranche fungieren können. Dabei wird anhand dreier Case Studies diskutiert, inwiefern die Corona-Krise ein Window-
of-opportunity für innovative Geschäftsmodelle im Tourismus darstellen konnte. Die Projektergebnisse geben Hinweise darauf, dass Krisen im Allgemeinen und Wissenschaftskommunikation im Speziellen als Push-Faktoren Innovationen befördern können. Zwar kam es bei den Projektpartnern zu einer Entwicklung von Innovationen im Projektzeitraum, jedoch wurde die Implementierung vermehrt in eine unbestimmte Zukunft verschoben. Durch die damit verbundene Rückkehr zum Status-Quo blieben die angestoßenen Innovationen zu einem Großteil auf einer konzeptionellen Ebene. Dies deutet auf eine Attitude-behavior-gap in Bezug auf die Schaffung und Umsetzung von Innovationen in Krisenzeiten.
Insecurity Refactoring is a change to the internal structure of software to inject a vulnerability without changing the observable behavior in a normal use case scenario. An implementation of Insecurity Refactoring is formally explained to inject vulnerabilities in source code projects by using static code analysis. It creates learning examples with source code patterns from known vulnerabilities.
Insecurity Refactoring is achieved by creating an Adversary Controlled Input Dataflow tree based on a Code Property Graph. The tree is used to find possible injection paths. Transformation of the possible injection paths allows to inject vulnerabilities. Insertion of data flow patterns introduces different code patterns from related Common Vulnerabilities and Exposures (CVE) reports. The approach is evaluated on 307 open source projects. Additionally, insecurity-refactored projects are deployed in virtual machines to be used as learning examples. Different static code analysis tools, dynamic tools and manual inspections are used with modified projects to confirm the presence of vulnerabilities.
The results show that in 8.1% of the open source projects it is possible to inject vulnerabilities. Different inspected code patterns from CVE reports can be inserted using corresponding data flow patterns. Furthermore the results reveal that the injected vulnerabilities are useful for a small sample size of attendees (n=16). Insecurity Refactoring is useful to automatically generate learning examples to improve software security training. It uses real projects as base whereas the injected vulnerabilities stem from real CVE reports. This makes the injected vulnerabilities unique and realistic.
At present, the majority of the proposed Deep Learning (DL) methods provide point predictions without quantifying the model's uncertainty. However, a quantification of the reliability of automated image analysis is essential, in particular in medicine when physicians rely on the results for making critical treatment decisions. In this work, we provide an entire framework to diagnose ischemic stroke patients incorporating Bayesian uncertainty into the analysis procedure. We present a Bayesian Convolutional Neural Network (CNN) yielding a probability for a stroke lesion on 2D Magnetic Resonance (MR) images with corresponding uncertainty information about the reliability of the prediction. For patient-level diagnoses, different aggregation methods are proposed and evaluated, which combine the individual image-level predictions. Those methods take advantage of the uncertainty in the image predictions and report model uncertainty at the patient-level. In a cohort of 511 patients, our Bayesian CNN achieved an accuracy of 95.33% at the image-level representing a significant improvement of 2% over a non-Bayesian counterpart. The best patient aggregation method yielded 95.89% of accuracy. Integrating uncertainty information about image predictions in aggregation models resulted in higher uncertainty measures to false patient classifications, which enabled to filter critical patient diagnoses that are supposed to be closer examined by a medical doctor. We therefore recommend using Bayesian approaches not only for improved image-level prediction and uncertainty estimation but also for the detection of uncertain aggregations at the patient-level.
Wie gehen mittelständische Unternehmen mit internationaler Geschäftstätigkeit mit Compliance-Risiken um? Wie gelingt das Risikomanagement spezifischer Herausforderungen der Regelkonformität in Wachstumsländern, die aus Compliance-Gesichtspunkten als Hochrisikoländer eingestuft werden? Und was beschäftigt dabei Compliance-Officer im Mittelstand? Diesen Fragen widmete sich ein anwendungsorientiertes Forschungsprojekt am Konstanz Institut für Corporate Governance.
Der Begriff "Integrität" nimmt das Verhältnis zwischen individuellem Handeln und der Einhaltung von Regeln und Werten in den Blick. Grüninger/Wanzek betonen, dass integres Handeln nicht blinde Regelbefolgung, sondern die Erfüllung der zugrundeliegenden Werte erfordert. Von Integrität wird gesprochen, wenn die ethischen Werte im individuellen Denken und Tun sowie auf persönlicher und organisationaler Ebene übereinstimmen.
Integritätsmanagement
(2016)