Refine
Year of publication
Document Type
- Article (426) (remove)
Language
- English (217)
- German (207)
- Multiple languages (2)
Keywords
- (Strict) sign-regularity (1)
- 1D-CNN (1)
- 3D urban planning (1)
- AAL (2)
- Aboriginal people (1)
- Abstract interpretation (1)
- Accelerometer calibration (1)
- Accelerometer sensor (1)
- Accelerometers (1)
- Actuators (1)
Institute
- Fakultät Architektur und Gestaltung (5)
- Fakultät Bauingenieurwesen (24)
- Fakultät Elektrotechnik und Informationstechnik (1)
- Fakultät Informatik (9)
- Fakultät Maschinenbau (9)
- Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (43)
- Institut für Angewandte Forschung - IAF (30)
- Institut für Optische Systeme - IOS (8)
- Institut für Strategische Innovation und Technologiemanagement - IST (14)
- Institut für Systemdynamik - ISD (27)
Dieser Beitrag untersucht, ob externe Interventionen, in Form von Forschung und/oder Wissenschaftskommunikation, als Mediator für Innovationen in Krisenzeiten in der Tourismusbranche fungieren können. Dabei wird anhand dreier Case Studies diskutiert, inwiefern die Corona-Krise ein Window-
of-opportunity für innovative Geschäftsmodelle im Tourismus darstellen konnte. Die Projektergebnisse geben Hinweise darauf, dass Krisen im Allgemeinen und Wissenschaftskommunikation im Speziellen als Push-Faktoren Innovationen befördern können. Zwar kam es bei den Projektpartnern zu einer Entwicklung von Innovationen im Projektzeitraum, jedoch wurde die Implementierung vermehrt in eine unbestimmte Zukunft verschoben. Durch die damit verbundene Rückkehr zum Status-Quo blieben die angestoßenen Innovationen zu einem Großteil auf einer konzeptionellen Ebene. Dies deutet auf eine Attitude-behavior-gap in Bezug auf die Schaffung und Umsetzung von Innovationen in Krisenzeiten.
Insecurity Refactoring is a change to the internal structure of software to inject a vulnerability without changing the observable behavior in a normal use case scenario. An implementation of Insecurity Refactoring is formally explained to inject vulnerabilities in source code projects by using static code analysis. It creates learning examples with source code patterns from known vulnerabilities.
Insecurity Refactoring is achieved by creating an Adversary Controlled Input Dataflow tree based on a Code Property Graph. The tree is used to find possible injection paths. Transformation of the possible injection paths allows to inject vulnerabilities. Insertion of data flow patterns introduces different code patterns from related Common Vulnerabilities and Exposures (CVE) reports. The approach is evaluated on 307 open source projects. Additionally, insecurity-refactored projects are deployed in virtual machines to be used as learning examples. Different static code analysis tools, dynamic tools and manual inspections are used with modified projects to confirm the presence of vulnerabilities.
The results show that in 8.1% of the open source projects it is possible to inject vulnerabilities. Different inspected code patterns from CVE reports can be inserted using corresponding data flow patterns. Furthermore the results reveal that the injected vulnerabilities are useful for a small sample size of attendees (n=16). Insecurity Refactoring is useful to automatically generate learning examples to improve software security training. It uses real projects as base whereas the injected vulnerabilities stem from real CVE reports. This makes the injected vulnerabilities unique and realistic.
At present, the majority of the proposed Deep Learning (DL) methods provide point predictions without quantifying the model's uncertainty. However, a quantification of the reliability of automated image analysis is essential, in particular in medicine when physicians rely on the results for making critical treatment decisions. In this work, we provide an entire framework to diagnose ischemic stroke patients incorporating Bayesian uncertainty into the analysis procedure. We present a Bayesian Convolutional Neural Network (CNN) yielding a probability for a stroke lesion on 2D Magnetic Resonance (MR) images with corresponding uncertainty information about the reliability of the prediction. For patient-level diagnoses, different aggregation methods are proposed and evaluated, which combine the individual image-level predictions. Those methods take advantage of the uncertainty in the image predictions and report model uncertainty at the patient-level. In a cohort of 511 patients, our Bayesian CNN achieved an accuracy of 95.33% at the image-level representing a significant improvement of 2% over a non-Bayesian counterpart. The best patient aggregation method yielded 95.89% of accuracy. Integrating uncertainty information about image predictions in aggregation models resulted in higher uncertainty measures to false patient classifications, which enabled to filter critical patient diagnoses that are supposed to be closer examined by a medical doctor. We therefore recommend using Bayesian approaches not only for improved image-level prediction and uncertainty estimation but also for the detection of uncertain aggregations at the patient-level.
Wie gehen mittelständische Unternehmen mit internationaler Geschäftstätigkeit mit Compliance-Risiken um? Wie gelingt das Risikomanagement spezifischer Herausforderungen der Regelkonformität in Wachstumsländern, die aus Compliance-Gesichtspunkten als Hochrisikoländer eingestuft werden? Und was beschäftigt dabei Compliance-Officer im Mittelstand? Diesen Fragen widmete sich ein anwendungsorientiertes Forschungsprojekt am Konstanz Institut für Corporate Governance.
Der Begriff "Integrität" nimmt das Verhältnis zwischen individuellem Handeln und der Einhaltung von Regeln und Werten in den Blick. Grüninger/Wanzek betonen, dass integres Handeln nicht blinde Regelbefolgung, sondern die Erfüllung der zugrundeliegenden Werte erfordert. Von Integrität wird gesprochen, wenn die ethischen Werte im individuellen Denken und Tun sowie auf persönlicher und organisationaler Ebene übereinstimmen.
Integritätsmanagement
(2016)
Thermal shape memory alloys show extraordinary material properties and can be used as actuators, dampers and sensors. Since their discovery in the middle of the last century they have been investigated and further developed. The majority of the industrial applications with the highest material sales can still be found in the medical industry, where they are used due to their superelastic and thermal shape memory effect, e.g. as stents or as guidewires and tools in the minimal invasive surgery. Particularly in recent years, more and more applications have been developed for other industrial fields, e.g. for the household goods, civil engineering and automotive sector. In this context it is worth mentioning that for the latter sector, million seller series applications have found their way into some European automobile manufacturers. The German VDI guideline for shape memory alloys introduced in 2017 will give the material a further boost in application. Last but not least the new production technologies of additive manufacturing with metal laser sintering plants open up additional applications for these multifunctional materials. This paper gives an overview of the extraordinary material properties of shape memory components, shows examples of different applications and discusses European trends against the background of the most recent standard and new production technologies.
Intelligente Aktorik
(2017)
We consider classes of n-by-n sign regular matrices, i.e., of matrices with the property that all their minors of fixed order k have one specified sign or are allowed also to vanish, k = 1, ... ,n. If the sign is nonpositive for all k, such a matrix is called totally nonpositive. The application of the Cauchon algorithm to nonsingular totally nonpositive matrices is investigated and a new determinantal test for these matrices is derived. Also matrix intervals with respect to the checkerboard partial ordering are considered. This order is obtained from the usual entry-wise ordering on the set of the n-by-n matrices by reversing the inequality sign for each entry in a checkerboard fashion. For some classes of sign regular matrices it is shown that if the two bound matrices of such a matrix interval are both in the same class then all matrices lying between these two bound matrices are in the same class, too.