Refine
Year of publication
- 2020 (139) (remove)
Document Type
- Conference Proceeding (47)
- Article (36)
- Report (14)
- Part of a Book (12)
- Book (6)
- Other Publications (6)
- Doctoral Thesis (4)
- Master's Thesis (4)
- Journal (Complete Issue of a Journal) (4)
- Bachelor Thesis (3)
Keywords
- 3D ship detection (1)
- Accelerometers (1)
- Accessible Tourism (1)
- Actions (1)
- Adaptive (1)
- Adivasi (1)
- Agiles Lehren (1)
- Agiles Management (1)
- Apnoe (1)
- Architektur (1)
- Assisted living (1)
- BCG (1)
- Ballistokardiographie (1)
- Bayesian convolutional neural networks (1)
- Bemusterung (1)
- Benchmark (1)
- Beobachterentwurf (1)
- Bernstein coefficient (1)
- Bernstein function (1)
- Bernstein polynomial (1)
- Bildungssprache (1)
- Binary codes (1)
- Biokybernetik (1)
- Biosignal analysis (1)
- Biosignal processing (1)
- Biovital signal (2)
- Birth Density (1)
- Blended values (1)
- Block codes (1)
- Breathing (1)
- Breathing rate (1)
- Brückenbau (1)
- COVID-19 financial crisis (1)
- Capability analysis (1)
- Carbon offset project (1)
- Cauchon algorithm (1)
- Central bank (1)
- Checkerboard partial order (1)
- Chemical quality criteria (1)
- Codes over Gaussian integers (1)
- Collaboration (1)
- Common Criteria (1)
- Complex Adaptive System (1)
- Compliance (7)
- Compliance Governance (1)
- Compliance im Mittelstand (1)
- Compliance-Anforderungen (1)
- Compliance-Management (6)
- Computational complexity (1)
- Conceptual framework (1)
- Conditionally negative semidefinite matrix (1)
- Convolution (1)
- Convolutional networks (1)
- Convolutional neural network (1)
- Cooperation (1)
- Corporate Development (1)
- Corporate Governance (1)
- Corporate accelerator (1)
- Corporate entrepreneurship (2)
- Corporate incubator (1)
- Corporate venturing (1)
- Correlation (1)
- Creative industries (1)
- Creative tourism (1)
- Cultural tourism (1)
- Damage Detection (1)
- Data Fusion (1)
- Data fusion (1)
- Deep Convolutional Neural Network (1)
- Deep Transformation Model (1)
- Deep learning (2)
- Deflation (1)
- Descending rank conditions (1)
- Design (1)
- Design-based research (1)
- Dieselskandal (2)
- Digital Change Management (1)
- Digital arithmetic (1)
- Digitalisierung (2)
- Digitalization (1)
- Digitally re-programmable space (1)
- Discontinuous innovation (1)
- Driving (1)
- Driving safety (1)
- Driving stress (1)
- ECG (3)
- Ecotourism (1)
- Effects of sanctions on trade (1)
- Electrocardiography (2)
- Electromyography (1)
- Elliptic curve cryptography (2)
- Elliptic curve point multiplication (1)
- Encoding (1)
- Energy transition (1)
- Entrepreneurship (2)
- Erdbeben (1)
- Ethnologie (1)
- Experteninterview (1)
- Fachsprachenunterricht (1)
- Familie (1)
- Feldforschung (1)
- Forest establishment (1)
- Framework for indigenous tourism (1)
- Freistellungssemesterbericht (14)
- Fruit drying (1)
- Fuel subsidy (1)
- GDPR (1)
- Gaussian integers (1)
- Gaussian processes (1)
- Generalized multi-stream spatial modulation (1)
- Geschichte (1)
- Glaubwürdigkeit (1)
- Good Corporate Governance (1)
- Hadamard inverse (1)
- Hadamard power (1)
- Hardware-in-the-loop (1)
- Heart rate (4)
- Heart rate variability (1)
- Herzfrequenz (1)
- Homeoffice (1)
- Hybrid organizations (1)
- IT-Compliance (1)
- IT-Integration (1)
- Index modulation (IM) (1)
- Indigenous tourism (1)
- Industrie 4.0 (1)
- Industry 4.0 (1)
- Industry 4.0 implementation (1)
- Infinitely divisible matrix (1)
- Inflation (1)
- Infrastructure (1)
- Innovation (1)
- Innovation management (1)
- Integrity (1)
- Integrity-Management (3)
- Integrität (3)
- Integritätsmanagement (2)
- Internet of Things (1)
- Interview (2)
- Inverse perspective (1)
- Ischemic stroke (1)
- KMU (1)
- Kerala (1)
- Knowledge Management (1)
- Knowledge exploration (1)
- Kommunikation im Raum (1)
- Kontaktloses Hardware-System (1)
- Korruptionsbekämpfung (1)
- Kraftfahrzeug (1)
- Kulturanthropologie (1)
- Laboratory experiments with Simulink and real hardware (1)
- Laborexperimente mit Simulink und echter Hardware (1)
- Lake Constance (1)
- Laser scanning (1)
- Lean Management (2)
- Lebenslanges Lernen (1)
- Lehrbuch (1)
- Lernen (1)
- Literature Review (1)
- Literaturrecherche (1)
- Low-complexity detection (1)
- Low-pass filters (1)
- MNE (1)
- Machine Learning (2)
- Machine learning (1)
- Machine-Learning (1)
- Magnetaktoren (1)
- Magnetic resonance imaging (1)
- Maschinelles Lernen (1)
- Mask R-CNN (1)
- Matrix interval (1)
- Maturity model (1)
- Maximum likelihood decoding (1)
- Media discourse analysis (1)
- Mediale Ausstellungsgestaltung (1)
- Mehrworteinheiten (1)
- Methodik des Fremdsprachenunterrichts (1)
- Mittelständische Unternehmen (1)
- Monitoring (1)
- Montgomery modular multiplication (1)
- Montgomery modular reduction (1)
- Multi Bernoulli Filter (1)
- Multi-spectral imaging systems (1)
- Multibeam echosounder (1)
- Multiple-input/multiple-output (MIMO) (1)
- Multistage detection (1)
- Multivariate polynomial (1)
- Myanmar (1)
- Nachhaltige Stadtentwicklung (1)
- Nachhaltigkeit (1)
- Network (1)
- Non-tariff barriers (1)
- Normalizing Flow (1)
- Object detection (1)
- One Mannheim error correcting codes (OMEC) (1)
- Organizational ambidexterity (1)
- PPG (1)
- PSG (1)
- PSQI (1)
- Pfadabhängigkeiten (1)
- Photoplethysmography (1)
- Platform (1)
- Point multiplication (1)
- Pressure sensors (2)
- Price level changes (1)
- Privacy by Design (1)
- Processor (1)
- Product Lifecycle Management (1)
- Product lifecycle management (1)
- Projektaufgaben (1)
- Projektkonzeption (1)
- Public key cryptography (2)
- Quality prediction (1)
- Quartiersentwicklung (1)
- Rauch-Tung-Striebel Recursion (1)
- Regression (1)
- Requirements Engineering (1)
- Residual Neural Network (1)
- Resource-constrained systems (1)
- Rezension (1)
- SME (1)
- Sampling (1)
- Sanction databases (1)
- Sanctions (1)
- Schlafstadien (1)
- Schlafstudie (1)
- Security by Design (1)
- Selbstevaluation (1)
- Sensorlose Folgeregelung (1)
- Sensors (1)
- Service Design (1)
- Servicegeschäftsmodelle (1)
- Ship dataset (1)
- Sign-regular matrix (1)
- Signal processing (1)
- Simulink (1)
- Skin (1)
- Sleep apnea (1)
- Sleep efficiency (1)
- Sleep medicine (1)
- Sleep quality (1)
- Sleep stages (1)
- Sleep study (2)
- Smart Building (1)
- Smart City (1)
- Smart Services (1)
- Smart home (1)
- Social impact (1)
- Solinas primes (1)
- South India (1)
- Spatial modulation (SM) (1)
- Spatial permutation modulation (SPM) (1)
- Spectral changes (1)
- Stress (1)
- Stress detection (2)
- Stress measurement (1)
- Strictly sign-regular matrix (1)
- Synergies (1)
- Szenografie (1)
- Tariffs (1)
- Technik-Compliance (1)
- Teleworking (1)
- Testverfahren (1)
- Text Mining (1)
- Totally nonnegative matrix (1)
- Trade policy (1)
- Tree seedlings (1)
- TwinCAT (1)
- Uncertainty (1)
- Unmanned aerial vehicles (1)
- Unternehmensethik (1)
- Unternehmensverantwortung (1)
- Venture creation (1)
- VerSanG (1)
- Verbandssanktionengesetz (1)
- Verbrennungsmotor (1)
- Vermittlung des wissenschaftlichen Schreibens (1)
- Voluntary carbon offset (1)
- Wertebasiertes Unternehmenshandeln (1)
- Wertemanagement (2)
- Werteorientierung (1)
- Wertstromanalyse (1)
- Wirksamkeit (1)
- Wirtschaftsethik (1)
- Wirtschaftskriminalität (1)
- Wissenschaftssprache (1)
- Wissensmanagement (1)
- Worms (1)
- Zeitreihenklassifikation (1)
Institute
- Fakultät Architektur und Gestaltung (4)
- Fakultät Bauingenieurwesen (9)
- Fakultät Elektrotechnik und Informationstechnik (1)
- Fakultät Informatik (20)
- Fakultät Maschinenbau (5)
- Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (13)
- Institut für Angewandte Forschung - IAF (4)
- Institut für Naturwissenschaften und Mathematik - INM (2)
- Institut für Optische Systeme - IOS (8)
- Institut für Strategische Innovation und Technologiemanagement - IST (10)
We propose and apply a requirements engineering approach that focuses on security and privacy properties and takes into account various stakeholder interests. The proposed methodology facilitates the integration of security and privacy by design into the requirements engineering process. Thus, specific, detailed security and privacy requirements can be implemented from the very beginning of a software project. The method is applied to an exemplary application scenario in the logistics industry. The approach includes the application of threat and risk rating methodologies, a technique to derive technical requirements from legal texts, as well as a matching process to avoid duplication and accumulate all essential requirements.
Pop-up Workshopreihe
(2020)
Traditional Western philosophy, cognitive science and traditional HCI frameworks approach the term digital and its implications with an implicit dualism (nature/cul-ture, theory /practice, body/mind, human/machine). What lies between is a feature of our postmodern times, in which different states, conditions or positions merge and co-exist in a new, hybrid reality, a “continuous beta” (Mühlenbeck & Skibicki, 2007) version of becoming .Post-digitality involves the physical dimensions of spatio-temporal engagements. This new ontological paradigm reconceptualizes digital technology through the ex-perience of the human body and its senses, thus emphasizing form-taking, situation-al engagement and practice rather than symbolic, disembodied rationality. This rais-es two questions in particular: how to encourage curiosity, playfulness, serendipity, emergence, discourse and collectivity? How to construct working methods without foregrounding and dividing the subject into an individual that already takes posi-tion? This paper briefly outlines the rhizomatic framework that I developed within my PhD research. This attempts to overcome two prevailing tendencies: first, the one-sided view of scientific approaches to knowledge acquisition and the pure-ly application-oriented handling of materials, technologies and machines; second, the distanced perception of the world. In contrast, my work involves project-driven alchemic curiosity and doing research through artistic design practice. This means thinking through materials, technologies and machinic interactions. Now, at the end of this PhD journey, 10 interdisciplinary projects have emerged from this ontological queer-paradigm that is post-digital–crafting 4.0. Below I illustrate this approach and its outcomes.
The actual task of electrocardiographic examinations is to increase the reliability of diagnosing the condition of the heart. Within the framework of this task, an important direction is the solution of the inverse problem of electrocardiography, based on the processing of electrocardiographic signals of multichannel cardio leads at known electrode coordinates in these leads (Titomir et al. Noninvasiv electrocardiotopography, 2003), (Macfarlane et al. Comprehensive Electrocardiology, 2nd ed. (Chapter 9), 2011).
Gesellschaftsrecht
(2020)
Die vorliegende Veröffentlichung gibt einen kompakten Überblick über wesentliche Regelungen des Personen- und Kapitalgesellschaftsrechts. Nach den gesellschaftsrechtlichen Grundprinzipien werden zunächst die Personengesellschaften (GbR, OHG, KG, Stille Gesellschaft und Partnerschaft) und hieran anschließend die Kapitalgesellschaften (GmbH und AG) behandelt. Abschließend geht es um die diesbezüglichen Einflüsse des europäischen Rechts. Sie wendet sich in Lehrbuchform vornehmlich an Studierende von Universitäten, Hochschulen, Berufsakademien und anderen Bildungseinrichtungen.
Im vorliegenden Beitrag wird der Einfluss der Modellierung des Kellergeschosses auf die Querkraft und die Verformungen von im Kellergeschoss eingespannten Stahlbeton‐Aussteifungswänden untersucht. Der Querkraftverlauf der Wand und die Verschiebung am Kopf der Wand werden mit den entsprechenden, am vereinfachten Kragwandmodell ermittelten Werten verglichen, bei dem die Wand auf Höhe der Kellerdecke voll eingespannt ist und die Weiterleitung der Schnittkräfte im Kellergeschoss nicht näher betrachtet wird. Für die Berücksichtigung des Kellergeschosses wird zunächst eine gelenkige Festhaltung durch die Kellerdecke und die Bodenplatte betrachtet, wodurch sich eine unrealistisch große Wandquerkraft im Kellergeschoss ergibt. Danach wird ein verfeinertes Modell mit Teileinspannung in der Bodenplatte und nachgiebiger Halterung durch die Kellerdecke untersucht. Es werden Empfehlungswerte für die Federkonstante der Drehfeder auf Höhe der Bodenplatte und der horizontalen Translationsfeder auf Höhe der Kellerdecke angegeben, die in der Praxis Anwendung finden können. Es wird besonders der Frage nachgegangen, welche Einflüsse die Berücksichtigung des Kellergeschosses bei der Erdbebenbemessung der Aussteifungswände hat. Dabei wird einerseits die Systemsteifigkeit, von der die Erdbebenersatzlasten abhängen, und andererseits die mögliche Verschiebungsduktilität, von der der mögliche Verhaltensbeiwert q abhängt, betrachtet.
This article introduces the Global Sanctions Data Base (GSDB), a new dataset of economic sanctions that covers all bilateral, multilateral, and plurilateral sanctions in the world during the 1950–2016 period across three dimensions: type, political objective, and extent of success. The GSDB features by far the most cases amongst data bases that focus on effective sanctions (i.e., excluding threats) and is particularly useful for analysis of bilateral international transactional data (such as trade flows). We highlight five important stylized facts: (i) sanctions are increasingly used over time; (ii) European countries are the most frequent users and African countries the most frequent targets; (iii) sanctions are becoming more diverse, with the share of trade sanctions falling and that of financial or travel sanctions rising; (iv) the main objectives of sanctions are increasingly related to democracy or human rights; (v) the success rate of sanctions has gone up until 1995 and fallen since then. Using state-of-the-art gravity modeling, we highlight the usefulness of the GSDB in the realm of international trade. Trade sanctions have a negative but heterogeneous effect on trade, which is most pronounced for complete bilateral sanctions, followed by complete export sanctions.
Due to its economic size, economic policy measures, in particular trade policies, have a far‐reaching impact on global economic developments. This chapter quantifies the economic consequences of US protectionist trade aspirations. It focuses on trade policy scenarios, which have been communicated by the current US administration as potential new trade policies. The chapter draws on the results of a study of the ifo Institute conducted on behalf of the Bertelsmann Foundation. In the first simulation, a retraction from the North American Free Trade Agreement is considered. The chapter then illustrates the potential consequences of a “border tax adjustment” policy. It also simulates further measures to protect the US market by presuming an increase in American duties. The chapter presents robust quantitative results that can be expected if an increasingly protectionist US trade policy were to be implemented.
A residual neural network was adapted and applied to the Physionet/Computing data in Cardiology Challenge 2020 to detect 24 different classes of cardiac abnormalities from 12-lead. Additive Gaussian noise, signal shifting, and the classification of signal sections of different lengths were applied to prevent the network from overfitting and facilitating generalization. Due to the use of a global pooling layer after the feature extractor, the network is independent of the signal’s length. On the hidden test set of the challenge, the model achieved a validation score of 0.656 and a full test score of 0.27, placing us 15th out of 41 officially ranked teams (Team name: UC_Lab_Kn). These results show the potential of deep neural networks for ap- plication to raw data and a complex multi-class multi-label classification problem, even if the training data is from di- verse datasets and of differing lengths.
In my research sabbatical I was working on three different topics, namely orthogonal polynomials in geometric modeling, re-parametrized univariate subdivision curves, and reconstruction of 3d-fish-models and other zoological artifacts. In the subsequent Sections, I will describe my particular activity in these different fields. The sections are meant to present an overview of my research activities, leaving out the technical details.
Section 1 is on orthogonal polynomials and other related generating systems for functions systems of smooth function.
In Section 2, I will discuss the application of various re-parametrization schemes for interpolatory subdivision algorithms for the generation of space curves.
The next Section 3 is concerned with my research at the University of Queensland, Brisbane, in collaboration with Dr. Ulrike Siebeck from the School of Biomedical Sciences on fish behavior and reconstruction of 3d-fish models in particular.
In the last Section 4, I will describe what effects this research will have on in my subsequent teaching at the University of Applied Science Konstanz (HTWG).
Die Projektaufgabe bestand darin, den aktuellen Laborversuch zu modernisieren, indem die Kommunikation zwischen dem Versuchsaufbau und Laborrechner nicht wie bisher über Wandlerkarten stattfindet, sondern über EtherCAT und TwinCAT 3.
Die Installation von TwinCAT 3 mit den zugehörigen Erweiterungen und erforderlichen Programmen stellt sich als sehr umfangreich und schwierig dar, was die Installationsanleitungen zeigen. Außerdem gab es sehr viele Fehlerquellen, die nicht auf Anhieb ersichtlich waren, wie das Aktualisieren der aktuellen MATLAB Version. Ist die Installation abgeschlossen kann die Kommunikation zwischen MATLAB und TwinCAT relativ einfach umgesetzt werden.
In der Projektarbeit wurde anfangs dann die Kommunikation mit mehreren Tests überprüft und Optimierungen vorgenommen. So wurde zum Beispiel die Wegbegrenzung angepasst. Schwierigkeiten zeigten sich bei der Bedienung über MATLAB oder beim Abstürzen von MATLAB, da beim Stoppen oder Abstürzen von MATLAB, der zuletzt gesendete Wert immer noch an TwinCAT 3 anliegt und somit der Aktor weiter verfahren würde. Diese sehr gefährliche Situation wäre ein gravierender Nachteil, gegenüber der alten Kommunikation mit einer Wandlerkarte. Um einen sicheren Stopp zu garantieren, wird über ein neues TcCOM Objekt der Matlab-Status mit einem Togglebit überprüft, ändert sich der Wert des Bits nicht mehr, stoppt die Anlage sicher.
Um einen Vergleich mit dem bisherigen Masterversuch erhalten zu können, wurde die Strecke mit der neuen Kommunikation untersucht und ein passender Regler dafür auszulegt.
Die Auswertung der Impulsantwort sowie der „Spectrum-Analyse“ zeigten beim Vergleich mit den Schnittstellen gleiche Ergebnisse, somit sind die Versuche bei dem Laborversuch ohne Einschränkungen durchführbar. Die Auslegung des Reglers zeigte entgegen den Prognosen der Beckhoff-Experten sehr gute Ergebnisse und die Kommunikation über die Schnittstelle zeigte keine Probleme.
Einschränkungen zeigten sich jedoch bei der einzustellenden Abtastzeit, da eine Abtastzeit unter 2ms nicht möglich ist. Zwar kann man eine geringere Abtastzeit einstellen, jedoch zeigt sich bei der Auswertung, dass die Schnittstelle mit Abtastzeiten unter 2ms Probleme aufweist. Die Rechendauer wird deutlich größer und die größere Anzahl an Messpunkte kann nicht richtig verarbeitet werden. Ein Regler kann damit nicht implementiert werden.
Die Projektarbeit konnte somit erfolgreich angeschlossen werden und bis auf die aufwendige Installation sind die Erweiterungen von Beckhoff sehr zuverlässig und gut zu bedienen. Die ersten Voruntersuchen waren positiv, somit kann auch an weiteren Laborrechnern eine Umstellung der Schnittstelle in Betracht gezogen werden.
In this article, we give the construction of new four-dimensional signal constellations in the Euclidean space, which represent a certain combination of binary frequency-shift keying (BFSK) and M-ary amplitude-phase-shift keying (MAPSK). Description of such signals and the formulas for calculating the minimum squared Euclidean distance are presented. We have developed an analytic building method for even and odd values of M. Hence, no computer search and no heuristic methods are required. The new optimized BFSK-MAPSK (M = 5,6,···,16) signal constructions are built for the values of modulation indexes h =0.1,0.15,···,0.5 and their parameters are given. The results of computer simulations are also provided. Based on the obtained results we can conclude, that BFSK-MAPSK systems outperform similar four-dimensional systems both in terms of minimum squared Euclidean distance and simulated symbol error rate.
Production and marketing of cereal grains are some of the main activities in developing countries to ensure food security. However, the food gap is complicated further by high postharvest loss of grains during storage. This study aimed to compare low‐cost modified‐atmosphere hermetic storage structures with traditional practice to minimize quantitative and qualitative losses of grains during storage. The study was conducted in two phases: in the first phase, seven hermetic storage structures with or without smoke infusion were compared, and one selected structure was further validated at scaled‐up capacity in the second phase.
The expansion of a given multivariate polynomial into Bernstein polynomials is considered. Matrix methods for the calculation of the Bernstein expansion of the product of two polynomials and of the Bernstein expansion of a polynomial from the expansion of one of its partial derivatives are provided which allow also a symbolic computation.
A conceptual framework for indigenous ecotourism projects – a case study in Wayanad, Kerala, India
(2020)
This paper analyses indigenous ecotourism in the Indian district of Wayanad, Kerala, using a conceptual framework based on a PATA 2015 study on indigenous tourism that includes the criteria: human rights, participation, business and ecology. Detailed indicator sets for each criterion are applied to a case study of the Priyadarshini Tea Environs with a qualitative research approach addressing stakeholders from the public sector, non-governmental organisations, academia, tour operators and communities including Adivasi and non-Adivasi. In-depth interviews were supported by participant and non-participant observations. The authors adapted this framework to the needs of the case study and consider that this modified version is a useful tool for academics and practitioners wishing to evaluate and develop indigenous ecotourism projects. The results show that the Adivasi involved in the Priyadarshini Tea Environs project benefit from indigenous ecotourism. But they could profit more if they had more involvement in and control of the whole tourism value chain.
Side Channel Attack Resistance of the Elliptic Curve Point Multiplication using Eisenstein Integers
(2020)
Asymmetric cryptography empowers secure key exchange and digital signatures for message authentication. Nevertheless, consumer electronics and embedded systems often rely on symmetric cryptosystems because asymmetric cryptosystems are computationally intensive. Besides, implementations of cryptosystems are prone to side-channel attacks (SCA). Consequently, the secure and efficient implementation of asymmetric cryptography on resource-constrained systems is demanding. In this work, elliptic curve cryptography is considered. A new concept for an SCA resistant calculation of the elliptic curve point multiplication over Eisenstein integers is presented and an efficient arithmetic over Eisenstein integers is proposed. Representing the key by Eisenstein integer expansions is beneficial to reduce the computational complexity and the memory requirements of an SCA protected implementation.