Refine
Year of publication
- 2023 (117) (remove)
Document Type
- Article (45)
- Conference Proceeding (43)
- Part of a Book (11)
- Doctoral Thesis (6)
- Book (5)
- Working Paper (3)
- Other Publications (1)
- Journal (1)
- Preprint (1)
- Report (1)
Language
- English (78)
- German (38)
- Multiple languages (1)
Has Fulltext
- no (117) (remove)
Keywords
Institute
- Fakultät Architektur und Gestaltung (2)
- Fakultät Bauingenieurwesen (8)
- Fakultät Informatik (1)
- Fakultät Maschinenbau (2)
- Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (14)
- Institut für Angewandte Forschung - IAF (22)
- Institut für Naturwissenschaften und Mathematik - INM (1)
- Institut für Optische Systeme - IOS (3)
- Institut für Strategische Innovation und Technologiemanagement - IST (12)
- Institut für Systemdynamik - ISD (9)
Wie kann Korpuslinguistik für den Fremdsprachenunterricht genutzt werden? Wie kann Data-driven Learning initiiert werden? Wer sich mit diesen Fragen beschäftigt und sich über den Einsatz im DaF-Unterricht informieren möchte, wird kaum fündig, denn die publizierten Materialien wurden in der Regel für den Englischunterricht verfasst. In dieser Sammelrezension werden daher vier Monografien vorgestellt, in denen der Einsatz der Korpuslinguistik zur Sprachvermittlung Englisch beschrieben wird. Es sollen die Schwerpunkte und Besonderheiten der Monografien herausgearbeitet und der mögliche Nutzen für Deutsch als Fremdsprache eruiert werden.
Multi-faceted stresses of social, environmental, and economic nature are increasingly challenging the existence and sustainability of our societies. Cities in particular are disproportionately threatened by global issues such as climate change, urbanization, population growth, air pollution, etc. In addition, urban space is often too limited to effectively develop sustainable, nature-based solutions while accommodating growing populations. This research aims to provide new methodologies by proposing lightweight green bridges in inner-city areas as an effective land value capture mechanism. Geometry analysis was performed using geospatial and remote sensing data to provide geometrically feasible locations of green bridges. A multi-criteria decision analysis was applied to identify suitable locations for green bridges investigating Central European urban centers with a focus on German cities as representative examples. A cost-benefit analysis was performed to assess the economic feasibility using a case study. The results of the geometry analysis identified 3249 locations that were geometrically feasible to implement a green bridge in German cities. The sample locations from the geometry analysis were proved to be validated for their implementation potential. Multi-criteria decision analysis was used to select 287 sites that fall under the highest suitable class based on several criteria. The cost-benefit analysis of the case study showed that the market value of the property alone can easily outweigh the capital and maintenance costs of a green bridge, while the indirect (monetary) benefits of the green space continue to increase the overall value of the green bridge property including its neighborhood over time. Hence, we strongly recommend light green bridges as financially sustainable and nature-based solutions in cities worldwide.
Linear and nonlinear response functions (RF) are extracted for the climate system and the carbon cycle represented by the MPI-ESM and cGENIE models, respectively. Appropriately designed simulations are run for this purpose. Joining these RFs, we have a climate emulator with carbon emissions as the forcing and any desired observable quantity (provided the data is saved), such as the surface air temperature or precipitation, as the predictand. Like e.g. for atmospheric CO2 concentration, we also have RFs for the solar constant as a forcing — mimicking solar radiation management (SRM) geoengineering. We consider two application cases. 1. One is based on the Paris 2015 agreement, determining the necessary least amount of SRM geoengineering needed to keep the global mean surface air temperature below a certain threshold, e.g. 1.5 or 2 [oC], given a certain amount of carbon emission abatement (ABA) and carbon dioxide removal (CDR) geoengineering. 2. The other application considers the conservation of the Greenland ice sheet (GrIS). Using a zero-dimensional simplification of a complex ice sheet model, we determine (a) if we need SRM given some ABA and CDR, and, if possible, (b) the required least amount of SRM to avoid the collapse of the GrIS. Keeping temperatures below 2 [oC] even is hardly possible without sustained SRM (1.); however, the collapse of the GrIS can be avoided applying SRM even for moderate levels of CDR and ABA, an overshoot being affordable (2.).
Insecurity Refactoring is a change to the internal structure of software to inject a vulnerability without changing the observable behavior in a normal use case scenario. An implementation of Insecurity Refactoring is formally explained to inject vulnerabilities in source code projects by using static code analysis. It creates learning examples with source code patterns from known vulnerabilities.
Insecurity Refactoring is achieved by creating an Adversary Controlled Input Dataflow tree based on a Code Property Graph. The tree is used to find possible injection paths. Transformation of the possible injection paths allows to inject vulnerabilities. Insertion of data flow patterns introduces different code patterns from related Common Vulnerabilities and Exposures (CVE) reports. The approach is evaluated on 307 open source projects. Additionally, insecurity-refactored projects are deployed in virtual machines to be used as learning examples. Different static code analysis tools, dynamic tools and manual inspections are used with modified projects to confirm the presence of vulnerabilities.
The results show that in 8.1% of the open source projects it is possible to inject vulnerabilities. Different inspected code patterns from CVE reports can be inserted using corresponding data flow patterns. Furthermore the results reveal that the injected vulnerabilities are useful for a small sample size of attendees (n=16). Insecurity Refactoring is useful to automatically generate learning examples to improve software security training. It uses real projects as base whereas the injected vulnerabilities stem from real CVE reports. This makes the injected vulnerabilities unique and realistic.
Purpose
In order to combat climate change and safeguard a liveable future we need fundamental and rapid social change. Climate communication can play an important role to nurture the public engagement needed for this change, and higher education for sustainability can learn from climate communication.
Approach
The scientific evidence base on climate communication for effective public engagement is summarised into ten key principles, including ‘basing communication on people’s values’, ‘conscious use of framing’, and ‘turning concern into action’. Based on the author’s perspective and experience in the university context, implications are explored for sustainability in higher education.
Findings
The article provides suggestions for teaching (e.g. complement information with consistent behaviour by the lecturer, integrate local stories, and provide students with basic skills to communicate climate effectively), for research (e.g. make teaching for effective engagement the subject of applied research), for universities’ third mission to contribute to sustainable development
in the society (e.g. provide climate communication trainings to empower local stakeholders), andgreening the campus (develop a proper engagement infrastructure, e.g. by a university storytelling exchange on climate action).
Originality
The article provides an up-to-date overview of climate communication research, which is in itself original. This evidence base holds interesting learnings for institutions of higher education, and the link between climate communication and universities has so far not been explored comprehensively.
In this work, a storage study was conducted to find suitable packaging material for tomato powder storage. Experiments were laid out in a single factor completely randomized design (CRD) to study the effect of packaging materials on lycopene, vitamin C moisture content, and water activity of tomato powder; The factor (packaging materials) has three levels (low‐density polyethylene bag, polypropylene bottle, wrapped with aluminum foils, and packed in low‐density polyethylene bag) and is replicated three times. During the study, a twin layer solar tunnel dried tomato slices of var. Galilea was used. The dried tomato slices were then ground and packed (40 g each) in the packaging materials and stored at room temperature. Samples were drawn from the packages at 2‐month interval for quality analysis and SAS (version 9.2) software was used for statistical analysis. From the result, higher retention of lycopene (80.13%) and vitamin C (49.32%) and a nonsignificant increase in moisture content and water activity were observed for tomato powder packed in polypropylene bottles after 6 months of storage. For low‐density polyethylene packed samples and samples wrapped with aluminum foil and packed in a low‐density polyethylene bag, 57.06% and 60.45% lycopene retention and 42.9% and 49.23% Vitamin C retention were observed, respectively, after 6 months of storage. Considering the results found, it can be concluded that lycopene and vitamin C content of twin layer solar tunnel dried tomato powder can be preserved at ambient temperature storage by packing in a polypropylene bottle with a safe range of moisture content and water activity levels for 6 months.
This study aims to investigate the utilization of Bayesian techniques for the calibration of micro-electro-mechanical system (MEMS) accelerometers. These devices have garnered substantial interest in various practical applications and typically require calibration through error-correcting functions. The parameters of these error-correcting functions are determined during a calibration process. However, due to various sources of noise, these parameters cannot be determined with precision, making it desirable to incorporate uncertainty in the calibration models. Bayesian modeling offers a natural and complete way of reflecting uncertainty by treating the model parameters as variables rather than fixed values. In addition, Bayesian modeling enables the incorporation of prior knowledge, making it an ideal choice for calibration. Nevertheless, it is infrequently used in sensor calibration. This study introduces Bayesian methods for the calibration of MEMS accelerometer data in a straightforward manner using recent advances in probabilistic programming.
The random matrix approach is a robust algorithm to filter the mean and covariance matrix of noisy observations of a dynamic object. Afterward, virtual measurement models can be used to find iteratively the extent parameters of an object that would cause the same statistical moments within their measurements. In previous work, this was limited to elliptical targets and only contour measurements.In this paper, we introduce the parallel use of an elliptical, triangular and rectangular-shaped virtual measurement model and a shape classification that selects the model that fits best to the measurements. The measurement likelihood is modeled either via ray tracing, a uniformly or normally spatial distribution over the object’s extent or as a combination of those.The results show that the extent estimation works precisely and that the classification accuracy highly depends on the measurement noise.
Large-scale quantum computers threaten the security of today's public-key cryptography. The McEliece cryptosystem is one of the most promising candidates for post-quantum cryptography. However, the McEliece system has the drawback of large key sizes for the public key. Similar to other public-key cryptosystems, the McEliece system has a comparably high computational complexity. Embedded devices often lack the required computational resources to compute those systems with sufficiently low latency. Hence, those systems require hardware acceleration. Lately, a generalized concatenated code construction was proposed together with a restrictive channel model, which allows for much smaller public keys for comparable security levels. In this work, we propose a hardware decoder suitable for a McEliece system based on these generalized concatenated codes. The results show that those systems are suitable for resource-constrained embedded devices.
Prior quantitative research identified in the text of technology-based ventures' business plans distinctive performance patterns of evolving business models. Accordingly, interactions with customers, financiers, and people and the patenting strategy's status evolved and served as indicators of early-stage tech ventures' performance. With longitudinal data from five venture cases, this research sheds light on the evolving business model by validating the performance patterns, and elucidating how and why the ventures' business models evolved. Based on a generic systems theory framework for the indicators, the explanatory case studies re-contextualize the performance patterns taken from the snapshot perspective of business plans to the longitudinal perspective of technology-based ventures' life-cycle. This research confirms the relation of business model patterns of digital and non-digital ventures to the performance groups of failure, survival, or success and suggests a broader systems perspective for further research.
This study aims to adapt CEFR in developing an integrative approach-based teaching material model for a pre-basic BISOL class. The method used in this research is the development research design by Borg and Gall. This study was development research. The stages are identification of the problem, formulation of a hypothetical draft model; feasibility testing by experts; product revision; and test product effectiveness. The data were collected through survey techniques, interviews, and documentation. The needs identification results revealed data encompassing 10 themes, 5 tasks per theme, and diverse evaluations comprising theory, in-class practice, and real-world field assignments, both on an individual and group basis. These identified needs require alignment with CEFR A1 for the development of BISOL learning. These findings were subsequently incorporated into the design of the teaching material model, and the results indicated that tailoring CEFR to BISOL as an integrative language teaching material model was feasible for application in the classroom, as assessed by experts. The implications suggest that integrating CEFR into BISOL is highly feasible for the development of teaching materials, and teachers can leverage this instructional model to enhance students' proficiency in the Indonesian language.
The digital transformation of business processes and the integration of IT systems leads to opportunities and risks for small and medium-sized enterprises (SMEs). Risks that can result in a lack of IT Governance, Risk and Compliance (GRC). The purpose of this paper is to present the Design and Evaluation phase of creating an artefact, to reduce these risks. With this, the Design Science Research approach based on Hevner is using. The artefact will be developed by selecting relevant existing frameworks and the identification of SME-specific competencies. The method enables IT-GRC managers to transfer or adapt the frameworks to an SME organizational structure. The results from ten interviews and further three feedback loops showed that the method can be applied in practice and that a tailoring of established frameworks can take place. Contrary to the previous basic orientation of the research, this paper focuses on the concretization of approaches.
In the digital age, information technology (IT) is a strategic asset for organizations. As a result, the IT costs are rising, and the cost-effective management of IT is crucial. Nevertheless, organizations still face major challenges and former studies lack comprehensiveness and depth. The goal of this paper is to generate a deep and holistic view on current management challenges of IT costs. In 15 expert interviews, we identify 23 challenges divided into 7 categories. The main challenges are to ensure transparency on IT cost information, to demonstrate the business impact of IT as well as to change the mindset for the value of IT and overcoming them requires attention to their interactions. Hence, this paper leads to a better understanding of the issues that IT cost management (ITCM) faces in the digital age and builds a base for future research.
CSR Pyramid
(2023)
Carroll, A.B.
(2023)
Infrastructure-making in interwar India was a dynamic, multilayered process involving roads and vehicles in urban and rural sites. One of their strongest playgrounds was Bombay Presidency and the Central Provinces in central and western India. Focusing on this region in the interwar period, this paper analyzes the varied relationship between peasant households and town-centred modernizing agents in the making of road transport infrastructures. The central argument of this paper is about the persistence of bullock carts over motor cars in the region. This persistence was grounded in the specific regional environment, the effects of the 1930s economic depression, and the priorities of social classes. Pinpointing these connections, the paper highlights that “modernization” of infrastructure was not a simple, linear process of progressivist change, nor did it mean the survival of apparently “old” technologies in the modern era. Instead, the paper pays attention to conflicting social complexities, implications, and meanings of the connection between infrastructure and modernity that modernization assumptions often overlook. Here, the paper shows how technological change occurred as a result of real, material class interests pulling infrastructural technology in different directions. This was where and why arguments of road-motor lobbyists and cart advocates eventually clashed, and Gandhian social workers resisted motor transport in defense of peasant interests.
Nowadays, organizations must invest strategically in information technology (IT) and choose the right digital initiatives to maximize their benefit. Nevertheless, Chief Information Officers still struggle to communicate IT costs and demonstrate the business value of IT. The goal of this paper is to support their effective communication. In focus groups, we analyzed how different stakeholders perceive IT costs and the business value of IT as the basis of communication. We identified 16 success factors to establish effective communication. Hence, this paper enables a better understanding of the perception and the operationalization of effective communication.
This chapter takes a detailed look at the developmental state model and its manifestations in regional development policies. Developmentalist ideas have been waxing and waning across periods of economic boom and bust. Recent years, however, have seen a renaissance of East Asian developmentalism – reminiscent of its heyday in the 1980s and 1990s and most notably driven by the region’s continued economic strength.
The endorsement of state-led modernization, preferential policies, and close state-business relations – which underpinned Japan/Korea/China’s transformations – has also left its mark on current ODA practices in the region and beyond. East Asia’s state agencies are pushing ahead with colossal infrastructure programs – in close cooperation with commercial actors – that advance broad development goals and, at the same time, promotes national interests. Compared to Western OECD peers, Asian development cooperation tends to focus less on neoliberal and democratic principles and, instead, places greater emphasis on state-corporatist and meritocratic ideas.
To what extent East Asia’s infrastructural megaprojects and connectivity corridors across Eurasia and Africa (BRI, EAI, and Partnership for Quality Infrastructure) will generate political momentum for an emergent developmental consensus remains uncertain. The jury is still out when it comes to whether and how Asian developmentalism will take center stage in global development debates. What is clear, however, is that the changing zeitgeist of a less Anglo/Euro-centric world bodes well for more heterodox and diverse ideas on development cooperation.
Dieses Buch bietet eine kompakte Einführung in die systemische Denkweise und die Methodik des Vernetzten Denkens. Tragfähige Entscheidungen und Handlungen in unserer vernetzten und komplexen Welt erfordern, sich mit anderen Denk- und Sichtweisen vertraut zu machen und in systemisch-vernetzten Zusammenhängen zu denken. Dazu benötigen die Entscheider ein tiefergehendes Verständnis über das Denken in Wirkungszusammenhängen und wie sich diese bildhaft darstellen lassen. Mittels vieler motivierender Beispiele zeigt dieses essential, was Systemdenken ausmacht und wie sich diese Denkweise in die eigene Entscheidungspraxis umsetzen lässt.
Southeast Asia
(2023)
Southeast Asia continues to inspire and intrigue observers from all walks
of life due to its diverse cultural traditions and its interwoven threads of
geographical, historical, and social transformation. This essay will explore some of these threads by highlighting Southeast Asia’s (1) deep-rooted diversity, (2) decolonial nation-building, (3) digital leapfrogging, and (4) under-rated prospects
Praktische Rhetorik
(2023)
Arbeitsrecht für Dummies
(2023)
Unsere Wirtschaft ist ohne Verständnis des Arbeitsrechts schwer zu begreifen. Oliver Haag erklärt Ihnen von den Rechtsquellen bis hin zum Betriebsverfassungsrecht alles, was Sie über das Arbeitsrecht wissen sollten. Anhand von Übungsfällen können Sie Ihr Wissen direkt überprüfen.
Oliver Haag erklärt Ihnen, was Sie für Ihr Studium über Arbeitsrecht wissen sollten. Er führt Sie in die juristische Denk- und Arbeitsweise ein und erklärt Ihnen die allgemeinen Grundlagen des Arbeitsrechts. Sie erfahren außerdem, was es mit den Details des Individualarbeitsrechts und des Kollektivarbeitsrechts auf sich hat. Zum Abschluss lernen Sie anhand von Übungsfällen, wie Sie sich mit dem Arbeitsrecht in Klausuren auseinandersetzen sollten. So ist dieses Buch unverzichtbar bei Ihren ersten Schritten in diesem wichtigen, aber manchmal auch recht komplizierten Thema.
Bribery
(2023)
Trotz des dringenden Erfordernisses einer nachhaltigen und unabhängigen Energieerzeugung und bereits steigender Anteile photovoltaisch erzeugten Stroms stockt die Verbreitung der bauwerkintegrierten Photovoltaik (BIPV). Zahlreiche „Leuchtturm“-Projekte zeigen das große ästhetische Potential solaraktiver Bauteile und dennoch werden insbesondere von Architekt/innen-Seite neben vermeintlichen Einschränkungen in der planerischen Freiheit immer wieder auch gestalterische Vorbehalte angeführt.
Bisher wurde im Zusammenhang mit PV-Bauteilen schwerpunktmäßig die technische und konstruktive Einfügung thematisiert. Um einen Beitrag zur Diskussion um die Entwicklung visuell überzeugender Ergebnisse zu leisten, die verhindern, dass photovoltaische Bauteile am Gebäude als Fremdkörper wahrgenommen werden, ermittelt die vorliegende Arbeit auf der Grundlage ästhetischer Architekturtheorien allgemeingültige Kriterien für architektonische Wirkungsqualität und transferiert diese auf den Bereich der BIPV-Gestaltung.
Dabei werden zum Verständnis erforderliche Grundlagen der BIPV-Systemtechnik vermittelt sowie verfügbare Bauteile und die unterschiedlichen Akteure und Ziele bei der Gestaltung von BIPV aufzeigt. Auch die speziellen funktionalen und technischen Anforderungen, die PV-Bauteile als „aktive“ Bauteile stellen, werden berücksichtigt und hinsichtlich ihrer hemmenden oder synergetischen Wechselwirkungen differenziert.
Im Rahmen einer Projektstudie finden die oben genannten Kriterien Anwendung auf 13 „best practice“-Beispiele aktueller Wettbewerbsgewinner des vom Solarenergieförderverein Bayern e. V. (SeV) ausgelobten „Architekturpreis Gebäudeintegrierte Solartechnik“, die in Form von Steckbriefen vergleichend dargestellt werden.
Das Ergebnis ist die Synthese eines Kriterienkatalogs als Orientierungs-, Planungs- und Kommunikationswerkzeug, in dem alle Ergebnisse systematisiert zusammengestellt werden.
Ergänzend wird in einem kurzen Exkurs auf von der Hauptuntersuchung ausgenommene, für die Praxis aber relevante Schnittstellen zu wirtschaftlichen Aspekten eingegangen.
Motion estimation is an essential element for autonomous vessels. It is used e.g. for lidar motion compensation as well as mapping and detection tasks in a maritime environment. Because the use of gyroscopes is not reliable and a high performance inertial measurement unit is quite expensive, we present an approach for visual pitch and roll estimation that utilizes a convolutional neural network for water segmentation, a stereo system for reconstruction and simple geometry to estimate pitch and roll. The algorithm is validated on a novel, publicly available dataset recorded at Lake Constance. Our experiments show that the pitch and roll estimator provides accurate results in comparison to an Xsens IMU sensor. We can further improve the pitch and roll estimation by sensor fusion with a gyroscope. The algorithm is available in its implementation as a ROS node.
This paper applies the concept of Soja’s Thirdspace to the phenomenon of Lazgi dance and tourism in Uzbekistan. In doing so it analyses the different levels of perception (including Firstspace and Secondspace) of Lazgi and tourism via an autoethnographic lens. Complemented by expert interviews, the interaction of Lazgi and tourism is examined and characteristics of the Lazgisphere (world of Lazgi) in Uzbekistan are distilled. The results show that Lazgi is often directly or indirectly connected with tourism in Uzbekistan, but even more so serves to reaffirm national identity.
"KI first" braucht Verlierer
(2023)
Aktuell vergeht kaum eine Woche, in der nicht ein Unternehmen den Kampf um die Vorherrschaft im Bereich der Künstlichen Intelligenz (KI) aufnimmt. Tech-Konzerne versprechen sich auch von KI-gesteuerten Bildgeneratoren satte Gewinne. Diese ahmen mit synthetischen Mischbildern stilprägende Künstler/innen nach. Dabei wird auf die Rechtslage verwiesen, die eine zustimmungs- und vergütungsfreie Vervielfältigung ihrer Kunstwerke für Trainingszwecke angeblich zulässt. Doch Widerstand von Künstlern/innen hiergegen ist gesellschaftlich dringend geboten und wäre im Übrigen auch rechtlich gedeckt.
Die Relevanzanalyse
(2023)
Ordnungsgemäße Unternehmensführung ohne adäquates Risiko- und Compliance-Management ist kaum noch vor- und darstellbar. Rechtsprechung, Literatur, Politik und Gesellschaft stellen (mehr oder weniger) klare Anforderungen an ordnungsgemäßes unternehmerisches Verhalten und sanktionieren tatsächliche (und vermeintliche) Regelverstöße. Um die unternehmensspezifischen Risiken zu erfassen ist die Durchführung einer Risikoanalyse (Compliance Risk Assessment – CRA) unumgänglich1. Der eigentlichen Risikoanalyse ist eine Relevanzanalyse voranzustellen, um sich der bei unternehmerischen Aktivitäten naturgemäß nahezu unüberschaubaren potenziellen Risikomenge anzunähern und diese „abarbeitbar“ zu erfassen. Wird diese Relevanzanalyse professionell und strukturiert durchgeführt und dokumentiert, so kann sie einen wertvollen Beitrag zum Schutz und zur Hilfe gegen Compliance-Verstöße und deren Sanktionierung leisten. Der nachfolgende Beitrag stellt die Grundlagen, Ziele, Anforderungen und Ansätze der Relevanzanalyse dar. In einem weiteren Beitrag (erscheint in CB 11/2023) werden sich die Autoren der Durchführung der Relevanzanalyse widmen und Hinweise zu deren Ablauf und Inhalt geben.
Sanktionen gegen Russland
(2023)
Die EU hat aufgrund des völkerrechtswidrigen Angriffskrieges auf die Ukraine umfangreiche Sanktionen gegen Russland erlassen. Die Sanktionspakete umfassen insbesondere Wirtschaftssanktionen in Form von Einfuhr- und Ausfuhrbeschränkungen, die für deutsche Unternehmen mit unmittelbaren oder mittelbaren Geschäftsbeziehungen nach Russland von Bedeutung sind. Im Vordergrund der rechtlichen Thematik steht die Frage, ob und wann deutsche Unternehmen gegen EU-Sanktionen verstoßen. Aber auch deutsche Unternehmen mit Tochtergesellschaften in Drittstaaten stehen vor der großen Herausforderung, den Regelmechanismus der diversen Sanktionspakete zu durchleuchten, um sich nicht der Gefahr des Vorwurfs einer Umgehung der Sanktionen auszusetzen.
Die Relevanzanalyse
(2023)
Um unternehmensspezifische Risiken zu erfassen ist die Risikoanalyse unumgänglich. Ihr ist wiederum eine Relevanzanalyse voranzustellen. Nachdem im Heft 10 des Compliance Berater 2023, S. 400-404 die Grundlagen, Ziele, Anforderungen und Ansätze der Relevanzanalyse dargestellt wurden, widmet sich der nachfolgende Beitrag der Durchführung der Relevanzanalyse und gibt Hinweise zu deren Ablauf und Inhalt.
Compliance meets CSR
(2023)
Was früher Gegenstand freiwilliger Selbstverpflichtung war, wird seit einiger Zeit zunehmend reguliert: die Wahrnehmung der unternehmensspezifischen Verantwortung gegenüber Umwelt und Gesellschaft, neudeutsch Corporate Social Responsibility (CSR). CSR und Compliance rücken damit näher zusammen. Vieles, was früher durch CSR-Abteilungen im besten Fall systematisch gemanagt wurde, ist nun gesetzlich vorgeschrieben und fällt damit in den Aufgabenbereich von Compliance. Liegt es da nicht nahe, die beiden Bereiche miteinander zu verschmelzen respektive CSR dem Bereich unterzuordnen, der seit den spektakulären Korruptions- und Bilanzfälschungsskandalen zu Beginn dieses Jahrtausends über die größere Management-Awareness verfügt?
Der vorliegende Beitrag versucht deutlich zu machen, wie das Verhältnis sachlich-fachlich einzuordnen ist und welche Schlussfolgerungen in der Praxis daraus gezogen werden könnten.
Comparison of Data-Driven Modeling and Identification Approaches for a Self-Balancing Vehicle
(2023)
This paper gives a systematic comparison of different state–of–the–art modeling approaches and the corresponding parameter identification processes for a self–balancing vehicle. In detail, a nonlinear grey box model, its extension to consider friction effects, a parametric black box model based on regression neural networks, and a hybrid approach are presented. The parameters of the models are identified by solving a nonlinear least squares problem. The training, validation, and test datasets are collected in full–scale experiments using a self–balancing vehicle. The performance of the different models used for ego–motion prediction are compared in full–scale scenarios, as well. The investigated model architectures can be used to improve both, simulation environments and model–based controller design. This paper shows the upsides and downsides arising from using the different modeling approaches. Videos showing the self–balancing vehicle in action are available at: https://tinyurl.com/mvn8j7vf22nd
This paper compares novel methods to efficiently include input constraints using the nonlinear Model Predictive Path Integral (MPPI) approach. The MPPI algorithm solves stochastic optimal control problems and is based on sampled trajectories. MPPI results from the physical path integral framework. Sample-based algorithms are characterized by the fact that they can be computed in parallel and offer the possibility to handle discontinuous dynamics and cost functions. However, using standard MPPI the input costs in the Lagrange term have to be chosen quadratic. This fact is unfavorable for various real applications. Further, in standard nonlinear model predictive control (NMPC) approaches hard box constraints on the control input trajectory can be treated directly. In this contribution, novel architectures based on integrator action are compared. The investigated input constraint MPPI controllers were tested on an autonomous self-balancing vehicle. Therefore both, simulation and real-world experiments are presented. This paper addresses the question of how the MPPI algorithm can be further developed to consider input box constraints. Videos of the self-balancing vehicle are available at: https: https://tinyurl.com/mvn8j7vf
Corporate Entrepreneurship (CE) has now evolved into an imperative innovation practice of established companies. Despite organizational design models for CE activities and companies' frequent initiation of new activities, effectively managing them remains a challenging endeavor which results in disappointment about the outcomes of CE and its early termination. We assume specific types of goals for CE as one element of this unresolved management issue. While both practice and literature address goals in different contexts, no uniform picture has emerged so far. Although goals are commonly used to categorize CE activities, they seldomly seem to be the core subject of investigation. Based on this preliminary analysis and consolidation, we put the goals of CE in focus. In a systematic literature review, we reveal aspects of goals to unmask the different types of goals and their underlying dimensions and characteristics. Our review contributes to a better understanding of goals by (1) organizing relevant literature on goals of CE in a specific classification process, (2) describing dimensions and attributes for a systematic classification of CE goals; and (3) providing a framework showing differences of goals for the CE context. We conclude with a discussion and hints for future research paths.
“Crowd contamination”?
(2023)
Misconduct allegations have been found to not only affect the alleged firm but also other, unalleged firms in form of reputational and financial spillover effects. It has remained unexplored, however, how the number of prior allegations against other firms matters for an individual firm currently facing an allegation. Building on behavioral decision theory, we argue that the relationship between allegation prevalence among other firms and investor reaction to a focal allegation is inverted U-shaped. The inverted U-shaped effect is theorized to emerge from the combination of two effects: In the absence of prior allegations against other firms, investors fail to anticipate the focal allegation, and hence react particularly negatively (“anticipation effect”). In the case of many prior allegations against other firms, investors also react particularly negatively because investors perceive the focal allegation as more warranted (“evaluation effect”). The multi-industry, empirical analysis of 8,802 misconduct allegations against US firms between 2007 and 2017 provides support for our predicted, inverted U-shaped effect. Our study complements recent misconduct research on spillover effects by highlighting that not only a current allegation against an individual firm can “contaminate” other, unalleged firms but that also prior allegations against other firms can “contaminate” investor reaction to a focal allegation against an individual firm.
Study design:
Retrospective, mono-centric cohort research study.
Objectives:
The purpose of this study is to validate a novel artificial intelligence (AI)-based algorithm against human-generated ground truth for radiographic parameters of adolescent idiopathic scoliosis (AIS).
Methods:
An AI-algorithm was developed that is capable of detecting anatomical structures of interest (clavicles, cervical, thoracic, lumbar spine and sacrum) and calculate essential radiographic parameters in AP spine X-rays fully automatically. The evaluated parameters included T1-tilt, clavicle angle (CA), coronal balance (CB), lumbar modifier, and Cobb angles in the proximal thoracic (C-PT), thoracic, and thoracolumbar regions. Measurements from 2 experienced physicians on 100 preoperative AP full spine X-rays of AIS patients were used as ground truth and to evaluate inter-rater and intra-rater reliability. The agreement between human raters and AI was compared by means of single measure Intra-class Correlation Coefficients (ICC; absolute agreement; .75 rated as excellent), mean error and additional statistical metrics.
Results:
The comparison between human raters resulted in excellent ICC values for intra- (range: .97-1) and inter-rater (.85-.99) reliability. The algorithm was able to determine all parameters in 100% of images with excellent ICC values (.78-.98). Consistently with the human raters, ICC values were typically smallest for C-PT (eg, rater 1A vs AI: .78, mean error: 4.7°) and largest for CB (.96, -.5 mm) as well as CA (.98, .2°).
Conclusions:
The AI-algorithm shows excellent reliability and agreement with human raters for coronal parameters in preoperative full spine images. The reliability and speed offered by the AI-algorithm could contribute to the efficient analysis of large datasets (eg, registry studies) and measurements in clinical practice.
Designing cities
(2023)
Manual for Urban Design
Urban design is based on planning and design principles that need to meet functional demands on the one hand, but on the other hand bring the design elements together into a distinctive whole. The basic compositional principles are, for the most part, timeless. Designing Cities examines the most important design and presentation principles of urban design, using historical examples and contemporary international competition entries designed by practices including Foster + Partners, KCAP Architects & Planners, MVRDV, and OMA.
At the core of the publication is the question of how the projects were designed and what methods and tools were available to the designer: such as parametric design, in which variable parameters automatically influence the design and provide a range of possible solutions.
- Tools for urban design
- Current projects and award-winning competition entries by renowned international practices
- A textbook for students and a practical design aid for practicing architects and planners
An inter- and transdisciplinary concept has been developed, focusing on the scaling of industrial circular construction using innovative compacted mineral mixtures (CMM) derived from various soil types (sand, silt, clay) and recycled mineral waste. The concept aims to accelerate the systemic transformation of the construction industry towards carbon neutrality by promoting the large-scale adoption and automation of CMM-based construction materials, which incorporate natural mineral components and recycled aggregates or industrial by-products. In close collaboration with international and domestic stakeholders in the construction sector, the concept explores the integration of various CMM-based construction methods for producing wall elements in conventional building construction. Leveraging a digital urban mining platform, the concept aims to standardize the production process and enable mass-scale production. The ultimate goal is to fully harness the potential of automated CMM-based wall elements as a fast, competitive, emission-free, and recyclable alternative to traditional masonry and concrete construction techniques. To achieve this objective, the concept draws upon the latest advances in soil mechanics, rheology, and automation and incorporates open-source digital platform technologies to enhance data accessibility, processing, and knowledge acquisition. This will bolster confidence in CMM-based technologies and facilitate their widespread adoption. The extraordinary transfer potential of this approach necessitates both basic and applied research. As such, the proposed transformative, inter- and transdisciplinary concept will be conducted and synthesized using a comprehensive, holistic, and transfer-oriented methodology.