Refine
Year of publication
- 2017 (32) (remove)
Document Type
- Article (32) (remove)
Has Fulltext
- no (32)
Keywords
- Bernstein coefficient (2)
- Compliance (1)
- ECG (1)
- Elektromagnete (1)
- End-user computing (1)
- Entry-wise perturbation (1)
- Fassade (1)
- Fassadensanierung (1)
- Health care (1)
- Heart rate (1)
This work proposes a lossless data compression algorithm for short data blocks. The proposed compression scheme combines a modified move-to-front algorithm with Huffman coding. This algorithm is applicable in storage systems where the data compression is performed on block level with short block sizes, in particular, in non-volatile memories. For block sizes in the range of 1(Formula presented.)kB, it provides a compression gain comparable to the Lempel–Ziv–Welch algorithm. Moreover, encoder and decoder architectures are proposed that have low memory requirements and provide fast data encoding and decoding.
A flight-like absolute optical frequency reference based on iodine for laser systems at 1064 nm
(2017)
We present an absolute optical frequency reference based on precision spectroscopy of hyperfine transitions in molecular iodine 127I2 for laser systems operating at 1064 nm. A quasi-monolithic spectroscopy setup was developed, integrated, and tested with respect to potential deployment in space missions that require frequency stable laser systems. We report on environmental tests of the setup and its frequency stability and reproducibility before and after each test. Furthermore, we report on the first measurements of the frequency stability of the iodine reference with an unsaturated absorption cell which will greatly simplify its application in space missions. Our frequency reference fulfills the requirements on the frequency stability for planned space missions such as LISA or NGGM.
In several organizations, business workgroups autonomously implement information technology (IT) outside the purview of the IT department. Shadow IT, evolving as a type of workaround from nontransparent and unapproved end-user computing (EUC), is a term used to refer to this phenomenon, which challenges norms relative to IT controllability. This report describes shadow IT based on case studies of three companies and investigates its management. In 62% of cases, companies decided to reengineer detected instances or reallocate related subtasks to their IT department. Considerations of risks and transaction cost economics with regard to specificity, uncertainty, and scope explain these actions and the resulting coordination of IT responsibilities between the business workgroups and IT departments. This turns shadow IT into controlled business-managed IT activities and enhances EUC management. The results contribute to the governance of IT task responsibilities and provide a way to formalize the role of workarounds in business workgroups.
„Am Einzelnen das Allgemeine lernen“ ist ein vor über 50 Jahren vorgeschlagenes, dem modernen Verständnis von Lernen angepasstes Vorgehen in der Physikausbildung. Allerdings hat sich dieses Konzept bis heute noch nicht durchgesetzt. Im vorliegenden Text beschreiben die beiden Autoren, wie die Umstellung der „Physikausbildung von Ingenieuren“ einer gesamten Hochschule von der Lehre von Inhalten auf eine Vermittlung von Physik-Methoden angegangen wurde und schließlich gelungen ist. Für Ihre Arbeiten erhielten sie den Ars legendi-Fakultätenpreis Physik 2014.
Lokale Ausbesserungen stellen bei Schadstellen an verputzten Fassaden in vielen Fällen eine technisch sichere und weniger zeit- und kostenaufwendige Alternative zum Putzabschlagen und Neuverputz oder zum vollflächigen Überputzen dar.
Die zum Teil damit verbundenen leichten Einschränkungen beim ästhetischen Gesamteindruck sind in den meisten Fällen tolerierbar. An die Auswahl eines geeigneten Putzes und die handwerkliche Ausführung der Ausbesserung werden hohe Anforderungen gestellt, um ein technisch und ästhetisch zufriedenstellendes Ergebnis zu erzielen.
Das Thema Schatten-IT hat erst in den letzten Jahren in Wissenschaft und Praxis erheblich an Bedeutung gewonnen.1 Unter dem Begriff Schatten-IT werden dabei Systeme verstanden, welche die Fachbereiche in Eigenregie beschaffen oder erstellen und die nicht in das IT-Servicemanagement des Unternehmens eingebunden sind.2 Das Thema Schatten-IT ist dabei weder neu noch selten. Trotz dieser langen Geschichte war über die Verbreitung der Schatten-IT wenig Genaues bekannt. Im einem Beitrag in dieser Zeitschrift im Jahr 2011 haben wir die Risiken der Schatten-IT beschrieben und damit die Notwendigkeit für die Auseinandersetzung mit dem Thema Schatten-IT hergeleitet.3 Im Forschungsprojekt Schatten-IT des Konstanzer Instituts für Prozesssteuerung wurde dann in den vergangenen Jahren eine Methode zum Management der Schatten-IT entwickelt und in verschiedenen Fallstudien evaluiert. Ziel dieses Beitrages ist es, die empirischen Ergebnisse aus den Fallstudien vorzustellen.4 Die Datenbasis bilden dabei die Fallstudien in vier Unternehmen, in denen insgesamt 386 Schatten-IT Systeme gefunden wurden. Zwei der Unternehmen stammen aus der Finanz- und Versicherungsbranche, die beiden anderen aus der Fertigungsindustrie. Je ein Abteilungsbereich wurde für die Untersuchung herangezogen. Aus diesen Fallstudien stellt der Beitrag im zweiten Kapitel die Ausprägungen der aufgedeckten Schatten-IT vor. Im dritten Kapitel folgt dann die Beschreibung der geschäftlichen Relevanz der Schatten-IT. Im vierten Abschnitt gehen wir auf die Qualität der Schatten-IT Systeme ein. In der Fortsetzung des Artikels werden in einem weiteren Beitrag die möglichen Prüfungsansätze beschrieben.
Compliance Essentials
(2017)
Die Digitalisierung und Flexibilisierung der Fertigung wird die Arbeitsbedingungen und Prozesse genauso wie Geschäftsmodelle stark verändern. In der Praxis ist gegenwärtig eine wachsende Diskrepanz zwischen Großunternehmen und KMUs erkennbar. Die Lernfabrik an der HTWG Konstanz will genau dies überbrücken.
Der hybride Baublock behauptet sich in Deutschland nach wie vor als erfolgreichster und beliebig kopierbarer Stadtbaustein der städtebaulichen Wettbewerbe, so der Autor in einer Analyse wichtiger Entscheidungen der letzten drei Jahre. Allerdings steht das Wohnhochhaus vor einem erstaunlichen Comeback.
The estimation of the holding periods of financial products has to be done in a dynamic process in which the size of the observation time interval influences the result. Small intervals will produce smaller average holding periods than bigger ones. The approach developed in this paper offers the possibility of estimating this average independently of the size of this time interval. This method is demonstrated on the example of two distributions, based on the exponential and the geometric probability functions. The estimation will be found by maximizing the likelihood function.
Tests for speeding up the determination of the Bernstein enclosure of the range of a multivariate polynomial and a rational function over a box and a simplex are presented. In the polynomial case, this enclosure is the interval spanned by the minimum and the maximum of the Bernstein coefficients which are the coefficients of the polynomial with respect to the tensorial or simplicial Bernstein basis. The methods exploit monotonicity properties of the Bernstein coefficients of monomials as well as a recently developed matrix method for the computation of the Bernstein coefficients of a polynomial over a box.
To evaluate the quality of sleep, it is important to determine how much time was spent in each sleep stage during the night. The gold standard in this domain is an overnight polysomnography (PSG). But the recording of the necessary electrophysiological signals is extensive and complex and the environment of the sleep laboratory, which is unfamiliar to the patient, might lead to distorted results. In this paper, a sleep stage detection algorithm is proposed that uses only the heart rate signal, derived from electrocardiogram (ECG), as a discriminator. This would make it possible for sleep analysis to be performed at home, saving a lot of effort and money. From the heart rate, using the fast Fourier transformation (FFT), three parameters were calculated in order to distinguish between the different sleep stages. ECG data along with a hypnogram scored by professionals was used from Physionet database, making it easy to compare the results. With an agreement rate of 41.3%, this approach is a good foundation for future research.
Intelligente Aktorik
(2017)
A real matrix is called totally nonnegative if all of its minors are nonnegative. In this paper, the minors are determined from which the maximum allowable entry perturbation of a totally nonnegative matrix can be found, such that the perturbed matrix remains totally nonnegative. Also, the total nonnegativity of the first and second subdirect sum of two totally nonnegative matrices is considered.
In this paper, multivariate polynomials in the Bernstein basis over a simplex (simplicial Bernstein representation) are considered. Two matrix methods for the computation of the polynomial coefficients with respect to the Bernstein basis, the so-called Bernstein coefficients, are presented. Also matrix methods for the calculation of the Bernstein coefficients over subsimplices generated by subdivision of the standard simplex are proposed and compared with the use of the de Casteljau algorithm. The evaluation of a multivariate polynomial in the power and in the Bernstein basis is considered as well. All the methods solely use matrix operations such as multiplication, transposition, and reshaping; some of them rely also on the bidiagonal factorization of the lower triangular Pascal matrix or the factorization of this matrix by a Toeplitz matrix. The latter one enables the use of the Fast Fourier Transform hereby reducing the amount of arithmetic operations.
In extended object tracking, a target is capable to generate more than one measurement per scan. Assuming the target being of elliptical shape and given a point cloud of measurements, the Random Matrix Framework can be applied to concurrently estimate the target’s dynamic state and extension. If the point cloud contains also clutter measurements or origins from more than one target, the data association problem has to be solved as well. However, the well-known joint probabilistic data association method assumes that a target can generate at most one detection. In this article, this constraint is relaxed, and a multi-detection version of the joint integrated probabilistic data association is proposed. The data association method is then combined with the Random Matrix framework to track targets with elliptical shape. The final filter is evaluated in the context of tracking smaller vessels using a high resolution radar sensor. The performance of the filter is shown in simulation and in several experiments.
R concretes with a proportion of recycled aggregates are standardized normal concretes which are allowed for use in Germany up to strength class C30/37. Because of the good technical properties and the ecological advantages, the article presents possible applications in the field of concrete products and precast concrete elements. Read part 2 of the paper.
R concretes with a proportion of recycled aggregates are standardized normal concretes which are allowed for use in Germany up to strength class C30/37. Because of the good technical properties and the ecological advantages, the article presents possible applications in the field of concrete products and precast concrete elements. Read part 1 of the paper.
Rethinking Compliance
(2017)
In the past Compliance Management has often failed, the Volkswagen emissions scandal just being one prominent example. Not everything has to be reinvented, and not everything that companies have done in the past regarding Compliance is wrong. But it is about time to think Compliance in new ways. What does “Compliance Management 2.0” really depend on? The following article aims at laying out the cornerstones for enduring effective Compliance which amongst others comprises sincerity and credibility and a moral foundation. Furthermore, the commitment and role model behavior of top managers and the training of line managers are crucial for the effectiveness of any Compliance Management System (CMS). Ultimately, for Compliance to function efficiently the efforts must be adequate for the respective company and realistic regarding the achievable goals.
Schatten-IT (Teil 2)
(2017)
As part of large-scale project in the Lake Constance region that borders Germany, Austria and Switzerland, seamless learning prototypes are designed, implemented, and evaluated. A design-based research (DBR) approach is used for the development, implementation and evaluation. The project consists of one base project that brings together instructional design and instructional technology specialists as well as (educational) software architects, supporting seven subprojects in developing seamless-learning lighthouse implementations mostly within higher and further education.
Industrial partners are involved in all subprojects. The authors are unaware of similar seamless learning projects using a DBR approach that include evaluation and redesign and allow for comparison of experiences by applying DBR across subprojects. The project aims to generate novel seamless learning implementations, respective novel research and novel software supporting different aspects of seamless learning. The poster will present the project design, delineate areas of research and development, and include initial empirical results.
Sensorlose Positionsregelung eines hydraulischen Proportional-Wegeventils mittels Signalinjektion
(2017)
Es wird eine Methode zur sensorlosen Positionsbestimmung bei elektromagnetisch betätigten Aktoren vorgestellt. Dabei werden basierend auf einer Signalinjektion die positionsabhängigen Parameter bei der injizierten Frequenz bestimmt und daraus über ein geeignetes Modell die Position des Magnetankers ermittelt. Die Eignung des Verfahrens zur sensorlosen Positionsregelung wird an einem bidirektionalen Proportionalventil anhand praktischer Versuche demonstriert.
Smart factory and education
(2017)
Moderne politische Steuerungskonzeptionen zeichnen sich dadurch aus, dass sie zum einen die Mängel traditioneller planungszentrierter Konzepte vermeiden und zum anderen der gewachsenen Vielfalt an Kooperationsmöglichkeiten unterschiedlicher Akteurssysteme gerecht werden. Speziell für das Handlungsfeld der kommunalen Energiewende führt dies zu einer Governance-Konzeption, bei der Kommunen als systemische Steuerungsakteure fungieren. Hierbei moderieren und gestalten sie zusammen mit den relevanten Akteuren die verschiedenen Herausforderungen im Rahmen kommunaler Energiewendekonzepte.
The Kerala tourism model
(2017)
Sustainable tourism in Kerala is on the rise. Therefore, this South Indian state is assessed according to the sustainable tourism criteria of the Strasdas et al. (2007) framework. Kerala as a state does not qualify as a sustainable tourism destination, although individual success stories at the NGO and government level exist. This conceptual paper delivers a detailed analysis of the three dimensions of sustainability, i.e. ecology, economy and socio-cultural aspects, of the ‘Kerala tourism model’ and discusses the question of whether this model can be transferred to other developing countries. Copyright © 2016 John Wiley & Sons, Ltd and ERP Environment
Ulrich Finsterwalder
(2017)
Zur Rhetorik der Technik
(2017)
Schreibberater an den Universitäten und Hochschulen und Verfasser von Ratgeberliteratur zum wissenschaftlichen Schreiben haben vermutlich zum überwiegenden Teil einen geistes- und kulturwissenschaftlichen Hintergrund. Die Fachkulturen, in denen sie das Handwerk des Zitierens erlernt haben, sind jedoch grundverschieden von jenen der nicht-textbasierten Wissenschaften: der Ingenieurfächer, der (nicht rein theoretischen) Naturwissenschaften, der Medizin und auch der empirischen Wirtschafts- und Sozialwissenschaften und der empirischen Psychologie. Die Unterschiede sind besonders augenfällig bei der Frage nach der Belegpflicht einer übernommenen Information, also bei der jeweiligen Entscheidung darüber, ob eine Quelle angegeben werden muss oder nicht.