Search results for: Christoph Hacker
68 Hackers’ Artwork in Search for a Name: An Analysis of Hackers’ Artwork
Authors: Sultana Ismet Jerin, Md. Waseq Ur Rahman
Abstract:
Artworks of hacker artists are one of the new trends in the field of new media arts. When someone hears a name of hacker or anything related to hacking, what comes to one’s mind is usually not connected to art due to its divisive meaning. While it is fascinating that every year a number of hacker summits and hacker art fest are being organized among the respective community, it is at the same time true that people are yet to understand what hacker art really is. However, this new phenomenon of artwork under the title ‘hacker art’ has little been studied. Understanding this new form of art is important as the artists of hacker art belong to the era of digital revolution which is a very significant part of our history. Therefore, it is important to find out the challenges in defining them and find out solutions to preserve them. In this paper, the key question that has been addressed is why artworks of hacker artists are facing the complicacies to be defined or categorized. Content analysis of the hacker manifesto (a short historical essay written by a hacker) and two hacker art projects has been conducted to find out the issues surrounding the key research questions. The paper ends with discussing the findings and possible solutions to the challenges hacker artists facing.Keywords: media art, hacker art, hacker artist, new media
Procedia PDF Downloads 19067 Some Tips for Increasing Online Services Safety
Authors: Mohsen Rezaee
Abstract:
Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.Keywords: firewalls, security, web services, computer science
Procedia PDF Downloads 40366 Functionally Modified Melt-Electrospun Thermoplastic Polyurethane (TPU) Mats for Wound-Dressing Applications
Authors: Christoph Hacker, Zeynep Karahaliloglu, Gunnar Seide, Emir Baki Denkbas, Thomas Gries
Abstract:
A wound dressing material is designed to facilitate wound healing and minimize scarring. An ideal wound dressing material should protect the wound from any contaminations of exogeneous microorganism. In addition, the dressing material should provide a moist environment through extraction of body fluid from the wound area. Recently, wound dressing electrospun nanofibrous membranes are produced by electrospinning from a polymer solution or a polymer melt. These materials have a great potential as dressing materials for wound healing because of superior properties such as high surface-to-volume ratio, high porosity with excellent pore interconnectivity. Melt electrospinning is an attractive tissue engineering scaffold manufacturing process which eliminated the health risk posed by organic solvents used in electrospinning process and reduced the production costs. In this study, antibacterial wound dressing materials were prepared from TPU (Elastollan 1185A) by a melt-electrospinning technique. The electrospinning parameters for an efficient melt-electrospinning process of TPU were optimized. The surface of the fibers was modified with poly(ethylene glycol) (PEG) by radio-frequency glow discharge plasma deposition method and with silver nanoparticles (nAg) to improve their wettability and antimicrobial properties. TPU melt-electrospun mats were characterized using SEM, DSC, TGA and XPS. The cell viability and proliferation on modified melt-electrospun TPU mats were evaluated using a mouse fibroblast cell line (L929). Antibacterial effects of theirs against both Staphylococcus aureus strain and Escherichia coli were investigated by disk-diffusion method. TPU was successfully processed into a porous, fibrous network of beadless fibers in the micrometer range (4.896±0.94 µm) with a voltage of 50 kV, a working distance of 6 cm, a temperature of the thermocouple and hot coil of 225–230ºC, and a flow rate of 0.1 mL/h. The antibacterial test indicated that PEG-modified nAg-loaded TPU melt-electrospun structure had excellent antibacterial effects and cell study results demonstrated that nAg-loaded TPU mats had no cytotoxic effect on the fibroblast cells. In this work, the surface of a melt-electrospun TPU mats was modified via PEG monomer and then nAg. Results showed melt-electrospun TPU mats modified with PEG and nAg have a great potential for use as an antibacterial wound dressing material and thus, requires further investigation.Keywords: melt electrospinning, nanofiber, silver nanoparticles, wound dressing
Procedia PDF Downloads 46165 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 13464 Spatiotemporal Propagation and Pattern of Epileptic Spike Predict Seizure Onset Zone
Authors: Mostafa Mohammadpour, Christoph Kapeller, Christy Li, Josef Scharinger, Christoph Guger
Abstract:
Interictal spikes provide valuable information on electrocorticography (ECoG), which aids in surgical planning for patients who suffer from refractory epilepsy. However, the shape and temporal dynamics of these spikes remain unclear. The purpose of this work was to analyze the shape of interictal spikes and measure their distance to the seizure onset zone (SOZ) to use in epilepsy surgery. Thirteen patients' data from the iEEG portal were retrospectively studied. For analysis, half an hour of ECoG data was used from each patient, with the data being truncated before the onset of a seizure. Spikes were first detected and grouped in a sequence, then clustered into interictal epileptiform discharges (IEDs) and non-IED groups using two-step clustering. The distance of the spikes from IED and non-IED groups to SOZ was quantified and compared using the Wilcoxon rank-sum test. Spikes in the IED group tended to be in SOZ or close to it, while spikes in the non-IED group were in distance of SOZ or non-SOZ area. At the group level, the distribution for sharp wave, positive baseline shift, slow wave, and slow wave to sharp wave ratio was significantly different for IED and non-IED groups. The distance of the IED cluster was 10.00mm and significantly closer to the SOZ than the 17.65mm for non-IEDs. These findings provide insights into the shape and spatiotemporal dynamics of spikes that could influence the network mechanisms underlying refractory epilepsy.Keywords: spike propagation, spike pattern, clustering, SOZ
Procedia PDF Downloads 6263 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices
Authors: Robin Singh, Jing-Chiou Liou
Abstract:
The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secureKeywords: cybersecurity, DDoS, IoT, medical devices
Procedia PDF Downloads 8462 Track and Evaluate Cortical Responses Evoked by Electrical Stimulation
Authors: Kyosuke Kamada, Christoph Kapeller, Michael Jordan, Mostafa Mohammadpour, Christy Li, Christoph Guger
Abstract:
Cortico-cortical evoked potentials (CCEP) refer to responses generated by cortical electrical stimulation at distant brain sites. These responses provide insights into the functional networks associated with language or motor functions, and in the context of epilepsy, they can reveal pathological networks. Locating the origin and spread of seizures within the cortex is crucial for pre-surgical planning. This process can be enhanced by employing cortical stimulation at the seizure onset zone (SOZ), leading to the generation of CCEPs in remote brain regions that may be targeted for disconnection. In the case of a 24-year-old male patient suffering from intractable epilepsy, corpus callosotomy was performed as part of the treatment. DTI-MRI imaging, conducted using a 3T MRI scanner for fiber tracking, along with CCEP, is used as part of an assessment for surgical planning. Stimulation of the SOZ, with alternating monophasic pulses of 300µs duration and 15mA current intensity, resulted in CCEPs on the contralateral frontal cortex, reaching a peak amplitude of 206µV with a latency of 31ms, specifically in the left pars triangularis. The related fiber tracts were identified with a two-tensor unscented Kalman filter (UKF) technique, showing transversal fibers through the corpus callosum. The CCEPs were monitored through the progress of the surgery. Notably, the SOZ-associated CCEPs exhibited a reduction following the resection of the anterior portion of the corpus callosum, reaching the identified connecting fibers. This intervention demonstrated a potential strategy for mitigating the impact of intractable epilepsy through targeted disconnection of identified cortical regions.Keywords: CCEP, SOZ, Corpus callosotomy, DTI
Procedia PDF Downloads 6561 An Approach on the Design of a Solar Cell Characterization Device
Authors: Christoph Mayer, Dominik Holzmann
Abstract:
This paper presents the development of a compact, portable and easy to handle solar cell characterization device. The presented device reduces the effort and cost of single solar cell characterization to a minimum. It enables realistic characterization of cells under sunlight within minutes. In the field of photovoltaic research the common way to characterize a single solar cell or a module is, to measure the current voltage curve. With this characteristic the performance and the degradation rate can be defined which are important for the consumer or developer. The paper consists of the system design description, a summary of the measurement results and an outline for further developments.Keywords: solar cell, photovoltaics, PV, characterization
Procedia PDF Downloads 41960 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 18959 Classifications of Neuroscientific-Radiological Findings on “Practicing” in Mathematics Learning
Authors: Felicitas Pielsticker, Christoph Pielsticker, Ingo Witzke
Abstract:
Many people know ‘Mathematics needs practice!’ statement or similar ones from their mathematics lessons. It seems important to practice when learning mathematics. At the same time, it also seems important to practice how to learn mathematics. This paper places neuroscientific-radiological findings on “practicing” while learning mathematics in a context of mathematics education. To accomplish this, we use a literature-based discussion of our case study on practice. We want to describe neuroscientific-radiological findings in the context of mathematics education and point out stimulating connections between both perspectives. From a connective perspective we expect incentives that lead discussions in future research in the field of mathematics education.Keywords: functional magnetic resonance imaging, fMRI, education, mathematics learning, practicing
Procedia PDF Downloads 33858 Digitalized Public Sector Practices: Opportunities for Open Innovation in Rwanda
Authors: Reem Abou Refaie, Christoph Meinel
Abstract:
The paper explores the impact of the COVID-19 crisis on the internal as well as external digitalized work practices of public service providers as part of a Public-Private Partnership Model. It focuses on the effect of uncertainty on generating Open Innovation practices. Our inquiry relies on semi-structured interviews (n=14) from a case study of Rwanda’s Public Service Delivery System in the context of research cooperation with IremboGov, the country’s One-Stop-Shop Platform for public services. It presents four propositions on harnessing opportunities for OI in the context of the public sector beyond the pandemic response. Practitioners can find characterizations of OI opportunities and gain insights on fostering OI in Public Sector Organizations.Keywords: open innovation, digital transformation, public sector, Rwanda
Procedia PDF Downloads 12757 Machine Learning Development Audit Framework: Assessment and Inspection of Risk and Quality of Data, Model and Development Process
Authors: Jan Stodt, Christoph Reich
Abstract:
The usage of machine learning models for prediction is growing rapidly and proof that the intended requirements are met is essential. Audits are a proven method to determine whether requirements or guidelines are met. However, machine learning models have intrinsic characteristics, such as the quality of training data, that make it difficult to demonstrate the required behavior and make audits more challenging. This paper describes an ML audit framework that evaluates and reviews the risks of machine learning applications, the quality of the training data, and the machine learning model. We evaluate and demonstrate the functionality of the proposed framework by auditing an steel plate fault prediction model.Keywords: audit, machine learning, assessment, metrics
Procedia PDF Downloads 26956 Networked Implementation of Milling Stability Optimization with Bayesian Learning
Authors: Christoph Ramsauer, Jaydeep Karandikar, Tony Schmitz, Friedrich Bleicher
Abstract:
Machining stability is an important limitation to discrete part machining. In this work, a networked implementation of milling stability optimization with Bayesian learning is presented. The milling process was monitored with a wireless sensory tool holder instrumented with an accelerometer at the Vienna University of Technology, Vienna, Austria. The recorded data from a milling test cut is used to classify the cut as stable or unstable based on the frequency analysis. The test cut result is fed to a Bayesian stability learning algorithm at the University of Tennessee, Knoxville, Tennessee, USA. The algorithm calculates the probability of stability as a function of axial depth of cut and spindle speed and recommends the parameters for the next test cut. The iterative process between two transatlantic locations repeats until convergence to a stable optimal process parameter set is achieved.Keywords: machining stability, machine learning, sensor, optimization
Procedia PDF Downloads 20555 The Relevance of Environmental, Social, and Governance in Sustainable Supplier Selection
Authors: Christoph Koester
Abstract:
Supplier selection is one of the key issues in supply chain management with a growing emphasis on sustainability driven by increasing stakeholder expectations and proactivity. In addition, new regulations, such as the German Supply Chain Act, fostered the inclusion of sustainable incl. governance selection criteria in the selection process. In order to provide a systematic approach to select the most suitable sustainable suppliers, this study quantifies the importance and prioritizes the relevant selection criteria across 17 German industries using the Fuzzy Analytical Hierarchy Process. Results show that economic criteria are still the most important in the selection decision averaging a global weight of 51%. However, environmental, social, and governance (ESG) criteria are combined, on average, almost equally important, with global weights of 22%, 16%, and 11%, respectively. While the type of industry influences criteria weights, other factors, such as type of purchasing or demographic factors, appear to have little impact.Keywords: ESG, fuzzy analytical hierarchy process, sustainable supplier selection, sustainability
Procedia PDF Downloads 8554 Model-Based Process Development for the Comparison of a Radial Riveting and Roller Burnishing Process in Mechanical Joining Technology
Authors: Tobias Beyer, Christoph Friedrich
Abstract:
Modern simulation methodology using finite element models is nowadays a recognized tool for product design/optimization. Likewise, manufacturing process design is increasingly becoming the focus of simulation methodology in order to enable sustainable results based on reduced real-life tests here as well. In this article, two process simulations -radial riveting and roller burnishing- used for mechanical joining of components are explained. In the first step, the required boundary conditions are developed and implemented in the respective simulation models. This is followed by process space validation. With the help of the validated models, the interdependencies of the input parameters are investigated and evaluated by means of sensitivity analyses. Limit case investigations are carried out and evaluated with the aid of the process simulations. Likewise, a comparison of the two joining methods to each other becomes possible.Keywords: FEM, model-based process development, process simulation, radial riveting, roller burnishing, sensitivity analysis
Procedia PDF Downloads 10653 Large Neural Networks Learning From Scratch With Very Few Data and Without Explicit Regularization
Authors: Christoph Linse, Thomas Martinetz
Abstract:
Recent findings have shown that Neural Networks generalize also in over-parametrized regimes with zero training error. This is surprising, since it is completely against traditional machine learning wisdom. In our empirical study we fortify these findings in the domain of fine-grained image classification. We show that very large Convolutional Neural Networks with millions of weights do learn with only a handful of training samples and without image augmentation, explicit regularization or pretraining. We train the architectures ResNet018, ResNet101 and VGG19 on subsets of the difficult benchmark datasets Caltech101, CUB_200_2011, FGVCAircraft, Flowers102 and StanfordCars with 100 classes and more, perform a comprehensive comparative study and draw implications for the practical application of CNNs. Finally, we show that VGG19 with 140 million weights learns to distinguish airplanes and motorbikes with up to 95% accuracy using only 20 training samples per class.Keywords: convolutional neural networks, fine-grained image classification, generalization, image recognition, over-parameterized, small data sets
Procedia PDF Downloads 8752 The Impact of Governance Criteria in the Supplier Selection Process of Large German Companies
Authors: Christoph Köster
Abstract:
Supplier selection is one of the key challenges in supply chain management and can be considered a multi-criteria decision-making (MCDM) problem. In the 1960s, it evolved from considering only economic criteria, such as price, quality, and performance, to including environmental and social criteria nowadays. Although receiving considerable attention from scholars and practitioners over the past decades, existing research has not considered governance criteria so far. This is, however, surprising, as ESG (environmental, social, and governance) criteria have gained considerable attention. In order to complement ESG criteria in the supplier selection process, this study investigates German DAX and MDAX companies and evaluates the impact of governance criteria along their supplier selection process. Moreover, it proposes a set of criteria for the respective process steps. Specifically, eleven criteria for the first process step and five criteria for the second process step are identified. This paper contributes to a better understanding of the supplier selection process by elucidating the relevance of governance criteria in the supplier selection process and providing a set of empirically developed governance criteria. These results can be applied by practitioners to complement the criteria set in the supplier selection process and thus balance economic, environmental, social, and governance targets.Keywords: ESG, governance, sustainable supplier selection, sustainability
Procedia PDF Downloads 11751 Competition for Talent: Retaining Graduates in the Euregio Meuse-Rhine
Authors: Julia Reinold, Inge Hooijen, Christoph Meng, Melissa Siegel
Abstract:
This paper investigates whether or not students intend to stay in the Euregio Meuse-Rhine (EMR) after graduation taking into account the role of hard and soft locational factors, social factors as well as demographic aspects in shaping their mobility preferences. Since graduates are considered a convenient source of human capital in today’s knowledge based economy, it is crucial to understand what drives their mobility intentions in order to retain larger numbers of graduates. This is particularly true for peripheral regions, which need to compete with assumed more attractive economic centres. This paper adds a euregional perspective to the existing literature on graduate migration. Using survey data from 2015 from five higher education institutions in the EMR, this paper finds that mobility intentions are determined by students’ perceptions of the quality of life, openness and career opportunities in the euroregion. In addition, distance to the partner and other social ties such as family and friends influence migration intentions.Keywords: Euroregion, graduate migration, highly skilled migration, human capital
Procedia PDF Downloads 27450 On the Transition of Europe’s Power Sector: Economic Consequences of National Targets
Authors: Geoffrey J. Blanford, Christoph Weissbart
Abstract:
The prospects for the European power sector indicate that it has to almost fully decarbonize in order to reach the economy-wide target of CO2-emission reduction. We apply the EU-REGEN model to explain the penetration of RES from an economic perspective, their spatial distribution, and the complementary role of conventional generation technologies. Furthermore, we identify economic consequences of national energy and climate targets. Our study shows that onshore wind power will be the most crucial generation technology for the future European power sector. Its geographic distribution is driven by resource quality. Gas power will be the major conventional generation technology for backing-up wind power. Moreover, a complete phase out of coal power proves to be not economically optimal. The paper demonstrates that existing national targets have a negative impact, especially on the German region with higher prices and lower revenues. The remaining regions profit are hardly affected. We encourage an EU-wide coordination on the expansion of wind power with harmonized policies. Yet, this requires profitable market structures for both, RES and conventional generation technologies.Keywords: European, policy evaluation, power sector investment, technology choices
Procedia PDF Downloads 28349 Geographic Information System for District Level Energy Performance Simulations
Authors: Avichal Malhotra, Jerome Frisch, Christoph van Treeck
Abstract:
The utilization of semantic, cadastral and topological data from geographic information systems (GIS) has exponentially increased for building and urban-scale energy performance simulations. Urban planners, simulation scientists, and researchers use virtual 3D city models for energy analysis, algorithms and simulation tools. For dynamic energy simulations at city and district level, this paper provides an overview of the available GIS data models and their levels of detail. Adhering to different norms and standards, these models also intend to describe building and construction industry data. For further investigations, CityGML data models are considered for simulations. Though geographical information modelling has considerably many different implementations, extensions of virtual city data can also be made for domain specific applications. Highlighting the use of the extended CityGML models for energy researches, a brief introduction to the Energy Application Domain Extension (ADE) along with its significance is made. Consequently, addressing specific input simulation data, a workflow using Modelica underlining the usage of GIS information and the quantification of its significance over annual heating energy demand is presented in this paper.Keywords: CityGML, EnergyADE, energy performance simulation, GIS
Procedia PDF Downloads 16748 Rotor Concepts for the Counter Flow Heat Recovery Fan
Authors: Christoph Speer
Abstract:
Decentralized ventilation systems should combine a small and economical design with high aerodynamic and thermal efficiency. The Counter Flow Heat Recovery Fan (CHRF) provides the ability to meet these requirements by using only one cross flow fan with a large number of blades to generate both airflows and which simultaneously acts as a regenerative counter flow heat exchanger. The successful development of the first laboratory prototype has shown the potential of this ventilation system. Occurring condensate on the surfaces of the fan blades during the cold and dry season can be recovered through the characteristic mode of operation. Hence the CHRF provides the possibility to avoid the need for frost protection and condensate drain. Through the implementation of system-specific solutions for flow balancing and summer bypass the required functionality is assured. The scalability of the CHRF concept allows the use in renovation as well as in new buildings from single-room devices through to systems for office buildings. High aerodynamic and thermal efficiency and the lower number of required mechatronic components should enable a reduction in investment as well as operating costs. The rotor is the key component of the system, the requirements and possible implementation variants are presented.Keywords: CHRF, counter flow heat recovery fan, decentralized ventilation system, renovation
Procedia PDF Downloads 35247 Growing Architecture, Technical Product Harvesting of Near Net Shape Building Components
Authors: Franziska Moser, Martin Trautz, Anna-Lena Beger, Manuel Löwer, Jörg Feldhusen, Jürgen Prell, Alexandra Wormit, Björn Usadel, Christoph Kämpfer, Thomas-Benjamin Seiler, Henner Hollert
Abstract:
The demand for bio-based materials and components in architecture has increased in recent years due to society’s heightened environmental awareness. Nowadays, most components are being developed via a substitution approach, which aims at replacing conventional components with natural alternatives who are then being processed, shaped and manufactured to fit the desired application. This contribution introduces a novel approach to the development of bio-based products that decreases resource consumption and increases recyclability. In this approach, natural organisms like plants or trees are not being used in a processed form, but grow into a near net shape before then being harvested and utilized as building components. By minimizing the conventional production steps, the amount of resources used in manufacturing decreases whereas the recyclability increases. This paper presents the approach of technical product harvesting, explains the theoretical basis as well as the matching process of product requirements and biological properties, and shows first results of the growth manipulation studies.Keywords: design with nature, eco manufacturing, sustainable construction materials, technical product harvesting
Procedia PDF Downloads 49946 Characteristics of Football Spectators Using Second Screen
Authors: Florian Pfeffel, Christoph A. Kexel, Peter Kexel, Maria Ratz
Abstract:
The parallel usage of different media channels has increased recently owing to technological advances. Second Screen describes the use of a second device by television viewers to consume further content which is related to the program they are watching. This study analysed the characteristics of football spectators regarding their media consumption in relation to Second Screen usage while watching a football match on TV. The existing literature on Second Screen usage is still very limited, especially in the context of particular broadcasting settings such as sport or even more specific such as football matches. Therefore, the primary research objective was to reveal first insights into the user behaviour of football spectators regarding Second Screen services. The survey, which was conducted among German football supporters in 2015, revealed some characteristics such as the identification and involvement into the sports which are related to an increased use of Second Screen services. One important finding for football supporters was that at the time of a match they have a lower parallel media usage compared to other TV broadcastings. Nevertheless, if supporters used a second device while watching a match on TV, then they were using specific Second Screen services. This means they searched for more content related information. The findings on the habits and characteristics of people who are using Second Screen services are relevant for future developments in that area as well as for marketing decisions.Keywords: media consumption, second screen, sport marketing, user behaviour
Procedia PDF Downloads 38845 Analysing Techniques for Fusing Multimodal Data in Predictive Scenarios Using Convolutional Neural Networks
Authors: Philipp Ruf, Massiwa Chabbi, Christoph Reich, Djaffar Ould-Abdeslam
Abstract:
In recent years, convolutional neural networks (CNN) have demonstrated high performance in image analysis, but oftentimes, there is only structured data available regarding a specific problem. By interpreting structured data as images, CNNs can effectively learn and extract valuable insights from tabular data, leading to improved predictive accuracy and uncovering hidden patterns that may not be apparent in traditional structured data analysis. In applying a single neural network for analyzing multimodal data, e.g., both structured and unstructured information, significant advantages in terms of time complexity and energy efficiency can be achieved. Converting structured data into images and merging them with existing visual material offers a promising solution for applying CNN in multimodal datasets, as they often occur in a medical context. By employing suitable preprocessing techniques, structured data is transformed into image representations, where the respective features are expressed as different formations of colors and shapes. In an additional step, these representations are fused with existing images to incorporate both types of information. This final image is finally analyzed using a CNN.Keywords: CNN, image processing, tabular data, mixed dataset, data transformation, multimodal fusion
Procedia PDF Downloads 12244 Metagenomics Composition During and After Wet Deposition and the Presence of Airborne Microplastics
Authors: Yee Hui Lim, Elena Gusareva, Irvan Luhung, Yulia Frank, Stephan Christoph Schuster
Abstract:
Environmental pollution from microplastics (MPs) is an emerging concern worldwide. While the presence of microplastics has been well established in the marine and terrestrial environments, the prevalence of microplastics in the atmosphere is still poorly understood. Wet depositions such as rain or snow scavenge impurities from the atmosphere as it falls to the ground. These wet depositions serve as a useful tool in the removal of airborne particles that are suspended in the air. Therefore, the aim of this study is to investigate the presence of atmospheric microplastics and fibres through the analysis of air, rainwater and snow samples. Air samples were collected with filter-based air samplers from outdoor locations in Singapore. The sampling campaigns were conducted during and after each rain event. Rainwater samples from Singapore and Siberia were collected as well. Snow samples were also collected from Siberia as part of the ongoing study. Genomic DNA was then extracted from the samples and sequenced with shotgun metagenomics approach. qPCR analysis was conducted to quantify the total bacteria and fungi in the air, rainwater and snow samples. The results compared the bioaerosol profiles of all the samples. To observe the presence of microplastics, scanning electron microscope (SEM) was used. From the preliminary results, microplastics were detected. It can be concluded that there is a significant amount of atmospheric microplastics present, and its occurrence should be investigated in greater detail.Keywords: atmospheric microplastics, metagenomics, scanning electron microscope, wet deposition
Procedia PDF Downloads 8643 Structural Development and Multiscale Design Optimization of Additively Manufactured Unmanned Aerial Vehicle with Blended Wing Body Configuration
Authors: Malcolm Dinovitzer, Calvin Miller, Adam Hacker, Gabriel Wong, Zach Annen, Padmassun Rajakareyar, Jordan Mulvihill, Mostafa S.A. ElSayed
Abstract:
The research work presented in this paper is developed by the Blended Wing Body (BWB) Unmanned Aerial Vehicle (UAV) team, a fourth-year capstone project at Carleton University Department of Mechanical and Aerospace Engineering. Here, a clean sheet UAV with BWB configuration is designed and optimized using Multiscale Design Optimization (MSDO) approach employing lattice materials taking into consideration design for additive manufacturing constraints. The BWB-UAV is being developed with a mission profile designed for surveillance purposes with a minimum payload of 1000 grams. To demonstrate the design methodology, a single design loop of a sample rib from the airframe is shown in details. This includes presentation of the conceptual design, materials selection, experimental characterization and residual thermal stress distribution analysis of additively manufactured materials, manufacturing constraint identification, critical loads computations, stress analysis and design optimization. A dynamic turbulent critical load case was identified composed of a 1-g static maneuver with an incremental Power Spectral Density (PSD) gust which was used as a deterministic design load case for the design optimization. 2D flat plate Doublet Lattice Method (DLM) was used to simulate aerodynamics in the aeroelastic analysis. The aerodynamic results were verified versus a 3D CFD analysis applying Spalart-Allmaras and SST k-omega turbulence to the rigid UAV and vortex lattice method applied in the OpenVSP environment. Design optimization of a single rib was conducted using topology optimization as well as MSDO. Compared to a solid rib, weight savings of 36.44% and 59.65% were obtained for the topology optimization and the MSDO, respectively. These results suggest that MSDO is an acceptable alternative to topology optimization in weight critical applications while preserving the functional requirements.Keywords: blended wing body, multiscale design optimization, additive manufacturing, unmanned aerial vehicle
Procedia PDF Downloads 37342 PaSA: A Dataset for Patent Sentiment Analysis to Highlight Patent Paragraphs
Authors: Renukswamy Chikkamath, Vishvapalsinhji Ramsinh Parmar, Christoph Hewel, Markus Endres
Abstract:
Given a patent document, identifying distinct semantic annotations is an interesting research aspect. Text annotation helps the patent practitioners such as examiners and patent attorneys to quickly identify the key arguments of any invention, successively providing a timely marking of a patent text. In the process of manual patent analysis, to attain better readability, recognising the semantic information by marking paragraphs is in practice. This semantic annotation process is laborious and time-consuming. To alleviate such a problem, we proposed a dataset to train machine learning algorithms to automate the highlighting process. The contributions of this work are: i) we developed a multi-class dataset of size 150k samples by traversing USPTO patents over a decade, ii) articulated statistics and distributions of data using imperative exploratory data analysis, iii) baseline Machine Learning models are developed to utilize the dataset to address patent paragraph highlighting task, and iv) future path to extend this work using Deep Learning and domain-specific pre-trained language models to develop a tool to highlight is provided. This work assists patent practitioners in highlighting semantic information automatically and aids in creating a sustainable and efficient patent analysis using the aptitude of machine learning.Keywords: machine learning, patents, patent sentiment analysis, patent information retrieval
Procedia PDF Downloads 8941 Brain Networks and Mathematical Learning Processes of Children
Authors: Felicitas Pielsticker, Christoph Pielsticker, Ingo Witzke
Abstract:
Neurological findings provide foundational results for many different disciplines. In this article we want to discuss these with a special focus on mathematics education. The intention is to make neuroscience research useful for the description of cognitive mathematical learning processes. A key issue of mathematics education is that students often behave as if their mathematical knowledge is constructed in isolated compartments with respect to the specific context of the original learning situation; supporting students to link these compartments to form a coherent mathematical society of mind is a fundamental task not only for mathematics teachers. This aspect goes hand in hand with the question if there is such a thing as abstract general mathematical knowledge detached from concrete reality. Educational Neuroscience may give answers to the question why students develop their mathematical knowledge in isolated subjective domains of experience and if it is generally possible to think in abstract terms. To address these questions, we will provide examples from different fields of mathematics education e.g. students’ development and understanding of the general concept of variables or the mathematical notion of universal proofs. We want to discuss these aspects in the reflection of functional studies which elucidate the role of specific brain regions in mathematical learning processes. In doing this the paper addresses concept formation processes of students in the mathematics classroom and how to support them adequately considering the results of (educational) neuroscience.Keywords: brain regions, concept formation processes in mathematics education, proofs, teaching-learning processes
Procedia PDF Downloads 14840 Cost Valuation Method for Development Concurrent, Phase Appropriate Requirement Valuation Using the Example of Load Carrier Development in the Lithium-Ion-Battery Production
Authors: Achim Kampker, Christoph Deutskens, Heiner Hans Heimes, Mathias Ordung, Felix Optehostert
Abstract:
In the past years electric mobility became part of a public discussion. The trend to fully electrified vehicles instead of vehicles fueled with fossil energy has notably gained momentum. Today nearly every big car manufacturer produces and sells fully electrified vehicles, but electrified vehicles are still not as competitive as conventional powered vehicles. As the traction battery states the largest cost driver, lowering its price is a crucial objective. In addition to improvements in product and production processes a non-negligible, but widely underestimated cost driver of production can be found in logistics, since the production technology is not continuous yet and neither are the logistics systems. This paper presents an approach to evaluate cost factors on different designs of load carrier systems. Due to numerous interdependencies, the combination of costs factors for a particular scenario is not transparent. This is effecting actions for cost reduction negatively, but still cost reduction is one of the major goals for simultaneous engineering processes. Therefore a concurrent and phase appropriate cost valuation method is necessary to serve cost transparency. In this paper the four phases of this cost valuation method are defined and explained, which based upon a new approach integrating the logistics development process in to the integrated product and process development.Keywords: research and development, technology and innovation, lithium-ion-battery production, load carrier development process, cost valuation method
Procedia PDF Downloads 59339 Laser-Hole Boring into Overdense Targets: A Detailed Study on Laser and Target Properties
Authors: Florian Wagner, Christoph Schmidt, Vincent Bagnoud
Abstract:
Understanding the interaction of ultra-intense laser pulses with overcritical targets is of major interest for many applications such as laser-driven ion acceleration, fast ignition in the frame of inertial confinement fusion or high harmonic generation and the creation of attosecond pulses. One particular aspect of this interaction is the shift of the critical surface, where the laser pulse is stopped and the absorption is at maximum, due to the radiation pressure induced by the laser pulse, also referred to as laser hole boring. We investigate laser-hole boring experimentally by measuring the backscattered spectrum which is doppler-broadened because of the movement of the reflecting surface. Using the high-power, high-energy laser system PHELIX in Darmstadt, we gathered an extensive set of data for different laser intensities ranging from 10^18 W/cm2 to 10^21 W/cm2, two different levels of the nanosecond temporal contrast (10^6 vs. 10^11), elliptical and linear polarization and varying target configurations. In this contribution we discuss how the maximum velocity of the critical surface depends on these parameters. In particular we show that by increasing the temporal contrast the maximum hole boring velocity is decreased by more than a factor of three. Our experimental findings are backed by a basic analytical model based on momentum and mass conservation as well as particle in cell simulations. These results are of particular importance for fast ignition since they contribute to a better understanding of the transport of the ignitor pulse into the overdense region.Keywords: laser-hole boring, interaction of ultra-intense lasers with overcritical targets, fast ignition, relativistic laser motter interaction
Procedia PDF Downloads 403