Refine
Year of publication
Document Type
- Conference Proceeding (44)
- Article (reviewed) (9)
- Contribution to a Periodical (6)
- Part of a Book (5)
- Patent (4)
- Article (unreviewed) (3)
- Book (1)
Conference Type
- Konferenzartikel (38)
- Konferenz-Abstract (3)
- Konferenz-Poster (2)
- Sonstiges (1)
Keywords
- E-Learning (6)
- Couplings (3)
- Design automation (3)
- Finite difference methods (3)
- Finite-Elemente-Methode (3)
- Mobile Learning (3)
- Virtuelle Realität (3)
- mobile learning (3)
- Algorithmus (2)
- Blended Learning (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (63)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (11)
- Zentrale Einrichtungen (2)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (1)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (1)
Open Access
- Open Access (29)
- Closed (24)
- Bronze (14)
- Closed Access (7)
- Gold (1)
The invention concerns a method for spectrum monitoring a given frequency band, in which the spectral power density (S(f)) within the given frequency band is determined for all noise and signal components in the frequency band and, in order to detect the presence of one or more signals within the given frequency band, it is evaluated whether the spectral power density (S(f)) exceeds a threshold value (&lgr;). According to the invention, the threshold value (&lgr;) is calculated in accordance with an estimation of a distribution density (hR(S)) for the noise component of the spectral power density (S(f)) within the given frequency band and in accordance with a predefined value for the false-alarm probability (Pfa).
“Today’s network landscape consists of quite different network technologies, wide range of end-devices with large scale of capabilities and power, and immense quantity of information and data represented in different formats” [9]. A lot of efforts are being done in order to establish open, scalable and seamless integration of various technologies and content presentation for different devices including mobile considering individual situation of the end user. This is very difficult because various kinds of devices used by different users or in different times/parallel by the same user which is not predictable and have to be recognized by the system in order to know device capabilities. Not only the devices but also Content and User Interfaces are big issues because they could include different kinds of data format like text, image, audio, video, 3D Virtual Reality data and upcoming other formats. Language Learning Game (LLG) is such an example of a device independent application where different kinds of devices and data formats, as a content of a flashcard is used for a collaborative learning. The idea of this game is to create a short story in a foreign language by using mobile devices. The story is developed by a group of participants by exchanging sentences/data via a flashcard system. This way the participants can learn from each other by knowledge sharing without fear of making mistakes because the group members are anonymous. Moreover they do not need a constant support from a teacher.
We consider the local group of agents for exchanging the time-series data value and computing the approximation of the mean value of all agents. An agent represented by a node knows all local neighbor nodes in the same group. The node has the contact information of other nodes in other groups. The nodes interact with each other in synchronous rounds to exchange the updated time-series data value using the random call communication model. The amount of data exchanged between agent-based sensors in the local group network affects the accuracy of the aggregation function results. At each time step, the agent-based sensor can update the input data value and send the updated data value to the group head node. The group head node sends the updated data value to all group members in the same group. Grouping nodes in peer-to-peer networks show an improvement in Mean Squared Error (MSE).
Data is ever increasing in the computing world. Due to advancement of cloud technology the dynamics of volumes of data and its capacity has increased within a short period of time and will keep increasing further. Providing transparency, privacy, and security to the cloud users is becoming more and more challenging along with the volume of data and use of cloud services. We propose a new approach to address the above mentioned challenge by recording the user events in the cloud ecosystem into log files and applying MAR principle namely 1) Monitoring 2) Analyzing and 3) Reporting.
E-Tutoren-Ausbildung: Lernerfahrungen reflektieren – Lehrhandlungskompetenzen dialogisch aufbauen
(2014)
To provide proper solutions to the problem of device dependant content delivery, a fine categorization of the application target devices is needed. Earlier attempts provided two different presentations for desktop and mobile platforms. The mobile platform presentation was divided into three categories, based on a general classification (PDA, Smartphone or mobile phone). In order to improve the on mobile device presentation a finer categorization is introduced. In this paper, our focus is to clarify the concept of this more flexible presentation module, in which the delivered content depends on the efficiency of the device based on a selected set of capabilities.
The improvements in the hardware and software of communication devices have allowed running Virtual Reality (VR) and Augmented Reality (AR) applications on those. Nowadays, it is possible to overlay synthetic information on real images, or even to play 3D on-line games on smart phones or some other mobile devices. Hence the use of 3D data for business and specially for education purposes is ubiquitous. Due to always available at hand and always ready to use properties of mobile phones, those are considered as most potential communication devices. The total numbers of mobile phone users are increasing all over the world every day and that makes mobile phones the most suitable device to reach a huge number of end clients either for education or for business purposes. There are different standards, protocols and specifications to establish the communication among different communication devices but there is no initiative taken so far to make it sure that the send data through this communication process will be understood and used by the destination device. Since all the devices are not able to deal with all kind of 3D data formats and it is also not realistic to have different version of the same data to make it compatible with the destination device, it is necessary to have a prevalent solution. The proposed architecture in this paper describes a device and purpose independent 3D data visibility any time anywhere to the right person in suitable format. There is no solution without limitation. The architecture is implemented in a prototype to make an experimental validation of the architecture which also shows the difference between theory and practice.
Cloud computing is the emerging technology providing IT as a utility through internet. The benefits of cloud computing are but not limited to service based, scalable, elastic, shared pool of resources, metered by use. Due to mentioned benefits the concept of cloud computing fits very well with the concept of m-learning which differs from other forms of e-learning, covers a wide range of possibilities opened up by the convergence of new mobile technologies, wireless communication structure and distance learning development. The concept of cloud computing like any other concept has not only benefits but also introduces myriad of security issues, such as transparency between cloud user and provider, lack of standards, security concerns related to identity, Service Level Agreements (SLA) inadequacy etc. Providing secure, transparent, and reliable services in cloud computing environment is an important issue. This paper introduces a secured three layered architecture with an advance Intrusion Detection System (advIDS), which overcomes different vulnerabilities on cloud deployed applications. This proposed architecture can reduce the impact of different attacks by providing timely alerts, rejecting the unauthorized access over services, and recording the new threat profiles for future verification. The goal of this research is to provide more control over data and applications to the cloud user, which are now mainly controlled by Cloud Service Provider (CSP).
This paper shows the results of the evaluation of two sets of mobile web design guidelines concerning mobile learning. The first set of guidelines is concerned with the usage of text on mobile device screens. The second set is concerned with the usage of images on mobile devices. The evaluation is performed by eye tracking (objective) as well as questionnaires and interviews (subjective) respectively.
The idea of this game is to use a flashcard system to create a short story in a foreign language. The story is developed by a group of people by exchanging sentences via a flashcard system. This way, people can learn from each other without fear of making mistakes because the group members are anonymous.