Refine
Year of publication
Document Type
- Conference Proceeding (185)
- Article (reviewed) (43)
- Master's Thesis (37)
- Part of a Book (13)
- Bachelor Thesis (5)
- Book (3)
- Contribution to a Periodical (3)
- Letter to Editor (3)
- Doctoral Thesis (1)
- Other (1)
Conference Type
- Konferenzartikel (167)
- Konferenz-Abstract (9)
- Konferenzband (5)
- Konferenz-Poster (3)
- Sonstiges (1)
Language
- English (294) (remove)
Keywords
- Finite-Elemente-Methode (4)
- IT-Sicherheit (4)
- Künstliche Intelligenz (4)
- Machine Learning (4)
- 3D printing (3)
- Applied computing (3)
- Biomechanik (3)
- Blockchain (3)
- Couplings (3)
- Deep Leaning (3)
Institute
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (77)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (70)
- Fakultät Wirtschaft (W) (65)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (58)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (26)
- Fakultät Medien (M) (ab 22.04.2021) (25)
- INES - Institut für nachhaltige Energiesysteme (15)
- IMLA - Institute for Machine Learning and Analytics (10)
- IBMS - Institute for Advanced Biomechanics and Motion Studies (ab 16.11.2022) (8)
- POIM - Peter Osypka Institute of Medical Engineering (7)
Open Access
- Closed (294) (remove)
In this study, circular economy (CE) relevance in Germany will be discussed based on LinkedIn readily available data. LinkedIn company profiles located in Germany with ‘circular economy’ in their description or any other field were selected and used as a data source to analyze their CE relation. Overall, 514 German companies were analyzed in reference to the 15 German regions they belong. Most companies are located in the federal state of Berlin (126), followed by North Rhine-Westphalia (96) and Bavaria (77). In terms of the industry sector, they are self-classified to environmental services (64), management consulting (50), renewables & environment (33), research (31), and computer software (18) etc. Regarding their employees with LinkedIn profiles, 22,621 people are affiliated with these companies, ranging from one to 7,877. All examined companies have a total of 819,632 followers on LinkedIn, ranging from none to 88,167. An increase in CE-related companies was recorded in 13 of the 16 federal states of Germany over a one-year period. This work provides essential insights into the increasing relevance and trends of the circular economy in German enterprises and will help conduct further national studies with readily available data from LinkedIn.
Vortex breakdown phenomena in rotating fluids are investigated both theoretically and experimentally. The fluid is contained in a cone between two spherical surfaces. The primary swirling motion is induced ba the rotating lower boundary. The upper surface can be fixed with non-slip condition or can be a stress-free surface. Depending on these boundary conditions and on the Reynolds number, novel structures of recirculation zones are realized. The axisymmetric flow patterns are simulated numerically by a finite difference method. Experiments are done to visualize the topological structure of the flow pattern and to observe the existence ranges of the different recirculating flows. The comparison between theory and experiment shows good agreement with respect to the topological structure of the flow.
Nowadays the processing power of mobile phones, Smart phones and PDA is increasing, as well as the transmission bandwidth. Nevertheless there is still the need to reduce the content and the need of processing the data. Proposals and solutions for dynamic reduction of the transmitted content will be discussed. For that, device specific properties will be taken into account, aiming at reducing the need of processing power at the client side to display the 3D Virtual Reality data. Therefore, well known technologies like data compression are combined with new approaches to achieve the goal of adaptive content transmission. For device dependant reduction of processing power the data has to be pre-processed at the server side or the server itself has to take over functionality of weak mobile devices.
The importance of machine learning (ML) has been increasing dramatically for years. From assistance systems to production optimisation to healthcare support, almost every area of daily life and industry is coming into contact with machine learning. Besides all the benefits ML brings, the lack of transparency and difficulty in creating traceability pose major risks. While solutions exist to make the training of machine learning models more transparent, traceability is still a major challenge. Ensuring the identity of a model is another challenge, as unnoticed modification of a model is also a danger when using ML. This paper proposes to create an ML Birth Certificate and ML Family Tree secured by blockchain technology. Important information about training and changes to the model through retraining can be stored in a blockchain and accessed by any user to create more security and traceability about an ML model.
Marketing and sales have high expectations of new methods such as Big Data, artificial intelligence, machine learning, and predictive analytics. But following the “garbage in—garbage out” principle, the results leave much to be desired. The reason is often insufficient quality in the underlying customer data. This article sheds light on this problem using the data quality and value pyramid as an example. The higher up the value-added pyramid the data is located, the higher its quality and the more value it generates for a company. In addition, we show how the use of monitoring systems, such as a data quality scorecard, makes data quality visible and improvements measurable. In this way, the actual value of data for companies becomes obvious and manageable.
Additive manufacturing offers completely new production technologies thanks to the layered structure and the simultaneous processing of several materials. In order to exploit the potential of this new technology, it is already necessary in product development to consider the components no longer as monolithic blocks, but as a structure of many layers and individual elements (voxels). Therefore, this paper will examine the current state of voxel-based CAD systems and the subsequent 3D multi-material printing of the designed components. Different voxel-based CAD systems are used and analyzed for component design and a sample component is additively manufactured. The results show that simple components can be designed using voxel-based CAD systems. With the application of 3D multi-material printing, different materials and thus functions can be assigned to the designed voxel-based CAD-model.
This textbook helps use regenerative systems for heating and cooling effectively. Integration and automation schemes provide a quick overview. Practical examples clearly show standard solutions for the integration of regenerative energy sources. For the 2nd edition, improvements have been made to the text and illustrations, and references to standards have been updated. Control questions at the end of the main chapters serve to consolidate the understanding of the content.
A method for evaluating skin cancer detection based on millimeter-wave technologies is presented. For this purpose, the relative permittivities are calculated using the effective medium theory for the benign and cancerous lesion, considering the change in water content between them. These calculated relative permittivities are further used for the simulation and evaluation of skin cancer detection using a substrate-integrated waveguide probe. A difference in the simulated scattering parameters S 11 of up to 13dB between healthy and cancerous skin can be determined in the best-case.
An organized strategy to ensure the security of an organization is an information security management system. During various security crises, hazards, and breaches, this strategy aids an organization in maintaining the confidentiality, integrity, and accessibility of information. Organizations are getting ready to comply with information security management system criteria. Despite this, security concerns continue to plague ineffective controls, have poor connectivity, or cause a silo effect, which is a common cause. One of the causes is a low maturity model that is not synchronized with the organization’s business processes. For a higher level of maturity, it is best to evaluate the practices.
Different maturity models on information security and cyber security capacity, management processes, security controls, implementation level, and many more have already been developed by numerous international organizations, experts, and scholars. The present models, however, do not assess a particular organization's particular practices. The evaluation of the business process is frequently neglected because measurement requirements for models are typically more concentrated on examining specific elements. For this reason, it caused the maturity assessment to not be executed explicitly and broadly.
We developed an organizational information security maturity model, a combination of work of different maturity models currently existing. While making this model, we considered that any size or type of organization could use this model. The model considers the success elements of the information security management system when assessing the implementation's effectiveness. We employed a mixed-method strategy that included both qualitative and quantitative research. With the help of a questionnaire survey, we evaluated the previous research using a qualitative methodology. In the quantitative method, we'll figure out how mature the information security management system is now. The proposed model could be used to reduce security incidents by improving implementation gaps.