Refine
Year of publication
Document Type
- Conference Proceeding (485)
- Article (reviewed) (347)
- Article (unreviewed) (111)
- Part of a Book (58)
- Contribution to a Periodical (34)
- Book (21)
- Other (21)
- Letter to Editor (13)
- Study Thesis (12)
- Bachelor Thesis (10)
Language
- English (1141) (remove)
Keywords
- Dünnschichtchromatographie (26)
- Kommunikation (16)
- COVID-19 (13)
- Energieversorgung (11)
- Gamification (11)
- Government Measures (11)
- Intelligentes Stromnetz (11)
- Adsorption (10)
- Batterie (9)
- Brennstoffzelle (9)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (395)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (300)
- Fakultät Betriebswirtschaft und Wirtschaftsingenieurwesen (B+W) (152)
- Fakultät Medien und Informationswesen (M+I) (143)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (135)
- INES - Institut für Energiesystemtechnik (87)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (77)
- ACI - Affective and Cognitive Institute (42)
- IfTI - Institute for Trade and Innovation (25)
- Zentrale Einrichtungen (13)
First year Business Administration students tend to regard themselves as “non-computer scientists” and often have a lack of motivation about taking IT courses in general, either because they perceive them as too technical, too difficult or somewhat irrelevant. In an attempt to counteract this perception and increase the levels of engagement and willing attendance to class, we decided to flip the traditional lecture model and develop a new teaching and learning approach for the IT Fundamentals course using an open source Enterprise Resource Planning (ERP) system as the platform from which to draw the various underlying IT concepts and through which the relevant competences can be acquired.
This paper describes the implementation process of this new contextualized learning framework “IT via ERP” and the changes in the didactical methods to support it.
The development of secure software systems is of ever-increasing importance. While software companies often invest large amounts of resources into the upkeeping and general security properties of large-scale applications when in production, they appear to neglect utilizing threat modeling in the earlier stages of the software development lifecycle. When applied during the design phase of development, and continuously throughout development iterations, threat modeling can help to establish a "Secure by Design" approach. This approach allows issues relating to IT security to be found early during development, reducing the need for later improvement – and thus saving resources in the long term. In this paper the current state of threat modeling is investigated. This investigation drove the derivation of requirements for the development of a new threat modelling framework and tool, called OVVL. OVVL utilizes concepts of established threat modeling methodologies, as well as functionality not available in existing solutions.
In the course of the last few years, our students are becoming increasingly unhappy. Sometimes they stop attending lectures and even seem not to know how to behave correctly. It feels like they are getting on strike. Consequently, drop-out rates are sky-rocketing. The lecturers/professors are not happy either, adopting an “I-don’t-care” attitude.
An interdisciplinary, international team set in to find out: (1) What are the students unhappy about? Why is it becoming so difficult for them to cope? (2) What does the “I-don’t-care” attitude of professors actually mean? What do they care or not care about? (3) How far do the views of the parties correlate? Could some kind of mutual understanding be achieved?
The findings indicate that, at least at our universities, there is rather a long way to go from “Engineering versus Pedagogy” to “Engineering Pedagogy”.
Enthält die Artikel:
"Smoothie:a solution for device and content independent applications including 3D imaging as content" von Razia Sultana und Andreas Christ, S. 13-18
"Future of Logging in the Crisis of Cloud Security", von Sai Manoj Marepalli, Razia Sultana und Andreas Christ, S. 60-64
Enthält die Artikel:
"CPU-based Covert- and Side-Channels in Cloud Ecosystems" von Johann Betz und Dirk Westhoff, S. 19-23
"The overview of Public Key Infrastructure based security approaches for vehicular communications" von Artem Yushev und Axel Sikora, S. 30-35
"Testing Embedded TLS Implementations Using Fuzzing Techniques and Differential Testing" von Andreas Walz und Axel Sikora, S. 36-40
Knight Götz von Berlichingen (1480–1562) lost his right hand distal to the wrist due to a cannon ball splinter injury in 1504 in the Landshut War of Succession at the age of 24. Early on, Götz commissioned a gunsmith to build the first “Iron Hand,” in which the artificial thumb and two finger blocks could be moved in their basic joints by a spring mechanism and released by a push button. Some years later, probably around 1530, a second “Iron Hand” was built, in which the fingers could be moved passively in all joints. In this review, the 3D computer-aided design (CAD) reconstructions and 3D multi-material polymer replica printings of the first “Iron hand“, which were developed in the last few years at Offenburg University, are presented. Even by today’s standards, the first “Iron Hand”—as could be shown in the replicas—demonstrates sophisticated mechanics and well thought-out functionality and still offers inspiration and food for discussion when it comes to the question of an artificial prosthetic replacement for a hand. It is also outlined how some of the ideas of this mechanical passive prosthesis can be translated into a modern motorized active prosthetic hand by using simple, commercially available electronic components.
Recent developments in information and communication technology, along with advanced displaying techniques and high computational performance open up new visualisation methods to both scientists and lecturers. Thus simulations of complex processes [1] can be computed and visualised in image sequences. The particular idea in our approach is the outsourcing of computationally intensive calculations to servers which then send the results back to mobile users. In order to improve interpretations of the visualised results, users can view them in a 3D-perspective or stereoscopically, given the technical requirements. Today’s technology even permits to view these visualisations on a mobile phone. An example for such a computationally intensive calculation originating from the theory of relativity is depicted in Figure 4.1-1.
Background: This paper presents a novel approach for a hand prosthesis consisting of a flexible, anthropomorphic, 3D-printed replacement hand combined with a commercially available motorized orthosis that allows gripping.
Methods: A 3D light scanner was used to produce a personalized replacement hand. The wrist of the replacement hand was printed of rigid material; the rest of the hand was printed of flexible material. A standard arm liner was used to enable the user’s arm stump to be connected to the replacement hand. With computer-aided design, two different concepts were developed for the scanned hand model: In the first concept, the replacement hand was attached to the arm liner with a screw. The second concept involved attaching with a commercially available fastening system; furthermore, a skeleton was designed that was located within the flexible part of the replacement hand.
Results: 3D-multi-material printing of the two different hands was unproblematic and inexpensive. The printed hands had approximately the weight of the real hand. When testing the replacement hands with the orthosis it was possible to prove a convincing everyday functionality. For example, it was possible to grip and lift a 1-L water bottle. In addition, a pen could be held, making writing possible.
Conclusions: This first proof-of-concept study encourages further testing with users.