Refine
Year of publication
Document Type
- Conference Proceeding (37)
- Contribution to a Periodical (5)
- Bachelor Thesis (4)
- Article (reviewed) (3)
- Part of a Book (3)
- Working Paper (3)
- Book (1)
- Doctoral Thesis (1)
- Master's Thesis (1)
- Article (unreviewed) (1)
Conference Type
- Konferenzartikel (30)
- Konferenzband (5)
- Sonstiges (2)
- Konferenz-Poster (1)
Language
- English (60) (remove)
Keywords
- Optik (4)
- Photonik (4)
- Communication Systems (3)
- Information Systems (3)
- Licht (3)
- Robotics (3)
- Virtuelle Realität (3)
- E-Learning (2)
- Education in Optics and Photonics (2)
- Gamification (2)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (60) (remove)
Open Access
- Open Access (60) (remove)
Strings
(2020)
This article presents the currently ongoing development of an audiovisual performance work with the title Strings. This work provides an improvisation setting for a violinist, two laptop performers, and two generative systems. At the core of Strings lies an approach that establishes a strong correlation among all participants by means of a shared physical principle. The physical principle is that of a vibrating string. The article discusses how this principle is used in both natural and simulated forms as main interaction layer between all performers and as natural or generative principle for creating audio and video.
This paper describes the new Sweaty humanoid adult size robot trying to qualify for the RoboCup 2014 adult size humanoid competition. The robot is built from scratch to eventually allow it to run. One characteristic is that to prevent the motors from overheating, water evaporation is used for cooling. The robot is literally sweating which has given it its name. Another characteristic is, that the motors are not directly connected to the frame but by means of beams. This allows a variable transmission ratio depending on the angle.
Logging information is more precious as it contains the execution of a system; it is produced by millions of events from simple application logins to random system errors. Most of the security related problems in the cloud ecosystem like intruder attacks, data loss, and denial of service, etc. could be avoided if Cloud Service Provider (CSP) or Cloud User (CU) analyses the logging information. In this paper we introduced few challenges, which are place of monitoring, security, and ownership of the logging information between CSP and CU.
Also we proposed a logging architecture to analyze the behaviour of the cloud ecosystem, to avoid data breaches and other security related issues at the CSP space. So that we believe our proposed architecture can provide maximum trust between CU and CSP.
In short-reach connections, large-diameter multimode fibres allow for robust and easy connections. Unfortunately, their propagation properties depend on the excitation conditions. We propose a launching technique using a fibre stub that can tolerate fabrication tolerances in terms of tilts and off-sets to a large extent. A study of the influence of displaced connectors along the transmission link shows that the power distributions approach a steady-state power distribution very similar to the initial distribution established by the proposed launching scheme.
Mobile learning (m-learning) can be considered as a new paradigm of e-learning. The developed solution enables the presentation of animations and 3D virtual reality (VR) on mobile devices and is well suited for mobile learning. Difficult relations in physics as well as intricate experiments in optics can be visualised on mobile devices without need for a personal computer. By outsourcing the computational power to a server, the coverage is worldwide.
In the work at hand, we state that privacy and malleability of data are two aspects highly desired but not easy to associate. On the one hand, we are trying to shape data to make them usable and editable in an intelligible way, namely without losing their initial information. On the other hand, we are looking for effective privacy on data such that no external or non-authorized party could learn about their content. In such a way, we get overlapping requirements by pursuing different goals; it is trivial to be malleable without being secure, and vice versa. We propose four “real-world” use cases identified as scenarios where these two contradictory features are required and taking place in distinct environments. These considered backgrounds consist of firstly, cloud security auditing, then privacy of mobile network users and industry 4.0 and finally, privacy of COVID-19 tracing app users. After presenting useful background material, we propose to employ multiple approaches to design solutions to solve the use cases. We combine homomorphic encryption with searchable encryption and private information retrieval protocol to build an effective construction for the could auditing use case. As a second step, we develop an algorithm to generate the appropriate parameters to use the somewhat homomorphic encryption scheme by considering correctness, performance and security of the respective application. Finally, we propose an alternative use of Bloom filter data structure by adding an HMAC function to allow an outsourced third party to perform set relations in a private manner. By analyzing the overlapping bits occurring on Bloom filters while testing the inclusiveness or disjointness of the sets, we show how these functions maintain privacy and allow operations directly computed on the data structure. Then, we show how these constructions could be applied to the four selected use cases. Our obtained solutions have been implemented and we provide promising results that validate their efficiency and thus relevancy.
Differences in Unemployment due to Sexual Orientation: Evidence from the Swedish Labour Market
(2021)
The right to engage in work and choose an occupation to freely work at, is declared a fundamental human right in the EU. Behaviour that restrains somebody from doing so, due to sexual orientation discrimination for example, is prohibited. Inquiries on the dimension of this particular behaviour, as well as the magnitude of harm it causes in the population, is of vital importance for policy makers and the entire civil society. A growing number of research pertaining to labour market outcomes due to sexual orientation has been conducted rececently. Most of the studies have been carried out in western countries, where annual income, hourly wages, labour market participation and employment decisions have been in the focus of researchers. Ahmet, Andersson and Hammarstedt have been the pioneering scientists in this field in Sweden and contributed by extending their inquiries from the individual to the couple level (Ahmed, et al., 2011a) and to field experiments (Ahmed, et al., 2011b) in detecting discrimination against homosexuals. The present paper aims to contribute to the labour market discrimination literature by estimating the differences in the employment probabilities and in the duration of unemployment by sexual orientation in Sweden using survival analysis techniques. Time-to-event data is rare in social sciences, which is particularly valid for data sets where the sexual orientation of individuals is observable. Due to this scarcity, the present study represents the first paper investigating the effect of sexual preferences on the duration in unemploymnet using survival analysis techniques. In contrast to other estimation methods, survival techniques enable us to incorporate the particular nature of time-to-event data, such as its particular skewness, strict non- negative nature, as well as censoring and truncation. Separately Zero Inflated Negative Binomial regression has been conducted to the duration in unemployment and Probit estimation to the event of getting employed, where differing significant outcomes by sexual orientation have been detected for some specifications. The remainder of the article is organized as follows. A detailed literature review is provided in section 2. Section 3 comprises the theoretical framework of the investigation, while section 4 contains the methodical framework and research design. Data and descriptive statistics are presented in section 5, followed by the results of the estimation in section 6. Section 7 concludes with the final discussion.
During the year 2015 almost 1.4 million refugees arrived in Europe (eurostat, 2020). Germany was with 1.1 million individuals the major destination (Statista, 2018). A huge political divide occurred over this influx. While welcoming scenes dominated the media in the advent of the so called ‘refugee crisis’, criticism over the ‘We’ll-make-it policy’ by Angela Merkel increased also among Christian Democrats.1A sudden human influx of such size into a society might not only have political, cultural and social impacts, but may also lead to economic disruptions. Human beings embody consumers as well as labour force. A significant increase in population might thus cause an increase in demand for commodities and in labour supply, which ceteris paribus simultaneously lead to increasing GDP and decreasing wages. Previous literature utilized quasi-natural experiments which can be exploited in social sciences for the detection of causal relations and the usage of methods, not applicable otherwise. The present paper applies the synthetic control methodology to wages, unemployment and economic growth in Germany in order to measure the causal impact of the 2015- refugee influx on these economic key elements. No impact on either of the economic factors has been found.
European Union labour market and welfare policies are concerned with the protection of European citizens from disruptive processes. Falling wages and increasing unemployment, as well as decreasing production and consumption embody highly disruptive political potential. Thus, the findings concerning the impact of refugee migration into the European Union might influence EU-policies in the prospect of increased migration to Europe in the upcoming century due climate change and new crises. The remainder of the article is organized as follows: The lessons from the key literature concerning quasi- natural experiments and the impact of migration on wages, unemployment and economic growth are provided in section 2. Section 3 comprises the theoretical framework concerning the differences between refugees and economic migrants. Section 4 introduces the estimation strategy, while section 5 presents data and descriptive statistics. Section 6 shows the simulation results, followed by the concluding discussion in section 7.
Automobile premium brands operate globally, which is undoubtedly required, because, for the most part, domestic markets are either decreasing or stagnating. China has become today the most important and biggest car market. Recently selling has become challenging because urban areas are well penetrated, and in poorly penetrated rural areas, incomes are low. This is particularly alarming for German brands, because of their premium orientation. Simultaneously, the after-sales market in China has been growing continuously. As a result, this market has a huge potential, which is likewise attractive because it has been scientifically proven across industries that after-sales services are high-margin profit drivers. Despite its great significance, the Chinese automobile after-sales market remains insufficiently researched, especially in terms of critical success factors and cultural influences, which therefore was the starting point for a study. The results will presented and interpreted now in this new working-paper.
Should social robots become part of our society?
Embedded in an exciting crime story, the science comic by Oliver Korn and Jonas Grund conveys the current state and outlook of science on social robots.
The story takes place in the near future: In an international project, scientists are researching the requirements for social robots for the health sector. Shortly before the prototype of a nursing robot is used in a field study, it disappears without a trace. In her first major case, the young inspector Kira embarks on a journey into the world of science. In the process, she learns a lot about social robots, AI and the world of international scientific cooperation. Again and again, critical voices are heard: anti-robot activists protest against automation and a dwindling of humanity and empathy. Even in the Commissioner's family, the possible care of elderly people by robots is controversially discussed.
The overarching goal is to build knowledge across all age groups so that the advantages and disadvantages of these new technologies can be discussed controversially but knowledgeably. "Social Robots - a Science Comic" is a contribution to an informed discussion in the fields of robotics, artificial intelligence, ethics and politics and is thus also suitable as a teaching and learning tool.
The comic was conceived and designed for young people and adults. In particular, however, for those who have hardly come into contact with social robots and artificial intelligence so far. Another target group are people working in the health care sector, because the care and nursing of elderly people are considered to be one of the most important areas of application for social robots in the future.
DINA4 portrait format, hardcover thread stitching, published in German and English. Self-published by the Affective & Cognitive Institute (ACI), Offenburg University.
Photonics meet digital art
(2014)
The paper focuses on the work of an interdisciplinary project between photonics and digital art. The result is a poster collection dedicated to the International Year of Light 2015. In addition, an internet platform was created that presents the project. It can be accessed at http://www.magic-of-light.org/iyl2015/index.htm. From the idea to the final realization, milestones with tasks and steps will be presented in the paper. As an interdisciplinary project, students from technological degree programs were involved as well as art program students. The 2015 Anniversaries: Alhazen (1015), De Caus (1615), Fresnel (1815), Maxwell (1865), Einstein (1905), Penzias Wilson, Kao (1965) and their milestone contributions in optics and photonics will be highlighted.
In this work we provide an overview of gamification, i.e. the application of methods from game design to enrich non-gaming processes. The contribution is divided into five subsections: an introduction focusing on the progression of gamification through the hype cycle in the recent years (1), a brief introduction to gamification mechanics (1) and an overview of the state of the art in established areas (3). The focus is a discussion of more recent attempts of gamification in service and production (4). We also discuss the ethical implications (5) and the future perspectives (6) of gamified business processes. Gamification has been successfully applied in the domains education (serious games) and health (exergames) and is spreading to other areas. In recent years there have been various attempts to “gamify” business processes. While the first efforts date back as far as the collection of miles in frequent flyer programs, we will portray some of the more recent and comprehensive software-based approaches in the service industry, e.g. the gamification of processes in sales and marketing. We discuss their accomplishments as well as their social and ethical implicatio. Finally a very recent approach is presented: the application of gamification in the domain of industrial production. We discuss the special requirements in this domain and the effects on the business level and on the users. We conclude with a prognosis on the future development of gamification.
The findings presented in this article were obtained through a preliminary exploratory study conducted at the Offenburg University as part of the Fighting Loneliness project promoted by the institution’s Affective & Cognitive Institute (ACI) from October 2019 to February 2020. The initiative’s main objective was to answer the research question “How should an app be designed to reduce loneliness and social isolation among university students?” with the collaboration of the institution’s students.
The TriRhenaTech alliance presents a collection of accepted papers of the cancelled tri-national 'Upper-Rhine Artificial Intelligence Symposium' planned for 13th May 2020 in Karlsruhe. The TriRhenaTech alliance is a network of universities in the Upper-Rhine Trinational Metropolitan Region comprising of the German universities of applied sciences in Furtwangen, Kaiserslautern, Karlsruhe, and Offenburg, the Baden-Wuerttemberg Cooperative State University Loerrach, the French university network Alsace Tech (comprised of 14 'grandes écoles' in the fields of engineering, architecture and management) and the University of Applied Sciences and Arts Northwestern Switzerland. The alliance's common goal is to reinforce the transfer of knowledge, research, and technology, as well as the cross-border mobility of students.
OVVL (the Open Weakness and Vulnerability Modeller) is a tool and methodology to support threat modeling in the early stages of the secure software development lifecycle. We provide an overview of OVVL (https://ovvl.org), its data model and browser-based UI. We equally provide a discussion of initial experiments on how identified threats in the design phase can be aligned with later activities in the software lifecycle (issue management and security testing).
While prospect of tracking mobile devices' users is widely discussed all over European countries to counteract COVID-19 propagation, we propose a Bloom filter based construction providing users' location privacy and preventing mass surveillance.
We apply a solution based on Bloom filters data structure that allows a third party, a government agency, to perform some privacy-preserving set relations on a mobile telco's access logfile.
By computing set relations, the government agency, given the knowledge of two identified persons, has an instrument that provides a (possible) infection chain from the initial to the final infected user no matter at which location on a worldwide scale they are.
The benefit of our approach is that intermediate possible infected users can be identified and subsequently contacted by the agency. With such approach, we state that solely identities of possible infected users will be revealed and location privacy of others will be preserved. To this extent, it meets General Data Protection Regulation (GDPR)requirements in this area.
Communication protocols enable information exchange between different information systems. If protocol descriptions for these systems are not available, they can be reverse-engineered for interoperability or security reasons. This master thesis describes the analysis of such a proprietary binary protocol, named the DVRIP or Dahua private protocol from Dahua Technology. The analysis contains the identification of the DVRIP protocol header format, security mechanisms and vulnerabilities inside the protocol implementation. With the revealing insights of the protocol, an increase of the overall security is achieved. This thesis builds the foundation for further targeted security analyses.
In the past decades, developments in the fields of medicine, new media, and biotechnologies challenged many representations and practices, questioning the understanding of our corporeal limits. Using concrete examples from literary fiction, media studies, philosophy, performance arts, and social sciences, this collection underlines how bodily models and transformations, thought until recently to be only fictional products, have become a part of our reality. The essays provide a spectrum of perspectives on how the body emerges as a transitional environment between fictional and factual elements, a process understood as faction.
In the area of cloud computing, judging the fulfillment of service-level agreements on a technical level is gaining more and more importance. To support this we introduce privacy preserving set relations as inclusiveness and disjointness based ao Bloom filters. We propose to compose them in a slightly different way by applying a keyed hash function. Besides discussing the correctness of set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. Indeed, our solution proposes to bring another layer of privacy on the sizes. We are in particular interested how the overlapping bits of a Bloom filter impact the privacy level of our approach. We concretely apply our solution to a use case of cloud security audit on access control and present our results with real-world parameters.