Refine
Year of publication
Document Type
- Conference Proceeding (120) (remove)
Conference Type
- Konferenzartikel (109)
- Konferenzband (6)
- Konferenz-Poster (3)
- Sonstiges (3)
- Konferenz-Abstract (1)
Keywords
- Gamification (9)
- Assistive Technology (8)
- Deafblindness (5)
- Wearables (5)
- Education in Optics and Photonics (4)
- Human Computer Interaction (4)
- Licht (4)
- Optik (4)
- Affective Computing (3)
- Communication Systems (3)
- Haptics (3)
- Information Systems (3)
- Tactile (3)
- Virtuelle Realität (3)
- research-oriented education (3)
- Astronomical events (2)
- Design (2)
- Emotion Recognition (2)
- Human Resources (2)
- International Day of Light, IDL (2)
- International Year of Light, IYL (2)
- Live Broadcasting (2)
- Navigation (2)
- Netzwerk (2)
- Photonik (2)
- Psychometrie (2)
- Rehabilitation (2)
- Smart Textiles (2)
- education and research (2)
- optics and photonics (2)
- 3D interaction (1)
- 3D virtual reality (1)
- Algorithmus (1)
- Arbeitstag (1)
- Arbeitswissenschaft (1)
- Art and Photonics (1)
- Assistive Technologies (1)
- Audiovisual Performance (1)
- Augmented Reality (1)
- Ausbildung (1)
- Bildungscontrolling (1)
- Biosignals (1)
- Blockchain (1)
- Bloom filters (1)
- Bruchmechanik (1)
- Cloud Computing (1)
- Cloud Security (1)
- Cloud Service Provider (1)
- Cloud User (1)
- Collision avoidance (1)
- Computer Games (1)
- Computersicherheit (1)
- Computersimulation (1)
- Context-Awareness (1)
- Context-awareness (1)
- DMD (1)
- Data Integrity (1)
- Datenbanksystem (1)
- Datensicherung (1)
- Deaf-Blindness (1)
- Dienstleistung (1)
- Digitale Medien (1)
- Digitalisierung (1)
- Digitalpakt Schule (1)
- E-Learning (1)
- Educations (1)
- Emotions (1)
- Erweiterte Realität <Informatik> (1)
- Fachwissen (1)
- Faserstoff (1)
- Flüssigkristall (1)
- Game Design (1)
- Games (1)
- Ganztagsschule (1)
- Gehirn (1)
- Gender in Science and Technology Studies (STS), digitalization, interactive documentary, participation (1)
- Generative Art (1)
- Gestaltung (1)
- Gewebe (1)
- HR (1)
- Human Computrer Interaction (1)
- Hyperledger (1)
- Impairments (1)
- Improvisation (1)
- Industrie 4.0 (1)
- Informationstechnik (1)
- Interaction metaphor (1)
- Kommunikation (1)
- Kontextbewusstsein (1)
- Kryptographie (1)
- Leap Motion Controller (1)
- Learning (1)
- Learning Analytics (1)
- Lehre (1)
- Lernen (1)
- MINT (1)
- Maschinenbau (1)
- Mikrocontroller (1)
- Neurodivergent (1)
- Onboarding (1)
- Optics and Photonics (1)
- Phontonik (1)
- Physik (1)
- Privatsphäre (1)
- Produktion (1)
- Programmierung (1)
- Prüfung (1)
- Quellcode (1)
- Range imaging RGB-D (1)
- Risk Assessment (1)
- RoboCup (1)
- Roboter (1)
- Robotics (1)
- Robots (1)
- Schulcloud (1)
- Security Engineering (1)
- Segmentierung (1)
- Sensortechnik (1)
- Sicherheit (1)
- Simulation (1)
- Simulation-based Interaction (1)
- Smart Grid (1)
- Smart wearables (1)
- Social Interaction (1)
- Social Robots (1)
- Software Protection (1)
- Software Security (1)
- Sound Synthesis (1)
- Soziale Roboter (1)
- Task Analysis (1)
- Temperaturmessung (1)
- Textile (1)
- Threat Modeling (1)
- Touch (1)
- Umwelt (1)
- Unterricht (1)
- VR (1)
- Vermessung des Menschen (1)
- Virtual Reality (1)
- Visual Impairments (1)
- Web-Applikation (1)
- Wissenschaft (1)
- Zahlung (1)
- Zenware (1)
- agent (1)
- agent based systems (1)
- approximate histograms (1)
- bio-inspired models (1)
- cloud computing (1)
- cloud security (1)
- color vision (1)
- datengestützte Schulentwicklung (1)
- differential mode-delay (1)
- display technologies (1)
- distributed computing (1)
- e-learning (1)
- eingebettetes Gerät (1)
- kanal (1)
- learning scenario (1)
- m-learning (1)
- multimode fibre (1)
- multimode fibre connectors (1)
- peer to peer network (1)
- power distribution (1)
- reliability (1)
- self-organizing networks (1)
- sensor node (1)
- softwaregenerierter Code (1)
- teaching and learning culture (1)
- time series data (1)
- virtual reality (1)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (120) (remove)
Open Access
- Closed Access (68)
- Open Access (46)
- Bronze (3)
- Closed (3)
We propose in this work to solve privacy preserving set relations performed by a third party in an outsourced configuration. We argue that solving the disjointness relation based on Bloom filters is a new contribution in particular by having another layer of privacy on the sets cardinality. We propose to compose the set relations in a slightly different way by applying a keyed hash function. Besides discussing the correctness of the set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. We are in particular interested in how having bits overlapping in the Bloom filters impacts the privacy level of our approach. Finally, we present our results with real-world parameters in two concrete scenarios.
This paper describes a comparative study of two tactile systems supporting navigation for persons with little or no visual and auditory perception. The efficacy of a tactile head-mounted device (HMD) was compared to that of a wearable device, a tactile belt. A study with twenty participants showed that the participants took significantly less time to complete a course when navigating with the HMD, as compared to the belt.
OVVL (the Open Weakness and Vulnerability Modeller) is a tool and methodology to support threat modeling in the early stages of the secure software development lifecycle. We provide an overview of OVVL (https://ovvl.org), its data model and browser-based UI. We equally provide a discussion of initial experiments on how identified threats in the design phase can be aligned with later activities in the software lifecycle (issue management and security testing).
A Gamified and Adaptive Learning System for Neurodivergent Workers in Electronic Assembling Tasks
(2020)
Learning and work-oriented assistive systems are often designed to fit the workflow of neurotypical workers. Neurodivergent workers and individuals with learning disabilities often present cognitive and sensorimotor characteristics that are better accommodated with personalized learning and working processes. Therefore, we designed an adaptive learning system that combines an augmented interaction space with user-sensitive virtual assistance to support step-by-step guidance for neurodivergent workers in electronic assembling tasks. Gamified learning elements were also included in the interface to provide self-motivation and praise whenever users progress in their learning and work achievements.
The interaction between agents in multiagent-based control systems requires peer to peer communication between agents avoiding central control. The sensor nodes represent agents and produce measurement data every time step. The nodes exchange time series data by using the peer to peer network in order to calculate an aggregation function for solving a problem cooperatively. We investigate the aggregation process of averaging data for time series data of nodes in a peer to peer network by using the grouping algorithm of Cichon et al. 2018. Nodes communicate whether data is new and map data values according to their sizes into a histogram. This map message consists of the subintervals and vectors for estimating the node joining and leaving the subinterval. At each time step, the nodes communicate with each other in synchronous rounds to exchange map messages until the network converges to a common map message. The node calculates the average value of time series data produced by all nodes in the network by using the histogram algorithm. The relative error for comparing the output of averaging time series data, and the ground truth of the average value in the network will decrease as the size of the network increases. We perform simulations which show that the approximate histograms method provides a reasonable approximation of time series data.
Threat Modelling is an accepted technique to identify general threats as early as possible in the software development lifecycle. Previous work of ours did present an open-source framework and web-based tool (OVVL) for automating threat analysis on software architectures using STRIDE. However, one open problem is that available threat catalogues are either too general or proprietary with respect to a certain domain (e.g. .Net). Another problem is that a threat analyst should not only be presented (repeatedly) with a list of all possible threats, but already with some automated support for prioritizing these. This paper presents an approach to dynamically generate individual threat catalogues on basis of the established CWE as well as related CVE databases. Roughly 60% of this threat catalogue generation can be done by identifying and matching certain key values. To map the remaining 40% of our data (~50.000 CVE entries) we train a text classification model by using the already mapped 60% of our dataset to perform a supervised machine-learning based text classification. The generated entire dataset allows us to identify possible threats for each individual architectural element and automatically provide an initial prioritization. Our dataset as well as a supporting Jupyter notebook are openly available.
Wow, You Are Terrible at This!: An Intercultural Study on Virtual Agents Giving Mixed Feedback
(2020)
While the effects of virtual agents in terms of likeability, uncanniness, etc. are well explored, it is unclear how their appearance and the feedback they give affects people's reactions. Is critical feedback from an agent embodied as a mouse or a robot taken less serious than from a human agent? In an intercultural study with 120 participants from Germany and the US, participants had to find hidden objects in a game and received feedback on their performance by virtual agents with different appearances. As some levels were designed to be unsolvable, critical feedback was unavoidable. We hypothesized that feedback would be taken more serious, the more human the agent looked. Also, we expected the subjects from the US to react more sensitively to criticism. Surprisingly, our results showed that the agents' appearance did not significantly change the participants' perception. Also, while we found highly significant differences in inspirational and motivational effects as well as in perceived task load between the two cultures, the reactions to criticism were contrary to expectations based on established cultural models. This work improves our understanding on how affective virtual agents are to be designed, both with respect to culture and to dialogue strategies.
The TriRhenaTech alliance presents a collection of accepted papers of the cancelled tri-national 'Upper-Rhine Artificial Intelligence Symposium' planned for 13th May 2020 in Karlsruhe. The TriRhenaTech alliance is a network of universities in the Upper-Rhine Trinational Metropolitan Region comprising of the German universities of applied sciences in Furtwangen, Kaiserslautern, Karlsruhe, and Offenburg, the Baden-Wuerttemberg Cooperative State University Loerrach, the French university network Alsace Tech (comprised of 14 'grandes écoles' in the fields of engineering, architecture and management) and the University of Applied Sciences and Arts Northwestern Switzerland. The alliance's common goal is to reinforce the transfer of knowledge, research, and technology, as well as the cross-border mobility of students.
Machine learning (ML) has become highly relevant in applications across all industries, and specialists in the field are sought urgently. As it is a highly interdisciplinary field, requiring knowledge in computer science, statistics and the relevant application domain, experts are hard to find. Large corporations can sweep the job market by offering high salaries, which makes the situation for small and medium enterprises (SME) even worse, as they usually lack the capacities both for attracting specialists and for qualifying their own personnel. In order to meet the enormous demand in ML specialists, universities now teach ML in specifically designed degree programs as well as within established programs in science and engineering. While the teaching almost always uses practical examples, these are somewhat artificial or outdated, as real data from real companies is usually not available. The approach reported in this contribution aims to tackle the above challenges in an integrated course, combining three independent aspects: first, teaching key ML concepts to graduate students from a variety of existing degree programs; second, qualifying working professionals from SME for ML; and third, applying ML to real-world problems faced by those SME. The course was carried out in two trial periods within a government-funded project at a university of applied sciences in south-west Germany. The region is dominated by SME many of which are world leaders in their industries. Participants were students from different graduate programs as well as working professionals from several SME based in the region. The first phase of the course (one semester) consists of the fundamental concepts of ML, such as exploratory data analysis, regression, classification, clustering, and deep learning. In this phase, student participants and working professionals were taught in separate tracks. Students attended regular classes and lab sessions (but were also given access to e-learning materials), whereas the professionals learned exclusively in a flipped classroom scenario: they were given access to e-learning units (video lectures and accompanying quizzes) for preparation, while face-to-face sessions were dominated by lab experiments applying the concepts. Prior to the start of the second phase, participating companies were invited to submit real-world problems that they wanted to solve with the help of ML. The second phase consisted of practical ML projects, each tackling one of the problems and worked on by a mixed team of both students and professionals for the period of one semester. The teams were self-organized in the ways they preferred to work (e.g. remote vs. face-to-face collaboration), but also coached by one of the teaching staff. In several plenary meetings, the teams reported on their status as well as challenges and solutions. In both periods, the course was monitored and extensive surveys were carried out. We report on the findings as well as the lessons learned. For instance, while the program was very well-received, professional participants wished for more detailed coverage of theoretical concepts. A challenge faced by several teams during the second phase was a dropout of student members due to upcoming exams in other subjects.
Tactile Navigation with Checkpoints as Progress Indicators?: Only when Walking Longer Straight Paths
(2020)
Persons with both vision and hearing impairments have to rely primarily on tactile feedback, which is frequently used in assistive devices. We explore the use of checkpoints as a way to give them feedback during navigation tasks. Particularly, we investigate how checkpoints can impact performance and user experience. We hypothesized that individuals receiving checkpoint feedback would take less time and perceive the navigation experience as superior to those who did not receive such feedback. Our contribution is two-fold: a detailed report on the implementation of a smart wearable with tactile feedback (1), and a user study analyzing its effects (2). The results show that in contrast to our assumptions, individuals took considerably more time to complete routes with checkpoints. Also, they perceived navigating with checkpoints as inferior to navigating without checkpoints. While the quantitative data leave little room for doubt, the qualitative data open new aspects: when walking straight and not being "overwhelmed" by various forms of feedback in succession, several participants actually appreciated the checkpoint feedback.
Deafblindness, also known as dual sensory loss, is the combination of sight and hearing impairments of such extent that it becomes difficult for one sense to compensate for the other. Communication issues are a key concern for the Deafblind community. We present the design and technical implementation of the Tactile Board: a mobile Augmentative and Alternative Communication (AAC) device for individuals with deafblindness. The Tactile Board allows text and speech to be translated into vibrotactile signs that are displayed real-time to the user via a haptic wearable. Our aim is to facilitate communication for the deafblind community, creating opportunities for these individuals to initiate and engage in social interactions with other people without the direct need of an intervener.
Live streaming of events over an IP network as a catalyst in media technology education and training
(2020)
The paper describes how students are involved in applied research when setting up the technology and running a live event. Real-time IP transmission in broadcast environments via fiber optics will become increasingly important in the future. Therefore, it is necessary to create a platform in this area where students can learn how to handle IP infrastructure and fiber optics. With this in mind, we have built a fully functional TV control room that is completely IP-based. The authors present the steps in the development of the project and show the advantages of the proposed digital solutions. The IP network proves to be a synergy between the involved teams: participants of the robot competition and the members of the media team. These results are presented in the paper. Our activities aim to awaken enthusiasm for research and technology in young people. Broadcasts of live events are a good opportunity for "hands on" activities.
Deafblindness, a form of dual sensory impairment, signifcantly impacts communication, access to information and mobility. Inde- pendent navigation and wayfnding are main challenges faced by individuals living with combined hearing and visual impairments. We developed a haptic wearable that provides sensory substitution and navigational cues for users with deafblindness by conveying vibrotactile signals onto the body. Vibrotactile signals on the waist area convey directional and proximity information collected via a fisheye camera attached to the garment, while semantic informa- tion is provided with a tapping system on the shoulders. A playful scenario called “Keep Your Distance” was designed to test the navigation system: individuals with deafblindness were “secret agents” that needed to follow a “suspect”, but they should keep an opti- mal distance of 1.5 meters from the other person to win the game. Preliminary fndings suggest that individuals with deafblindness enjoyed the experience and were generally able to follow the directional cues.
Interaction and capturing information from the surrounding is dominated by vision and hearing. Haptics on the other side, widens the bandwidth and could also replace senses (sense switching) for impaired. Haptic technologies are often limited to point-wise actuation. Here, we show that actuation in two-dimensional matrices instead creates a richer input. We describe the construction of a full-body garment for haptic communication with a distributed actuating network. The garment is divided into attachable-detachable panels or add-ons that each can carry a two dimensional matrix of actuating haptic elements. Each panel adds to an enhanced sensoric capability of the human- garment system so that together a 720° system is formed. The spatial separation of the panels on different body locations supports semantic and theme-wise separation of conversations conveyed by haptics. It also achieves directional faithfulness, which is maintaining any directional information about a distal stimulus in the haptic input.
Nowadays, the wide majority of Europeans uses smartphones. However, touch displays are still not accessible by everyone. Individuals with deafblindness, for example, often face difculties in accessing vision-based touchscreens. Moreover, they typically have few fnancial resources which increases the need for customizable, low-cost assistive devices. In this work-in-progress, we present four prototypes made from low-cost, every-day materials, that make modern pattern lock mechanisms more accessible to individuals with vision impairments or even with deafblindness. Two out of four prototypes turned out to be functional tactile overlays for accessing digital 4-by-4 grids that are regularly used to encode dynamic dot patterns. In future work, we will conduct a user study investigating whether these two prototypes can make dot-based pattern lock mechanisms more accessible for individuals with visual impairments or deafblindness.
Co-Designing Assistive Tools to Support Social Interactions by Individuals Living with Deafblindness
(2020)
Deafblindness is a dual sensory impairment that affects many aspects of life, including mobility, access to information, communication, and social interactions. Furthermore, individuals living with deafblindness are under a high risk of social isolation. Therefore, we identified opportunities for applying assistive tools to support social interactions through co-ideation activities with members of the deafblind community. This work presents our co-design approach, lessons learned and directions for designing meaningful assistive tools for dual sensory loss.
Astronomical phenomena fascinate people from the very beginning of mankind up to today. In this paper the authors will present their experience with photography of astronomical events. The main focus will be on aurora borealis, comet Neowise, total lunar eclipses and how mobile devices open up new possibilities to observe the green flash. Our efforts were motivated by the great impact and high number of viewers of these events. Visitors from over a hundred countries watched our live broadcasts.
Furthermore, we report on our experiences with the photography of optical phenomena such as polar lights Fig. 1, comet Neowise with a Delta Aquariids meteor Fig. 11, and lunar eclipses Fig. 12.
This paper explains the realization of a concept for research-oriented photonics education. Using the example of the integration of an actual PhD project, it is shown how students are familiarized with the topic of research and scientific work in the first semesters. Typical research activities are included as essential parts of the learning process. Research should be made visible and tangible for the students. The authors will present all aspects of the learning environment, their impressions and experiences with the implemented scenario, as well as first evaluation results of the students.
Well-designed and informative product presentations can support consumers in making purchase decisions. There are plenty of facts and details about a product of interest. However, also emotions are an important aspect for the purchase decision. The unique visualization opportunities of virtual reality (VR) can give users of VR applications the feeling of being there (telepresence). The applications can intensely engage them in a flow experience, comprising the four dimensions of enjoyment, curiosity, focused attention and control. In this work, we claim that VR product presentations can create subjective product experiences for consumers and motivate them to reuse this innovative type of product presentation in the future, by immersing them in a virtual world and causing them to interact with it. To verify the conceptual model a study was conducted with 551 participants who explored a VR hotel application. The results indicate that VR product presentations evoke positive emotions among consumers. The virtual experience made potential customers focus their attention on the virtual world and aroused their curiosity about getting more information about the product in an enjoyable way. In contrast to the theoretical assumption, control did not influence the users’ behavioral intentions to reuse VR product presentation. We conclude that VR product presentations create a feeling of telepresence, which leads to a flow experience that contributes to the behavioral intention of users to reuse VR product presentations in the future.
Strings
(2020)
This article presents the currently ongoing development of an audiovisual performance work with the title Strings. This work provides an improvisation setting for a violinist, two laptop performers, and two generative systems. At the core of Strings lies an approach that establishes a strong correlation among all participants by means of a shared physical principle. The physical principle is that of a vibrating string. The article discusses how this principle is used in both natural and simulated forms as main interaction layer between all performers and as natural or generative principle for creating audio and video.
This work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloomfilter based privacy approach is a valuable technical building block for the arising General Data Protection Regulation (GDPR) requirements in this area. In short, we apply a solution based on the Bloom filters data structure that allows a 3rd party to performsome privacy saving setrelations on a mobiletelco’s access logfile or other mobile access logfile from harvesting parties without revealing any other mobile users in the proximity of a mobile base station but still allowing to track perpetrators.
We present our twenty years of experience in the live broadcasting of astronomical events, with the main focus on total lunar eclipses. Our efforts were motivated by the great impact and high number of viewers of these events. Visitors from over a hundred countries watched our live broadcasts. Our viewer record was set on July 27, 2018, with the live transmission of the total lunar eclipse from the Feldberg, the highest mountain in the Black Forest, attracting nearly half a million viewers in five hours.
An especially challenging activity was the live observing of the Mercury transit on 9 May 2016, which we presented as ‘live astronomy’ with hands-on telescope. The main goal of this event was to awake our students enthusiasm for optics and astronomy.
Furthermore, we report on our experiences with the photography of optical phenomena such as polar lights and green flash.
The TriRhenaTech alliance universities and their partners presented their competences in the field of artificial intelligence and their cross-border cooperations with the industry at the tri-national conference 'Artificial Intelligence : from Research to Application' on March 13th, 2019 in Offenburg. The TriRhenaTech alliance is a network of universities in the Upper Rhine Trinational Metropolitan Region comprising of the German universities of applied sciences in Furtwangen, Kaiserslautern, Karlsruhe, and Offenburg, the Baden-Wuerttemberg Cooperative State University Loerrach, the French university network Alsace Tech (comprised of 14 'grandes écoles' in the fields of engineering, architecture and management) and the University of Applied Sciences and Arts Northwestern Switzerland. The alliance's common goal is to reinforce the transfer of knowledge, research, and technology, as well as the cross-border mobility of students.
Art and Photonics
(2019)
In this paper we report on our continuous efforts to apply optics and photonics in art. This results in interdisciplinary projects which sometimes lead to concrete art installations.
We presented some of these projects at the UNESCO headquarters in Paris, at the opening ceremony of the International Year of Light and the inaugural ceremony of the International Day of Light.
Some newer projects, such as “A Maze: Ingenious Pipes” and “The Power of Your Eyes,” are also presented in this paper.
After the successful International Year of Light 2015, the idea of sustainability became increasingly imminent. After a preparatory year on 16 May 2018, the International Day of Light was launched for the first time. This event was celebrated with a public celebration in Paris at the UNESCO headquarters. In this paper we will present our projects dedicated to the International Day of Light in Paris. Together with a group of students from our university, we had the special opportunity to be integrated in the program of the opening ceremony at UNESCO in Paris. With our interdisciplinary projects we have tried to build a bridge between optics, photonics, art and media installations.
The authors explain a developed concept for research-oriented education in optics and photonics. It is presented which goals are to be achieved, which strategies have been developed and how these can be implemented in a blended learning scenario. The goal of our education is the best possible qualification of the students on the basis of a strong scientific and research-oriented education, which also includes the acquisition of important interdisciplinary competences. All phases of a research process are to be mapped in the learning process and offer students an insight into current research topics in optics and photonics.
Increased knowledge transfer through the integration of research projects into university teaching
(2019)
This paper describes the integration of the research project "Characterization of Color Vision using Spectroscopy and Nanotechnology: Application to Media Photonics" into an engineering course in the field of media technology. The aim is to develop the existing learning concept towards a more research-oriented teaching. Involving students in research projects as part of the learning process provides a deeper insight into current research topics and the key elements of scientific work. This makes it easier for students to recognize the importance of the acquired theoretical knowledge for the practice, which enables them to derive new insights of their own.
Walking interfaces offer advantages in navigation of VE systems over other types of locomotion. However, VR helmets have the disadvantage that users cannot see their immediate surroundings. Our publication describes the prototypical implementation of a virtual environment (VE) system, capable of detecting possible obstacles using an RGB-D sensor. In order to warn users of potential collisions with real objects while they are moving throughout the VE tracking area, we designed 4 different visual warning metaphors: Placeholder, Rubber Band, Color Indicator and Arrow. A small pilot study was carried out in which the participants had to solve a simple task and avoid any arbitrarily placed physical obstacles when crossing the virtual scene. Our results show that the Placeholder metaphor (in this case: trees), compared to the other variants, seems to be best suited for the correct estimation of the position of obstacles and in terms of the ability to evade them.
Über Chancen und Risiken von Computern an Schulen wird seit deren Einführung im Jahr 1984 kontrovers diskutiert. Neben Laptops und Tablets geht es heute um die Nutzung von Schulclouds und privaten Smartphones im Unterricht. Das Akronym dafür ist BYOD – »Bring Your Own Device«.
Dabei stellen sich grundsätzliche pädagogische und politische Fragen: Welcher Unterrichts- und Medienkonzepte bedarf es, um den Risiken der Digitalisierung vorzubeugen, die Schüler_innen aber zugleich an deren Chancen teilhaben zu lassen? Bei Netzanwendungen ist zudem der Datenschutz zu beachten, vor allem, wenn eigene Geräte genutzt werden sollen. So fördert das BMBF eine Schulcloud, in der Lehrkräfte und Schüler_innen wie bei Facebook Gruppen bilden, Dokumente austauschen und online darüber diskutieren können.
Das Buch greift die aktuelle Kontroverse auf und fragt nach den Zielen und Nebenwirkungen von »Bildung 4.0«. Was davon ist für die Unterrichtspraxis relevant? Und wessen Interessen werden bei welchen Konzepten vertreten?
Controlling ist ein Begriff aus der Wirtschaftslehre und bezeichnet nicht Kontrollle, sondern Prozeßsteuerung. Definierte Ziele werden durch kleinteilige Messungen und permanente Überwachung aller Arbeitsschritte und Handlungen der beteiligten Personen protokolliert und stetig optimiert. Dieses Konzept der Planungs-, Koordinations- und Kontrollaufgaben wird beim „Bildungs-Controlling“ auf Schulen und Hochschulen übertragen. Ziel ist dabei, entsprechend der Gary Beckerschen Humankapitaltheorie, die Produktion von Humankapital mit validierten Kompetenzen. Zwei Probleme gibt es dabei: Lernen und vor allem Verstehen lassen sich nicht automatisieren und auch nicht automatisiert prüfen. Und: Sozialsysteme unter dem Regime der Kennzahlen des Quality Management (QM) oder Total Quality Management (TQM) verlieren ihre Eigenschaft als soziale Systeme
The development of secure software systems is of ever-increasing importance. While software companies often invest large amounts of resources into the upkeeping and general security properties of large-scale applications when in production, they appear to neglect utilizing threat modeling in the earlier stages of the software development lifecycle. When applied during the design phase of development, and continuously throughout development iterations, threat modeling can help to establish a "Secure by Design" approach. This approach allows issues relating to IT security to be found early during development, reducing the need for later improvement – and thus saving resources in the long term. In this paper the current state of threat modeling is investigated. This investigation drove the derivation of requirements for the development of a new threat modelling framework and tool, called OVVL. OVVL utilizes concepts of established threat modeling methodologies, as well as functionality not available in existing solutions.
Blockchain frameworks enable the immutable storage of data. A still open practical question is the so called "oracle" problem, i.e. the way how real world data is actually transferred into and out of a blockchain while preserving its integrity. We present a case study that demonstrates how to use an existing industrial strength secure element for cryptographic software protection (Wibu CmDongle / the "dongle") to function as such a hardware-based oracle for the Hyperledger blockchain framework. Our scenario is that of a dentist having leased a 3D printer. This printer is initially supplied with an amount of x printing units. With each print action the local unit counter on the attached dongle is decreased and in parallel a unit counter is maintained in the Hyperledger-based blockchain. Once a threshold is met, the printer will stop working (by means of the cryptographically protected invocation of the local print method). The blockchain is configured in such a way that chaincode is executed to increase the units again automatically (and essentially trigger any payment processes). Once this has happened, the new unit counter value will be passed from the blockchain to the local dongle and thus allow for further execution of print jobs.
Protecting software from illegal access, intentional modification or reverse engineering is an inherently difficult practical problem involving code obfuscation techniques and real-time cryptographic protection of code. In traditional systems a secure element (the "dongle") is used to protect software. However, this approach suffers from several technical and economical drawbacks such as the dongle being lost or broken.
We present a system that provides such dongles as a cloud service, and more importantly, provides the required cryptographic material to control access to software functionality in real-time.
This system is developed as part of an ongoing nationally funded research project and is now entering a first trial stage with stakeholders from different industrial sectors.
New employees are supposed to quickly understand their tasks, internal processes and familiarize with colleagues. This process is called “onboarding” and is still mainly realized by organizational methods from human resource management, such as introductory events or special employee sessions. Software tools and especially mobile applications are an innovative means to support provide onboarding processes in a modern, even remote, way. In this paper we analyze how the use of gamification can enhance onboarding processes. Firstly, we describe a mobile onboarding application specifically developed for the young, technically literate generations Y and Z, who are just about to start their career. Secondly, we report on a study with 98 students and young employees. We found that participants enjoyed the gamified application. They especially appreciated the feature “Team Bingo” which facilitates social integration and teambuilding. Based on the OCEAN personality model (“Big Five”), the personality traits agreeableness and openness revealed significant correlations with a preference for the gamified onboarding application.
What emotional effects does gamification have on users who work or learn with repetitive tasks? In this work, we use biosignals to analyze these affective effects of gamification. After a brief discussion of related work, we describe the implementation of an assistive system augmenting work by projecting elements for guidance and gamification. We also show how this system can be extended to analyse users' emotions. In a user study, we analyse both biosignals (facial expressions and electrodermal activity), and regular performance measures (error rate and task completion time).
For the performance measures, the results confirm known effects like increased speed and slightly increased error rate. In addition, the analysis of the biosignals provides strong evidence for two major affective effects: the gamification of work and learning tasks incites highly significantly more positive emotions and increases emotionality altogether. The results add to the design of assistive systems, which are aware of the physical as well as the affective context.
For e-commerce retailers it is crucial to present their products both informatively and attractively. Virtual reality (VR) systems represent a new marketing tool that supports customers in their decision-making process and offers an extraordinary product experience. Despite these advantages, the use of this technology for e-commerce retailers is also associated with risks, namely cybersickness. The aim of the study is to investigate the occurrence of cybersickness in the context of the customer’s perceived enjoyment and the perceived challenge of a VR product presentation. Based on a conceptual research framework, a laboratory study with 533 participants was conducted to determine the influence of these factors on the occurrence of cybersickness. The results demonstrate that the perceived challenge has a substantially stronger impact on the occurrence of cybersickness, which can only be partially reduced by perceived enjoyment. When realizing VR applications in general and VR product presentations in particular, e-commerce retailers should therefore first minimize possible challenges instead of focusing primarily on entertainment aspects of such applications.
This paper describes the concept and some results of the project "Menschen Lernen Maschinelles Lernen" (Humans Learn Machine Learning, ML2) of the University of Applied Sciences Offenburg. It brings together students of different courses of study and practitioners from companies on the subject of Machine Learning. A mixture of blended learning and practical projects ensures a tight coupling of machine learning theory and application. The paper details the phases of ML2 and mentions two successful example projects.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
We present the design of a system combining augmented reality (AR) and gamification to support elderly persons’ rehabilitation activities. The system is attached to the waist; it collects detailed movement data and at the same time augments the user’s path by projections. The projected AR-elements can provide location-based information or incite movement games. The collected data can be observed by therapists. Based on this data, the challenge level can be more frequently adapted, keeping up the patient’s motivation. The exercises can involve cognitive elements (for mild cognitive impairments), physiological elements (rehabilitation), or both. The overall vision is an individualized and gamified therapy. Thus, the system also offers application scenarios beyond rehabilitation in sports. In accordance with the methodology of design thinking, we present a first specification and a design vision based on inputs from business experts, gerontologists, physiologists, psychologists, game designers, cognitive scientists and computer scientists.
Brand identification has the potential of shaping individuals' attitudes, performance and commitment within learning and work contexts. We explore these effects, by incorporating elements of branded identification within gamified environments. We report a study with 44 employees, in which task performance and emotional outcomes are assessed in a real-world assembly scenario - namely, while performing a soldering task. Our results indicate that brand identification has a direct impact on individuals' attitude towards the task at hand: while instigating positive emotions, aversion and reactance also arise.
Social robots are robots interacting with humans not only in collaborative settings, but also in personal settings like domestic services and healthcare. Some social robots simulate feelings (companions) while others just help lifting (assistants). However, they often incite both fascination and fear: what abilities should social robots have and what should remain exclusive to humans? We provide a historical background on the development of robots and related machines (1), discuss examples of social robots (2) and present an expert study on their desired future abilities and applications (3) conducted within the Forum of the European Active and Assisted Living Programme (AAL). The findings indicate that most technologies required for the social robots' emotion sensing are considered ready. For care robots, the experts approve health-related tasks like drawing blood while they prefer humans to do nursing tasks like washing. On a larger societal scale, the acceptance of social robots increases highly significantly with familiarity, making health robots and even military drones more acceptable than sex robots or child companion robots for childless couples. Accordingly, the acceptance of social robots seems to decrease with the level of face-to-face emotions involved.
Deafblindness is a condition that limits communication capabilities primarily to the haptic channel. In the EU-funded project SUITCEYES we design a system which allows haptic and thermal communication via soft interfaces and textiles. Based on user needs and informed by disability studies, we combine elements from smart textiles, sensors, semantic technologies, image processing, face and object recognition, machine learning, affective computing, and gamification. In this work, we present the underlying concepts and the overall design vision of the resulting assistive smart wearable.
Mit Gendering Marteloskope stellen wir Entwicklungsprozess dar: Entstanden ist videografisches Material in Marteloskopen, die im Wald Bäume, Tablets und Menschen in Dialog zueinander setzen. Die Videografie und die Erfahrungen vor Ort werden mit Ansätzen aus Gender in Science and Technlogy Studies reflektiert sowie mit digital unterstützter kollaborativer Didaktik über interaktive Webdokumentationen zu Open Science Modulen zusammengeführt.
The economic dispatch (ED) problem is a large-scale optimization problem in electricity power grids. Its goal is to find a power output combination of all generator nodes that meet the demand of the customers at minimum operating cost. In recent years, distributed protocols have been proposed to replace the traditional centralized ED calculation for modern smart grid infrastructures with the most realistic being the one proposed by Binetti et al. (2014). However, we show that this protocol leaks private information of the generator nodes. We then propose a privacy-preserving distributed protocol that solves the ED problem. We analyze the security of our protocol and give experimental results from a prototype implementation to show the feasibility of the solution.
In this paper we report on the commercial background as well as resulting high-level architecture and design of a cloud-based system for cryptographic software protection and licensing. This is based on the experiences and insights gained in the context of a real-world commercial R&D project at Wibu-Systems AG, a company that specialises in software encryption and licensing solutions.
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.