Refine
Year of publication
- 2019 (23) (remove)
Document Type
- Conference Proceeding (14)
- Article (reviewed) (2)
- Bachelor Thesis (2)
- Book (1)
- Part of a Book (1)
- Doctoral Thesis (1)
- Master's Thesis (1)
- Article (unreviewed) (1)
Conference Type
- Konferenzartikel (13)
- Konferenzband (1)
Language
- English (23) (remove)
Keywords
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (23) (remove)
Open Access
- Closed Access (13)
- Open Access (10)
In the area of cloud computing, judging the fulfillment of service-level agreements on a technical level is gaining more and more importance. To support this we introduce privacy preserving set relations as inclusiveness and disjointness based ao Bloom filters. We propose to compose them in a slightly different way by applying a keyed hash function. Besides discussing the correctness of set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. Indeed, our solution proposes to bring another layer of privacy on the sizes. We are in particular interested how the overlapping bits of a Bloom filter impact the privacy level of our approach. We concretely apply our solution to a use case of cloud security audit on access control and present our results with real-world parameters.
This work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloomfilter based privacy approach is a valuable technical building block for the arising General Data Protection Regulation (GDPR) requirements in this area. In short, we apply a solution based on the Bloom filters data structure that allows a 3rd party to performsome privacy saving setrelations on a mobiletelco’s access logfile or other mobile access logfile from harvesting parties without revealing any other mobile users in the proximity of a mobile base station but still allowing to track perpetrators.
With this generation of devices, Virtual Reality (VR) has actually made it into the living rooms of end-users. These devices feature 6-DOF tracking, allowing them to move naturally in virtual worlds and experience them even more immersively. However, for a natural locomotion in the virtual, one needs a corresponding free space in the real environment. The available space is often limited, especially in everyday environments and under normal spatial conditions. Furnishings and objects of daily life can quickly become obstacles for VR users if they are not cleared away. Since the idea behind VR is to place users into a virtual world and to hide the real world as much as possible, invisible objects represent potential obstacles. The currently available systems offer only rudimentary assistance for this problem. If a user threatens to leave the space previously defined for use, a visual boundary is displayed to allow orientation within the space. These visual metaphors are intended to prevent users from leaving the safe area. However, there is no detection of potentially dangerous objects within this part of space. Objects that have not been cleared away or that have been added in the meantime may still become obstacles. This thesis shows how possible obstacles in the environment can be detected automatically with range imaging cameras and how users can be effectively warned about them in the virtual environment without significantly disturbing their sense of presence. Four different interactive visual metaphors are used to signalize the obstacles within the VE. With the help of a user study, the four signaling variants and the obstacle detection were evaluated and tested.
This paper describes the concept and some results of the project "Menschen Lernen Maschinelles Lernen" (Humans Learn Machine Learning, ML2) of the University of Applied Sciences Offenburg. It brings together students of different courses of study and practitioners from companies on the subject of Machine Learning. A mixture of blended learning and practical projects ensures a tight coupling of machine learning theory and application. The paper details the phases of ML2 and mentions two successful example projects.
The TriRhenaTech alliance universities and their partners presented their competences in the field of artificial intelligence and their cross-border cooperations with the industry at the tri-national conference 'Artificial Intelligence : from Research to Application' on March 13th, 2019 in Offenburg. The TriRhenaTech alliance is a network of universities in the Upper Rhine Trinational Metropolitan Region comprising of the German universities of applied sciences in Furtwangen, Kaiserslautern, Karlsruhe, and Offenburg, the Baden-Wuerttemberg Cooperative State University Loerrach, the French university network Alsace Tech (comprised of 14 'grandes écoles' in the fields of engineering, architecture and management) and the University of Applied Sciences and Arts Northwestern Switzerland. The alliance's common goal is to reinforce the transfer of knowledge, research, and technology, as well as the cross-border mobility of students.
Art and Photonics
(2019)
In this paper we report on our continuous efforts to apply optics and photonics in art. This results in interdisciplinary projects which sometimes lead to concrete art installations.
We presented some of these projects at the UNESCO headquarters in Paris, at the opening ceremony of the International Year of Light and the inaugural ceremony of the International Day of Light.
Some newer projects, such as “A Maze: Ingenious Pipes” and “The Power of Your Eyes,” are also presented in this paper.
We present our twenty years of experience in the live broadcasting of astronomical events, with the main focus on total lunar eclipses. Our efforts were motivated by the great impact and high number of viewers of these events. Visitors from over a hundred countries watched our live broadcasts. Our viewer record was set on July 27, 2018, with the live transmission of the total lunar eclipse from the Feldberg, the highest mountain in the Black Forest, attracting nearly half a million viewers in five hours.
An especially challenging activity was the live observing of the Mercury transit on 9 May 2016, which we presented as ‘live astronomy’ with hands-on telescope. The main goal of this event was to awake our students enthusiasm for optics and astronomy.
Furthermore, we report on our experiences with the photography of optical phenomena such as polar lights and green flash.
After the successful International Year of Light 2015, the idea of sustainability became increasingly imminent. After a preparatory year on 16 May 2018, the International Day of Light was launched for the first time. This event was celebrated with a public celebration in Paris at the UNESCO headquarters. In this paper we will present our projects dedicated to the International Day of Light in Paris. Together with a group of students from our university, we had the special opportunity to be integrated in the program of the opening ceremony at UNESCO in Paris. With our interdisciplinary projects we have tried to build a bridge between optics, photonics, art and media installations.
The authors explain a developed concept for research-oriented education in optics and photonics. It is presented which goals are to be achieved, which strategies have been developed and how these can be implemented in a blended learning scenario. The goal of our education is the best possible qualification of the students on the basis of a strong scientific and research-oriented education, which also includes the acquisition of important interdisciplinary competences. All phases of a research process are to be mapped in the learning process and offer students an insight into current research topics in optics and photonics.
Increased knowledge transfer through the integration of research projects into university teaching
(2019)
This paper describes the integration of the research project "Characterization of Color Vision using Spectroscopy and Nanotechnology: Application to Media Photonics" into an engineering course in the field of media technology. The aim is to develop the existing learning concept towards a more research-oriented teaching. Involving students in research projects as part of the learning process provides a deeper insight into current research topics and the key elements of scientific work. This makes it easier for students to recognize the importance of the acquired theoretical knowledge for the practice, which enables them to derive new insights of their own.
Walking interfaces offer advantages in navigation of VE systems over other types of locomotion. However, VR helmets have the disadvantage that users cannot see their immediate surroundings. Our publication describes the prototypical implementation of a virtual environment (VE) system, capable of detecting possible obstacles using an RGB-D sensor. In order to warn users of potential collisions with real objects while they are moving throughout the VE tracking area, we designed 4 different visual warning metaphors: Placeholder, Rubber Band, Color Indicator and Arrow. A small pilot study was carried out in which the participants had to solve a simple task and avoid any arbitrarily placed physical obstacles when crossing the virtual scene. Our results show that the Placeholder metaphor (in this case: trees), compared to the other variants, seems to be best suited for the correct estimation of the position of obstacles and in terms of the ability to evade them.
Protecting software from illegal access, intentional modification or reverse engineering is an inherently difficult practical problem involving code obfuscation techniques and real-time cryptographic protection of code. In traditional systems a secure element (the "dongle") is used to protect software. However, this approach suffers from several technical and economical drawbacks such as the dongle being lost or broken.
We present a system that provides such dongles as a cloud service, and more importantly, provides the required cryptographic material to control access to software functionality in real-time.
This system is developed as part of an ongoing nationally funded research project and is now entering a first trial stage with stakeholders from different industrial sectors.
The development of secure software systems is of ever-increasing importance. While software companies often invest large amounts of resources into the upkeeping and general security properties of large-scale applications when in production, they appear to neglect utilizing threat modeling in the earlier stages of the software development lifecycle. When applied during the design phase of development, and continuously throughout development iterations, threat modeling can help to establish a "Secure by Design" approach. This approach allows issues relating to IT security to be found early during development, reducing the need for later improvement – and thus saving resources in the long term. In this paper the current state of threat modeling is investigated. This investigation drove the derivation of requirements for the development of a new threat modelling framework and tool, called OVVL. OVVL utilizes concepts of established threat modeling methodologies, as well as functionality not available in existing solutions.
New employees are supposed to quickly understand their tasks, internal processes and familiarize with colleagues. This process is called “onboarding” and is still mainly realized by organizational methods from human resource management, such as introductory events or special employee sessions. Software tools and especially mobile applications are an innovative means to support provide onboarding processes in a modern, even remote, way. In this paper we analyze how the use of gamification can enhance onboarding processes. Firstly, we describe a mobile onboarding application specifically developed for the young, technically literate generations Y and Z, who are just about to start their career. Secondly, we report on a study with 98 students and young employees. We found that participants enjoyed the gamified application. They especially appreciated the feature “Team Bingo” which facilitates social integration and teambuilding. Based on the OCEAN personality model (“Big Five”), the personality traits agreeableness and openness revealed significant correlations with a preference for the gamified onboarding application.
Robots and automata are key elements of every vision and forecast of life in the near and distant future. However, robots and automata also have a long history, which reaches back into antiquity. Today most historians think that one of the key roles of robots and automata was to amaze or even terrify the audience: They were designed to express something mythical, magical, and not explainable. Moreover, the visions of robots and their envisioned fields of application reflect the different societies. Therefore, this short history of robotics and (especially) anthropomorphic automata aims to give an overview of several historical periods and their perspective on the topic. In a second step, this work aims to encourage readers to reflect on the recent discussion about fields of application as well as the role of robotics today and in the future.
What emotional effects does gamification have on users who work or learn with repetitive tasks? In this work, we use biosignals to analyze these affective effects of gamification. After a brief discussion of related work, we describe the implementation of an assistive system augmenting work by projecting elements for guidance and gamification. We also show how this system can be extended to analyse users' emotions. In a user study, we analyse both biosignals (facial expressions and electrodermal activity), and regular performance measures (error rate and task completion time).
For the performance measures, the results confirm known effects like increased speed and slightly increased error rate. In addition, the analysis of the biosignals provides strong evidence for two major affective effects: the gamification of work and learning tasks incites highly significantly more positive emotions and increases emotionality altogether. The results add to the design of assistive systems, which are aware of the physical as well as the affective context.
Social robots not only work with humans in collaborative workspaces – we meet them in shopping malls and even more personal settings like health and care. Does this imply they should become more human, able to interpret and adequately respond to human emotions? Do we want them to help elderly persons? Do we want them to support us when we are old ourselves? Do we want them to just clean and keep things orderly – or would we accept them helping us to go to the toilet, or even feed us if we suffer from Parkinson’s disease?
The answers to these questions differ from person to person. They depend on cultural background, personal experiences – but probably most of all on the robot in question. This book covers the phenomenon of social robots from the historic roots to today’s best practices and future perspectives. To achieve this, we used a hands-on, interdisciplinary approach, incorporating findings from computer scientists, engineers, designers, psychologists, doctors, nurses, historians and many more. The book also covers a vast spectrum of applications, from collaborative industrial work over education to sales. Especially for developments with a high societal impact like robots in health and care settings, the authors discuss not only technology, design and usage but also ethical aspects.
Thus this book creates both a compendium and a guideline, helping to navigate the design space for future developments in social robotics.
For e-commerce retailers it is crucial to present their products both informatively and attractively. Virtual reality (VR) systems represent a new marketing tool that supports customers in their decision-making process and offers an extraordinary product experience. Despite these advantages, the use of this technology for e-commerce retailers is also associated with risks, namely cybersickness. The aim of the study is to investigate the occurrence of cybersickness in the context of the customer’s perceived enjoyment and the perceived challenge of a VR product presentation. Based on a conceptual research framework, a laboratory study with 533 participants was conducted to determine the influence of these factors on the occurrence of cybersickness. The results demonstrate that the perceived challenge has a substantially stronger impact on the occurrence of cybersickness, which can only be partially reduced by perceived enjoyment. When realizing VR applications in general and VR product presentations in particular, e-commerce retailers should therefore first minimize possible challenges instead of focusing primarily on entertainment aspects of such applications.
Purpose
The purpose of this study is to investigate the effects of telepresence while using a smartphone-based virtual reality system (SBVR) to explore a hotel virtually and to determine the influence of this immersive experience on the booking intention of the potential customer.
Design/methodology/approach
Within the scope of this study, a conceptual research model was developed which covered utilitarian and hedonic aspects of the user experience of SBVRs and showed their relevance for the booking intention. A virtual reality application was programmed especially for the study, in which the test persons were able to virtually explore a hotel complex. A total of 569 people participated in the study. A questionnaire was used for the data collection. The structural equation modelling and hypothesis verification were carried out using the partial least squares method.
Findings
The immersive feeling of telepresence increases the perceived enjoyment and usefulness of the potential customer. In addition, the user's curiosity is aroused by the telepresence, which also significantly increases the perceived enjoyment as well as the perceived usefulness. The hedonic and utilitarian value of the virtual hotel experience increases the probability that the customer will book the travel accommodation.
Research limitations/implications
The virtual reality application developed for the study is based on static panoramic images and does not contain audio-visual elements (e.g. sound, video, animation). Audio-visual elements might increase the degree of immersion and could therefore be investigated in future research.
Practical implications
The results of the study show that the SBVR is a suitable marketing tool to present hotels in an informative and entertaining way, and can thereby increase sales and profits.
Originality/value
For the first time, this study investigates the potential of SBVRs for the virtual product presentation of hotels and provides empirical evidence that the availability of this innovative form of presentation leads to a higher booking intention.
The core logging and tracing facility in Windows operating system is called Event Tracing for Windows (ETW).
Data sources providing events for ETW are instrumented all over the operating system.
That means most hard- and software assets in a Windows system are instrumented with ETW and so are able to contribute low-level information.
ETW can be used by developers and administrators to get low-level information about operating system's activity.
We describe existing tools to interact with the ETW faciltity and evaluate them based on defined criteria.
Based on relevant application scenarios, we show the richness of informational content for debugging or detecting security incidents with ETW.
The widely used instrumentation of ETW in the operating system and its application results also in security risks according to confidentiality.
Based on common ETW providers we show the impact to confidentiality what ETW offers an adversary.
At the end we evaluate solutions and approaches for a customizable telemetry infrastructure using ETW in large-scale environments.
Virtual reality in the hotel industry: assessing the acceptance of immersive hotel presentation
(2019)
In the hotel industry, it is crucial to reduce the inherent information asymmetry with regard to the goods offered. This asymmetry can be minimised through the use of smartphone-based virtual reality applications (SBVRs), which allow virtual simulation of real experiences and thus enable more efficient information retrieval. The aim of the study is to determine for the first time the user acceptance of these immersive hotel presentations for assessing the performance of a travel accommodation. For this purpose, the Technology Acceptance Model (TAM) was used to explain the acceptance behaviour for this new technology. A virtual reality application was specially developed, in which the participants could explore a hotel virtually. A total of 569 participants took part in the study. The structural equation model and the hypotheses were tested using a Partial Least Squares (PLS) analysis. The results illustrate that the immersive product experience leads to more efficient information gathering. The perceived usefulness significantly affects the attitude towards using the technology as well as the intention to use it. In contrast to the traditional TAM, the perceived ease of use of SBVRs has no effect on the perceived usefulness or attitude towards using the technology.
Webassembly is a new technology to create application in a new way. Webassembly is being developed since 2017 by the worldwide web consortium (w3c). The primary task of webassembly is to improve web applications.
Today, more and more applications are being created as web applications. Web applications have some advantages - they are platform independent and even mobile platforms can run them, and no installation is needed apart from a modern web browser.
Currently, web applications are being developed in JavaScript (JS), hypertext mark-up language 5 (HTML 5), and cascading style sheets (CSS).
These technologies are not made for huge web applications, but they should not be replaced by webassembly; rather, webassembly is an extension to the currently existing technology.
The purpose of webassembly is to fix or improve the problems in web application development.
This master’s thesis reviews all of the aspects and checks whether the promises of webassembly are kept and where problems still exist.
The development of secure software systems is of ever-increasing importance. While software companies often invest large amounts of resources into the upkeeping and general security properties of large-scale applications when in production, they appear to neglect utilizing threat modeling in the earlier stages of the software development lifecycle. When applied during the design phase of development, and continuously during development iterations, threat modeling can help in following a “Security by Design” approach. This approach allows issues relating to IT security to be found early during development, reducing the need for later improvement – and thus saving resources in the long term. In this thesis the current state of threat modeling is investigated. Based on this analysis, requirements for a new tool are derived. These requirements are then used to develop a new tool, called OVVL, which utilizes all main components of current threat modeling methodologies, as well as functionality not available in existing solutions. After documenting the development process and OVVL in general, this newly developed tool is used to conduct two case studies in the field of e-commerce and IoT.