Refine
Year of publication
- 2015 (41) (remove)
Document Type
- Conference Proceeding (29)
- Article (3)
- Part of a Book (3)
- Part of Periodical (3)
- Contribution to a Periodical (2)
- Working Paper (1)
Is part of the Bibliography
- no (41)
Keywords
- Fachhochschule (2)
- Hochschule Ruhr West (2)
- Mülheim an der Ruhr (2)
- Zeitschrift (2)
- Data visualization (1)
- Framework (1)
- Image color analysis (1)
- Intercultural sharing (1)
- Knowledge sharing (1)
- Layout (1)
Die Entwicklung von vollautomatisierten Fahrzeugen wird in der gesellschaftlichen Diskussion immer präsenter. Wichtig für die Durchsetzung und verbreitete Nutzung dieser technischer Neuerungen ist jedoch vor allem die Akzeptanz der Bevölkerung – in diesem Fall nicht nur die der potenziellen KäuferInnen sondern auch die der übrigen Verkehrs-teilnehmenden. Vorgestellt wird eine explorative Online-Studie zur Akzeptanz von auto-nomen Fahren basierend auf quantitativen und qualitativen Daten einer Stichprobe von N = 89. Die Ergebnisse zeigen unter anderem eine geringe Vertrautheit mit dem Thema, ein vergleichsweise ausgeprägtes Vertrauen aber eine geringe Nutzungsabsicht.
Why do barriers to the exchange of open knowledge resources change in public administrations? Experts in the public sector have been interviewed and outlined antecedents of change to certain barriers. The results are an initial step towards theorizing on barrier change and stepping beyond the current trend of categorizing difficulties to e-Learning and use of open knowledge resources. Categorizing only shows the range of potential challenges. Whether and how the barriers change, however, is seldom addressed in previous literature. The results presented in this study thus provide a new perspective on the phenomenon. Results are part of a longitudinal study about open e-Learning in the public sector across four European countries. They will provide fresh empirical input for discussions at the World Conference on E-Learning how to advance future research and practices in the domain
In this paper we present an approach for People-to-People recommendations based on a Rich Context Model (RCM). We consider personal user information as contextual information used for our recommendations. The evaluation of our recommendation approach was performed on a social network of students. The obtained results do show a significant increase in performance while, at the same time, a slight increase in quality in comparison to a manual matching process. The proposed approach is flexible enough to handle different data types of contextual information and easy adaptable to other recommendation domains.
Social networking sites (SNSs) are an integral part of our daily life. With the evermore increasing appearance of SNSs, their users spend considerable time producing of different forms everyday (e.g. text, videos, photos, links, etc.) or browsing the varieties of contents in different SNSs. In this paper, we propose an architectural perspective on a framework that provides a unified environment through which users can produce and browse different contents of SNSs from one place.
The continuous evolution of learning technologies combined with the changes within ubiquitous learning environments in which they operate result in dynamic and complex requirements that are challenging to meet. The fact that these systems evolve over time makes it difficult to adapt to the constant changing requirements. Existing approaches in the field of Technology Enhanced Learning (TEL) are generally not addressing those issues and they fail to adapt to those dynamic situations. In this chapter, we investigate the notion of an adaptive and adaptable architecture as a possible solution to address these challenges. We conduct a literature survey upon the state of the art and state of practice in this area. The outcomes of those efforts result in an initial model of a Domain-specific architecture to tackle the issues of adaptability and adaptiveness. To illustrate these ideas, we provide a number of scenarios where this architecture can be applied or is already applied. Our proposed approach serves as a foundation for addressing future ubiquitous learning applications where new technologies constantly emerge and new requirements evolve.
Human computer interaction in security and time-critical systems is an interdisciplinary challenge at the seams of human factors, engineering, information systems and computer science. Application fields include control systems, critical infrastructures, vehicle and traffic management, production technology, business continuity management, medical technology, crisis management and civil protection. Nowadays in many areas mobile and ubiquitous computing as well as social media and collaborative technologies also plays an important role. The specific challenges require the discussion and development of new methods and approaches in order to design information systems. These are going to be addressed in this special issue with a particular focus on technologies for citizen and volunteers in emergencies.
Global software development changes the requirements in terms of soft competency and increases the complexity of social interaction by including intercultural aspects. While soft competency is often seen as crucial for the success of global software development projects, the concrete competence requirements remain unknown. Internationalization competency represents one of the first attempts to structure and describe the soft competence requirements for global software developers. Based on the diversity of tasks, competence requirements will differ among the various phases of software development. By conducting a survey on the importance of internationalization competences for the different phases of global software development, we identified differences in terms of competence importance and requirements in the phases. “Adaptability” (of one's working style) and “Cultural Awareness” were the main differences. “Cultural Awareness” distinguishes requirements engineering and software design from testing and implementation while “Adaptability” distinguishes implementation and software design from requirements engineering and testing.
Resource Usage in Online Courses: Analyzing Learner’s Active and Passive Participation Patterns
(2015)
The paper analyzes the experience with an open university course for a very heterogeneous target group in which MOOC-like materials and activities were used. The course was conducted in a specifically prepared and extended Moodle environment. The analysis involves questionnaires as well as performance data that reflect the resource access on the learning platform. A special focus is put on the participants’ acceptance and usage of student-generated versus teacher-provided learning content. Network analysis techniques have been used to identify "interest clusters" of students around certain resources.
As smart homes are being more and more popular, the needs of finding assisting systems which interface between users and home environments are growing. Furthermore, for people living in such homes, elderly and disabled people in particular and others in general, it is totally important to develop devices, which can support and aid them in their ordinary daily life. We focused in this work on sustaining privacy issues of the user during a real interaction with the surrounding home environment. A smart person-specific assistant system for services in home environment is proposed. The role of this system is the assisting of persons by controlling home activities and guiding the adaption of Smart-Home-Human interface towards the needs of the considered person. At the same time the system sustains privacy issues of it’s interaction partner. As a special case of medical assisting the system is so implemented, that it provides for elderly or disabled people person-specific medical assistance . The system has the ability of identifying its interaction partner using some biometric features. According to the recognized ID the system, first, adopts towards the needs of recognized person. Second the system represents person-specific list of medicines either visually or auditive. And third the system gives an alarm in the case of taking medicament either later or earlier as normal taking time.
Detection of influential actors in social media plays an important role for increasing the quality and efficiency of work and services in many fields such as education, marketing, etc. This work aims to introduce a new approach for the characterization of influential actors in online social media, such as Twitter. We present on a model of influence of an actor that is based on the attractiveness of the actor in terms of the number of other new actors with which he or she has established relations over time. We have used this concept and measure of influence to determine optimal seeds in a simulation of influence maximization using two empirically collected social networks for the underlying graphs.
We present a novel approach of distributing small-to mid-scale neural networks onto modern parallel architectures. In this context we discuss the induced challenges and possible solutions. We provide a detailed theoretical analysis with respect to space and time complexities and reinforce our computation model with evaluations which show a performance gain over state of the art approaches.
Bei Großschadensereignissen kann es durch die Vielzahl der Alarme dazu kommen, dass die verfügbaren Rettungskräfte nicht mehr ausreichen, um die anfallenden Aufgaben zu bewältigen oder Hilfsfristen einzuhalten. Die vorliegende Arbeit beschreibt einen Ansatz, sich zusätzlicher Hilfe aus der Bevölkerung zu bedienen, die über einen Disponenten aus der vorhandenen Leitstelle koordiniert wird. Dabei stehen nicht spontan organisierte Helfer im Vordergrund, sondern Personen, die sich vorab mit einem klaren Fertigkeitsprofil und ggf. auch Ausstattung im System registriert haben. Besondere Anforderungen entstehen bei den Disponenten der Leitstelle, deren Mehrbelastung durch das neue System gering zu halten ist, als auch bei den freiwilligen Helfern, die über eine App auf dem Mobiltelefon alarmiert werden und auch darüber die Kommunikation führen sollen. Die Anforderungen beeinflussen sowohl die System-Infrastruktur als auch die Benutzerschnittstelle.
Der Bedarf an feuerverzinkten Stahlbändern ist besonders in der Automobilindustrie sehr groß und es werden zugleich immer höhere Qualitäten gefordert. Hierbei bildet vor allem die Homogenität der Zinkschichtdicke ein entscheidendes Qualitätsmerkmal. Um das Stahlband ausreichend vor Umwelteinflüssen zu schützen, muss eine, vom Kunden spezifizierte, Mindestzinkschichtdicke aufgetragen werden. Beim hier angewandten Verzinkungsverfahren durchläuft das Band ein Zinkbad und anschließend wird das überschüssige Zink berührungs-los mittels sogenannten Abblasdüse so abgetragen, sodass eine möglichst homogene Zinkschicht erhalten bleibt. Hierzu ist es notwendig den Abstand zwischen Band und Airknife konstant zu halten. Störende Bandbewegungen führen zu inhomogene Zinkschichtdicken, welche die Qualität der Verzinkung vermindern. Diese Qualitätsverminderung und der erhöhte Zinkeinsatz soll durch geeignete Maßnahmen verringert werden. Bisher eingesetzte berührungslose Bandstabilisatoren können die Bandbewegung im Allge-meinen dämpfen, jedoch treten noch Betriebszustände auf, in denen eine inhomogene Zinkschicht sichtbar ist. Die Ursache dieser Inhomogenitäten liegt in anlagenbedingten dominanten Schwingungen des Bandes, deren Ursache zu klären ist. Im vorliegenden Beitrag wird ein Modell der Bandbewegung vorgestellt, das durch die theore-tische Modellbildung und experimentelle Identifikation erstellt worden ist. Das Modell beschreibt die Bewegung des Bandes bezüglich ausgewählter Freiheitsgrade und ermöglicht die Analyse der kritischen Betriebszustände. Darüber hinaus soll dieses Modell zur Stabilisierung des Bandes in einer modellgestützten Reglung verwendet werden.
Mensch-Maschine-Interaktion in sicherheitskritischen Systemen ist ein für die Informatik und die jeweiligen Anwendungsdomänen in der Bedeutung weiter zunehmendes Thema. Dieser Workshop der GI-Fachgruppe „Mensch-Maschine-Interaktion in sicherheitskritischen Systemen" innerhalb des Fachbereichs Mensch-Computer-Interaktion soll aktuelle Entwicklungen und Fragestellungen offenlegen und neue Impulse für das Forschungsgebiet geben.
MeHRWert Ausgabe 6 März 2015
(2015)
Recently, rescue worker resources have not been sufficient to meet the regular response time during large-scale catastrophic events in every case. However, many volunteers supported official forces in different disaster situations, often self-organized through social media. In this paper, a system will be introduced which allows the coordination of trained volunteers by a professional control center with the objective of a more efficient distribution of human resources and technical equipment. Volunteers are contacted via app on their private smartphone. The design of this app is based on user requirements gathered in focus group discussions. The feedback of the potential users includes privacy aspects, low energy consumption, and mechanisms for long-term motivation and training. The authors present the results of the focus group analyses as well as the transfer to their app design concept.
Object detection systems which operate on large data streams require an efficient scaling with available computation power. We analyze how the use of tile-images can increase the efficiency (i.e. execution speed) of distributed HOG-based object detectors. Furthermore we discuss the challenges of using our developed algorithms in practical large scale scenarios. We show with a structured evaluation that our approach can provide a speed-up of 30-180 % for existing architectures. Due to the its generic formulation it can be applied to a wide range of HOG-based (or similar) algorithms. In this context we also study the effects of applying our method to an existing detector and discuss a scalable strategy for distributing the computation among nodes in a cluster system.