Refine
Year of publication
- 2017 (34) (remove)
Document Type
- Conference Proceeding (18)
- Article (11)
- Part of Periodical (2)
- Report (2)
- Lecture (1)
Is part of the Bibliography
- no (34) (remove)
Keywords
- Automated Driving Technology (1)
- Automotive User Interfaces (1)
- Fachhochschule (1)
- Future Driving Experiences (1)
- Hochschule Ruhr West (1)
- Mülheim an der Ruhr (1)
- Public Relations (1)
- Quality Criteria (1)
- Wissensmanagement (1)
- Zeitschrift (1)
A Large and Quick Induction Field Scanner for Examining the Interior of Extended Objects or Humans
(2017)
This study describes the techniques and signal properties of a large, powerful, and linear-scanning 1.5 MHz induction field scanner. The mechanical system is capable of quickly reading the volume of relative large objects, e.g., a test person. The general approach mirrors Magnetic Induction Tomography (MIT), but the details differ considerably from currently-described MIT systems: the setup is asymmetrical, and it operates in gradiometric modalities, either with coaxial excitation with destructive interference or with a single excitation loop and tilted receivers. Following this approach, the primary signals were almost completely nulled, and test objects' real or imaginary imprint was obtained directly. The coaxial gradiometer appeared advantageous: exposure to strong fields was reduced due to destructive interference. Meanwhile, the signals included enhanced components at higher spatial frequencies, thereby obtaining a gradually improved capability for localization. For robust signals, the excitation field can be powered towards the rated limits of human exposure to time-varying magnetic fields. Repeated measurements assessed the important signal integrity, which is affected by the scanner´s imperfections, particularly any motions or respiratory changes in living beings during or between repeated scans. The currently achieved and overall figure of merit for artifacts was 58 dB for inanimate test objects and 44 dB for a test person. Both numbers should be understood as worst case levels: a repeated scan with intermediate breathing and drift/dislocations requires 50 seconds, whereas a single measurement (with respiratory arrest) takes only about 5 seconds.
This experimental study demonstrates for the first time a solid-state circuitry and design for a simple compact copper coil (without an additional bulky permanent magnet or bulky electromagnet) as a contactless electromagnetic acoustic transducer (EMAT) for pulse echo operation at MHz frequencies. A pulsed ultrasound emission into a metallic test object is electromagnetically excited by
an intense MHz burst at up to 500 A through the 0.15 mm filaments of the transducer. Immediately thereafter, a smoother and quasi “DC-like” current of 100 A is applied for about 1 ms and allows an
echo detection. The ultrasonic pulse echo operation for a simple, compact, non-contacting copper coil is new. Application scenarios for compact transducer techniques include very narrow and
hostile environments, in which, e.g., quickly moving metal parts must be tested with only one, non-contacting ultrasound shot. The small transducer coil can be operated remotely with a cable
connection, separate from the much bulkier supply circuitry. Several options for more technical and fundamental progress are discussed.
Photoluminescence (PL) in GaN or InGaN layers monitored during epitaxial growth at high temperatures permits a quasi-continuous in situ characterization of opto-electronic properties. Therefore, epitaxial parameters can now be optimized at the earliest possible stage. A pulsed and high-power UV laser was required for PL excitation at high temperatures. Herein, the underlying nonlinear mechanism was studied via time-resolved PL experiments and rate equation-based modeling. A temperature-activated and saturable path for quenching over defects was identified. Beyond the saturation threshold, reasonably-intensive PL sets in. At high temperatures not only is the near band gap-PL present, but also—as a new observation—a defect-assisted PL emerges. Apart from these specific electronic transitions in high-temperature PL of GaN, a simple, but reasonably predictive model of the luminescent thin film has been set up to track down interference fringes in the PL spectra. It is worth mentioning that the spectral PL modulation (aiming at the Purcell effect) is often mixed up with ordinary Fabry–Pérot interference. A distinction has become key to properly analyze the spectral signatures of high-temperature PL in order to provide a reliable in situ characterization of GaN layers during epitaxial growth
Background:
Influential actors detection in social media such as twitter or Facebook can play a major role in gathering opinions on particular topics, improving the market
-
ing efficiency, predicting the trends, etc.
Proposed methods:
This work aims to extend our formally defined
T
measure to
present a new measure aiming to recognize the actor’s influence by the strength of
attracting new important actors into a networked community. Therefore, we propose a
model of the actor’s influence based on the attractiveness of the actor in relation to the
number of other attractors with whom he/she has established connections over time.
Results and conclusions:
Using an empirically collected social network for the
underlying graph, we have applied the above-mentioned measure of influence in
order to determine optimal seeds in a simulation of influence maximization. We study
our extended measure in the context of information diffusion because this measure is
based on a model of actors who attract others to be active members in a community.
This corresponds to the idea of the IC simulation model which is used to identify the
most important spreaders in a set of actors.
Keywords: Actor influence, Social media networks, Twitter, IC model, Information
diffusion, Independent cascade model, T measure
Wissensmanagement (WM) und IT-gestütztes Lernen sind gerade in kleinen Behörden der Öffentlichen Verwaltung (ÖV), wie z.B. in ländlichen
Gemeinden, noch ausbaufähig. Am Beispiel des EU-Projekts EAGLE werden
Projektergebnisse als Verbesserungsansätze für ein arbeitsprozessorientiertes, IT-gestütztes Lernen vorgestellt. Neuartige Plattform-Features und ihr ÖV-spezifischer Nutzen werden erläutert. Die Ergebnisse der Plattformvalidierung werden vorgestellt. Ferner werden Vorschläge gemacht, wie die Ergebnisse aus EAGLE mit WM und weiteren Wissensquellen der ÖV, wie z.B. der Registratur, zu einem Gesamtkonzept mit bereits vorhandenen Fortbildungs- und WM-Ansätzen verbunden werden können.
We present a pipeline for recognizing dynamic freehand gestures on mobile devices based on extracting depth information coming from a single Time-of-Flight sensor. Hand gestures are recorded with a mobile 3D sensor, transformed frame by frame into an appropriate 3D descriptor and fed into a deep LSTM network for recognition purposes. LSTM being a recurrent neural model, it is uniquely suited for classifying explicitly time-dependent data such as hand gestures. For training and testing purposes, we create a small database of four hand gesture classes, each comprising 40 × 150 3D frames. We conduct experiments concerning execution speed on a mobile device, generalization capability as a function of network topology, and classification ability ‘ahead of time’, i.e., when the gesture is not yet completed. Recognition rates are high (>95%) and maintainable in real-time as a single classification step requires less than 1 ms computation time, introducing freehand gestures for mobile systems.
Web based security applications have become increasingly important in the past years. Especially in times of blockchain based crypto currencies, user authentication is a critical aspect for the overall security, integrity and acceptance of such systems. While blockchain technologies provide a decentralized approach, the client side still largely relies on centralized security approaches. Those centralized approaches are easier to implement, but at the same time bear the risk of usual security flaws. Therefore, this paper presents a decentralized approach for increasing the security by adding a decentralized two-factor authentication mechanism to the execution of
operations.