Refine
Year of publication
- 2017 (26) (remove)
Document Type
- Conference Proceeding (17)
- Article (9)
Language
- English (26) (remove)
Is part of the Bibliography
- no (26)
Keywords
Background:
Influential actors detection in social media such as twitter or Facebook can play a major role in gathering opinions on particular topics, improving the market
-
ing efficiency, predicting the trends, etc.
Proposed methods:
This work aims to extend our formally defined
T
measure to
present a new measure aiming to recognize the actor’s influence by the strength of
attracting new important actors into a networked community. Therefore, we propose a
model of the actor’s influence based on the attractiveness of the actor in relation to the
number of other attractors with whom he/she has established connections over time.
Results and conclusions:
Using an empirically collected social network for the
underlying graph, we have applied the above-mentioned measure of influence in
order to determine optimal seeds in a simulation of influence maximization. We study
our extended measure in the context of information diffusion because this measure is
based on a model of actors who attract others to be active members in a community.
This corresponds to the idea of the IC simulation model which is used to identify the
most important spreaders in a set of actors.
Keywords: Actor influence, Social media networks, Twitter, IC model, Information
diffusion, Independent cascade model, T measure
The Bitcoin whitepaper states that security of the system is guaranteed as long as honest miners control more than half of the current total computational power. The whitepaper assumes a static difficulty, thus it is equally hard to solve a cryptographic proof-of-work puzzle for any given moment of the system history. However, the real Bitcoin network is using an adaptive difficulty adjustment mechanism. In this paper we introduce and analyze a new kind of attack on a mining difficulty retargeting function used in Bitcoin. A malicious miner is increasing his mining profits from the attack, named coin-hopping attack, and, as a side effect, an average delay between blocks is increasing. We propose an alternative difficulty adjustment algorithm in order to reduce an incentive to perform coin-hopping, and also to improve stability of inter-block delays. Finally, we evaluate the presented approach and show that the novel algorithm performs better than the original algorithm of Bitcoin.
Process Monitoring in Steel-Mills using Impedance Analysis: VNA Improvement for Data Acquisition
(2017)
The process automation extends over every manufacturing step of a product in the steel-mill to increase the quality, quantity and energy efficiency. The product dimensions are an important part of the quality control; these must maintain the specified tolerances. Additional to the cross-sectional-area, the measured data contains much more information about the manufacturing process, e.g. eccentricity, condition of the rolls and defects of the rod. For analyzing the measured data and to gather more information about the manufacturing process it is necessary to increase the speed of the data acquisition by performing some modifications of the VNA, e.g. faster analog to digital converter and microcontroller, improved firmware and optimized values of the passive electrical components for faster time constants and transient responses.
In recent times, a lot of attacks against central server infrastructures have been recognized. Those infrastructures have seen attacks ranging from attacks against Internt of Things (IoT) infrastructures, via attacks against public infrastructure to attacks against cryptocurrency exchanges and blockchain based infrastructures themselves, e.g., the already almost legendary Decentralized Autonomous Organization (DAO) hack. Measured by press coverage, attacks against cryptocurrency exchanges and infrastructures seem to be among the most prominently reported attacks, probably due to the large amount of money that is stolen during those attacks and the great (but obviously still quite risky) potential (and financial involvement) of the blockchain technology. Naturally, attacks like the ones we have seen recently in crease the notion of uncertainty of blockchain technologies among the people,mreflected in lower values of cryptocurrencies in general. Obviously, this demands for an overall increase of security of cryptocurrency based technologies. Therefore, this paper provides an architectural approach, based on a proxy,to increase security of publicly available nodes of a blockchain based technology. Furthermore, it provides a first evaluation of the approach based on the results of an extensive community test of a new cryptocurrency.
Increasing economic viability and safety through structural health monitoring of wind turbines
(2017)
Serious accidents with property damage or even human casualties, result from structural flaws in wind turbine rotor blades. Common maintenance practices result in long downtimes and do not lead to the required results. Therefore, the Ruhr West University of Applied Sciences and the iQbis Consulting GmbH, currently research a new structural health monitoring method for wind turbine rotor blades. The goal of this project is to build a sensor system that can detect structural weaknesses inside of rotor blades without the need of downtime for industrial climbers. This technology has the potential to prevent accidents, save lives, extend the useful life of wind turbines and optimize the production of green energy.
Gallium Nitride (GaN) and Indium Gallium Nitride (InGaN) have become important semiconductor materials for the LED lighting industry. Recently, a photoluminescence (PL) technique for direct in-situ characterization of GaN and InGaN layers during epitaxial growth in a planetary metalorganic vapor phase epitaxy (MOVPE) reactor was reported. The PL signals reveal – at the earliest possible stage – information about current layer thickness, temperature, composition, surface roughness, and self-absorption. Thus, the PL data is valuable for both controlling and optimizing the growth parameters, thereby promising both better devices and a better yield for the LED industry. This technical report describes an extension of this PL technique to close coupled showerhead (CCS) reactors with narrow optical viewports. In contrast to the wide aperture optics in previous investigations, a compact and all-fiber optical probe without voluminous lens optics, filter elements or beam splitters was used.
The detection of soil erosion processes in dams, hydraulic heave failure or corrosion processes of reinforcing steel in concrete are a small selection of measuring applications in civil engineering where the impedance analysis can be used to determine the measurand. Those measuring applications are having high requirements for the measuring hardware. For example a common interface for fast data exchange, high resolution, independent functionality and easy customizability to suit the measuring application. For that reason, a well-known application for steel-mill process monitoring can be used as a development platform. This hardware platform is based on a vector network analyzer and is meeting the requirements mainly. However, a couple of modifications has to be made, like replacing the ADC for a higher sample rate, Ethernet for easy and fast data exchange and the microcontroller for more calculation power.