Refine
Year of publication
Document Type
- Conference Proceeding (44)
- Article (22)
- Book (5)
- Part of a Book (4)
- Contribution to a Periodical (4)
- Report (2)
- Master's Thesis (1)
- Preprint (1)
Is part of the Bibliography
- no (83)
Keywords
Institute
Nowadays, teachers and students utilize different ICT devices for conducting innovative and educational activities from anywhere at any time. The enactment of these activities relies on robust communication and computational infrastructures used for supporting technological devices enabling better accessibility to educational resources and pedagogical scaffolds, wherever and whenever necessary. In this paper, we present EDU.Tube: an interactive environment that relies on web and mobile solutions offered to teachers and students for authoring and incorporating educational interactions at specific moments along the time line of occasional YouTube video-clips. The teachers and students could later experience these authored artefacts while interacting from their stationary or mobile devices. We describe our efforts related to the design, deployment and evaluation of an educational activity supported by the EDU.Tube environment. Furthermore, we illustrate the specific teachers’ and students’ efforts practiced along the different phases of this educational activity. The evaluation of this activity and results are presented, followed by a discussion of these findings, as well as some recommendations for future research efforts further elaborating on EDU.Tube’s aspects in relation to learning analytics.
In this paper we discuss how group processes can be influenced by designing specific tools in computer supported collaborative leaning. We present the design of a shared workspace application for co-constructive tasks that is enriched by certain functions that are able to track, analyze and feed back parameters of collaboration to group members. Thereby our interdisciplinary approach is mainly based on an integrative methodology for analyzing collaboration behavior and patterns in an implicit manner combined with explicit surveyed data of group members’ attitudes and its immediate feedback to the groups. In an exploratory study we examined the influence of this feedback function. Although we could only analyze ad-hoc groups in this study, we detected some benefits of our methodology which might enrich real life Learning Communities’ collaboration processes. The data analysis in our study showed advantages of this feedback on processes of a group’s well-being as well as parameters of participation. These results provide a basis for further empirical work on problem solving groups that are supported by means of parallel interaction analysis as well as its re-use as information resource.
Background:
Detection of influential actors in social media such as Twitter or Facebook plays an important role for improving the quality and efficiency of work and services in many fields such as education and marketing.
Methods:
The work described here aims to introduce a new approach that characterizes the influence of actors by the strength of attracting new active members into a networked community. We present a model of influence of an actor that is based on the attractiveness of the actor in terms of the number of other new actors with which he or she has established relations over time.
Results:
We have used this concept and measure of influence to determine optimal seeds in a simulation of influence maximization using two empirically collected social networks for the underlying graphs.
Conclusions:
Our empirical results on the datasets demonstrate that our measure stands out as a useful measure to define the attractors comparing to the other influence measures.
Background:
Influential actors detection in social media such as twitter or Facebook can play a major role in gathering opinions on particular topics, improving the market
-
ing efficiency, predicting the trends, etc.
Proposed methods:
This work aims to extend our formally defined
T
measure to
present a new measure aiming to recognize the actor’s influence by the strength of
attracting new important actors into a networked community. Therefore, we propose a
model of the actor’s influence based on the attractiveness of the actor in relation to the
number of other attractors with whom he/she has established connections over time.
Results and conclusions:
Using an empirically collected social network for the
underlying graph, we have applied the above-mentioned measure of influence in
order to determine optimal seeds in a simulation of influence maximization. We study
our extended measure in the context of information diffusion because this measure is
based on a model of actors who attract others to be active members in a community.
This corresponds to the idea of the IC simulation model which is used to identify the
most important spreaders in a set of actors.
Keywords: Actor influence, Social media networks, Twitter, IC model, Information
diffusion, Independent cascade model, T measure
The term “Cloud Computing” does not primarily specify new types of core technologies but rather addresses features to do with integration, interoperability and accessibility. Although not new, virtualization and automation are core features that characterize Cloud Computing. In this paper, we intend to explore the possibility of integrating cloud services with educational scenarios without re-defining neither the technology nor the usage scenarios from scratch. Our suggestion is based on certain solutions that have already been implemented and tested for specific cases.
DamokleS 4.0
(2019)
Dieser interne Bericht beschreibt die Zielsetzung, Durchführung und Auswertung des Projektes Damokles 4.0. Das Projekt zielt darauf ab, neue, digitale Technologien in die Schwerindustrie einzuführen um Produktionsprozesse zu modernisieren. Unter Einsatz neuer Technologien, insbesondere mobiler Geräte, soll ein cyberphyiskalisches System (CPS) eine kontextbasierte und künstlich intelligente Unterstützung der Mitarbeiter in den Bereichen der Schwerindustrie ermöglichen. Hierzu werden typische Anwendungsfälle und die damit verbundenen Szenarien zur Unterstützung der Mitarbeiter auf Basis von neuen, flexiblen, adaptiven und mobilen Technologien, wie Augmented Reality und künstlicher Intelligenz, modelliert. Um den Prototypen einer AR-Anwendung und einer kamerabasierte Personenverfolgung zu entwickeln, hat die Hochschule Ruhr West im kleinen Technikum am Campus Bottrop eine entsprechende industrielle Umgebung simuliert. Die Projektergebnisse zeigen die Anwendbarkeit der vorgeschlagenen Softwareansätze und die Ergebnisse einer Untersuchung der psychologischen Einflüsse auf die Mitarbeiter.
Web based security applications have become increasingly important in the past years. Especially in times of blockchain based crypto currencies, user authentication is a critical aspect for the overall security, integrity and acceptance of such systems. While blockchain technologies provide a decentralized approach, the client side still largely relies on centralized security approaches. Those centralized approaches are easier to implement, but at the same time bear the risk of usual security flaws. Therefore, this paper presents a decentralized approach for increasing the security by adding a decentralized two-factor authentication mechanism to the execution of
operations.
In recent times, a lot of attacks against central server infrastructures have been recognized. Those infrastructures have seen attacks ranging from attacks against Internt of Things (IoT) infrastructures, via attacks against public infrastructure to attacks against cryptocurrency exchanges and blockchain based infrastructures themselves, e.g., the already almost legendary Decentralized Autonomous Organization (DAO) hack. Measured by press coverage, attacks against cryptocurrency exchanges and infrastructures seem to be among the most prominently reported attacks, probably due to the large amount of money that is stolen during those attacks and the great (but obviously still quite risky) potential (and financial involvement) of the blockchain technology. Naturally, attacks like the ones we have seen recently in crease the notion of uncertainty of blockchain technologies among the people,mreflected in lower values of cryptocurrencies in general. Obviously, this demands for an overall increase of security of cryptocurrency based technologies. Therefore, this paper provides an architectural approach, based on a proxy,to increase security of publicly available nodes of a blockchain based technology. Furthermore, it provides a first evaluation of the approach based on the results of an extensive community test of a new cryptocurrency.