004 Informatik
Refine
Year of publication
- 2017 (16) (remove)
Document Type
- Conference Proceeding (9)
- Article (6)
- Report (1)
Is part of the Bibliography
- no (16)
Keywords
Institute
Background:
Influential actors detection in social media such as twitter or Facebook can play a major role in gathering opinions on particular topics, improving the market
-
ing efficiency, predicting the trends, etc.
Proposed methods:
This work aims to extend our formally defined
T
measure to
present a new measure aiming to recognize the actor’s influence by the strength of
attracting new important actors into a networked community. Therefore, we propose a
model of the actor’s influence based on the attractiveness of the actor in relation to the
number of other attractors with whom he/she has established connections over time.
Results and conclusions:
Using an empirically collected social network for the
underlying graph, we have applied the above-mentioned measure of influence in
order to determine optimal seeds in a simulation of influence maximization. We study
our extended measure in the context of information diffusion because this measure is
based on a model of actors who attract others to be active members in a community.
This corresponds to the idea of the IC simulation model which is used to identify the
most important spreaders in a set of actors.
Keywords: Actor influence, Social media networks, Twitter, IC model, Information
diffusion, Independent cascade model, T measure
Web based security applications have become increasingly important in the past years. Especially in times of blockchain based crypto currencies, user authentication is a critical aspect for the overall security, integrity and acceptance of such systems. While blockchain technologies provide a decentralized approach, the client side still largely relies on centralized security approaches. Those centralized approaches are easier to implement, but at the same time bear the risk of usual security flaws. Therefore, this paper presents a decentralized approach for increasing the security by adding a decentralized two-factor authentication mechanism to the execution of
operations.
In recent times, a lot of attacks against central server infrastructures have been recognized. Those infrastructures have seen attacks ranging from attacks against Internt of Things (IoT) infrastructures, via attacks against public infrastructure to attacks against cryptocurrency exchanges and blockchain based infrastructures themselves, e.g., the already almost legendary Decentralized Autonomous Organization (DAO) hack. Measured by press coverage, attacks against cryptocurrency exchanges and infrastructures seem to be among the most prominently reported attacks, probably due to the large amount of money that is stolen during those attacks and the great (but obviously still quite risky) potential (and financial involvement) of the blockchain technology. Naturally, attacks like the ones we have seen recently in crease the notion of uncertainty of blockchain technologies among the people,mreflected in lower values of cryptocurrencies in general. Obviously, this demands for an overall increase of security of cryptocurrency based technologies. Therefore, this paper provides an architectural approach, based on a proxy,to increase security of publicly available nodes of a blockchain based technology. Furthermore, it provides a first evaluation of the approach based on the results of an extensive community test of a new cryptocurrency.
In this contribution we present a novel approach to transform data from time-of-flight (ToF) sensors to be interpretable by Convolutional Neural Networks (CNNs). As ToF data tends to be overly noisy depending on various factors such as illumination, reflection coefficient and distance, the need for a robust algorithmic approach becomes evident. By spanning a three-dimensional grid of fixed size around each point cloud we are able to transform three-dimensional input to become processable by CNNs. This simple and effective neighborhood-preserving methodology demonstrates that CNNs are indeed able to extract the relevant information and learn a set of filters, enabling them to differentiate a complex set of ten different gestures obtained from 20 different individuals and containing 600.000 samples overall. Our 20-fold cross-validation shows the generalization performance of the network, achieving an accuracy of up to 98.5% on validation sets comprising 20.000 data samples. The real-time applicability of our system is demonstrated via an interactive validation on an infotainment system running with up to 40fps on an iPad in the vehicle interior.
Anonymity-preserving Methods for Client-side Filtering in Position-based Collaboration Approaches
(2017)
The open education movement has witnessed ups and downs from initial interest in transparency and openness, followed by a lack of reuse of open educational resources (OER) and the massive boost of interest in massive open online courses (MOOCs). This article addresses educators' online behaviors and perceptions regarding participation in collaborative development of OER in online settings. Using a data-driven approach to study educators' perceptions, this article presents multiple considerations for collaborative OER development and validates a new model explaining educators' intention to participate in collaborative action. The findings reveal the contradictory nature of emotional ownership of knowledge: a critical enabling factor for commitment and a barrier to knowledge exchange in an open and transparent manner. The findings also show how outcome expectations regarding increase in reputation and status in the network do not influence the intention to share knowledge. Further interviews with idea-sharing platform users enable us to explain the favorable settings to resolve the dilemma of emotional ownership. The study contributes not only to further development of the open education movement but also to theory development of educators’ collaborative behaviors online.
Autonomous driving is one of the future visions in which many vehicle manufacturers are working with high pressure.
Nowadays, it is already supported partially by high-class vehicles. A completely autonomous journey is indeed the goal, but in cars for
the public road traffic still not available. Automatic lane keeping assistants, speed regulators as well as shield and obstacle detections
are parts or precursors on the way to completely autonomous driving.
The American vehicle manufacturer Tesla is not only known for its electric drive, but also for the fact that high-pressure work is carried out on the autonomous drive. Tesla is thus the only vehicle manufacturer to use its users as so-called beta testers for its assistance systems. The progress and the function of the currently available Model S in the field of assistance systems and autonomic driving is documented and described in this paper. It is shown how good or bad the test vehicle manages scenarios in normal road traffic situations
with the assistance systems, e.g. lane keeping assistant, speed control, lane change and distance assistant, and which scenarios can
not be managed by the vehicle itself.
Das kEFIR‐Projekt untersucht die praktische Anwendung von thermographischen Verfahren zur Analyse der strukturellen Integrität von Windkraftrotorblättern. Das Projekt entstand in Zusammenarbeit der Hochschule Ruhr West (HRW) mit der IQbis Consulting GmbH im Rahmen eines ZIM‐Förderprojekts des Bundesministeriums für Wirtschaft und Energie (BMWi). Hintergrund ist die zunehmende Anzahl von Windkraftanlagen (WKA) und der somit steigende Wartungsaufwand. Um einen reibungslosen Betrieb dieser Anlagen zu gewährleisten und damit den besonderen Anforderungen an die Verfügbarkeit energieerzeugender Anlagen sicherzustellen, ist ein Bedarf an qualitativ hochwertigen Fehleranalysesystemen für im Betrieb befindlicher WKA von besonderer Bedeutung. Erfahrungsgemäß ist der Zeitaufwand für diese Inspektionen mit aktuellen Mitteln sehr groß und wird üblicherweise mit mehreren Arbeitstagen kalkuliert. Die Reproduzierbarkeit der gewonnenen Daten ist bei den derzeitigen Methoden meist nicht gewährleistet. Um frühzeitig auf Instabilitäten oder Schäden in den Rotorblättern einer WKA aufmerksam zu werden, ist die Entwicklung eines schnellen und qualitativ hoch wertigen Fehleranalysesystems von zentraler Bedeutung. Ein Forschungsschwerpunkt in diesem Zusammenhang ist die Entwicklung von geeigneten bildgebenden und berührungslosen Verfahren, welche bei den Inspektionen eingesetzt werden können. Beispielsweise erlaubt der Einsatz thermographischer Sensoren eine Analyse nicht nur der Rotorblattoberfläche, sondern auch ihrer inneren Struktur. Weiterhin ist aufgrund des schnell wachsenden Marktes bei unbemannten Luftfahrzeugen, wie beispielsweise positionsstabiler Quatrocoptersysteme, eine zusätzliche Möglichkeit gegeben, die Inspektion von Windenergieanlagen mit Hilfe mobiler, kompakter und fliegender Analysesysteme zu unterstützen.