Refine
Year of publication
Document Type
- Doctoral Thesis (245)
- Master's Thesis (91)
- Part of Periodical (84)
- Bachelor Thesis (45)
- Diploma Thesis (27)
- Article (13)
- Study Thesis (11)
- Conference Proceedings (10)
- Habilitation (4)
- Other (2)
- Book (1)
- Preprint (1)
Language
- English (534) (remove)
Keywords
- Pestizid (8)
- Pflanzenschutzmittel (6)
- Software Engineering (6)
- Internet of Things (5)
- Biodiversität (4)
- Bluetooth (4)
- Bodenchemie (4)
- Landwirtschaft (4)
- Semantic Web (4)
- ecotoxicology (4)
- ontology (4)
- risk assessment (4)
- soil organic matter (4)
- API (3)
- Crayfish plague (3)
- E-KRHyper (3)
- Enterprise 2.0 (3)
- Gamification (3)
- Insektizid (3)
- Knowledge Compilation (3)
- Maschinelles Lernen (3)
- Nanopartikel (3)
- OWL (3)
- OWL <Informatik> (3)
- Ontologie <Wissensverarbeitung> (3)
- Ontology (3)
- Pesticides (3)
- Risikoanalyse (3)
- Systematik (3)
- UML (3)
- Umweltpsychologie (3)
- University (3)
- agriculture (3)
- classification (3)
- computer clusters (3)
- model-based (3)
- pesticide (3)
- pesticides (3)
- virtual reality (3)
- Abduktion <Logik> (2)
- Abwasserreinigung (2)
- Agriculture (2)
- Akzeptanz (2)
- Annotation (2)
- Anpassung (2)
- Araneae (2)
- Beschaffung (2)
- Bestäubung (2)
- Bildverarbeitung (2)
- Biodiversity (2)
- Campus Information System (2)
- Cloud Computing (2)
- Computer Graphics (2)
- Computergraphik (2)
- Computersimulation (2)
- Data Mining (2)
- Diffusion (2)
- Ecotoxicology (2)
- Emissionen (2)
- Equality (2)
- Feldsaum (2)
- Formale Ontologie (2)
- Freshwater crayfish (2)
- GIS (2)
- Genetische Variabilität (2)
- Graphik (2)
- Grounded Theory (2)
- Habitat Fragmentation (2)
- Hydrodynamik (2)
- Kakamega Forest (2)
- Klimawandel (2)
- Kognitive Linguistik (2)
- Line Space (2)
- Linked Open Data (2)
- Logistik (2)
- Metamodel (2)
- Modellgetriebene Entwicklung (2)
- Nanoparticles (2)
- Netzwerk (2)
- Neuronales Netz (2)
- OpenGL (2)
- Petri Nets (2)
- Petri-Netze (2)
- Propagation (2)
- RDF (2)
- Risikobewertung (2)
- Risikomanagement (2)
- Schlussfolgern (2)
- Sediment (2)
- Serviceorientierte Architektur (2)
- Simulation (2)
- Softwaretest (2)
- Sozialpsychologie (2)
- Sustainability (2)
- Taxonomie (2)
- Taxonomy (2)
- Theorem Proving (2)
- Umwelttoxikologie (2)
- Umweltwissenschaften (2)
- Usability (2)
- Volumen-Rendering (2)
- Wastewater treatment plants (2)
- Wikipedia (2)
- Wirbellose (2)
- XML (2)
- aquatic ecotoxicology (2)
- aquatic macrophytes (2)
- artificial neural networks (2)
- constraint logic programming (2)
- decomposition (2)
- description logic (2)
- diffusion (2)
- ecotoxicity (2)
- emic-etic (2)
- eye tracking (2)
- framework (2)
- freshwater organisms (2)
- governance (2)
- hybrid automata (2)
- invertebrates (2)
- micropollutants (2)
- mobile phone (2)
- modelling (2)
- monitoring (2)
- mosquito control (2)
- multi-agent systems (2)
- multimedia metadata (2)
- optimal control (2)
- parallel algorithms (2)
- probability propagation nets (2)
- risk (2)
- semantics (2)
- simulation (2)
- social media (2)
- social simulation (2)
- soil water repellency (2)
- sorption (2)
- streams (2)
- tracking (2)
- traits (2)
- transformation (2)
- visualization (2)
- wastewater treatment (2)
- Ökosystem (2)
- Ökosystemdienstleistung (2)
- Ökotoxikologie (2)
- 101companies (1)
- 1H-NMR Relaxometry (1)
- 2019 European Parliament Election (1)
- 8C model (1)
- ABox (1)
- API Analysis (1)
- API Migratiom (1)
- API analysis (1)
- API-Analyse (1)
- AUTOSAR (1)
- Abbildung <Mathematik> (1)
- Abdrift <Pflanzenbau> (1)
- Absolutismus (1)
- Abwasser (1)
- Abwasserbehandlung (1)
- Acceleration Structures (1)
- Action Recognition (1)
- Action Segmentation (1)
- Ad-hoc-Netz (1)
- Adaptation (1)
- Adaptive Services Grid (ASG) (1)
- Adobe Flex (1)
- Africa (1)
- Afrika (1)
- Agenten (1)
- Agentenorientiertes Software Engineering (1)
- Agents (1)
- Agrarlandschaft (1)
- Agrochemikalien (1)
- Aktionsart (1)
- Aktiver Wortschatz (1)
- Algolib (1)
- Algorithm Engineering (1)
- Algorithmische Geometrie (1)
- Amazon Mechanical Turks (1)
- Amazonia (1)
- Amazonien (1)
- Amphibia (1)
- Analysis of social platform (1)
- Android <Systemplattform> (1)
- Anforderung (1)
- Antagonistic interactions (1)
- Aphanomyces astaci (1)
- Aphid predator (1)
- Aquatic Ecotoxicology (1)
- Aquatic Guidance Document (1)
- Aquatic ecology (1)
- Aquatische Makrophyten (1)
- Aquatisches Ökosystem (1)
- Architektur <Informatik> (1)
- Archivierung (1)
- Articles for Deletion (1)
- Artificial Intelligence (1)
- Artificial Neural Networks (1)
- Arzneimittel (1)
- Arzneistoffe (1)
- Aspekt <Linguistik> (1)
- Association Rules (1)
- Astacus astacus (1)
- Auchenorrhyncha (1)
- Auditing (1)
- Augenbewegung (1)
- Augmented Reality (1)
- Ausbreitung (1)
- Auslese (1)
- Auswahl (1)
- Automated Theorem Proving (1)
- Automated Theorem Proving Systems (1)
- Automatische Klassifikation (1)
- Automatisches Beweisverfahren (1)
- Automotive Systems (1)
- Autoritarismus (1)
- Avatar (1)
- B2B Integration (1)
- BPM (1)
- BPMN (1)
- BPMS (1)
- Bach (1)
- Barbatula barbatula (1)
- Basic psychological needs (1)
- Bayes Procedures (1)
- Bayes-Netz (1)
- Bayesian Networks (1)
- Beaconless (1)
- Bebauungsdichte (1)
- Bedarfsanalyse (1)
- Bedarfsforschung (1)
- Bedrohte Tiere (1)
- Bees (1)
- Befahrbarkeit (1)
- Belebtschlamm (1)
- Belief change, concept contraction, EL (1)
- Benetzung (1)
- Benutzerverhalten (1)
- Beruflicher Kontakt (1)
- Beschichtung (1)
- Beschreibungslogik (1)
- Bestäuber (1)
- Beta-Blocker (1)
- Beta-Diversität (1)
- Bewertungskriterien (1)
- Bienen <Familie> (1)
- Big Five (1)
- Bildanalyse (1)
- Bildsegmentierung (1)
- Bilingualer Unterricht (1)
- Binnengewässer (1)
- Bioassay (1)
- Biohydrogel (1)
- Biometric Authentication (1)
- Biopolymere (1)
- Biotransformation (1)
- Biozide (1)
- Bipartiter Graph (1)
- Blickbewegung (1)
- Blickpunktabhängig (1)
- Blog marketing (1)
- Boden (1)
- Bodenphysik (1)
- Bodenwasser (1)
- Bodenökologie (1)
- Bombina variegata (1)
- Border Gateway Protocol (1)
- Border Gateway Protocol 4 (1)
- Breeding tree selection (1)
- Budongo Forest (1)
- Building Performance Evaluation (1)
- Business Collaboration (1)
- Business English (1)
- Business Process Management Recommender Systems Survey (1)
- Business Process Modeling (1)
- Business Rule Bases, Inconsistency Measurement (1)
- Butterflies (1)
- Bärlappe (1)
- Bürgerbeiteiligung (1)
- C++ (1)
- CLIL (1)
- COVID-19 (1)
- CSCW (1)
- Calcium (1)
- Calculus (1)
- Carry-over effects (1)
- Case Study Analysis (1)
- Cashew-Sektor (1)
- Casual Games (1)
- Cations (1)
- Challenges (1)
- Chaos (1)
- Cheilolejeunea ; continental tropical Africa ; rainforest (1)
- Chemische Abwasserreinigung (1)
- Chironomus riparius (1)
- Chromatographie (1)
- Climate (1)
- Climate anxiety (1)
- Climate change (1)
- Climate denial (1)
- Cloud Point Extraction (1)
- Clustering coefficient (1)
- CodeBlue (1)
- Cognitive functions (1)
- Cold Chain (1)
- Coleoptera (1)
- Collaboration (1)
- Coloskopie (1)
- Communication Networks (1)
- Computational Toxicology (1)
- Computational biology (1)
- Compute Shader (1)
- Computer Security (1)
- Computer Supported Cooperative Work (1)
- Computer Vision (1)
- Computer assisted communication (1)
- Computeranimation (1)
- Computersicherheit (1)
- Computerspiel (1)
- Computertomografie (1)
- Computervisualistik (1)
- Conceptual Metaphor Theory (1)
- Conference (1)
- Connected Vehicles (1)
- Conservation (1)
- Consumer behaviour (1)
- Consumption renunciation (1)
- Container Entity Modell (1)
- Content Analysis (1)
- Content Management (1)
- Content and Language Integrated Learning (1)
- Content and Language Integrated Learning (CLIL) (1)
- Context-aware processes (1)
- Core Ontology on Multimedia (1)
- Core Ontology on Multimedia (COMM) (1)
- Core Self-Evaluations (1)
- Corvus frugilegus (1)
- Cottus gobio (1)
- Crayfish (1)
- Creativity (1)
- Criteria Matrix (1)
- Crowdsourcing (1)
- Curriculum (1)
- DMN (1)
- DPLL procedure (1)
- DRIFTS (1)
- DTI (1)
- Daphnia (1)
- Daphnia longispina (1)
- Daphnia longispina complex (1)
- Daphnia longispina-Komplex (1)
- Darmpolyp (1)
- Data compression (1)
- Data manipulation (1)
- Data protection (1)
- Datenaustausch (1)
- Datenkompression (1)
- Datenschutz (1)
- Decision-support (1)
- Decodierung (1)
- Deduktion (1)
- Deep Metric Learning (1)
- Defi-Now! (1)
- Defibrillator (1)
- Delta (1)
- Demographie (1)
- Demography (1)
- Densimetric Measurement (1)
- Depth Profile (1)
- Description Logic (1)
- Description Logics (1)
- Design Pattern (1)
- Design Science Research (1)
- Destiny (1)
- Developer profiling (1)
- Diabetes (1)
- Diabetische Retinopathie (1)
- Diagnose (1)
- Diagnosekriterien (1)
- Diagnoseunterstützung (1)
- Diagnosis (1)
- Diagnosis assistance (1)
- Dichtemessung (1)
- Differentia Scanning Calorimetry (1)
- Differential scanning calorimetry (1)
- Diffuse Quellen (1)
- Diffusionsbildgebung (1)
- Digitale Bilder (1)
- Digitalisation (1)
- Digitalisierung (1)
- Dijkstras Algorithmus (1)
- Dimension 3 (1)
- Dimensionality Reduction (1)
- Dimensionsreduzierung (1)
- Discussion Forums (1)
- Diskrete Simulation (1)
- Distance Vector Routing (1)
- Distanz Vektor Routing (1)
- Distributed Algorithm (1)
- Distributed Environments (1)
- Distributed process execution (1)
- Documents (1)
- Dokumentation (1)
- Dracaena (1)
- Drahtloses Sensorsystem (1)
- Drahtloses lokales Netz (1)
- Drahtloses vermachtes Netz (1)
- Drainagegräben (1)
- Dredging (1)
- Dreidimensionale Bildverarbeitung (1)
- Driver Assistance Systems (1)
- Dynamische Analyse (1)
- Düngemittel (1)
- E-Business (1)
- E-Hyper Tableau (1)
- E-KRHyper theorem prover (1)
- E-Participation (1)
- E-Partizipation (1)
- E-government (1)
- E-participation (1)
- E-services (1)
- ECMS 2012 (1)
- ECSA (1)
- EU (1)
- East Africa (1)
- Ebener Graph (1)
- Ebullition (1)
- Eclipse <Programmierumgebung> (1)
- Economic potential (1)
- Ecosystem service (1)
- Ecotoxicity (1)
- Eddy-covariance (1)
- Edelkrebs (1)
- Effectiveness (1)
- Einkauf (1)
- Einstellung (1)
- Einstellungen gegenüber bestimmten Filmeigenschaften (1)
- Ekel (1)
- Elastic net (1)
- Elektronenmikroskopie (1)
- Elevation gradient (1)
- Emergenz (1)
- Emission (1)
- Empfehlungssystem (1)
- Empirical Research (1)
- Empirical Studies (1)
- Employee Behavior (1)
- Emulation (1)
- Endangerment (1)
- Endokrine Regulation (1)
- Energiefluss (1)
- Energy fluxes (1)
- Englisch (1)
- Enhanced Reality (1)
- Enhanced Representation (1)
- Enterprise Architecture Framework (1)
- Enterprise Information Management (1)
- Enterprise Systems (1)
- Entity Component System Architecture (1)
- Entrepreneurship (1)
- Entrepreneurship Education (1)
- Entrepreneurship Experience and Extra-curricular Activity (1)
- Entscheidungsunterstützung (1)
- Entwickler Profil (1)
- Entwurfsmuster (1)
- Environmental Risk Assessment (1)
- Environmental factors (1)
- Environmental organic chemistry (1)
- Environmental psychology (1)
- Environmental samples (1)
- Epiphyten (1)
- Ergonomic Principles (1)
- Erste Hilfe (1)
- Erzieher (1)
- Erzieherin (1)
- European Conference on Modelling and Simulation (1)
- Europäischer Schadensbericht (1)
- Evacuation modeling (1)
- Evaluierung (1)
- Evidence-based Psychotherapy (1)
- Eye Tracking (1)
- Eyetracking (1)
- FTIR (1)
- Fabric Simulation (1)
- Facebook Application (1)
- Facet Theory (1)
- Fahrverhalten (1)
- Fahrzeug (1)
- Farbkalibrierung (1)
- Farnpflanzen (1)
- Fast-slow continuum (1)
- Fault Trees (1)
- Faxonius limosus (1)
- Feature Extraction (1)
- Feature Modeling (1)
- Fehlerbaum (1)
- Felis catus (1)
- Felis silvestris domestica (1)
- Ferns (1)
- Feuchtgebiet (1)
- Fiber Tracking (1)
- Filmbewertung (1)
- Fingerprint Recognition (1)
- First aid (1)
- Fischgewebe (1)
- Five Factor model (1)
- Fledermäuse (1)
- Flesch-Reading-Ease Index (1)
- FlexViz (1)
- Fließgewässer (1)
- Flow decomposition (1)
- Fluid-Struktur Wechselwirkung (1)
- Fluss (1)
- Foliicolous lichens (1)
- Food (1)
- Food Transportation System (1)
- Foodstuff (1)
- Formal Methods (1)
- Formale Methoden (1)
- Fotoauswahl (1)
- Fractionation (1)
- Fragebeantwortung (1)
- Freeze Coring (1)
- Fremdsprachendidaktik (1)
- Fremdsprachenunterricht (1)
- Function Words (1)
- Fungicides (1)
- Fungizid (1)
- Fuzzy-Logik (1)
- Fächerkanon (1)
- GDPR (1)
- GDS (1)
- GPGPU (1)
- GPS (1)
- GPU (1)
- GRAF1 (1)
- GReQL2 (1)
- GSM-Standard (1)
- Galerucinae (1)
- Game-based Learning (1)
- Gammarus fossarum (1)
- Gangart (1)
- Ganzzahlige Optimierung (1)
- Gas storage capacity (1)
- Gasblasen (1)
- GazeTheWeb (1)
- Gefrierkernverfahren (1)
- Gefrierpunktserniedrigung (1)
- Gefährdung (1)
- Gefäßanalyse (1)
- Gefühl (1)
- Gehirn (1)
- Gel effect (1)
- Gelbbauchunke (1)
- Gelände (1)
- Gemischt-ganzzahlige Optimierung (1)
- Generative Model (1)
- Genetic diversity (1)
- Genetics (1)
- Genetik (1)
- Genetischer Fingerabdruck (1)
- Geocaching (1)
- Geographic routing (1)
- Geoinformationssystem (1)
- Geometric spanner (1)
- Geowissenschaften (1)
- Gerichteter Graph (1)
- Germany (1)
- Geschlecht (1)
- Gewässer (1)
- Gewässerqualität (1)
- Gewässerökologie (1)
- Glasumwandlung (1)
- Glasübergang (1)
- Globale Wertschöpfungsketten (1)
- Grafikkarte (1)
- Grafikprogrammierung (1)
- Grails (1)
- Grails 1.2 (1)
- Graph (1)
- Graph Technology (1)
- Graph theory (1)
- Graphentheorie (1)
- Graphicsprogramming (1)
- Graphik-Hardware (1)
- Graphische Benutzeroberfläche (1)
- Grayscale (1)
- Grundbedürfnis (1)
- Gruppenarbeit (1)
- Größenfraktionierung (1)
- Grünlandbewirtschaftung (1)
- Gut content analysis (1)
- Habitat loss (1)
- Habitat networks (1)
- Habitatfragmentierung (1)
- Habitatsverlust (1)
- Hand-based Gestures (1)
- Handsfree editing (1)
- Hard and Soft News (1)
- Haskell (1)
- Hauskatze (1)
- Health (1)
- Healthcare institution (1)
- Hedonic (1)
- Hedonisch (1)
- Heimarbeit (1)
- Herbizid (1)
- Herzrate (1)
- Hindernis (1)
- Horn Clauses (1)
- Human Disturbance (1)
- Human motion (1)
- Human resources management (1)
- Human-Computer Interaction (1)
- Humus (1)
- Hyaluronan (1)
- Hyaluronsäure (1)
- Hydratation (1)
- Hydration (1)
- Hydrodynamics (1)
- Hydrogel (1)
- Hydrophobie (1)
- Hyper Tableau Calculus (1)
- Hypertableaux (1)
- I-messages (1)
- IASON (1)
- IAT (1)
- IBM Bluemix (1)
- ICM (1)
- ICP-MS (1)
- IPT (1)
- IT Guru (1)
- IT Outsourcing (1)
- IT Security (1)
- IT Services (1)
- IT-Security (1)
- IceCube (1)
- Image (1)
- Image Processing (1)
- Image Understanding (1)
- Imitation Learning (1)
- Implicit Association Test (1)
- Incremental Algorithms (1)
- Industrial-CT (1)
- Industriepolitik (1)
- Informatik (1)
- Information Asset Register (1)
- Information Audit (1)
- Information Capturing Methods (1)
- Information Centric Networking (1)
- Information Retrieval (1)
- Information system (1)
- Inkompressible Fluide (1)
- Innerbetriebliche Kooperation (1)
- Inpainting-Verfahren (1)
- Insecticide (1)
- Instructed Second Language Acquisition (1)
- Insurance (1)
- Integrated Model (1)
- Intelligent Information Network (1)
- Interactive Video Retrieval (1)
- Interaktion (1)
- Interaktionseffekt (1)
- Intergruppenprozesse (1)
- International organization (1)
- Internationale Organisationen (1)
- Internet (1)
- Internet Voting (1)
- Interoperability (1)
- Interoperabilität (1)
- Interparticulate hydrogel swelling (1)
- IoT (1)
- JGraLab (1)
- JML (1)
- Java (1)
- Java <Programmiersprache> (1)
- Java Modeling Language (1)
- Java. Programmiersprache (1)
- Journalismusforschung (1)
- Justification (1)
- KRHyper (1)
- Kalkmagerrasen (1)
- Kanalcodierung (1)
- Kantenbewerteter Graph (1)
- Kantenverfolgung (1)
- Katastrophentheorie (1)
- Kation-Brücken (1)
- Kationen (1)
- Katze (1)
- Kenya (1)
- Klassifikation (1)
- Klima (1)
- Knowledge (1)
- Knowledge Engineering (1)
- Knowledge Graphs (1)
- Knowledge Sharing (1)
- Kognitive Entwicklung (1)
- Kohlenstoffkreislauf (1)
- Kohlenstoffschichten (1)
- Kollaboration (1)
- Kollektivismus (1)
- Kolloid (1)
- Kolloide (1)
- Kolloids (1)
- Komplexität / Algorithmus (1)
- Konjugation (1)
- Konkurrenz (1)
- Konsistenz. Psychologie (1)
- Konsumentenverhalten (1)
- Konsumverzicht (1)
- Kontaktwinkel (1)
- Konturfindung (1)
- Konzept (1)
- Krebspest (1)
- Kriterium (1)
- Kryo (1)
- Körperliche Aktivität (1)
- Künstliche Intelligenz (1)
- Künstliche Neuronale Netze (1)
- L2 writers (1)
- Lake Kinneret (1)
- Lake Naivasha (1)
- Lake Wamala (1)
- Lakes (1)
- Landscape ecology (1)
- Landschaftskartierung (1)
- Landschaftsökologie (1)
- Langlebigkeit (1)
- Laser (1)
- Lasso (1)
- Last-year students (1)
- Latent Negative (1)
- Laufen (1)
- Lebenslanges Lernen (1)
- Lebensmittel (1)
- Lebensstandard (1)
- Lehrerbildung (1)
- Lehrerkompetenzen (1)
- Leichte Sprache (1)
- Leugnung (1)
- Life history (1)
- Limnologie (1)
- Limnology (1)
- Limology (1)
- Linespace (1)
- Linguistic Requirements (1)
- Link Prediction (1)
- Linked Data Modeling (1)
- Loans (1)
- Local algorithm (1)
- Logik (1)
- Logischer Schluss (1)
- Lokalisation (1)
- Longevity (1)
- Lurche (1)
- Lycophytes (1)
- MIA (1)
- MPEG-7 (1)
- MSR (1)
- Machine-Learning (1)
- Machinelles lernen (1)
- Magnetis (1)
- Maifisch (1)
- Makrophyten (1)
- MapReduce (1)
- Mapping <Mathematics> (1)
- Maschinelles Sehen (1)
- Mass-Spektrometrie (1)
- Matching (1)
- Material Point Method (1)
- Mathematical optimisation (1)
- Mathematik (1)
- Maßtheorie (1)
- MeVisLab (1)
- Measure-theory (1)
- Mediator framework (1)
- Medical Image Analysis (1)
- Medizinische Bildanalyse (1)
- Medizinische Bildverarbeitung (1)
- Meiofauna (1)
- Mensch-Maschine-Interaktion (1)
- Merkmalsdetektion (1)
- Merkmalsextrahierung (1)
- Mesofauna (1)
- Metalle/Matalloide (1)
- Metalloids (1)
- Metals (1)
- Metals/metalloids (1)
- Metapher (1)
- Metapopulation dynamics (1)
- Metapopulationsdynamiken (1)
- Methan (1)
- Methane emissions (1)
- Methode (1)
- Microfinance (1)
- Microfinance institutions (1)
- Microplastics (1)
- Micropollutants (1)
- Migration (1)
- Mikrofinanzierung (1)
- Mikroorganismus (1)
- Mikroplastik (1)
- Mikrosatelliten-DNA (1)
- Mikroverunreinigung (1)
- Minderung (1)
- Minimalschnitt (1)
- Mining (1)
- Mining Software Repositories (1)
- Mister X (1)
- Mitral Valve (1)
- Mitralklappe (1)
- Mixed integer programming (1)
- Mixed method (1)
- Mixed methods (1)
- Mixture Toxicity (1)
- Mobile Information Systems (1)
- Model-Driven Engineering (1)
- Modellfahrzeug (1)
- Monitoring (1)
- Monolepta (1)
- Morphologische Operatoren (1)
- Mosambik (1)
- Motion Capturing (1)
- Motivation (1)
- Mouse Gestures (1)
- Movie evaluation criteria (1)
- Mucilage (1)
- Multi-Agenten-Systeme (1)
- Multi-robot System (1)
- Multiagent System (1)
- Multiagentensysteme (1)
- Multidimensional (1)
- Multimedia Metadata Ontology (1)
- Multimodal Action Recognition (1)
- Multimodal Medical Image Analysis Cochlea Spine Non-rigid Registration Segmentation ITK VTK 3D Slicer CT MRI CBCT (1)
- Multiple Object Tracking (1)
- Multivariable Statistik (1)
- N-Body Simulation (1)
- N-Körper Simulation (1)
- NMR relaxometry (1)
- NMR-Spektroskopie (1)
- Nachbarschaftsgraph (1)
- Nachtfalter (1)
- Nachtschmetterlinge (1)
- Named Function Networking (1)
- Nanoröhren (1)
- Nassbaggerung (1)
- Nationalismus (1)
- Native language identification (1)
- Natural Feature Tracking (1)
- Natural Language Processing (1)
- Naturschutzgenetik (1)
- Naturschutzmanagement (1)
- Natürliche Schädlingskontrolle (1)
- Natürliches organisches Material (1)
- Navier-Stokes Gleichungen (1)
- Navier-Stokes equations (1)
- Near-surface turbulence (1)
- Network robustness (1)
- Networks (1)
- Netzwerk Routing (1)
- Netzwerkanalyse (1)
- Netzwerkrobustheit (1)
- Netzwerktopologie (1)
- Neuroactive chemicals (1)
- Neutino (1)
- Nicht-Ziel-Pflanzen (1)
- Non-freezing water (1)
- Nuclear Magnetic R (1)
- Nutzererleben (1)
- Nyungwe National Park (1)
- Nährstoffverfügbarkeit (1)
- Nützlinge (1)
- OCB (1)
- OCL <Programmiersprache> (1)
- ODRL (1)
- ONDEX (1)
- OPD-SHRM (1)
- OPNET (1)
- OVTK (1)
- Oberflächen-Runoff (1)
- Oberflächeneigenschaft (1)
- Oberflächenveredelung (1)
- Object Recognition (1)
- Objektentfernung (1)
- Oligomer (1)
- One-Shot Action Recognition (1)
- Online Community (1)
- Online grocery shopping (1)
- Online-Lebensmittelhandel (1)
- Ontologie. Wissensverarbeitung (1)
- Ontology API model (1)
- Ontology alignment (1)
- Open Content (1)
- Open Source (1)
- OpenGL Shading Language (1)
- OpenVDB (1)
- Optimierung (1)
- Optimization (1)
- Oracle Generation (1)
- Oraklegenerierung (1)
- Organische Bodensubstanz (1)
- Organizational Change (1)
- Oriental region (1)
- Ostafrika (1)
- Osteocephalus (1)
- Ozon (1)
- Ozonisierung (1)
- PEPPOL (1)
- POIs (1)
- Pan European Public Procurement OnLine (1)
- Parteienkommunikation (1)
- Passiver Wortschatz (1)
- Path Tracing (1)
- Pattern Recognition (1)
- Perfect (1)
- Perfekt (1)
- Personalised Information Systems (1)
- Personality (1)
- Persönlichkeit (1)
- Pestizide (1)
- Petri net (1)
- Petri-Netz (1)
- Petrinetz (1)
- Pfadnachverfolgung (1)
- Pfadplanung (1)
- Pfadverfolgung (1)
- Pflanzen (1)
- Pharmaceuticals (1)
- Pharmakokinetik (1)
- Phosphorsäureester (1)
- Photographie (1)
- Phylogeographie (1)
- Physik (1)
- Physiksimulation (1)
- Placement Strategies (1)
- Planar graphs (1)
- Plant Communities (1)
- Plant protection products (1)
- Plastic mulching (1)
- Plasticization; Glass transition (1)
- Plastifizieren (1)
- Plastifizierung (1)
- Plug in (1)
- Pointing Devices (1)
- Policy Language (1)
- Political Communication (1)
- Politik (1)
- Politische Ökonomie (1)
- Pollinators (1)
- Pollution (1)
- Polysaccharide (1)
- Polysaccharides (1)
- Populationsgenetik (1)
- Pore Water (1)
- Pragmatic (1)
- Pragmatisch (1)
- Predictive Model (1)
- Present Perfect (1)
- Pro-environmental behaviour change (1)
- Proactive Caching (1)
- Probabilistic finite automata (1)
- Probability (1)
- Probability propagation nets (1)
- Problematic smartphone use (1)
- Procambarus virginalis (1)
- Proceedings (1)
- Process (1)
- Process Quality (1)
- Process tracing (1)
- Product choice (1)
- Produktbewertung (1)
- Produktentscheidung (1)
- Produktwahl (1)
- Programmierung (1)
- Prosoziales Verhalten (1)
- Proteinstrukturanalyse (1)
- Provenance (1)
- Prozedurale Synthese (1)
- Prozessqualität (1)
- Prädikatenlogik (1)
- Präposition (1)
- Präsentisches Perfekt (1)
- Pteris (1)
- Py-GC/MS (1)
- Pyrethroide (1)
- Pädagogik (1)
- Quality assessment system (1)
- Quasi unit disk graph (1)
- Query Expansion (1)
- RDF Graphs (1)
- RDF modeling (1)
- RNA sequencing (1)
- Railway Research (1)
- Railway Research Topics (1)
- Railway Safety (1)
- Railway Safety Research (1)
- Random Finite Sets (1)
- Random Forest (1)
- Raupe (1)
- Raytracing (1)
- ReDSeeDS-Project (1)
- Reactive algorithm (1)
- Real-Life Game (1)
- Real-Life Spiel (1)
- Real-Time (1)
- Rechtfertigung (1)
- Rechtfertigung <Philosophie> (1)
- Recommender System (1)
- Recommender Systems, Business Process Modeling, Literature Review (1)
- Recovery (1)
- Reddit (1)
- Reengineering (1)
- Reference Model (1)
- Referenzrahmen (1)
- Reflections (1)
- Reflektionen (1)
- Regenwald (1)
- Regenwald ; Afrika ; Cheilolejeunea (1)
- Regionenlabeling (1)
- Registratur (1)
- Rehabilitation (1)
- Relevance Feedback (1)
- Religiosität (1)
- Rendering (1)
- Renewable energy (1)
- Reproduktion (1)
- Reservoir Sedimentation (1)
- Reservoirs (1)
- Resource Description Framework (RDF) (1)
- Resource Governance (1)
- Retina Befundbilder (1)
- Retina Fundus Bilder (1)
- Retina Fundus Images (1)
- Reverse Engineering (1)
- Revision (1)
- Rezeptionsforschung (1)
- Rhein (1)
- Rheinland-Pfalz (1)
- Rheometry (1)
- Rhineland-Palatinate (1)
- Rhizosphere (1)
- Right-wing ideology (1)
- Risikoabschätzung (1)
- Risikominimierung (1)
- Risk assessment (1)
- RoboCup (1)
- Robocup 2008 (1)
- Roboter (1)
- Robotik (1)
- Robust Principal Component Analysis (1)
- Rook (1)
- Rothe's method (1)
- Rothe-Methode (1)
- Routing (1)
- Routing Information Protocol (1)
- Routing Information Protocol (RIP) (1)
- Routing Information Protokoll (1)
- Routing Loops (1)
- Routing with Metric based Topology Investigation (RMTI) (1)
- Ruscaceae (1)
- Russia (1)
- Räuber (1)
- Rückverfolgbarkeit (1)
- SOA (1)
- SPARQL (1)
- SPEAR (1)
- STOF Model (1)
- Salinisation (1)
- Sand (1)
- Satelliten-DNS (1)
- Sattelkraftfahrzeug (1)
- Sattelzug (1)
- Saving (1)
- Saving and credit cooperatives (SACCOs) (1)
- Schadstoffbelastung (1)
- Schadstoffkonzentration (1)
- Schema Information (1)
- Schizophrenie (1)
- Schnee (1)
- Schreiben (1)
- Schreibtechnik (1)
- Schulden (1)
- Schwache Lösungen (1)
- Schwebstoffe (1)
- Schwermetalle (1)
- Schädlingskontrolle (1)
- Search engine (1)
- Security (1)
- Security Requirements (1)
- Security Routing (1)
- Sediment Water Interface (1)
- Sediment-Water-Interfaces (1)
- See (1)
- Segmentation (1)
- Segmentierung (1)
- Selbstbeobachtung (1)
- Selbstbeschädigung (1)
- Selbsteinschaetzung (1)
- Selbstorganisation (1)
- Selbstregulation (1)
- Self-determination theory (1)
- Semantic Data (1)
- Semantic Web Data (1)
- Semantics (1)
- Sensing as a Service (1)
- Serious Games (1)
- Service identification (1)
- Service-Identifizierung (1)
- Service-oriented Architectures (SOA) (1)
- Service-orientierte Architektur (1)
- Sexuelle Orientierung (1)
- Shader (1)
- Sicherheit Routing (1)
- Simulationswerkzeug (1)
- Size-fractionation (1)
- Skalenkonstruktion (1)
- Skalenvalidierung (1)
- Skalierungsmodelle (1)
- Smartphone (1)
- Smartphone Applikation (1)
- Smartphone addiction (1)
- Social Cognitive Career Theory (1)
- Social Entrepreneurship in Vietnam (1)
- Social Games (1)
- Social Networking Platforms (1)
- Social identity theory (1)
- Socio-ecological transformation (1)
- Socio-economic development (1)
- Software (1)
- Software Development (1)
- Software Language (1)
- Software Repositories (1)
- Software Technology (1)
- Software migration (1)
- Software techniques for object recognition (STOR) (1)
- Software-Migration (1)
- Softwarearchitektur (1)
- Softwareentwicklung (1)
- Softwareergonomie (1)
- Softwaretesting (1)
- Softwarewartung (1)
- Soil physics (1)
- Soil structural stability (1)
- Solutions (1)
- Sorption (1)
- Southern Amazonia (1)
- Sozial-ökologische Transformation (1)
- Soziale Identität (1)
- Soziale Wahrnehmung (1)
- Soziales Netzwerk (1)
- Soziales System (1)
- Sozialwissenschaftliche Simulation (1)
- Sparen (1)
- Speaker Recognition (1)
- Spear (1)
- Speciation (1)
- Species turnover (1)
- Specification (1)
- Specular (1)
- Spezifikation (1)
- Spiralcurriculum (1)
- Sprechweise (1)
- Standard of living (1)
- Statistical Shape Model (1)
- Staubewässerung (1)
- Staugeregelte Flüsse (1)
- Stausee (1)
- Stauseeverlandung (1)
- Stechmücke (1)
- Stechmücken-Kontrolle (1)
- Stereotyp (1)
- Stereotype Content Model (1)
- Steuerung (1)
- Stimme (1)
- Stimmungsveränderung (1)
- Stochastic Logic (1)
- Stoffsimulation (1)
- Strassenkreuzung (1)
- Straßenzustand (1)
- Streams (1)
- Structural Equation Modeling (1)
- Structural Validity (1)
- Strukturelle Validität (1)
- Suffering (1)
- Sufficiency (1)
- Sufficiency orientation (1)
- Suffizienz (1)
- Suffizienzorientierung (1)
- Support System (1)
- Surface Science (1)
- Survey Research (1)
- Systematics (1)
- Systembiologie (1)
- Säugetiere (1)
- Südafrika (1)
- Süßwasserhaushalt (1)
- TAP (1)
- TBox (1)
- TRECVID (1)
- Tableau Calculus (1)
- Technical potential (1)
- Technologischer Raum (1)
- Telearbeit (1)
- Tempus (1)
- Tenneco Automotive (1)
- Tense (1)
- Test Generation (1)
- Testen (1)
- Testgenerierung (1)
- Text (1)
- Text Analysis (1)
- Text Mining (1)
- Text classification (1)
- Texterkennung (1)
- Theorem prover (1)
- Theorembeweiser (1)
- Time (1)
- Titandioxid-Nanopartikeln (1)
- Tokens (1)
- Tool Evaluation (1)
- Torf (1)
- Toxicological characterization (1)
- Toxicology (1)
- Toxikologische Bewertung (1)
- Toxizität (1)
- Traceability (1)
- Tracing (1)
- Tracking-System (1)
- Transfer coefficients (1)
- Transferfunction (1)
- Transferfunktion (1)
- Transformation products (1)
- Transformationsprodukte (1)
- Transport (1)
- Tropfenform (1)
- Tropical rainforest (1)
- Tropischer Regenwald (1)
- Turbulence (1)
- Turbulenz (1)
- Type System (1)
- Type system (1)
- Types of smartphone use (1)
- Ubuntu (1)
- Ultraschall (1)
- Ultrasound (1)
- Umfrage (1)
- Umfrage in Koblenz (1)
- Umkehrosmose (1)
- Umwelt (1)
- Umweltchemikalie (1)
- Umweltproben (1)
- Umweltverhaltensänderung (1)
- Umweltverschmutzung (1)
- Unified Modeling Language (UML ) (1)
- Unit disk graph (1)
- Unlink Prediction (1)
- Unsicheres Schließen (1)
- Unterrichtsforschung (1)
- Unterrichtsqualität (1)
- Untersuchung (1)
- Unterwasser-Pipeline (1)
- Unterwasserfahrzeug (1)
- Unterwasserkabel (1)
- Unterwasserwelt (1)
- User experience (1)
- User-Needs Analysis (1)
- VCD (1)
- VIACOBI (1)
- Variabilität (1)
- Vascular analysis (1)
- Vegetation (1)
- Vegetation distribution (1)
- Verb (1)
- Verbal Aspect (1)
- Verbraucherverhalten (1)
- Vergangenheitstempus (1)
- Verhandlung (1)
- Verification (1)
- Verifikation (1)
- Vermeidung (1)
- Versalzung (1)
- Verteilter Algorithmus (1)
- Verteilung (1)
- Virtual Company Dossier (1)
- Virtual characters (1)
- Virtuelle Realität (1)
- Visibility Skeleton (1)
- Visual Stimuli Discovery (1)
- Visualisierung von Verbformen (1)
- Vocabulary (1)
- Vocabulary Mapping (1)
- Vocabulary Reuse (1)
- Vocabulary Trainer (1)
- Vokabellernen (1)
- Volume Hatching (1)
- Vorschulkind (1)
- Vulnerability (1)
- WCET (1)
- WEB (1)
- WLAN Fingerprinting (1)
- WSDL (1)
- WSN (1)
- Wachstumsregler (1)
- Wahlen zum europäischen Parlament (EU-Wahlen) (1)
- Wahrscheinlichkeit (1)
- Wahrscheinlichkeitsrechnung (1)
- Wanderfische (1)
- Wasser-Sediment-Grenzschichten (1)
- Wasserverschmutzung (1)
- Wastewater (1)
- Water Management (1)
- Water quality (1)
- Wavelet (1)
- Wearables (1)
- Web (1)
- Web Analytics (1)
- Web Analytics Framework (1)
- Web Mining (1)
- Web Ontology Language (OWL) (1)
- Web Science (1)
- Web Services (1)
- Web log (1)
- Web-application framework (1)
- Web-programming technologies (1)
- Weblog (1)
- Website (1)
- Wechselkursänderung (1)
- Weinbau (1)
- Weltkultur (1)
- Werbung (1)
- WiFi Fingerprinting (1)
- Wiederbesiedlung (1)
- Wild pollinator (1)
- Wildbienen (1)
- Wildtiere (1)
- Wireless sensor network (1)
- Wirtschaft (1)
- Wirtschaftsenglisch (1)
- Wissensbasis (1)
- Wissensmanagement (1)
- Word-of-Mouth (1)
- World Wide Web 2.0 (1)
- Wortschatz (1)
- Wrapping (1)
- X-ray computer tomography (XRT) (1)
- Yellow-bellied toad (1)
- You-messages (1)
- Zeit (1)
- Zikaden (1)
- Zoologie (1)
- Zoology (1)
- Zooplankton (1)
- Zuckmücken (1)
- Zusammenhängender Graph (1)
- absolutism (1)
- acceptance (1)
- acid leaching (1)
- activated sludge (1)
- adaptive GUI Design (1)
- adaptive resonance theory (1)
- adjoint functions (1)
- advanced wastewater treatment (1)
- age cohorts (1)
- agent-based simulation (1)
- agricultural intensification (1)
- agroecosystems (1)
- amorphous hydrogenated carbon layer (1)
- amphibians (1)
- analytics (1)
- anthropogenic disturbance (1)
- application programming interfaces (1)
- aquatic environment (1)
- aquatic invertebrates (1)
- archiving (1)
- artifcial neural networks (1)
- artiffficial neural networks (1)
- artififfcial neural networks (1)
- assessment model (1)
- attitudes towards specific movie features (1)
- authoritarianism (1)
- automated theorem prover (1)
- automatic behavioral cues (1)
- backpropagation (1)
- bait-lamina test (1)
- bats (1)
- bauxite (1)
- behavior change (1)
- behavioural ecology (1)
- belief in just world (1)
- beneficial insects (1)
- benefits (1)
- benthic oxygen fluxes (1)
- bias (1)
- biocide (1)
- biocides (1)
- biodegradation (1)
- biodiversity (1)
- biodiversity conservation (1)
- biofiltration (1)
- bioindicator (1)
- biological degradation (1)
- biologischer Abbau (1)
- biotransformation (1)
- bioturbation (1)
- blockchain (1)
- blood analysis (1)
- bribery (1)
- business intelligence (1)
- business process management (1)
- by-stander effect (1)
- carbon hybridisation (1)
- catastrophy theory (1)
- categorisation (1)
- cation bridges (1)
- cation-bridges (CaB) (1)
- chalk grassland (1)
- change (1)
- chaos (1)
- chemical force microscopy (1)
- chemical risk assessment (1)
- chironomids (1)
- clonal diversity (1)
- cognitive development (1)
- cognitive linguistic approach (1)
- collaboration (1)
- collaborative technologies (1)
- collectivism (1)
- colloid (1)
- colour calibration (1)
- competence- and control beliefs (1)
- competition (1)
- concept (1)
- concurrency (1)
- conflict detection (1)
- conservation genetics (1)
- construction materials (1)
- contact angle (1)
- contemporary detective fiction (1)
- contexts of use (1)
- cooperation (1)
- core ontologies (1)
- core self-evaluations (1)
- corrosion protection (1)
- corrosion resistance (1)
- covid-19 (1)
- criminal victimization (1)
- critical section (1)
- crop pollination (1)
- cross-cultural psychology (1)
- cross-linking (1)
- cryo-electron microscopy (1)
- cultural dimensions (1)
- cultural landscape (1)
- currency exchange rates (1)
- data (1)
- data mining (1)
- data protection (1)
- data sharing (1)
- data warehouse (1)
- decision support tool (1)
- deductive (1)
- delivery drone (1)
- dengue (1)
- density separation (1)
- design thinking (1)
- deutsche Hochschulen (1)
- diabetic retinopathy (1)
- digestion (1)
- digital transformation (1)
- digital workplace (1)
- directed acyclic graphs (1)
- disabled detective (1)
- disabled masculinity (1)
- disgust sensitivity (1)
- distinct object identifiers (1)
- distributed information systems (1)
- distributed ledger (1)
- distribution (1)
- disturbance (1)
- drone (1)
- dry inland waters (1)
- e-Commerce (1)
- e-learning (1)
- e-service (1)
- e-service quality (1)
- eGovernment (1)
- eSourcing (1)
- eXperience methodology (1)
- ebullition (1)
- ecological risk management (1)
- ecology (1)
- ecosystem functioning (1)
- ecosystem functions (1)
- ecosystem services (1)
- eddy correlation (1)
- edge linking (1)
- educational alliance (1)
- effect assessment (1)
- effect-directed analysis (1)
- emergence (1)
- emerging micropollutants (1)
- empirische Untersuchung (1)
- endocrine disrupting chemicals (1)
- endokrine Regulation (1)
- energetics (1)
- engineered nanoparticles (1)
- english prepositions (1)
- enterprise collaboration platforms (1)
- enterprise collaboration systems (1)
- entrepreneurial design thinking (1)
- entrepreneurial thinking (1)
- entrepreneurship education (1)
- environmental compatibility (1)
- environmental control (displays of self, control of stress factors, social control), well-being, work or learning efficiency, social behavior, co mmunication (1)
- environmental fate (1)
- environmental psychology (1)
- environmental risk assessment (1)
- environmental surfaces (1)
- epidemiology (1)
- epoxide (1)
- erweiterte Abwasserbehandlung (1)
- estimation of algorithm efficiency (1)
- evaluation (1)
- event model (1)
- event-based systems (1)
- events (1)
- evolution (1)
- excess deaths (1)
- expansion (1)
- faceted search (1)
- fairness (1)
- feedback (1)
- field experiment (1)
- field margin (1)
- finite state automata (1)
- first-order logic (1)
- fish tissues (1)
- floral resources (1)
- flows over time (1)
- fluid disturbances (1)
- fluid-structure interaction (1)
- focused feedback (1)
- folksonomies (1)
- freshwater ecosystem (1)
- functional web testing tools (1)
- fungicide (1)
- fungus resistant grapevine (1)
- futex (1)
- gait (1)
- galvanic anodes (1)
- gaze information (1)
- gender (1)
- genotyping error (1)
- giftedness (1)
- glass transition (1)
- global carbon cycle (1)
- grade (1)
- gradient method of training weight coefficients (1)
- grassland (1)
- grassland irrigation (1)
- greenhouse gases (1)
- groundwater remediation (1)
- groupwork (1)
- hazard prediction (1)
- healthcare (1)
- heart rate (1)
- high power impulse magnetron sputtering (1)
- humic acid (1)
- hybrid systems (1)
- hybrid work (1)
- hybride Automaten (1)
- hydrodynamic chromatography (1)
- hydrodynamische Chromatographie (1)
- hydrophobicity (1)
- hypertableaux (1)
- iCity project (1)
- image processing (1)
- image semantics (1)
- image warping (1)
- immediate priority ceiling protocol (1)
- implicit-explicit consistency (1)
- impounded rivers (1)
- in situ (1)
- incompressible fluids (1)
- information infrastructure (1)
- information retrieval (1)
- information system (1)
- insecticide (1)
- interaction (1)
- intergroup contact (1)
- internet of things (1)
- invasive Arten (1)
- invasive crayfish (1)
- invasive species (1)
- iot development platforms (1)
- iron removal (1)
- jOWL (1)
- kinematics (1)
- klonale Diversität (1)
- knowledge base (1)
- knowledge management system (1)
- knowledge work (1)
- land use (1)
- land use change (1)
- landmarks (1)
- landscape (1)
- landscape complexity (1)
- landscape mapping (1)
- laser induced fluorescence (1)
- leaching (1)
- lead desorption (1)
- leaf beetles (1)
- leafhoppers (1)
- leap motion (1)
- lexical sophistication (1)
- life cycle test (1)
- lifelong learning (1)
- living book (1)
- logistic (1)
- long-living systems (1)
- longitudinal (1)
- mPayments (1)
- machine learning (1)
- macroinvertebrates (1)
- mammals (1)
- masculine disability (1)
- masculine identity (1)
- mathematical Modelling (1)
- mathematical model (1)
- mathematische Modellbildung (1)
- measure (1)
- media competence model (1)
- medical care (1)
- medical image processing (1)
- metadata formats (1)
- metadata standards (1)
- metal-film phase plate (1)
- methane (1)
- methodology (1)
- micro-agent (1)
- microorganisms (1)
- microsatellite DNA (1)
- microsatellite analysis (1)
- minimal pruning (1)
- minimum self-contained graphs (1)
- mitigation (1)
- mitigation measures (1)
- mixtures (1)
- mobile application (1)
- mobile devices (1)
- mobile facets (1)
- mobile health care (1)
- mobile interaction (1)
- model generation (1)
- model-driven engineering (1)
- modeling (1)
- modulares System (1)
- monitor (1)
- mood change (1)
- morphological operators (1)
- multiagent systems (1)
- multidimensional (1)
- mutual exclusion (1)
- nanoparticle (1)
- nationalism (1)
- natural language generation (1)
- natural organic matter (1)
- nature conservation (1)
- negotiation (1)
- networks (1)
- neuartige Spurenstoffe (1)
- neural (1)
- nicht gefrierbares Wasser (1)
- nichtlinearer Zusammenhang (1)
- nichtsuizidale Selbstverletzung (1)
- non-consumptive effects (1)
- non-crop habitats (1)
- non-point source (1)
- non-target effects (1)
- non-target plants (1)
- norm (1)
- nternational organizations (1)
- numerical simulation (1)
- off-field habitats (1)
- olive mill wastewater (1)
- optimization (1)
- organic coatings (1)
- organic pollution (1)
- organizational behavior (1)
- organophosphate (1)
- ozonation (1)
- ozonation of beta blockers (1)
- ozone (1)
- ozone reactivity (1)
- pH-Wert (1)
- parallel calculations (1)
- parameter estimation (1)
- path planning (1)
- peat (1)
- pelzresistente Rebsorten (1)
- performance optimization (1)
- periphyton (1)
- personal information management (1)
- persönliches Informationsmanagement (1)
- pest control (1)
- pesticide risk assessment (1)
- pharmaceuticals (1)
- phenolic compounds (1)
- photo selection (1)
- physical activity (1)
- plain language (1)
- plant protection products (1)
- planthoppers (1)
- plants (1)
- plastic consumption (1)
- plastic debris (1)
- playful learning (1)
- point source (1)
- points of interest (1)
- policy modelling (1)
- pollen diet (1)
- pollinator development (1)
- pollinator fitness (1)
- pollution (1)
- polyurethane (1)
- population genetics (1)
- predation (1)
- predictability (1)
- preschool children (1)
- priority effects (1)
- priority-Effekte (1)
- privacy and personal data (1)
- privacy by design (1)
- privacy competence model (1)
- privacy impact assessment (1)
- privacy protection (1)
- probabilistic (1)
- procedural content generation (1)
- prognosis model (1)
- prosocial behavior (1)
- prosoziale Gruppennorm (1)
- public key infrastructure (1)
- punishment goals (1)
- pyrethroids (1)
- question answering (1)
- rainforest (1)
- reasoning (1)
- recolonisation (1)
- recurrent (1)
- refractory grade (1)
- region labeling (1)
- regression analysis (1)
- regular dag languages (1)
- regulation (1)
- relative Prototypikalität (1)
- religiousness (1)
- remote work (1)
- repellency (1)
- reproduction (1)
- requirements analysis (1)
- retina fundus images (1)
- reverse osmosis (1)
- revision (1)
- rich multimedia presentations (1)
- risks (1)
- robotics (1)
- rocking-phase plate (1)
- running (1)
- runoff (1)
- sample pretreatment (1)
- scaffolded writing (1)
- scale construction (1)
- scale validation (1)
- scene analysis (1)
- school attack (1)
- school tier (1)
- science learning (1)
- security (1)
- security awareness (1)
- self-concept (1)
- self-efficacy (1)
- self-organisation (1)
- semantic annotation (1)
- semantic desktop (1)
- semantischer Desktop (1)
- sequent calculi (1)
- sexual orientation (1)
- shiq (1)
- silver nanoparticles (1)
- single-particle analysis (1)
- smartphone app (1)
- social media data (1)
- social object (1)
- social perception (1)
- social system (1)
- software engineering (1)
- soil (1)
- soil aquifer treatment (1)
- soil pH (1)
- soil solution (1)
- soils (1)
- sparsity (1)
- spatial Fuzzy Logic (1)
- spatial and temporal varibility (1)
- speech (1)
- spray-drift (1)
- stereoscopic rendering (1)
- stereotypes (1)
- stream (1)
- stream mesocosm (1)
- student misbehavior (1)
- student writing (1)
- summative evaluation (1)
- surface characteristics (1)
- survey in Koblenz (1)
- suspended particle matter (1)
- swarming (1)
- swimming behaviour (1)
- systematics (1)
- systems to judge the quality of buildings (1)
- tag recommendation (1)
- tagging (1)
- task orientation (1)
- teacher beliefs (1)
- teacher education (1)
- teacher motivation (1)
- teacher training (1)
- teaching (1)
- teams (1)
- technology acceptance model (1)
- text-picture integration (1)
- thermal analysis (1)
- time series (1)
- titanium nitride (1)
- tool-integration (1)
- toxicokinetics (1)
- trace organic chemicals (1)
- traceability (1)
- trait-mediated effects (1)
- transformation products (1)
- transport (1)
- trophic cascades (1)
- unique name assumption (1)
- uptake (1)
- usability study (1)
- variational discretization (1)
- vascular plants (1)
- vaskuläre Planzen (1)
- vegetated treatment systems (1)
- vegetation modeling (1)
- verification (1)
- video games (1)
- virtual goods (1)
- viticulture (1)
- voice (1)
- volume rendering (1)
- warp divergence (1)
- wastewater treatment plant (1)
- water pollution (1)
- water re-use (1)
- water reuse (1)
- water scarcity (1)
- water treatment (1)
- water-molecule-bridges (WaMB) (1)
- weak solution (1)
- wear resistance (1)
- web 2.0 (1)
- web-portal medical e-services (1)
- wettability (1)
- wild bees (1)
- wildlife management (1)
- window of opportunity (1)
- wireless sensor networks (1)
- work from anywhere (1)
- work from home (1)
- world polity (1)
- writing (1)
- zooplankton (1)
- Ästuar (1)
- Ökologie (1)
- Ökotoxologie (1)
- Überarbeitung (1)
- Überwachung (1)
Institute
- Fachbereich 4 (116)
- Institut für Informatik (81)
- Fachbereich 7 (78)
- Institut für Wirtschafts- und Verwaltungsinformatik (53)
- Institut für Computervisualistik (52)
- Institute for Web Science and Technologies (50)
- Institut für Management (30)
- Institut für Integrierte Naturwissenschaften, Abt. Biologie (23)
- Institut für Umweltwissenschaften (23)
- Fachbereich 8 (20)
This dissertation introduces a methodology for formal specification and verification of user interfaces under security aspects. The methodology allows to use formal methods pervasively in the specification and verification of human-computer interaction. This work consists of three parts. In the first part, a formal methodology for the description of human-computer interaction is developed. In the second part, existing definitions of computer security are adapted for human-computer interaction and formalized. A generic formal model of human-computer interaction is developed. In the third part, the methodology is applied to the specification and verification of a secure email client.
The internet is becoming more and more important in daily life. Fundamental changes can be observed in the private sector as well as in the public sector. In the course of this, active involvement of citizens in planning political procedures is more and more supported electronically. The expectations culminate in the assumption that information and communication technology (ICT) can enhance civic participation and reduce disenchantment with politics. Out of these expectations, a lot of eparticipation projects were initiated in Germany. Initiatives were established, e.g. the "Initiative eParticipation", which gave many incentives of electronic participation for policy and administration in order to strengthen decision-making processes with internet supported participation practices. This thesis consists of two major parts. In the first part, definitions of the essential terms are presented. The position of e-participation within the dimension of ebusiness is pointed out. In order to explain e-participation, basics of the classical offline participation are delivered. It will be shown that a change is in progress, not only because of the deployment of ICT. Subsequently, a framework to characterize eparticipation is presented. The European Union is encouraging the implementation of e-participation. So, the city of Koblenz should be no exception. But what is the current situation in Koblenz? To provide an answer to this question, the status quo was examined with the help of a survey among the citizens of Koblenz, which was developed, conducted and evaluated. This is the second major part of this thesis.
CAMPUS NEWS - artificial intelligence methods combined for an intelligent information network
(2008)
In this paper we describe a network for distributing personalised information with the usage of artificial intelligence methods. Reception of this information should be possible with everyday mobile equipment. Intelligent filtering and spam protection aim at integrating this technology into our environment. Information on the system architecture and usage of the installation are also presented.
Foliicolous lichens are one of the most abundant epiphytes in tropical rainforests and one of the few groups of organisms that characterize these forests. Tropical rainforests are increasingly affected by anthropogenic disturbance resulting in forest destruction and degradation. However, not much is known on the effects of anthropogenic disturbance on the diversity of foliicolous lichens. Understanding such effects is crucial for the development of appropriate measures for the conservation of such organisms. In this study, foliicolous lichens diversity was investigated in three tropical rainforests in East Africa. Godere Forest in Southwest Ethiopia is a transitional rainforest with a mixture of Afromontane and Guineo-Congolian species. The forest is secondary and has been affected by shifting cultivation, semi-forest coffee management and commercial coffee plantation. Budongo Forest in West Uganda is a Guineo-Congolian rainforest consisting of primary and secondary forests. Kakamega Forest in western Kenya is a transitional rainforest with a mixture of Guineo-Congolian and Afromontane species. The forest is a mosaic of near-primary forest, secondary forests of different seral stages, grasslands, plantations, and natural glades.
Semantic desktop environments aim at improving the effectiveness and efficiency of users carrying out daily tasks within their personal information management infrastructure (PIM). They support the user by transferring and exploiting the explicit semantics of data items across different PIM applications. Whether such an approach does indeed reach its aim of facilitating users" life and—if so—to which extent, however, remains an open question that we address in this paper with the first summative evaluation of a semantic desktop approach. We approach the research question exploiting our own semantic desktop infrastructure, X-COSIM. As data corpus, we have used over 100 emails and 50 documents extracted from the organizers of a conference-like event at our university. The evaluation has been carried out with 18 subjects. We have developed a test environment to evaluate COSIMail and COSIFile, two semantic PIM applications based on X-COSIM. As result, we have found a significant improvement for typical PIM tasks compared to a standard desktop environment.
This thesis deals with the verbal categories tense and aspect in the context of analysing the English perfect. The underlying notion of time is examined from the viewpoint of etymology and from the viewpoint of fields of knowledge that lie outside the immediate scope of temporal semantics, e.g. mathematics. The category tense is scrutinised by discussing the concept of Reichenbach tense and the concept of correlation (Giering). The starting point of the discussion of the category verbal aspect is the dichotomy perfective vs. imperfective in the Slavic languages. The main part about the perfect is concerned with the possessive perfect as a cross-linguistic phenomenon (including a comparison of the English and the Slavic perfect) and focuses on the usage and the meaning of the English present perfect. There are three appendices which are an integral part of this dissertation. Appendix A deals with the systematization of English verb forms and their graphical representation. Three different visualizations are presented, two of which are genuine to this paper. Appendix B reproduces the target setting according to which an animated visualization of English infinitives was programmed. Appendix C represents a synopsis of approaches to the English perfect in grammars and textbooks.
The STOR project aims at the development of a scientific component system employing models and knowledge for object recognition in images. This interim report elaborates on the requirements for such a component system, structures the application area by identifying a large set of basic operations, and shows how a set of appropriate data structures and components can be derived. A small case studies exemplifies the approach.
Hybrid systems are the result of merging the two most commonly used models for dynamical systems, namely continuous dynamical systems defined by differential equations and discrete-event systems defined by automata. One can view hybrid systems as constrained systems, where the constraints describe the possible process flows, invariants within states, and transitions on the one hand, and to characterize certain parts of the state space (e.g. the set of initial states, or the set of unsafe states) on the other hand. Therefore, it is advantageous to use constraint logic programming (CLP) as an approach to model hybrid systems. In this paper, we provide CLP implementations, that model hybrid systems comprising several concurrent hybrid automata, whose size is only straight proportional to the size of the given system description. Furthermore, we allow different levels of abstraction by making use of hierarchies as in UML statecharts. In consequence, the CLP model can be used for analyzing and testing the absence or existence of (un)wanted behaviors in hybrid systems. Thus in summary, we get a procedure for the formal verification of hybrid systems by model checking, employing logic programming with constraints.
The lack of a formal event model hinders interoperability in distributed event-based systems. Consequently, we present in this paper a formal model of events, called F. The model bases on an upper-level ontology and pro-vides comprehensive support for all aspects of events such as time and space, objects and persons involved, as well as the structural aspects, namely mereological, causal, and correlational relationships. The event model provides a flexible means for event composition, modeling of event causality and correlation, and allows for representing different interpretations of the same event. The foundational event model F is developed in a pattern-oriented approach, modularized in different ontologies, and can be easily extended by domain specifific ontologies.
Avoidance of routing loops
(2009)
We introduce a new routing algorithm which can detect routing loops by evaluating routing updates more thoroughly. Our new algorithm is called Routing with Metric based Topology Investigation (RMTI), which is based on the simple Routing Information Protocol (RIP) and is compatible to all RIP versions. In case of a link failure, a network can reorganize itself if there are redundant links available. Redundant links are only available in a network system like the internet if the topology contains loops. Therefore, it is necessary to recognize and to prevent routing loops. A routing loop can be seen as a circular trace of a routing update information which returns to the same router, either directly from the neighbor router or via a loop topology. Routing loops could consume a large amount of network bandwidth and could impact the endtoend performance of the network. Our RMTI approach is capable to improve the efficiency of Distance Vector Routing.
Software is vital for modern society. The efficient development of correct and reliable software is of ever-growing importance. An important technique to achieve this goal is deductive program verification: the construction of logical proofs that programs are correct. In this thesis, we address three important challenges for deductive verification on its way to a wider deployment in the industry: 1. verification of thread-based concurrent programs 2. correctness management of verification systems 3. change management in the verification process. These are consistently brought up by practitioners when applying otherwise mature verification systems. The three challenges correspond to the three parts of this thesis (not counting the introductory first part, providing technical background on the KeY verification approach). In the first part, we define a novel program logic for specifying correctness properties of object-oriented programs with unbounded thread-based concurrency. We also present a calculus for the above logic, which allows verifying actual Java programs. The calculus is based on symbolic execution resulting in its good understandability for the user. We describe the implementation of the calculus in the KeY verification system and present a case study. In the second part, we provide a first systematic survey and appraisal of factors involved in reliability of formal reasoning. We elucidate the potential and limitations of self-application of formal methods in this area and give recommendations based on our experience in design and operation of verification systems. In the third part, we show how the technique of similarity-based proof reuse can be applied to the problems of industrial verification life cycle. We address issues (e.g., coping with changes in the proof system) that are important in verification practice, but have been neglected by research so far.
Over the last three decades researchers of Cognitive Metaphor Theory have shown conclusively that metaphor is motivated rather than arbitrary and often used to systematically map out conceptual territory. This cognitive semantic proposal holds the potential for alternative L2 teaching strategies. As an abstract domain, business discourse is naturally rich in metaphors and is additionally filled with consciously used metaphorical language to strategically manipulate clients and business partners. Business English courses especially stand to profit from metaphor-oriented language teaching, as (future) managers aim to quickly improve their language performance to be prepared for international business communication. In using metaphors, speakers as well as hearers conceptualize and thus experience one thing in terms of another. Having been made aware of the conceptual linkage, students are immediately equipped with a whole set of vocabulary they may already have learned for a concrete domain and are then able to elaborate in the more abstract area of business discourse. Enhanced metaphor awareness may thus prove to be a valuable vehicle for vocabulary acquisition as well as for vocabulary retention. This thesis is subdivided into ten chapters. With each successive chapter, the focus will increasingly sharpen on the main hypothesis that metaphor awareness raising and explicit teaching in the business English classroom assists the students to dip into their savings' and transfer already acquired vocabulary to abstract business discourse and thus to become more proficient business communicators. After an introduction to the main objectives, chapter two critically looks at the different strands of Cognitive Linguistic contributions to metaphor theory made within the last three decades and discusses the structure, function and processing of figurative language to single out relevant aspects of the language classroom applications. Chapter three narrows the perspective to the socio-economic discourse as the very target domain in focus and surveys the conceptual metaphors that have been identified for this target domain, namely the source domains most productive for the target and therefore most valuable for the language classroom. In chapter four Cognitive Linguistic findings are put in contact with language didactics; i.e., the Cognitive Linguistic basis is discussed in the context of language teaching and learning theories and a first classification of metaphor teaching in the theoretical framework of language didactics is proposed. Ten cornerstones summarize the theoretical output of the previous chapters and the respective didactic consequences are considered. Theories of cognitive psychology pertaining to noticing, processing, and storing metaphors are systematically revisited and expanded to formulate further didactic implications for metaphor teaching. The consequences drawn from both linguistic as well as didactic theory are translated into a list of ten short guidelines identifying essentials for the explicit integration of metaphors into the language classroom. In chapter five those experimental studies that have already been conducted in the field of Cognitive Linguistic-inspired figurative language teaching are systematically summarized and possible contributions to set up a didactic framework for metaphor teaching are investigated. Chapters six to nine then present a piece of original research. Starting out from five research questions tackling receptive and productive vocabulary acquisition and retention as well as the influence of and on the learner- level of language proficiency, a three-fold study was designed and conducted in a regular business English classroom and results are discussed in detail. The last chapter deals again with specific implications for teaching. Earlier statements about and claims for the language classroom are revisited and refined on the basis of the theoretical linguistic, didactic and empirical findings, and an agenda for further empirical investigations is sketched out.
Entwicklung eines Regelungsverfahrens zur Pfadverfolgung für ein Modellfahrzeug mit Sattelanhänger
(2009)
Besides the progressive automation of internal goods traffic, there is an important area that should also be considered. This area is the carriage of goods in selected external areas. The use of driverless trucks in logistic centers can report economic efficiency. In particular, these precise control procedures require that trucks drive on predetermined paths. The general aim of this work is the adaption and evaluation of a path following control method for articulated vehicles. The differences in the kinematic behavior between trucks with one-axle trailer and semi-trailer vehicles will be emphasized. Additionally, the characteristic kinematic properties of semi-trailers for the adaptation of a control procedure will be considered. This control procedure was initially designed for trucks with one-axle trailer. It must work in forwards and backwards movements. This control process will be integrated as a closed component on the control software of the model vehicle. Thus, the geometry of the model vehicle will be specified, and the possible special cases of the control process will be discovered. The work also documents the most relevant software components of the implemented control process.
Colonoscopy is the gold standard for the detection of colorectal polyps that can progress into cancer. In such an examination, physicians search for polyps in endoscopic images. Thereby polyps can be removed. To support experts with a computer-aided diagnosis system, the University of Koblenz-Landau currently makes some efforts in research different methods for automatic detection. Comparable to traditional pattern recognition systems, features are initially extracted and a classifier is trained on such data. Afterwards, unknown endoscopic images can be classified with the previously trained classifier. This thesis concentrates on the extension of the feature extraction module in the existing system. New detection methods are compared to existing techniques. Several features are implemented, incorporating Graylevel Co-occurrence Matrices, Local Binary Patterns and Discrte Wavelet Transform. Different modifications on those features are applied and evaaluated.
This Thesis contributes by reporting on the current state of diffusion of collaboration information technology (CIT). The investigation concludes, with a high degree of certainty, that today we have a "satisfactory" diffusion level of some level-A CITs (mostly e-Mail, distantly followed by Audio Conferencing), and a "dissatisfactory" diffusion level of higher-level CITs (i.e. those requiring significant collaboration and cooperation among users, like Meeting Support Systems, Group Decision Support Systems, etc.). The potential benefits of the latter seem to be far from fully realised due to lack of user acceptance. This conclusion has gradually developed along the research cycle " it was suggested by Empirical Study I, and tested through Empirical Studies II and III. An additional, unplanned and rather interesting, finding from this study has been the recognition of large [mostly business] reporting on numerous Web 2.0 user-community produced collaboration technologies (most of them belonging to the category of "social software") and their metamorphosis from autonomous, "bottom-up" solutions into enterprise-supported infrastructures. Another contribution of this Thesis " again suggested by Empirical Study I, and tested through Empirical Studies II and III " pertains to the "process structure" of CIT diffusion. I have found that collaboration technology has historically diffused following two distinct (interdependent but orthogonal) diffusion paths " top-down (authority-based) and bottom-up. The authority-based diffusion path seems to be characterised by efforts aimed at "imposing" technologies on employees, the primary concern being to make sure that technology seamlessly and easily integrates into the organisational IT infrastructure. On the other hand, the bottom-up diffusion trail seems to be successful. The contribution of this investigation may be summarised as threefold: 1. This investigation consolidates most of the findings to date, pertaining to CIT adoption and diffusion, which have been produced by the CIT research community. Thus, it tells a coherent story of the dynamics of the community focus and the collective wisdom gathered over a period of (at least) one decade. 2. This work offers a meaningful framework within which to analyse existing knowledge " and indeed extends that knowledge base by identifying persistent problems of collaboration technology acceptance, adoption and diffusion. These problems have been repeatedly observed in practice, though the pattern does not seem to have been recognised and internalised by the community. Many of these problems have been observed in cases of CIT use one decade ago, five years ago, three years ago, and continue to be observed today in structurally the same form despite what is unarguably "rapid technological development". This gives me reason to believe that, at least some of the persistent problems of CIT diffusion can be hypothesised as "determining factors". My contribution here is to identify these factors, discuss them in detail, and thus tackle the theme of CIT diffusion through a structured historical narrative. 3. Through my contribution (2) above, I characterise a "knowledge-action gap" in the field of CIT and illuminate a potential path through which the research community might hope to bridge this gap. The gap may be operationalised as cognitive distance between CIT "knowledge" and CIT "action".
Abstract The present work investigates the wetting characteristics of soils with regard to their dependence on environmental parameters such as water content (WC), pH, drying temperature and wetting temperature of wettable and repellent soils from two contrasting anthropogenic sites, the former sewage disposal field Berlin-Buch and the inner-city park Berlin-Tiergarten. The aim of this thesis is to deepen the understanding of processes and mechanisms leading to changes in soil water repellency. This helps to gain further insight into the behaviour of soil organic matter (SOM) and identifying ways to prevent or reduce the negative effects of soil water repellency (SWR). The first focus of this work is to determine whether chemical reactions are required for wetting repellent samples. This hypothesis was tested by time and temperature dependence of sessile drop spreading on wettable and repellent samples. Additionally, diffuse reflectance infrared Fourier transform (DRIFT) spectroscopy was used to determine whether various drying regimes cause changes in the relative abundance of hydrophobic and hydrophilic functional groups in the outer layer of soil particles and whether these changes can be correlated with water content and the degree of SWR. Finally, by artificially altering the pH in dried samples applying acidic and alkaline reagents in a gaseous state, the influence of only pH on the degree of SWR was investigated separately from the influence of changes in moisture status. The investigation of the two locations Buch and Tiergarten, each exceptionally different in the nature of their respective wetting properties, leads to new insights in the variety of appearance of SWR. The results of temperature, water content and pH dependency of SWR on the two contrasting sites resulted in one respective hypothetical model of nature of repellency for each site which provides an explanation for most of the observations made in this and earlier studies: At the Tiergarten site, wetting characteristics are most likely determined by micelle-like arrangement of amphiphiles which depends on the concentration of water soluble amphiphilic substances, pH and ionic strength in soil solution. At low pH and at high ionic strength, repulsion forces between hydrophilic charged groups are minimized allowing their aggregation with outward orientated hydrophobic molecule moieties. At high pH and low ionic strength, higher repulsion forces between hydrophilic functional groups lead to an aggregation of hydrophobic groups during drying, which results in a layer with outward oriented hydrophilic moieties on soil organic matter surface leading to enhanced wettability. For samples from the Buch site, chemical reactions are necessary for the wetting process. The strong dependence of SWR on water content indicates that hydrolysis-condensation reactions are the controlling mechanisms. Since acid catalyzed hydrolysis is an equilibrium reaction dependent on water content, an excess of water favours hydrolysis leading to an increasing number of hydrophilic functional groups. In contrast, water deficiency favours condensation reactions leading to a reduction of hydrophilic functional groups and thus a reduction of wettability. The results of the present investigation and its comparison with earlier investigations clearly show that SWR is subject to numerous antagonistically and synergistically interacting environmental factors. The degree of influence, which a single factor exerts on SWR, is site-specific, e.g., it is dependent on special characteristics of mineral constituents and SOM which underlies the influence of climate, soil texture, topography, vegetation and the former and current use of the respective site.
This thesis evaluates automated techniques to remove objects from an image and proposed several modifications for the specific application of removing a colour checker from structure dominated images. The selection of approaches covers the main research field of image inpainting as well as an approach used in medical image processing. Their results are investigated to disclose their applicability to removing objects from structure-intense images. The advantages and disadvantages discovered in the process are then used to propose several modifications for an adapted inpainting approach suitable for removing the colour checker.
Many pharmaceuticals (e.g. antibiotics, contrast media, beta blockers) are excreted unmetabolized and enter wastewater treatment plants (WWTPs) through the domestic sewage system. Research has shown that many of them are not effectively removed by conventional wastewater treatment and therefore are detected in surface waters. Reverse osmosis (RO) is one of the most effective means for removing a wide range of micropollutants in water recycling. However, one significant disadvantage is the need to dispose the resultant RO concentrate. Due to the fact that there are elevated concentrations of micropollutants in the concentrate, a direct disposal to surface water could be hazardous to aquatic organisms. As a consequence, further treatment of the concentrate is necessary. In this study, ozonation was investigated as a possible treatment option for RO concentrates. Concentrate samples were obtained from a RO-membrane system which uses municipal WWTP effluents as feeding water to produce infiltration water for artificial groundwater recharge. In this study it could be shown that ozonation is efficient in the attenuation of selected pharmaceuticals, even in samples with high TOC levels (46 mg C/L). Tests with chlorinated and non-chlorinated WWTP effluent showed an increase of ozone stability, but a decrease of hydroxyl radical exposure in the samples after chlorination. This may shift the oxidation processes towards direct ozone reactions and favors the degradation of compounds with high apparent second order rate constants. Additionally it might inhibit an oxidation of compound predominantly reacting with OH radicals. Ozone reaction kinetics were investigated for beta blockers (acebutolol, atenolol, metoprolol and propranolol) which are permanently present in WWTP effluents. For beta blockers two moieties are common which are reactive towards ozone, a secondary amine group and an activated aromatic ring. The secondary amine is responsible for a pH dependence of the direct ozone reaction rate, since only the deprotonated amine reacts very quickly. At pH 7 acebutolol, atenolol and metoprolol reacted with ozone with an apparent second order rate constant of about 2000 M-1 s-1, whereas propranolol reacted at ~1.0 105 M-1 s-1. The rate constants for the reaction of the selected compounds with OH radicals were determined to be 0.5-1.0 x 1010 M-1 s-1. Oxidation products (OPs) formed during ozonation of metoprolol and propranolol were identified via liquid chromatography (LC) tandem mass spectrometry. Ozonation led to a high number of OPs being formed. Experiments were carried out in MilliQ-water at pH 3 and pH 8 as well as with and without the radical scavenger tertiary butanol (t-BuOH). This revealed the influence of pH and the OH radical exposure on OP formation. The OH radical exposure was determined by adding the probe compound para-chlorobenzoic acid (pCBA). Metoprolol: To define the impacts of the protonated and non protonated metoprolol species on OH radical formation, the measured pCBA attenuation was compared to modeled values obtained by a simplified kinetic model (Acuchem). A better agreement with the measured results was obtained, when the model was based on a stoichiometric formation of OH radical precursors (O2-) during the primary ozone reaction of metoprolol. However, for reaction of a deprotonated molecule (attack of the aromatic ring) a formation of O2- could be confirmed, but an assumed stoichiometric O2- formation over-estimated the formation of OH radicals in the system. Analysis of ozonated raw wastewater and municipal WWTP effluent spiked with 10 μM metoprolol exhibited a similar OP formation pattern as detected in the reaction system at pH 8 without adding radical scavenger. This indicated a significant impact of OH radical exposure on the formation of OPs in real wastewater matrices. Propranolol: The primary ozonation product of propranolol (OP-291) was formed by an ozone attack of the naphthalene ring, which resulted in a ring opening and two aldehyde moieties being formed. OP-291 was further oxidized to OP-307, presumably by an OH radical attack, which was then further oxidized to OP-281. Reaction pathways via ozone as well as OH radicals were proposed and confirmed by the chemical structures identified with MS2 and MS3 data. It can be concluded that ozonation of WWTP effluent results in the formation of a high number of OPs with an elevated toxic potential (i.e. formation of aldehydes).
In recent years, traceability has been more and more universally accepted as being a key factor for the success of software development projects. However, the multitude of different, not well-integrated taxonomies, approaches and technologies impedes the application of traceability techniques in practice. This paper presents a comprehensive view on traceability, pertaining to the whole software development process. Based on graph technology, it derives a seamless approach which combines all activities related to traceability information, namely definition, recording, identification, maintenance, retrieval, and utilization in one single conceptual framework. The presented approach is validated in the context of the ReDSeeDS-project aiming at requirements-based software reuse.
This thesis focuses on the utilization of modern graphics hardware (GPU) for visualization and computation purposes, especially of volumetric data from medical imaging. The considerable increase in raw computing power in recent years has turned commodity systems into high-performance workstations. In combination with the direct rendering capabilities of graphics hardware, "visual computing" and "computational steering" approaches on large data sets have become feasible. In this regard several example applications and concepts such as the "ray textures" have been developed and are discussed in detail. As the amount of data to be processed and visualized is steadily increasing, memory and bandwidth limitations require compact representations of the data. While the compression of image data has been investigated extensively in the past, the thesis addresses possibilities of performing computations directly on the compressed data. Therefore, different categories of algorithms are identified and represented in the wavelet domain. By using special variants of the compressed format, efficient implementations of essential image processing algorithms are possible and demonstrate the potential of the approach. From the technical perspective, the GPU-based framework "Cascada" has been developed in the course of this thesis. The introduction of object-oriented concepts to shader programming, as well as a hierarchical representation of computation and/or visualization procedures led to a simplified utilization of graphics hardware while maintaining competitive performance. This is shown with different implementations throughout the contributions, as well as two clinical projects in the field of diagnosis assistance. On the one hand the semi-automatic segmentation of low-resolution MRI data sets of the human liver is evaluated. On the other hand different possibilities in assessing abdominal aortic aneurysms are discussed; both projects make use of graphics hardware. In addition, "Cascada" provides extensions towards recent general-purpose programming architectures and a modular design for future developments.
The research described in this thesis was designed to yield information on the impact of particle-bound pesticides on organisms living in the interface between sediment and water column in a temporarily open estuary (TOCEs). It was hypothesized that natural variables such as salinity and temperature and anthropogenic stressors such as particle-bound pesticides contribute to the variability of the system. A multiple line of evidence approach is necessary due to the variability in sediment type, contaminant distribution and spatial and temporal variability within the ecosystem in particular within TOCEs. The first aim of this thesis was to identify which particle-bound pesticides are important to the contamination of the Lourens River estuary (Western Cape, South Africa), taking into account their environmental concentrations, physico-chemical and toxicological properties (Exposure assessment). The second aim was to identify spatial and temporal variations in particle bound pesticide contamination, natural environmental variables and benthic community structure (effect assessment). The third aim was to test the hypothesis: "does adaptation to fluctuating salinities lead to enhanced survival of the harpacticoid copepod Mesochra parva when exposed to a combination of particle associated chlorpyrifos exposure and hypo-osmotic stress during a 96 h sediment toxicity test?" The last aim was to identify the driving environmental variables (including natural and anthropogenic stressors) in a "natural" (Rooiels River) compared to a "disturbed" (Lourens River) estuary and to identify if and how these variables change the benthic community structure in both estuaries. Data produced in this research thus provide important information to understand the impact of pesticides and its interaction with natural variables in a temporarily open estuary. To summarise, this study indicated, by the use of the multi-evidence approach, that the pesticides endosulfan and chlorpyrifos posed a risk towards benthic organisms in a temporarily open estuary in particular during spring season. Furthermore an important link between pesticide exposure/ toxicity and salinity was identified, which has important implications for the management of temporarily open estuaries.
An empirical study to evaluate the location of advertisement panels by using a mobile marketing tool
(2009)
The efficiency of marketing campaigns is a precondition for business success. This paper discusses a technique to transfer advertisement content vie Bluetooth technology and collects market research information at the same time. Conventional advertisement media were enhanced by devices to automatically measure the number, distance, frequency and exposure time of passersby, making information available to evaluate both the wireless media as well as the location in general. This paper presents a study analyzing these data. A cryptographic one-way function protects privacy during data acquisition.
The genus Cheilolejeunea (Spruce) Schiffn. (Lejeuneaceae, Jungermanniopsida) is represented by 23 species in continental tropical Africa. The morphological characters such as features of the stem, leaf, lobule and perianth traditionally used to separate the taxa at both species and generic level have been found to be unstable. The species are variably ranked in several subgenera including Cheilolejeunea (Spruce) Schiffn., Euosmolejeunea Schiffn., Strepsilejeunea (Spruce) Schiffn. and Xenolejeunea Kachroo & Schust. Although the genus has never been monographed, there are a few regional taxonomic accounts for America, Australia and China. A comprehensive revision of Cheilolejeunea species is lacking in Africa where the existing studies are based on single subgenus and sub-regional flora or checklist compilations, which are sometimes without identification keys. This study revises the taxonomy of Cheilolejeunea and the closely allied genus Leucolejeunea A. Evans, in continental Africa based on morphological data analysed using phenetic and phylogenetic methods.
The thesis at hand evaluates Open Source Business Process Management (BPM) Systems in the context of the R4eGov1 Project. The provision of concepts and tools to support and enable interoperability in pan-European networks of pubic administrations is one of the major objectives that R4eGov is aiming at. Thereby a strong focus lies on the interoperability of cross-organizational processes from the viewpoint of modeling, execution and monitoring. BPM can increase the effectiveness and efficiency of cross-organizational processes by restructuring them towards the needs of the entities involved. BPM is dependent on BPM systems that combine technologies of process modeling, business process analysis and execution along with their integration into adequate runtime environments and rule engines. The evaluation that is performed within the thesis investigates how far BPM systems can support several requirements of interoperability that have been developed by the R4eGov project. It also targets at analyzing those BPM system according to generic requirements on BPM and software tools. The investigation is build upon common BPM theories and standards for modeling business processes. It describes the origin and interdependencies of BPM and Workflow Management (WfM), highlighting similarities and differences from the technological and historical perspective. Moreover, it introduces web service standards and technologies that are used to build service-oriented architectures allowing greater flexibility in BPM. In addition the thesis introduces methods and best practices to evaluate software tools. It contains an evaluation framework for BPM tools that has been based on the software product evaluation standard ISO/IEC 14598. The evaluation framework comprises the definition of an R4eGov scenario and a catalogue of criteria for evaluating a set of selected Open Source BPM systems. The definition of the catalogue of criteria is build upon generic requirements on BPM systems and those that are specifically to R4eGov. The chosen methods and the core elements of the evaluation framework will be applied to the selected BPM systems Intalio BPMS,NetBeans IDE, and JBoss jBPM. Finally the results of the applied R4eGov scenario and of the applied catalogue of criteria are being discussed by highlighting individual strengths and weaknesses of the systems.
Ontologies play an important role in knowledge representation for sharing information and collaboratively developing knowledge bases. They are changed, adapted and reused in different applications and domains resulting in multiple versions of an ontology. The comparison of different versions and the analysis of changes at a higher level of abstraction may be insightful to understand the changes that were applied to an ontology. While there is existing work on detecting (syntactical) differences and changes in ontologies, there is still a need in analyzing ontology changes at a higher level of abstraction like ontology evolution or refactoring pattern. In our approach we start from a classification of model refactoring patterns found in software engineering for identifying such refactoring patterns in OWL ontologies using DL reasoning to recognize these patterns.
Culture and violence
(2010)
The basic assumption of this study is that specific cultural conditions may lead to psychopathological reactions through which an increase in interpersonal violence may happen. The objective of this study was to define to what extent homicide rates across national cultures might be associated with the strength of their attitudes toward specific beliefs and values, and their scores in specific cultural dimensions. To answer this question, nine independent variables were defined six of which were related to the people- attitudes pertaining importance of religion (Religiosity), excessive feeling of choice and control (Omnipotence), clear-cut distinction between good and evil (Absolutism), proud of their nationality (Nationalism), approval of competition (Competitiveness), and high respect for authorities and emphasis on obedience (Authoritarianism). The data for these variables were collected from World Values Survey. For two cultural dimensions, Collectivism, and Power Distance, Hofstede- scores were used. The 9th variable was GNI per capita. After estimation of 7% missing values in the whole data through multiple imputation, a sample of 81 nations was used for further statistical analyses.
Results: Stepwise regression analysis indicated Omnipotence and GNI as the strongest predictors of homicide (β = .44 P = .000; β = -.27 P = .006 respectively). The 9 independent variables were loaded on two factors, socio-economic development (SED) and psycho-cultural factor (Psy-Cul), which were negatively correlated (-.47). The Psy-Cul was interpreted as an indicator of narcissism, and a mediator between SED and homicide. Hierarchical cluster analysis made a clear distinction among three main groups of Western, Developing, and post-Communist nations on the basis of the two factors.
This minor thesis shows a way to optimise a generated oracle to achieve shorter runtimes. Shorter runtimes of test cases allows the execution of more test cases in the same time. The execution of more test cases leads to a higher confidence in the software-quality. Oracles can be derived from specifications. However specifications are used for different purposes and therefore are not necessarily executable. Even if the are executable it might be with only a high runtime. Those two facts come mostly from the use of quantifiers in the logic. If the quantifier-range is not bounded, respectively if the bounds are outside the target language-datatype-limits, the specification is too expressive to be exported into a program. Even if the bounds inside the used datatype-limits, the quantification is represented as a loop which leads to a runtime blowup, especially if quantifiers are nested. This work explains four different possibilities to reduce the execution time of the oracle by manipulating the quantified formular whereas this approach is only applicable if the quantified variables are of type Integer.
With the Multimedia Metadata Ontology (M3O), we have developed a sophisticated model for representing among others the annotation, decomposition, and provenance of multimedia metadata. The goal of the M3O is to integrate the existing metadata standards and metadata formats rather than replacing them. To this end, the M3O provides a scaffold needed to represent multimedia metadata. Being an abstract model for multimedia metadata, it is not straightforward how to use and specialize the M3O for concrete application requirements and existing metadata formats and metadata standards. In this paper, we present a step-by-step alignment method describing how to integrate and leverage existing multimedia metadata standards and metadata formats in the M3O in order to use them in a concrete application. We demonstrate our approach by integrating three existing metadata models: the Core Ontology on Multimedia (COMM), which is a formalization of the multimedia metadata standard MPEG-7, the Ontology for Media Resource of the W3C, and the widely known industry standard EXIF for image metadata
This thesis presents an analysis of API usage in a large corpus of Java software retrieved from the open source repositories hosted at SourceForge. Most larger software projects use software libraries, which offer a public "application programming interface" or API as an interface for the programmer. In order to facilitate the transition between different APIs, there are emerging research projects in the field of automated API migration. However, there is a lack of basic statistical background information about in-the-wild usage of APIs as such measurements have, until now, only been done on rather small corpora. We thus present an analysis method suitable for measurements with large corpora. First, we create a corpus of open source projects hosted on SourceForge, as well as a corpus of software libraries. Then, all projects in the corpus are compiled with an instrumented compiler. We use a compiler plugin for javac that gives detailed information about every method created by the compiler. This information is stored in a database and analyzed.
Conventional security infrastructures in the Internet cannot be directly adopted to ambient systems, especially if based on short-range communication channels: Personal, mobile devices are used and the participants are present during communication, so privacy protection is a crucial issue. As ambient systems cannot rely on an uninterrupted connection to a Trust Center, certiffed data has to be veriffed locally. Security techniques have to be adjusted to the special environment. This paper introduces a public key infrastructure (PKI) to provide secure communication channels with respect to privacy, confidentiality, data integrity, non-repudiability, and user or device authentication. It supports three certiffcate levels with a different balance between authenticity and anonymity. This PKI is currently under implementation as part of the iCity project.
The goal of this minor thesis is to integrate a robotic arm into an existing robotics software. A robot built on top of this stack should be able to participate successfully RoboCup @Home league. The robot Lisa (Lisa is a service android) needs to manipulate objects, lifting them from shelves or handing them to people. Up to now, the only possibility to do this was a small gripper attached to the robot platform. A "Katana Linux Robot" of Swiss manufacturer Neuronics has been added to the robot for this thesis. This arm needs a driver software and path planner, so that the arm can reach its goal object "intelligently", avoiding obstacles and creating smooth, natural motions.
The processing of data is often restricted by contractual and legal requirements for protecting privacy and IPRs. Policies provide means to control how and by whom data is processed. Conditions of policies may depend on the previous processing of the data. However, existing policy languages do not provide means to express such conditions. In this work we present a formal model and language allowing for specifying conditions based on the history of data processing. We base the model and language on XACML.
This thesis introduces fnnlib, a C++ library for recurrent neural network simulations that I developed between October 2009 and March 2010 at Osaka University's Graduate School of Engineering. After covering the theory behind recurrent neural networks, backpropagation through time, recurrent neural networks with parametric bias, continuous-time recurrent neural networks, and echo state networks, the design of the library is explained. All of the classes as well as their interrelationships are presented along with reasons as to why certain design decisions were made. Towards the end of the thesis, a small practical example is shown. Also, fnnlib is compared to other neural network libraries.
The development of a pan-European public E-Procurement system is an important target of the European Union to enhance the efficiency, transparency and competitiveness of public procurement procedures conducted within the European single market. A great obstacle for cross-border electronic procurement is the heterogeneity of national procurement systems in terms of technical, organizational and legal differences. To overcome this obstacle the European Commission funds several initiatives that contribute to the aim of achieving interoperability for pan-European public procurement. Pan European Public Procurement OnLine (PEPPOL) is one of these initiatives that aims at piloting an interoperable pan-European E-Procurement solution to support businesses and public purchasing entities from different member states to conduct their procurement processes electronically.rnrnAs interoperability and inter-connection of distributed heterogeneous information systems are the major requirements in the European procurement domain, and the VCD sub-domain in particular, service-oriented architecture (SOA) seems to provide a promising approach to realize such an architecture, as it promotes loose coupling and interoperability. This master thesis therefore discusses the SOA approach and how its concepts, methodologies and technologies can be used for the development of interoperable IT systems for electronic public procurement. This discussion is enhanced through a practical application of the discussed SOA methodologies by conceptualizing and prototyping of a sub-system derived from the overall system domain of the Virtual Company Dossier. For that purpose, important aspects of interoperability and related standards and technologies will be examined and put into the context of public electronic procurement. Furthermore, the paradigm behind SOA will be discussed, including the derivation of a top-down development methodology for service-oriented systems.
Investigating the environmental fate of iodinated X-ray contrast media in the urban water cycle
(2010)
Iodinated X-ray contrast media (ICM) are a group of emerging contaminants which have been detected at elevated concentrations in the aquatic environment. These compounds are excreted unmetabolized into hospital wastewater, and eventually treated at wastewater treatment plants (WWTPs). The removal of ICM in WWTPs has not been very effective and therefore the ICM enter the aquatic environment via WWTP effluent discharges. Research has investigated the removal of selected ICM via abiotic and biotic processes, however limited work has attempted to determine the fate of these compounds once released into the environment. This thesis investigates the biotransformation of four selected ICM (diatrizoate, iohexol, iomeprol, and iopamidol) in aerobic soil-water and sediment-water systems as well as in different environmental matrices. Iohexol, iomeprol and iopamidol were biotransformed to several TPs in the aerobic batch systems, while no biotransformation was observed for the ionic ICM, diatrizoate. In total 34 biotransformation products (TPs) of the three non-ionic ICM were identified. The combination of semi-preparative HPLC-UV, hybrid triple quadrupole-linear ion trap mass spectrometry (Qq-LIT-MS) was found to be an accurate approach for the structural elucidation of ICM TPs. The ICM TPs resulted in microbial transformation occurring at the side chains of the parent ICM, with the iodinated aromatic ring unmodified.
Hybrid automata are used as standard means for the specification and analysis of dynamical systems. Several researches have approached them to formally specify reactive Multi-agent systems situated in a physical environment, where the agents react continuously to their environment. The specified systems, in turn, are formally checked with the help of existing hybrid automata verification tools. However, when dealing with multi-agent systems, two problems may be raised. The first problem is a state space problem raised due to the composition process, where the agents have to be parallel composed into an agent capturing all possible behaviors of the multi-agent system prior to the verification phase. The second problem concerns the expressiveness of verification tools when modeling and verifying certain behaviors. Therefore, this paper tackles these problems by showing how multi-agent systems, specified as hybrid automata, can be modeled and verified using constraint logic programming(CLP). In particular, a CLP framework is presented to show how the composition of multi-agent behaviors can be captured dynamically during the verification phase. This can relieve the state space complexity that may occur as a result of the composition process. Additionally, the expressiveness of the CLP model flexibly allows not only to model multi-agent systems, but also to check various properties by means of the reachability analysis. Experiments are promising to show the feasibility of our approach.
Existing tools for generating application programming interfaces (APIs) for ontologies lack sophisticated support for mapping the logics-based concepts of the ontology to an appropriate object-oriented implementation of the API. Such a mapping has to overcome the fundamental differences between the semantics described in the ontology and the pragmatics, i.e., structure, functionalities, and behavior implemented in the API. Typically, concepts from the ontology are mapped one-to-one to classes in the targeted programming language. Such a mapping only produces concept representations but not an API at the desired level of granularity expected by an application developer. We present a Model-Driven Engineering (MDE) process to generate customized APIs for ontologies. This API generation is based on the semantics defined in the ontology but also leverages additional information the ontology provides. This can be the inheritance structure of the ontology concepts, the scope of relevance of an ontology concept, or design patterns defined in the ontology.
In recent development, attempts have been made to integrate UML and OWL into one hybrid modeling language, namely TwoUse. This aims at making use of the benefits of both modeling languages and overcoming the restrictions of each. In order to create a modeling language that will actually be used in software development an integration with OCL is needed. This integration has already been described at the contextual level in, however an implementation is lacking so far. The scope of this paper is the programatical implementation of the integration of TwoUse with OCL. In order to achieve this, two different OCL implementations that already provide parsing and interpretation functionalities for expressions over regular UML. This paper presents two attempts to extend existing OCL implementations, as well as a comparison of the existing approaches.
Specifying behaviors of multi-agent systems (MASs) is a demanding task, especially when applied in safety-critical systems. In the latter systems, the specification of behaviors has to be carried out carefully in order to avoid side effects that might cause unwanted or even disastrous behaviors. Thus, formal methods based on mathematical models of the system under design are helpful. They not only allow us to formally specify the system at different levels of abstraction, but also to verify the consistency of the specified systems before implementing them. The formal specification aims a precise and unambiguous description of the behavior of MASs, whereas the verification aims at proving the satisfaction of specified requirements. A behavior of an agent can be described as discrete changes of its states with respect to external or internal actions. Whenever an action occurs, the agent moves from one state to another one. Therefore, an efficient way to model this type of discrete behaviors is to use a kind of state transition diagrams such as finite automata. One remarkable advantage of such transition diagrams is that they lend themselves formal analysis techniques using model checking. The latter is an automatic verification technique which determines whether given properties are satisfied within a model underlying a particular system. In realistic physical environments, however, it is necessary to consider continuous behaviors in addition to discrete behaviors of MASs. Examples of those type of behaviors include the movement of a soccer agent to kick off or to go to the ball, the process of putting out the fire by a fire brigade agent in a rescue scenario, or any other behaviors that depend on any timed physical law. The traditional state transition diagrams are not sufficient to combine these types of behaviors. Hybrid automata offer an elegant method to capture such types of behaviors. Hybrid automata extend regular state transition diagrams with methods that deal with those continuous actions such that the state transition diagrams are used to model the discrete changes of behaviors, while differential equations are used to model the continuous changes. The semantics of hybrid automata make them accessible to formal verification by means of model checking. The main goal of this thesis is to approach hybrid automata for specifying and verifying behaviors of MASs. However, specifying and and verifying behaviors of MASs by means of hybrid automata raises several issues that should be considered. These issues include the complexity, modularity, and the expressiveness of MASs' models. This thesis addresses these issues and provides possible solutions to tackle them.
The novel mobile application csxPOI (short for: collaborative, semantic, and context-aware points-of-interest) enables its users to collaboratively create, share, and modify semantic points of interest (POI). Semantic POIs describe geographic places with explicit semantic properties of a collaboratively created ontology. As the ontology includes multiple subclassiffcations and instantiations and as it links to DBpedia, the richness of annotation goes far beyond mere textual annotations such as tags. With the intuitive interface of csxPOI, users can easily create, delete, and modify their POIs and those shared by others. Thereby, the users adapt the structure of the ontology underlying the semantic annotations of the POIs. Data mining techniques are employed to cluster and thus improve the quality of the collaboratively created POIs. The semantic POIs and collaborative POI ontology are published as Linked Open Data.
We propose a new approach for mobile visualization and interaction of temporal information by integrating support for time with today's most prevalent visualization of spatial information, the map. Our approach allows for an easy and precise selection of the time that is of interest and provides immediate feedback to the users when interacting with it. It has been developed in an evolutionary process gaining formative feedback from end users.
In recent years ontologies have become common on the WWW to provide high-level descriptions of specific domains. These descriptions could be effectively used to build applications with the ability to find implicit consequences of their represented knowledge. The W3C developed the Resource Description Framework RDF, a language to describe the semantics of the data on the web, and the Ontology Web Language OWL, a family of knowledge representation languages for authoring ontologies. In this thesis we propose an ontology API engineering framework that makes use of the state-of-the-art ontology modeling technologies as well as of software engineering technologies. This system simplifies the design and implementation process of developing dedicated APIs for ontologies. Developers of semantic web applications usually face the problem of mapping entities or complex relations described in the ontology to object-oriented representations. Mapping complex relationship structures that come with complex ontologies to a useful API requires more complicated API representations than does the mere mapping of concepts to classes. The implementation of correct object persistence functions in such class representations also becomes quite complex.
Mobile payment has been a payment option in the market for a long time now and was predicted to become a widely used payment method. However, over the years, the market penetration rate of mPayments has been relatively low, despite it having all characteristics required of a convenient payment method. The primaryrnreason for this has been cited as a lack of customer acceptance mainly caused due to the lack of perceived security by the end-user. Although biometric authentication is not a new technology, it is experiencing a revival in the light of the present day terror threats and increased security requirements in various industries. The application of biometric authentication in mPayments is analysed here and a suitable biometric authentication method for use with mPayments is recommended. The issue of enrolment, human and technical factors to be considered are discussed and the STOF business model is applied to a BiMoP (biometric mPayment) application.
Knowledge compilation is a common technique for propositional logic knowledge bases. A given knowledge base is transformed into a normal form, for which queries can be answered efficiently. This precompilation step is expensive, but it only has to be performed once. We apply this technique to concepts defined in the Description Logic ALC. We introduce a normal form called linkless normal form for ALC concepts and discuss an efficient satisability test for concepts given in this normal form. Furthermore, we will show how to efficiently calculate uniform interpolants of precompiled concepts w.r.t. a given signature.
Multi-agent systems are a mature approach to model complex software systems by means of Agent-Oriented Software Engineering (AOSE). However, their application is not widely accepted in mainstream software engineering. Parallel to this the interdisciplinary field of Agent-based Social Simulation (ABSS) finds increasing recognition beyond the purely academic realm which starts to draw attention from the mainstream of agent researchers. This work analyzes factors to improve the uptake of AOSE as well as characteristics which separate the two fields AOSE and ABSS to understand their gap. Based on the efficiency-oriented micro-agent concept of the Otago Agent Platform (OPAL) we have constructed a new modern and self-contained micro-agent platform called µ². The design takes technological trends into account and integrates representative technologies, such as the functionally-inspired JVM language Clojure (with its Transactional Memory), asynchronous message passing frameworks and the mobile application platform Android. The mobile version of the platform shows an innovative approach to allow direct interaction between Android application components and micro-agents by mapping their related internal communication mechanisms. This empowers micro-agents to exploit virtually any capability of mobile devices for intelligent agent-based applications, robotics or simply act as a distributed middleware. Additionally, relevant platform components for the support of social simulations are identified and partially implemented. To show the usability of the platform for simulation purposes an interaction-centric scenario representing group shaping processes in a multi-cultural context is provided. The scenario is based on Hofstede's concept of 'Cultural Dimensions'. It does not only confirm the applicability of the platform for simulations but also reveals interesting patterns for culturally augmented in- and out-group agents. This explorative research advocates the potential of micro-agents as a powerful general system modelling mechanism while bridging the convergence between mobile and desktop systems. The results stimulate future work on the micro-agent concept itself, the suggested platform and the deeper exploration of mechanisms for seemless interaction of micro-agents with mobile environments. Last but not least the further elaboration of the simulation model as well as its use to augment intelligent agents with cultural aspects offer promising perspectives for future research.
This dissertation provides an interdisciplinary contribution to the project ReGLaN-Health & Logistics. ReGLaN-Health & Logistics, is an international cooperation deriving benefits from the capabilities of scientists working on different fields. The aim of the project is the development of a socalled SDSS that supports decision makers working within health systems with a special focus on rural areas. In this dissertation, one important component for the development of the DSS named EWARS is proposed and described in detail. This component called SPATTB is developed with the intention of dealing with spatial data, i.e. data with additional geocoded information with regard to the special requirements of the EWARS.rnrnAn important component in the process of developing the EWARS is the concept of GIS. Classically, geocoded information with a vectorial character numerically describing spatial phenomena is managed and processed in a GIS. For the development of the EWARS, the manageability of the type of data exemplarily given by (x,y,o) with coordinates x,y ) and Ozon-concentration o is not sufficient. It is described, that the manageable data has to be extended to data of type (x,y,f ), where (x,y) are the geocoded information, but where f is not only a numerical value but a functional description of a certain phenomenom. An example for the existence and appearance of that type of data is the geocoded information about the variation of the Ozon-concentration in time or depending on temperature. A knowledge-base as important subsystem of DSS containing expert knowledge is mentioned. This expert-knowledge can be made manageable when using methods from the field of fuzzy logic. Thereby mappings, socalled fuzzy-sets, are generated. Within the EWARS, these mappings will be used with respect to additional geocoded data. The knowledge about the geocoded mapping information only at a finite set of locations (x,y) associated with mapping information f is not sufficient in applications that need continuous statements in a certain geographical area. To provide a contribution towards solving this problem, methods from the field of computer geometry and CAD, so-called Bezier-methods, are used for interpolating this geocoded mapping information. Classically, these methods operates on vectors a the multidimensional vector-space whose elements contain real-valued components but in terms of dealing with mapping information, there has to be an extension on topological vector spaces since mapping spaces can be defined as such spaces. This builds a new perspective and possibility in the application of these methods. Therefore, the according algorithms have to be extended; this work is presented. The field of Artificial Neural Networks plays an important role for the processing and management of the data within the EWARS, where features of biological processes and structures are modeled and implemented as algorithms. Generally, the developed methods can be divided as usable in terms of interpolation or approximation functional coherences and in such being applicable to classification problems. In this dissertation one method from each type is regarded in more detailed. Thereby, the classical algorithms of the so-called Backpropagation-Networks for approximation and the Kohonen-Networks for classification are described. Within the thesis, an extension of these algorithms is then proposed using coherences from mathematical measure-theory and approximation theory. The mentioned extension of these algorithms is based on a preprocessing of the mapping data using integration methods from measure theory.
Im Rahmen dieser Bachelorarbeit wurde ein Back-Office für die elektronische Version des Europäischen Schadensberichtes erstellt. Es wurde bereits in anderen Arbeiten ein mobiler Client, welcher auf einem Windows Mobile Handy läuft, sowie ein Polizei Client erstellt. Diese greifen auf das Back-Office zu, um Daten, wie z.B. die Autodaten (Automarke, der Typ, das Baujahr und Bilder eines 3D-Modells des Autos) zu einem bestimmten Kennzeichen oder die Personendaten des jeweiligen Autobesitzers zu erhalten. Der mobile Client sendet zudem die Unfallakte an das Back-Office, damit die Daten über einen Unfall in diesem abgespeichert und weiter bearbeitet werden können. Ziel der Arbeit war es ein erweiterbares, modulares System zu entwickeln, welches später um weitere Module ergänzt werden kann, um neue Funktionen bereitstellen zu können. Diese Module können jeweils beliebige Daten in einer Datenbank abspeichern und diese von der Datenbank auch wieder abfragen, sowie verändern, ohne dass das relationale Schema der Datenbank verändert werden muss.
Die Entwicklung von Algorithmen im Sinne des Algorithm Engineering geschieht zyklisch. Der entworfene Algorithmus wird theoretisch analysiert und anschließend implementiert. Nach der praktischen Evaluierung wird der Entwurf anhand der gewonnenen Kenntnisse weiter entwickelt. Formale Verifffizierung der Implementation neben der praktischen Evaluierung kann den Entwicklungsprozess verbessern. Mit der Java Modeling Language (JML) und dem KeY tool stehen eine einfache Spezififfkationssprache und ein benutzerfreundliches, automatisiertes Verififfkationstool zur Verfügung. Diese Arbeit untersucht, inwieweit das KeY tool für die Verifffizierung von komplexeren Algorithmen geeignet ist und welche Rückmeldungen für Algorithmiker aus der Verififfkation gewonnen werden können.Die Untersuchung geschieht anhand von Dijkstras Algorithmus zur Berechnung von kürzesten Wegen in einem Graphen. Es sollen eine konkrete Implementation des Standard-Algorithmus und anschließend Implementationen weiterer Varianten verifffiziert werden. Dies ahmt den Entwicklungsprozess des Algorithmus nach, um in jeder Iteration nach möglichen Rückmeldungen zu suchen. Bei der Verifffizierung der konkreten Implementation merken wir, dass es nötig ist, zuerst eine abstraktere Implementation mit einfacheren Datenstrukturen zu verififfzieren. Mit den dort gewonnenen Kenntnissen können wir dann die Verifikation der konkreten Implementation fortführen. Auch die Varianten des Algorithmus können dank der vorangehenden Verififfkationen verifiziert werden. Die Komplexität von Dijkstras Algorithmus bereitet dem KeY tool einige Schwierigkeiten bezüglich der Performanz, weswegen wir während der Verifizierung die Automatisierung etwas reduzieren müssen. Auf der anderenrn Seite zeigt sich, dass sich aus der Verifffikation einige Rückmeldungen ableiten lassen.