Filtern
Volltext vorhanden
- nein (810) (entfernen)
Erscheinungsjahr
- 2024 (4)
- 2023 (6)
- 2022 (10)
- 2021 (9)
- 2020 (36)
- 2019 (155)
- 2018 (189)
- 2017 (117)
- 2016 (73)
- 2015 (17)
- 2014 (11)
- 2013 (12)
- 2012 (14)
- 2011 (18)
- 2010 (2)
- 2009 (3)
- 2008 (7)
- 2007 (7)
- 2006 (25)
- 2005 (12)
- 2004 (11)
- 2003 (4)
- 2002 (3)
- 2001 (1)
- 2000 (4)
- 1999 (2)
- 1998 (8)
- 1997 (5)
- 1996 (13)
- 1995 (9)
- 1994 (15)
- 1993 (4)
- 1992 (3)
- 1991 (1)
Dokumenttyp
- Sonstiges (810) (entfernen)
Sprache
- Englisch (622)
- Deutsch (176)
- Spanisch (5)
- Italienisch (4)
- Polnisch (2)
- Französisch (1)
Schlagworte
- E-Learning (4)
- MOOC (4)
- Scrum (4)
- embodied cognition (4)
- errata, addenda (4)
- Cloud-Security (3)
- ISM: supernova remnants (3)
- Industry 4.0 (3)
- Internet of Things (3)
- Security Metrics (3)
Institut
- Institut für Biochemie und Biologie (85)
- Hasso-Plattner-Institut für Digital Engineering GmbH (83)
- Institut für Physik und Astronomie (82)
- Institut für Geowissenschaften (61)
- Institut für Mathematik (46)
- Department Sport- und Gesundheitswissenschaften (44)
- Department Psychologie (43)
- Hasso-Plattner-Institut für Digital Engineering gGmbH (30)
- Institut für Ernährungswissenschaft (30)
- Institut für Chemie (29)
SpringFit
(2019)
Joints are crucial to laser cutting as they allow making three-dimensional objects; mounts are crucial because they allow embedding technical components, such as motors. Unfortunately, mounts and joints tend to fail when trying to fabricate a model on a different laser cutter or from a different material. The reason for this lies in the way mounts and joints hold objects in place, which is by forcing them into slightly smaller openings. Such "press fit" mechanisms unfortunately are susceptible to the small changes in diameter that occur when switching to a machine that removes more or less material ("kerf"), as well as to changes in stiffness, as they occur when switching to a different material. We present a software tool called springFit that resolves this problem by replacing the problematic press fit-based mounts and joints with what we call cantilever-based mounts and joints. A cantilever spring is simply a long thin piece of material that pushes against the object to be held. Unlike press fits, cantilever springs are robust against variations in kerf and material; they can even handle very high variations, simply by using longer springs. SpringFit converts models in the form of 2D cutting plans by replacing all contained mounts, notch joints, finger joints, and t-joints. In our technical evaluation, we used springFit to convert 14 models downloaded from the web.
TrussFormer
(2019)
We present TrussFormer, an integrated end-to-end system that allows users to 3D print large-scale kinetic structures, i.e., structures that involve motion and deal with dynamic forces. TrussFormer builds on TrussFab, from which it inherits the ability to create static large-scale truss structures from 3D printed connectors and PET bottles. TrussFormer adds movement to these structures by placing linear actuators into them: either manually, wrapped in reusable components called assets, or by demonstrating the intended movement. TrussFormer verifies that the resulting structure is mechanically sound and will withstand the dynamic forces resulting from the motion. To fabricate the design, TrussFormer generates the underlying hinge system that can be printed on standard desktop 3D printers. We demonstrate TrussFormer with several example objects, including a 6-legged walking robot and a 4m-tall animatronics dinosaur with 5 degrees of freedom.
For a singularly perturbed parabolic - ODE system we construct the asymptotic expansion in the small parameter in the case, when the degenerate equation has a double root. Such systems, which are called partly dissipative reaction-diffusion systems, are used to model various natural processes, including the signal transmission along axons, solid combustion and the kinetics of some chemical reactions. It turns out that the algorithm of the construction of the boundary layer functions and the behavior of the solution in the boundary layers essentially differ from that ones in case of a simple root. The multizonal initial and boundary layers behaviour was stated.
The impact of social identity and social dominance on the regulation of human growth: A viewpoint
(2019)
Catholicism
(2019)
Peace orders of modern times
(2019)
Data analytics are moving beyond the limits of a single data processing platform. A cross-platform query optimizer is necessary to enable applications to run their tasks over multiple platforms efficiently and in a platform-agnostic manner. For the optimizer to be effective, it must consider data movement costs across different data processing platforms. In this paper, we present the graph-based data movement strategy used by RHEEM, our open-source cross-platform system. In particular, we (i) model the data movement problem as a new graph problem, which we prove to be NP-hard, and (ii) propose a novel graph exploration algorithm, which allows RHEEM to discover multiple hidden opportunities for cross-platform data processing.
Evaluating the performance of self-adaptive systems (SAS) is challenging due to their complexity and interaction with the often highly dynamic environment. In the context of self-healing systems (SHS), employing simulators has been shown to be the most dominant means for performance evaluation. Simulating a SHS also requires realistic fault injection scenarios. We study the state of the practice for evaluating the performance of SHS by means of a systematic literature review. We present the current practice and point out that a more thorough and careful treatment in evaluating the performance of SHS is required.
This paper investigates the applicability of CMOS decoupling cells for mitigating the Single Event Transient (SET) effects in standard combinational gates. The concept is based on the insertion of two decoupling cells between the gate's output and the power/ground terminals. To verify the proposed hardening approach, extensive SPICE simulations have been performed with standard combinational cells designed in IHP's 130 nm bulk CMOS technology. Obtained simulation results have shown that the insertion of decoupling cells results in the increase of the gate's critical charge, thus reducing the gate's soft error rate (SER). Moreover, the decoupling cells facilitate the suppression of SET pulses propagating through the gate. It has been shown that the decoupling cells may be a competitive alternative to gate upsizing and gate duplication for hardening the gates with lower critical charge and multiple (3 or 4) inputs, as well as for filtering the short SET pulses induced by low-LET particles.
Secondary mica minerals collected from the Santa Helena (W- (Cu) mineralization) and Venise (W-Mo mineralization) endogenic breccia structures were Ar-40/Ar-39 dated. The muscovite Ar-40/Ar-39 data yielded 286.8 +/- 1.2 (+/- 1 sigma) Ma (samples 6Ha and 11Ha) which reflect the age of secondary muscovite formation probably from magmatic biotite or feldspar alteration. Sericite Ar-40/Ar-39 data yielded 280.9 +/- 1.2 (+/- 1 sigma) Ma to 279.0 +/- 1.1 (+/- 1 sigma) Ma (samples 6Hb and 11Hb) reflecting the age of greisen alteration (T similar to 300 degrees C) where the W- disseminated mineralization occurs. The muscovite 40Ar/39Ar data of 277.3 +/- 1.3 (+/- 1 sigma) Ma and 281.3 +/- 1.2 (+/- 1 sigma) Ma (samples 5 and 6) also reflect the age of muscovite (selvage) crystallized adjacent to molybdenite veins within the Venise breccia. Geochronological data obtained confirmed that the W mineralization at Santa Helena breccia is older than Mo-mineralization at Venise breccia. Also, the timing of hydrothermal circulation and the cooling history for the W-stage deposition was no longer than 7 Ma and 4 Ma for Mo-deposition.
Process models are an important means to capture information on organizational operations and often represent the starting point for process analysis and improvement. Since the manual elicitation and creation of process models is a time-intensive endeavor, a variety of techniques have been developed that automatically derive process models from textual process descriptions. However, these techniques, so far, only focus on the extraction of traditional, imperative process models. The extraction of declarative process models, which allow to effectively capture complex process behavior in a compact fashion, has not been addressed. In this paper we close this gap by presenting the first automated approach for the extraction of declarative process models from natural language. To achieve this, we developed tailored Natural Language Processing techniques that identify activities and their inter-relations from textual constraint descriptions. A quantitative evaluation shows that our approach is able to generate constraints that closely resemble those established by humans. Therefore, our approach provides automated support for an otherwise tedious and complex manual endeavor.
In the present study, the charge distribution and the charge transport across the thickness of 2- and 3-dimensional polymer nanodielectrics was investigated. Chemically surface-treated polypropylene (PP) films and low-density polyethylene nanocomposite films with 3 wt % of magnesium oxide (LDPE/MgO) served as examples of 2-D and 3-D nanodielectrics, respectively. Surface charges were deposited onto the non-metallized surfaces of the one-side metallized polymer films and found to broaden and to thus enter the bulk of the films upon thermal stimulation at suitable elevated temperatures. The resulting space-charge profiles in the thickness direction were probed by means of Piezoelectrically-generated Pressure Steps (PPSs). It was observed that the chemical surface treatment of PP which led to the formation of nano-structures or the use of bulk nanoparticles from LDPE/MgO nanocomposites enhance charge trapping on or in the respective polymer films and also reduce charge transport inside the respective samples.
In Memoriam Siegfried Bauer
(2019)
Siegfried Bauer, an internationally renowned, very creative applied physicist, who also was a prolific materials scientist and engineer, died on December 30, 2018, in Linz, Austria, after a one-year battle with cancer. He was full professor of soft-matter physics at the Johannes Kepler University Linz, Austria, and a scientific leader and innovator across the fields but mainly in the areas of electro-active materials (including electrets) and stretchable and imperceptible electronics.
Dielectric materials for electro-active (electret) and/or electro-passive (insulation) applications
(2019)
Dielectric materials for electret applications usually have to contain a quasi-permanent space charge or dipole polarization that is stable over large temperature ranges and time periods. For electrical-insulation applications, on the other hand, a quasi-permanent space charge or dipole polarization is usually considered detrimental. In recent years, however, with the advent of high-voltage direct-current (HVDC) transmission and high-voltage capacitors for energy storage, new possibilities are being explored in the area of high-voltage dielectrics. Stable charge trapping (as e.g. found in nano-dielectrics) or large dipole polarizations (as e.g. found in relaxor ferroelectrics and high-permittivity dielectrics) are no longer considered to be necessarily detrimental in electrical-insulation materials. On the other hand, recent developments in electro-electrets (dielectric elastomers), i.e. very soft dielectrics with large actuation strains and high breakdown fields, and in ferroelectrets, i.e. polymers with electrically charged cavities, have resulted in new electret materials that may also be useful for HVDC insulation systems. Furthermore, 2-dimensional (nano-particles on surfaces or interfaces) and 3-dimensional (nano-particles in the bulk) nano-dielectrics have been found to provide very good charge-trapping properties that may not only be used for more stable electrets and ferroelectrets, but also for better HVDC electrical-insulation materials with the possibility to optimize charge-transport and field-gradient behavior. In view of these and other recent developments, a first attempt will be made to review a small selection of electro-active (i.e. electret) and electro-passive (i.e. insulation) dielectrics in direct comparison. Such a comparative approach may lead to synergies in materials concepts and research methods that will benefit both areas. Furthermore, electrets may be very useful for sensing and monitoring applications in electrical-insulation systems, while high-voltage technology is essential for more efficient charging and poling of electret materials.
Nowadays, structural health monitoring of critical infrastructures is considered as of primal importance especially for managing transport infrastructure however most current SHM methodologies are based on point-sensors that show various limitations relating to their spatial positioning capabilities, cost of development and measurement range. This publication describes the progress in the SENSKIN EC co-funded research project that is developing a dielectric-elastomer sensor, formed from a large highly extensible capacitance sensing membrane and is supported by an advanced micro-electronic circuitry, for monitoring transport infrastructure bridges. The sensor under development provides spatial measurements of strain in excess of 10%, while the sensing system is being designed to be easy to install, require low power in operation concepts, require simple signal processing, and have the ability to self-monitor and report. An appropriate wireless sensor network is also being designed and developed supported by local gateways for the required data collection and exploitation. SENSKIN also develops a Decision-Support-System (DSS) for proactive condition-based structural interventions under normal operating conditions and reactive emergency intervention following an extreme event. The latter is supported by a life-cycle-costing (LCC) and life-cycle-assessment (LCA) module responsible for the total internal and external costs for the identified bridge rehabilitation, analysis of options, yielding figures for the assessment of the economic implications of the bridge rehabilitation work and the environmental impacts of the bridge rehabilitation options and of the associated secondary effects respectively. The overall monitoring system will be evaluated and benchmarked on actual bridges of Egnatia Highway (Greece) and Bosporus Bridge (Turkey).
Already for decades it has been known that the winds of massive stars are inhomogeneous (i.e. clumped). To properly model observed spectra of massive star winds it is necessary to incorporate the 3-D nature of clumping into radiative transfer calculations. In this paper we present our full 3-D Monte Carlo radiative transfer code for inhomogeneous expanding stellar winds. We use a set of parameters to describe dense as well as the rarefied wind components. At the same time, we account for non-monotonic velocity fields. We show how the 3-D density and velocity wind inhomogeneities strongly affect the resonance line formation. We also show how wind clumping can solve the discrepancy between P v and H alpha mass-loss rate diagnostics.
Industry 4.0 and the Internet of Things are recent developments that have lead to the creation of new kinds of manufacturing data. Linking this new kind of sensor data to traditional business information is crucial for enterprises to take advantage of the data’s full potential. In this paper, we present a demo which allows experiencing this data integration, both vertically between technical and business contexts and horizontally along the value chain. The tool simulates a manufacturing company, continuously producing both business and sensor data, and supports issuing ad-hoc queries that answer specific questions related to the business. In order to adapt to different environments, users can configure sensor characteristics to their needs.
In cloud computing, users are able to use their own operating system (OS) image to run a virtual machine (VM) on a remote host. The virtual machine OS is started by the user using some interfaces provided by a cloud provider in public or private cloud. In peer to peer cloud, the VM is started by the host admin. After the VM is running, the user could get a remote access to the VM to install, configure, and run services. For the security reasons, the user needs to verify the integrity of the running VM, because a malicious host admin could modify the image or even replace the image with a similar image, to be able to get sensitive data from the VM. We propose an approach to verify the integrity of a running VM on a remote host, without using any specific hardware such as Trusted Platform Module (TPM). Our approach is implemented on a Linux platform where the kernel files (vmlinuz and initrd) could be replaced with new files, while the VM is running. kexec is used to reboot the VM with the new kernel files. The new kernel has secret codes that will be used to verify whether the VM was started using the new kernel files. The new kernel is used to further measuring the integrity of the running VM.
High-dimensional data is particularly useful for data analytics research. In the healthcare domain, for instance, high-dimensional data analytics has been used successfully for drug discovery. Yet, in order to adhere to privacy legislation, data analytics service providers must guarantee anonymity for data owners. In the context of high-dimensional data, ensuring privacy is challenging because increased data dimensionality must be matched by an exponential growth in the size of the data to avoid sparse datasets. Syntactically, anonymising sparse datasets with methods that rely of statistical significance, makes obtaining sound and reliable results, a challenge. As such, strong privacy is only achievable at the cost of high information loss, rendering the data unusable for data analytics. In this paper, we make two contributions to addressing this problem from both the privacy and information loss perspectives. First, we show that by identifying dependencies between attribute subsets we can eliminate privacy violating attributes from the anonymised dataset. Second, to minimise information loss, we employ a greedy search algorithm to determine and eliminate maximal partial unique attribute combinations. Thus, one only needs to find the minimal set of identifying attributes to prevent re-identification. Experiments on a health cloud based on the SAP HANA platform using a semi-synthetic medical history dataset comprised of 109 attributes, demonstrate the effectiveness of our approach.
Devices on the Internet of Things (IoT) are usually battery-powered and have limited resources. Hence, energy-efficient and lightweight protocols were designed for IoT devices, such as the popular Constrained Application Protocol (CoAP). Yet, CoAP itself does not include any defenses against denial-of-sleep attacks, which are attacks that aim at depriving victim devices of entering low-power sleep modes. For example, a denial-of-sleep attack against an IoT device that runs a CoAP server is to send plenty of CoAP messages to it, thereby forcing the IoT device to expend energy for receiving and processing these CoAP messages. All current security solutions for CoAP, namely Datagram Transport Layer Security (DTLS), IPsec, and OSCORE, fail to prevent such attacks. To fill this gap, Seitz et al. proposed a method for filtering out inauthentic and replayed CoAP messages "en-route" on 6LoWPAN border routers. In this paper, we expand on Seitz et al.'s proposal in two ways. First, we revise Seitz et al.'s software architecture so that 6LoWPAN border routers can not only check the authenticity and freshness of CoAP messages, but can also perform a wide range of further checks. Second, we propose a couple of such further checks, which, as compared to Seitz et al.'s original checks, more reliably protect IoT devices that run CoAP servers from remote denial-of-sleep attacks, as well as from remote exploits. We prototyped our solution and successfully tested its compatibility with Contiki-NG's CoAP implementation.
LoANs
(2019)
Recently, deep neural networks have achieved remarkable performance on the task of object detection and recognition. The reason for this success is mainly grounded in the availability of large scale, fully annotated datasets, but the creation of such a dataset is a complicated and costly task. In this paper, we propose a novel method for weakly supervised object detection that simplifies the process of gathering data for training an object detector. We train an ensemble of two models that work together in a student-teacher fashion. Our student (localizer) is a model that learns to localize an object, the teacher (assessor) assesses the quality of the localization and provides feedback to the student. The student uses this feedback to learn how to localize objects and is thus entirely supervised by the teacher, as we are using no labels for training the localizer. In our experiments, we show that our model is very robust to noise and reaches competitive performance compared to a state-of-the-art fully supervised approach. We also show the simplicity of creating a new dataset, based on a few videos (e.g. downloaded from YouTube) and artificially generated data.
Cloud Storage Broker (CSB) provides value-added cloud storage service for enterprise usage by leveraging multi-cloud storage architecture. However, it raises several challenges for managing resources and its access control in multiple Cloud Service Providers (CSPs) for authorized CSB stakeholders. In this paper we propose unified cloud access control model that provides the abstraction of CSP's services for centralized and automated cloud resource and access control management in multiple CSPs. Our proposal offers role-based access control for CSB stakeholders to access cloud resources by assigning necessary privileges and access control list for cloud resources and CSB stakeholders, respectively, following privilege separation concept and least privilege principle. We implement our unified model in a CSB system called CloudRAID for Business (CfB) with the evaluation result shows it provides system-and-cloud level security service for cfB and centralized resource and access control management in multiple CSPs.
While the IEEE 802.15.4 radio standard has many features that meet the requirements of Internet of things applications, IEEE 802.15.4 leaves the whole issue of key management unstandardized. To address this gap, Krentz et al. proposed the Adaptive Key Establishment Scheme (AKES), which establishes session keys for use in IEEE 802.15.4 security. Yet, AKES does not cover all aspects of key management. In particular, AKES comprises no means for key revocation and rekeying. Moreover, existing protocols for key revocation and rekeying seem limited in various ways. In this paper, we hence propose a key revocation and rekeying protocol, which is designed to overcome various limitations of current protocols for key revocation and rekeying. For example, our protocol seems unique in that it routes around IEEE 802.15.4 nodes whose keys are being revoked. We successfully implemented and evaluated our protocol using the Contiki-NG operating system and aiocoap.
Detect me if you can
(2019)
Spam Bots have become a threat to online social networks with their malicious behavior, posting misinformation messages and influencing online platforms to fulfill their motives. As spam bots have become more advanced over time, creating algorithms to identify bots remains an open challenge. Learning low-dimensional embeddings for nodes in graph structured data has proven to be useful in various domains. In this paper, we propose a model based on graph convolutional neural networks (GCNN) for spam bot detection. Our hypothesis is that to better detect spam bots, in addition to defining a features set, the social graph must also be taken into consideration. GCNNs are able to leverage both the features of a node and aggregate the features of a node’s neighborhood. We compare our approach, with two methods that work solely on a features set and on the structure of the graph. To our knowledge, this work is the first attempt of using graph convolutional neural networks in spam bot detection.
The ability to work in teams is an important skill in today's work environments. In MOOCs, however, team work, team tasks, and graded team-based assignments play only a marginal role. To close this gap, we have been exploring ways to integrate graded team-based assignments in MOOCs. Some goals of our work are to determine simple criteria to match teams in a volatile environment and to enable a frictionless online collaboration for the participants within our MOOC platform. The high dropout rates in MOOCs pose particular challenges for team work in this context. By now, we have conducted 15 MOOCs containing graded team-based assignments in a variety of topics. The paper at hand presents a study that aims to establish a solid understanding of the participants in the team tasks. Furthermore, we attempt to determine which team compositions are particularly successful. Finally, we examine how several modifications to our platform's collaborative toolset have affected the dropout rates and performance of the teams.
The "Bachelor Project"
(2019)
One of the challenges of educating the next generation of computer scientists is to teach them to become team players, that are able to communicate and interact not only with different IT systems, but also with coworkers and customers with a non-it background. The “bachelor project” is a project based on team work and a close collaboration with selected industry partners. The authors hosted some of the teams since spring term 2014/15. In the paper at hand we explain and discuss this concept and evaluate its success based on students' evaluation and reports. Furthermore, the technology-stack that has been used by the teams is evaluated to understand how self-organized students in IT-related projects work. We will show that and why the bachelor is the most successful educational format in the perception of the students and how this positive results can be improved by the mentors.
MOOCs in Secondary Education
(2019)
Computer science education in German schools is often less than optimal. It is only mandatory in a few of the federal states and there is a lack of qualified teachers. As a MOOC (Massive Open Online Course) provider with a German background, we developed the idea to implement a MOOC addressing pupils in secondary schools to fill this gap. The course targeted high school pupils and enabled them to learn the Python programming language. In 2014, we successfully conducted the first iteration of this MOOC with more than 7000 participants. However, the share of pupils in the course was not quite satisfactory. So we conducted several workshops with teachers to find out why they had not used the course to the extent that we had imagined. The paper at hand explores and discusses the steps we have taken in the following years as a result of these workshops.
General intelligence has a substantial genetic background in children, adolescents, and adults, but environmental factors also strongly correlate with cognitive performance as evidenced by a strong (up to one SD) increase in average intelligence test results in the second half of the previous century. This change occurred in a period apparently too short to accommodate radical genetic changes. It is highly suggestive that environmental factors interact with genotype by possible modification of epigenetic factors that regulate gene expression and thus contribute to individual malleability. This modification might as well be reflected in recent observations of an association between dopamine-dependent encoding of reward prediction errors and cognitive capacity, which was modulated by adverse life events.
The emergence of cloud computing allows users to easily host their Virtual Machines with no up-front investment and the guarantee of always available anytime anywhere. But with the Virtual Machine (VM) is hosted outside of user's premise, the user loses the physical control of the VM as it could be running on untrusted host machines in the cloud. Malicious host administrator could launch live memory dumping, Spectre, or Meltdown attacks in order to extract sensitive information from the VM's memory, e.g. passwords or cryptographic keys of applications running in the VM. In this paper, inspired by the moving target defense (MTD) scheme, we propose a novel approach to increase the security of application's sensitive data in the VM by continuously moving the sensitive data among several memory allocations (blocks) in Random Access Memory (RAM). A movement function is added into the application source code in order for the function to be running concurrently with the application's main function. Our approach could reduce the possibility of VM's sensitive data in the memory to be leaked into memory dump file by 2 5% and secure the sensitive data from Spectre and Meltdown attacks. Our approach's overhead depends on the number and the size of the sensitive data.
This is a correction notice for ‘Post-adiabatic supernova remnants in an interstellar magnetic field: oblique shocks and non-uniform environment’ (DOI: https://doi.org/10.1093/mnras/sty1750), which was published in MNRAS 479, 4253–4270 (2018). The publisher regrets to inform that the colour was missing from the colour scales in Figs 8(a)–(d) and Figs 9(a) and (b). This has now been corrected online. The publisher apologizes for this error.
History without borders
(2020)
Planstadt Doberlug
(2020)
Eccentric exercises (ECC) induce reversible muscle damage, delayed-onset muscle soreness and an inflammatory reaction that is often followed by a systemic anti-inflammatory response. Thus, ECC might be beneficial for treatment of metabolic disorders which are frequently accompanied by a low-grade systemic inflammation. However, extent and time course of a systemic immune response after repeated ECC bouts are poorly characterized.
PURPOSE: To analyze the (anti-)inflammatory response after repeated ECC loading of the trunk.
METHODS: Ten healthy participants (33 ± 6 y; 173 ± 14 cm; 74 ± 16 kg) performed three isokinetic strength measurements of the trunk (concentric (CON), ECC1, ECC2, each 2 wks apart; flexion/extension, velocity 60°/s, 120s MVC). Pre- and 4, 24, 48, 72, 168h post-exercise, muscle soreness (numeric rating scale, NRS) was assessed and blood samples were taken and analyzed [Creatine kinase (CK), C-reactive protein (CRP), Interleukin-6 (IL-6), IL-10, Tumor necrosis factor-α (TNF-α)]. Statistics were done by Friedman‘s test with Dunn‘s post hoc test (α=.05).
RESULTS: Mean peak torque was higher during ECC1 (319 ± 142 Nm) than during CON (268 ± 108 Nm; p<.05) and not different between ECC1 and ECC2 (297 ± 126 Nm; p>.05). Markers of muscle damage (peaks post-ECC1: NRS 48h, 4.4±2.9; CK 72h, 14407 ± 19991 U/l) were higher after ECC1 than after CON and ECC2 (p<.05). The responses over 72h (stated as Area under the Curve, AUC) were abolished after ECC2 compared to ECC1 (p<.05) indicating the presence of the repeated bout effect. CRP levels were not changed. IL-6 levels increased 2-fold post-ECC1 (pre: 0.5 ± 0.4 vs. 72h: 1.0 ± 0.8 pg/ml). The IL-6 response was enhanced after ECC1 (AUC 61 ± 37 pg/ml*72h) compared to CON (AUC 33 ± 31 pg/ml*72h; p<.05). After ECC2, the IL-6 response (AUC 43 ± 25 pg/ml*72h) remained lower than post-ECC1, but the difference was not statistically significant. Serum levels of TNF-α and of the anti-inflammatory cytokine IL-10 were below detection limits. Overall, markers of muscle damage and immune response showed high inter-individual variability.
CONCLUSION: Despite maximal ECC loading of a large muscle group, no anti-inflammatory and just weak inflammatory responses were detected in healthy adults. Whether ECC elicits a different reaction in inflammatory clinical conditions is unclear.
Eccentric (ECC) exercises might cause muscle damage, characterized by delayed-onset muscle soreness, elevated creatine kinase (CK) levels and local muscle oedema, shown by elevated T2 times in magnet resonance imaging (MRI) scans. Previous research suggests a high inter-individual difference regarding these systemic and local responses to eccentric workload. PURPOSE: To analyze ECC exercise-induced muscle damage in lumbar paraspinal muscles assessed via MRI. METHODS: Ten participants (3f/7m; 33±6y; 174±8cm; 71±12kg) were included in the study. Quantitative paraspinal muscle constitution of M. erector spinae and M. multifidius were assessed in supine position before and 72h after an intense eccentric trunk exercise bout in a mobile 1.5 tesla MRI device. MRI scans were recorded on spinal level L3 (T2-weighted TSE echo sequences, 11 slices, 2mm slice thickness, 3mm gap, echo times: 20, 40, 60, 80, 100ms, TR time: 2500ms). Muscle T2 times were calculated for manually traced regions of interest of the respective muscles with an imaging software. The exercise protocol was performed in an isokinetic device and consisted of 120sec alternating ECC trunk flexion-extension with maximal effort. Venous blood samples were taken before and 72h after the ECC exercise. Descriptive statistics (mean±SD) and t-testing for pre-post ECC exercises were performed. RESULTS: T2 times increased from pre- to post-ECC MRI measurements from 55±3ms to 79±28ms in M. erector spinae and from 62±5ms to 78±24ms in M. multifidius (p<0.001). CK increased from 126±97 U/L to 1447±20579 U/L. High SDs of T2 time and CK in post-ECC measures could be due to inter-individual reactions to ECC exercises. 3 participants showed high local and systemic reactions (HR) with T2 time increases of 120±24% (M. erector spinae) and 73±50% (M. multifidius). In comparison, the remaining 7 participants showed increases of 11±12% (M. erector spinae) and 7±9% (M. multifidius) in T2 time. Mean CK increased 9.5-fold in the 3 HR subjects compared with the remaining 7 subjects. CONCLUSIONS: The 120sec maximal ECC trunk flexion-extension protocol induced high amounts of muscle damage in 3 participants. Moderate to low responses were found in the remaining 7 subjects, assuming that inter-individual predictors play a role regarding physiological responses to ECC workload.
PURPOSE: To determine the feasibility of upright compared to supine MRI measurements to determine characteristics of the lumbar spine in AA with spondylolisthesis.
METHODS: Ten AA (n=10; m/f: 4/6; 14.5±1.7y; 163±7cm; 52±8kg) from various sports, diagnosed with spondylolisthesis grade I-II Meyerding confirmed by x-ray in standing lateral view, were included. Open low-field MRI images (0.25 Tesla) in upright (82°) and supine (0°) position were evaluated by two observers. Medical imaging software was used to measure the anterior translation (AT, mm), lumbosacral joint angle (LSJA, °) and lordosis angle (LA, °). Reliability was analyzed by the intra-rater correlation coefficient (ICC) and standard error of measurements (SEM).
RESULTS: Due to motion artifacts during upright position, measures of three participants had to be excluded. Between observers, AT ranged from 4.2±2.7mm to 5.5±1.9mm (ICC=0.94, SEM=0.6mm) in upright and from 4.9±2.4mm to 5.9±3.0mm (ICC=0.89, SEM=0.9mm) in supine position. LSJA varied from 5.1±2.2° to 7.3±1.5° (ICC=0.54, SEM=1.5°) in upright and from 9.8±2.5° to 10±2.4° (ICC=0.73, SEM=1.1°) in supine position. LA differed from 58.8±14.6° to 61.9±6° (ICC=0.94, SEM=1.19°) in upright and from 51.9±11.7° to 52.6±11.1° (ICC=0.98, SEM=1.59°) in supine position.
CONCLUSIONS: Determination of AT and LA showed good to excellent reliability in both, upright and supine position. In contrast, reliability of LSJA had only moderate to good correlation
between observers and should therefore be interpreted with caution. However, motion artifacts should be taken into consideration during upright imaging procedures.
Climate change entails an intensification of extreme weather events that can potentially trigger socioeconomic and energy system disruptions. As we approach 1 degrees C of global warming we should start learning from historical extremes and explicitly incorporate such events in integrated climate-economy and energy systems models.
Der Potsdam Grievance Statistics File (PGSF) ist eine historische Datensammlung von Beschwerden, sog. Eingaben, die in der DDR von deren Bürgern eingereicht wurden. Die Eingaben wurden schriftlich oder mündlich gestellt und waren an staatliche Institutionen gerichtet. Der Staat zählte diese Eingaben und kategorisierte sie in Eingabenstatistiken.
Der PGSF enthält Eingabenstatistiken des Zeitraums 1970–1989 einer Wahrscheinlichkeitsstichprobe von im Jahr 1990 existierenden Kreisen. Zusätzlich finden sich Eingabenstatistiken eines Convenience-Samples von Kreisen aus dem Zeitraum 1970–1989.
Der Potsdam Grievance Statistics File (PGSF) ist eine historische Datensammlung von Beschwerden, sog. Eingaben, die in der DDR von deren Bürgern eingereicht wurden. Die Eingaben wurden schriftlich oder mündlich gestellt und waren an staatliche Institutionen gerichtet. Der Staat zählte diese Eingaben und kategorisierte sie in Eingabenstatistiken.
Der PGSF enthält Eingabenstatistiken des Zeitraums 1970–1989 einer Wahrscheinlichkeitsstichprobe von im Jahr 1990 existierenden Kreisen. Zusätzlich finden sich Eingabenstatistiken eines Convenience-Samples von Kreisen aus dem Zeitraum 1970–1989.
Leben in der ehemaligen DDR
(2020)
Xenikoudakis et al. report a partial mitochondrial genome of the extinct giant beaver Castoroides and estimate the origin of aquatic behavior in beavers to approximately 20 million years. This time estimate coincides with the extinction of terrestrial beavers and raises the question whether the two events had a common cause.
Reinhard Hujer
(2020)
Chronic ankle instability (CAI) is not only an ankle issue, but also affects sensorimotor system. People with CAI show altered muscle activation in proximal joints such as hip and knee. However, evidence is limited as controversial results have been presented regarding changes in activation of hip muscles in CAI population. PURPOSE: To investigate the effect of CAI on activity of hip muscles during normal walking and walking with perturbations. METHODS: 8 subjects with CAI (23 ± 2 years, 171 ± 7 cm and 65 ± 4 kg) and 8 controls (CON) matched by age, height, weight and dominant leg (25 ± 3 years, 172 ± 7 cm and 65 ± 6 kg) walked shoed on a split-belt treadmill (1 m/s). Subjects performed 5 minutes of baseline walking and 6 minutes walking with 10 perturbations (at 200 ms after heel contact with 42 m/s2 deceleration impulse) on each side. Electromyography signals from gluteus medius (Gmed) and gluteus maximus (Gmax) were recorded while walking. Muscle amplitudes (Root Mean Square normalized to maximum voluntary isometric contraction) were calculated at 200 ms before heel contact (Pre200), 100 ms after heel contact (Post100) during normal walking and 200 ms after perturbations (Pert200). Differences between groups were examined using Mann Whitney U test and Bonferroni correction to account for multiple testing (adjust α level p≤ 0.0125). RESULT: In Gmed, CAI group showed lower muscle amplitude than CON group after heel contact (Post100: 18±7 % and 47±21 %, p< .01) and after walking perturbations ( 31±13 % and 62±26 %, p< .01), but not before heel contact (Pre200: 5±2 % and 11±10 %, p= 0.195). In Gmax, no difference was found between CAI and CON groups in all three time points (Pre200: 12±5 % and 17±12 %, p= 0.574; Post100: 41±21 % and 41±13 %, p= 1.00; Pert200: 79±46 % and 62±35 %, p= 0.505). CONCLUSION: People with CAI activated Gmed less than healthy control in feedback mechanism (after heel contact and walking with perturbations), but not in feedforward mechanism (before heel contact). Less activation on Gmed may affect the balance in frontal plane and increase the risk of recurrent ankle sprain, giving way or feeling ankle instability in patients with CAI during walking. Future studies should investigate the effect of Gmed strengthening or neuromuscular training on CAI rehabilitation.
Acute ankle sprain leads in 40% of all cases to chronic ankle instability (CAI). CAI is related to a variety of motor adaptations at the lower extremities. Previous investigations identified increased muscle activities while landing in CAI compared to healthy control participants. However, it remains unclear whether muscular alterations at the knee muscles are limited to the involved (unstable) ankle or are also present at the uninvolved leg. The latter might potentially indicate a risk of ankle sprain or future injury on the uninvolved leg. Purpose: To assess if there is a difference of knee muscle activities between the involved and uninvolved leg in participants with CAI during perturbed walking. Method: 10 participants (6 females; 4 males; 26±4 years; 169±9 cm; 65±7 kg) with unilateral CAI walked on a split-belt treadmill (1m/s) for 5 minutes of baseline walking and 6 minutes of perturbed walking (left and right side, each 10 perturbations). Electromyography (EMG) measurements were performed at biceps femoris (BF) and rectus femoris (RF). EMG amplitude (RMS; normalized to MVIC) were analyzed for 200ms pre-heel contact (Pre200), 100ms post heel contact (Post100) and 200ms after perturbation (Pert200). Data was analyzed by paired t-test/Wilcoxon test based on presence or absence of normal distribution (Bonferroni adjusted α level p≤ 0.0125). Results: No statistical difference was found between involved and uninvolved leg for RF (Pre200: 4±2% and 11± 22%, respectively, p= 0.878; Post100: 10± 5 and 18±31%, p=0.959; Pert200: 6±3% and 13±24%, p=0.721) as well as for BF (Pre200: 12±7% and 11±6, p=0.576; Post100: 10±7% and 9±7%, p=0.732; Pert200: 7±4 and 7±7%, p=0.386). Discussion: No side differences in muscle activity could be revealed for assessed feedforward and feedback responses (perturbed and unperturbed) in unilateral CAI. Reduced inter-individual variability of muscular activities at the involved leg might indicate a rather stereotypical response pattern. It remains to be investigated, whether muscular control at the knee is not affected by CAI, or whether both sides adapted in a similar style to the chronic condition at the ankle.
Several overlapping crises which affected the EU during the past ten years have recently aggravated. Especially the progressing refugee crisis, the persisting financial crisis and geopolitical turmoil in the EU's neighbourhood contributed to the rise of anti-EU movements and diverse articulations of Euroscepticism. Although public opinion and mainstream political analysis have easily identified right-wing populism as one of the most important drivers, it is still doubtful if it can be equated with Euroscepticism without further ado. To date it is by no means clear how and where Euroscepticism exactly originates.
Editorial
(2020)
Background:
Inflammatory bowel disease (IBD) represents a dysregulation of the mucosal immune system. The pathogenesis of Crohn’s disease (CD) and ulcerative colitis (UC) is linked to the loss of intestinal tolerance and barrier function. The healthy mucosal immune system has previously been shown to be inert against food antigens. Since the small intestine is the main contact surface for antigens and therefore the immunological response, the present study served to analyse food-antigen-specific T cells in the peripheral blood of IBD patients.
Methods:
Peripheral blood mononuclear cells of CD, with an affected small intestine, and UC (colitis) patients, either active or in remission, were stimulated with the following food antigens: gluten, soybean, peanut and ovalbumin. Healthy controls and celiac disease patients were included as controls. Antigen-activated CD4+ T cells in the peripheral blood were analysed by a magnetic enrichment of CD154+ effector T cells and a cytometric antigen-reactive T-cell analysis (‘ARTE’ technology) followed by characterisation of the ef- fector response.
Results:
The effector T-cell response of antigen-specific T cells were compared between CD with small intestinal inflammation and UC where inflammation was restricted to the colon. Among all tested food antigens, the highest frequency of antigen-specific T cells (CD4+CD154+) was found for gluten. Celiac disease patients were included as control, since gluten has been identified as the disease- causing antigen. The highest frequency of gluten antigen-specific T cells was revealed in active CD when compared with UC, celiac disease on a gluten-free diet (GFD) and healthy controls. Ovalbuminspecific T cells were almost undetectable, whereas the reaction to soybean and peanut was slightly higher. But again, the strong- est reaction was observed in CD with small intestinal involvement compared with UC. Remarkably, in celiac disease on a GFD only
antigen-specific cells for gluten were detected. These gluten-specific T cells were characterised by up-regulation of the pro-inflammatory cytokines IFN-γ, IL-17A and TNF-α. IFN-g was exclusively elevated in CD patients with active disease. Gluten-specific T-cells expressing IL-17A were increased in all IBD patients. Furthermore, T cells of CD patients, independent of disease activity, revealed a high expression of the pro-inflammatory cytokine TNF-α.
Conclusion:
The ‘ARTE’-technique allows to analyse and quantify food antigen specific T cells in the peripheral blood of IBD patients indicating a potential therapeutic insight. These data provide evidence that small intestinal inflammation in CD is key for the development of a systemic pro-inflammatory effector T-cell response driven by food antigens.
Gomperz, Ephraim, Itzig
(2020)
Corona-Lage
(2020)
Background and Aims: Ostarek et al. (2019) claimed a conclusive
demonstration that language comprehension relies profoundly on
visual simulations. They presented participants with visual noise during sentence-picture verification (SPV) and measured lateralized button response speed. The authors selectively eliminated the classical congruency effect (faster yes decisions when pictures match the objects implied by the sentences) with ‘‘high level’’ noise made from images of other objects. However, that visual noise included tool pictures, known to activate lateralized motor affordances. Moreover, some of their sentences described motor actions. This raises the question whether motor simulation may have contaminated their results.
Methods: Replicating Ostarek et al. (2019), 33 right-handed
participants performed SPV but either without visual noise or while viewing (a) only left-handled or (b) only right-handled or (c) alternatingly left- and right-handled tools. Accuracy and reaction times of manual yes responses were analyzed. Additionally, hand-relatedness of sentences was rated.
Results: Replicating Ostarek et al. (2019), the classical SPV congruency effect appeared without noise and vanished when alternatingly handled tools were presented. Crucially, it reappeared when noise objects were consistently either left- or righthandled. Higher hand-relatedness of sentence content reduced SPV performance and accuracy was lower with right-handled noise.
Conclusion: First, we demonstrated an interaction between motor-
related language, visual affordances and motor responses in SPV.
This result supports the embodied view of language processing.
Second, we identified a motor process not previously known in SPV. This extends our understanding of mental simulation and calls for methodological controls in future studies.
Playful Classics
(2021)
Teen dating violence
(2021)
Editorial
(2021)
Berufsbildung für nachhaltige Entwicklung (BBNE) ist (nicht nur) für die Berufs- und Wirtschaftspädagogik ein komplexes, anregendes Forschungsfeld. Zugleich stellt sie für die Lehrer:innenbildung eine herausfordernde Orientierungsaufgabe dar. Dabei kann eine Transdisziplinarität als Basis gemeinsamer Forschungs- und Erkenntnisprozesse der Berufs- und Wirtschaftspädagogik und der Praxis als unumgängliche Voraussetzung zur Annäherung an eine BBNE angesehen werden. Ein Weg, der zukünftigen Berufsschullehrkräften einen praxisorientierten Zugang zur BBNE eröffnen kann, wird in dieser Ausgabe der bwp-Schriften aus unterschiedlichen Perspektiven beschrieben.
Immune to COVID?
(2021)
Künstliche Intelligenz (KI) gewinnt in zahlreichen Branchen rasant an Bedeutung und wird zunehmend auch in Enterprise Resource Planning (ERP)-Systemen als Anwendungsbereich erschlossen. Die Idee, dass Maschinen die kognitiven Fähigkeiten des Menschen imitieren können, indem Wissen durch Lernen auf Basis von Beispielen in Daten, Informationen und Erfahrungen generiert wird, ist heute ein Schlüsselelement der digitalen Transformation. Jedoch charakterisiert der Einsatz von KI in ERP-System einen hohen Komplexitätsgrad, da die KI als Querschnittstechnologie zu verstehen ist, welche in unterschiedlichen Unternehmensbereichen zum Einsatz kommen kann. Auch die Anwendungsgrade können sich dabei erheblich voneinander unterscheiden. Um trotz dieser Komplexität den Einsatz der KI in ERP-Systemen erfassen und systembezogen vergleichen zu können, wurde im Rahmen dieser Studie ein Reifegradmodell entwickelt. Dieses bildet die Ausgangsbasis zur Ermittlung der KI-Reife in ERP-Systemen und grenzt dabei die folgenden vier KI- bzw. systembezogenen Ebenen voneinander ab: 1) Technische Möglichkeiten, 2) Datenreife, 3) Funktionsreife und 4) Erklärfähigkeit des Systems.
So richtig schlüssig finden die Medienrechtler Marcus Schladebach und Hans-Christian Gräfe den Vorschlag der EU-Kommission für den Europäischen Media Freedom Act nicht. Unter einer überpathetischen Überschrift regelt er fiktive Fragen, die eigentlich keiner Regelung bedürfen. Zudem ohne Kompetenz auf dem Gebiet der Medienpolitik.
The sky is not the limit
(2022)
Most flowering plants are hermaphrodites, with flowers having both male and female reproductive organs. One widespread adaptation to limit self-fertilization is self-incompatibility (SI), where self-pollen fails to fertilize ovules.(1,2) In homomorphic SI, many morphologically indistinguishable mating types are found, although in heteromorphic SI, the two or three mating types are associated with different floral morphologies.(3-6) In heterostylous Primula, a hemizygous supergene determines a short-styled S-morph and a long-styled L-morph, corresponding to two different mating types, and full seed set only results from inter morph crosses.(7-9) Style length is controlled by the brassinosteroid (BR)-inactivating cytochrome P450 CYP734A50,(10) yet it remains unclear what defines the male and female incompatibility types. Here, we show that CYP734A50 also determines the female incompatibility type. Inactivating CYP734A50 converts short S-morph styles into long styles with the same incompatibility behavior as L-morph styles, and this effect can be mimicked by exogenous BR treatment. In vitro responses of S-and L-morph pollen grains and pollen tubes to increasing BR levels could only partly explain their different in vivo behavior, suggesting both direct and indirect effects of the different BR levels in S-versus L-morph stigmas and styles in controlling pollen performance. This BR-mediated SI provides a novel mechanism for preventing self-fertilization. The joint control of morphology and SI by CYP734A50 has important implications for the evolutionary buildup of the heterostylous syndrome and provides a straightforward explanation for why essentially all of the derived self-compatible homostylous Primula species are long homostyles.(11)
À partir des travaux des ethnologues qui ont décrit le fonctionnement des sociétés paysannes de l’Ancien Régime, nous montrons dans cet article comment le récit de l’enfance bretonne de Chateaubriand dans les ‚Mémoires d’outre-tombe‘ obéit à une logique initiatique qui donne à l’animal un rôle de premier plan. Transformée en véritable „aventure“, la capture des oiseaux devient pour l’enfant l’occasion de forger son caractère et de découvrir le sens de l’honneur, tandis que la contemplation de leur envol éveille en lui le goût des voyages qu’il n’a pas encore la possibilité d’assouvir. À Combourg, chouettes et chat noir peuplent les nuits de l’enfant et l’obligent à dompter ses peurs. Quant au cheval, que Chateaubriand a mal appris à maîtriser, il devient sous sa plume l’emblème d’une époque révolue dominée par les privilèges de l’aristocratie et le signe de l’inadaptation des derniers rois de France. Il restera à l’écrivain à s’emparer de cette familiarité avec le monde animal pour nourrir son imaginaire et sa sensibilité de plus en plus grande au sort que lui réserve la société.
Steigende Mieten?
(2022)
Vor dem Hintergrund rasant steigender Mieten in deutschen Großstädten untersuchen wir in einer neuen Studie die Auswirkungen von Gentrifizierung sowie von politischen Gegenmaßnahmen auf unterschiedliche Einkommensgruppen anhand eines quantitativen Modells für Berlin. Wir finden, dass eine Mietpreisbindung (wie der „Mietendeckel“) allen Haushalten, vor allem aber den ärmeren Haushalten, schadet. Andere Maßnahmen wie Neubau oder direkte Subventionen schneiden besser ab.