620 Ingenieurwissenschaften und zugeordnete Tätigkeiten
Filtern
Volltext vorhanden
- ja (52)
Erscheinungsjahr
Dokumenttyp
- Postprint (52) (entfernen)
Sprache
- Englisch (52)
Gehört zur Bibliographie
- ja (52)
Schlagworte
- cyber victimization (3)
- molecularly imprinted polymers (3)
- LIBS (2)
- bullying (2)
- change detection (2)
- cyber aggression (2)
- deep reinforcement learning (2)
- direct electron transfer (2)
- hyperspectral (2)
- imaging spectroscopy (2)
Institut
- Institut für Geowissenschaften (10)
- Mathematisch-Naturwissenschaftliche Fakultät (10)
- Institut für Chemie (8)
- Hasso-Plattner-Institut für Digital Engineering GmbH (5)
- Strukturbereich Bildungswissenschaften (5)
- Fachgruppe Betriebswirtschaftslehre (3)
- Strukturbereich Kognitionswissenschaften (3)
- Institut für Biochemie und Biologie (2)
- Institut für Physik und Astronomie (2)
- Institut für Umweltwissenschaften und Geographie (2)
Privacy regulations and the physical distribution of heterogeneous data are often primary concerns for the development of deep learning models in a medical context. This paper evaluates the feasibility of differentially private federated learning for chest X-ray classification as a defense against data privacy attacks. To the best of our knowledge, we are the first to directly compare the impact of differentially private training on two different neural network architectures, DenseNet121 and ResNet50. Extending the federated learning environments previously analyzed in terms of privacy, we simulated a heterogeneous and imbalanced federated setting by distributing images from the public CheXpert and Mendeley chest X-ray datasets unevenly among 36 clients. Both non-private baseline models achieved an area under the receiver operating characteristic curve (AUC) of 0.940.94 on the binary classification task of detecting the presence of a medical finding. We demonstrate that both model architectures are vulnerable to privacy violation by applying image reconstruction attacks to local model updates from individual clients. The attack was particularly successful during later training stages. To mitigate the risk of a privacy breach, we integrated Rényi differential privacy with a Gaussian noise mechanism into local model training. We evaluate model performance and attack vulnerability for privacy budgets ε∈{1,3,6,10}�∈{1,3,6,10}. The DenseNet121 achieved the best utility-privacy trade-off with an AUC of 0.940.94 for ε=6�=6. Model performance deteriorated slightly for individual clients compared to the non-private baseline. The ResNet50 only reached an AUC of 0.760.76 in the same privacy setting. Its performance was inferior to that of the DenseNet121 for all considered privacy constraints, suggesting that the DenseNet121 architecture is more robust to differentially private training.
How We Found Our IMU
(2020)
Inertial measurement units (IMUs) are commonly used for localization or movement tracking in pervasive healthcare-related studies, and gait analysis is one of the most often studied topics using IMUs. The increasing variety of commercially available IMU devices offers convenience by combining the sensor modalities and simplifies the data collection procedures. However, selecting the most suitable IMU device for a certain use case is increasingly challenging. In this study, guidelines for IMU selection are proposed. In particular, seven IMUs were compared in terms of their specifications, data collection procedures, and raw data quality. Data collected from the IMUs were then analyzed by a gait analysis algorithm. The difference in accuracy of the calculated gait parameters between the IMUs could be used to retrace the issues in raw data, such as acceleration range or sensor calibration. Based on our algorithm, we were able to identify the best-suited IMUs for our needs. This study provides an overview of how to select the IMUs based on the area of study with concrete examples, and gives insights into the features of seven commercial IMUs using real data.
Electrochemical methods offer the simple characterization of the synthesis of molecularly imprinted polymers (MIPs) and the readouts of target binding. The binding of electroinactive analytes can be detected indirectly by their modulating effect on the diffusional permeability of a redox marker through thin MIP films. However, this process generates an overall signal, which may include nonspecific interactions with the nonimprinted surface and adsorption at the electrode surface in addition to (specific) binding to the cavities. Redox-active low-molecular-weight targets and metalloproteins enable a more specific direct quantification of their binding to MIPs by measuring the faradaic current. The in situ characterization of enzymes, MIP-based mimics of redox enzymes or enzyme-labeled targets, is based on the indication of an electroactive product. This approach allows the determination of both the activity of the bio(mimetic) catalyst and of the substrate concentration.
We present an electrochemical MIP sensor for tamoxifen (TAM)-a nonsteroidal anti-estrogen-which is based on the electropolymerisation of an O-phenylenediamine. resorcinol mixture directly on the electrode surface in the presence of the template molecule. Up to now only. bulk. MIPs for TAM have been described in literature, which are applied for separation in chromatography columns. Electro-polymerisation of the monomers in the presence of TAM generated a film which completely suppressed the reduction of ferricyanide. Removal of the template gave a markedly increased ferricyanide signal, which was again suppressed after rebinding as expected for filling of the cavities by target binding. The decrease of the ferricyanide peak of the MIP electrode depended linearly on the TAM concentration between 1 and 100 nM. The TAM-imprinted electrode showed a 2.3 times higher recognition of the template molecule itself as compared to its metabolite 4-hydroxytamoxifen and no cross-reactivity with the anticancer drug doxorubucin was found. Measurements at + 1.1 V caused a fouling of the electrode surface, whilst pretreatment of TAM with peroxide in presence of HRP generated an oxidation product which was reducible at 0 mV, thus circumventing the polymer formation and electrochemical interferences.
The goal of this three-year longitudinal study was to examine the buffering effect of parental mediation of adolescents’ technology use (i.e., restrictive, co-viewing, and instructive) on the relationships among cyber aggression involvement and substance use (i.e., alcohol use, marijuana use, cigarette smoking, and non-marijuana illicit drug use). Overall, 867 (M age = 13.67, age range from 13–15 years, 51% female, 49% White) 8th grade adolescents from the Midwestern United States participated in this study during the 6th grade (Wave 1), 7th grade (Wave 2), and 8th grade (Wave 3). Results revealed that higher levels of Wave 2 instructive mediation weakened the association between Wave 1 cyber victimization and Wave 3 alcohol use and Wave 3 non-marijuana illicit drug use. The relationship was stronger between Wave 1 cyber victimization and Wave 3 alcohol use and Wave 3 non-marijuana illicit drug use when adolescents reported lower levels of Wave 2 instructive mediation. At lower levels of Wave 2 instructive mediation, the association between Wave 1 cyber aggression perpetration and Wave 3 non-marijuana illicit drug use was stronger. Implications of these findings are discussed in the context of parents recognizing their role in helping to mitigate the negative consequences associated with adolescents’ cyber aggression involvement.
Cyber victimization research reveals various personal and contextual correlations and negative consequences associated with this experience. Despite increasing attention on cyber victimization, few studies have examined such experiences among ethnic minority adolescents. The purpose of the present study was to examine the moderating effect of ethnicity in the longitudinal associations among cyber victimization, school-belongingness, and psychological consequences (i.e., depression, loneliness, anxiety). These associations were investigated among 416 Latinx and white adolescents (46% female; M age = 13.89, SD = 0.41) from one middle school in the United States. They answered questionnaires on cyber victimization, school belongingness, depression, loneliness, and anxiety in the 7th grade (Time 1). One year later, in the 8th grade (Time 2), they completed questionnaires on depression, loneliness, and anxiety. Low levels of school-belongingness strengthened the positive relationships between cyber victimization and Time 2 depression and anxiety, especially among Latinx adolescents. The positive association between cyber victimization and Time 2 loneliness was strengthened for low levels of school-belongingness for all adolescents. These findings may indicate that cyber victimization threatens adolescents’ school-belongingness, which has implications for their emotional adjustment. Such findings underscore the importance of considering diverse populations when examining cyber victimization.
The purpose of the present study was to investigate the role of gender and gender stereotype traits (masculinity, femininity) in cyber victimization behaviors (cyber relational victimization, cyber verbal victimization, hacking) through different technologies (mobile phones, gaming consoles, social networking sites). There were 456 8th graders (226 females; M age = 13.66, SD = 0.41) from two midwestern middle schools in the United States included in this study. They completed questionnaires on their endorsement of masculine and feminine traits, and self-reported cyber victimization through different technologies. The findings revealed main effects of types of cyber victimization for boys and of technology for girls. In particular, boys with feminine traits experienced the most victimization by cyber verbal aggression, cyber relational aggression, and hacking when compared to the other groups of boys. Girls with feminine traits experienced the most cyber victimization through social networking sites, gaming consoles, and mobile phones in comparison to the other groups of girls. For girls with feminine traits, they reported more cyber relational victimization and cyber verbal victimization through mobile phones and social networking sites, as well as more hacking via social networking sites. Such findings underscore the importance of considering gender stereotype traits, types of victimization, and technologies when examining cyber victimization.
A method for the fabrication of well-defined metallic nanostructures is presented here in a simple and straightforward fashion. As an alternative to lithographic techniques, this routine employs microcontact printing utilizing wrinkled stamps, which are prepared from polydimethylsiloxane (PDMS), and includes the formation of hydrophobic stripe patterns on a substrate via the transfer of oligomeric PDMS. Subsequent backfilling of the interspaces between these stripes with a hydroxyl-functional poly(2-vinyl pyridine) then provides the basic pattern for the deposition of citrate-stabilized gold nanoparticles promoted by electrostatic interaction. The resulting metallic nanostripes can be further customized by peeling off particles in a second microcontact printing step, which employs poly(ethylene imine) surface-decorated wrinkled stamps, to form nanolattices. Due to the independent adjustability of the period dimensions of the wrinkled stamps and stamp orientation with respect to the substrate, particle arrays on the (sub)micro-scale with various kinds of geometries are accessible in a straightforward fashion. This work provides an alternative, cost-effective, and scalable surface-patterning technique to fabricate nanolattice structures applicable to multiple types of functional nanoparticles. Being a top-down method, this process could be readily implemented into, e.g., the fabrication of optical and sensing devices on a large scale.
Online hate is a topic that has received considerable interest lately, as online hate represents a risk to self-determination and peaceful coexistence in societies around the globe. However, not much is known about the explanations for adolescents posting or forwarding hateful online material or how adolescents cope with this newly emerging online risk. Thus, we sought to better understand the relationship between a bystander to and perpetrator of online hate, and the moderating effects of problem-focused coping strategies (e.g., assertive, technical coping) within this relationship. Self-report questionnaires on witnessing and committing online hate and assertive and technical coping were completed by 6829 adolescents between 12 and 18 years of age from eight countries. The results showed that increases in witnessing online hate were positively related to being a perpetrator of online hate. Assertive and technical coping strategies were negatively related with perpetrating online hate. Bystanders of online hate reported fewer instances of perpetrating online hate when they reported higher levels of assertive and technical coping strategies, and more frequent instances of perpetrating online hate when they reported lower levels of assertive and technical coping strategies. In conclusion, our findings suggest that, if effective, prevention and intervention programs that target online hate should consider educating young people about problem-focused coping strategies, self-assertiveness, and media skills. Implications for future research are discussed.
We applied the Social Cognitive Theory to investigate whether parent–child relationships, bullying victimization, and teacher–student relationships are directly as well as indirectly via self-efficacy in social conflicts associated with adolescents’ willingness to intervene in a bullying incident. There were 2071 (51.3% male) adolescents between the ages of 12 and 17 from 24 schools in Germany who participated in this study. A mediation test using structural equation modeling revealed that parent–child relationships, bullying victimization, and teacher–student relationships were directly related to adolescents’ self-efficacy in social conflicts. Further, teacher–student relationships and bullying victimization were directly associated with adolescents’ willingness to intervene in bullying. Finally, relationships with parents, peers and teachers were indirectly related to higher levels of students’ willingness to intervene in bullying situations due to self-efficacy in social conflicts. Thus, our analysis confirms the general assumptions of Social Cognitive Theory and the usefulness of applying its approach to social conflicts such as bullying situations.