References of "Paper published in a journal"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailGelebte Mehrsprachigkeit am Sprachenzentrum Luxemburg: Mit studentischen Assistent:innen für Studierende. Peer-Tutorien von Studierenden für Studierende
Lejot, Eve UL; Neufert, Paul

in Fremdsprachen in Lehre und Forschung (FLF) Band 56 (in press), 56

The language centres at the universities in the Greater Region have adopted a French-German tandem module as part of a joint course that provides linguistic and cultural preparation for students ahead of ... [more ▼]

The language centres at the universities in the Greater Region have adopted a French-German tandem module as part of a joint course that provides linguistic and cultural preparation for students ahead of their upcoming mobility semester. But there are often not enough French-speaking students to complete the tandems. So as an alternative, our student assistants can now guide student pairs or trios through their tandem activities. Based on comments from students and the experience of tutors in group tandems, a practical handbook has been produced to help train tutors, while a contract between tandem partners further engages them as soon as the tandem is set up. [less ▲]

Detailed reference viewed: 48 (1 UL)
Full Text
Peer Reviewed
See detailEnergy performance comparison of ventilation-based heating versus water-based heating systems in an efficient residential building
Shirani, Arsalan UL; Merzkirch, Alexander; Leyer, Stephan UL et al

in Fluid Dynamics & Material Processing (in press)

The application of air-based heating systems as a possible approach to reduce the construction costs in highly efficient residential buildings is becoming popular. Air-based heating systems have been well ... [more ▼]

The application of air-based heating systems as a possible approach to reduce the construction costs in highly efficient residential buildings is becoming popular. Air-based heating systems have been well-known for their usage in passive houses during the past three decades. Available studies on such systems tend mostly to focus only on comparing exhaust air heat pump technology with conventional systems in efficient buildings. Moreover, most of the existing studies ignore the usual presence of the electrical heaters as backup. Besides, a comprehensive study and comparison between different air-based heating system concepts is still missing. In this study, four different air-based heating system concepts separated by the type of heat source of heat pump for heating and domestic hot water are defined. These systems are compared to four conventional heating system, including floor heating and direct electrical system employing dynamic annual simulations. According to simulation results, the systems with floor heating have shown the best system efficiencies and the lowest energy demand in comparison to the other systems. The main reason for this was the lower supply temperatures of the floor heating systems. Between the air heating systems, the system equipped with an outdoor air heat pump showed a better energy performance than an exhaust air system. The main reason for this could be attributed to the power limitation of exhaust air heat pump systems. [less ▲]

Detailed reference viewed: 135 (10 UL)
Full Text
Peer Reviewed
See detailProPILE: Probing Privacy Leakage in Large Language Models
Kim, Siwon; Yun, Sangdoo; Lee, Hwaran et al

in Advances in Neural Information Processing Systems 36 (NeurIPS 2023) (2023, December)

The rapid advancement and widespread use of large language models (LLMs) have raised significant concerns regarding the potential leakage of personally identifiable information (PII). These models are ... [more ▼]

The rapid advancement and widespread use of large language models (LLMs) have raised significant concerns regarding the potential leakage of personally identifiable information (PII). These models are often trained on vast quantities of web-collected data, which may inadvertently include sensitive personal data. This paper presents ProPILE, a novel probing tool designed to empower data subjects, or the owners of the PII, with awareness of potential PII leakage in LLM-based services. ProPILE lets data subjects formulate prompts based on their own PII to evaluate the level of privacy intrusion in LLMs. We demonstrate its application on the OPT-1.3B model trained on the publicly available Pile dataset. We show how hypothetical data subjects may assess the likelihood of their PII being included in the Pile dataset being revealed. ProPILE can also be leveraged by LLM service providers to effectively evaluate their own levels of PII leakage with more powerful prompts specifically tuned for their in-house models. This tool represents a pioneering step towards empowering the data subjects for their awareness and control over their own data on the web. [less ▲]

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailSHARP Challenge 2023: Solving CAD History and pArameters Recovery from Point clouds and 3D scans. Overview, Datasets, Metrics, and Baselines.
Mallis, Dimitrios UL; Ali, Sk Aziz UL; Dupont, Elona UL et al

in International Conference on Computer Vision Workshops (2023, October 03)

Recent breakthroughs in geometric Deep Learning (DL) and the availability of large Computer-Aided Design (CAD) datasets have advanced the research on learning CAD modeling processes and relating them to ... [more ▼]

Recent breakthroughs in geometric Deep Learning (DL) and the availability of large Computer-Aided Design (CAD) datasets have advanced the research on learning CAD modeling processes and relating them to real objects. In this context, 3D reverse engineering of CAD models from 3D scans is considered to be one of the most sought-after goals for the CAD industry. However, recent efforts assume multiple simplifications limiting the applications in real-world settings. The SHARP Challenge 2023 aims at pushing the research a step closer to the real-world scenario of CAD reverse engineering from 3D scans through dedicated datasets and tracks. In this paper, we define the proposed SHARP 2023 tracks, describe the provided datasets, and propose a set of baseline methods along with suitable evaluation metrics to assess the performance of the track solutions. All proposed datasets along with useful routines and the evaluation metrics are publicly available. [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailMulti-label Deepfake Classification
Singh, Inder Pal UL; Mejri, Nesryne UL; Nguyen, van Dat UL et al

in IEEE Workshop on Multimedia Signal Processing (2023, September 27)

In this paper, we investigate the suitability of current multi-label classification approaches for deepfake detection. With the recent advances in generative modeling, new deepfake detection methods have ... [more ▼]

In this paper, we investigate the suitability of current multi-label classification approaches for deepfake detection. With the recent advances in generative modeling, new deepfake detection methods have been proposed. Nevertheless, they mostly formulate this topic as a binary classification problem, resulting in poor explainability capabilities. Indeed, a forged image might be induced by multi-step manipulations with different properties. For a better interpretability of the results, recognizing the nature of these stacked manipulations is highly relevant. For that reason, we propose to model deepfake detection as a multi-label classification task, where each label corresponds to a specific kind of manipulation. In this context, state-of-the-art multi-label image classification methods are considered. Extensive experiments are performed to assess the practical use case of deepfake detection. [less ▲]

Detailed reference viewed: 49 (7 UL)
Full Text
Peer Reviewed
See detailLoad transfer of circular reinforced composite dowel connector: a comparison of existing analytical equations
Paoletti, Maxence UL; Schäfer, Markus UL

in ce/papers (2023, September 12), 6(3-4), 101-106

The effectiveness of headed studs for shear transfer in the steel-concrete interface of composite columns is questionable when important load needs to be transferred. Circular reinforced composite dowel ... [more ▼]

The effectiveness of headed studs for shear transfer in the steel-concrete interface of composite columns is questionable when important load needs to be transferred. Circular reinforced composite dowel (CRCD) connectors are known for their high initial stiffness and significant load-bearing capacity. This paper presents the different types of CRCD connectors and the available analytical equations to determine their shear resistance, as well as a database of 52 experimental specimens to study their performance. The results show that the equations developed by Wang et al.2014, He et al.2016and Zhao et al.2016 provided the best performance, with 76% of the predictions falling within the error bounds of +/-15%. Further research is recommended to understand the behavior of CRCD connectors on H-shaped steel profiles and to develop analytical equations to calculate their resistance. [less ▲]

Detailed reference viewed: 45 (0 UL)
Full Text
See detailThe Integration of the Advertising Function in Marketing within the Philips Company, 1959-1975
Höfer, Matthias Simon UL

in Proceedings of the 21st Biennial Conference on Historical Analysis & Research in Marketing (CHARM) (2023, June 26), Vol. 21. Esse quam videri. Marketing history for real.

Detailed reference viewed: 36 (2 UL)
See detailConference Report: Borders in Flux and Border Temporalities in and Beyond Europe
Jaschik, Johanna Maria UL

in H-Soz-u-Kult (2023, June 24)

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailLoad Introduction Zone Connection in Composite Columns
Paoletti, Maxence UL; Schäfer, Markus UL

in Young Engineers Colloquium Dresden 2023 (2023, May)

Detailed reference viewed: 55 (4 UL)
Full Text
Peer Reviewed
See detail“We Need a Big Revolution in Email Advertising”: Users’ Perception of Persuasion in Permission-based Advertising Emails
Sergeeva, Anastasia UL; Rohles, Björn UL; Distler, Verena UL et al

in CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (2023, April 19)

Persuasive tactics intend to encourage users to open advertising emails. However, these tactics can overwhelm users, which makes them frustrated and leads to lower open rates. This paper intends to ... [more ▼]

Persuasive tactics intend to encourage users to open advertising emails. However, these tactics can overwhelm users, which makes them frustrated and leads to lower open rates. This paper intends to understand which persuasive tactics are used and how they are perceived by users. We first developed a categorization of inbox-level persuasive tactics in permission-based advertising emails. We then asked participants to interact with an email inbox prototype, combined with interviews (N=32), to investigate their opinions towards advertising emails and underlying persuasive tactics. Our qualitative findings reveal poor user experience with advertising emails, which was related to feeling surveilled by companies, forced subscriptions, high prior knowledge about persuasive tactics, and a desire for more agency. We also found that using certain persuasive tactics on the inbox level is perceived as ethically inappropriate. Based on these insights, we provide design recommendations to improve advertising communication and make such emails more valuable to users. [less ▲]

Detailed reference viewed: 102 (9 UL)
Full Text
Peer Reviewed
See detailLegal-Ethical Challenges and Technological Solutions to e-Health Data Consent in the EU
Doan, Xengie Cheng UL; Florea, Marcu; Carter, Sarah E.

in Frontiers in Artificial Intelligence and Applications (2023), 368

e-Health data is sensitive and consenting to the collection, processing, and sharing involves compliance with legal requirements, ethical standards, and appropriate digital tools. We explore two legal ... [more ▼]

e-Health data is sensitive and consenting to the collection, processing, and sharing involves compliance with legal requirements, ethical standards, and appropriate digital tools. We explore two legal-ethical challenges: 1) What are the scope and requirements of digital health data consent? 2) What are the legal-ethical reasons for obtaining consent beyond the GDPR’s legal basis, and how might such consent be obtained? We then propose human-centered solutions to help navigate standards of ethical and legal consent across the EU, purposefully addressing those use cases to compensate for human difficulties in managing consent without clear guidelines. These solutions – including ISO standards, ontologies, consent mechanisms, value-centered privacy assistants, and layered dynamic consent platforms – complement and aid humans to help uphold ethical and rigorous consent. [less ▲]

Detailed reference viewed: 73 (2 UL)
Full Text
See detailChildren’s perspectives on their learning experiences during the pandemic
Kirsch, Claudine UL

in Developmental and Adolescent Health (2023), 2(4),

The present paper is based on two online surveys of the mix-method projects COVID-Kids I and II which investigated children’s school experiences, emotional responses, and subjective well-being during the ... [more ▼]

The present paper is based on two online surveys of the mix-method projects COVID-Kids I and II which investigated children’s school experiences, emotional responses, and subjective well-being during the Covid-19 pandemic in 2020 and 2021. The data of the 2020 questionnaire stem from 1,773 children aged 6-16 from Luxembourg, Germany and Switzerland (Kirsch et al., 2021) and those of the second questionnaire from 502 children of the same age group in Luxembourg (Kirsch et al., 2022). The presentation will examine some of the participants’ challenges with home schooling as well as selected outcomes and conclude with a few implications. [less ▲]

Detailed reference viewed: 73 (1 UL)
Full Text
Peer Reviewed
See detailApplying the TPACK model to HCI Education: Relationships between Perceived Instructional Quality and Teacher Knowledge
Sacre, Margault UL; Lallemand, Carine UL

in EduCHI 2023: 5th Annual Symposium on HCI Education (2023)

Instructional quality in Human-Computer Interaction (HCI) education is crucial to ensure that students acquire the necessary skills to understand the complexity of socio-technical systems and design ... [more ▼]

Instructional quality in Human-Computer Interaction (HCI) education is crucial to ensure that students acquire the necessary skills to understand the complexity of socio-technical systems and design interfaces and interactions accordingly. Previous empirical evidence suggests that teaching quality is determined by teacher knowledge – domain-specific, pedagogical, and technological knowledge. Through a survey of N=54 HCI instructors, this paper reports on teacher knowledge and investigates its relationship with their perceived teaching quality at different levels of HCI education. Findings show that HCI instructors rated their domain-specific and technological knowledge rather high, while the components of pedagogical knowledge were rated lower. Yet, pedagogical knowledge was related to instructional quality, specifically the degree of cognitive activation provided to students. We contribute by documenting and discussing the strengths and weaknesses of HCI instructors’ knowledge and teaching quality. We draw implications for instructors, institutions and the HCI education community. [less ▲]

Detailed reference viewed: 79 (19 UL)
Full Text
Peer Reviewed
See detailScalable Coercion-Resistant E-Voting under Weaker Trust Assumptions
Haines, Thomas; Mueller, Johannes UL; Querejeta-Azurmendi, Inigo

in Proceedings of ACM SAC Conference (SAC'23) (2023)

Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed ... [more ▼]

Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed over the last few decades. Notably, some of these systems were designed to provide coercion-resistance. This property protects against potential adversaries trying to swing an election by coercing voters. Despite the multitude of existing coercion-resistant e-voting systems, to date, only few of them can handle large-scale Internet elections efficiently. One of these systems, VoteAgain (USENIX Security 2020), was originally claimed secure under similar trust assumptions to state-of-the-art e-voting systems without coercion-resistance. In this work, we review VoteAgain's security properties. We discover that, unlike originally claimed, VoteAgain is no more secure than a trivial voting system with a completely trusted election authority. In order to mitigate this issue, we propose a variant of VoteAgain which effectively mitigates trust on the election authorities and, at the same time, preserves VoteAgain's usability and efficiency. Altogether, our findings bring the state of science one step closer to the goal of scalable coercion-resistant e-voting being secure under reasonable trust assumptions. [less ▲]

Detailed reference viewed: 59 (2 UL)
Full Text
Peer Reviewed
See detailValue of Technology in Education: Exploring Factors Associated with Value Beliefs of Fundamental School Teachers in Luxembourg through a Survey Study
Ivanishchenko, Kateryna UL; Busana, Gilbert UL; Reuter, Robert UL

in Proceedings of EdMedia + Innovate Learning (2023)

Information and Communication Technologies have impacted every business in the last decades. Education, as part of the knowledge business, has acknowledged the digital revolution and educational policy ... [more ▼]

Information and Communication Technologies have impacted every business in the last decades. Education, as part of the knowledge business, has acknowledged the digital revolution and educational policy makers have tried to harness the powers of these new tools and to address the associated challenges, with more or less success. In Luxembourg, we have seen several attempts to help schools to strategically integrate ICT into everyday pedagogical activities. However, teacher beliefs associated with value of using technology (value beliefs) are rather understudied. The aim of this study was to document and understand technology acceptance of teachers to ensure successful technology integration. Quantitative data was collected through a survey of 127 teachers and analyzed through a mixed-method approach. Findings revealed both the dependence of value beliefs on perceived ease of use, subjective norms and a pedagogical approach and their independence from gender, age, experience, and school subject. [less ▲]

Detailed reference viewed: 96 (9 UL)
Full Text
Peer Reviewed
See detailCODEBERT-NT: code naturalness via CodeBERT
Khanfir, Ahmed UL; Jimenez, Matthieu UL; Papadakis, Mike UL et al

in 22nd IEEE International Conference on Software Quality, Reliability and Security (QRS'22) (2022, December 05)

Much of recent software-engineering research has investigated the naturalness of code, the fact that code, in small code snippets, is repetitive and can be predicted using statistical language models like ... [more ▼]

Much of recent software-engineering research has investigated the naturalness of code, the fact that code, in small code snippets, is repetitive and can be predicted using statistical language models like n-gram. Although powerful, training such models on large code corpus can be tedious, time consuming and sensitive to code patterns (and practices) encountered during training. Consequently, these models are often trained on a small corpus and thus only estimate the language naturalness relative to a specific style of programming or type of project. To overcome these issues, we investigate the use of pre-trained generative language models to infer code naturalness. Pre-trained models are often built on big data, are easy to use in an out-of-the-box way and include powerful learning associations mechanisms. Our key idea is to quantify code naturalness through its predictability, by using state-of-the-art generative pre-trained language models. Thus, we suggest to infer naturalness by masking (omitting) code tokens, one at a time, of code-sequences, and checking the models’ability to predict them. We explore three different predictability metrics; a) measuring the number of exact matches of the predictions, b) computing the embedding similarity between the original and predicted code, i.e., similarity at the vector space, and c) computing the confidence of the model when doing the token completion task regardless of the outcome. We implement this workflow, named CODEBERT-NT, and evaluate its capability to prioritize buggy lines over non-buggy ones when ranking code based on its naturalness. Our results, on 2,510 buggy versions of 40 projects from the SmartShark dataset, show that CODEBERT-NT outperforms both, random-uniform and complexity-based ranking techniques, and yields comparable results to the n-gram models. [less ▲]

Detailed reference viewed: 95 (15 UL)
Full Text
Peer Reviewed
See detailDeveloping a DEM-Coupled OpenFOAM solver for multiphysics simulation of additive manufacturing process
Aminnia, Navid UL; Estupinan Donoso, Alvaro Antonio UL; Peters, Bernhard UL

in Scipedia.com (2022, December)

Powder-based additive manufacturing technologies, specifically selective laser melting, are challenging to model due to the complex, interrelated physical phenomena that are present on multiple spatial ... [more ▼]

Powder-based additive manufacturing technologies, specifically selective laser melting, are challenging to model due to the complex, interrelated physical phenomena that are present on multiple spatial scales, during the process. A key element of such models will be the detailed simulation of flow and heat transfer throughout the melt pool that is formed when the powder particles melt. Due to the high temperature gradients that are rised inside the melt pool, Marangoni force plays a key role in governing the flows inside the melt pool and deciding its shape and dimensions[1]. On the other hand the mass and heat transfer between the melt and the powder also has a signifacnt role in shaping the melt pool at the edges. In this study we modified an OpenFOAM solver(icoReactingMultiphaseInterFoam) cou- pled with an in-house developed DEM code known as eXtended Discrete Element Method or XDEM which models the dynamics and thermodynamics of the particles[2]. By adding the Marangoni force to the momentum equation and also defining a laser model as a boundary Condition for Liquid-Gas Interface, the solver is capable of modeling selective laser melting process from the moment of particle melting to the completion of the so- solidified track. The coupled solver was validated with an ice-packed bed melting case and was used to simulate a multi-track selective laser melting process. [less ▲]

Detailed reference viewed: 87 (7 UL)
Full Text
Peer Reviewed
See detailWhy do Competition Authorities need Artificial Intelligence?
Lorenzoni, Isabella UL

in Yearbook of Antitrust and Regulatory Studies (2022, December), 15(26), 33-55

Recent technological developments are transforming the way antitrust is enforced as well as the way market players are infringing competition law. As a result, enforcers are starting to equip themselves ... [more ▼]

Recent technological developments are transforming the way antitrust is enforced as well as the way market players are infringing competition law. As a result, enforcers are starting to equip themselves with sophisticated digital investigation tools. This paper explores this interest in building an Artificial Intelligence (AI) arsenal for the fight against algorithmic infringements. What are the key factors motivating regulators to develop their own technological tools to enforce competition law? Building on interviews with a number of competition authorities, this paper finds that changes in digital markets, the need for enforcers to reverse- engineer companies’ algorithms in order to better understand their implications for competition law, the need to enhance efficiency and keep pace with the fast evolution of the digital economy, and, finally, the decrease in leniency applications, are all reasons for which competition authorities should strive for more innovative and alternative means to boost their ex officio investigations. [less ▲]

Detailed reference viewed: 186 (1 UL)
Full Text
Peer Reviewed
See detailSn4+-free, stable tin perovskite films for lead-free perovskite solar cells
Singh, Ajay UL; Hieulle, Jeremy UL; Phirke, Himanshu UL et al

in 2022 IEEE 49th Photovoltaics Specialists Conference (PVSC) (2022, November 14)

Detailed reference viewed: 105 (7 UL)
Full Text
Peer Reviewed
See detailSecure and Distributed Assessment of Privacy-Preserving Releases of GWAS
Pascoal, Túlio UL; Decouchant, Jérémie; Volp, Marcus UL

in ACM/IFIP International Middleware Conference (2022, November)

Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed ... [more ▼]

Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed algorithms for a federation of genome data holders that spans multiple institutional and legislative domains to securely compute GWAS results. However, these algorithms have limited applicability, since they still require a centralized instance to decide whether GWAS results can be safely disclosed, which is in violation to privacy regulations, such as GDPR. In this work, we introduce GenDPR, a distributed middleware that leverages Trusted Execution Environments (TEEs) to securely determine a subset of the potential GWAS statistics that can be safely released. GenDPR achieves the same accuracy as centralized solutions, but requires transferring significantly less data because TEEs only exchange intermediary results but no genomes. Additionally, GenDPR can be configured to tolerate all-but-one honest-but-curious federation members colluding with the aim to expose genomes of correct members. [less ▲]

Detailed reference viewed: 60 (16 UL)
Full Text
Peer Reviewed
See detailRISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
Cheng, Hao UL; Groszschädl, Johann UL; Marshall, Ben et al

in IACR Transactions on Cryptographic Hardware and Embedded Systems (2022, November), 2023(1), 193-237

The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices. Since the outcome is likely to have ... [more ▼]

The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices. Since the outcome is likely to have significant, long-lived impact, careful evaluation of each submission with respect to metrics explicitly outlined in the call is imperative. Beyond the robustness of submissions against cryptanalytic attack, metrics related to their implementation (e.g., execution latency and memory footprint) form an important example. Aiming to provide evidence allowing richer evaluation with respect to such metrics, this paper presents the design, implementation, and evaluation of one separate Instruction Set Extension (ISE) for each of the 10 LWC final round submissions, namely Ascon, Elephant, GIFT-COFB, Grain-128AEADv2, ISAP, PHOTON-Beetle, Romulus, Sparkle, TinyJAMBU, and Xoodyak; although we base the work on use of RISC-V, we argue that it provides more general insight. [less ▲]

Detailed reference viewed: 96 (24 UL)
Full Text
Peer Reviewed
See detailWhat Really Drives the Spread of COVID-19 Tweets: A Revisit from Perspective of Content
Chuai, Yuwei UL; Chang, Yutian; Zhao, Jichang

in 2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA) (2022, October 13)

COVID-19 content spreads wildly on social media and produces significant effects in both causing social panic and assisting pandemic management. However, what really enhances the diffusion of pandemic ... [more ▼]

COVID-19 content spreads wildly on social media and produces significant effects in both causing social panic and assisting pandemic management. However, what really enhances the diffusion of pandemic-related content during COVID-19, particularly from the perspective of the content itself, remains unexplored. Using large-scale COVID-19 tweets posted on Twitter, this paper empirically examines the effects of the four key characteristics, namely emotions, topics, hashtags, and mentions, on information spread in the pandemic. The empirical results show that most negative emotions have positive effects on retweeting. Nevertheless, the positive effect of trust on retweeting is unexpectedly the strongest. And the positive effects of the political topics and mentioning politicians further indicate that people are sensitive to the politicization of information during the pandemic. The strongest anger intensity in the political topic also needs to be noticed. The results complement the extant understanding of information diffusion during COVID-19 and provide insights for the governments to understand the psychology and behavior of large population during disasters like global pandemics. [less ▲]

Detailed reference viewed: 29 (9 UL)
Full Text
Peer Reviewed
See detailMeasuring COVID-19 Vaccine Hesitancy: Consistency of Social Media with Surveys
Chen, Ninghan UL; Chen, Xihui UL; Pang, Jun UL et al

in Proceedings of the 2022 International Conference on Social Informatics (2022, October 12)

Detailed reference viewed: 52 (11 UL)
Full Text
Peer Reviewed
See detailA Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption
Arenas Correa, Monica Patricia UL; Bingol, Muhammed Ali; Demirci, Huseyin UL et al

in Lecture Notes in Computer Science (2022, October 06), 13503

Sometimes fingerprint-like features are found in a material. The exciting discovery poses new challenges on how to use the features to build an object authentication protocol that could tell customers and ... [more ▼]

Sometimes fingerprint-like features are found in a material. The exciting discovery poses new challenges on how to use the features to build an object authentication protocol that could tell customers and retailers equipped with a mobile device whether a good is authentic or fake. We are exactly in this situation with Cholesteric Spherical Reflectors (CSRs), tiny spheres of liquid crystals with which we can tag or coat objects. They are being proposed as a potential game-changer material in anti-counterfeiting due to their unique optical properties. In addition to the problem of processing images and extracting the minutiæ embedded in a CSR, one major challenge is designing cryptographically secure authentication protocols. The authentication procedure has to handle unstable input data; it has to measure the distance between some reference data stored at enrollment and noisy input provided at authentication. We propose a cryptographic authentication protocol that solves the problem, and that is secure against semi-honest and malicious adversaries. We prove that our design ensures data privacy even if enrolled data are leaked and even if servers and provers are actively curious. We implement and benchmark the protocol in Python using the Microsoft SEAL library through its Python wrapper PySEAL. [less ▲]

Detailed reference viewed: 122 (31 UL)
Full Text
Peer Reviewed
See detailThe Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android
Adjibi, Boladji Vinny; Mbodji, Fatou Ndiaye UL; Allix, Kevin et al

in 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM) (2022, October)

This paper investigates the various technical and non-technical tools and techniques that software developers use to build and disseminate crypto mining apps on Android devices. Our study of 346 potential ... [more ▼]

This paper investigates the various technical and non-technical tools and techniques that software developers use to build and disseminate crypto mining apps on Android devices. Our study of 346 potential Android mining apps, collected between April 2019 and May 2022, has revealed the presence of more than ten mining apps on the Google Play Store, with at least half of those still available at the time of writing this (June 2022). We observed that many of those mining apps do not conceal their usage of the device’s resource for mining which is considered a violation of the store’s policies for developers. We estimate that more than ten thousand users have run mining apps downloaded directly from the Google Play Store, which puts the supposedly ”stringent” vetting process into question. Furthermore, we prove that covert mining apps tend to be embedded into supposedly free versions of premium apps or pose as utility apps that provide valuable features to users. Finally, we empirically demonstrate that cryptojacking apps’ resource consumption and malicious behavior could be insignificant. We presume that typical users, even though they might be running a mobile antivirus solution, could execute a mining app for an extended period without being alerted. We expect our results to inform the various actors involved in the security of Android devices against the lingering threat of cryptojacking and help them better assess the problem. [less ▲]

Detailed reference viewed: 71 (9 UL)
Full Text
Peer Reviewed
See detailOpenAirInterface as a platform for 5G-NTN Research and Experimentation
Kumar, Sumit UL; Meshram, Ashish Kumar UL; Abdalla, Abdelrahman UL et al

in IEEE Future Networks World Forum (2022, October)

Technical advancements and experimental works for the integration of 5G and Non-Terrestrial Networks (NTN) have gained significant traction over the past few years. NTN components have been officially ... [more ▼]

Technical advancements and experimental works for the integration of 5G and Non-Terrestrial Networks (NTN) have gained significant traction over the past few years. NTN components have been officially included in the 5G ecosystem by 3GPP in the latest Release-17. 5G-NTN research is ongoing and it is desirable to have a platform that facilitates quick prototyping of the proof-of-concept methods. OpenAirInterface(OAI) is an open-source experimental yet 3GPP standard-compliant Software Defined Radio (SDR) based protocol stack that has been widely known for implementing 4G/5G technologies. Due to its proven capabilities and flexibility, OAI is currently in the developmental process of integrating adaptations for the 5G-NTN. In this work, we discuss the peculiar features of OAI which are shaping it towards becoming a preferred tool for research and experimentation related to 5G-NTN. We provide details of completed/ongoing 5G-NTN projects leveraging OAI to achieve their objectives. In particular, we discuss 5G-GOA and 5G-LEO where critical adaptations in OAI are being done to support 5G-NTN usecases. Such adaptations enable direct-access between UE and gNB via transparent payload Geostationary (5G-GOA) and Nongeostationary satellites (5G-LEO). Both projects have closely followed 3GPP discussions over 5G-NTN and the adaptations are compliant with the currently frozen 3GPP Release-17. OAI adaptations from both projects will be merged into the main development branch of OAI. We also provide a future roadmap of OAI towards 5G-NTN development. We believe that the pioneering steps taken in the course of the aforementioned projects will establish OAI as a preferred tool for 5G-NTN research and experimentations. [less ▲]

Detailed reference viewed: 79 (14 UL)
Full Text
Peer Reviewed
See detailAbstracts of the 11th DACH+ Conference on Energy Informatics (S53-Taxonomy of Local Flexibility Markets)
Potenciano Menci, Sergio UL

in Energy Informatics (2022, September 07), 5

Flexibility has risen as a potential solution and complement for system operators’ current and future problems (e.g., congestion, voltage) caused by integrating distributed renewable resources (e.g., wind ... [more ▼]

Flexibility has risen as a potential solution and complement for system operators’ current and future problems (e.g., congestion, voltage) caused by integrating distributed renewable resources (e.g., wind, solar) and electric vehicles. In parallel, local flexibility markets (LFM) emerge as a possible smart grid solution to bridge between flexibility-seeking customers and flexibility-offering customers in localized areas. Nevertheless, there is no unique, standard, or simple solution to tackle all the problems system operators and other energy actors face. Therefore, many local flexibility market concepts, initiatives (projects), and companies have developed various solutions over the last few years. At the same time, they increased the complexity of the topic. Thus, this research paper aims to describe several local flexibility market concepts, initiatives (projects), and companies in Europe. To do so, we propose a taxonomy derived from LFMs descriptions. We use the taxonomy-building research method proposed by [1] to develop our taxonomy. Moreover, we use the smart grid architecture model (SGAM) as a structural and foundation guideline. Given the numerous and diverse LFM solutions, we delimit the taxonomy by considering solutions focused on congestion management on medium and low voltage (meta-characteristic). [less ▲]

Detailed reference viewed: 100 (11 UL)
Full Text
Peer Reviewed
See detailOptimal industrial flexibility scheduling based on generic data format
Bahmani, Ramin UL; van Stiphoudt, Christine UL; Potenciano Menci, Sergio UL et al

in Energy Informatics (2022, September 07), 5

The energy transition into a modern power system requires energy flexibility. Demand Response (DR) is one promising option for providing this flexibility. With the highest share of final energy ... [more ▼]

The energy transition into a modern power system requires energy flexibility. Demand Response (DR) is one promising option for providing this flexibility. With the highest share of final energy consumption, the industry has the potential to offer DR and contribute to the energy transition by adjusting its energy demand. This paper proposes a mathematical optimization model that uses a generic data model for flexibility description. The optimization model supports industrial companies to select when (i.e., at which time), where (i.e., in which market), and how (i.e., the schedule) they should market their flexibility potential to optimize profit. We evaluate the optimization model under several synthetic use cases developed upon the learnings over several workshops and bilateral discussions with industrial partners from the paper and aluminum industry. The results of the optimization model evaluation suggest the model can fulfill its purpose under different use cases even with complex use cases such as various loads and storages. However, the optimization model computation time grows as the complexity of use cases grows. [less ▲]

Detailed reference viewed: 81 (21 UL)
Full Text
Peer Reviewed
See detailSatellite Beam Densification for High-Demand Areas
Jubba Honnaiah, Puneeth UL; Lagunas, Eva UL; Chatzinotas, Symeon UL et al

in 2022 11th Advanced Satellite Multimedia Systems Conference and the 17th Signal Processing for Space Communications Workshop (ASMS/SPSC) (2022, September)

Conventional multi-beam pattern design in Geostationary (GEO) satellite communication systems consists of a regular grid of non-reconfigurable beams, where the beams overlap is typically assumed at the ... [more ▼]

Conventional multi-beam pattern design in Geostationary (GEO) satellite communication systems consists of a regular grid of non-reconfigurable beams, where the beams overlap is typically assumed at the point where the beam edge reaches a 3-dB loss in the antenna pattern (with respect to the beam center). For certain high demand areas, this 3dB loss has a significant impact. To overcome this issue, in this paper we evaluate the potential gain of beam densification, i.e. considering an increased number of beams (keeping the same beam size and shape) to cover hot-spot areas, with the aim to push the beam overlap and increase the beam gain. In particular, we compare two beam patterns (kindly provided by ESA): One with regular beam grid, and one with densification in a particular hot-spot area. We provide a comparison in terms of per-beam average SINR and capacity, as well as an overall system analysis considering the whole densified region. [less ▲]

Detailed reference viewed: 50 (4 UL)
Full Text
See detailIntegrated Spacecraft Design: Demonstration of a prototype process and platform for satellite design application
Rana, Loveneesh UL; Bohlachov, Vladyslav; Hein, Andreas UL

in Proceedings of International Astronautical Congress (2022, September)

Detailed reference viewed: 56 (1 UL)
Full Text
Peer Reviewed
See detailDesign of an experimental platform for gait analysis with ActiSense and StereoPi
Leer, Alexandra; Santa Cruz, Beatriz Garcia; Hertel, Frank et al

in Current Directions in Biomedical Engineering (2022, September), 8(2), 572-575

Detailed reference viewed: 55 (6 UL)
Full Text
Peer Reviewed
See detailThe Impact Of Distributed Data Preprocessing On Automotive Data Streams
Tawakuli, Amal UL; Engel, Thomas UL

in 2022 IEEE 96th Vehicular Technology Conference: (VTC2022-Fall) (2022, September)

Vehicles have transformed into sophisticated com- puting machines that not only serve the objective of transporta- tion from point A to point B but serve other objectives including improved experience ... [more ▼]

Vehicles have transformed into sophisticated com- puting machines that not only serve the objective of transporta- tion from point A to point B but serve other objectives including improved experience, safer journey, automated and more efficient and sustainable transportation. With such sophistication comes complex applications and enormous volumes of data generated from diverse types of vehicle sensors and components. Automotive data is not sedentary but moves from the edge (the vehicle) to the cloud (e.g., infrastructure of the vehicle manufacturers, national highway agencies, insurance companies, etc.). The exponential increase in data volume and variety generated in modern vehicles far exceeds the rate of infrastructure scaling and expansion. To mitigate this challenge, the computational and storage capacities of vehicle components can be leveraged to perform in-vehicle operations on the data to either prepare and transform (prepro- cess) the data or extract information from (process) the data. This paper focuses on distributing data preprocessing to the vehicle and highlights the benefits and impact of the distribution including on the consumption of resources (e.g., energy). [less ▲]

Detailed reference viewed: 65 (3 UL)
Full Text
Peer Reviewed
See detail5G-NTN GEO-based In-Lab Demonstrator using OpenAirInterface5G
Kumar, Sumit UL; Abdalla, Abdelrahman UL; Kodheli, Oltjon UL et al

in 11th Advanced Satellite Multimedia Conference (2022, September)

The integration of 5G with Non-Terrestrial Network (NTN) components is going through a series of technological advancements and soon satellites will be a part of the 5G ecosystem. Early demonstrators ... [more ▼]

The integration of 5G with Non-Terrestrial Network (NTN) components is going through a series of technological advancements and soon satellites will be a part of the 5G ecosystem. Early demonstrators, especially based on open-source implementations, are essential to support further research. In this work, we discuss the ongoing activities and developments related to the project 5G-Enabled Ground Segment Technologies OverThe-Air Demonstrator (5G-GoA) which has been funded under the ESA-ARTES program. The vision of 5G-GoA is developing and implementing suitable modifications in the 5G New Radio (NR) standard for enabling direct radio access to 5G services using a transparent GEO satellite. For this purpose, we have used OpenAirInterface(OAI) which is a Software Defined Radio (SDR) based open-source implementation of the 5G-NR protocol stack. We adapted it to address the challenges caused by the excessive round-trip delay in GEO satellites. Our solutions encompass all the layers of the 5G protocol stack: The physical layer (e.g. synchronization) up to upper layer implementations (e.g. timers and random-access procedure) of the Radio Access Network. Our modifications comply with the specifications mentioned for 5GNTN in the recently frozen 3GPP Release-17. An end-to-end demonstrator has been developed for in-lab validation over a satellite channel emulator prior to over-the-satellite testing. Our initial experiments show promising results and the feasibility of direct access to 5G services through transparent GEO satellites. [less ▲]

Detailed reference viewed: 74 (8 UL)
Full Text
Peer Reviewed
See detailPrivacy in Cross-border Digital Currency. A Transatlantic Approach
Fanti, Giulia; Pocher, Nadia UL

in Frankfurt Forum on US-European GeoEconomics (2022, September)

As a growing number of countries explore Central Bank Digital Currencies (CBDCs) for the domestic context, multi-country cross-border CBDCs pilots are also proliferating. Cross-border CBDCs could make ... [more ▼]

As a growing number of countries explore Central Bank Digital Currencies (CBDCs) for the domestic context, multi-country cross-border CBDCs pilots are also proliferating. Cross-border CBDCs could make cross-border payments faster, cheaper, and simpler. However, for any cross-border CBDC to unlock these benefits and be widely adopted, it must address key concerns, chief among them risks around privacy and transparency of data. This article illustrates how various technical design choices can affect the privacy and transparency of cross-border CBDCs. For instance, architectural choices about the structure of a cross-border CBDC and representational choices about how transactions are encoded in the underlying software can have far-reaching implications for privacy and transparency—both in a domestic context and for cross-border transactions. Many of the cross-border CBDC pilot studies to date have (understandably) adopted the technical designs provided by enterprise distributed ledger platforms. However, some of these designs make tradeoffs regarding privacy, efficiency, and/or security. Whether these tradeoffs are acceptable is a matter of policy, and requires coordination between different regulators and central banks. In view of these implications—and some of the corresponding tensions that arise—we argue that the US and the EU should work together alongside other partners to create the technological and regulatory environment to enable privacy-preserving cross-border CBDCs. The US and the EU should seize the emergence of CBDCs as an opportunity to finally establish a transatlantic privacy framework, and clarify its interplay with the prevention of money laundering and financing of terrorism (AML/CFT/CPF). More broadly, both should harness the clout of their combined financial systems to develop digital asset regulation and standards with a global reach and democratic values. These regulatory developments would not only streamline regulatory guidelines, but they could also directly impact and ease the technical development of a cross-border CBDC. [less ▲]

Detailed reference viewed: 57 (2 UL)
Full Text
Peer Reviewed
See detailPredictors of cyberchondria during the COVID-19 pandemic: A supervised machine learning approach
Infanti, Alexandre UL; Starcevic, Vladan; Schimmenti, Adriano et al

in Journal of Behavioral Addictions (2022, August 03)

Background and aims: Cyberchondria is characterized by repeated and compulsive online searches for health information, resulting in increased health anxiety and distress. This behavior has been considered ... [more ▼]

Background and aims: Cyberchondria is characterized by repeated and compulsive online searches for health information, resulting in increased health anxiety and distress. This behavior has been considered an emerging public health issue, which may have been exacerbated by the COVID-19 pandemic. The present study aimed to investigate changes in the severity of cyberchondria during the pandemic and identify predictors of cyberchondria at this time. Method: Self-reported data on cyberchondria severity (before and during the pandemic), attachment style, impulsivity traits, somatic symptoms, COVID-19-related fears, health anxiety, and intolerance of uncertainty were collected from 725 participants using an online survey distributed in French-speaking European countries during the first wave of the COVID-19 pandemic. Results: COVID-19 pandemic affected various facets of cyberchondria: cyberchondria-related distress and interference with functioning increased, whereas the reassurance facet of cyberchondria decreased. Using supervised machine learning regression analyses, the specific COVID-19-related fears and health anxiety emerged as the strongest predictors of cyberchondria-related distress and interference with functioning during the pandemic. Conclusions: These findings provide evidence about the impact of the COVID-19 pandemic on cyberchondria and identify factors that should be considered in efforts to prevent and manage cyberchondria at times of public health crises. In addition, the findings have implications for the conceptualization and future assessment of cyberchondria. [less ▲]

Detailed reference viewed: 168 (6 UL)
Full Text
Peer Reviewed
See detailData Protection and Consenting Communication Mechanisms: Current Proposals and Challenges
Human, Soheil; Degeling, Martin; Santos, Christiana et al

in IEEE eXplore (2022, June 06)

Data Protection and Consenting Communication Mechanisms (DPCCMs) have the potential of becoming one of the most fundamental means of protecting humans’ privacy and agency. However, they are yet to be ... [more ▼]

Data Protection and Consenting Communication Mechanisms (DPCCMs) have the potential of becoming one of the most fundamental means of protecting humans’ privacy and agency. However, they are yet to be improved, adopted and enforced. In this paper, based on the results of a technical document analysis and an expert study, we we identify some of the main technical factors that can be comparison factors between some of the main interdisciplinary challenges of a Human-centric, Accountable, Lawful, and Ethical practice of personal data processing on the Internet and discuss whether the current DPCCMs proposal can contribute towards their resolution. In particular, we discuss the two current open specifications, i.e. the Advanced Data Protection Control (ADPC) and the Global Privacy Control (GPC) based on the identified challenges. [less ▲]

Detailed reference viewed: 130 (12 UL)
Full Text
Peer Reviewed
See detailA Variant of Concurrent Constraint Programming on GPU
Talbot, Pierre UL; Pinel, Frederic UL; Bouvry, Pascal UL

in Proceedings of the AAAI Conference on Artificial Intelligence (2022, June), 36(4), 3830-3839

The number of cores on graphical computing units (GPUs) is reaching thousands nowadays, whereas the clock speed of processors stagnates. Unfortunately, constraint programming solvers do not take advantage ... [more ▼]

The number of cores on graphical computing units (GPUs) is reaching thousands nowadays, whereas the clock speed of processors stagnates. Unfortunately, constraint programming solvers do not take advantage yet of GPU parallelism. One reason is that constraint solvers were primarily designed within the mental frame of sequential computation. To solve this issue, we take a step back and contribute to a simple, intrinsically parallel, lock-free and formally correct programming language based on concurrent constraint programming. We then re-examine parallel constraint solving on GPUs within this formalism, and develop Turbo, a simple constraint solver entirely programmed on GPUs. Turbo validates the correctness of our approach and compares positively to a parallel CPU-based solver. [less ▲]

Detailed reference viewed: 80 (8 UL)
Full Text
Peer Reviewed
See detailTheme Track - Valuing the qualitative in design and data
Lockton, Dan; Lallemand, Carine UL; Menheere, Daphne et al

in Proceedings of DRS 2022 (2022, June)

The DRS 2022 track ‘Valuing the Qualitative in Design and Data’ features eleven accepted papers on topics including visualisation and physicalisation of qualitative data, the use of materials in this ... [more ▼]

The DRS 2022 track ‘Valuing the Qualitative in Design and Data’ features eleven accepted papers on topics including visualisation and physicalisation of qualitative data, the use of materials in this context, practical applications in design and education, and applications in personal informatics. In this editorial, the track chairs introduce the track, and the reasoning behind it, together with a short introduction to the papers. [less ▲]

Detailed reference viewed: 58 (3 UL)
Full Text
Peer Reviewed
See detailMEC-assisted Dynamic Geofencing for 5G-enabled UAV
Bera, Abhishek UL; Sanchez-Cuevas, Pedro J.; Olivares-Mendez, Miguel Angel

in IEEE Wireless Communications and Networking Conference (2022, May 16)

5G-enabled UAV-based services have become popular for civilian applications. At the same time, certain no-fly zones will be highly dynamic, e.g. accident areas, large outdoor public events, VIP convoys ... [more ▼]

5G-enabled UAV-based services have become popular for civilian applications. At the same time, certain no-fly zones will be highly dynamic, e.g. accident areas, large outdoor public events, VIP convoys etc. An appropriate geofencing algorithm is required to avoid the no-fly zone in such scenarios. However, it is challenging to execute a high computing process such as a geofencing algorithm for a resource constraint UAV. This paper proposes an architecture and a geofencing algorithm for 5G-enabled UAV using Mobile Edge Computing (MEC). Also, the 5G-enabled UAV must fly within the coverage area during a mission. Hence, there must be an optimal trade-off between 5G coverage and distance to travel to design a new trajectory for a 5G-enabled UAV. To this end, we propose a cost minimization problem to generate a new trajectory while a no-fly zone exists. Specifically, we design a cost function considering 5G coverage and the velocity of the UAV. Then, we propose a geofencing algorithm running at the MEC by adopting the fast marching method (FMM) to generate a new trajectory for the UAV. Finally, a numerical example shows how the proposed geofencing algorithm generates an optimal trajectory for a UAV to avoid a dynamically created no-fly zone while on the mission. [less ▲]

Detailed reference viewed: 75 (25 UL)
Full Text
Peer Reviewed
See detailIntegrating technology, education and practice to change energy behaviours in schools
Doherty, Edelle; Brychkov, Dmitry; Romero Herrera, Natalia et al

in CLIMA 2022 conference (2022, May)

Schools are learning communities where multiple stakeholders can collaborate to learn about energy efficiency, including via formal curricula, non-formal learning and day-to-day practices. Furthermore, by ... [more ▼]

Schools are learning communities where multiple stakeholders can collaborate to learn about energy efficiency, including via formal curricula, non-formal learning and day-to-day practices. Furthermore, by improving energy literacy among building occupants, the energy efficiency of schools can be improved. However, turning schools into learning communities rather than learning organizations is still problematic. This article details a case study realised in the form of the ENERGE project, which integrates technological, educational and practical activities in 13 post-primary schools from 6 European countries. Owing to an extensive collaboration of diverse stakeholders, the ENERGE project resulted in the origination of a learning community around energy efficiency in the schools. The outcomes of building a learning community within the ENERGE project included: capacity building (in the form of the ENERGE Committees and Teacher Network), the introduction of digital education (via the ENERGE digital platform), development of curriculum-based modules to raise energy literacy, and the establishment of a viable model for expanding ENERGE experience to other schools. The article concludes by explaining the benefits of the ENERGE approach for stakeholders. [less ▲]

Detailed reference viewed: 65 (11 UL)
Full Text
Peer Reviewed
See detailContext, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent
Doan, Xengie Cheng UL; Selzer, Annika; Rossi, Arianna UL et al

in Web Conference Companion Volume (ACM) (2022, April 26)

Being asked to consent to data sharing is a ubiquitous experience in digital services - yet it is very rare to encounter a well designed consent experience. Considering the momentum and importance of a ... [more ▼]

Being asked to consent to data sharing is a ubiquitous experience in digital services - yet it is very rare to encounter a well designed consent experience. Considering the momentum and importance of a European data space where personal information freely and easily flows across organizations, sectors and Member States, solving the long-discussed thorny issue of "how to get consent right" cannot be postponed any further. In this paper, we describe the first findings from a study based on 24 semi-structured interviews investigating participants’ expectations and opinions toward consent in a data sharing scenario with a data trustee. We analyzed various dimensions of a consent form redesigned as a comic and an infographic, including language, information design, content and the writer-reader relationship. The results provide insights into the complexity of elements that should be considered when asking individuals to freely and mindfully disclose their data, especially sensitive information. [less ▲]

Detailed reference viewed: 176 (41 UL)
Full Text
Peer Reviewed
See detailSustainability and Circular Economy in Learning Factories – Case Studies
Weyand, Astrid; Thiede, Sebastian; Mangers, Jeff UL et al

in SSRN (2022, April 11)

Since the mitigation of climate change is one of the biggest challenges to face on a global scale, the topic has become more relevant also in industrial context. Learning factories have proven to be ... [more ▼]

Since the mitigation of climate change is one of the biggest challenges to face on a global scale, the topic has become more relevant also in industrial context. Learning factories have proven to be suitable environments to address and convey competencies to tackle industrial challenges in an interactive way. Hence, several learning factories are already dealing with sustainability topics in various use cases. This paper strives to present a state of the art of sustainability and circular economy in learning factories. Therefore, a classification framework is developed based on the state of the art of several learning factories and existing literature regarding the topic. This framework is then used to systematically describe the different activities regarding sustainability and circular economy that are currently ongoing in learning factories worldwide. This can be used to get an idea about the different aspects of the topic and how to address them, but furthermore also offers assistance to identify “blind spots” which could and should be addressed in learning factories in the future. [less ▲]

Detailed reference viewed: 84 (6 UL)
Full Text
Peer Reviewed
See detailD-ViNE: Dynamic Virtual Network Embedding in Non-Terrestrial Networks
Maity, Ilora UL; Vu, Thang Xuan UL; Chatzinotas, Symeon UL et al

in IEEE Wireless Communications and Networking Conference (WCNC) (2022, April 10)

In this paper, we address the virtual network embedding (VNE) problem in non-terrestrial networks (NTNs) enabling dynamic changes in the virtual network function (VNF) deployment to maximize the service ... [more ▼]

In this paper, we address the virtual network embedding (VNE) problem in non-terrestrial networks (NTNs) enabling dynamic changes in the virtual network function (VNF) deployment to maximize the service acceptance rate and service revenue. NTNs such as satellite networks involve highly dynamic topology and limited resources in terms of rate and power. VNE in NTNs is a challenge because a static strategy under-performs when new service requests arrive or the network topology changes unexpectedly due to failures or other events. Existing solutions do not consider the power constraint of satellites and rate limitation of inter-satellite links (ISLs) which are essential parameters for dynamic adjustment of existing VNE strategy in NTNs. In this work, we propose a dynamic VNE algorithm that selects a suitable VNE strategy for new and existing services considering the time-varying network topology. The proposed scheme, D-ViNE, increases the service acceptance ratio by 8.51% compared to the benchmark scheme TS-MAPSCH. [less ▲]

Detailed reference viewed: 115 (28 UL)
Full Text
See detailSanierung erhaltenswürdiger Gebäude in der Südeifel mit regionaltypischen Bruch-steinmauerwerk im Kontext der Innendämmung
Müller, Lukas; Latz, Sebastian UL; Thewes, Andreas UL

in Bauphysiktage Kaiserslautern (2022, March 29), 5

Um eine Innendämmung, welche an Bestandsgebäuden oftmals aufgrund baurechtlicher Einschränkungen die einzige Möglichkeit zur thermischen Ertüchtigung der Fassade darstellt, entsprechend planen und ... [more ▼]

Um eine Innendämmung, welche an Bestandsgebäuden oftmals aufgrund baurechtlicher Einschränkungen die einzige Möglichkeit zur thermischen Ertüchtigung der Fassade darstellt, entsprechend planen und nachweisen zu können, sollten die bauphysikalischen Randbedingungen der Außenfassade sowie des darunterliegenden Bruchsteinmauerwerks messtechnisch erfasst und entsprechend gedeutet werden. Mit Hilfe korrekt abgeschätzter Ein-gangsparameter für notwendige, hygrothermische Berechnungen lassen sich spätere Bauschäden, welche die Folge eines fehlerhaften Sanierungskonzepts wären, weitestgehend ausschließen. Diese Studie befasst sich mit typischen Baustoffen für die „Südeifel“ (Sandstein, Schiefer und Kalkstein). An drei realen Wohngebäuden wurden entsprechende Messungen durchgeführt und deren Einfluss auf die Planung einer Innendämmmaßnahme untersucht. Die Ergebnisse wurden zusammengeführt und dienen als Grundlage für möglichst realitätsnahe, dynamische Simulationen. [less ▲]

Detailed reference viewed: 85 (2 UL)
Full Text
Peer Reviewed
See detailProvably Solving the Hidden Subset Sum Problem via Statistical Learning
Coron, Jean-Sébastien UL; Gini, Agnese UL

in Mathematical Cryptology (2022, March), 1

At Crypto ’99, Nguyen and Stern described a lattice based algorithm for solving the hidden subset sum problem, a variant of the classical subset sum problem where the n weights are also hidden. As an ... [more ▼]

At Crypto ’99, Nguyen and Stern described a lattice based algorithm for solving the hidden subset sum problem, a variant of the classical subset sum problem where the n weights are also hidden. As an application, they showed how to break the Boyko et al. fast generator of random pairs (x, g x(mod p)). The Nguyen-Stern algorithm works quite well in practice for moderate values of n, but its complexity is exponential in n. A polynomial-time variant was recently described at Crypto 2020, based on a multivariate technique, but the approach is heuristic only. In this paper, we describe a proven polynomial-time algorithm for solving the hidden subset-sum problem, based on statistical learning. In addition, we show that the statistical approach is also quite efficient in practice: using the FastICA algorithm, we can reach n = 250 in reasonable time. [less ▲]

Detailed reference viewed: 130 (15 UL)
Full Text
Peer Reviewed
See detailRetrofitting of legacy machines in the context of Industrial Internet of Things (IIoT)
Kolla, Sri Sudha Vijay Keshav UL; Machado Lourenço, Diogo UL; Plapper, Peter UL

in Procedia Computer Science (2022, February 08), 200

In the context of Industry 4.0 (I 4.0), one of the most important aspects is data, followed by the capital required to deploy advanced technologies. However, most Small and Medium Enterprises (SMEs) are ... [more ▼]

In the context of Industry 4.0 (I 4.0), one of the most important aspects is data, followed by the capital required to deploy advanced technologies. However, most Small and Medium Enterprises (SMEs) are neither data ready nor have the capital to upgrade their existing machinery. In SMEs, most of the legacy machines do not have data gathering capabilities. In this scenario, the concept of retrofitting the existing machinery with sensors and building an Industrial Internet of Things (IIoT) is more beneficial than upgrading the equipment to newer machinery. The current research paper proposes a simple architecture on retrofitting a legacy machine with external sensors for data collection and feeding the cloud-based databases for analysis/monitoring purposes. The design and functional aspects of the architecture are then tested in a laboratory environment on a drilling machine with no embedded sensors. Data related to the speed of the drill head and the bore depth are collected using newly retrofitted sensors to validate the proposed architecture. [less ▲]

Detailed reference viewed: 293 (5 UL)
Full Text
Peer Reviewed
See detailIML-GCN: Improved Multi-Label Graph Convolutional Network for Efficient yet Precise Image Classification
Singh, Inder Pal UL; Oyedotun, Oyebade UL; Ghorbel, Enjie UL et al

in AAAI-22 Workshop Program-Deep Learning on Graphs: Methods and Applications (2022, February)

In this paper, we propose the Improved Multi-Label Graph Convolutional Network (IML-GCN) as a precise and efficient framework for multi-label image classification. Although previous approaches have shown ... [more ▼]

In this paper, we propose the Improved Multi-Label Graph Convolutional Network (IML-GCN) as a precise and efficient framework for multi-label image classification. Although previous approaches have shown great performance, they usually make use of very large architectures. To handle this, we propose to combine the small version of a newly introduced network called TResNet with an extended version of Multi-label Graph Convolution Networks (ML-GCN); therefore ensuring the learning of label correlation while reducing the size of the overall network. The proposed approach considers a novel image feature embedding instead of using word embeddings. In fact, the latter are learned from words and not images making them inadequate for the task of multi-label image classification. Experimental results show that our framework competes with the state-of-the-art on two multi-label image benchmarks in terms of both precision and memory requirements. [less ▲]

Detailed reference viewed: 362 (24 UL)
Full Text
Peer Reviewed
See detailHighly Vectorized SIKE for AVX-512
Cheng, Hao UL; Fotiadis, Georgios UL; Groszschädl, Johann UL et al

in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) (2022, February), 2022(2), 41-68

It is generally accepted that a large-scale quantum computer would be capable to break any public-key cryptosystem used today, thereby posing a serious threat to the security of the Internet’s public-key ... [more ▼]

It is generally accepted that a large-scale quantum computer would be capable to break any public-key cryptosystem used today, thereby posing a serious threat to the security of the Internet’s public-key infrastructure. The US National Institute of Standards and Technology (NIST) addresses this threat with an open process for the standardization of quantum-safe key establishment and signature schemes, which is now in the final phase of the evaluation of candidates. SIKE (an abbreviation of Supersingular Isogeny Key Encapsulation) is one of the alternate candidates under evaluation and distinguishes itself from other candidates due to relatively short key lengths and relatively high computing costs. In this paper, we analyze how the latest generation of Intel’s Advanced Vector Extensions (AVX), in particular AVX-512IFMA, can be used to minimize the latency (resp. maximize the throughput) of the SIKE key encapsulation mechanism when executed on Ice LakeCPUs based on the Sunny Cove microarchitecture. We present various techniques to parallelize and speed up the base/extension field arithmetic, point arithmetic, and isogeny computations performed by SIKE. All these parallel processing techniques are combined in AVXSIKE, a highly optimized implementation of SIKE using Intel AVX-512IFMA instructions. Our experiments indicate that AVXSIKE instantiated with the SIKEp503 parameter set is approximately 1.5 times faster than the to-date best AVX-512IFMA-based SIKE software from the literature. When executed on an Intel Core i3-1005G1 CPU, AVXSIKE outperforms the x64 assembly implementation of SIKE contained in Microsoft’s SIDHv3.4 library by a factor of about 2.5 for key generation and decapsulation, while the encapsulation is even 3.2 times faster. [less ▲]

Detailed reference viewed: 191 (25 UL)
Full Text
See detailVariability-Aware Design of Space Systems: Variability Modelling, Configuration Workflow and Research Directions
Lazreg, Sami UL; Bohlachov, Vladyslav; Rana, Loveneesh UL et al

in Proceedings of VAMOS 22 (2022, February)

Detailed reference viewed: 49 (0 UL)
Full Text
Peer Reviewed
See detailYes, I do: Marrying blockchain applications with GDPR
Schellinger, Benjamin; Völter, Fabiane; Urbach, Nils et al

in Proceedings of the 55th Hawaii International Conference on System Sciences (2022, January 04)

Due to blockchains’ intrinsic transparency and immutability, blockchain-based applications are challenged by privacy regulations, such as the EU General Data Protection Regulation. Hence, scaling ... [more ▼]

Due to blockchains’ intrinsic transparency and immutability, blockchain-based applications are challenged by privacy regulations, such as the EU General Data Protection Regulation. Hence, scaling blockchain use cases to production often fails to owe to a lack of compliance with legal constraints. As current research mainly focuses on specific use cases, we aim to offer comprehensive guidance regarding the development of blockchain solutions that comply with privacy regulations. Following the action design research method, we contribute a generic framework and design principles to the research domain. In this context, we also emphasize the need for distinguishing between applications based on blockchains’ data integrity and computational integrity guarantees. [less ▲]

Detailed reference viewed: 46 (7 UL)
Full Text
Peer Reviewed
See detailA serverless distributed ledger for enterprises
Sedlmeir, Johannes UL; Wagner, Tim; Djerekarov, Emil et al

in Proceedings of the 55th Hawaii International Conference on System Sciences (2022, January 04)

Enterprises have been attracted by the capability of blockchains to provide a single source of truth for workloads that span companies, geographies, and clouds while retaining the independence of each ... [more ▼]

Enterprises have been attracted by the capability of blockchains to provide a single source of truth for workloads that span companies, geographies, and clouds while retaining the independence of each party’s IT operations. However, so far production applications have remained rare, stymied by technical limitations of existing blockchain technologies and challenges with their integration into enterprises’ IT systems. In this paper, we collect enterprises’ requirements on distributed ledgers for data sharing and integration from a technical perspective, argue that they are not sufficiently addressed by available blockchain frameworks, and propose a novel distributed ledger design that is “serverless”, i.e., built on cloud-native resources. We evaluate its qualitative and quantitative properties and give evidence that enterprises already heavily reliant on cloud service providers would consider such an approach acceptable, particularly if it offers ease of deployment, low transactional cost structure, and a combination of latency and scalability aligned with real-time IT application needs. [less ▲]

Detailed reference viewed: 26 (4 UL)
Full Text
Peer Reviewed
See detailChallenges of protecting confidentiality in social media data and their ethical import
Rossi, Arianna; Arenas Correa, Monica Patricia UL; Kocyigit, Emre UL et al

in 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (2022)

This article discussed the challenges of pseudonymizing unstructured, noisy social media data for cybersecurity research purposes and presents an open- source package developed to pseudonymize personal ... [more ▼]

This article discussed the challenges of pseudonymizing unstructured, noisy social media data for cybersecurity research purposes and presents an open- source package developed to pseudonymize personal and confidential information (i.e., personal names, companies, and locations) contained in such data. Its goal is to facilitate compliance with EU data protection obligations and the upholding of research ethics principles like the respect for the autonomy, privacy and dignity of research participants, the social responsibility of researchers, and scientific integrity. We discuss the limitations of the pseudonymizer package, their ethical import, and the additional security measures that should be adopted to protect the confidentiality of the data. [less ▲]

Detailed reference viewed: 102 (12 UL)
Full Text
Peer Reviewed
See detailBarriers to the implementation of corporate social responsibility in a network of French retirement homes
Chehimi, Melinda; Geraudel, Mickaël UL

in Journal of the international council for small business (2022)

Detailed reference viewed: 31 (1 UL)
Full Text
Peer Reviewed
See detailBulk and surface characterisation techniques of solar absorbers: general discussion
Dale, Phillip UL; Siebentritt, Susanne UL; sood et al

in Faraday Discussions (2022)

Detailed reference viewed: 67 (1 UL)
Full Text
Peer Reviewed
See detailEfficient and Transferable Adversarial Examples from Bayesian Neural Networks
Gubri, Martin UL; Cordy, Maxime UL; Papadakis, Mike UL et al

in The 38th Conference on Uncertainty in Artificial Intelligence (2022)

An established way to improve the transferability of black-box evasion attacks is to craft the adversarial examples on an ensemble-based surrogate to increase diversity. We argue that transferability is ... [more ▼]

An established way to improve the transferability of black-box evasion attacks is to craft the adversarial examples on an ensemble-based surrogate to increase diversity. We argue that transferability is fundamentally related to uncertainty. Based on a state-of-the-art Bayesian Deep Learning technique, we propose a new method to efficiently build a surrogate by sampling approximately from the posterior distribution of neural network weights, which represents the belief about the value of each parameter. Our extensive experiments on ImageNet, CIFAR-10 and MNIST show that our approach improves the success rates of four state-of-the-art attacks significantly (up to 83.2 percentage points), in both intra-architecture and inter-architecture transferability. On ImageNet, our approach can reach 94% of success rate while reducing training computations from 11.6 to 2.4 exaflops, compared to an ensemble of independently trained DNNs. Our vanilla surrogate achieves 87.5% of the time higher transferability than three test-time techniques designed for this purpose. Our work demonstrates that the way to train a surrogate has been overlooked, although it is an important element of transfer-based attacks. We are, therefore, the first to review the effectiveness of several training methods in increasing transferability. We provide new directions to better understand the transferability phenomenon and offer a simple but strong baseline for future work. [less ▲]

Detailed reference viewed: 95 (9 UL)
Full Text
Peer Reviewed
See detailNovel chalcogenides, pnictides and defecttolerant semiconductors: general discussion
Dale, Phillip UL; siebentritt; Sood, Mohit UL et al

in Faraday Discussions (2022)

Detailed reference viewed: 78 (3 UL)
Full Text
Peer Reviewed
See detailNon-Admissibility in abstract argumentation
Dvorak, Wolfgang; Rienstra, Tjitze; van der Torre, Leon UL et al

in Frontiers in Artificial Intelligence and Applications (2022), 353

In this paper, we give an overview of several recent proposals for non-Admissible non-naive semantics for abstract argumentation frameworks. We highlight the similarities and differences between weak ... [more ▼]

In this paper, we give an overview of several recent proposals for non-Admissible non-naive semantics for abstract argumentation frameworks. We highlight the similarities and differences between weak admissibility-based approaches and undecidedness-blocking approaches using examples and principles as well as a study of their computational complexity. We introduce a kind of strengthened undecidedness-blocking semantics combining some of the distinctive behaviours of weak admissibility-based semantics with the lower complexity of undecidedness-blocking approaches. We call it loop semantics, because in our new semantics, an argument can only be undecided if it is part of a loop of undecided arguments. Our paper shows how a principle-based approach and a complexity-based approach can be used in tandem to further develop the foundations of formal argumentation. [less ▲]

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailSparsification and Optimization for Energy-Efficient Federated Learning in Wireless Edge Networks
Lei, Lei; Yuan, Yaxiong; Yang, Yang et al

in IEEE (2022)

Federated Learning (FL), as an effective decentral- ized approach, has attracted considerable attention in privacy- preserving applications for wireless edge networks. In practice, edge devices are ... [more ▼]

Federated Learning (FL), as an effective decentral- ized approach, has attracted considerable attention in privacy- preserving applications for wireless edge networks. In practice, edge devices are typically limited by energy, memory, and computation capabilities. In addition, the communications be- tween the central server and edge devices are with constrained resources, e.g., power or bandwidth. In this paper, we propose a joint sparsification and optimization scheme to reduce the energy consumption in local training and data transmission. On the one hand, we introduce sparsification, leading to a large number of zero weights in sparse neural networks, to alleviate devices’ computational burden and mitigate the data volume to be uploaded. To handle the non-smoothness incurred by sparsification, we develop an enhanced stochastic gradient descent algorithm to improve the learning performance. On the other hand, we optimize power, bandwidth, and learning parameters to avoid communication congestion and enable an energy-efficient transmission between the central server and edge devices. By collaboratively deploying the above two components, the numerical results show that the overall energy consumption in FL can be significantly reduced, compared to benchmark FL with fully-connected neural networks. [less ▲]

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailMULTI LABEL IMAGE CLASSIFICATION USING ADAPTIVE GRAPH CONVOLUTIONAL NETWORKS (ML-AGCN)
Singh, Inder Pal UL; Ghorbel, Enjie UL; Oyedotun, Oyebade UL et al

in IEEE International Conference on Image Processing (2022)

In this paper, a novel graph-based approach for multi-label image classification called Multi-Label Adaptive Graph Convolutional Network (ML-AGCN) is introduced. Graph-based methods have shown great ... [more ▼]

In this paper, a novel graph-based approach for multi-label image classification called Multi-Label Adaptive Graph Convolutional Network (ML-AGCN) is introduced. Graph-based methods have shown great potential in the field of multi-label classification. However, these approaches heuristically fix the graph topology for modeling label dependencies, which might be not optimal. To handle that, we propose to learn the topology in an end-to-end manner. Specifically, we incorporate an attention-based mechanism for estimating the pairwise importance between graph nodes and a similarity-based mechanism for conserving the feature similarity between different nodes. This offers a more flexible way for adaptively modeling the graph. Experimental results are reported on two well-known datasets, namely, MS-COCO and VG-500. Results show that ML-AGCN outperforms state-of-the-art methods while reducing the number of model parameters. [less ▲]

Detailed reference viewed: 103 (10 UL)
Full Text
Peer Reviewed
See detailDynamic Deontic Logic for Permitted Announcements
Li, Xu UL; Gabbay, Dov M. UL; Markovich, Réka UL

in 19th International Conference on Principles of Knowledge Representation and Reasoning, KR 2022 (2022)

In this paper, we introduce and study a dynamic deontic logic for permitted announcements. In our logic framework, it is permitted to announce something if announcing it would not lead to forbidden ... [more ▼]

In this paper, we introduce and study a dynamic deontic logic for permitted announcements. In our logic framework, it is permitted to announce something if announcing it would not lead to forbidden knowledge. It is shown that the logic is not compact, and we propose a sound and weakly complete Hilbert-style axiomatisation. We also study the computational complexity of the model checking problem and the decidability of the satisfiability problem. Finally, we introduce a neighbourhood semantics with a strongly complete axiomatisation. [less ▲]

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailValue-based practical reasoning: Modal Logic + Argumentation
Luo, Jieting; Liao, Beishui; Gabbay, Dov M. UL

in Frontiers in Artificial Intelligence and Applications (2022), 353

Autonomous agents are supposed to be able to finish tasks or achieve goals that are assigned by their users through performing a sequence of actions. Since there might exist multiple plans that an agent ... [more ▼]

Autonomous agents are supposed to be able to finish tasks or achieve goals that are assigned by their users through performing a sequence of actions. Since there might exist multiple plans that an agent can follow and each plan might promote or demote different values along each action, the agent should be able to resolve the conflicts between them and evaluate which plan he should follow. In this paper, we develop a logic-based framework that combines modal logic and argumentation for value-based practical reasoning with plans. Modal logic is used as a technique to represent and verify whether a plan with its local properties of value promotion or demotion can be followed to achieve an agent's goal. We then propose an argumentation-based approach that allows an agent to reason about his plans in the form of supporting or objecting to a plan using the verification results. [less ▲]

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailEvaluation of Artificial Creativity Using Human Creativity Tests: A Scoping Review
Vallecalle, Jeanine-Estelle; Gubenko, Alla; Houssemand, Claude UL

in Proceedings of AIFA 2022 (2022)

Detailed reference viewed: 43 (4 UL)
Full Text
Peer Reviewed
See detailCase-Based Reasoning via Comparing the Strength Order of Features
Yu, Liuwen UL; Gabbay, Dov M. UL

in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2022), 13283 LNAI

Case-based reasoning (CBR) is broadly speaking a method of giving a verdict/decision on a new case query by comparing it with verdicts/decisions of known similar cases. Similarity of cases is determined ... [more ▼]

Case-based reasoning (CBR) is broadly speaking a method of giving a verdict/decision on a new case query by comparing it with verdicts/decisions of known similar cases. Similarity of cases is determined either by best distance of the query case from the known cases and recently also using argumentation. The approach of this paper is not to rely on similarity or argumentation, but to use the entire set of known cases and their known verdicts to define the relative strength and importance of all the features involved in these cases. We then decide the verdict for the new case based on the strength of the features appearing in it. [less ▲]

Detailed reference viewed: 40 (5 UL)
Full Text
Peer Reviewed
See detailCubeSat-CDT: A Cross-Domain Dataset for 6-DoF Trajectory Estimation of a Symmetric Spacecraft
Mohamed Ali, Mohamed Adel UL; Rathinam, Arunkumar UL; Gaudilliere, Vincent UL et al

in Proceedings of the 17th European Conference on Computer Vision Workshops (ECCVW 2022) (2022)

This paper introduces a new cross-domain dataset, CubeSat- CDT, that includes 21 trajectories of a real CubeSat acquired in a labora- tory setup, combined with 65 trajectories generated using two ... [more ▼]

This paper introduces a new cross-domain dataset, CubeSat- CDT, that includes 21 trajectories of a real CubeSat acquired in a labora- tory setup, combined with 65 trajectories generated using two rendering engines – i.e. Unity and Blender. The three data sources incorporate the same 1U CubeSat and share the same camera intrinsic parameters. In ad- dition, we conduct experiments to show the characteristics of the dataset using a novel and efficient spacecraft trajectory estimation method, that leverages the information provided from the three data domains. Given a video input of a target spacecraft, the proposed end-to-end approach re- lies on a Temporal Convolutional Network that enforces the inter-frame coherence of the estimated 6-Degree-of-Freedom spacecraft poses. The pipeline is decomposed into two stages; first, spatial features are ex- tracted from each frame in parallel; second, these features are lifted to the space of camera poses while preserving temporal information. Our re- sults highlight the importance of addressing the domain gap problem to propose reliable solutions for close-range autonomous relative navigation between spacecrafts. Since the nature of the data used during training impacts directly the performance of the final solution, the CubeSat-CDT dataset is provided to advance research into this direction. [less ▲]

Detailed reference viewed: 126 (19 UL)
Full Text
Peer Reviewed
See detailWhat if data protection embraced foresight and speculative design?
Rossi, Arianna UL; Chatellier, Regis; Leucci, Stefano et al

in DRS2022: Bilbao (2022)

Due to rapid technological advancements and the growing “datafication” of our societies, individuals’ privacy constitutes an increasingly explored speculative space for regulators, researchers ... [more ▼]

Due to rapid technological advancements and the growing “datafication” of our societies, individuals’ privacy constitutes an increasingly explored speculative space for regulators, researchers, practitioners, designers and artists. This article reports two experiences at a national and an international data protection authority (i.e., the Commission Nationale de l'Informatique et des Libertés - CNIL - and the European Data Protection Supervisor - EDPS - respectively), where foresight methods and speculative design are employed in policy-making with the goal of anticipating technological trends, their implications for society and their impact on regulations, as well as the effects of existing and upcoming laws on emerging technologies. Such initiatives can enhance strategic proactive abilities, raise public awareness of privacy issues and engender a participatory approach to the design of policies. They can also inspire the research, education and practice of legal design. [less ▲]

Detailed reference viewed: 40 (5 UL)
Full Text
Peer Reviewed
See detailXAI and philosophical work on explanation: A roadmap
Knoks, Aleks UL; Raleigh, Thomas UL

in Proceedings of 1st Workshop on Bias, Ethical AI, Explainability and the Role of Logic and Logic Programming (2022), 3319

What Deep Neural Networks (DNNs) can do is impressive, yet they are notoriously opaque. Responding to the worries associated with this opacity, the field of XAI has produced a plethora of methods ... [more ▼]

What Deep Neural Networks (DNNs) can do is impressive, yet they are notoriously opaque. Responding to the worries associated with this opacity, the field of XAI has produced a plethora of methods purporting to explain the workings of DNNs. Unsurprisingly, a whole host of questions revolves around the notion of explanation central to this field. This note provides a roadmap of the recent work that tackles these questions from the perspective of philosophical ideas on explanations and models in science. [less ▲]

Detailed reference viewed: 135 (6 UL)
Full Text
Peer Reviewed
See detailTransforming IoT Data Preprocessing: A Holistic, Normalized and Distributed Approach
Tawakuli, Amal UL; Kaiser, Daniel UL; Engel, Thomas UL

in The Fifth International Workshop on Data: Acquisition To Analysis (2022)

Data preprocessing is an integral part of Artificial Intelligence (AI) pipelines. It transforms raw data into input data that fulfill algorithmic criteria and improve prediction accuracy. As the adoption ... [more ▼]

Data preprocessing is an integral part of Artificial Intelligence (AI) pipelines. It transforms raw data into input data that fulfill algorithmic criteria and improve prediction accuracy. As the adoption of Internet of Things (IoT) gains more momentum, the data volume generated from the edge is exponentially increasing that far exceeds any expansion of infrastructure. Social responsibilities and regulations (e.g., GDPR) must also be adhered when handling IoT data. In addition, we are currently witnessing a shift towards distributing AI to the edge. The aforementioned reasons render the distribution of data preprocessing to the edge an urgent requirement. In this paper, we introduce a modern data preprocessing framework that consists of two main parts. Part1 is a design tool that reduces the complexity and costs of the data preprocessing phase for AI via generalization and normalization. The design tool is a standard template that maps specific techniques into abstract categories and highlights dependencies between them. In addition, it presents a holistic notion of data preprocessing that is not limited to data cleaning. The second part is an IoT tool that adopts the edge-cloud collaboration model to progressively improve the quality of the data. It includes a synchronization mechanism that ensures adaptation to changes in data characteristics and a coordination mechanism that ensures correct and complete execution of preprocessing plans between the cloud and the edge. The paper includes an empirical analysis of the framework using a developed prototype and an automotive use-case. Our results demonstrate reductions in resource consumption (e.g., energy, bandwidth) while maintaining the value and integrity of the data. [less ▲]

Detailed reference viewed: 70 (1 UL)
Full Text
Peer Reviewed
See detailBicycle Sharing System Using an IoT Network
Mayor Puyol, Juan Luis; Monzon Baeza, Victor UL

in 2021 Global Congress on Electrical Engineering (GC-ElecEng) (2021, December)

Detailed reference viewed: 19 (3 UL)
Full Text
Peer Reviewed
See detailUser Grouping for Non-Coherent DPSK Massive SIMO with Heterogeneous Propagation Conditions
Monzon Baeza, Victor UL; Garcia Armada, Ana

in 2021 Global Congress on Electrical Engineering (GC-ElecEng) (2021, December)

Detailed reference viewed: 32 (4 UL)
Full Text
Peer Reviewed
See detailEr ist Prinz. – Mehr noch: Er ist Mensch! Er ist Stimmbürger. Stimmrecht des Monarchen als Dispersionsprisma einer rechtswissenschaftlichen Monarchieanalyse
Heuschling, Luc UL

in Zeitschrift für Offentliches Recht (2021, December), 76(4), 1241-1289

In the literature on comparative constitutional law and constitutional theory, monarchies are, if they attract any attention at all, most frequently analyzed from the perspective of the monarch’s ... [more ▼]

In the literature on comparative constitutional law and constitutional theory, monarchies are, if they attract any attention at all, most frequently analyzed from the perspective of the monarch’s political power, after its more or less extensive “neutralization” in the name of the constitutional ideals of Enlightenment. Yet this classic approach, whose focus lies on the State organ’s competencies and the discretion of its royal incumbent, is incomplete as it ignores a second, increasingly important facet of the modernization process of monarchies: To what extent do Royals, including the monarch, have fundamental rights as individuals, as “human beings”? This paper considers in particular the even-more-overlooked issue of their political rights (right to vote, right to stand for election, and the right to use the instruments of direct democracy). The issue, which is a very old one, having being addressed first by Sieyès in his famous 1789 speech on royal veto and by the French Constitution of 1791, is far from being odd or futile. In some jurisdictions, like in Japan (1945), Luxembourg (2004-5), Liechtenstein (2002-3) or in Thailand (2019), it was at the core of quite controversial public debates which, eventually, lead to totally divergent outcomes. Beyond its (relative) importance in practice, it is a key parameter for theoretical purposes: combined with the criteria of the dualistic state organization, it provides a deeper insight into the complex structure of those regimes mixing, in various ways, both monarchical and democratic elements. This article sheds light on this new research field, starting with a broad historical and comparative survey, before presenting a typology in order to tackle the startling diversity of legal solutions. [less ▲]

Detailed reference viewed: 170 (20 UL)
Full Text
Peer Reviewed
See detailCookie Banners, What’s the Purpose? Analyzing Cookie Banner Text Through a Legal Lens
Santos, Cristiana; Rossi, Arianna UL; Sanchez Chamorro, Lorena UL et al

in Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21) (2021, November 15)

A cookie banner pops up when a user visits a website for the first time, requesting consent to the use of cookies and other trackers for a variety of purposes. Unlike prior work that has focused on ... [more ▼]

A cookie banner pops up when a user visits a website for the first time, requesting consent to the use of cookies and other trackers for a variety of purposes. Unlike prior work that has focused on evaluating the user interface (UI) design of cookie banners, this paper presents an in-depth analysis of what cookie banners say to users to get their consent. We took an interdisciplinary approach to determining what cookie banners should say. Following the legal requirements of the ePrivacy Directive (ePD) and the General Data Protection Regulation (GDPR), we manually annotated around 400 cookie banners presented on the most popular English-speaking websites visited by users residing in the EU. We focused on analyzing the purposes of cookie banners and how these purposes were expressed (e.g., any misleading or vague language, any use of jargon). We found that 89% of cookie banners violated applicable laws. In particular, 61% of banners violated the purpose specificity requirement by mentioning vague purposes, including “user experience enhancement”. Further, 30% of banners used positive framing, breaching the freely given and informed consent requirements. Based on these findings, we provide recommendations that regulators can find useful. We also describe future research directions. [less ▲]

Detailed reference viewed: 161 (24 UL)
Full Text
See detailSolar-Aerodynamic Formation Flight for 5G Experiments
Thoemel, Jan UL; Querol, Jorge UL; Bokal, Zhanna UL et al

in Proceedings of the 12th European CubeSatSymposium (2021, November 15)

Detailed reference viewed: 130 (28 UL)
See detailGlobal land dampness characterization using reflectometry by students (GOLDCREST): mission and CubeSat design
Asadi, Niloofar; Gholami-Boroujeni, Farzaneh; Gogoi, Bishwajit et al

in Proceedings of the 12th European CubeSat symposium (2021, November 15)

Detailed reference viewed: 161 (16 UL)
Full Text
Peer Reviewed
See detailComparing software frameworks of Augmented Reality solutions for manufacturing
Kolla, Sri Sudha Vijay Keshav UL; Sanchez, Andre UL; Plapper, Peter UL

in Procedia Manufacturing (2021, November 03), 55

Augmented reality (AR) is a technology that allows overlaying of virtual elements on top of the physical environment. This enhances the perception and conveys additional information to the user. With the ... [more ▼]

Augmented reality (AR) is a technology that allows overlaying of virtual elements on top of the physical environment. This enhances the perception and conveys additional information to the user. With the emergence of industry 4.0 concepts in manufacturing landscape, AR found its way to improve existing Human-Machine Interfaces (HMI) on the shop-floor. The industrial setting has a wide variety of application opportunities from AR, ranging from training and digital work instructions to quality inspection and remote maintenance. Even though its implementation in the industry is rising in popularity, it is still mainly restricted to large companies due the limited availability of resources in Small and Medium Size Enterprises (SME). However, SMEs can benefit from AR solutions in its production processes. Therefore, this research aims to develop and present the results of comparison of two simple and cost-effective AR software frameworks for Hand Held Device (HHD) and a Head Mounted Device (HMD), which can be applied for developing AR applications for manufacturing. Two AR applications are developed using these software frameworks which are presented in the case study section. Android device is chosen as a HHD and HoloLens is the HMD used in the case study. The development structure can be reproduced by a wider range of enterprises with diverse needs and resource availability. [less ▲]

Detailed reference viewed: 103 (10 UL)
Full Text
Peer Reviewed
See detailLongitudinal Relations Between Views on Aging and Perceived Stress: Evidence for Mutual Associations
Wahl, Hans-Werner; Kornadt, Anna Elena UL; Wettstein, Markus

in Innovation in Aging (2021, November), 5(Supplement_1), 287-287

We investigated the reciprocal longitudinal relation between perceived stress and three established domains of views on aging (VoA): (1) subjective age; (2) attitude toward own aging [ATOA]; and (3) aging ... [more ▼]

We investigated the reciprocal longitudinal relation between perceived stress and three established domains of views on aging (VoA): (1) subjective age; (2) attitude toward own aging [ATOA]; and (3) aging-related cognitions including social loss, physical decline, and continuous growth. We also examined the potentially moderating role of chronological age. Data of the German Ageing Survey, comprising two measurement occasions (2014 and 2017) and a sample of 4,588 individuals aged between 40 and 95 years, were analyzed. Controlling for socio-demographic and health-related indicators, cross-lagged models indicated mutual longitudinal relations between VoA and stress. Whether the pathway from stress to VoA or the opposite pathway was stronger varied depending on the VoA considered. With increasing age, most VoA domains were less strongly associated with subsequent perceived stress. Our findings suggest that less favorable VoA predict higher perceived subsequent stress, but they are also preceded and predicted by higher levels of perceived stress. [less ▲]

Detailed reference viewed: 58 (0 UL)
Full Text
Peer Reviewed
See detailCorrelates of resilience of older people in times of crisis
Albert, Isabelle UL; Hoffmann, Martine; Murdock, Elke UL et al

in Innovation in Aging (2021, November), 5(S 1), 723

Since the beginning of the Covid-19 pandemic, efforts have been made to shield older adults from exposure to the virus due to an age-related higher risk for severe health outcomes. While a reduction of in ... [more ▼]

Since the beginning of the Covid-19 pandemic, efforts have been made to shield older adults from exposure to the virus due to an age-related higher risk for severe health outcomes. While a reduction of in-person contacts was necessary in particular during the first months of the pandemic, concerns about the immediate and longer-term secondary effects of these measures on subjective well-being were raised. In the present study, we focused on self-reported resilience of older people in a longitudinal design to examine risk and protective factors in dealing with the restrictions. Data from independently living people aged 60+ in Luxembourg were collected via a telephone/online survey after the first lockdown in June (N = 611) and September/October 2020 (N = 523), just before the second pandemic wave made restrictions necessary again. Overall, results showed an increase in life-satisfaction from T1 to T2, although life-satisfaction was still rated slightly lower than before the crisis. Also, about a fifth of participants indicated at T2 difficulties to recover from the crisis. Participants who reported higher resilience to deal with the Covid-19 crisis at T2 showed higher self-efficacy, agreed more strongly with measures taken by the country and felt better informed about the virus. In contrast, participants who reported more difficulties in dealing with the pandemic, indicated reduced social contacts to family and friends at T2, and also felt lonelier. Results will be discussed applying a life-span developmental and systemic perspective on risk and protective factors in dealing with the secondary impacts of the pandemic. [less ▲]

Detailed reference viewed: 113 (3 UL)
Full Text
Peer Reviewed
See detailExploring the Relationship Between Subjective Age and Worry for Older Adults in Times of a Pandemic
Tingvold, Maiken UL; Albert, Isabelle UL; Murdock, Elke UL et al

in Innovation in Aging (2021, November), 5(Supplement_1), 593-593

Given the role of age as a risk factor in the covid pandemic, we examined the longitudinal cross-lagged relationship between subjective age and Covid-related worry, and possible moderators of this ... [more ▼]

Given the role of age as a risk factor in the covid pandemic, we examined the longitudinal cross-lagged relationship between subjective age and Covid-related worry, and possible moderators of this relationship. Data were obtained at two-time points (June and October 2020) by a phone/online survey, from N = 611 older participants (Mage = 69.92 years). Participants felt on average 10 and 8.5 years younger than their chronological ages at the two-time points, respectively. Younger subjective age at T1 increased the level of worry at T2 irrespective of age, perceived control and subjective health. Higher worry increased subjective age at T2, but only for those with worse subjective health. Our results show that subjective age and Covid-related worry interact over time. This relation needs to be explored further in order to understand the relationship between subjective age and well-being especially, but not only in the pandemic context. [less ▲]

Detailed reference viewed: 73 (5 UL)
Full Text
Peer Reviewed
See detailFrom #jobsearch to #mask: improving COVID-19 cascade prediction with spillover effects
Chen, Ninghan UL; Chen, Xihui UL; Zhong, Zhiqiang et al

in Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2021, October 12)

Detailed reference viewed: 49 (3 UL)
Full Text
Peer Reviewed
See detailLeveraging Temporal Information for 3D Trajectory Estimation of Space Objects
Mohamed Ali, Mohamed Adel UL; Ortiz Del Castillo, Miguel UL; Al Ismaeil, Kassem UL et al

in Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV) Workshops (2021, October)

Detailed reference viewed: 96 (24 UL)
Full Text
Peer Reviewed
See detailA Near-Field-based TPMS Solution for Heavy Commercial Vehicle Environement
Rida, Ahmad UL; Soua, Ridha UL; Engel, Thomas UL

in 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) proceedings (2021, September 27)

Detailed reference viewed: 52 (0 UL)
Full Text
Peer Reviewed
See detailEvaluation of TPMS Signal Propagation in a Heavy Commercial Vehicle Environement
Rida, Ahmad UL; Soua, Ridha UL; Engel, Thomas UL

in 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) proceedings (2021, September 27)

Detailed reference viewed: 62 (1 UL)
Full Text
Peer Reviewed
See detailValue Stream Mapping (VSM) to Evaluate and Visualize Interrelated Process-Chains Regarding Circular Economy
Mangers, Jeff UL; Minoufekr, Meysam UL; Plapper, Peter UL

in Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems (2021, August 31), 633

The concept of circular economy (CE) aims to close and slow resource loops without neglecting the goals of sustainable development. Recently, the concept received encouraging attention among researchers ... [more ▼]

The concept of circular economy (CE) aims to close and slow resource loops without neglecting the goals of sustainable development. Recently, the concept received encouraging attention among researchers and business experts to be a convenient solution to move away from the finite linear economy concept to a more sustainable solution. However, this change of paradigm is only possible if we consider systems in a holistic manner and can localize the preventing hurdles. Value stream mapping (VSM) is a commonly known lean method, used to develop current state visualization of product and information flows within organization, helping to seek weaknesses and improve process flows. The motivation of this paper is a new C-VSM model, which enables its users to evaluate and visualize connected process-chains regarding CE on different levels in a holistic manner. For this purpose, the traditional VSM model was adapted towards the needs and requirements of CE through the application of a new representation method, additional indicators, and an appropriated evaluation system. C-VSM is in line with the current political and industrial objectives to apply CE principles by enabling a holistic reflection and consideration of supply-chains (SCs) on different levels. The model itself is validated through an extensive cross-company case study. [less ▲]

Detailed reference viewed: 121 (20 UL)
Full Text
Peer Reviewed
See detailCholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting
Arenas Correa, Monica Patricia UL; Demirci, Huseyin UL; Lenzini, Gabriele UL

in Journal of the Association for Computing Machinery (2021, August 17), 16

Detailed reference viewed: 50 (1 UL)
Full Text
Peer Reviewed
See detailThe Quest and Hope of Majorana Zero Modes in Topological Superconductor for Fault Tolerant Quantum Computing: An Introductory Overview
Ayukaryana, Nur R.; Fauzi, Mohammad H; Hasdeo, Eddwi Hesky UL

in AIP Conference Proceedings (2021, August 10), 2382(1), 020007

Ettore Majorana, in his short life, unintendedly has uncovered the most profound problem in quantum computation by his discovery of Majorana fermion, a particle which is its own anti-particle. Owing to ... [more ▼]

Ettore Majorana, in his short life, unintendedly has uncovered the most profound problem in quantum computation by his discovery of Majorana fermion, a particle which is its own anti-particle. Owing to its non-Abelian exchange statistics, Majorana fermions may act as a qubit for a universal quantum computer which is fault-tolerant. The existence of such particle is predicted in mid-gap states (zero modes) of a topological superconductor as bound states that have a highly entangled degenerate ground state. This introductory overview will focus on the simplest theoretical proposals of Majorana fermions for topological quantum computing in superconducting systems, emphasizing the quest from the scalability problem of quantum computer to its possible solution with topological quantum computer employing non-Abelian anyons on various platforms of certain Majorana fermion signature encountered. [less ▲]

Detailed reference viewed: 76 (3 UL)
Full Text
Peer Reviewed
See detailGPU-Accelerated Mahalanobis-Average Hierarchical Clustering Analysis
Šmelko, Adam; Kratochvil, Miroslav UL; Kruliš, Martin et al

in Lecture Notes in Computer Science (2021, August), 12820

Hierarchical clustering is a common tool for simplification, exploration, and analysis of datasets in many areas of research. For data originating in flow cytometry, a specific variant of agglomerative ... [more ▼]

Hierarchical clustering is a common tool for simplification, exploration, and analysis of datasets in many areas of research. For data originating in flow cytometry, a specific variant of agglomerative clustering based Mahalanobis-average linkage has been shown to produce results better than the common linkages. However, the high complexity of computing the distance limits the applicability of the algorithm to datasets obtained from current equipment. We propose an optimized, GPU-accelerated open-source implementation of the Mahalanobis-average hierarchical clustering that improves the algorithm performance by over two orders of magnitude, thus allowing it to scale to the large datasets. We provide a detailed analysis of the optimizations and collected experimental results that are also portable to other hierarchical clustering algorithms; and demonstrate the use on realistic high-dimensional datasets. [less ▲]

Detailed reference viewed: 69 (1 UL)
Full Text
Peer Reviewed
See detailBatching CSIDH Group Actions using AVX-512
Cheng, Hao UL; Fotiadis, Georgios UL; Groszschädl, Johann UL et al

in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) (2021, August), 2021(4), 618-649

Commutative Supersingular Isogeny Diffie-Hellman (or CSIDH for short) is a recently-proposed post-quantum key establishment scheme that belongs to the family of isogeny-based cryptosystems. The CSIDH ... [more ▼]

Commutative Supersingular Isogeny Diffie-Hellman (or CSIDH for short) is a recently-proposed post-quantum key establishment scheme that belongs to the family of isogeny-based cryptosystems. The CSIDH protocol is based on the action of an ideal class group on a set of supersingular elliptic curves and comes with some very attractive features, e.g. the ability to serve as a “drop-in” replacement for the standard elliptic curve Diffie-Hellman protocol. Unfortunately, the execution time of CSIDH is prohibitively high for many real-world applications, mainly due to the enormous computational cost of the underlying group action. Consequently, there is a strong demand for optimizations that increase the efficiency of the class group action evaluation, which is not only important for CSIDH, but also for related cryptosystems like the signature schemes CSI-FiSh and SeaSign. In this paper, we explore how the AVX-512 vector extensions (incl. AVX-512F and AVX-512IFMA) can be utilized to optimize constant-time evaluation of the CSIDH-512 class group action with the goal of, respectively, maximizing throughput and minimizing latency. We introduce different approaches for batching group actions and computing them in SIMD fashion on modern Intel processors. In particular, we present a hybrid batching technique that, when combined with optimized (8 × 1)-way prime-field arithmetic, increases the throughput by a factor of 3.64 compared to a state-of-the-art (non-vectorized) x64 implementation. On the other hand, vectorization in a 2-way fashion aimed to reduce latency makes our AVX-512 implementation of the group action evaluation about 1.54 times faster than the state-of-the-art. To the best of our knowledge, this paper is the first to demonstrate the high potential of using vector instructions to increase the throughput (resp. decrease the latency) of constant-time CSIDH. [less ▲]

Detailed reference viewed: 168 (21 UL)
Full Text
Peer Reviewed
See detailUnlinkable Updatable Hiding Databases and Privacy-Preserving Loyalty Programs
Damodaran, Aditya Shyam Shankar UL; Rial, Alfredo UL

in Proceedings on Privacy Enhancing Technologies (2021, July), 2021(3), 95-121

Loyalty programs allow vendors to profile buyers based on their purchase histories, which can reveal privacy sensitive information. Existing privacy friendly loyalty programs force buyers to choose ... [more ▼]

Loyalty programs allow vendors to profile buyers based on their purchase histories, which can reveal privacy sensitive information. Existing privacy friendly loyalty programs force buyers to choose whether their purchases are linkable. Moreover, vendors receive more purchase data than required for the sake of profiling. We propose a privacy-preserving loyalty program where purchases are always unlinkable, yet a vendor can profile a buyer based on her purchase history, which remains hidden from the vendor. Our protocol is based on a new building block, an unlinkable updatable hiding database (HD), which we define and construct. HD allows the vendor to initialize and update databases stored by buyers that contain their purchase histories and their accumulated loyalty points. Updates are unlinkable and, at each update, the database is hidden from the vendor. Buyers can neither modify the database nor use old versions of it. Our construction for HD is practical for large databases. [less ▲]

Detailed reference viewed: 124 (26 UL)
Full Text
Peer Reviewed
See detailOrthogonal versus Non-Orthogonal multiplexing in Non-Coherent Massive MIMO Systems based on DPSK
Monzon Baeza, Victor UL; Garcia Armada, Ana

in 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit) (2021, July)

Detailed reference viewed: 33 (2 UL)
Full Text
Peer Reviewed
See detailComparing effectiveness of paper based and Augmented Reality instructions for manual assembly and training tasks
Kolla, Sri Sudha Vijay Keshav UL; Sanchez, Andre UL; Plapper, Peter UL

in Proceedings of the 11th Conference on Learning Factories (2021, June 24)

Augmented Reality (AR) systems have seen a rapid adaptation in both training and in virtual assembly instructions. AR systems assist the operator by enhancing user perception of reality, reducing the ... [more ▼]

Augmented Reality (AR) systems have seen a rapid adaptation in both training and in virtual assembly instructions. AR systems assist the operator by enhancing user perception of reality, reducing the defects, and lead-time. However, there is a significant lack in the existing literature to compare AR systems and conventional work instructions. The aim of this research is to provide an empirical evidence of comparing task completion time, number of errors, workload index and system usability of AR and conventional paper-based work instructions. For this purpose, we designed an experiment where participants use paper based instructions and AR instructions to assemble a planetary gearbox. The task was assessed using NASA-TLX and System Usability Scale (SUS) tests, which allowed further analysis using descriptive statistics. Moreover, the qualitative interview at the end of the experiment gave more insights about participant’s overall experience. [less ▲]

Detailed reference viewed: 203 (20 UL)
Full Text
See detailAtmospheric Re-entry Energy Storage (ARES)- A Novel concept for utilizing atmospheric re-entry energy
Pandi Perumal, Raja UL; Abbud-Madrid, Angel; Voos, Holger UL

in Proceedings of the Conference GLEX 2021 (2021, June 18)

As the aspirational goal of Mars settlement starts to slowly materialize, it is apparent that its viability hinges on the utilization of its energy and material resources. Although Mars has a thinner ... [more ▼]

As the aspirational goal of Mars settlement starts to slowly materialize, it is apparent that its viability hinges on the utilization of its energy and material resources. Although Mars has a thinner atmosphere than Earth, it still exerts large amounts of heat on entry vehicles, generating temperatures around ~1500 deg C. Therefore, the entry vehicle is covered with a thick layer of ablative heat shield to protect the inside from reaching undesired temperatures. However, the temperature on the Martian surface is significantly cold. It varies between -140 deg C and 30 deg C. One of the critical challenges in developing a settlement and operating equipment on Mars is to find adequate heat sources on its surface. The envisioned heat sources are solar energy, geothermal energy, greenhouse gases and Radioisotope Thermoelectric Generators (RTG). Although solar and possibly geothermal energy are the preferred sources for their unlimited supply, they are localized and require an elaborate infrastructure. Trapping greenhouse gases also requires extensive infrastructure. RTGs require a large amount of radioactive fuel and both the equipment and fuel have to be transported from Earth. Due to its hazardous nature, disposal/reprocessing of the fuel will be challenging. Interestingly, little to no effort has been spent to study the possibility of utilizing the large heat generated during vehicle entry. This paper proposes a novel concept to collect, store and utilize the atmospheric entry heat energy using Phase Change Materials (PCMs) obtained from the Martian moons. Mars settlement architectures suggest that Phobos and Deimos can be used to set up preliminary base camps. These moons are potentially trapped C-type asteroids and have the possibility to contain rich Lithium reserves. Lithium and its alloys have a relatively high latent heat of fusion and low density, making them an ideal PCM for this application. This concept takes advantage of the undesired heat generated during atmospheric entry to melt the PCMs. A storage system would store and insulate the melted PCM as it solidifies and heat energy is released. The utilized PCM could then be reused and consumed for a variety of purposes. With current technology limitations, the heat storage system could only store the heat energy obtained using PCMs for a few hours. While the results from ongoing research could considerably increase its efficiency, PCMs could be used as a temporary energy source in landing sites where no other energy generation infrastructure is available. Alternatively, the heat generated from PCMs could be converted to electricity using thermoelectric generators. [less ▲]

Detailed reference viewed: 180 (16 UL)
Full Text
Peer Reviewed
See detailNumerical study on the revised rules for minimum degree of shear connection in propped and unpropped steel-concrete composite beams
Odenbreit, Christoph UL; Vigneri, Valentino UL

in Proceedings of ICMS (2021, June 16)

The work presents a numerical study that focuses on steel-concrete composite beams using ductile headed stud shear connectors. The objective is to check the suitability of the proposed revised EN 1994-1-1 ... [more ▼]

The work presents a numerical study that focuses on steel-concrete composite beams using ductile headed stud shear connectors. The objective is to check the suitability of the proposed revised EN 1994-1-1 rules for the minimum degree of shear connection. Therefore, a non-linear 3D finite element model of simply supported composite beams was developed and validated against the analytical values of the plastic bending design resistance. The parametric study consists of 10 configurations where the relative slip at slab-beam interface was carefully investigated at different degrees of shear connection and propping conditions. Specifically, the slip at the minimum degree of shear connection shall not exceed the limit of 6 mm defined as the characteristic slip of ductile connector according to EN 1994-1-1. The results showed that the revised rules for unpropped beams delivers conservative results whereas one case with propped conditions exhibit a maximum slip significantly higher than 6 mm. [less ▲]

Detailed reference viewed: 99 (1 UL)
Full Text
Peer Reviewed
See detailResistance of a new type of flat shear connectors dedicated to composite columns
Chrzanowski, Maciej Piotr UL; Odenbreit, Christoph UL; Obiala, Renata UL et al

in Proceedings of ICMS (2021, June 16)

The current practice to assure composite action foresees the usage of headed studs. This type of mechanical shear connectors was developed for composite beams and only adopted for the column’s usage ... [more ▼]

The current practice to assure composite action foresees the usage of headed studs. This type of mechanical shear connectors was developed for composite beams and only adopted for the column’s usage. Application in composite columns could lead to a reduced economy, especially for heavy composite columns used in high-rise buildings. A new type of flat shear connectors was developed and characterized that allows for fully automatic application process. This secures an increased safety of the whole structure, improved performance, optimized cross-section, reduced manufacturing time and costs. The presented paper gives a short description about the development process and focuses on the proposed analytical model describing the resistance of flat shear connectors. The developed analytical model comprises the complex stress state, which is present in the highly confined concrete directly under the connectors. The assumptions and theoretical models were confirmed in complex non-linear FE simulations performed in the Abaqus software. [less ▲]

Detailed reference viewed: 93 (9 UL)
Full Text
Peer Reviewed
See detailEffective resistance of demountable shear connectors
Kozma, Andras UL; Yang, Jie UL; Odenbreit, Christoph UL

in Proceedings of ICMS (2021, June 16)

Steel-concrete composite construction is structurally efficient but is impossible to dismount where the floor slab is permanently connected to the steel beams through traditional welded studs. This ... [more ▼]

Steel-concrete composite construction is structurally efficient but is impossible to dismount where the floor slab is permanently connected to the steel beams through traditional welded studs. This contradicts the reuse and reduce aspects of the circular economy concept which has recently been introduced to the construction industry. Within the RFCS REDUCE project, several solutions have been proposed. Demountability of the composite beams using the proposed new shear connectors has been successfully demonstrated by push-out tests and full-scale beam tests. Both experiments and numerical simulations showed that the composite beams can develop plasticity even the demountable shear connectors in solid concrete slabs failed in a brittle way. To extend the scope of Eurocode 4 and avoid uneconomic elastic design, effective shear resistance of the demountable shear connectors was defined by using a newly developed algorithm, for the calculation of the plastic moment capacity of composite sections with partial shear connection. [less ▲]

Detailed reference viewed: 122 (8 UL)
Full Text
Peer Reviewed
See detailLSPnet: A 2D Localization-oriented Spacecraft Pose Estimation Neural Network
Garcia Sanchez, Albert UL; Mohamed Ali, Mohamed Adel UL; Gaudilliere, Vincent UL et al

in Proceedings of Conference on Computer Vision and Pattern Recognition Workshops (2021, June)

Being capable of estimating the pose of uncooperative objects in space has been proposed as a key asset for enabling safe close-proximity operations such as space rendezvous, in-orbit servicing and active ... [more ▼]

Being capable of estimating the pose of uncooperative objects in space has been proposed as a key asset for enabling safe close-proximity operations such as space rendezvous, in-orbit servicing and active debris removal. Usual approaches for pose estimation involve classical computer vision-based solutions or the application of Deep Learning (DL) techniques. This work explores a novel DL-based methodology, using Convolutional Neural Networks (CNNs), for estimating the pose of uncooperative spacecrafts. Contrary to other approaches, the proposed CNN directly regresses poses without needing any prior 3D information. Moreover, bounding boxes of the spacecraft in the image are predicted in a simple, yet efficient manner. The performed experiments show how this work competes with the state-of-the-art in uncooperative spacecraft pose estimation, including works which require 3D information as well as works which predict bounding boxes through sophisticated CNNs. [less ▲]

Detailed reference viewed: 285 (35 UL)
Full Text
Peer Reviewed
See detailObservability based data-fusion cascading filtering for urban network flow estimation
Rinaldi, Marco; Viti, Francesco UL

in IEEE Xplore (2021, June)

Detailed reference viewed: 41 (2 UL)