Baumert, Anna; Mentrup, Felix Ezra; Klümper, Lisa; Sasse, Julia (2023)
Journal of Personality 92 (3), 507–514.
DOI: 10.1111/jopy.12850
Introduction: Moral courage manifests in acts intended to intervene to stopor redress witnessed moral norm violations, despite the risk of negative conse-quences for the intervener. We investigate moral courage in everyday life and askwhat personality processes are involved. Based on an extended process modelof moral courage, we derived hypotheses on cognitive and emotional processesthat should facilitate or hinder intervention. Further, we identified candidate per-sonality dispositions that should shape these processes and thereby predict whotends to intervene against others' norm violations and who does not.Methods: Using a quota-based sample of the German population (N = 1108), weconducted a personality assessment, followed by a 7-day experience samplingduring which participants reported norm violations witnessed in their daily lifeas well as their cognitive, emotional, and behavioral reactions.Results: In total, 678 participants reported 1965 norm violations and intervenedagainst 32% of them. Dispositional self-efficacy facilitated intervention by increas-ing a sense of efficacy when confronted with others' norm violations. Conversely,dispositional moral disengagement hindered intervention by reducing perceivedown responsibility.Discussion: Our findings provide novel insights into the situations affordingmoral courage in everyday life, and the personality processes that uniquely guidethis behavior.
Händel, Marion; Naujoks-Schober, Nick; Dresel, Markus (2023)
Zeitschrift für Entwicklungspsychologie und Pädagogische Psychologie 55 (2-3), 67–76.
DOI: 10.1026/0049-8637/a000273
Metacognitive monitoring is conceptualized as a situation-specific and context-dependent process that helps learners to regulate their learning. The current study builds on the idea that metacognitive monitoring can fulfil monitoring functions in different phases (when to monitor: during learning or during testing), and that it refers to several objects (what to monitor: processing or retrieval). The cross-sectional study with 184 higher-education students used a situation-specific approach and referred to students’ monitoring via monitoring strategies and monitoring judgments during test preparation and test processing. Confirmatory factor analyses indicated that monitoring via strategies and judgments can be directed at different objects. In addition, monitoring different objects was more strongly correlated within the same phase than across different phases. The study results emphasize the need for an object-specific and comprehensive consideration of metacognitive monitoring via monitoring strategies and monitoring judgments.
Buchele, Alexander (2023)
FIT 2023, Ansbach.
Sover, Alexandru (2023)
Forschungs- und Innovationstag "FIT 2023".
Hähnlein, Johannes; Küster, Anna (2023)
HMD Praxis der Wirtschaftsinformatik 60, 598-611.
DOI: 10.1365/s40702-023-00972-2
Entrepreneurship in the form of business foundations, especially start-ups, drives progress and innovation on many levels. They are currently one of the critical drivers of economic prosperity in our society. More and more economic policy measures are aimed at promoting just this. However, strong regional differences are observed in start-up activity. Thus, the support of start-ups and the development of so-called entrepreneurial ecosystems are also playing an increasingly important role in economic and regional policy. It is necessary to look at each region singularly, to identify particularities, and to determine the needs of regional actors to derive suitable measures for establishing such an ecosystem. This article examines an exemplary region for specific determinants by applying a start-up ecosystem model. Strengths, weaknesses, and potentials of the business location about its framework conditions for start-ups are identified in two group interviews (founders and supporting institutions). The results show that the numerous interactions of a start-up ecosystem are not sufficiently targeted and efficiently managed in the current structures and that relevant actors perceive the effectiveness of ecosystem elements and support measures in a differentiated manner. The study was able to provide insights for future start-up and innovation policy measures and interventions in the region studied and are thus intended to serve methodologically as a role model for the analysis of other regional start-up ecosystems.
Ermolai, Vasile; Sover, Alexandru; Lang, Anette (2023)
Materials Research Proceedings 28, 93-100.
DOI: 10.21741/9781644902479-11
In recent years the interest in finding new shape memory polymers has increased. Withal, fewer studies approached the use of regular materials such as polyethene terephthalate (PET), a widely available material. The research investigated the shape memory characteristics of regular PET 3D printed samples in two testing cycles. The recovery temperature was determined through dynamical mechanical, followed by tensile testing and heat treatment of the specimens. The results show PET has good shape memory properties, recording a slight increase in shape recovery during the second testing cycle without affecting the sample integrity. The thermal analysis of the recovered material shows that heat treatment time or/and temperature need to be improved to stabilise the PET material structure.
Sover, Alexandru (2023)
Vortrag im Rahmen des Fachforums 2023 "Kunststoffe vernetzen" der VWI HG Ansbach, 15.04.2023.
Klug, Katharina (2023)
20blue Research Institute, Blog: Expert Statement.
Busch, Christoph; Deravi, Farzin; Frings, Dinusha; Gomez-Barrero, Marta; et al, ... (2023)
IET Biometrics 12 (2), 112-128.
DOI: 10.1049/bme2.12107
Due to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse effects. From the responses received, this position paper was composed to identify ideas to re-establish free travel between the member states in the Schengen area. The paper covers the contending needs for security, open borders and fundamental rights as well as legal constraints that any technological solution must consider. A range of specific technologies for direct biometric recognition alongside complementary measures are outlined. The interrelated issues of ethical and societal considerations are also highlighted. Provided a holistic approach is adopted, it may be possible to reach a more optimal trade-off with regards to open borders while maintaining a high-level of security and protection of fundamental rights. European Association for Biometrics and its members can play an important role in fostering a shared understanding of security and mobility challenges and their solutions.
Bedenlier, Svenja; Buntins, Katja; Händel, Marion; Bond, Melissa; Marín, Victoria I. (2023)
Bedenlier, Svenja; Buntins, Katja; Händel, Marion; Bond, Melissa...
Frühjahrstagung der Sektion Medienpädagogik (DGfE) 30. - 31. März 2023 an der Leuphana-Universität Lüneburg.
Ciobanu, Romeo C.; Damian , Radu F.; Schreiner , Cristina M.; Aradoaei, Mihaela; Sover, Alexandru; Raichur, Ashok M. (2023)
Ciobanu, Romeo C.; Damian , Radu F.; Schreiner , Cristina M.; Aradoaei, Mihaela...
Polymers 2023, 15 (7), 1636.
DOI: 10.3390/polym15071636
Dielectric properties for nanocomposites with metallic fillers inside a polymer matrix were determined using CST STUDIO SUITE—Electromagnetic field simulation software followed by the free-space Nicolson–Ross–Weir procedure. The structure is randomly generated to simulate the intrinsic non-uniformity of real nanomaterials. Cubic insertions were equated to corresponding spherical particles in order to provide either the same volume index or the same exterior surface index. The energy concentration around the inserts and within the entire material was determined as useful information in practice in order to design materials tailored to avoid exceeding the field/temperature limit values. The paper successfully associated the dialectic measurements with the results from the computer simulations, which are mainly based on energetic effects in electromagnetic applications. The experimental results are comparable with the software simulation in terms of precision. The conclusions outline the practical applications of the method for both electromagnetic shielding and microwave domain/telecommunications applications.
Kruß, Marvin; Otto, Kim; Rusch, Roman (2023)
Communications 49 (4), 669-691.
DOI: 10.1515/commun-2022-0064
In times of crisis and social turbulence, the mass media play a crucial role. This becomes particularly evident in economic crises within the European Union. The (biased) way the crisis is reported shapes people’s understanding of the crisis and the parties involved. In this study, the coverage of the Greek sovereign debt crisis in the German newspapers BILD, Die Welt, Frankfurter Allgemeine Zeitung, Süddeutsche Zeitung, tageszeitung and Der Spiegel (online) is examined for the quality criteria relevance, neutrality, balance, and analytical quality. The results show that the reporting is appropriate to the relevance of the topic, but shows deficits in the criteria of balance, neutrality, and analytical quality. During the study period, coverage focuses on a small number of topics, journalists include their value judgments in news and reports. Overall, there is an obvious media bias against the Greek government’s position.
Adamchuk, Nazar; Rösch, Bernhard; Schlüter, Wolfgang; Reissner, Felix-Christian; Baumgartner, Jörg (2023)
Adamchuk, Nazar; Rösch, Bernhard; Schlüter, Wolfgang; Reissner, Felix-Christian...
Simulation Notes Europe 33, 1-8.
DOI: 10.11128/sne.33.tn.10631
Cast iron components have a good strength to weight ratio. This leads to their frequent use in the wind industry. The design of cast iron components is currently based on the use of individual simulation tools and material data that is common to all components. In order to better exploit the lightweight potential of cast iron components, it is necessary to link the simulation software tools and thus take into account local material properties already in the design phase. This is described in this paper using the example of a large casting for the wind industry
Naujoks-Schober, Nick; Dresel, Markus; Händel, Marion (2023)
Vortrag auf der 10. Tagung der Gesellschaft für Empirische Bildungsforschung (GEBF) in Essen.
Wissler, J.; Häfner, Philipp; Aberle, A.; Lörler, Nadine; Mamdouh, D.; Szwajgier, D.; Reimann, Hans-Achim (2023)
Wissler, J.; Häfner, Philipp; Aberle, A.; Lörler, Nadine; Mamdouh, D.; Szwajgier, D....
Proceedings Microscopy Conference 2023, Darmstadt, LS5.P005.
DOI: 10.5283/epub.54367
Göhringer, Jürgen; Fleischmann, Josef (2023)
Abschlussbericht Forschungsprojekt Bayerisches Staatsministerium für Wirtschaft, Landesentwicklung und Energie / VDI.
Raja, Kiran; Ramachandra, Raghavendra; Venkatesh, Sushma; Gomez-Barrero, Marta (2023)
Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Singapore, 17-56.
DOI: 10.1007/978-981-19-5288-3_2
Automated fingerprint recognition systems, while widely used, are still vulnerable to presentation attacks (PAs). The attacks can employ a wide range of presentation attack species (i.e., artifacts), varying from low-cost artifacts to sophisticated materials. A number of presentation attack detection (PAD) approaches have been specifically designed to detect and counteract presentation attacks on fingerprint systems. In this chapter, we study and analyze the well-employed Convolutional Neural Networks (CNN) with different architectures for fingerprint PAD by providing an extensive analysis of 23 different architectures in CNNs. In addition, this chapter presents a new approach introducing vision transformers for fingerprint PAD and validates it on two different public datasets, LivDet2015 and LivDet2019, used for fingerprint PAD. With the analysis of vision transformer-based F-PAD, this chapter covers both spectrum of CNNs and vision transformers to provide the reader with a one-place reference for understanding the performance of various architectures. Vision transformers provide at par results for the fingerprint PAD compared to CNNs with more extensive training duration suggesting its promising nature. In addition, the chapter presents the results for a partial open-set protocol and a true open-set protocol analysis where neither the capture sensor nor the material in the testing set is known at the training phase. With the true open-set protocol analysis, this chapter presents the weakness of both CNN architectures and vision transformers in scaling up to unknown test data, i.e., generalizability challenges.
González-Soler, Lázaro Janier; Gomez-Barrero, Marta; Patino, Jose; Kamble, Madhu; Todisco, Massimiliano; Busch, Christoph (2023)
González-Soler, Lázaro Janier; Gomez-Barrero, Marta; Patino, Jose; Kamble, Madhu...
Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Singapore, 489-519.
DOI: 10.1007/978-981-19-5288-3_18
Biometric systems have experienced a large development over the last years since they are accurate, secure and in many cases, more user convenient than traditional credential-based access control systems. In spite of their benefits, biometric systems are vulnerable to attack presentations, which can be easily carried out by a non-authorised subject without having a deep computational knowledge. This way, he/she can gain access to several applications where biometric systems are frequently deployed, such as bank accounts and smartphone unlocking. In order to mitigate such threats, we present in this work a study on the feasibility of using the Fisher Vector (FV) representation to spot unknown-attack presentations over different biometric modalities such as fingerprint, face and voice. By learning a common feature space from a set of local features, extracted from known samples, the FVs lead to the construction of reliable discriminative models which can successfully distinguish a bona fide presentation from an attack presentation. The experimental evaluation over publicly available databases (i.e. LivDets, CASIA-FASD, SiW-M and ASVspoof, among others) yields error rates outperforming most state-of-the-art algorithms for challenging scenarios where species, recipies or capture devices remain unknown.
Morales, Aythami; Fierrez, Julian; Galbally, Javier; Gomez-Barrero, Marta (2023)
Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Singapore 2, 103-121.
DOI: 10.1007/978-981-19-5288-3_5
Iris recognition technology has attracted an increasing interest in the last decades in which we have witnessed a migration from research laboratories to real-world applications. The deployment of this technology raises questions about the main vulnerabilities and security threats related to these systems. Among these threats, presentation attacks stand out as some of the most relevant and studied. Presentation attacks can be defined as the presentation of human characteristics or artifacts directly to the capture device of a biometric system trying to interfere with its normal operation. In the case of the iris, these attacks include the use of real irises as well as artifacts with different levels of sophistication such as photographs or videos. This chapter introduces iris Presentation Attack Detection (PAD) methods that have been developed to reduce the risk posed by presentation attacks. First, we summarize the most popular types of attacks including the main challenges to address. Second, we present a taxonomy of PAD methods as a brief introduction to this very active research area. Finally, we discuss the integration of these methods into iris recognition systems according to the most important scenarios of practical application.
Wissler, J.; Häfner, Philipp; Szwajgier, D.; Reimann, Hans-Achim (2023)
Biophysical Journal 122 (3), 543a-544a.
DOI: 10.1016/j.bpj.2022.11.2878
The world-wide plastics pollution into nature enters the human food chain as degradation products, influencing environmental habitat and health. Micro- and nanoplastics as foreign bodies contaminating beverages and foods on the cellular level are likely to have a long-term impact on nutrition growth, public and personal health. Nanoparticles and their spatial location are generally difficult to detect in biological specimens, especially plastic particles due to their analogous hydrocarbon-based matrix. Reliable analysis methods for the discovery of micro- and nanoplastic particles in entities are not fully established yet. We are therefore developing a correlative workflow for detecting plastics residuals in cellular tissue. We determined that light microscopy (LM) is usable for a coarse estimation of the contamination grade of plant samples. Due to its optical diffraction limit, LM rather detects nanoparticle patches than single particles, shown with fluorescent particles. Scanning electron microscopy (SEM) instead provides higher resolution, especially for single particle detection. EM sample staining is still required to depict polymerous nanoparticle specimens. Using LM and SEM data in a CLEM approach with TESCAN CORAL, discovery of contaminated plant areas is possible with single nanoparticle resolution. It reveals that nanoparticles seem to be tightly attached to the plant material. It indicates further that basic food cleaning procedures might be insufficient for particle removal. The workflow circumvents correlative sample 3D-topography issues. But insights into the plant matrix is best possible with z-information. Therefore, we additionally use focused ion beam (FIB) to determine inclusions of micro- and nanoplastics in the tissue/cellular matrix, investigating the optimal procedural approach as model for biomaterial systems. Procedural correlative microscopy provides a promising analysis method for the semiquantitative analysis of micro- and nanoparticles plant contaminations.
Hochschule Ansbach
Residenzstr. 8
91522 Ansbach