Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
See detailTechnical Report LA19.E Rev. B. Headed studs in profiled steel sheeting transverse to the beam. Investigations on design resistance of headed stud shear connectors on the basis of the Final Draft of SC4.PT3 (April 2018)
Odenbreit, Christoph UL; Vigneri, Valentino

Report (2021)

The unsafety of current design rules for novel types of open-trough deck geometries for the resistance of headed studs in profiled steel sheeting is well known [1] and it was the main reason behind the ... [more ▼]

The unsafety of current design rules for novel types of open-trough deck geometries for the resistance of headed studs in profiled steel sheeting is well known [1] and it was the main reason behind the nomination of CEN/TC250/SC4- Task SC4.T3: “Revised rules for shear connection in the presence of modern forms of profiled sheeting”. During the RFCS research project “DISCCO” (RFCS-CT-2012-00030) [1], a mechanical model was developed on the basis of a large literature study and previous studies [2, 3, 4, 5, 6] while the corresponding design equations were presented by CEN/TC250/SC4.PT3 and further enhanced during the Research Project “ShearCON” of University of Luxembourg. In order to let the current rules of EN 1994-1-1 6.6 (Eq.(2) and (3)) as unchanged as possible, the limits of its suitable field of applicability (Database B1) was investigated thoroughly by means of the statistical procedure of EN 1990 D.8 [7]. The newly proposed equations (Eq. (7) and (8)) apply only to the cases outside these limits (Database B2). In this way, the proposed solution is able to restore the level of safety to its initial value, so that the partial safety factor for the shear connection ϒV=1.25 is adequate. Conversely, the current situation (without including the new design equations) would need a much higher partial safety factor as shown below. [less ▲]

Detailed reference viewed: 81 (7 UL)
Full Text
Peer Reviewed
See detailTechnical report on data protection and privacy in smart ICT: Internet of Things: Gap analysis between scientific research and technical standardisation: Gap analysis Internet of Things
Samir Labib, Nader UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Technical report on data protection and privacy in smart ICT (2019), 1

With the emergence of new digital trends like the Internet of Things (IoT), more industry actors and technical committees pursue research in utilizing such technologies as they promise better and ... [more ▼]

With the emergence of new digital trends like the Internet of Things (IoT), more industry actors and technical committees pursue research in utilizing such technologies as they promise better and optimized management, improved energy efficiency and better quality living by facilitating a magnitude of value-added services. However, as communication, sensing and actuation become increasingly sophisticated, such promising data-driven IoT systems generate, process, and exchange larger amounts of data, some of which is privacy-sensitive and security-critical. The sustained increase in number of connected devices, catalyzed by IoT, affirms the importance of addressing data protection, privacy and security challenges, as indices of trust, to achieve market acceptance. This consequently, emphasizes the need of a solid technical and regulatory foundation to ensure trustworthiness within the IoT ecosystem. The goal of this study is to first introduce the concept of trustworthiness in IoT with its main pillars, data protection, privacy and security, and then analyze developments in research and standardization for each of these. The study presents a gap analysis on data protection, privacy and security between research and standardization, throughout which the use case of Unmanned Aerial Vehicles (UAVs) is referred to, as a promising value-added service example of mobile IoT devices. The study concludes with suggestions for future research and standardization in order to address the identified gaps. [less ▲]

Detailed reference viewed: 93 (14 UL)
Full Text
Peer Reviewed
See detailTechnical solution for data collection, data safety and data privacy legislation: experiences from the SWEET study.
Forsander, Gun; Pellinat, Martin; Volk, Michael et al

in Pediatric diabetes (2012), 13(16), 39-48

BACKGROUND: One of the most important tasks of the SWEET study is benchmarking the data collected. Information on the occurrence of the disease of diabetes, the treatment, and their outcomes in children ... [more ▼]

BACKGROUND: One of the most important tasks of the SWEET study is benchmarking the data collected. Information on the occurrence of the disease of diabetes, the treatment, and their outcomes in children from the different member states of European Union (EU) is crucial. How the collection of data is realized is essential, concerning both the technical issues and the results. The creation of SWEET Centers of Reference (CoR), all over Europe will be facilitated by the access to safe data collection, where legal aspects and privacy are ascertained. OBJECTIVE: To describe the rationale for- and the technical procedure in the data collection implementation, in the SWEET study. SUBJECTS: Selected data on all patients treated at SWEET CoR are collected. METHODS: The SWEET project data collection and management system, consists of modular components for data collection, online data interchange, and a database for statistical analysis. CONCLUSION: The SWEET study and the organization of CoR aims for the goal of offering an updated, secure, and continuous evaluation of diabetes treatment regimens for all children with diabetes in Europe. To support this goal, an appropriate and secure data management system as described in this paper has been created. [less ▲]

Detailed reference viewed: 93 (0 UL)
Full Text
See detailTechnical Sovereignty and Digital Democracy in Europe – Follower or Influencer ? A New Media Approach
Danescu, Elena UL

Scientific Conference (2022, February 04)

The digital turn has considerably impacted geopolitics in terms of power, governance and regulation, leading to a proliferation of stakeholders and networks at multiple levels (states, international ... [more ▼]

The digital turn has considerably impacted geopolitics in terms of power, governance and regulation, leading to a proliferation of stakeholders and networks at multiple levels (states, international organisations, private companies, civil society and citizens), new dynamics of competition in a transnational space that is becoming increasingly virtual, borderless and deterritorialised (cyberspace), and novel forms of learning, work and human activity. Digital technologies have also brought about a paradigm shift in information and communication systems, with the emergence of new media (online platforms, interactive websites, algorithmic decision-making ecosystems, etc.) that will have a long-term impact on social and cultural practices, interpersonal and societal relations, the public sphere and the exercise of individual and collective democracy. [less ▲]

Detailed reference viewed: 79 (0 UL)
See detailTechnical-based assessment of 21st century skills in an applied context
Greiff, Samuel UL; Funke, Joachim

Presentation (2012, October 15)

Detailed reference viewed: 59 (1 UL)
See detailTechnik im Saarbergbau - Historische Entwicklung und regionale Wirkung
Helfer, Malte UL

Book published by Akademie-Verlag (1990)

Detailed reference viewed: 94 (0 UL)
See detailTechnikwissenschaft als soziale Praxis : Über Macht und Autonomie der Aachener Eisenhüttenkunde 1870–1914
Krebs, Stefan UL

Book published by Franz steiner Verlag (2009)

Detailed reference viewed: 71 (4 UL)
Full Text
Peer Reviewed
See detailDie technische Mündigkeit von Schüler/-innen zum Ende der Sek. I im internationalen Vergleich – Entwicklung eines Testwerkinstruments und erste Ergebnisse
Fletcher, Stefan; De Vries, Marc; Max, Charles UL

in Journal of Technical Education (2018), 6(4),

An international research team jointly conceived an item development model which was used to develop a new test instrument to measure the technology literacy of secondary school students. This tool was ... [more ▼]

An international research team jointly conceived an item development model which was used to develop a new test instrument to measure the technology literacy of secondary school students. This tool was used to assess the literacy skills of 270 pupils from Germany, Switzerland, Luxembourg, the Netherlands and England. The results show that 13 to 16 year old students display a poorly developed technology literacy level only. 25 per cent of the items on average were incorrectly answered with a high certainty sentiment, which suggests, that students do not only lack relevant knowledge in the field of technology but in addition also hold a rela-tively high number of strongly built misconceptions. Interestingly, there are no major differences between countries and gender. [less ▲]

Detailed reference viewed: 126 (2 UL)
Full Text
Peer Reviewed
See detailTechnische Schutzmaßnahmen an der Schnittstelle der Interessen von Rechteinhabern und Nutzerinteressen
Jütte, Bernd Justin UL

in Taeger, Jürgen (Ed.) Big Data & Co - Neue Herausforderungen für das Informationsrecht Tagungsband Herbstakademie 2014 (2014)

Technische Schutzmaßnahmen an der Schnittstelle der Interessen von Rechteinhabern und Nutzerinteressen – u.a. die Rechtsprechung des EuGH in Nintendo v PC Box (EuGH Rs. C-355/12) Eine grundlegende ... [more ▼]

Technische Schutzmaßnahmen an der Schnittstelle der Interessen von Rechteinhabern und Nutzerinteressen – u.a. die Rechtsprechung des EuGH in Nintendo v PC Box (EuGH Rs. C-355/12) Eine grundlegende Funktion von Ureberrechten ist es, einen Ausgleich zwischen den Rechten von Autoren und anderen Rechteinhabern auf der einen Seite und Nutzern von geschützten Werken auf der anderen Seite herzustellen. Technische Schutzmaßnah-men sind ein Mittel für Rechteinhaber die Nutzung ihrer Werke einzuschränken und da-mit widerrechtliche Nutzungen zu unterbinden. Schutzmaßnahmen können jedoch auch gesetzlich erlaubte Handlungen einschränken. Das Unionsrecht nimmt mit Artikel 6 der Urheberrechtsrichtlinie (RL 2001/29/EC) die Mitgliedssaaten in die Pflicht, Rechteinhabern Rechtschutz für die Umgehung techni-scher Schutzmaßnahmen zur Verfügung zu stellen. Gleichzeitig stellt die Richtlinie klar, dass Nutzer urheberrechtlich geschützter Werke von gewissen urheberrechtlichen Schranken profitieren sollen, welche wiederrum nicht durch technische Schutzmaßnah-men praktisch eingegrenzt werden dürfen. Wie sich diese Rechtebeziehung konkret in Anwendungsfällen des Artikel 6 der Urheberrechtsrichtlinie darstellt, ist Gegenstand die-ses Papers. Während andere Aspekte der Urheberrechtsrichtlinie, zwar nicht erschöpfend, aber zu-mindest jedoch ausführlich diskutiert worden sind, ist Artikel 6 bisher wenig Aufmerk-samkeit beschieden worden. Mit Nintendo v PC Box hat der EuGH erstmals eine Frage zur Vorabentscheidung vorgelegt bekommen, die sich hauptsächlich mit technischen Schutzmaßnahmen beschäftigt. Allerdings wurden schon vorher solche Maßnahmen vom Gericht tangential diskutiert. Das jüngste Urteil lässt zumindest erahnen, wie sich Artikel 6 in das Gefüge des europäischen Urheberechte einfügen wird, und vor allem, inwieweit ein Interessenausgleich durch technischen Schutzmaßnahmen wirksam Ge-stalt annehmen könnte. Das Paper betrachtet konkret zwei Anwendungsfälle von technischen Schutzmaßnah-men, die – direkt oder indirekt – Gegenstand von Vorlagefragen vor dem Gerichtshof waren. [less ▲]

Detailed reference viewed: 83 (4 UL)
Full Text
See detailTechnische und soziale Infrastruktur
Sprenger, Birte UL

in Ermann, Ulrich; Ilieva, Margarita (Eds.) Bulgarien: Aktuelle Entwicklungen und Probleme (2006)

This book chapter deals with the Bulgarian technical and social infrastructure and its challenges.

Detailed reference viewed: 94 (1 UL)
See detailThe Techno-politics of Colour: Britain and the European Struggle for a Colour Television Standard
Fickers, Andreas UL

in Journal of British Cinema and Television (2010)

Detailed reference viewed: 251 (0 UL)
Full Text
Peer Reviewed
See detailThe Technocratic Momentum after 1945, the Development of Teaching Machines, and Sobering Results
Tröhler, Daniel UL

in Journal of Educational Media, Memory, and Society (2013), 5(2), 1-19

This article investigates the development of new teaching ideologies in the context of the technocratic ideology of the Cold War. These ideologies did not simply vanish after 1989. The catchwords were ... [more ▼]

This article investigates the development of new teaching ideologies in the context of the technocratic ideology of the Cold War. These ideologies did not simply vanish after 1989. The catchwords were “programmed instruction” and “teaching machines”, accompanied by the promise that all students would make effi cient learning progress. Although Eastern and Western states fought the Cold War over political ideologies, their teaching ideologies (perhaps surprisingly) converged. This may explain why neither the apparent failure of these educational ideologies nor the end of the Cold War led to the modifi cation of the ideologies themselves, but rather to the modifi cation of devices serving the ideologies. [less ▲]

Detailed reference viewed: 172 (12 UL)
Full Text
Peer Reviewed
See detailTechnocratic urban development: Large digital corporations as power brokers of the digital age
Carr, Constance UL; Hesse, Markus UL

in Planning Theory and Practice (2022)

Large digital corporations such as Amazon.com or Alphabet Inc. are forging their position in cities by promoting themselves as the sole providers of so-called essential urban infrastructures. In this ... [more ▼]

Large digital corporations such as Amazon.com or Alphabet Inc. are forging their position in cities by promoting themselves as the sole providers of so-called essential urban infrastructures. In this paper, we reflect on how the behaviours of these current-day ‘tech giants’ are similar to those of the mid-20th century, a time period also known for dramatic infrastructural change in North American and Europe. Specifically, we are reminded of Robert Moses and how he pushed for infrastructural change in New York City and State, which were also supposedly the height of state-of-the-art urban planning at the time. He pushed his agenda, however, by brokering power and strong-arming the urban and regional development field. We reflect on Alphabet Inc.’s project in Toronto and Amazon’s search for a second headquarters in New York City and how these LDCs were similarly armed with executive and financial power and an ability to bully the field of urban development in their own interest. Behaving as digital-age power brokers, they engaged managerial-technocratic modes of urban governance to instigate projects that ultimately failed. We argue that Alphabet’s and Amazon’s strategies not only resemble those of Moses, but that all three deploy tactics that debase planning practice itself. [less ▲]

Detailed reference viewed: 72 (5 UL)
Full Text
Peer Reviewed
See detailTechnological addictions: Conceptualisation, measurement, etiology and treatment.
Kuss, Daria J.; Billieux, Joël UL

in Addictive behaviors (2017), 64

Detailed reference viewed: 164 (2 UL)