Spittal an der Drau, Austria

Carinthia University of Applied Sciences

Spittal an der Drau, Austria
Time filter
Source Type

Agency: European Commission | Branch: FP7 | Program: CP | Phase: ICT-2011.8.1 | Award Amount: 13.18M | Year: 2012

The Go-Lab project will open up remote science laboratories, their data archives, and virtual models (online labs) for large-scale use in education. Go-Lab enables science inquiry-based learning that promotes acquisition of deep conceptual domain knowledge and inquiry skills and directs students to careers in science.\nFor students (10 to 18-years old), Go-lab offers the opportunity to perform personalized scientific experiments with online labs in pedagogically structured and scaffolded learning spaces that are extended with social communication facilities.\nFor teachers, Go-Lab offers pedagogical plug, share, and play through a Web-based interface and a community framework to disseminate best practices and find mutual support. A modular approach and inquiry classroom scenarios promote a seamless incorporation of online labs into the classroom.\nFor lab-owners, Go-Lab provides open interfacing solutions to easily plug in their online labs, construct their virtual didactic counterparts, and share them in the Go-Lab federation of online labs. Go-Lab will thus promote their scientific activities.\nThe project starts with a set of online labs from worldwide renowned research organisations (e.g., CERN, ESA) and then from selected universities and, based on initial in-depth pilots, will gradually improve and expand its series of online labs and associated inquiry learning opportunities with the increasing contribution of teacher and lab-owner communities. More advanced and later versions will be evaluated and validated in large scale pilots.\nThe Go-Lab project throughout Europe will expand the resources for teaching science in schools and provide more challenging, authentic and higher-order learning experiences for students. Its sustainability will come from the opportunity for the larger science education community to add new online labs. An open and Web-based community will capitalize on the collective intelligence of students, teachers, and scientists.

Agency: European Commission | Branch: FP7 | Program: BSG-SME | Phase: SME-1 | Award Amount: 1.47M | Year: 2008

The aim of this project is to prepare and start-up the commercial exploitation of the semantic collaboration software OntoWiki in the three different target markets, namely Enterprise Knowledge Management, semantically enhanced content management for E-Learning and E-Tourism. OntoWiki is a comprehensive open-source platform for social semantic collaboration. It is developed at Universitt Leipzig and has a large and active user base. Within the course of the project OntoWiki will be further developed and adopted to the needs of the SME for exploitation of OntoWiki in the prospective target markets.

Csapo R.,University of California at San Diego | Csapo R.,Carinthia University of Applied Sciences | Alegre L.M.,University of Castilla - La Mancha
Journal of Science and Medicine in Sport | Year: 2015

Objectives: The purpose of this study was to test whether certain applications of Kinesio tapes might facilitate contraction and increase muscle strength in healthy adults. Design: A meta-analysis of studies investigating the efficacy of Kinesio tapes application was performed. Methods: The scientific databases Pubmed and Google Scholar were systematically searched for appropriate articles. Descriptive statistics were extracted to calculate measures of effect size (Pearson's r) and estimate the overall population effect. The methodological quality of the included studies was assessed using a specific quality appraisal tool. In addition, the included studies were grouped according to the muscle groups examined, to test whether Kinesio tapes effects were dependent on the area of application. Results: A total of 19 studies, comprising data of 530 subjects and 48 pairwise comparisons of muscle strength were included. The methodological quality of these studies ranged from moderate to good. While substantial variability of individual effect sizes was observed, the overall population effect (r=0.05, CI: -0.23 to 0.34) suggests that, on average, the potential to increase strength by application of Kinesio tapes is negligible. Comparisons between studies grouped by the muscle groups examined showed that the effects of Kinesio tapes are not muscle-group dependent. Conclusions: While the application of Kinesio tapes may have some therapeutic benefits, the usage of these tapes does not promote strength gains in healthy adults. © 2014 Sports Medicine Australia.

Bouchachia A.,Klagenfurt University | Prossegger M.,Carinthia University of Applied Sciences
Applied Soft Computing Journal | Year: 2011

Hybrid approaches are often recommended for dealing in an efficient manner with complex problems that require considerable computational time. In this study, we follow a similar approach consisting of combining spectral clustering and ant colony optimization in a two-stage algorithm for the purpose of efficiently solving the Steiner tree problem in large graphs. The idea of the two-stage approach, called ESC-IAC, is to apply a divide-and-conquer strategy which consists of breaking down the problem into sub-problems to find local solutions before combining them. In the first stage, graph segments (clusters) are generated using an ensemble spectral clustering method for enhancing the quality; whereas in the second step, parallel independent ant colonies are implemented to find local and global minima of the Steiner tree. To illustrate the efficiency and accuracy, ESC-IAC is applied in the context of a geographical application relying on real-world as well as artificial benchmarks. © 2011 Elsevier B.V. All rights reserved.

Slamanig D.,Carinthia University of Applied Sciences
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2011

Anonymous authentication apparently seems to be an oxymoron, since authentication is the task of proving one's identity to another party and anonymity is concerned with hiding one's identity. However, there are quite different constructions like ring [5] and group signatures [1] to solve this task. We are focusing on anonymous authentication protocols using public-key encryption schemes as their underlying building block, which, in contrast to the aforementioned, do receive only little attention. However, such anonymous authentication protocols are much simpler than other constructions and they can provide significant advantages over the aforementioned approaches. Firstly, they are fully compatible with deployed public-key infrastructures (PKIs) and thus can be adopted very easily. Secondly, such schemes enjoy an "ad-hoc" character and thus do not require involved registration or setup procedures. This is especially advantageous in dynamic environments, e.g. when users dynamically join and leave the group of authorized users. In this context existing primitives like group signatures to date lack of an efficient and practical solution. Furthermore, the "ad-hoc" character of these schemes allows users to flexibly choose their level of anonymity, i.e. the size of the group (anonymity set), for the sake of improved efficiency and additionally do not suffer from linear complexity such as ring signatures. © 2011 Springer-Verlag.

Batistell G.,Carinthia University of Applied Sciences | Sturm J.,Carinthia University of Applied Sciences
European Solid-State Device Research Conference | Year: 2013

An integrated color detector is presented, which is implemented in a standard 130 nm CMOS technology without process modification or additional optical components like color filters. The proposed structure consists of vertically and laterally arranged photodiodes, providing color separation based on lateral carrier diffusion and wavelength-dependent absorption-depth. Three independent detector output signals with optimized spectral responsivities allows a discrimination between red, green and blue light spectral components. Linear transformation can be used to realize standardized colorimetric R, G, B or X, Y, Z color space responses. The color detector is therefore a low cost alternative solution for various color sensing applications. © 2013 IEEE.

Background: Health promotion at universities focuses on employees rather than on students as proposed by workplace health promotion. Methods: The article presents two projects: In the course of lectures students of the bachelor degree programme "Health Promotion" (University of Education Schwäbisch Gmünd) and of the master degree programme "Health Management" (Carinthia University of Applied Sciences, CUAS) worked on topics concerning students' health in a participative way. Results: In the first project an anti-stress-manual entitled "Lässig statt stressig durchs Studium" (Studying without stress but with coolness) was published. The FOSH-project (Focus On Students' Health) at the CUAS was dedicated to a comprehensive as-is-analysis, the development and implementation of an anti-stress-course for part-time students. Discussion: The projects give example for the realisation of students' participation in an applied way. Students' health as an integral part of the curricula as well as the use of peer coaching have proven to be promising approaches. © 2012 Springer-Verlag Berlin Heidelberg.

Zutin D.G.,Carinthia University of Applied Sciences | Auer M.,Carinthia University of Applied Sciences
Proceedings of 2014 11th International Conference on Remote Engineering and Virtual Instrumentation, REV 2014 | Year: 2014

This paper describes the work carried out at the Carinthia University of Applied Sciences to create a LabVIEW based toolkit that aims at providing laboratory developers with a tool to easily develop new batch lab servers for the iLab Shared Architecture. The Toolkit was developed for the ELVIS batch lab server of MIT, but can be used as a general solution for any type of iLab batch Lab Server deployed with LabVIEW at the server-side. The development platform was LabVIEW due to its widespread use in engineering schools. The Toolkit implements the function of an experiment engine that parses an experiment specification XML document, executes the experiment and generates an experiment result XML document. The XML parser can be easily adapted © 2014 IEEE.

Slamanig D.,Carinthia University of Applied Sciences
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

In this paper we are interested in privacy preserving discretionary access control (DAC) for outsourced storage such as increasingly popular cloud storage services. Our main goal is to enable clients, who outsource data items, to delegate permissions (read, write, delete) to other clients such that clients are able to unlinkably and anonymously perform operations on outsourced data items when holding adequate permission. In contrast to recent approaches based on oblivious RAM, oblivious transfer combined with anonymous credentials or attribute based encryption, we propose a solution based on dynamic accumulators. In doing so, our approach naturally reflects the concept of access control lists (ACLs), which are a popular means to implement DAC. © 2012 Springer-Verlag.

Slamanig D.,Carinthia University of Applied Sciences
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

In this paper we introduce anonymous yet authorized and bounded cloud resource schemes. Contrary to many other approaches to security and privacy in the cloud, we aim at hiding behavioral information, i.e. consumption patterns, of users consuming their cloud resources, e.g. CPU time or storage space, from a cloud provider. More precisely, users should be able to purchase a contingent of resources from a cloud provider and be able to anonymously and unlinkably consume their resources till their limit (bound) is reached. Furthermore, they can also reclaim these resources back anonymously, e.g. if they delete some stored data. We present a definition of such schemes along with a security model and present an instantiation based on Camenisch-Lysyanskaya signatures. Then, we extend the scheme to another scheme providing even more privacy for users, i.e. by even hiding the issued resource limit (bound) during interactions and thus providing full anonymity to users, and present some useful extensions for both schemes. We also support our theoretical claims with experimental results obtained from an implementation that show the practicality of our schemes. © 2012 Springer-Verlag.

Loading Carinthia University of Applied Sciences collaborators
Loading Carinthia University of Applied Sciences collaborators