Search Constraints
1 - 9 of 9
Number of results to display per page
Search Results
-
Density Measurements
User Collection- Description:
- This sub collection contains results of density measurements performed in the ERC Advanced Grant ThermoPropHy
- Resource Type:
- Dataset
0Collections0Works -
- Description:
- This dataset contains simulation data from a Fluid Catalytic Cracking (FCC) unit, specifically designed for alarm flood classification and alarm management research. The dataset is derived from a high-fidelity MATLAB-based FCC simulation model that has been enhanced with realistic process variations and a comprehensive alarm system. Key features of the dataset include: Size: 1,600 simulation runs across 16 different abnormal situations (100 runs per disturbance) Time Resolution: Process data sampled at 60-second intervals File Structure: In the timeseriesdata, each run includes three CSV files: process.csv: Contains 25 process variables (temperatures, pressures, flows, etc.) valves.csv: Contains 11 valve position variables disturbances.csv: Contains 15 variables related to disturbances and ambient conditions For the alarmseriesdata, each run consists of a single file alarms.csv: Contains 57 alarm status variables (low, high, low-low, high-high) The dataset captures realistic process dynamics with: Added measurement noise to all variables (e.g., 1% for level, 0.01°C for temperature) Comprehensive alarm configuration with thresholds based on operating limits 16 different abnormal situations including valve failures, catalyst deactivation, and equipment issues This dataset addresses the gap in publicly available alarm data for process industries and provides a valuable resource for developing and evaluating alarm management techniques, particularly alarm flood classification methods.
- Keyword:
- Alarm Flood Classification, Fluid Catalytic Cracking (FCC), and Process Simulation
- Publisher:
- Date Uploaded:
- 2025-05-07
- Date Modified:
- 2025-05-12
- License:
- Creative Commons BY Attribution 4.0 International
- Resource Type:
- Dataset
-
- Description:
- Datasets and Matlab code for figures included in the article 'Theory of potential impurity scattering in pressurized superconducting La3Ni2O7' from authors Steffen Bötzel, Frank Lechermann, Takasada Shibauchi and Ilya M. Eremin and Abstract: Recently discovered high-Tc superconductivity in pressurized bilayer nickelate La3Ni2O7 (La- 327) is likely driven by the non-phononic repulsive interaction. Depending on the interlayer repul- sion strength, the superconducting gap structure is expected to be either d-wave or sign-changing bonding-antibonding s±-wave. Unfortunately, conventional spectroscopic probes of the gap struc- ture are impractical due to the high-pressure requirement. We propose studying the effect of point- like non-magnetic impurities to distinguish these symmetries, which can be achieved by electron irradiation before applying pressure. Here, we theoretically predict conventional suppression for d-wave superconductivity, whereas the suppression for the interlayer s±-wave state depends subtly on the asymmetry of bonding and antibonding subspaces. For the predicted electronic structure of La-327, the s±-wave is more robust, with Tc showing a convex-to-concave transition, indicating a crossover to s++-wave symmetry as impurity concentration increases. We further analyze the sensitivity of these findings to potential electronic structure modifications.
- Keyword:
- impurity scattering, superconductivity, Tc suppression, disorder, bilayer nickelates, and La3Ni2O7
- Publisher:
- Date Uploaded:
- 2025-04-02
- Date Modified:
- 2025-04-09
- License:
- Creative Commons BY Attribution 4.0 International
- Resource Type:
- Dataset
-
Ö - Öffentlichkeitsarbeit
CRC 1280- Description:
- This collection contains all episodes of "Kannste Vergessen? – Der Podcast vom Lernen, Vergessen und Erinnern", the podcast of CRC 1280 Extinction Learning. The podcast is one of the main products of the CRC 1280's outreach project (subproject Ö). Though aimed at a lay audience, the CRC 1280 understands this podcast as a form of spoken science distribution. This collection preserves the episodes, makes the podcast independent from the hosting services and keeps them findable and accessible for the long term.
- Resource Type:
- Dataset
0Collections30Works -
- Description:
- This dataset comprises self-reported questionnaire responses from 12,000 participants, capturing their conceptions, misconceptions, perceptions, and attitudes toward digital security. It also examines their familiarity with various digital security terms, experiences with cybercrime, and the protective measures participants employ to safeguard their online data. The survey, conducted in late 2021, includes responses from 1,000 participants in each of 12 countries: China, Germany, India, Israel, Italy, Mexico, Poland, Saudi Arabia, South Africa, Sweden, the UK, and the USA. , The dataset is provided in two files: , 1. "SurveyResponses_DigitalSecurityAroundTheWorld.csv": This file contains the complete survey responses from all 12,000 participants., 2. "DataMap_DigitalSecurityAroundTheWorld.pdf": This document includes each question and response option from the full questionnaire. It also maps the survey questions to their corresponding column names in the dataset, facilitating data interpretation., When using any part of our dataset for your own research:, please make sure to cite the following publications: , - Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, Angela Sasse, Yasemin Acar, and Markus Dürmuth. 2023. A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI '23). Association for Computing Machinery, New York, NY, USA, Article 582, 1–23. https://doi.org/10.1145/3544548.3581410 , and - Franziska Herbert, Collins W. Munyendo, Jonas Hielscher, Steffen Becker, Yixin Zou. 2025. Digital Security Perceptions and Practices Around the World: A WEIRD vs. Non-WEIRD Comparison. In Proceedings of the 34th USENIX Security Symposium (USENIX Security 25). USENIX Association, Philadelphia, PA, USA. (in press)
- Keyword:
- human-centered security, privacy, online survey, and cross-country comparison
- Publisher:
- Language:
- English
- Date Uploaded:
- 2025-01-24
- Date Modified:
- 2025-02-19
- License:
- Creative Commons BY Attribution 4.0 International
- Resource Type:
- Dataset
-
- Description:
- This repository contains the images, data, and analyses used to investigate the accumulation of lipofuscin in the pigeon brain.
- Keyword:
- aging, comparative neuroanatomy , lipofuscin, and pigeon
- Date Uploaded:
- 2024-10-31
- Date Modified:
- 2025-02-19
- License:
- Creative Commons CC0 1.0 Universal
- Resource Type:
- Dataset
-
- Description:
- Single Sign-On (SSO) is an authentication process that allows users to access multiple services with a single set of login credentials. Although SSO improves the user experience, it poses challenges to developers to implement complex authentication protocols securely. External services, called brokers, simplify the integration of SSO. In this paper, we shed light on the emerging brokered SSO ecosystem, focusing on the security of the newly introduced actor, the broker. We systematically evaluate the landscape of brokered SSO, uncovering significant blind spots in previous research. Our study reveals that 25% of the websites with SSO integrate brokers for authentication, an area that has not been covered by any previous research. Through our comprehensive security evaluation, we identify three categories of threats associated with brokered SSO: (1) insufficient validation of redirect chains enabling injection attacks, (2) unauthorized data access enabling account takeovers, and (3) violations of security best current practices. We expose vulnerabilities in over 50 brokers, compromising the security of more than 2k websites. These findings represent only a lower bound of a critical situation, underscoring the urgent need for improved security measures and protocols to safeguard the integrity of brokered SSO systems.
- Keyword:
- Single Sign-On and Identity Broker
- Subject:
- IT Security, Single Sign-On, Authorization and Authentication, and Identity Brokers
- Publisher:
- Language:
- English
- Date Uploaded:
- 2024-10-02
- Date Modified:
- 2025-02-19
- License:
- MIT License
- Resource Type:
- Dataset
-
Artifacts: "Only as Strong as the Weakest Link": On the Security of Brokered Single Sign-On on the Web
User Collection- Description:
- Single Sign-On (SSO) is an authentication process that allows users to access multiple services with a single set of login credentials. Although SSO improves the user experience, it poses challenges to developers to implement complex authentication protocols securely. External services, called brokers, simplify the integration of SSO. In this paper, we shed light on the emerging brokered SSO ecosystem, focusing on the security of the newly introduced actor, the broker. We systematically evaluate the landscape of brokered SSO, uncovering significant blind spots in previous research. Our study reveals that 25% of the websites with SSO integrate brokers for authentication, an area that has not been covered by any previous research. Through our comprehensive security evaluation, we identify three categories of threats associated with brokered SSO: (1) insufficient validation of redirect chains enabling injection attacks, (2) unauthorized data access enabling account takeovers, and (3) violations of security best current practices. We expose vulnerabilities in over 50 brokers, compromising the security of more than 2k websites. These findings represent only a lower bound of a critical situation, underscoring the urgent need for improved security measures and protocols to safeguard the integrity of brokered SSO systems.
- Resource Type:
- Dataset
0Collections1Works -
- Description:
- This dataset consists of 370 RGB images of cracks in concrete structures and the corresponding segmentation masks. The dataset can be used for classification, recognition and semantic segmentation tasks.
- Keyword:
- concrete cracks images annotation
- Subject:
- Concrete damage images and Training data for machine learning
- Date Uploaded:
- 2024-04-17
- Date Modified:
- 2025-02-19
- License:
- Creative Commons CC0 1.0 Universal
- Resource Type:
- Dataset