- Big Data and Business Intelligence
- Advanced Database Systems and Queries
- Experimental Learning in Engineering
- Cloud Computing and Resource Management
- Digital Innovation in Industries
- Peer-to-Peer Network Technologies
- Flexible and Reconfigurable Manufacturing Systems
- Advanced Malware Detection Techniques
- Corporate Governance and Management
- Engineering Education and Technology
- Cloud Computing and Remote Desktop Technologies
- Supply Chain and Inventory Management
- Green IT and Sustainability
- Scientific Computing and Data Management
- Data Quality and Management
- Medical and Biological Sciences
- Access Control and Trust
- Advanced Data Processing Techniques
- Advanced Battery Technologies Research
- Software Engineering Techniques and Practices
- Privacy, Security, and Data Protection
- Healthcare Systems and Public Health
- Information Systems Theories and Implementation
- Context-Aware Activity Recognition Systems
- Mobile and Web Applications
Oldenburger Institut für Informatik
2020-2025
Carl von Ossietzky Universität Oldenburg
2014-2022
International Information Technologies University
2012-2015
Institute of Information and Computational Technologies
2014
ABSTRACT Thinking outside of the box is an important part education. However, using innovative teaching methods in education can be very challenging for educators. They are directly involved into a process and upcoming changes should well planned impact introduced innovations/changes estimated advance. Innovations also management particular higher institution, whose major goal to organize smooth learning process. Current work presents software empowered innovation domain physics at...
In recent years, the growing importance of data ownership has attracted significant attention, reflecting not only its pivotal role in evolving data-driven environment but also complexity addressing it across diverse contexts. The necessity developing effective concepts for platforms is indisputable; nevertheless, process inherently complex and demands a comprehensive examination requirements surrounding this multifaceted issue. This paper puts forward novel approach to development concepts,...
Current work presents new approach for designing business intelligence solutions. In the era of big data, former and robust analytical concepts utilities needs to adopt themselves changed market circumstances. Main focus is address acceleration building process a "data-centric" solution on one side, also prepare solutions data utilization. Research addressing following goals: (a) reduce time spent during phase; (b) achieve flexibility by removing problems with adding sources; (c) utilization...
Abstract Unlocking and managing flexibility is an important contribution to the integration of renewable energy efficient resilient operation power system. In this paper, we discuss how potential a fleet battery-electric transportation vehicles can be used provide frequency containment reserve. To end, first examine use case in detail then present system designed meet challenge. We give overview tasks individual sub-components, consisting (a) artificial neural network predict availability...
The current work presents a new approach for designing business intelligence solutions. In the Era of Big Data, former and robust analytical concepts utilities need to adapt themselves changed market circumstances. main focus this is address acceleration building process “data-centric” Business Intelligence (BI) solution besides preparing BI solutions Data utilization. This research addresses following goals: reducing time spent during solution’s design phase; achieving flexibility by adding...
It is quite common that most of companies’ decisions are made based on feelings, intuitions or personal experiences. The reasons for such patterns have organizational, technical and process oriented backgrounds. For instance, there no structured way to deal with the analytical results both sides simultaneously – organizational technical. Usually, in case analytics ones doing analysis (e.g. data scientists) using decision makers) different persons. As a result, structure leads ambiguity...
Mobile devices currently offer many value-added applications and services such as messaging, navigation, social networking, finance, entertainment. As these mobile have access to users’ personal information are capable of gathering transmitting trust sensitive information, p
Nowadays enterprises demand mobility and flexibility of their employees as inevitable success factors. Integrating mobile devices like smartphones tablets into an enterprise gives possibilities to work more productively. However, integrating applications has also brought new security challenges risks. Despite all advantages mobility, many organizations continue avoid it due issues. Mobile are exposed a wide range threats that have be countered. Simply porting information standards from...
Mobile devices currently offer many value-added applications and services such as messaging, navigation, social networking, finance, entertainment. As these mobile have access to users' personal information are capable of gathering transmitting trust sensitive information, posing security privacy risks. In this paper, we propose a context-aware adaptive framework for eliciting context adapting with applications' network control mechanism. The enforces the execution inside incubators...
The results of the software module "Virtual Physics Laboratory" were presented in Higher Education system International University Information Technologies (IITU). information technology design and development, structure virtual laboratory its place IITU described same way as principal regimes operation program methods for use educational process.
Significant advancement in mobile devices coupled with high speed networks have shifted personal computing towards pervasive environments. Mobile currently offer many value-added applications and services such as emailing, messaging, navigation, social networking, finance, entertainment. Typically, access to users' information are capable of gathering transmitting trust sensitive information, hence posing security risks and/or privacy concerns. In this paper, we propose a context-based...
Intensive usage of an information and communication technology (ICT) in education process is a promising rapidly evolving topic or exploration. One the ways, how particular ICT can be used for teaching creation specialized software applications, which are able to demonstrate physical chemical students on very granular level. Current work describes implementation such applications primary dedicated enhance experience physics subject. The includes theoretical foundation experiment, description...
Increasing the duration of active life is one most important problems in modern gerontology world, including Kazakhstan. First, solution these associated with using information and communication technologies (ICT). Gerontological RK portal, which has no analogues countries former USSR, will include on major aspects aging RK. Portal be a platform for exchange experiences, publishing research results, getting generalized personalized information. This paper describes main elements portal...
Issues related to a properly collection, management and analysis of data are the very first ones be solved while working with any source. Especially, it's true for sources, which have property grow rapidly without clear structure underneath, such behavior is typical generated by mobile devices. Thus, current work suggest an principle architecture design software platform whose main goal collect, store provide further access context mainly devices as smartphones.