@article{ValeroBungErpicumetal.2022, author = {Valero, Daniel and Bung, Daniel Bernhard and Erpicum, Sebastien and Peltier, Yann and Dewals, Benjamin}, title = {Unsteady shallow meandering flows in rectangular reservoirs: a modal analysis of URANS modelling}, series = {Journal of Hydro-environment Research}, journal = {Journal of Hydro-environment Research}, number = {In Press}, publisher = {Elsevier}, address = {Amsterdam}, issn = {1570-6443}, doi = {10.1016/j.jher.2022.03.002}, year = {2022}, abstract = {Shallow flows are common in natural and human-made environments. Even for simple rectangular shallow reservoirs, recent laboratory experiments show that the developing flow fields are particularly complex, involving large-scale turbulent structures. For specific combinations of reservoir size and hydraulic conditions, a meandering jet can be observed. While some aspects of this pseudo-2D flow pattern can be reproduced using a 2D numerical model, new 3D simulations, based on the unsteady Reynolds-Averaged Navier-Stokes equations, show consistent advantages as presented herein. A Proper Orthogonal Decomposition was used to characterize the four most energetic modes of the meandering jet at the free surface level, allowing comparison against experimental data and 2D (depth-averaged) numerical results. Three different isotropic eddy viscosity models (RNG k-ε, k-ε, k-ω) were tested. The 3D models accurately predicted the frequency of the modes, whereas the amplitudes of the modes and associated energy were damped for the friction-dominant cases and augmented for non-frictional ones. The performance of the three turbulence models remained essentially similar, with slightly better predictions by RNG k-ε model in the case with the highest Reynolds number. Finally, the Q-criterion was used to identify vortices and study their dynamics, assisting on the identification of the differences between: i) the three-dimensional phenomenon (here reproduced), ii) its two-dimensional footprint in the free surface (experimental observations) and iii) the depth-averaged case (represented by 2D models).}, language = {en} } @article{BhattaraiHorbachStaatetal.2022, author = {Bhattarai, Aroj and Horbach, Andreas and Staat, Manfred and Kowalczyk, Wojciech and Tran, Thanh Ngoc}, title = {Virgin passive colon biomechanics and a literature review of active contraction constitutive models}, series = {Biomechanics}, volume = {2}, journal = {Biomechanics}, number = {2}, publisher = {MDPI}, address = {Basel}, issn = {2673-7078}, doi = {10.3390/biomechanics2020013}, pages = {138 -- 157}, year = {2022}, abstract = {The objective of this paper is to present our findings on the biomechanical aspects of the virgin passive anisotropic hyperelasticity of the porcine colon based on equibiaxial tensile experiments. Firstly, the characterization of the intestine tissues is discussed for a nearly incompressible hyperelastic fiber-reinforced Holzapfel-Gasser-Ogden constitutive model in virgin passive loading conditions. The stability of the evaluated material parameters is checked for the polyconvexity of the adopted strain energy function using positive eigenvalue constraints of the Hessian matrix with MATLAB. The constitutive material description of the intestine with two collagen fibers in the submucosal and muscular layer each has been implemented in the FORTRAN platform of the commercial finite element software LS-DYNA, and two equibiaxial tensile simulations are presented to validate the results with the optical strain images obtained from the experiments. Furthermore, this paper also reviews the existing models of the active smooth muscle cells, but these models have not been computationally studied here. The review part shows that the constitutive models originally developed for the active contraction of skeletal muscle based on Hill's three-element model, Murphy's four-state cross-bridge chemical kinetic model and Huxley's sliding-filament hypothesis, which are mainly used for arteries, are appropriate for numerical contraction numerical analysis of the large intestine.}, language = {en} } @article{GollandEngling2014, author = {Golland, Alexander and Engling, Christoph}, title = {a-i3/BSI Symposium 2014: Sicherheit von Daten und Identit{\"a}ten angesichts NSA und Big Data}, series = {DSB Datenschutz-Berater}, volume = {38}, journal = {DSB Datenschutz-Berater}, number = {7-8}, publisher = {DFV Mediengruppe}, address = {Frankfurt a.M.}, isbn = {0170-7256}, pages = {165 -- 166}, year = {2014}, language = {de} } @article{PeloniCeriottiDachwald2016, author = {Peloni, Alessandro and Ceriotti, Matteo and Dachwald, Bernd}, title = {Solar-sail trajectory design for a multiple near-earth-asteroid rendezvous mission}, series = {Journal of Guidance, Control, and Dynamics}, volume = {39}, journal = {Journal of Guidance, Control, and Dynamics}, number = {12}, publisher = {AIAA}, address = {Reston, Va.}, issn = {0731-5090}, doi = {10.2514/1.G000470}, pages = {2712 -- 2724}, year = {2016}, abstract = {The scientific interest for near-Earth asteroids as well as the interest in potentially hazardous asteroids from the perspective of planetary defense led the space community to focus on near-Earth asteroid mission studies. A multiple near-Earth asteroid rendezvous mission with close-up observations of several objects can help to improve the characterization of these asteroids. This work explores the design of a solar-sail spacecraft for such a mission, focusing on the search of possible sequences of encounters and the trajectory optimization. This is done in two sequential steps: a sequence search by means of a simplified trajectory model and a set of heuristic rules based on astrodynamics, and a subsequent optimization phase. A shape-based approach for solar sailing has been developed and is used for the first phase. The effectiveness of the proposed approach is demonstrated through a fully optimized multiple near-Earth asteroid rendezvous mission. The results show that it is possible to visit five near-Earth asteroids within 10 years with near-term solar-sail technology.}, language = {en} } @article{Golland2014, author = {Golland, Alexander}, title = {Datenschutz durch modulare Zertifizierung: Trusted Cloud-Pilotprojekt bringt neuen Ansatz}, series = {DSB Datenschutz-Berater}, volume = {38}, journal = {DSB Datenschutz-Berater}, number = {10}, publisher = {DFV Mediengruppe}, address = {Frankfurt a.M.}, isbn = {0170-7256}, pages = {213 -- 215}, year = {2014}, language = {de} } @article{GollandEngling2015, author = {Golland, Alexander and Engling, Christoph}, title = {Offene und geschlossene WLAN: Rechtliche H{\"u}rden bei Betrieb eines {\"o}ffentlichen Internetzugangs}, series = {DSB Datenschutz-Berater}, volume = {39}, journal = {DSB Datenschutz-Berater}, number = {5}, publisher = {DFV Mediengruppe}, address = {Frankfurt a.M.}, issn = {0170-7256}, pages = {102 -- 103}, year = {2015}, language = {de} } @article{GollandKriegesmann2017, author = {Golland, Alexander and Kriegesmann, Torben}, title = {Der Schutz virtueller Identit{\"a}ten durch die DSGVO}, series = {PinG Privacy in Germany}, volume = {5}, journal = {PinG Privacy in Germany}, number = {2}, editor = {H{\"a}rting, Niko}, publisher = {Erich Schmidt Verlag}, address = {Berlin}, isbn = {2197-1862}, doi = {10.37307/j.2196-9817.2017.02.03}, pages = {45 -- 50}, year = {2017}, abstract = {Die Frage des Schutzes von virtuellen Identit{\"a}ten ist - insbesondere bei Online-Medien - von elementarer Bedeutung: Ihre Beantwortung entscheidet {\"u}ber die Anwendbarkeit des Datenschutzrechts auf vermeintlich anonyme Nutzerprofile im Internet. Eine differenzierte Auseinandersetzung mit der Problematik, ob und unter welchen Umst{\"a}nden virtuelle Identit{\"a}ten dem Datenschutzrecht unterfallen, fehlt bislang. Der vorliegende Beitrag gibt einen {\"U}berblick {\"u}ber den Schutz virtueller Identit{\"a}ten und zeigt Ans{\"a}tze auf, mittels derer bestimmt werden kann, wann virtuelle Identit{\"a}ten nach Inkrafttreten der DSGVO durch das Datenschutzrecht gesch{\"u}tzt werden.}, language = {de} } @article{Golland2018, author = {Golland, Alexander}, title = {Umsetzung der Datenschutz-Grundverordnung - Neue Herausforderungen f{\"u}r Unternehmen}, series = {NWB Rechnungswesen - BBK}, journal = {NWB Rechnungswesen - BBK}, number = {1}, isbn = {0340-9848}, pages = {35 -- 39}, year = {2018}, abstract = {Nach einem intensiven politischen Diskurs wurde im vergangenen Jahr die Datenschutz-Grundverordnung (DSGVO) verabschiedet. Die DSGVO ersetzt zum 25.5.2018 die bislang geltende, aus dem Jahre 1995 stammende Datenschutz-Richtlinie 95/46/EG. Die Novellierung des Datenschutzrechts bringt zahlreiche neue Anforderungen mit sich. Unternehmen sind daher gezwungen, sich auf die {\"A}nderungen einzustellen, ihre datenschutzrelevanten Prozesse im Hinblick auf die neuen Anforderungen zu {\"u}berpr{\"u}fen und bis zum Mai 2018 an der DSGVO auszurichten. Der Beitrag gibt einen kurzen {\"U}berblick {\"u}ber die zentralen Aspekte der Datenschutzreform und die damit einhergehenden Herausforderungen f{\"u}r Unternehmen.}, language = {de} } @article{Golland2018, author = {Golland, Alexander}, title = {Das Kopplungsverbot in der Datenschutz-Grundverordnung Anwendungsbereich, {\"o}konomische Auswirkungen auf Web 2.0-Dienste und L{\"o}sungsvorschlag}, series = {MMR Multimedia und Recht}, volume = {21}, journal = {MMR Multimedia und Recht}, number = {3}, publisher = {Beck}, address = {M{\"u}nchen}, isbn = {1434-596X}, pages = {130 -- 135}, year = {2018}, abstract = {Das Kopplungsverbot fristete - obwohl in rechtswissenschaftlicher Literatur seit jeher diskutiert - unter der Geltung des BDSG ein Schattendasein. Mit der Datenschutz-Grundverordnung (DS-GVO) ist eine {\"A}nderung absehbar: Der neue Art. EWG_DSGVO Artikel 7 Abs. EWG_DSGVO Artikel 7 Absatz 4 DS-GVO stellt klar, dass die Leistungserbringung nicht von der Einwilligungserteilung abh{\"a}ngig gemacht werden darf. Doch dieses scheinbare Novum des Datenschutzrechts wirft zahlreiche Fragen auf. W{\"a}hrend vor allem Vertreter der unternehmerischen Praxis die Anwendung des Kopplungsverbots in zahlreichen Konstellationen ablehnen, beschw{\"o}ren dessen Apologeten das Ende s{\"a}mtlicher „datenfinanzierten" Dienste herauf. Der vorliegende Beitrag gibt Einblick in die Regelungstiefe einer Norm, die das Web 2.0 revolutionieren k{\"o}nnte, und schl{\"a}gt eine L{\"o}sung vor, die dem Schutz der Privatsph{\"a}re des Betroffenen und den wirtschaftlichen Interessen von Diensteanbietern gleichermaßen gerecht wird.}, language = {de} } @article{Golland2018, author = {Golland, Alexander}, title = {Der r{\"a}umliche Anwendungsbereich der DS-GVO}, series = {DuD Datenschutz und Datensicherheit}, volume = {42}, journal = {DuD Datenschutz und Datensicherheit}, number = {6}, publisher = {Springer}, address = {Heidelberg}, isbn = {1862-2607}, pages = {351 -- 357}, year = {2018}, abstract = {Die Datenschutz-Grundverordnung (DS-GVO) regelt in ihrem Art. 3 das r{\"a}umlich anwendbare Datenschutzrecht und zielt dabei gerade auch auf Angebote nichteurop{\"a}ischer Diensteanbieter ab. Die bisherige Diskussion konzentriert sich bislang in erster Linie darauf, das eingef{\"u}hrte Marktortprinzip zu thematisieren; das weitgehend unangetastete Niederlassungsprinzip und vor allem die Probleme, die sich durch dessen unver{\"a}nderte Beibehaltung ergeben, werden dagegen nicht er{\"o}rtert. Der folgende Beitrag versucht sich an einer systematischen Analyse eines teils kontrovers, teils kaum diskutierten Themas.}, language = {de} }