Refine
Year of publication
Document Type
- Conference Proceeding (1441)
- Article (reviewed) (783)
- Article (unreviewed) (714)
- Bachelor Thesis (680)
- Part of a Book (521)
- Contribution to a Periodical (390)
- Book (260)
- Master's Thesis (242)
- Other (150)
- Patent (118)
Conference Type
- Konferenzartikel (1101)
- Konferenz-Abstract (177)
- Konferenzband (80)
- Sonstiges (43)
- Konferenz-Poster (42)
Language
- German (3332)
- English (2283)
- Russian (6)
- Other language (5)
- Spanish (3)
- Multiple languages (2)
- French (1)
Keywords
- Mikroelektronik (67)
- Marketing (53)
- Digitalisierung (51)
- Künstliche Intelligenz (48)
- Social Media (48)
- Biomechanik (39)
- COVID-19 (39)
- E-Learning (35)
- RoboCup (34)
- Kommunikation (33)
Institute
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (1256)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (1208)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (1165)
- Fakultät Wirtschaft (W) (715)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (684)
- Fakultät Medien (M) (ab 22.04.2021) (451)
- INES - Institut für nachhaltige Energiesysteme (266)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (193)
- IMLA - Institute for Machine Learning and Analytics (92)
- POIM - Peter Osypka Institute of Medical Engineering (89)
Open Access
- Open Access (1975)
- Closed Access (1751)
- Closed (1233)
- Bronze (524)
- Diamond (126)
- Gold (110)
- Hybrid (76)
- Grün (19)
Even though Controller Area Networks (CAN) were originally conceptualized as deeply embedded networks, nowadays they are no longer self-contained. The use of bridges and gateways with access to the Internet opens additional attack surfaces. Therefore, comprehensive countermeasures are required, including the mutual authentication of the communication endpoints using public-key certificates. However, this calls for the continuous availability of credentials in the form of device-granular certificates, private keys, and trust anchors. This paper presents a concept and implementation for credential management in CANopen FD networks throughout the complete life cycle of CANopen FD devices, from their manufacturing over commissioning and operations until their disposal, satisfying the prerequisite for establishing mutually authenticated connections based on certificates. This includes the initial provisioning, continuous renewal, removal, and revocation of credentials. The novel aspect of our paper comprises a complete credential management realization. It is meeting all typical state of the art requirements and is based on similar approaches for Industrial Ethernet networks. Moreover, with our demonstrator implementation we not only show the feasibility of the concept, but also highlight that applicability of public-key infrastructure mechanisms in CANopen FD networks with comparably resource-constrained nodes with limited packet sizes.
With the advent of the cryptographic security ex-tensions for PROFINET Security Class 2/3, as specified by PROFIBUS & PROFINET International, there arises a signif-icant difference between the establishment of a conventional (insecure) and a secure application relation (AR). However, to the best of our knowledge, there is no study yet that numeralizes how much delay is induced by the computational and communication overhead of the secure AR establishment. Therefore, we study its performance by runtime measurements using an experimental hardware setup. We answer two research questions: (1) how much additional runtime delay is induced by the currently specified security extensions when performing a secure AR establishment, and (2) what is the impact of currently unspecified options to reduce this delay? In particular, we study the options to use the Extensible Authentication Protocol (EAP) with Transport Layer Security (TLS) for full handshakes and session resumption, version 1.2 and 1.3, certificate-based and pre-shared-key-based (PSK) ciphersuites, as well as EAP-PSK. We gain the insight that the currently specified extensions lead to a best case delay of 17.5 ms and a worst case delay of 288.6 ms for full handshakes and to 7.3 and 9.8 ms for resumed sessions. With the currently unspecified option to use pre-shared-key-based ciphersuites, yet providing perfect forward security, the best case delay for full handshakes is reduced by 25.7 % and the worst case delay by 91.1 %. With the currently unspecified EAP-PSK option, which does not provide PFS, the largest reduction is achieved by 78.4 and 98.7 % related to best and worst case full handshakes. The authors are members of the PROFINET Working Group CBIPG 10 Security.
Verfahren zum Erzeugen und/oder Verarbeiten von Bewegungsdaten eines frei beweglichen Körpers (130), wobei an dem Körper (130) wenigstens zwei jeweils einen Winkelgeschwindigkeitssensor und einen Beschleunigungssensor aufweisende Sensoreinheiten (104, 106, 108, 110) voneinander fest beabstandet angeordnet werden und auf Basis von Messsignalen der wenigstens zwei Sensoreinheiten (104, 106, 108, 110) und unter Anwendung von Gesetzen der allgemeinen Bewegung starrer Körper ein Winkelbeschleunigungsvektor direkt ermittelt wird, Verfahren zum Erfassen und/oder Bewerten von Bewegungsabläufen eines frei beweglichen Körpers (130), wobei gemäß einem derartigen Verfahren erzeugte und/oder verarbeitete Bewegungsdaten des Körpers (130) verwendet werden, Verfahren zum Erkennen und/oder Bewerten von dynamischen Instabilitäten eines frei beweglichen Körpers (130), wobei gemäß einem derartigen Verfahren erzeugte und/oder verarbeitete Bewegungsdaten des Körpers (130) verwendet werden, Verfahren zum Erzeugen und/oder Optimieren von Algorithmen und/oder Modellen zur Berechnung einer Dynamik frei beweglicher Körper (130), wobei gemäß einem derartigen Verfahren erzeugte und/oder verarbeitete Bewegungsdaten des Körpers (130) verwendet werden, und Vorrichtung (100) zum Ausführen eines derartigen Verfahrens mit wenigstens zwei an einem frei beweglichen Körper (130) voneinander fest beabstandet anordenbare, jeweils einen Winkelgeschwindigkeitssensor und einen Beschleunigungssensor aufweisende Sensoreinheiten (104, 106, 108, 110).
Enhancing Independence through Intelligent Robotics: An AI Driven Assistive Robotics Interface
(2024)
Applying methods in artificial intelligence to the field of assistive robotics has the potential to increase the independence of people with disabilities. The usage of AI to realize a shared control in this context is controversial, due to the high complexity of everyday tasks and the needed safety requirements. This paper presents the development of a user interface for AI-driven assistive robotic arms (ARA) that aims to assist people with physical disabilities in performing daily activities. This interface allows the user to select object manipulation tasks based on the objects recognized in a live video stream. Further, we compare several state-of-the-art, real-time object detection models to facilitate automatic robotic control. The results demonstrate the feasibility of the model and its potential integration into the overall robotic system.
In industrial production, Explainable Artificial Intelligence offers the opportunity to better understand AI models, not only to understand their decisions but also to be able to improve processes, which is possible even without the necessary experience. There are several widely used methods to implement this for Artificial Intelligence models, but no uniform standards and definitions. There are also still some hurdles on a technical and legal level as well as trust on the human side. Ultimately, the application of such techniques is particularly important in this area, but this is often not possible without the well-functioning and widespread use of Artificial Intelligence in manufacturing industry. However, it is a further step towards intelligent manufacturing and the acceptance of Artificial Intelligence in this area. The publication not only shows the latest developments, but also some use cases of Explainable Artificial Intelligence in manufacturing. Not only legal aspects but also ethical aspects are highlighted. In conclusion, it can be stated that Explainable Artificial Intelligence methods per se are well established, but their implementation and use in practice is lagging behind. A major point here in the future will be the explanation of generative artificial intelligence and user-centred explanations for non-domain experts. A standardised definition of explainability and standards for evaluating the individual methodologies must also be created
Erlang is a dynamically typed language with support for optional type annotations. Though Erlang’s type annotations were originally intended for documentation, static analysis tools soon utilized them for semantic checks. The most advanced and mature of these tools is Dialyzer, a success typing-based tool widely used in current projects. Attempts to retrofit a static type system employing the type annotations have so far remained in the realm of research prototypes. Recently, three further tools have been developed: Gradualizer, eqWAlizer, and Etylizer. But, due to a need for more semantic agreement on Erlang’s type annotations, their results differ in ways that can be challenging for users to interpret. In this paper, we cross-compare the state-of-the-art static checkers regarding their expressivity and performance on the union of their respective test suites. Unsurprisingly, we find that the tools perform best on their own test suites. While Gradualizer, Etylizer, and eqWAlizer disagree on 25% - 45% of test cases across all test suites, Dialyzer’s success-typing approach sets it apart in its interpretation of the type annotations. Our analysis emphasizes that the nature of Erlang’s type language remains challenging when it comes to develop a correct and efficient static type checker.
Transportation planners are increasingly relying on AI to optimize logistics and solve persistent challenges. However, as AI advances rapidly, most software vendors are unable to evaluate and implement all new developments. This paper uses bibliometric methods to track and evaluate the emerging trend of neurosymbolic AI, which combines neural networks with symbolic AI to improve decision making. By analyzing literature and citation data, we gain insights into the development and impact of neurosymbolic AI. The results provide a scalable approach for practitioners to efficiently identify and evaluate AI trends to facilitate the strategic adoption of technologies and innovations in transportation planning.
Entity Matching (EM) defines the task of learning to group objects by transferring semantic
concepts from example groups (=entities) to unseen data. Despite the general availability of
image data in the context of many EM-problems, most currently available EM-algorithms
solely rely on (textual) meta data.
In this paper, we introduce the first publicly available large-scale dataset for “visual entity
matching”, based on a production level use case in the retail domain. Using scanned advertisement leaflets, collected over several years from different European retailers, we provide a total of ∼786k manually annotated, high resolution product images containing ∼18k
different individual retail products which are grouped into ∼3k entities. The annotation
of these product entities is based on a price comparison task, where each entity forms an
equivalence class of comparable products.
Following on a first baseline evaluation, we show that the proposed “visual entity matching”
constitutes a novel learning problem which can not sufficiently be solved using standard
image based classification and retrieval algorithms. Instead, novel approaches which allow
to transfer example based visual equivalent classes to new data are needed to address the
proposed problem. The aim of this paper is to provide a benchmark for such algorithms.