Refine
Document Type
- Conference Proceeding (213)
- Article (reviewed) (128)
- Bachelor Thesis (62)
- Master's Thesis (34)
- Article (unreviewed) (27)
- Patent (23)
- Letter to Editor (16)
- Book (12)
- Contribution to a Periodical (12)
- Doctoral Thesis (12)
Conference Type
- Konferenzartikel (183)
- Konferenz-Abstract (21)
- Sonstiges (5)
- Konferenz-Poster (2)
- Konferenzband (2)
Language
- English (373)
- German (187)
- Other language (1)
- Multiple languages (1)
- Russian (1)
Keywords
- Machine Learning (14)
- RoboCup (13)
- Deep Leaning (11)
- Götz von Berlichingen (11)
- neuroprosthetics (8)
- Deep learning (7)
- Medizintechnik (7)
- Blockchain (6)
- Internet of Things (6)
- Regelungstechnik (6)
- Robotik (6)
- machine learning (6)
- Handprothese (5)
- Heart rhythm model (5)
- Herzrhythmusmodell (5)
- IT-Sicherheit (5)
- Modeling and simulation (5)
- Simulation (5)
- neural networks (5)
- printed electronics (5)
- 3D-CAD (4)
- Augmented Reality (4)
- Data Science (4)
- Deep Learning (4)
- E-Fahrzeug (4)
- Energiemanagement (4)
- Iron Hand (4)
- Johann Sebastian Bach (4)
- Künstliche Intelligenz (4)
- Maschinelles Lernen (4)
- Robustness (4)
- Schluckspecht (4)
- Software (4)
- blockchain (4)
- hand prosthesis (4)
- 3D computer-aided design (3)
- Bildverarbeitung (3)
- Embedded Systems (3)
- Generative Adversarial Network (3)
- IIoT (3)
- Internet der Dinge (3)
- IoT security (3)
- Programmiersprache (3)
- Radar (3)
- Rust (3)
- Security (3)
- Umweltforschung (3)
- Virtuelle Realität (3)
- Vorhofflimmern (3)
- amputee (3)
- artificial intelligence (3)
- bimodal hearing (3)
- biomaterials (3)
- catheter ablation (3)
- certificate management (3)
- cryptography (3)
- deep learning (3)
- heart rhythm model (3)
- image classification (3)
- programming (3)
- prosthesis (3)
- replica (3)
- security (3)
- sound localization (3)
- 3D multi-material polymer printing (2)
- 3D print (2)
- 3D printing (2)
- 3D-Druck (2)
- 5G (2)
- API (2)
- Ablation (2)
- Akustik (2)
- Aliasing (2)
- Architektur (2)
- Autoencoder (2)
- Automatisierungstechnik (2)
- Bearings (2)
- Bioimpedance measurement (2)
- Biomechanik (2)
- Biomechanische Stimulation (2)
- Blockchains (2)
- Brückenkurse (2)
- CNC (2)
- CNN (2)
- CNNs (2)
- Cardiac Resynchronization Therapy (2)
- Computer Vision (2)
- Computersicherheit (2)
- Cryoballoon catheter ablation (2)
- Current measurement (2)
- Data Mining (2)
- Deep Reinforcement Learning (2)
- Didaktik (2)
- Digital Twin (2)
- Digitale Lehre (2)
- Digitaler Zwilling (2)
- Digitaltechnik (2)
- E-Paper (2)
- Elektrofahrzeug (2)
- Elektromotor (2)
- Energie (2)
- Energy Flexibility (2)
- Energy management (2)
- Entkopplung (2)
- FEM (2)
- Featherweight Go (2)
- Felix Mendelssohn Bartholdy (2)
- Functional neuroimaging (2)
- GPU Computing (2)
- Geophysik (2)
- Hochschuldidaktik (2)
- Hörgerät (2)
- Implantat (2)
- Informatik (2)
- Kalman Filter (2)
- Katheterablation (2)
- Kryoballonkatheter (2)
- Landwirtschaft (2)
- MATLAB (2)
- Mikroelektronik (2)
- Modellierung und Simulation (2)
- Myo-Hand (2)
- Myoelektrik (2)
- NB-IoT (2)
- NFC (2)
- Nachhaltigkeit (2)
- Neural networks (2)
- Neuronales Netz (2)
- Neurostimulation (2)
- Online-Marketing (2)
- Optimierung (2)
- Optimization (2)
- PKI (2)
- PUF key generation (2)
- Positron emission tomography (2)
- Predictive Maintenance (2)
- Predictive maintenance (2)
- Prothese (2)
- Prothetik (2)
- Pulmonalvenenisolation (2)
- RFID (2)
- Roboter (2)
- Röntgen (2)
- SLAM (2)
- Scalability (2)
- Schalllokalisation (2)
- Sicherheit (2)
- Stability (2)
- Stromregelung (2)
- Subspace Clustering (2)
- Substrates (2)
- Supraventricular tachycardia (2)
- Switches (2)
- Transfer learning (2)
- Triggerstabilität (2)
- UWB radars (2)
- Virtual Reality (2)
- Visualisierung (2)
- Webentwicklung (2)
- Zustandsraum (2)
- Zustandsregler (2)
- accountability (2)
- adversarial attacks (2)
- ancient Capua leg (2)
- anthropomorphic hand replacement (2)
- atrial fibrillation (2)
- augmented reality (2)
- autoattack (2)
- binaural hearing (2)
- cardiac ablation (2)
- cochlear implant (2)
- computer-aided design (2)
- convolutional neural networks (2)
- debinding (2)
- detection (2)
- efficient training (2)
- esophageal catheter (2)
- explainability (2)
- fairness (2)
- finite element method (2)
- hearing aid (2)
- heat pump (2)
- imaging algorithms (2)
- industrial communication (2)
- interactive visualization (2)
- interaural stimulation timing (2)
- medical imaging (2)
- microwave (2)
- molybdenum (2)
- peer-to-peer (2)
- physical unclonable function (2)
- physically unclonable function (PUF) (2)
- predictive maintenance (2)
- pulmonary vein isolation (2)
- resource efficiency (2)
- responsibility (2)
- scattering measurements (2)
- semantics (2)
- speech in noise (2)
- trust (2)
- understandability (2)
- visual control (2)
- zweite "Eiserne Hand" (2)
- 2-Phasen-Commit (1)
- 3D CAD (1)
- 3D Strukturlichtscanner (1)
- 3D light scanning (1)
- 3D multi-material printing (1)
- 3D-Modelling (1)
- 3D-Visualisierung (1)
- 3D-light scanning (1)
- 3D-print (1)
- 3d print (1)
- 5G mobile communication (1)
- 5G private networks (1)
- 65D17 (1)
- 65D18 (1)
- 68U05 (1)
- AC machines (1)
- AIN Cantilever (1)
- AR (1)
- AR glasses (1)
- ASP.NET Core (1)
- AV nodal reentry tachycardia (1)
- AV reentrant tachycardia (1)
- Abbildungsqualität (1)
- Abguss der Hand (1)
- Ablationstherapie (1)
- Ackermann-Formel (1)
- Ackermann´s formula (1)
- Additive Manufacturing (1)
- Adversarial Attacks (1)
- Adversarial Robustness (1)
- Adversarial examples (1)
- Adversarial robustness (1)
- Agent based sensor (1)
- Agrophotovoltaics (1)
- Air Pollution (1)
- Akrogerie (1)
- Algorithmus (1)
- Aluminum (1)
- Amazon Web Services (1)
- Amplitude and Phase Errors (1)
- Ancient Capua leg (1)
- Android (1)
- Angle of Arrival (1)
- Angular (1)
- Anlagenüberwachung (1)
- Antenna measurements (1)
- Antennas (1)
- Anti-Windup (1)
- Antriebsregelung (1)
- App-Store (1)
- Approximation (1)
- Archiv für Kriminologie (1)
- Artificial Intelligence (1)
- Artifizielle Kognition (1)
- Atrial fibrillation (1)
- Attention-basiert (1)
- Audiometrie (1)
- Audiosignalverarbeitung (1)
- Aufmerksamkeit (1)
- Augmented reality (1)
- Augmented-reality glasses (1)
- Aurikuläre Stimulation (1)
- Authentication (1)
- Authorization (1)
- AutoML (1)
- Automated idea generation (1)
- Automation (1)
- Automotive Radar (1)
- Autopsie (1)
- Azzolini degli Onesti (1)
- BIC (1)
- Bartolomeo da Varignana (1)
- Batterie (1)
- Batteriemanagementsystem (1)
- Battery storage (1)
- Bausteinsicht (1)
- Bearing fault classification (1)
- Becquerel (1)
- Benchmarks (1)
- Berühmte Komponisten (1)
- Berühmte Maler (1)
- Berühmte Persönlichkeiten (1)
- Beurteilung (1)
- Bewegung (1)
- Binaural hearing (1)
- Binder-based AM (1)
- Binder-basiertes AM (1)
- Bioimpedanzmessung (1)
- Biomimetics (1)
- Biosignalverstärker (1)
- Blockchain-to-Blockchain communication (1)
- BlueZ (1)
- Bluetooth (1)
- Bluetooth Low Energy (1)
- Bluetooth-Applikation (1)
- Bluetooth-Standard (1)
- Bodenradar (1)
- Boundary conditions (1)
- Bowtie antenna (1)
- Business Intelligence (1)
- CANoe (1)
- CANopen (1)
- CIoT (1)
- CLS-Management (1)
- CO2-Bilanz (1)
- Calibration (1)
- Capua-Bein (1)
- Carbon Footprint (1)
- Cardiac modelling (1)
- Cardiac resynchronization therapy (1)
- Carpe diem (1)
- Cellular networks (1)
- Cesare Lombroso (1)
- Challenges in Action Recognition (1)
- Chemical engineering (1)
- Christian von Mechel (1)
- Cleaning (1)
- Cloud Computing (1)
- Cloud computing (1)
- Cloud storage (1)
- Clustering (1)
- Cochlea-Implantate (1)
- Cochlear-Implantat (1)
- Code Visualisierung (1)
- Code visualization (1)
- Cognitive Computing (1)
- Collaboration of Academia and Industry (1)
- Compensation (1)
- Compiler (1)
- Composable Commerce (1)
- Computer science (1)
- Constrained Networks (1)
- Control Algorithms (1)
- Controller PFC100; 2 x ETHERNET (1)
- Convolutional Neural Network (1)
- Convolutional neural networks (1)
- Crash tests (1)
- Cross-Cloud-Strategie (1)
- Current Control (1)
- Current control (1)
- DC-AC converters (1)
- DTLS (1)
- Dampferzeugung (1)
- Data breech (1)
- Datenanalyse (1)
- Datenmanagement (1)
- Datenqualität (1)
- Deactivation/activation processes (1)
- Debinding (1)
- Decarbonization (1)
- Decoupling (1)
- Deep Learning Verfahren (1)
- Deep Neural Network (1)
- Deep diffusion models (1)
- Defibrillatortherapie (1)
- Demand side flexibility (1)
- DevExtreme (1)
- Device characterization (1)
- Diagnostics (1)
- Digital Beamforming (1)
- Digital Flex Twin Optimization (1)
- Digitale Fotografie (1)
- Digitale Turschilder (1)
- Digitalization (1)
- Discrete-time model (1)
- Diseases (1)
- Distributed Co-Simulation Protocol (1)
- Docker (1)
- Document Denoising (1)
- Domenico Scarlatti (1)
- Drehstrom (1)
- Drehstromantrieb (1)
- Drehzahlregelung (1)
- Druckmessung (1)
- Drucksensor (1)
- Durchflussmessung von Gasen (1)
- Durchlaufzeiten (1)
- E-Commerce System (1)
- E-Ink (1)
- E-Learning (1)
- EAP-Protokoll (1)
- EAP-TLS (1)
- EKF-SLAM (1)
- EKG (1)
- ERP-System (1)
- ESP-IDF (1)
- ETAP Simulations (1)
- ETL Data Pipeline (1)
- EU Timber Regulation (1)
- Echtzeitsystem (1)
- Eco-inventive principles (1)
- Economics (1)
- Edge AI (1)
- Edge Computing (1)
- Education (1)
- Effizienz (1)
- Ehlers-Danlos-Syndrom Typ IV (1)
- Eigenvalues (1)
- Eingabemethode (1)
- Eingebettete Systeme (1)
- Einkommensverhältnisse in der Barockzeit (1)
- Electric Tractors (1)
- Electric Vehicle (1)
- Electrical Engineering (1)
- Electrical and electronic engineering (1)
- Electrical drives (1)
- Electrode Model (1)
- Electromagnetic and thermal simulation (1)
- Electronic Commerce (1)
- Electronic Engineering (1)
- Elektroden-Interface (1)
- Elektromagnetische Reflexionsmethode (1)
- Elektromobilität (1)
- Elektroniksystem (1)
- Elektrophysiologie (1)
- Elektrophysiologische Untersuchung (1)
- Elektrotherapie (1)
- Embalming (1)
- Embedded (1)
- Embedded AI (1)
- Embedded Linux (1)
- Embedded Rust (1)
- Embedded System (1)
- Empfehlung (1)
- Empfehlungssysteme (1)
- Energieautark (1)
- Energiemarkt (1)
- Energiespeicherung (1)
- Energietechnik (1)
- Energieversorgung (1)
- Energiewende (1)
- Energiewirtschaft (1)
- Energiezelle (1)
- Energy Flexibility for Companies (1)
- Energy Harvesting (1)
- Energy Management (1)
- Energy Marketing of Industrial Flexibilities (1)
- Energy System Model (1)
- Energy Transition (1)
- Energy systems modeling (1)
- Energy-Harvesting (1)
- Entbinderung (1)
- Enterprise-Resource-Planning (1)
- Entropie (1)
- Entropy (1)
- Entscheidungslogik (1)
- Entwurfsmuster (1)
- Environmental monitoring (1)
- Erlang (1)
- Error (1)
- Erweiterte Realität (1)
- Esophageal catheter (1)
- Esophageal electrode (1)
- Estimation (1)
- Etylizer (1)
- Evaluation (1)
- Exoskelett (1)
- Explainable AI (1)
- Extensible Authentication Protocol (1)
- FDM-Technik (1)
- FFI (1)
- FLITZMO (1)
- FOTA (1)
- FUSION (1)
- Fahrerloses Transportsystem (1)
- Failure analysis (1)
- Famous composers (1)
- Fanny Hensel (1)
- Fault Classification (1)
- Fault classification (1)
- Federated Learning (1)
- Feldorientierung (1)
- Field Programmable Gate Array (FPGA) (1)
- Field-programmable gate array (FPGA) (1)
- Finite-Elemente-Methode (1)
- Firmware (1)
- Forschung (1)
- Fotografie (1)
- Fototechnik (1)
- Fotovoltaik (1)
- Framework (1)
- Freiheitsgrade (1)
- Funktionalismus (1)
- Furuta pendulum (1)
- Fused Filament Fabrication (1)
- Fußballroboter (1)
- Fußgängererkennung (1)
- Führungsentkopplung (1)
- Führungsgrößenkorrektur (1)
- GPR (1)
- Ganganalyse (1)
- General Energy (1)
- Generative models (1)
- Generics (1)
- Genetic Algorithm (1)
- Genetischer Algorithmus (1)
- Gesicht / Mustererkennung (1)
- Gesichtserkennung (1)
- Giftmord (1)
- Glasfaser (1)
- Gleichstrom (1)
- Go (1)
- Green House effect (1)
- Grinding machines (1)
- Ground penetrating radar (1)
- HF Ablation (1)
- HWS-Schleudertrauma (1)
- Halbleitertechnologie (1)
- Hals-Nasen-Ohren-Heilkunde (1)
- Halswirbelsäule (1)
- Handschrift (1)
- Handswritten Character Recognition (1)
- Handynacken (1)
- Hannes hand (1)
- Hard rock (1)
- Hardware (1)
- Hardware Security (1)
- Harmonic analysis (1)
- Head-mounted Display (1)
- Heart Rhythm Model (1)
- Heart Rhythm Simulation (1)
- Heart rhythm simulation (1)
- Hemodynamic monitoring (1)
- Herzfehler (1)
- Herzfrequenzvariabilität (1)
- Herzkatheterablation (1)
- Herzschrittmachertherapie (1)
- Heuristic algorithms (1)
- High frequency ablation (1)
- Higher Education (1)
- Hirnstammessung (1)
- His-Bundle Pacing (1)
- His-bundle pacing (1)
- Hocheffizienzfahrzeug (1)
- Hochschule (1)
- Hochschullehre (1)
- Hochspannung (1)
- Horaz (1)
- Hot-Spot (1)
- Hybrid Vehicle (1)
- Hybrid system (1)
- Hybride Lehre (1)
- Hybrides Lehren und Lernen (1)
- Hydrokultur (1)
- Hydroponic Farming (1)
- Hydrosphygmograph (1)
- Hyperparameter (1)
- Hörforschung (1)
- Hörgeräte (1)
- Hörsystem (1)
- IEC/IEEE 60802 security (1)
- IEEE802.15.4 (1)
- Impedanzkardiografie (1)
- Implantierbare Neurostimulatoren (1)
- InceptionTime (1)
- Induktive Schnittstelle (1)
- Industrial Blockchain (1)
- Industrial internet of things (1)
- Industrie 4.0 (1)
- Industrie 4.0 Software (1)
- Industry 4.0 (1)
- Industry Use cases (1)
- Industry automation (1)
- Inertial (1)
- Infrarot-Spektroskopie (1)
- Ink (1)
- Integration (1)
- Integrierte Schaltung (1)
- Intelligentes Messsystem (1)
- Intelligentes Stromnetz (1)
- Intermediate domain (1)
- Interoperability (1)
- Inventive principles (1)
- Inventive problem solving (1)
- Inverters (1)
- IoT (1)
- IoT Security (1)
- Island Architecture (1)
- JavaScript (1)
- JavaScript Frameworks (1)
- Jitter (1)
- Kamera-Tracking (1)
- Kamerasystem (1)
- Kanalisation (1)
- Key (1)
- Kindersterblichkeit (1)
- Klassifikation (1)
- Kognitionswissenschaften (1)
- Kognitive Kybernetik (1)
- Kommunikationsprotokoll (1)
- Konfigurationen (1)
- Konnektionismus (1)
- Konsensbildung (1)
- Konstruktivismus (1)
- Kriminalanthropologie (1)
- Kriminaltechnik (1)
- Kriminologie (1)
- LINUX (1)
- LOAM (LiDAR odometry and mapping) (1)
- LPWAN (1)
- LQR (1)
- LSTM (1)
- LabVIEW Programmierung (1)
- Large Grid-Connected PV Systems (1)
- Last-Test (1)
- Laufen lernen (1)
- Laufzeitsicht (1)
- Lecture Tracking (1)
- Left Atrial Appendage Closure (1)
- Lehr-/Lernkonzepte (1)
- Lehrmittel (1)
- Lehrszenarien (1)
- Leistungsbedarf (1)
- Leistungselektronik (1)
- Leonardo da Vinci (1)
- LiDAR (1)
- Lichtsetzung (1)
- Limiting (1)
- Linear MPC (1)
- Linux (1)
- LoRaWAN (1)
- Load Flow Analysis (1)
- Logic gates (1)
- Lokalisation (1)
- Lokalisationstest (1)
- Long Term Evolution (1)
- Low Carbon network (1)
- Low-Cost Füllstandssensor (1)
- Low-Power (1)
- Low-latency (1)
- Luftschadstoffprognose (1)
- Luftschiff (1)
- Luftverunreinigender Stoff (1)
- LwM2M (1)
- Lügendetektor (1)
- M. Pick (1)
- MEMS (1)
- MIMO (1)
- MINT (1)
- MLOps (1)
- MPC (1)
- MVC (1)
- Machine learning (1)
- Machine-learning (1)
- Magnetic resonance (1)
- Magnetic sensors (1)
- Management (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Marfan-Syndrom (1)
- Marketing (1)
- Maschinelles Sehen (1)
- Material Flow (1)
- Materialfluss (1)
- Mathematik (1)
- Maurice Ravel (1)
- Maßstab (1)
- Mean Square Error (1)
- Measurement (1)
- Mechanik (1)
- Medizingeschichte (1)
- Medizinprodukterecht (1)
- Mehrgrößenregelung (1)
- Memento mori! (1)
- Messbereichserweiterung (1)
- Messstellenbetriebsgesetz (1)
- Metaprogrammierung (1)
- Micro-electromechanical system (1)
- Microcontroller (1)
- Microgrid(s) (1)
- Microservice (1)
- Microsoft dot net (1)
- Microtunnelling (1)
- Mikrocontroller (1)
- Mikrocontroller ESP32 (1)
- Mikroservice (1)
- Mild traumatic brain injury (1)
- Mobilfunk (1)
- Mode Collapse (1)
- Model Calibration (1)
- Model Predictive Control (1)
- Model Search (1)
- Model-View-Controller (1)
- Modellierung (1)
- Modellprädiktive Regelung (1)
- Moderne Messeinrichtung (1)
- Mona Lisa (1)
- Monitoring (1)
- Monocular Depth Estimation (1)
- Monte-Carlo (1)
- Monte-Carlo Simulation (1)
- Monte-Carlo method (1)
- Multi-task learning (1)
- Multiside heart stimulation (1)
- Mumie (1)
- Mumifizierung von Leichen (1)
- Mummy (1)
- Musik (1)
- MySQL (1)
- NETCONF security (1)
- Nahfeldkommunikation (1)
- Naming Game (1)
- Nature-inspired principles (1)
- Natürliche Kognition (1)
- Network Test (1)
- Netzintegration (1)
- Netzwerk (1)
- Netzüberwachung (1)
- Neural Architecture Search (1)
- Neuroakustik (1)
- Neurologie (1)
- Neuroprothetics (1)
- Neurosyphilis (1)
- Nicolo Paganini (1)
- Noise measurement (1)
- Nyquist-Shannon (1)
- OT security (1)
- OTA (1)
- OTRS (1)
- Octave Convolution (1)
- Ofenparametrisierung (1)
- Okkluder (1)
- Online Lehre (1)
- Open Mobile Alliance (1)
- Optical Fiber Network (1)
- Optical Network (1)
- Optimisation (1)
- Optimization and control (1)
- Optimization with Digital Twins (1)
- Optische Zeichenerkennung (1)
- Organic electronics (1)
- Otto Lilienthal (1)
- PI control (1)
- PLA-Filamente (1)
- PROFINET (1)
- PROFINET IO (1)
- PROFINET Security (1)
- PV (1)
- PV System (1)
- PV power forecast (1)
- PV-Module (1)
- PWA (1)
- Parallelization (1)
- Parameter Estimation (1)
- Parameter estimation (1)
- Parameteridentifikation (1)
- Particle swarm optimization (1)
- Passives System (1)
- Pathophysiologie (1)
- Pattern Recognition (1)
- Peak shaving (1)
- Peer to peer network (1)
- Penetration prediction (1)
- Perfomance-Test (1)
- Performance (1)
- Performance Monitoring (1)
- Performance evaluation (1)
- Permanent magnet machines (1)
- Personalized prostheses (1)
- Photovoltaik (1)
- Physical Distancing (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Physically Unclonable Function (1)
- Physiological Pacing (1)
- Physiological cardiac pacing (1)
- Pierre-Marie-Bamberger syndrome (1)
- Plattform (1)
- Polvorgabe (1)
- Polygraph (1)
- Positionsschätzung (1)
- Power Consumption (1)
- Power Loss (1)
- Predictions (1)
- Predictive Control (1)
- Predictive Models (1)
- Printed Electronics (1)
- Process design (1)
- Production (1)
- Produktion (1)
- Prognose (1)
- Programmablauf (1)
- Programmierung (1)
- Programming Languages (1)
- Progressive Web App (1)
- Prothesen und Implantate (1)
- Proximal Policy Optimization (1)
- Prozessatmosphären (1)
- Prüfstand (1)
- Public-Key-Infrastructure (1)
- Pulmonary Vein Isolation (PVI) (1)
- Pulmonary vein isolation (1)
- Pulse width modulation (1)
- Python (1)
- Python Visualisierung (1)
- Python visualization (1)
- RFID-/NFC-Ausleseschnittstelle (1)
- ROS (1)
- RTK (1)
- RUL (1)
- RabbitMQ (1)
- Radio frequency (1)
- Radiofrequency identification (1)
- Random call model (1)
- Real-Time Communication (1)
- Recommendations (1)
- Reduktionismus (1)
- Regelung (1)
- Regler-Windup (1)
- Regression (1)
- Regularization (1)
- Rehabilitation (1)
- Reinforcement Learning (1)
- Reinforcement learning (1)
- Rekonstruktion (1)
- Rektifizierung (1)
- Remaining useful life (1)
- Renewable Energy Markets (1)
- Representation Learning (1)
- ResNet (1)
- Resistance (1)
- Rest (1)
- Restbussimulation (1)
- Riefelharnisch (1)
- Road-Quality Prediction (1)
- Robert Schumann (1)
- RoboCup3D (1)
- Robot Inertia Parameter Identification (1)
- Robotic (1)
- Rosalia Lombardo (1)
- Rotation Matrix (1)
- Rotational pendulum (1)
- Rotors (1)
- Roubst overfitting (1)
- Rückstellmechanismus (1)
- SOA (1)
- SPS-Programmierung (1)
- SSH (1)
- Sampling (1)
- Schaltwerk (1)
- Schlüssel (1)
- Schnittstelle (1)
- Schulprojekt (1)
- Schädel-Hirn-Trauma (1)
- Scientific Reports (1)
- Second Iron Hand (1)
- Second-order Optimization (1)
- Seismic processing (1)
- Self-Calibration (1)
- Semiconductor Device (1)
- Semiconductor device measurement (1)
- Sensopart Kamera: VISOR V20 Robotic Advanced (1)
- Sensor phenomena and characterization (1)
- Sequenzielle Schaltung (1)
- Service Worker (1)
- Shell Eco-marathon (1)
- Siamesische Neuronale Netze (1)
- Simulation und Modellierung (1)
- Sintering (1)
- Skelett (1)
- Small Talk (1)
- Smart City (1)
- Smart Energy Metering (1)
- Smart Gardening (1)
- Smart Grids (1)
- Smart Home (1)
- Smart Load Management (1)
- Smart Meter Gateway (1)
- Smart metering (1)
- Smart-UPS (1)
- SmartMAC (1)
- Smartphone (1)
- Social Distancing (1)
- Software Integration (1)
- Software algorithms (1)
- Software for measurements (1)
- Softwareanforderungen (1)
- Softwarearchitektur (1)
- Softwaredokumentation (1)
- Softwareentwicklung (1)
- Solar Radiation (1)
- Soziale Netzwerke (1)
- Spacial Anchors (1)
- Spielstrategie (1)
- Spinal cord stimulation (1)
- Split-Manufacturing (1)
- Sprachwahrnehmung (1)
- Stabilisierung (1)
- Stand Alone (1)
- Static interaural time offsets (1)
- Station Festo Pick&Place (1)
- Stellgrößenbegrenzung (1)
- Steuerbarkeit (1)
- Steuereinheit (1)
- Steuerung (1)
- Strahlfertigungsverfahren (1)
- Strecken-Windup (1)
- Stromregelung von Drehstromantrieben (1)
- Stromversorgungsnetz (1)
- Stromzustandsregler (1)
- Struma (1)
- Studieneingangsphase (1)
- Störgrößenbeobachter (1)
- Störmodell (1)
- Subarachnodialblutung (1)
- Supraventrikuläre Tachyarrhythmien (1)
- Sustainability (1)
- Sustainable technology (1)
- Synchronisation (1)
- Synchronmaschine (1)
- Synthetischer Datensatz (1)
- Systemarchäologie (1)
- Systematic innovation (1)
- Systemintegration (1)
- TBM performance (1)
- TCP/IP, Modbus-TCP (1)
- TLS (1)
- TRIZ methodology (1)
- TSN security (1)
- Test (1)
- Testablauf (1)
- Testbed (1)
- Testen (1)
- Testsystem (1)
- Ticketingsystem (1)
- Time Sensitive Networking (1)
- Time Series Classification (1)
- Time Synchronization (1)
- Time series data (1)
- Time-series Classification (1)
- TinyML (1)
- Tool Center Point (1)
- Torque (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Transesophageal left atrial pacing (1)
- Transesophageal neurostimulation (1)
- Transformer (1)
- Transösophageale Neurostimulation (1)
- Triangulation (1)
- Triangulation Camera (1)
- Trust management (1)
- Trägheitsparameteridentifikation (1)
- URLLC (1)
- Ultra-Low Energy (1)
- Ultra-Low-Power (1)
- Umwelterziehung (1)
- Unreal Engine (1)
- Unsupervised Conditional Training (1)
- Unsupervised Learning (1)
- Unterrichtsmethode (1)
- Unterschenkelprothese (1)
- Update (1)
- Utility tunnelling (1)
- V2X (1)
- VANET (1)
- Variational Autoencoders (1)
- Verfahren (1)
- Vergiftungsfälle (1)
- Vergänglichkeit (1)
- Verkehr (1)
- Verstärker (1)
- Vesuvius eruption (1)
- Vierquadrantensteller (1)
- Virtuelle Akustik (1)
- Visual Analytics (1)
- Visual Components (1)
- Visual control (1)
- Vitalparametern bei Kleinstlebewesen (1)
- Voltage measurement (1)
- Vorhofseptumdefekt (1)
- Vorkurse (1)
- Vue (1)
- Web development (1)
- Webserver Perfomance (1)
- Whiplash injury (1)
- Whiplash-associated disorders (1)
- Wilhelm His Sr. (1)
- Wireless IoT (1)
- Wireless Sensor Nodes (1)
- Wireless Technology (1)
- Wissenschaftsphilosophie (1)
- Wärmepumpen (1)
- X-in-the-loop (1)
- Yolov5 (1)
- Zentrale Sauerstoffversorgung (1)
- Zertifikate (1)
- Zumi (1)
- Zwei-Faktor-Authentifizierung (1)
- Zweite "Eiserne Hand" (1)
- accelerometer (1)
- adversarial (1)
- adversarial detection (1)
- aerosol modeling (1)
- agile Softwarearchitektur (1)
- air raid of the Royal College of Surgeons London (1)
- ambiguity (1)
- analog physical unclonable function system (1)
- anisotropy (1)
- anthropology (1)
- anthropomorphic replacement hand (1)
- arc42-Template (1)
- artificial neural networks (1)
- assessment (1)
- atrial flutter (1)
- atrial septal defect (1)
- attribute manipulation (1)
- audiometry (1)
- auditorisch evozierte Potentiale (1)
- auditory model (1)
- augmented reality glasses (1)
- authentication (1)
- authorization (1)
- autoML (1)
- autonomous systems (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- biocompatibility test (1)
- biodegradable (1)
- biodegradable implants (1)
- biomechanical stimulation (1)
- bionics (1)
- blockchain-based system (1)
- brain vitrification (1)
- building management systems (1)
- camera-based navigation (1)
- cellular metals (1)
- cellular radio (1)
- cifar (1)
- climate emulation (1)
- composite materials (1)
- compression (1)
- computer graphics (1)
- computer network management (1)
- computer vision (1)
- consensus + innovations (1)
- contour lines (1)
- copper oxide (1)
- correlation (1)
- craniomaxillofacial surgery (1)
- credentials (1)
- crossbar (1)
- curb (1)
- curriculum learning (1)
- cybersecurity (1)
- data quality (1)
- deep reinforcement learning (1)
- defense (1)
- degradation stages (1)
- degrees of freedom (1)
- device closure (1)
- device delay mismatch (1)
- dictionary passing (1)
- digitaler Zwilling (1)
- diode modeling (1)
- distributed energy resources (1)
- distributed ledger (1)
- drumstick fingers (1)
- echocardiography (1)
- economic dispatch (1)
- effective medium theory (1)
- electric machine (1)
- electrical conductivity (1)
- electricity market (1)
- electrode-free (1)
- electrolyte-gated transistors (1)
- electrolytic cell (1)
- electrophysiological investigation (1)
- embedded systems (1)
- energy harvesting (1)
- engine-in-the-loop (1)
- eurocity persons (1)
- exoskeleton (1)
- face editing (1)
- face recognition (1)
- fail-operational (1)
- fingerprinting (1)
- first Röntgen picture (1)
- first iron hand (1)
- fourier (1)
- framework (1)
- frühe Neuzeit (1)
- furnace parameterization (1)
- game theory (1)
- gan (1)
- gedruckte Elektronik (1)
- generative adversarial networks (1)
- gossip protocol (1)
- ground penetrating radar (1)
- hair (1)
- hand prostheses (1)
- hand prosthetic (1)
- hardware-in-the-loop (1)
- heart rhythm simulation (1)
- height estimation (1)
- hieroglyphs (1)
- history-inspired (1)
- home automation (1)
- hybrid electric vehicle (1)
- hybrid networks (1)
- hybrid systems (1)
- hämodynamische Parameter (1)
- identification (1)
- image color analysis (1)
- image processing (1)
- imagenet (1)
- impedance cardiography (1)
- in-vitro Simulation (1)
- indium oxide (1)
- industrial Ethernet (1)
- industrial IoT (1)
- infrared spectroscopy (1)
- input-output decoupling (1)
- integer linear programming (1)
- intelligent neuroprosthetics (1)
- intermediate domain (1)
- internal combustion engine (1)
- interpretation (1)
- invasive (1)
- irrigation (1)
- isocontour lines (1)
- isocontouring (1)
- isocontours (1)
- isosurfaces (1)
- lageunabhängigkeit (1)
- legacy machines (1)
- level set (1)
- lid (1)
- lifelong learning (1)
- linguistics (1)
- lithium-ion battery (1)
- low-cost sensors and devices (1)
- lower limb prosthesis (1)
- maceration, vessel elements (1)
- machine-to-machine communication (1)
- mahalanobis (1)
- maintenance (1)
- manufacturing industries (1)
- manufacturing process (1)
- mapping (1)
- marching cubes (1)
- marching tetrahedra (1)
- matrix modules (1)
- mechanical properties (1)
- medical history (1)
- metal oxide reduction (1)
- metal oxide transistor (1)
- metaprogramming (1)
- micro-photovoltaic system (1)
- millimeter-wave (1)
- mobile robotics (1)
- model predictive control (1)
- model-predictive control (1)
- mold (1)
- multipath (1)
- multivariable control (1)
- musical history (1)
- mutual authentication (1)
- natürliche Leistung (1)
- navigation (1)
- network optimization (1)
- neural architecture search (1)
- neurology (1)
- nicht-invasives Messsystem (1)
- nickel oxide (1)
- noise measurement (1)
- non-invasive (1)
- nose (1)
- ns-3 (1)
- oil painting (1)
- open fitting (1)
- optimization (1)
- osseointegration (1)
- osteosynthesis (1)
- oxide electronics (1)
- oxygen membrane (1)
- pandemics (1)
- parking (1)
- partial shading (1)
- pattern recognition (1)
- pedestrian detection (1)
- perception (1)
- percolation (1)
- performance (1)
- personalization (1)
- physics-informed ML (1)
- plague (1)
- pn-diode (1)
- pole placement (1)
- pose estimation (1)
- powertrain testing (1)
- precision medicine (1)
- predictive control (1)
- primary authentication (1)
- primary progressive aphasia (1)
- primäre progrediente Aphasie (1)
- printed Antennas (1)
- process atmosphere (1)
- programming languages (1)
- proof-of-concept study (1)
- prostheses (1)
- prosthetics (1)
- pruning (1)
- quality feedback survey and results assessment (1)
- radiation protection (1)
- radio networks (1)
- random resistor networks (1)
- ray tracing (1)
- real-time system (1)
- real-time systems (1)
- rekeying (1)
- remaining useful life (1)
- renewable energy (1)
- robustness (1)
- sample‐to‐sample fluctuation (1)
- scalability (1)
- scalar fields (1)
- second "Iron Hand" (1)
- secure communication (1)
- security keys (1)
- seismic (1)
- semf (1)
- sensor and actuator networks (1)
- sensory feedback (1)
- septal occluder device (1)
- sharding algorithm (1)
- shingle solar cells (1)
- shop floor (1)
- short-term solar forecast (1)
- silicone (1)
- single-sign-on (1)
- sintering (1)
- skin cancer (1)
- skin cancer detection (1)
- smalltalk (1)
- software defined radio (1)
- solar module (1)
- sparse backpropagation (1)
- spatial release from maskin (1)
- spectral defense (1)
- spectraldefense (1)
- speech intelligibility model (1)
- spinal cord stimulation (1)
- split manufacturing (1)
- statistical methods, ROS (1)
- stochastic approach (1)
- stochastic computing (1)
- storage efficiency (1)
- storage optimization (1)
- style (1)
- style transfer (1)
- summarization (1)
- surface nets (1)
- surgical navigation (1)
- syndrome coding (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature sensor (1)
- tessellation (1)
- test bench (1)
- test bench coupling (1)
- thermoelectrics (1)
- thickness estimation (1)
- thinned ASIC in foil (1)
- throughput (1)
- titanium (1)
- titanium fibers (1)
- topology (1)
- tracking (1)
- transesophageal electrical pacing (1)
- transesophageal neurostimulation (1)
- transfer learning (1)
- transmit beamforming (1)
- triangulation (1)
- trust management (1)
- trust management system (1)
- trustworthy ai (1)
- unilateral hearing loss (1)
- unique interdisciplinary international higher education approach (1)
- universal Roboter UR5e (1)
- upper limb (1)
- ventricular tachycardia (1)
- virtual simulations (1)
- visual analytics (1)
- visualization (1)
- visuelle Steuerung (1)
- watch glass nails (1)
- wide area networks (1)
- wireless sensor networks (1)
- wood identification (1)
- z-Transformation (1)
- zeitdiskrete Regelverfahren (1)
- zeitdiskreter PI-Zustandsregler (1)
- zeros (1)
- zweistufiger Beobachterentwurf (1)
- Ösophaguselektrodensonde (1)
- Ösophaguskatheter (1)
- Übersetzungsstrategie (1)
- übertragbare Wirkleistung (1)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (563) (remove)
Open Access
- Open Access (251)
- Closed Access (180)
- Closed (120)
- Bronze (54)
- Diamond (31)
- Gold (29)
- Grün (3)
- Hybrid (3)
Solar energy plays a central role in the energy transition. Clouds generate locally large fluctuations in the generation output of photovoltaic systems, which is a major problem for energy systems such as microgrids, among others. For an optimal design of a power system, this work analyzed the variability using a spatially distributed sensor network at Stuttgart Airport. It has been shown that the spatial distribution partially reduces the variability of solar radiation. A tool was also developed to estimate the output power of photovoltaic systems using irradiation time series and assumptions about the photovoltaic sites. For days with high fluctuations of the estimated photovoltaic power, different energy system scenarios were investigated. It was found the approach can be used to have a more realistic representation of aggregated PV power taking spatial smoothing into account and that the resulting PV power generation profiles provide a good basis for energy system design considerations like battery sizing.
With the expansion of IoT devices in many aspects of our life, the security of such systems has become an important challenge. Unlike conventional computer systems, any IoT security solution should consider the constraints of these systems such as computational capability, memory, connectivity, and power consumption limitations. Physical Unclonable Functions (PUFs) with their special characteristics were introduced to satisfy the security needs while respecting the mentioned constraints. They exploit the uncontrollable and reproducible variations of the underlying component for security applications such as identification, authentication, and communication security. Since IoT devices are typically low cost, it is important to reuse existing elements in their hardware (for instance sensors, ADCs, etc.) instead of adding extra costs for the PUF hardware. Micro-electromechanical system (MEMS) devices are widely used in IoT systems as sensors and actuators. In this thesis, a comprehensive study of the potential application of MEMS devices as PUF primitives is provided. MEMS PUF leverages the uncontrollable variations in the parameters of MEMS elements to derive secure keys for cryptographic applications. Experimental and simulation results show that our proposed MEMS PUFs are capable of generating enough entropy for a complex key generation, while their responses show low fluctuations in different environmental conditions.
Keeping in mind that the PUF responses are prone to change in the presence of noise and environmental variations, it is critical to derive reliable keys from the PUF and to use the maximum entropy at the same time. In the second part of this thesis, we elaborate on different key generation schemes and their advantages and drawbacks. We propose the PUF output positioning (POP) and integer linear programming (ILP) methods, which are novel methods for grouping the PUF outputs in order to maximize the extracted entropy. To implement these methods, the key enrollment and key generation algorithms are presented. The proposed methods are then evaluated by applying on the responses of the MEMS PUF, where it can be practically shown that the proposed method outperforms other existing PUF key generation methods.
The final part of this thesis is dedicated to the application of the MEMS PUF as a security solution for IoT systems. We select the mutual authentication of IoT devices and their backend system, and propose two lightweight authentication protocols based on MEMS PUFs. The presented protocols undergo a comprehensive security analysis to show their eligibility to be used in IoT systems. As the result, the output of this thesis is a lightweight security solution based on MEMS PUFs, which introduces a very low overhead on the cost of the hardware.
The number of use cases for autonomous vehicles is increasing day by day especially in commercial applications. One important application of autonomous vehicles can be found within the parcel delivery section. Here, autonomous cars can massively help to reduce delivery efforts and time by supporting the courier actively. One important component of course is the autonomous vehicle itself. Nevertheless, beside the autonomous vehicle, a flexible and secure communication architecture also is a crucial key component impacting the overall performance of such system since it is required to allow continuous interactions between the vehicle and the other components of the system. The communication system must provide a reliable and secure architecture that is still flexible enough to remain practical and to address several use cases. In this paper, a robust communication architecture for such autonomous fleet-based systems is proposed. The architecture provides a reliable communication between different system entities while keeping those communications secure. The architecture uses different technologies such as Bluetooth Low Energy (BLE), cellular networks and Low Power Wide Area Network (LPWAN) to achieve its goals.
The desire to connect more and more devices and to make them more intelligent and more reliable, is driving the needs for the Internet of Things more than ever. Such IoT edge systems require sound security measures against cyber-attacks, since they are interconnected, spatially distributed, and operational for an extended period of time. One of the most important requirements for the security in many industrial IoT applications is the authentication of the devices. In this paper, we present a mutual authentication protocol based on Physical Unclonable Functions, where challenge-response pairs are used for both device and server authentication. Moreover, a session key can be derived by the protocol in order to secure the communication channel. We show that our protocol is secure against machine learning, replay, man-in-the-middle, cloning, and physical attacks. Moreover, it is shown that the protocol benefits from a smaller computational, communication, storage, and hardware overhead, compared to similar works.
Die Erfindung betrifft ein Verfahren zum Maximieren der von einer analogen Entropiequelle abgeleiteten Entropie, wobei das Verfahren folgende Schritte aufweist:- Bereitstellen von Eingabedaten für die analoge Entropiequelle (2);- Erzeugen von Rückgabewerten durch die analoge Entropiequelle basierend auf den Eingabedaten (3); und- Gruppieren der Rückgabewerte, wobei das Gruppieren der Rückgabewerte ein Anwenden von Versätzen auf Rückgabewerte aufweist (4).
In recent years, Physical Unclonable Functions (PUFs) have gained significant attraction in the Internet of Things (IoT) for security applications such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of physical devices to generate unique fingerprints for security applications. One common approach for designing PUFs is exploiting the intrinsic features of sensors and actuators such as MEMS elements, which typically exist in IoT devices. This work presents the Cantilever-PUF, a PUF based on a specific MEMS device – Aluminum Nitride (AlN) piezoelectric cantilever. We show the variations of electrical parameters of AlN cantilevers such as resonance frequency, electrical conductivity, and quality factor, as a result of uncontrollable manufacturing process variations. These variations, along with high thermal and chemical stability, and compatibility with silicon technology, makes AlN cantilever a decent candidate for PUF design. We present a cantilever design, which magnifies the effect of manufacturing process variations on electrical parameters. In order to verify our findings, the simulation results of the Monte Carlo method are provided. The results verify the eligibility of AlN cantilever to be used as a basic PUF device for security applications. We present an architecture, in which the designed Cantilever-PUF is used as a security anchor for PUF-enabled device authentication as well as communication encryption.
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT security applications, such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of different devices to generate unique fingerprints for security applications. When generating PUF-based secret keys, the reliability and entropy of the keys are vital factors. This study proposes a novel method for generating PUF-based keys from a set of measurements. Firstly, it formulates the group-based key generation problem as an optimization problem and solves it using integer linear programming (ILP), which guarantees finding the optimum solution. Then, a novel scheme for the extraction of keys from groups is proposed, which we call positioning syndrome coding (PSC). The use of ILP as well as the introduction of PSC facilitates the generation of high-entropy keys with low error correction costs. These new methods have been tested by applying them on the output of a capacitor network PUF. The results confirm the application of ILP and PSC in generating high-quality keys.
Physical unclonable functions (PUFs) are increasingly generating attention in the field of hardware-based security for the Internet of Things (IoT). A PUF, as its name implies, is a physical element with a special and unique inherent characteristic and can act as the security anchor for authentication and cryptographic applications. Keeping in mind that the PUF outputs are prone to change in the presence of noise and environmental variations, it is critical to derive reliable keys from the PUF and to use the maximum entropy at the same time. In this work, the PUF output positioning (POP) method is proposed, which is a novel method for grouping the PUF outputs in order to maximize the extracted entropy. To achieve this, an offset data is introduced as helper data, which is used to relax the constraints considered for the grouping of PUF outputs, and deriving more entropy, while reducing the secret key error bits. To implement the method, the key enrollment and key generation algorithms are presented. Based on a theoretical analysis of the achieved entropy, it is proven that POP can maximize the achieved entropy, while respecting the constraints induced to guarantee the reliability of the secret key. Moreover, a detailed security analysis is presented, which shows the resilience of the method against cyber-security attacks. The findings of this work are evaluated by applying the method on a hybrid printed PUF, where it can be practically shown that the proposed method outperforms other existing group-based PUF key generation methods.
This thesis focuses on the development and implementation of a Datagram Transport Layer Security (DTLS) communication framework within the ns-3 network simulator, specifically targeting the LoRaWAN model network. The primary aim is to analyse the behaviour and performance of DTLS protocols across different network conditions within a LoRaWAN context. The key aspects of this work include the following.
Utilization of ns-3: This thesis leverages ns-3’s capabilities as a powerful discrete event network simulator. This platform enables the emulation of diverse network environments, characterized by varying levels of latency, packet loss, and bandwidth constraints.
Emulation of Network Challenges: The framework specifically addresses unique challenges posed by certain network configurations, such as duty cycle limitations. These constraints, which limit the time allocated for data transmission by each device, are crucial in understanding the real-world performance of DTLS protocols.
Testing in Multi-client-server Scenarios: A significant feature of this framework is its ability to test DTLS performance in complex scenarios involving multiple clients and servers. This is vital for assessing the behaviour of a protocol under realistic network conditions.
Realistic Environment Simulation: By simulating challenging network conditions, such as congestion, limited bandwidth, and resource constraints, the framework provides a realistic environment for thorough evaluation. This allows for a comprehensive analysis of DTLS in terms of security, performance, and scalability.
Overall, this thesis contributes to a deeper understanding of DTLS protocols by providing a robust tool for their evaluation under various and challenging network conditions.
Diese Arbeit befasst sich mit der Redigitalisierung von ausgedruckten Architektur-zeichnungen mit möglichst einfachen Mitteln. So sollen Fotos von herkömmlichen Smartphones die Grundlage für die Extraktion von Maßstab und Raumgeometrien sein.
Der erste der drei Schritte, die das Foto dabei durchläuft, ist die Beseitigung von perspektivischen Verzerrungen (Rektifizierung). Die hierfür benötigten Punkte werden durch ein, in dieser Arbeit trainiertes, Convolutional Neural Network (CNN) detektiert. Die so ermittelten Positionen stellen im zweiten Schritt, der Ermittlung eines Maßstabes, die Grundlage für das Auslesen der Maßzahlen mittels optical character recognition (OCR) dar. Da Räume nicht als solche in Bauzeichnungen eingezeichnet sind, werden im letzten Schritt, zuerst Wände, Türen und Fenster, durch mehrere mathematische Faltungen (convolutions) lokalisiert und innerhalb dieser Elemente, mittels wachsender Regionen, nach Räumen und Fluren gesucht.
Nach dem ein Foto diese Schritte durchlaufen hat, werden die ermittelten Geometrien sowie der Maßstab in einer Liste abgespeichert und im rektifizierten Bild, zusammen mit den berechneten Flächeninhalten, visualisiert. So kann ein Anwender schnell und einfach den Erfolg des Programmoutputs beurteilen.
Eine Versuchsreihe mit einigen Fotos ergab, dass ein Schattenwurf auf dem Papierplan bei Aufnahme des Lichtbildes zu vermeiden ist, da dieser sowohl bei der Auswertung durch das CNN, als auch innerhalb des OCR-Vorgangs zu Problemen führt, die in einigen Fällen eine Rektifizierung oder Maßstabsermittlung verhinderten.
Bei den übrigen fünf Fotos wurden durchschnittlich 31,8 von 32 Räumen detektiert, dabei wurde zwischen zwei und zwölf mal fälschlicherweise die Fensterbank als Fußboden detektiert. Die Standardabweichung der Flächeninhalte aller Räume betrug dabei 0,66 m², werden nur die Räume betrachtet, bei denen die Fensterbank korrekt erkannt wurde, beträgt die Standardabweichung lediglich 0,25 m².
Insgesamt werden die in dieser Arbeit erzielten Ergebnisse als „gut“ eingestuft, es bleiben jedoch auch einige Optimierungsmöglichkeiten an verschiedenen Stellen, besonders bei der Suche nach Räumen, bestehen.