Refine
Year of publication
Document Type
- Conference Proceeding (223) (remove)
Conference Type
- Konferenzartikel (200)
- Konferenz-Abstract (11)
- Konferenzband (6)
- Konferenz-Poster (5)
- Sonstiges (1)
Keywords
- Finite-Elemente-Methode (4)
- Kühldecke (4)
- Raumklima (4)
- 3D printing (3)
- Applied computing (3)
- Biomechanik (3)
- Couplings (3)
- Deep Leaning (3)
- Design automation (3)
- Education (3)
- Klimatechnik (3)
- Materialermüdung (3)
- Rissausbreitung (3)
- TRIZ (3)
- AI-Aided Innovation (2)
- Additive Manufacturing (2)
- Current measurement (2)
- E-Learning (2)
- Eco-Innovation (2)
- FETs (2)
- Festigkeit (2)
- Finite difference methods (2)
- Frequency (2)
- Geophysik (2)
- HCI (2)
- Harmonic analysis (2)
- Information systems (2)
- Integrated circuit interconnections (2)
- Künstliche Intelligenz (2)
- Machine Learning (2)
- Microwave devices (2)
- Optimierung (2)
- Process Design (2)
- Radar (2)
- Roboter (2)
- Robotics (2)
- Semiconductor device packaging (2)
- Substrates (2)
- Sustainabilty (2)
- Switches (2)
- Tragfähigkeit (2)
- Transceivers (2)
- UWB radars (2)
- User Experience (2)
- Voice User Experience (2)
- Wärmekonvektion (2)
- Zugbeanspruchung (2)
- catheter ablation (2)
- certificate management (2)
- cryptography (2)
- energy harvesting (2)
- imaging algorithms (2)
- medical imaging (2)
- microwave (2)
- programming (2)
- scattering measurements (2)
- standardization (2)
- 100% Renewable (1)
- 2D-TLC (1)
- 3D Printed Force Sensor (1)
- 3D displays (1)
- 3D modeling (1)
- 3D-Druck (1)
- 4D-Druck (1)
- 4D-Printing (1)
- 5G mobile communication (1)
- 5G private networks (1)
- AIN Cantilever (1)
- Abbreviate Injury Scale (1)
- Abkühlung (1)
- Abtastfrequenz (1)
- Academic Advising (1)
- Accident Analysis (1)
- Additive Fertigung (1)
- Additive Manufacture (1)
- Adressdaten (1)
- Advanced Driver Assistance System (1)
- Agent based sensor (1)
- Air Traffic Control (1)
- Aircraft (1)
- Aluminum (1)
- Analogsignal (1)
- Anti-Windup (1)
- Anwender-Software (1)
- Approximation (1)
- Artificial Intelligence (1)
- Attenuation (1)
- Auflösungsvermögen (1)
- Authentication (1)
- Authorization (1)
- Automation (1)
- BLE (1)
- Bauteilfestigkeit (1)
- Bearings (1)
- Belüftung (1)
- Benutzererlebnis (1)
- Beschichtung (1)
- Beschleunigung (1)
- Betriebsverhalten (1)
- Bike Path Analysis (1)
- Binary Executable (1)
- Biologische Methanisierung (1)
- Blechformteil (1)
- Blended Learning (1)
- Blockchain (1)
- Blockchains (1)
- Boundary conditions (1)
- Bowtie antenna (1)
- Bremsvorgang (1)
- Business Model Canvas (1)
- CNN (1)
- COVID (1)
- Cameras (1)
- Capacitive Liquid Level Sensor (1)
- Car-2-Car communication (1)
- Car-2-X communication (1)
- Chatbot (1)
- Checkout (1)
- Checkout-Prozess (1)
- Chemical Engineering (1)
- Chemical engineering (1)
- Chip-Karte (1)
- Circular polarizing filter (1)
- Cleaning (1)
- Closed-form solution (1)
- Coatings (1)
- Cobotik (1)
- Collaboration (1)
- Collaborative learning (1)
- Collision Point (1)
- Communication networks (1)
- Computer Aided Innovation (1)
- Computer-assisted instruction (1)
- Conversational user experience (1)
- Convolutional neural networks (1)
- Couplers (1)
- Creativity (1)
- Cybersecurity (1)
- DC-DC-Wandler (1)
- DDS (1)
- DVB-T (1)
- Data Distribution Service (1)
- Data breech (1)
- Data communications (1)
- Data modeling (1)
- Databases (1)
- Datenanalyse (1)
- Datenaufzeichnung (1)
- Datenqualität (1)
- Datenspeicher (1)
- Dauerschwingprüfung (1)
- Debinding (1)
- Deckenkühlung (1)
- Deckschicht (1)
- Deep Learning (1)
- Deep Neural Network (1)
- Deepfake (1)
- Demand side flexibility (1)
- Design Science (1)
- Design method (1)
- Device independency (1)
- Differential equations (1)
- Digital Flex Twin Optimization (1)
- Digitalization (1)
- Diode-array detection (1)
- Downlink (1)
- Drehstrommotor (1)
- Druckbeanspruchung (1)
- Durchlauferhitzerprinzip (1)
- E-learning (1)
- EAP-TLS (1)
- EMG features (1)
- ETAP Simulations (1)
- Easter Package (1)
- Eco-Design (1)
- Eco-inventive Principles (1)
- Eco-inventive principles (1)
- Economics (1)
- Edge mode (1)
- Effectiveness of fraud detection (1)
- Einsamkeit (1)
- Elderly (1)
- Electromagnetic compatibility (1)
- Electronic Commerce (1)
- Electronic Shopping (1)
- Elektrolokomotive (1)
- Embedded Constantan Wire (1)
- Emotional Communication (1)
- Emotional Interaction (1)
- Empirical Research (1)
- Empirical Studies (1)
- Empirical research (1)
- Energiebilanz (1)
- Energieeffizienz (1)
- Energietechnik (1)
- Energieverbrauch (1)
- Energy Flexibility (1)
- Energy Flexibility for Companies (1)
- Energy Management (1)
- Energy Marketing of Industrial Flexibilities (1)
- Energy Storage Systems (1)
- Energy Transition (1)
- Energy storage (1)
- Energy systems modeling (1)
- Engineering Design (1)
- Enhanced Security (1)
- Enterprise computing (1)
- Equations (1)
- Equivalent circuits (1)
- Erdwärme (1)
- Ermüdungslebensdauer (1)
- Estimation (1)
- European structural and investment funds (1)
- Extrusion (1)
- Eye Tracking (1)
- Fahrzeugantrieb (1)
- Failure analysis (1)
- Fault Classification (1)
- Feasibility study (1)
- Featherweight Go (1)
- Federal Republic of Germany (1)
- Fertigungsautomatisierung (1)
- Filament (1)
- Filters (1)
- Finite element analysis (1)
- Finite-Differenz-Methode (1)
- Finite-Differenzen-Methode (1)
- Flugregelung (1)
- Flugzeugsteuerwerk (1)
- Flüssigkeit (1)
- Formgebung (1)
- Frameworks (1)
- Fraud detection rates (1)
- Fused Filament Fabrication (1)
- Fused Layer Modeling (1)
- Fuzzy-Logik (1)
- Fördertechnik (1)
- Gait phase detection (1)
- Gamification (1)
- Gebäudeheizung (1)
- Geothermie (1)
- Geschäftsmodell (1)
- Gesundheit (1)
- Gesundheitsgefährdung (1)
- Gewichtseinsparung (1)
- Glasfaserkabel (1)
- Glasfaseroptik (1)
- Gratings (1)
- Gummi (1)
- Gyroskop (1)
- HPTLC (1)
- Handschrift (1)
- Handswritten Character Recognition (1)
- Health (1)
- Herzschrittmacher (1)
- Heuristische Evaluation, (1)
- High-Cycle Fatigue (1)
- Hot forging (1)
- Hubschrauber (1)
- Hubvorrichtung (1)
- Human computer interaction (1)
- Human-Robot Collaboration (1)
- Human-centered computing (1)
- Humanoid robot (1)
- Humanoid robots programming (1)
- Hybrid system (1)
- Höhensensor (1)
- IEC/IEEE 60802 security (1)
- IEEE802.11p/WAVE (1)
- IIoT (1)
- Image restoration (1)
- In-flight entertainment (1)
- Inclined surface (1)
- Industrial Blockchain (1)
- Inertial (1)
- Inertial measurement unit (1)
- Injection Moulding (1)
- Integriertes Lernen (1)
- Interferometrie (1)
- Internet Overlay networks (1)
- Inventive Design (1)
- Inverters (1)
- IoT Security (1)
- IoT security (1)
- Irregularities (1)
- Isolation (1)
- Joining processes (1)
- Jones calculus (1)
- KI-Labor Südbaden (1)
- Kennlinie (1)
- Klimaanlage (1)
- Knowledge sharing (1)
- Knowledge-based innovation (1)
- Kostensenkung (1)
- Kraftmessung (1)
- Kundendaten (1)
- Kupplung (1)
- Kühlluft (1)
- Kühlsystem (1)
- LXP (1)
- Language acquisition (1)
- Large Grid-Connected PV Systems (1)
- Laserabtasten (1)
- Legionellenproblematik (1)
- Leistungsbewertung (1)
- Leistungsdichte (1)
- Lichtdispersion (1)
- Limiting (1)
- Lithium compounds (1)
- Lithium niobate (1)
- Load Flow Analysis (1)
- Logic gates (1)
- Lokalisierung (1)
- Low-Cycle Fatigue (1)
- Luftkühlung (1)
- Lüftung (1)
- Lüftungsanlage (1)
- MEMS (1)
- Machine learning (1)
- Magnetic sensors (1)
- Magnetismus (1)
- Manufacturing (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Martensitic die steel (1)
- Maschinenbauindustrie (1)
- Material Extrusion (1)
- Material Properties (1)
- Mathematical model (1)
- Mathematisches Modell (1)
- Media Object (1)
- Media Stream (1)
- Medizintechnik (1)
- Metallization (1)
- Meters (1)
- Microwave integrated circuits (1)
- Microwave integrated circuits Equivalent circuits (1)
- Mobile device (1)
- Mobile devices (1)
- Modellhubschrauber (1)
- Modellsimulation (1)
- Monitoring (1)
- Monocular Depth Estimation (1)
- Monomodefaser (1)
- Montagevorrichtung (1)
- Monte-Carlo method (1)
- Motivation (1)
- Multimedia information systems (1)
- Myocontrol (1)
- NB-IoT (1)
- NETCONF security (1)
- Nachtsichtgerät (1)
- Nature-Inspired Innovation (1)
- Network topology (1)
- Netzintegration (1)
- Nonlinear waves (1)
- Nonlinearity (1)
- OT security (1)
- Objekterkennung (1)
- Off-Shore-Anlage (1)
- Online Magazine (1)
- Online-Shop (1)
- Ontology (1)
- Optimization (1)
- Optimization and control (1)
- Optimization with Digital Twins (1)
- Optische Zeichenerkennung (1)
- PCB-printing (1)
- PI control (1)
- PKI (1)
- PROFINET Security (1)
- PV System (1)
- Parameter estimation (1)
- Peer to peer computing (1)
- Peer to peer network (1)
- Performance (1)
- Performance evaluation (1)
- Periodic Table of AI (1)
- Permanent magnet machines (1)
- Pflanzenkohle (1)
- Photography (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Plastic Sheet (1)
- Plasticity model (1)
- Plastizität (1)
- Poisoning (1)
- Polarization (1)
- Power Loss (1)
- Predictions (1)
- Predictive Maintenance (1)
- Printing parameters (1)
- Produktentwicklung (1)
- Propagation losses (1)
- Prosthetic control (1)
- Prozessautomation (1)
- Pufferspeicher (1)
- Pulse width modulation (1)
- Qualitätskontrolle (1)
- Quarter-wave plate (1)
- RPA (1)
- RUL (1)
- Radio frequency (1)
- Rails (1)
- Random call model (1)
- Rapid Prototype (1)
- Raumtemperatur (1)
- Rauscheigenschaft (1)
- Rauschminderung (1)
- Rechneranwendung (1)
- Recommendation (1)
- Renewable Energy Markets (1)
- Resonatorfilter (1)
- Reynolds-Zahl (1)
- Risikobewertung (1)
- Robot vision systems (1)
- Robotic Process Automation (1)
- Robotik (1)
- Robustness (1)
- Rohr (1)
- Rohrbiegen (1)
- Rotors (1)
- Routing (1)
- Running (1)
- Sandwich-Konstruktion (1)
- Sandwichbauweise (1)
- Schubbeanspruchung (1)
- Security (1)
- Seilwinde (1)
- Selective Laser Sinter (1)
- Semiconductor device measurement (1)
- Sensing Element (1)
- Sensor phenomena and characterization (1)
- Separation Monitoring (1)
- Service Specification (1)
- Session Initiation Protocol (1)
- Signalabtastung (1)
- Signalumsetzung (1)
- Simulationsprogramm (1)
- Sintering (1)
- Smart Energy Metering (1)
- Smart Materials (1)
- Smart grids (1)
- Smart-UPS (1)
- Social Isolation (1)
- Social Media (1)
- Social Robots (1)
- Soft Robot (1)
- Software (1)
- Software Robot (1)
- Software algorithms (1)
- Software-Engineering (1)
- Software-Qualitätssicherung (1)
- Software-Sicherheit (1)
- Software-Testautomatisierung (1)
- Software-Tool (1)
- Softwarearchitektur (1)
- Softwareforschung (1)
- Solar Radiation (1)
- Solitary waves (1)
- Sonnenenergienutzung (1)
- Soziale Roboter (1)
- Speichertechnik (1)
- Sportmedizin (1)
- Stahlband (1)
- Stahlrohr (1)
- Stereobildverarbeitung (1)
- Streaming Service (1)
- Stromerzeugung (1)
- Stromregelung (1)
- Stromzustandsregler (1)
- Strukturanalyse (1)
- Strömungsmessung (1)
- Strömungsprofil (1)
- Strömungsvorgang (1)
- Student activities (1)
- Sulphonamides (1)
- Surface acoustic wave (1)
- Surface acoustic waves (1)
- Sustainable development (1)
- Sweaty (1)
- Synchronmaschine (1)
- Systementwurf (1)
- TLC (1)
- TLS (1)
- TSN security (1)
- Tailored-Strip (1)
- Tailored-Tube (1)
- Target Group Oriented Communication (1)
- Target Group Oriented Design (1)
- Target Vehicle (1)
- Temperature sensors (1)
- Temperaturfeld (1)
- Temperaturmessung (1)
- Temperaturverteilung (1)
- Testbed (1)
- Theory of computation (1)
- Thermische Solaranlage (1)
- Thermologger (1)
- Thermomechanische Ermüdung (1)
- Tiefziehen (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- Time series data (1)
- TinyOS (1)
- Torque (1)
- Total Harmonic Distortion (1)
- Training (1)
- Transducers (1)
- Transfer learning (1)
- Traubenzucker (1)
- Traubenzucker-Brennstoffzelle (1)
- Trinkwassererzeugung (1)
- Trust management (1)
- Umwandlungswirkungsgrad (1)
- Umwelttechnik (1)
- University students (1)
- Urformen (1)
- Usability (1)
- Use Case (1)
- User generated content (1)
- User interface (1)
- User-generated content (1)
- VANETs (1)
- VRU eSafety (1)
- Verifiability (1)
- Verlassenheit (1)
- Versuchsergebnis (1)
- Vibrotactile Feedback (1)
- Virtual Reality (1)
- Virtual private networks (1)
- Virtual reality (1)
- Visual programming (1)
- Visual programming languages (1)
- Voice assistants (1)
- Voice user interfaces (1)
- Wahrscheinlichkeitsrechnung (1)
- Wanddicke (1)
- Warenkorbabbruch (1)
- Warmwasserbereiter (1)
- Web service architecture (1)
- Wedge waves (1)
- Werkstofffehler (1)
- Windgeschwindigkeit (1)
- Windkraftanlage (1)
- Windturbine (1)
- Windturm (1)
- Wirbelströmung (1)
- Wireless IoT (1)
- Wireless M-Bus (1)
- World Wide Web (1)
- Wärmepumpe (1)
- Wärmepumpen (1)
- Wärmeübertragung (1)
- Yolov5 (1)
- Zweitaktmotor (1)
- accelerometer (1)
- ad hoc networks (1)
- anisotropy (1)
- approximation (1)
- asymmetry (1)
- athletic performance (1)
- bearing (1)
- bench-marking (1)
- biochar (1)
- biocompatibility test (1)
- biodegradable (1)
- biologische Brennstoffzelle (1)
- biomaterials (1)
- building energy model (1)
- car-to-car communication (1)
- carbon elements (1)
- climate (1)
- crack growth simulation (1)
- credentials (1)
- curriculum learning (1)
- cushioning (1)
- data aggregation (1)
- data replication (1)
- deep reinforcement learning (1)
- degradation stages (1)
- detection (1)
- dictionary passing (1)
- digitale Signalverarbeitung (1)
- distributed systems (1)
- dreidimensionale Darstellung (1)
- eingebettete Datenverarbeitung (1)
- embedded systems (1)
- emulation (1)
- energy consumption (1)
- energy efficiency (1)
- eversion (1)
- gamification (1)
- glazing systems (1)
- ground penetrating radar (1)
- guided waves (1)
- heat pump (1)
- high performance (1)
- iSign (1)
- implantierbares System (1)
- industrial IoT (1)
- inertiales Navigationssystem (1)
- injury (1)
- inter-vehicle communication (1)
- intra-vehicle communication (1)
- kinetic (1)
- konstitutive Gleichung (1)
- localization (1)
- loneliness (1)
- low power wireless (1)
- machine learning (1)
- magnetoactive smart materials (1)
- magnetresponsive Werkstoffe (1)
- masked Stereolithography (1)
- mechanische Haftung (1)
- mehrachsige Spannung (1)
- message complexity (1)
- micronization (1)
- middleware (1)
- midsole (1)
- mikroelektromechanisches System (1)
- millimeter-wave (1)
- mobile app (1)
- mobile applications (1)
- mobiler Roboter (1)
- model driven design (1)
- model-predictive control (1)
- molybdenum (1)
- mutual authentication (1)
- neuronales Netz (1)
- nonlinearity (1)
- numerische Simulation (1)
- numerisches Verfahren (1)
- orthosis (1)
- performance (1)
- performance analysis (1)
- performance evaluation (1)
- physical unclonable function (1)
- predictive maintenance (1)
- primary authentication (1)
- printed electronics (1)
- programming languages (1)
- railways (1)
- random call model (1)
- real time (1)
- resource efficiency (1)
- road and track running (1)
- robot (1)
- running shoe (1)
- running shoes (1)
- secondary surveillance radar (1)
- secure communication (1)
- semantics (1)
- sensor network (1)
- shoe (1)
- skin cancer (1)
- skin cancer detection (1)
- smart materials (1)
- smart metering (1)
- software defined radio (1)
- solar module (1)
- soliton (1)
- subsystem design (1)
- system authenticity (1)
- temperature sensor (1)
- thermodynamischer Wirkungsgrad (1)
- thinned ASIC in foil (1)
- three-dimensional kinematic (1)
- transmit beamforming (1)
- vehicular networks (1)
- vibration harvester (1)
- virtual reality (1)
- wedge wave (1)
- wireless access networks (1)
- wireless comunication (1)
- wireless sensor (1)
- wireless sensor networks (1)
- wireless vehicular network (1)
- Ältere (1)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (61)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (55)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (52)
- Fakultät Wirtschaft (W) (46)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (21)
- INES - Institut für nachhaltige Energiesysteme (12)
- Fakultät Medien (M) (ab 22.04.2021) (10)
- IMLA - Institute for Machine Learning and Analytics (10)
- IBMS - Institute for Advanced Biomechanics and Motion Studies (ab 16.11.2022) (7)
- CRT - Campus Research & Transfer (5)
Open Access
- Closed (223) (remove)
In anisotropic media, the existence of leaky surface acoustic waves is a well-known phenomenon. Very recently, their analogs at the apex of an elastic silicon wedge have been found in experiments using laser-ultrasonics. In addition to a wedge-wave (WW) pulse with low speed, a pseudo-wedge wave (p-WW) pulse was found with a velocity higher than the velocity of shear bulk waves, propagating in the same direction. With a probe-beam-deflection technique, the propagation of the WW pulses was monitored on one of the faces of the wedge at variable distance from the apex. In this way, their depth structure and the leakage of the p-WW could be visualized directly. Calculations were carried out using a method based on a representation of the displacement field in Laguerre functions. This method has been validated by calculating the surface density of states in anisotropic media and comparing the results with those obtained from the surface Green's tensor. The approach has then been extended to the continuum of acoustic modes in infinite wedges with fixed wave-vector along the apex. These calculations confirmed the measured speeds of the WW and p-WW pulses.
Anisotropy has been found to play an important role for the existence of edge-localized acoustic modes as well as for nonlinear effects in rectangular edges. For a certain propagation geometry in silicon, the effective second-order nonlinearity for wedge waves was determined numerically from second-order and third-order elastic moduli and compared with the nonlinearity for Rayleigh waves propagating in the direction of the apex on one of the two surfaces forming the edge. In the presence of weak dispersion resulting from modifications of the wedge tip or coating of the adjacent surfaces, solitary pulses are predicted to exist and their shape was calculated.
Previous studies of the hyphenation of gas chromatographic separation and spectrophotometric detection in the ultraviolet wavelength range between 168 and 330 nm showed a high potential for applications where the analysis of complex samples is required. Within this paper the development of a state-of-the-art detection system for compounds in the vapour phase is described, offering an improved behaviour compared to previous systems: Dependent on the requirements of established detection systems hyphenated with gas chromatography, the main components of the system have to be designed for optimum performance and reliability of the spectrophotometric detector: A deuterium lamp as a broadband light source has been selected for improved stability in the measurements. A new-type absorption cell based on fiber-optics has been developed considering the dynamic necessary to compete with existing techniques. In addition, the influence of the volume of the cell on the chromatogram needs to be analyzed. Tests for determining the performance of the absorption cell in terms of chemical and thermal influences have been carried out. A new spectrophotometer with adequate spectral resolution in the wavelength range, offering improved stability and dynamic for an efficient use in this application was developed. Furthermore, the influence of each component on the performance, reliability and stability of the sensor system will be discussed. An overview and outlook over the potential applications in the environmental, scientific and medical field will be given.
In thin-layer chromatography, fiber-bundle arrays have been introduced for spectral absorption measurements in the UV-region. Using all-silica fiber bundles, the exciting light will be detected after re-emission on the plate with a fiberoptic spectrometer. In addition, fluorescence light can be detected which will be masked by the re-emitted light. Therefore, it is helpful to separate the absorption and fluorescence on the TLC-plate. A modified three-array assembly has been developed: using one array for detection, the two others are used for excitation with broadband band deuterium-light and with UV-LEDs adjusted to the substances under test. As an example, the quantification of glucosamine in nutritional supplements or spinach leaf extract will be described. Using simply heating of the amino-plate for derivation, the reaction product of Glucosamine can be detected sensitively either by light absorption or by fluorescence, using the new fiber-optic assembly. In addition, the properties of the new 3-row fiber-optic array and the commercially available UV-LEDs will be shown, in the interesting wavelength region for excitation of fluorescence, from 260 nm to 360 nm. The squint angle having an influence on coupling efficiency and spatial resolution will be measured with the inverse farfield method. Some properties of UV-LEDs for analytical applications will be described and discussed, too.
Most E-Learning projects tend to separate learning activities from everyday work. This paper presents an approach where closer integration between learning and work is achieved by integrating multimedia services into manufacturing processes. The goal of E-Learning services integration in manufacturing is, through the development of new multimedia solutions, to accelerate and enhance the ability of manufacturing industry to capitalise on the emergence of a powerful global information infrastructure. In this paper we suggest to combine the areas of media streaming services and manufacturing processes, by providing electronic learning offerings as collections of media streaming services. The key components of our approach are 1) an xml based streaming service specification language, 2) automated configuration of distributed E-Learning streaming applications, 3) web services for searching, registration, and creation of E-Learning streaming services.
Integrating voice / video communication into business processes can accelerate resolution time, reduce mistakes, and establish a full audit-trail of the interactions. Some VoIP service providers offer website based or plugin based solutions, which are, however, difficult to integrate with other applications. A promising approach to overcome these disadvantages is the development of appropriate Web Services to allow applications interacting with a VoIP system. We propose a generic framework for VoIP applications consisting of an XML-based service specification language and a set of reusable Web Service components. Service providers using the proposed service-oriented architecture can offer to their customers a protocol-neutral Web Service interface, thus enabling the deployment of a general and integrated VoIP solution.
In this paper we suggest to combine the areas of media streaming services, mobile devices, and manufacturing processes to support monitoring, controlling and supervising production processes in order to achieve high levels of efficiency and environmentally friendly production. It contains a comprehensive and detailed explanation of the proposed E-Learning streaming framework, especially the adaption of streaming services to mobile environments. The key components of our approach are 1) an XML-based streaming service specification language, 2) adaption of multimedia E-Learning services to mobile environments, and 3) a media delivery platform for searching, registration, and creation of streaming services for mobile devices.
The central purpose of this paper is to present a novel framework supporting the specification and the implementation of media streaming services using XML and Java Media Framework (JMF). It provides an integrated service development environment comprising of a streaming service model, a service specification language and several implementation and retrieval tools. Our approach is based on a clear separation of a streaming service specification, and its implementation by a distributed JMF application and can be used for different streaming paradigms, e.g. push and pull services.
This paper presents an approach where closer integration between learning and work is achieved by integrating multimedia services into manufacturing processes. The goal of E-Learning services integration in manufacturing processes is, through the development of new multimedia services, to accelerate and enhance the ability of manufacturing industry to capitalise on the emergence of a powerful global information infrastructure. In this paper we suggest to combine the areas of media streaming services and manufacturing processes, by providing electronic learning offerings as collections of media streaming services. The key components of our approach are 1) an xml based streaming service specification language, 2) automated configuration of distributed E-Learning streaming applications, 3) Web Services for searching, registration, and creation of E-Learning streaming services.
We propose a new streaming media service development environment comprising of a streaming media service model, a XML based service specification language and several implementation and configuration management tools. In our project, the described approach is used for integration of streaming based eLearning services in manufacturing processes of a subcontractor to the automotive industry. The key components of our approach are 1) an xml based streaming service specification language, 2) a set of web services for searching, registration, and creation of streaming services, 3) caching and replication policies based on timing information derived from the service specifications.
The goal of eLearning services integration in manufacturing is, through the development of new multimedia solutions, to accelerate and enhance the ability of the manufacturing industry to capitalise on the emergence of a powerful global information infrastructure. The key components of our approach are: (1) an XML based streaming service specification language; (2) automatic configuration of distributed eLearning streaming service implementations; (3) a set of Web services for searching, registration, and creation of streaming services; (4) caching and replication policies based on timing information derived from the service specifications. We also introduce a new concept for cache management during runtime, e.g., content is distributed to cache servers located at the edge of a network close to the client.
The central purpose of this paper is to present a novel framework supporting the specification, the implementation and retrieval of media streaming services. It provides an integrated service development environment comprising of a streaming service model, a service specification language and several implementation and retrieval tools. Our approach is based on a clear separation of a streaming service specification, and its implementation by a distributed application and can be used for different streaming paradigms, e.g. push and pull services.
This paper treats the Brillouin backscattering in a single mode optical fiber and its implications on the Brillouin Ring Laser Gyroscope (BRLG). The BRLG consists of a fiber ring cavity in which stimulated Brillouin scattering is induced and provides two resonant counterpropagating backscattered waves. If this cavity is rotating around its axis, the backscattered waves get different resonant frequencies because of the Sagnac effect. The frequency difference is proportional to the rotation rate (Omega) by inducing a frequency offset between the counterpropagating waves. Some reported Brillouin spectra exhibit several peaks, which means that one pump wave provides at least two backscattered waves with distinguishable frequencies. In order to understand this multi-backscattering and to take advantage of it for the BRLG, we present results of a simulation of the Brillouin backscattering in a single mode optical fiber.
The prototype of an optical gyro encoder (OGE) has been successfully tested on the NTT telescope in September '93. The OGE consists of a ring laser gyro and a fiber optic gyro with their input axis parallel. The gyro outptu signals are compensated for earth rotation and misalignment and are subsequently integrated to get the angles. An adaptive digital control loop locks the fiber optic gyro to the laser gyro data. Thus the combined output has the precision of the laser gyro and the low noise of the fiber optic gyro. Specifically, the bias stability is better than 2 X 10-3 deg/h, the scale factor accuracy better than 1 ppm, the random walk coefficient better than 5 X 10-4 deg/(root)h and the resolution better than 3 X 10-4 arcsec. The OGE has been mounted in the altitude and in the azimuthy axis of the telescope. The data were compared with the telescope disk encoder data. The test data show that the pointing accuracy is about 1 arcsec and the tracking accuracy 0.1 arcsec over a time of 30 seconds. This accuracy is sufficient for the very large telescope, for instance.
An investigation is underway regarding the usefulness of altazimuth-mounting telescopes' incorporation of laser gyros for pointing and fiber gyros with extremely small random-walk coefficient for telescope inertial stabilization during tracking. A star tracker is expected to help stabilize long-term gyro bias. Gyro and telescope specifications have been derived by means of computer simulations and systems analyses.
Learning programming fundamentals is considered as one of the most challenging and complex learning activities. Some authors have proposed visual programming language (VPL) approaches to address part of the inherent complexity [1]. A visual programming language lets users develop programs by combining program elements, like loops graphically rather than by specifying them textually. Visual expressions, spatial arrangements of text and graphic symbols are used either as syntax elements or secondary notation. VPLs are normally used for educational multimedia, video games, system development, and data warehousing/business analytics purposes. For example, Scratch, a platform of Massachusetts Institute of Technology, is designed for kids and after school programs.
Design of mobile software applications is considered as one of the most challenging application domains due to the build in sensors as part of a mobile device, like GPS, camera or Near Field Communication (NFC). Sensors enable creation of context-aware mobile applications in which applications can discover and take advantage of contextual information, such as user location, nearby people and objects, and the current user activity. As a consequence, context-aware mobile applications can sense clues about the situational environment making mobile devices more intelligent, adaptive, and personalized. Such context aware mobile applications seem to be motivating and attractive case studies, especially for programming beginners (“my own first app”).
In this work, we introduce a use-case centered approach as well as clear separation of user interface design and sensor-based program development. We provide an in-depth discussion of a new VPL based teaching method, a step by step development process to enable programming beginners the creation of context aware mobile applications. Finally, we argue that addressing challenges for programming beginners by our teaching approach could make programming teaching more motivating, with an additional impact on the final software quality and scalability.
The key contributions of our study are the following:
- An overview of existing attempts to use VPL approaches for mobile applications
- A use case centered teaching approach based on a clear separation of user interface design and sensor-based program development
- A teaching case study enabling beginners a step by step creation of context-aware mobile applications based on the MIT App Inventor (a platform of Massachusetts Institute of Technology)
- Open research challenges and perspectives for further development of our teaching approach
References:
[1] Idrees, M., Aslam, F. (2022). A Comprehensive Survey and Analysis of Diverse Visual Programming Languages, VFAST Transactions on Software Engineering, 2022, Volume 10, Number 2, pp 47-60.
An international study summarizes the threat situation in the OT environment under the heading "Growing security threats" [1]. According to this study, attacks on automation systems are likely to increase in the future. Accordingly, an automation system must be able to protect the integrity of the transmitted information in the future. This requirement is motivated, among other things, by the fact that the network-side isolation of industrial communication systems is no longer considered sufficient as the sole protective measure. This paper uses the example of PROFINET to show how the future requirements for a real-time communication protocol can be met and how they can be derived from the IEC 62443 standard.
Polyarticulated active prostheses constitute a promising solution for upper limb amputees. The bottleneck for their adoption though, is the lack of intuitive control. In this context, machine learning algorithms based on pattern recognition from electromyographic (EMG) signals represent a great opportunity for naturally operating prosthetic devices, but their performance is strongly affected by the selection of input features. In this study, we investigated different combinations of 13 EMG-derived features obtained from EMG signals of healthy individuals performing upper limb movements and tested their performance for movement classification using an Artificial Neural Network. We found that input data (i.e., the set of input features) can be reduced by more than 50% without any loss in accuracy, while diminishing the computing time required to train the classifier. Our results indicate that input features must be properly selected in order to optimize prosthetic control.
Differentiation between human and non-human objects can increase efficiency of human-robot collaborative applications. This paper proposes to use convolutional neural networks for classifying objects in robotic applications. The body temperature of human beings is used to classify humans and to estimate the distance to the sensor. Using image classification with convolutional neural networks it is possible to detect humans in the surroundings of a robot up to five meters distance with low-cost and low-weight thermal cameras. Using transfer learning technique we trained the GoogLeNet and MobilenetV2. Results show accuracies of 99.48 % and 99.06 % respectively.
Detecting Images Generated by Deep Diffusion Models using their Local Intrinsic Dimensionality
(2023)
Diffusion models recently have been successfully applied for the visual synthesis of strikingly realistic appearing images. This raises strong concerns about their potential for malicious purposes. In this paper, we propose using the lightweight multi Local Intrinsic Dimensionality (multiLID), which has been originally developed in context of the detection of adversarial examples, for the automatic detection of synthetic images and the identification of the according generator networks. In contrast to many existing detection approaches, which often only work for GAN-generated images, the proposed method provides close to perfect detection results in many realistic use cases. Extensive experiments on known and newly created datasets demonstrate that the proposed multiLID approach exhibits superiority in diffusion detection and model identification.Since the empirical evaluations of recent publications on the detection of generated images are often mainly focused on the "LSUN-Bedroom" dataset, we further establish a comprehensive benchmark for the detection of diffusion-generated images, including samples from several diffusion models with different image sizes.The code for our experiments is provided at https://github.com/deepfake-study/deepfake-multiLID.
Following their success in visual recognition tasks, Vision Transformers(ViTs) are being increasingly employed for image restoration. As a few recent works claim that ViTs for image classification also have better robustness properties, we investigate whether the improved adversarial robustness of ViTs extends to image restoration. We consider the recently proposed Restormer model, as well as NAFNet and the "Baseline network" which are both simplified versions of a Restormer. We use Projected Gradient Descent (PGD) and CosPGD for our robustness evaluation. Our experiments are performed on real-world images from the GoPro dataset for image deblurring. Our analysis indicates that contrary to as advocated by ViTs in image classification works, these models are highly susceptible to adversarial attacks. We attempt to find an easy fix and improve their robustness through adversarial training. While this yields a significant increase in robustness for Restormer, results on other networks are less promising. Interestingly, we find that the design choices in NAFNet and Baselines, which were based on iid performance, and not on robust generalization, seem to be at odds with the model robustness.
The identification of vulnerabilities is an important element in the software development life cycle to ensure the security of software. While vulnerability identification based on the source code is a well studied field, the identification of vulnerabilities on basis of a binary executable without the corresponding source code is more challenging. Recent research [1] has shown how such detection can generally be enabled by deep learning methods, but appears to be very limited regarding the overall amount of detected vulnerabilities. We analyse to what extent we could cover the identification of a larger variety of vulnerabilities. Therefore, a supervised deep learning approach using recurrent neural networks for the application of vulnerability detection based on binary executables is used. The underlying basis is a dataset with 50,651 samples of vulnerable code in the form of a standardised LLVM Intermediate Representation. Te vectorised features of a Word2Vec model are used to train different variations of three basic architectures of recurrent neural networks (GRU, LSTM, SRNN). A binary classification was established for detecting the presence of an arbitrary vulnerability, and a multi-class model was trained for the identification of the exact vulnerability, which achieved an out-of-sample accuracy of 88% and 77%, respectively. Differences in the detection of different vulnerabilities were also observed, with non-vulnerable samples being detected with a particularly high precision of over 98%. Thus, our proposed technical approach and methodology enables an accurate detection of 23 (compared to 4 [1]) vulnerabilities.
The importance of machine learning (ML) has been increasing dramatically for years. From assistance systems to production optimisation to healthcare support, almost every area of daily life and industry is coming into contact with machine learning. Besides all the benefits ML brings, the lack of transparency and difficulty in creating traceability pose major risks. While solutions exist to make the training of machine learning models more transparent, traceability is still a major challenge. Ensuring the identity of a model is another challenge, as unnoticed modification of a model is also a danger when using ML. This paper proposes to create an ML Birth Certificate and ML Family Tree secured by blockchain technology. Important information about training and changes to the model through retraining can be stored in a blockchain and accessed by any user to create more security and traceability about an ML model.
Public educational institutions are increasingly confronted with a decline in the number of applicants, which is why competition between colleges and universities is also intensifying. For this reason, it is important to position oneself as an institution in order to be perceived by the various target groups and to differentiate oneself from the competition. In this context, the brand and thus its perception and impact play a decisive role, especially in view of the desired communication of the institution's own values and its self-image, the brand identity. To this end, emotions serve as an approach to creating positive stimulation and brand loyalty.
Visual programming languages (VPL) let users develop software programs by combining visual program elements, like lists of objects, loops or conditional statements rather than by specifying them textually.
Humanoid robots programming is a very attractive and motivating application domain for students, especially for programming beginners. Humanoid robots are constructed in such a way that they mimic the human body by using actuators that perform like muscles. Typically, a humanoid robot consists of sensors and actuators, i.e. torso, a head, two arms, and two legs, though some humanoid robots may replicate only part of the body, for example, from the waist up. In some cases, humanoid robots are equipped with heads designed to replicate additional human facial features such as eyes. Additional sensors are needed by a robot to gather information about the conditions of the environment to allow the robot to make necessary decisions about its position or certain actions that the situation requires, e.g. an arm movement or an open/close hand action. Other examples for sensor are reflective infrared sensors used to detect objects in proximity.
In this work, we introduce a use-case centered approach based on sensors and actors of a robot and a workflow model to visually describe the sequence of actions including conditional actions or concurrent actions. We provide an in-depth discussion of a new VPL based teaching method for programming humanoid robots based on VPLs. Open research challenges, limits and perspectives for further development of our teaching approach are discussed as well.
Printed electronics can add value to existing products by providing new smart functionalities, such as sensing elements over large-areas on flexible or non-conformal surfaces. Here we present a hardware concept and prototype for a thinned ASIC integrated with an inkjet-printed temperature sensor alongside in-built additional security and unique identification features. The hybrid system exploits the advantages of inkjet-printable platinum-based sensors, physically unclonable function circuits and a fluorescent particle-based coating as a tamper protection layer.
PROFINET Security: A Look on Selected Concepts for Secure Communication in the Automation Domain
(2023)
We provide a brief overview of the cryptographic security extensions for PROFINET, as defined and specified by PROFIBUS & PROFINET International (PI). These come in three hierarchically defined Security Classes, called Security Class 1,2 and 3. Security Class 1 provides basic security improvements with moderate implementation impact on PROFINET components. Security Classes 2 and 3, in contrast, introduce an integrated cryptographic protection of PROFINET communication. We first highlight and discuss the security features that the PROFINET specification offers for future PROFINET products. Then, as our main focus, we take a closer look at some of the technical challenges that were faced during the conceptualization and design of Security Class 2 and 3 features. In particular, we elaborate on how secure application relations between PROFINET components are established and how a disruption-free availability of a secure communication channel is guaranteed despite the need to refresh cryptographic keys regularly. The authors are members of the PI Working Group CB/PG10 Security.
Wireless communication networks are crucial for enabling megatrends like the Internet of Things (IoT) and Industry 4.0. However, testing these networks can be challenging due to the complex network topology and RF characteristics, requiring a multitude of scenarios to be tested. To address this challenge, the authors developed and extended an automated testbed called Automated Physical TestBed (APTB). This testbed provides the means to conduct controlled tests, analyze coexistence, emulate multiple propagation paths, and model dependable channel conditions. Additionally, the platform supports test automation to facilitate efficient and systematic experimentation. This paper describes the extended architecture, implementation, and performance evaluation of the APTB testbed. The APTB testbed provides a reliable and efficient solution for testing wireless communication networks under various scenarios. The implementation and performance verification of the testbed demonstrate its effectiveness and usefulness for researchers and industry practitioners.
TSN, or Time Sensitive Networking, is becoming an essential technology for integrated networks, enabling deterministic and best effort traffic to coexist on the same infrastructure. In order to properly configure, run and secure such TSN, monitoring functionality is a must. The TSN standard already has some preparations to provide such functionality and there are different methods to choose from. We implemented different methods to measure the time synchronisation accuracy between devices as a C library and compared the measurement results. Furthermore, the library has been integrated into the ControlTSN engineering framework.
As industrial networks continue to expand and connect more devices and users, they face growing security challenges such as unauthorized access and data breaches. This paper delves into the crucial role of security and trust in industrial networks and how trust management systems (TMS) can mitigate malicious access to these networks.The TMS presented in this paper leverages distributed ledger technology (blockchain) to evaluate the trustworthiness of blockchain nodes, including devices and users, and make access decisions accordingly. While this approach is applicable to blockchain, it can also be extended to other areas. This approach can help prevent malicious actors from penetrating industrial networks and causing harm. The paper also presents the results of a simulation to demonstrate the behavior of the TMS and provide insights into its effectiveness.
Fused Filament Fabrication (FFF) is a widespread additive manufacturing technology, mostly in the field of printable polymers. The use of filaments filled with metal particles for the manufacture of metallic parts by FFF presents specific challenges regarding debinding and sintering. For aluminium and its alloys, the sintering temperature range overlaps with the temperature range of thermal decomposition of many commonly used “backbone” polymers, which provide stability to the green parts. Moreover, the high oxygen affinity of aluminium necessitates the use of special sintering regimes and alloying strategies. Therefore, it is challenging to achieve both low porosity and low levels of oxygen and carbon impurities at the same time. Feedstocks compatible with the special requirements of aluminium alloys were developed. We present results on the investigation of debinding/sintering regimes by Fourier Transform Infrared spectroscopy (FTIR) based In-Situ Process Gas Analysis and discuss optimized thermal treatment strategies for Al-based FFF.
This book constitutes the proceedings of the 23rd International TRIZ Future Conference on Towards AI-Aided Invention and Innovation, TFC 2023, which was held in Offenburg, Germany, during September 12–14, 2023. The event was sponsored by IFIP WG 5.4.
The 43 full papers presented in this book were carefully reviewed and selected from 80 submissions. The papers are divided into the following topical sections: AI and TRIZ; sustainable development; general vision of TRIZ; TRIZ impact in society; and TRIZ case studies.
Eco-innovations in chemical processes should be designed to use raw materials, energy and water as efficiently and economically as possible to avoid the generation of hazardous waste and to conserve raw material reserves. Applying inventive principles identified in natural systems to chemical process design can help avoid secondary problems. However, the selection of nature-inspired principles to improve technological or environmental problems is very time-consuming. In addition, it is necessary to match the strongest principles with the problems to be solved. Therefore, the research paper proposes a classification and assignment of nature-inspired inventive principles to eco-parameters, eco-engineering contradictions and eco-innovation domains, taking into account environmental, technological and economic requirements. This classification will help to identify suitable principles quickly and also to realize rapid innovation. In addition, to validate the proposed classification approach, the study is illustrated with the application of nature-inspired invention principles for the development of a sustainable process design for the extraction of high-purity silicon dioxide from pyrophyllite ores. Finally, the paper defines a future research agenda in the field of nature-inspired eco-engineering in the context of AI-assisted invention and innovation.
In recent years, predictive maintenance tasks, especially for bearings, have become increasingly important. Solutions for these use cases concentrate on the classification of faults and the estimation of the Remaining Useful Life (RUL). As of today, these solutions suffer from a lack of training samples. In addition, these solutions often require high-frequency accelerometers, incurring significant costs. To overcome these challenges, this research proposes a combined classification and RUL estimation solution based on a Convolutional Neural Network (CNN) and a Long Short-Term Memory (LSTM) network. This solution relies on a hybrid feature extraction approach, making it especially appropriate for low-cost accelerometers with low sampling frequencies. In addition, it uses transfer learning to be suitable for applications with only a few training samples.
In recent times, 5G has found applications in several public as well as private networks. There is a growing need to make it compatible with diverse services without compromising security. Current security options for authenticating devices into a home network are 5G Authentication and Key Agreement (5G-AKA) and Extensible Authentication Protocol (EAP)-AKA'. However, for specific use cases such as private networks, more customizable and convenient authentication mechanisms are required. The current mobile networks use authentication based only on SIM cards, but as 5G is being applied in fields like IIoT and automation, even in Non-Public-Networks (NPNs), there is a need for a simpler method of authentication. Certificate-based authentication is one such mechanism that is passwordless and works solely on the information present in the digital certificate that the user holds. The paper suggests an authentication mechanism that performs certificate-based mutual authentication between the UE and the Home network. The proposed concept identifies both the user and network with digital certificates and intends to carry out primary authentication with the help of it. In this work we conduct a study on presently available authentication protocols for 5G networks, both theoretically and experimentally in hardware as well as virtual environments. On the basis of the analysis a series of proposed steps for certificate primary authentication are presented.
The Transport Layer Security protocol is a widespread cryptographic protocol designed to provide secure communication over insecure networks by providing authenticity, integrity, and confidentiality. As a first step, in the TLS Handshake Protocol a common master secret is negotiated. In many configurations, this step makes considerable use of asymmetric cryptographic algorithms. It seems to be a prevalent assumption that the use of such asymmetric cryptographic algorithms is unsuitable for resource-constrained devices. Therefore, the work at hand analyzes the runtime performance of the TLS vl.2 session establishments on an embedded ARM Cortex-M4 platform. We measure the execution time to generate and parse session establishment messages for the client and server sides. In particular, we study the impact of different elliptic curves used for the ephemeral Diffie-Hellman key exchange and the impact of different lengths and subject public key algorithms of certification paths. Our analysis shows that the use of asymmetric cryptographic algorithms is well possible on resource-constrained devices, if carefully chosen and well implemented. This allows the use of the well-proven TLS protocol also for applications from the (Industrial) Internet of Things, including Fieldbus communication.
The often-occurring short-term orders of manufactured products require a high machine availability. This requirement increases the importance of predictive maintenance solutions for bearings used in machines. There are, among others, hybrid solutions that rely on a physical model. For their usage, knowing the different degradation stages of bearings is essential. This research analyzes the underlying failure mechanisms of these stages theoretically and in a practical example of the well-known FEMTO dataset used for the IEEE PHM 2012 Data Challenge to provide this knowledge. In addition, it shows for which use cases the usage of low-frequency accelerometers is sufficient. The analysis provides that the degradation stages toward the end of the bearing life can also be detected with low-frequency accelerometers. Further, the importance of high-frequency accelerometers to detect bearing faults in early degradation stages is pointed out. These aspects have not been paid attention to by industry and research until now, despite providing a considerable cost-saving potential.
As cyber-attacks and functional safety requirements increase in Operational Technology (OT), implementing security measures becomes crucial. The IEC/IEEE 60802 draft standard addresses the security convergence in Time-Sensitive Networks (TSN) for industrial automation.We present the standard’s security architecture and its goals to establish end-to-end security with resource access authorization in OT systems. We compare the standard to our abstract technology-independent model for the management of cryptographic credentials during the lifecycles of OT systems. Additionally, we implemented the processes, mechanisms, and protocols needed for IEC/IEEE 60802 and extended the architecture with public key infrastructure (PKI) functionalities to support complete security management processes.
The automatic processing of handwritten forms remains a challenging task, wherein detection and subsequent classification of handwritten characters are essential steps. We describe a novel approach, in which both steps - detection and classification - are executed in one task through a deep neural network. Therefore, training data is not annotated by hand, but manufactured artificially from the underlying forms and yet existing datasets. It can be demonstrated that this single-task approach is superior in comparison to the state-of-the-art two task approach. The current study focuses on hand-written Latin letters and employs the EMNIST data set. However, limitations were identified with this data set, necessitating further customization. Finally, an overall recognition rate of 88.28% was attained on real data obtained from a written exam.
This paper presents a system that uses a multi-stage AI analysis method for determining the condition and status of bicycle paths using machine learning methods. The approach for analyzing bicycle paths includes three stages of analysis: detection of the road surface, investigation of the condition of the bicycle paths, and identification of substrate characteristics. In this study, we focus on the first stage of the analysis. This approach employs a low-threshold data collection method using smartphone-generated video data for image recognition, in order to automatically capture and classify surface condition and status.
For the analysis convolutional neural networks (CNN) are employed. CNNs have proven to be effective in image recognition tasks and are particularly well-suited for analyzing the surface condition of bicycle paths, as they can identify patterns and features in images. By training the CNN on a large dataset of images with known surface conditions, the network can learn to identify common features and patterns and reliably classify them.
The results of the analysis are then displayed on digital maps and can be utilized in areas such as bicycle logistics, route planning, and maintenance. This can improve safety and comfort for cyclists while promoting cycling as a mode of transportation. It can also assist authorities in maintaining and optimizing bicycle paths, leading to more sustainable and efficient transportation system.
In this paper we present the concept of the "KI-Labor Südbaden" to support regional companies in the use of AI technologies. The approach is based on the "Periodic Table of AI" and is extended with both new dimensions for sustainability, and the impact of AI on the working environment. It is illustrated on the basis of three real-world use cases: 1. The detection of humans with lowresolution infrared (IR) images for collaborative robotics; 2. The use of machine data from specifically designed vehicles; 3. State-of-the-art Large Language Models (LLMs) applied to internal company documents. We explain the use cases, thereby demonstrating how to apply the Periodic Table of AI to structure AI applications.
This study focuses on the autonomous navigation and mapping of indoor environments using a drone equipped only with a monocular camera and height measurement sensors. A visual SLAM algorithm was employed to generate a preliminary map of the environment and to determine the drone's position within the map. A deep neural network was utilized to generate a depth image from the monocular camera's input, which was subsequently transformed into a point cloud to be projected into the map. By aligning the depth point cloud with the map, 3D occupancy grid maps were constructed by using ray tracing techniques to get a precise depiction of obstacles and the surroundings. Due to the absence of IMU data from the low-cost drone for the SLAM algorithm, the created maps are inherently unscaled. However, preliminary tests with relative navigation in unscaled maps have revealed potential accuracy issues, which can only be overcome by incorporating additional information from the given sensors for scale estimation.
Modern industrial production is heavily dependent on efficient workflow processes and automation. The steady flow of raw materials as well as the separation of vital parts and semi-finished products are at the core of these automated procedures. Commonly used systems for this work are bowl feeders, which separate the parts and material by a combination of mechanical vibration and friction. The production of these tools, especially the design of the ramping spiral, is delicate and time-consuming work, as the shape, slope, and material must be carefully adjusted for the corresponding parts. In this work, we propose an automated approach, making use of optimization procedures from artificial intelligence, to design the spiral ramps of the bowl feeders. Therefore, the whole system and considered parts are physically simulated and the optimized geometry is subsequently exported into a CAD system for the actual building, respectively printing. The employment of evolutionary optimization gives the need to develop a mathematical model for the whole setup and find an efficient representation of integral features.