Refine
Document Type
- Conference Proceeding (213)
- Article (reviewed) (128)
- Bachelor Thesis (64)
- Master's Thesis (34)
- Article (unreviewed) (27)
- Patent (23)
- Letter to Editor (16)
- Book (12)
- Contribution to a Periodical (12)
- Doctoral Thesis (12)
Conference Type
- Konferenzartikel (183)
- Konferenz-Abstract (21)
- Sonstiges (5)
- Konferenz-Poster (2)
- Konferenzband (2)
Language
- English (373)
- German (189)
- Other language (1)
- Multiple languages (1)
- Russian (1)
Keywords
- Machine Learning (15)
- RoboCup (13)
- Deep Leaning (11)
- Götz von Berlichingen (11)
- neuroprosthetics (8)
- Deep learning (7)
- Medizintechnik (7)
- Blockchain (6)
- Internet of Things (6)
- Regelungstechnik (6)
- Robotik (6)
- machine learning (6)
- Handprothese (5)
- Heart rhythm model (5)
- Herzrhythmusmodell (5)
- IT-Sicherheit (5)
- Modeling and simulation (5)
- Simulation (5)
- neural networks (5)
- printed electronics (5)
- 3D-CAD (4)
- Augmented Reality (4)
- Data Science (4)
- Deep Learning (4)
- E-Fahrzeug (4)
- Embedded Systems (4)
- Energiemanagement (4)
- Iron Hand (4)
- Johann Sebastian Bach (4)
- Künstliche Intelligenz (4)
- Maschinelles Lernen (4)
- Robustness (4)
- Schluckspecht (4)
- Software (4)
- blockchain (4)
- hand prosthesis (4)
- 3D computer-aided design (3)
- Bildverarbeitung (3)
- Generative Adversarial Network (3)
- Hörgerät (3)
- IIoT (3)
- Internet der Dinge (3)
- IoT security (3)
- Programmiersprache (3)
- Radar (3)
- Rust (3)
- Security (3)
- Umweltforschung (3)
- Virtuelle Realität (3)
- Vorhofflimmern (3)
- amputee (3)
- artificial intelligence (3)
- bimodal hearing (3)
- biomaterials (3)
- catheter ablation (3)
- certificate management (3)
- cryptography (3)
- deep learning (3)
- heart rhythm model (3)
- image classification (3)
- programming (3)
- prosthesis (3)
- replica (3)
- security (3)
- sound localization (3)
- 3D multi-material polymer printing (2)
- 3D print (2)
- 3D printing (2)
- 3D-Druck (2)
- 5G (2)
- API (2)
- Ablation (2)
- Akustik (2)
- Aliasing (2)
- Architektur (2)
- Autoencoder (2)
- Automatisierungstechnik (2)
- Bearings (2)
- Bioimpedance measurement (2)
- Biomechanik (2)
- Biomechanische Stimulation (2)
- Blockchains (2)
- Brückenkurse (2)
- CNC (2)
- CNN (2)
- CNNs (2)
- Cardiac Resynchronization Therapy (2)
- Computer Vision (2)
- Computersicherheit (2)
- Cryoballoon catheter ablation (2)
- Current measurement (2)
- Data Mining (2)
- Deep Reinforcement Learning (2)
- Didaktik (2)
- Digital Twin (2)
- Digitale Lehre (2)
- Digitaler Zwilling (2)
- Digitaltechnik (2)
- E-Paper (2)
- Elektrofahrzeug (2)
- Elektromotor (2)
- Energie (2)
- Energy Flexibility (2)
- Energy management (2)
- Entkopplung (2)
- FEM (2)
- Featherweight Go (2)
- Felix Mendelssohn Bartholdy (2)
- Functional neuroimaging (2)
- GPU Computing (2)
- Geophysik (2)
- Hochschuldidaktik (2)
- Implantat (2)
- Informatik (2)
- Kalman Filter (2)
- Katheterablation (2)
- Kryoballonkatheter (2)
- Landwirtschaft (2)
- MATLAB (2)
- Mikroelektronik (2)
- Modellierung und Simulation (2)
- Myo-Hand (2)
- Myoelektrik (2)
- NB-IoT (2)
- NFC (2)
- Nachhaltigkeit (2)
- Neural networks (2)
- Neuronales Netz (2)
- Neurostimulation (2)
- Online-Marketing (2)
- Optimierung (2)
- Optimization (2)
- PKI (2)
- PUF key generation (2)
- Positron emission tomography (2)
- Predictive Maintenance (2)
- Predictive maintenance (2)
- Programmierung (2)
- Prothese (2)
- Prothetik (2)
- Pulmonalvenenisolation (2)
- RFID (2)
- Roboter (2)
- Röntgen (2)
- SLAM (2)
- Scalability (2)
- Schalllokalisation (2)
- Sicherheit (2)
- Stability (2)
- Stromregelung (2)
- Subspace Clustering (2)
- Substrates (2)
- Supraventricular tachycardia (2)
- Switches (2)
- Transfer learning (2)
- Triggerstabilität (2)
- UWB radars (2)
- Virtual Reality (2)
- Visualisierung (2)
- Webentwicklung (2)
- Zustandsraum (2)
- Zustandsregler (2)
- accountability (2)
- adversarial attacks (2)
- ancient Capua leg (2)
- anthropomorphic hand replacement (2)
- atrial fibrillation (2)
- augmented reality (2)
- autoattack (2)
- binaural hearing (2)
- cardiac ablation (2)
- cochlear implant (2)
- computer-aided design (2)
- convolutional neural networks (2)
- debinding (2)
- detection (2)
- efficient training (2)
- esophageal catheter (2)
- explainability (2)
- fairness (2)
- finite element method (2)
- hearing aid (2)
- heat pump (2)
- imaging algorithms (2)
- industrial communication (2)
- interactive visualization (2)
- interaural stimulation timing (2)
- medical imaging (2)
- microwave (2)
- molybdenum (2)
- peer-to-peer (2)
- physical unclonable function (2)
- physically unclonable function (PUF) (2)
- predictive maintenance (2)
- pulmonary vein isolation (2)
- resource efficiency (2)
- responsibility (2)
- scattering measurements (2)
- semantics (2)
- speech in noise (2)
- trust (2)
- understandability (2)
- visual control (2)
- zweite "Eiserne Hand" (2)
- 2-Phasen-Commit (1)
- 3D CAD (1)
- 3D Strukturlichtscanner (1)
- 3D light scanning (1)
- 3D multi-material printing (1)
- 3D-Modelling (1)
- 3D-Visualisierung (1)
- 3D-light scanning (1)
- 3D-print (1)
- 3d print (1)
- 5G mobile communication (1)
- 5G private networks (1)
- 65D17 (1)
- 65D18 (1)
- 68U05 (1)
- AC machines (1)
- AIN Cantilever (1)
- AR (1)
- AR glasses (1)
- ASP.NET Core (1)
- AV nodal reentry tachycardia (1)
- AV reentrant tachycardia (1)
- Abbildungsqualität (1)
- Abguss der Hand (1)
- Ablationstherapie (1)
- Ackermann-Formel (1)
- Ackermann´s formula (1)
- Additive Manufacturing (1)
- Adversarial Attacks (1)
- Adversarial Robustness (1)
- Adversarial examples (1)
- Adversarial robustness (1)
- Agent based sensor (1)
- Agrophotovoltaics (1)
- Air Pollution (1)
- Akrogerie (1)
- Algorithmus (1)
- Aluminum (1)
- Amazon Web Services (1)
- Amplitude and Phase Errors (1)
- Ancient Capua leg (1)
- Android (1)
- Angle of Arrival (1)
- Angular (1)
- Anlagenüberwachung (1)
- Antenna measurements (1)
- Antennas (1)
- Anti-Windup (1)
- Antriebsregelung (1)
- App-Store (1)
- Approximation (1)
- Archiv für Kriminologie (1)
- Artificial Intelligence (1)
- Artifizielle Kognition (1)
- Atrial fibrillation (1)
- Attention-basiert (1)
- Audiometrie (1)
- Audiosignalverarbeitung (1)
- Audioverarbeitung (1)
- Aufmerksamkeit (1)
- Augmented reality (1)
- Augmented-reality glasses (1)
- Aurikuläre Stimulation (1)
- Authentication (1)
- Authorization (1)
- AutoML (1)
- Automated idea generation (1)
- Automation (1)
- Automotive Radar (1)
- Autopsie (1)
- Azzolini degli Onesti (1)
- BIC (1)
- Bartolomeo da Varignana (1)
- Batterie (1)
- Batteriemanagementsystem (1)
- Battery storage (1)
- Bausteinsicht (1)
- Bearing fault classification (1)
- Becquerel (1)
- Benchmarks (1)
- Berühmte Komponisten (1)
- Berühmte Maler (1)
- Berühmte Persönlichkeiten (1)
- Beurteilung (1)
- Bewegung (1)
- Binaural hearing (1)
- Binder-based AM (1)
- Binder-basiertes AM (1)
- Bioimpedanzmessung (1)
- Biomimetics (1)
- Biosignalverstärker (1)
- Blockchain-to-Blockchain communication (1)
- BlueZ (1)
- Bluetooth (1)
- Bluetooth Low Energy (1)
- Bluetooth-Applikation (1)
- Bluetooth-Standard (1)
- Bodenradar (1)
- Boundary conditions (1)
- Bowtie antenna (1)
- Business Intelligence (1)
- CANoe (1)
- CANopen (1)
- CIoT (1)
- CLS-Management (1)
- CO2-Bilanz (1)
- Calibration (1)
- Capua-Bein (1)
- Carbon Footprint (1)
- Cardiac modelling (1)
- Cardiac resynchronization therapy (1)
- Carpe diem (1)
- Cellular networks (1)
- Cesare Lombroso (1)
- Challenges in Action Recognition (1)
- Chemical engineering (1)
- Christian von Mechel (1)
- Cleaning (1)
- Cloud Computing (1)
- Cloud computing (1)
- Cloud storage (1)
- Clustering (1)
- Cochlea-Implantate (1)
- Cochlear-Implantat (1)
- Code Visualisierung (1)
- Code visualization (1)
- Cognitive Computing (1)
- Collaboration of Academia and Industry (1)
- Compensation (1)
- Compiler (1)
- Composable Commerce (1)
- Computer science (1)
- Constrained Networks (1)
- Control Algorithms (1)
- Controller PFC100; 2 x ETHERNET (1)
- Convolutional Neural Network (1)
- Convolutional neural networks (1)
- Crash tests (1)
- Cross-Cloud-Strategie (1)
- Current Control (1)
- Current control (1)
- DC-AC converters (1)
- DTLS (1)
- Dampferzeugung (1)
- Data breech (1)
- Datenanalyse (1)
- Datenmanagement (1)
- Datenqualität (1)
- Deactivation/activation processes (1)
- Debinding (1)
- Decarbonization (1)
- Decoupling (1)
- Deep Learning Verfahren (1)
- Deep Neural Network (1)
- Deep diffusion models (1)
- Defibrillatortherapie (1)
- Demand side flexibility (1)
- DevExtreme (1)
- Device characterization (1)
- Diagnostics (1)
- Digital Beamforming (1)
- Digital Flex Twin Optimization (1)
- Digitale Fotografie (1)
- Digitale Turschilder (1)
- Digitalization (1)
- Discrete-time model (1)
- Diseases (1)
- Distributed Co-Simulation Protocol (1)
- Docker (1)
- Document Denoising (1)
- Domenico Scarlatti (1)
- Drehstrom (1)
- Drehstromantrieb (1)
- Drehzahlregelung (1)
- Druckmessung (1)
- Drucksensor (1)
- Durchflussmessung von Gasen (1)
- Durchlaufzeiten (1)
- E-Commerce System (1)
- E-Ink (1)
- E-Learning (1)
- EAP-Protokoll (1)
- EAP-TLS (1)
- EKF-SLAM (1)
- EKG (1)
- ERP-System (1)
- ESP-IDF (1)
- ETAP Simulations (1)
- ETL Data Pipeline (1)
- EU Timber Regulation (1)
- Echtzeitsystem (1)
- Eco-inventive principles (1)
- Economics (1)
- Edge AI (1)
- Edge Computing (1)
- Education (1)
- Effizienz (1)
- Ehlers-Danlos-Syndrom Typ IV (1)
- Eigenvalues (1)
- Eingabemethode (1)
- Eingebettete Systeme (1)
- Einkommensverhältnisse in der Barockzeit (1)
- Electric Tractors (1)
- Electric Vehicle (1)
- Electrical Engineering (1)
- Electrical and electronic engineering (1)
- Electrical drives (1)
- Electrode Model (1)
- Electromagnetic and thermal simulation (1)
- Electronic Commerce (1)
- Electronic Engineering (1)
- Elektroden-Interface (1)
- Elektromagnetische Reflexionsmethode (1)
- Elektromobilität (1)
- Elektroniksystem (1)
- Elektrophysiologie (1)
- Elektrophysiologische Untersuchung (1)
- Elektrotherapie (1)
- Embalming (1)
- Embedded (1)
- Embedded AI (1)
- Embedded Linux (1)
- Embedded Rust (1)
- Embedded System (1)
- Empfehlung (1)
- Empfehlungssysteme (1)
- Energieautark (1)
- Energiemarkt (1)
- Energiespeicherung (1)
- Energietechnik (1)
- Energieversorgung (1)
- Energiewende (1)
- Energiewirtschaft (1)
- Energiezelle (1)
- Energy Flexibility for Companies (1)
- Energy Harvesting (1)
- Energy Management (1)
- Energy Marketing of Industrial Flexibilities (1)
- Energy System Model (1)
- Energy Transition (1)
- Energy systems modeling (1)
- Energy-Harvesting (1)
- Entbinderung (1)
- Enterprise-Resource-Planning (1)
- Entropie (1)
- Entropy (1)
- Entscheidungslogik (1)
- Entwurfsmuster (1)
- Environmental monitoring (1)
- Erlang (1)
- Error (1)
- Erweiterte Realität (1)
- Esophageal catheter (1)
- Esophageal electrode (1)
- Estimation (1)
- Etylizer (1)
- Evaluation (1)
- Exoskelett (1)
- Explainable AI (1)
- Extensible Authentication Protocol (1)
- FDM-Technik (1)
- FFI (1)
- FLITZMO (1)
- FOTA (1)
- FUSION (1)
- Fahrerloses Transportsystem (1)
- Failure analysis (1)
- Famous composers (1)
- Fanny Hensel (1)
- Fault Classification (1)
- Fault classification (1)
- Federated Learning (1)
- Feldorientierung (1)
- Field Programmable Gate Array (FPGA) (1)
- Field-programmable gate array (FPGA) (1)
- Finite-Elemente-Methode (1)
- Firmware (1)
- Forschung (1)
- Fotografie (1)
- Fototechnik (1)
- Fotovoltaik (1)
- Framework (1)
- Freiheitsgrade (1)
- Funktionalismus (1)
- Furuta pendulum (1)
- Fused Filament Fabrication (1)
- Fußballroboter (1)
- Fußgängererkennung (1)
- Führungsentkopplung (1)
- Führungsgrößenkorrektur (1)
- GPR (1)
- Ganganalyse (1)
- General Energy (1)
- Generative models (1)
- Generics (1)
- Genetic Algorithm (1)
- Genetischer Algorithmus (1)
- Gesicht / Mustererkennung (1)
- Gesichtserkennung (1)
- Giftmord (1)
- Glasfaser (1)
- Gleichstrom (1)
- Go (1)
- Green House effect (1)
- Grinding machines (1)
- Ground penetrating radar (1)
- HF Ablation (1)
- HWS-Schleudertrauma (1)
- Halbleitertechnologie (1)
- Hals-Nasen-Ohren-Heilkunde (1)
- Halswirbelsäule (1)
- Handschrift (1)
- Handswritten Character Recognition (1)
- Handynacken (1)
- Hannes hand (1)
- Hard rock (1)
- Hardware (1)
- Hardware Security (1)
- Harmonic analysis (1)
- Head-mounted Display (1)
- Heart Rhythm Model (1)
- Heart Rhythm Simulation (1)
- Heart rhythm simulation (1)
- Hemodynamic monitoring (1)
- Herzfehler (1)
- Herzfrequenzvariabilität (1)
- Herzkatheterablation (1)
- Herzschrittmachertherapie (1)
- Heuristic algorithms (1)
- High frequency ablation (1)
- Higher Education (1)
- Hirnstammessung (1)
- His-Bundle Pacing (1)
- His-bundle pacing (1)
- Hocheffizienzfahrzeug (1)
- Hochschule (1)
- Hochschullehre (1)
- Hochspannung (1)
- Horaz (1)
- Hot-Spot (1)
- Hybrid Vehicle (1)
- Hybrid system (1)
- Hybride Lehre (1)
- Hybrides Lehren und Lernen (1)
- Hydrokultur (1)
- Hydroponic Farming (1)
- Hydrosphygmograph (1)
- Hyperparameter (1)
- Hörforschung (1)
- Hörgeräte (1)
- Hörsystem (1)
- IEC/IEEE 60802 security (1)
- IEEE802.15.4 (1)
- Impedanzkardiografie (1)
- Implantierbare Neurostimulatoren (1)
- InceptionTime (1)
- Induktive Schnittstelle (1)
- Industrial Blockchain (1)
- Industrial internet of things (1)
- Industrie 4.0 (1)
- Industrie 4.0 Software (1)
- Industry 4.0 (1)
- Industry Use cases (1)
- Industry automation (1)
- Inertial (1)
- Infrarot-Spektroskopie (1)
- Ink (1)
- Integration (1)
- Integrierte Schaltung (1)
- Intelligentes Messsystem (1)
- Intelligentes Stromnetz (1)
- Intermediate domain (1)
- Interoperability (1)
- Inventive principles (1)
- Inventive problem solving (1)
- Inverters (1)
- IoT (1)
- IoT Security (1)
- Island Architecture (1)
- JavaScript (1)
- JavaScript Frameworks (1)
- Jitter (1)
- Kamera-Tracking (1)
- Kamerasystem (1)
- Kanalisation (1)
- Key (1)
- Kindersterblichkeit (1)
- Klassifikation (1)
- Kognitionswissenschaften (1)
- Kognitive Kybernetik (1)
- Kommunikationsprotokoll (1)
- Konfigurationen (1)
- Konnektionismus (1)
- Konsensbildung (1)
- Konstruktivismus (1)
- Kriminalanthropologie (1)
- Kriminaltechnik (1)
- Kriminologie (1)
- LINUX (1)
- LOAM (LiDAR odometry and mapping) (1)
- LPWAN (1)
- LQR (1)
- LSTM (1)
- LabVIEW Programmierung (1)
- Large Grid-Connected PV Systems (1)
- Last-Test (1)
- Laufen lernen (1)
- Laufzeitsicht (1)
- Lecture Tracking (1)
- Left Atrial Appendage Closure (1)
- Lehr-/Lernkonzepte (1)
- Lehrmittel (1)
- Lehrszenarien (1)
- Leistungsbedarf (1)
- Leistungselektronik (1)
- Leonardo da Vinci (1)
- LiDAR (1)
- Lichtsetzung (1)
- Limiting (1)
- Linear MPC (1)
- Linux (1)
- LoRaWAN (1)
- Load Flow Analysis (1)
- Logic gates (1)
- Lokalisation (1)
- Lokalisationstest (1)
- Long Term Evolution (1)
- Low Carbon network (1)
- Low-Cost Füllstandssensor (1)
- Low-Power (1)
- Low-latency (1)
- Luftschadstoffprognose (1)
- Luftschiff (1)
- Luftverunreinigender Stoff (1)
- LwM2M (1)
- Lügendetektor (1)
- M. Pick (1)
- MEMS (1)
- MIMO (1)
- MINT (1)
- MLOps (1)
- MPC (1)
- MVC (1)
- Machine learning (1)
- Machine-learning (1)
- Magnetic resonance (1)
- Magnetic sensors (1)
- Management (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Marfan-Syndrom (1)
- Marketing (1)
- Maschinelles Sehen (1)
- Material Flow (1)
- Materialfluss (1)
- Mathematik (1)
- Maurice Ravel (1)
- Maßstab (1)
- Mean Square Error (1)
- Measurement (1)
- Mechanik (1)
- Medizingeschichte (1)
- Medizinprodukterecht (1)
- Mehrgrößenregelung (1)
- Memento mori! (1)
- Messbereichserweiterung (1)
- Messstellenbetriebsgesetz (1)
- Metaprogrammierung (1)
- Micro-electromechanical system (1)
- Microcontroller (1)
- Microgrid(s) (1)
- Microservice (1)
- Microsoft dot net (1)
- Microtunnelling (1)
- Mikrocontroller (1)
- Mikrocontroller ESP32 (1)
- Mikroprozessor (1)
- Mikroservice (1)
- Mild traumatic brain injury (1)
- Mobilfunk (1)
- Mode Collapse (1)
- Model Calibration (1)
- Model Predictive Control (1)
- Model Search (1)
- Model-View-Controller (1)
- Modellierung (1)
- Modellprädiktive Regelung (1)
- Moderne Messeinrichtung (1)
- Mona Lisa (1)
- Monitoring (1)
- Monocular Depth Estimation (1)
- Monte-Carlo (1)
- Monte-Carlo Simulation (1)
- Monte-Carlo method (1)
- Multi-task learning (1)
- Multiside heart stimulation (1)
- Mumie (1)
- Mumifizierung von Leichen (1)
- Mummy (1)
- Musik (1)
- MySQL (1)
- NETCONF security (1)
- Nahfeldkommunikation (1)
- Naming Game (1)
- Nature-inspired principles (1)
- Natürliche Kognition (1)
- Network Test (1)
- Netzintegration (1)
- Netzwerk (1)
- Netzüberwachung (1)
- Neural Architecture Search (1)
- Neuroakustik (1)
- Neurologie (1)
- Neuroprothetics (1)
- Neurosyphilis (1)
- Nicolo Paganini (1)
- Noise measurement (1)
- Nyquist-Shannon (1)
- OT security (1)
- OTA (1)
- OTRS (1)
- Octave Convolution (1)
- Ofenparametrisierung (1)
- Okkluder (1)
- Online Lehre (1)
- Open Mobile Alliance (1)
- Optical Fiber Network (1)
- Optical Network (1)
- Optimisation (1)
- Optimization and control (1)
- Optimization with Digital Twins (1)
- Optische Zeichenerkennung (1)
- Organic electronics (1)
- Otto Lilienthal (1)
- PI control (1)
- PLA-Filamente (1)
- PROFINET (1)
- PROFINET IO (1)
- PROFINET Security (1)
- PV (1)
- PV System (1)
- PV power forecast (1)
- PV-Module (1)
- PWA (1)
- Parallelization (1)
- Parameter Estimation (1)
- Parameter estimation (1)
- Parameteridentifikation (1)
- Particle swarm optimization (1)
- Passives System (1)
- Pathophysiologie (1)
- Pattern Recognition (1)
- Peak shaving (1)
- Peer to peer network (1)
- Penetration prediction (1)
- Perfomance-Test (1)
- Performance (1)
- Performance Monitoring (1)
- Performance evaluation (1)
- Permanent magnet machines (1)
- Personalized prostheses (1)
- Photovoltaik (1)
- Physical Distancing (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Physically Unclonable Function (1)
- Physiological Pacing (1)
- Physiological cardiac pacing (1)
- Pierre-Marie-Bamberger syndrome (1)
- Plattform (1)
- Polvorgabe (1)
- Polygraph (1)
- Positionsschätzung (1)
- Power Consumption (1)
- Power Loss (1)
- Predictions (1)
- Predictive Control (1)
- Predictive Models (1)
- Printed Electronics (1)
- Process design (1)
- Production (1)
- Produktion (1)
- Prognose (1)
- Programmablauf (1)
- Programming Languages (1)
- Progressive Web App (1)
- Prothesen und Implantate (1)
- Proximal Policy Optimization (1)
- Prozessatmosphären (1)
- Prüfstand (1)
- Public-Key-Infrastructure (1)
- Pulmonary Vein Isolation (PVI) (1)
- Pulmonary vein isolation (1)
- Pulse width modulation (1)
- Python (1)
- Python Visualisierung (1)
- Python visualization (1)
- RFID-/NFC-Ausleseschnittstelle (1)
- ROS (1)
- RTK (1)
- RUL (1)
- RabbitMQ (1)
- Radio frequency (1)
- Radiofrequency identification (1)
- Random call model (1)
- Real-Time Communication (1)
- Recommendations (1)
- Reduktionismus (1)
- Regelung (1)
- Regler-Windup (1)
- Regression (1)
- Regularization (1)
- Rehabilitation (1)
- Reinforcement Learning (1)
- Reinforcement learning (1)
- Rekonstruktion (1)
- Rektifizierung (1)
- Remaining useful life (1)
- Renewable Energy Markets (1)
- Representation Learning (1)
- ResNet (1)
- Resistance (1)
- Rest (1)
- Restbussimulation (1)
- Richtmikrofon (1)
- Riefelharnisch (1)
- Road-Quality Prediction (1)
- Robert Schumann (1)
- RoboCup3D (1)
- Robot Inertia Parameter Identification (1)
- Robotic (1)
- Rosalia Lombardo (1)
- Rotation Matrix (1)
- Rotational pendulum (1)
- Rotors (1)
- Roubst overfitting (1)
- Rückstellmechanismus (1)
- SOA (1)
- SPS-Programmierung (1)
- SSH (1)
- Sampling (1)
- Schaltwerk (1)
- Schlüssel (1)
- Schnittstelle (1)
- Schulprojekt (1)
- Schädel-Hirn-Trauma (1)
- Scientific Reports (1)
- Second Iron Hand (1)
- Second-order Optimization (1)
- Seismic processing (1)
- Self-Calibration (1)
- Semiconductor Device (1)
- Semiconductor device measurement (1)
- Sensopart Kamera: VISOR V20 Robotic Advanced (1)
- Sensor phenomena and characterization (1)
- Sequenzielle Schaltung (1)
- Service Worker (1)
- Shell Eco-marathon (1)
- Siamesische Neuronale Netze (1)
- Simulation und Modellierung (1)
- Sintering (1)
- Skelett (1)
- Small Talk (1)
- Smart City (1)
- Smart Energy Metering (1)
- Smart Gardening (1)
- Smart Grids (1)
- Smart Home (1)
- Smart Load Management (1)
- Smart Meter Gateway (1)
- Smart metering (1)
- Smart-UPS (1)
- SmartMAC (1)
- Smartphone (1)
- Social Distancing (1)
- Software Integration (1)
- Software algorithms (1)
- Software for measurements (1)
- Softwareanforderungen (1)
- Softwarearchitektur (1)
- Softwaredokumentation (1)
- Softwareentwicklung (1)
- Solar Radiation (1)
- Soziale Netzwerke (1)
- Spacial Anchors (1)
- Spielstrategie (1)
- Spinal cord stimulation (1)
- Split-Manufacturing (1)
- Sprachwahrnehmung (1)
- Stabilisierung (1)
- Stand Alone (1)
- Static interaural time offsets (1)
- Station Festo Pick&Place (1)
- Stellgrößenbegrenzung (1)
- Steuerbarkeit (1)
- Steuereinheit (1)
- Steuerung (1)
- Strahlfertigungsverfahren (1)
- Strecken-Windup (1)
- Stromregelung von Drehstromantrieben (1)
- Stromversorgungsnetz (1)
- Stromzustandsregler (1)
- Struma (1)
- Studieneingangsphase (1)
- Störgrößenbeobachter (1)
- Störmodell (1)
- Subarachnodialblutung (1)
- Supraventrikuläre Tachyarrhythmien (1)
- Sustainability (1)
- Sustainable technology (1)
- Synchronisation (1)
- Synchronmaschine (1)
- Synthetischer Datensatz (1)
- Systemarchäologie (1)
- Systematic innovation (1)
- Systemintegration (1)
- Szenenanalyse (1)
- TBM performance (1)
- TCP/IP, Modbus-TCP (1)
- TLS (1)
- TRIZ methodology (1)
- TSN security (1)
- Teensy 4.1 (1)
- Test (1)
- Testablauf (1)
- Testbed (1)
- Testen (1)
- Testsystem (1)
- Ticketingsystem (1)
- Time Sensitive Networking (1)
- Time Series Classification (1)
- Time Synchronization (1)
- Time series data (1)
- Time-series Classification (1)
- TinyML (1)
- Tool Center Point (1)
- Torque (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Transesophageal left atrial pacing (1)
- Transesophageal neurostimulation (1)
- Transformer (1)
- Transösophageale Neurostimulation (1)
- Triangulation (1)
- Triangulation Camera (1)
- Trust management (1)
- Trägheitsparameteridentifikation (1)
- URLLC (1)
- Ultra-Low Energy (1)
- Ultra-Low-Power (1)
- Umwelterziehung (1)
- Unreal Engine (1)
- Unsupervised Conditional Training (1)
- Unsupervised Learning (1)
- Unterrichtsmethode (1)
- Unterschenkelprothese (1)
- Update (1)
- Utility tunnelling (1)
- V2X (1)
- VANET (1)
- Variational Autoencoders (1)
- Verfahren (1)
- Vergiftungsfälle (1)
- Vergänglichkeit (1)
- Verkehr (1)
- Verstärker (1)
- Vesuvius eruption (1)
- Vierquadrantensteller (1)
- Virtuelle Akustik (1)
- Visual Analytics (1)
- Visual Components (1)
- Visual control (1)
- Vitalparametern bei Kleinstlebewesen (1)
- Voltage measurement (1)
- Vorhofseptumdefekt (1)
- Vorkurse (1)
- Vue (1)
- Web development (1)
- Webserver Perfomance (1)
- Whiplash injury (1)
- Whiplash-associated disorders (1)
- Wilhelm His Sr. (1)
- Wireless IoT (1)
- Wireless Sensor Nodes (1)
- Wireless Technology (1)
- Wissenschaftsphilosophie (1)
- Wärmepumpen (1)
- X-in-the-loop (1)
- Yolov5 (1)
- Zentrale Sauerstoffversorgung (1)
- Zertifikate (1)
- Zumi (1)
- Zwei-Faktor-Authentifizierung (1)
- Zweite "Eiserne Hand" (1)
- accelerometer (1)
- adversarial (1)
- adversarial detection (1)
- aerosol modeling (1)
- agile Softwarearchitektur (1)
- air raid of the Royal College of Surgeons London (1)
- ambiguity (1)
- analog physical unclonable function system (1)
- anisotropy (1)
- anthropology (1)
- anthropomorphic replacement hand (1)
- arc42-Template (1)
- artificial neural networks (1)
- assessment (1)
- atrial flutter (1)
- atrial septal defect (1)
- attribute manipulation (1)
- audiometry (1)
- auditorisch evozierte Potentiale (1)
- auditory model (1)
- augmented reality glasses (1)
- authentication (1)
- authorization (1)
- autoML (1)
- autonomous systems (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- biocompatibility test (1)
- biodegradable (1)
- biodegradable implants (1)
- biomechanical stimulation (1)
- bionics (1)
- blockchain-based system (1)
- brain vitrification (1)
- building management systems (1)
- camera-based navigation (1)
- cellular metals (1)
- cellular radio (1)
- cifar (1)
- climate emulation (1)
- composite materials (1)
- compression (1)
- computer graphics (1)
- computer network management (1)
- computer vision (1)
- consensus + innovations (1)
- contour lines (1)
- copper oxide (1)
- correlation (1)
- craniomaxillofacial surgery (1)
- credentials (1)
- crossbar (1)
- curb (1)
- curriculum learning (1)
- cybersecurity (1)
- data quality (1)
- deep reinforcement learning (1)
- defense (1)
- degradation stages (1)
- degrees of freedom (1)
- device closure (1)
- device delay mismatch (1)
- dictionary passing (1)
- digitaler Zwilling (1)
- diode modeling (1)
- distributed energy resources (1)
- distributed ledger (1)
- drumstick fingers (1)
- echocardiography (1)
- economic dispatch (1)
- effective medium theory (1)
- electric machine (1)
- electrical conductivity (1)
- electricity market (1)
- electrode-free (1)
- electrolyte-gated transistors (1)
- electrolytic cell (1)
- electrophysiological investigation (1)
- embedded systems (1)
- energy harvesting (1)
- engine-in-the-loop (1)
- eurocity persons (1)
- exoskeleton (1)
- face editing (1)
- face recognition (1)
- fail-operational (1)
- fingerprinting (1)
- first Röntgen picture (1)
- first iron hand (1)
- fourier (1)
- framework (1)
- frühe Neuzeit (1)
- furnace parameterization (1)
- game theory (1)
- gan (1)
- gedruckte Elektronik (1)
- generative adversarial networks (1)
- gossip protocol (1)
- ground penetrating radar (1)
- hair (1)
- hand prostheses (1)
- hand prosthetic (1)
- hardware-in-the-loop (1)
- heart rhythm simulation (1)
- height estimation (1)
- hieroglyphs (1)
- history-inspired (1)
- home automation (1)
- hybrid electric vehicle (1)
- hybrid networks (1)
- hybrid systems (1)
- hämodynamische Parameter (1)
- identification (1)
- image color analysis (1)
- image processing (1)
- imagenet (1)
- impedance cardiography (1)
- in-vitro Simulation (1)
- indium oxide (1)
- industrial Ethernet (1)
- industrial IoT (1)
- infrared spectroscopy (1)
- input-output decoupling (1)
- integer linear programming (1)
- intelligent neuroprosthetics (1)
- intermediate domain (1)
- internal combustion engine (1)
- interpretation (1)
- invasive (1)
- irrigation (1)
- isocontour lines (1)
- isocontouring (1)
- isocontours (1)
- isosurfaces (1)
- lageunabhängigkeit (1)
- legacy machines (1)
- level set (1)
- lid (1)
- lifelong learning (1)
- linguistics (1)
- lithium-ion battery (1)
- low-cost sensors and devices (1)
- lower limb prosthesis (1)
- maceration, vessel elements (1)
- machine-to-machine communication (1)
- mahalanobis (1)
- maintenance (1)
- manufacturing industries (1)
- manufacturing process (1)
- mapping (1)
- marching cubes (1)
- marching tetrahedra (1)
- matrix modules (1)
- mechanical properties (1)
- medical history (1)
- metal oxide reduction (1)
- metal oxide transistor (1)
- metaprogramming (1)
- micro-photovoltaic system (1)
- millimeter-wave (1)
- mobile robotics (1)
- model predictive control (1)
- model-predictive control (1)
- mold (1)
- multipath (1)
- multivariable control (1)
- musical history (1)
- mutual authentication (1)
- natürliche Leistung (1)
- navigation (1)
- network optimization (1)
- neural architecture search (1)
- neurology (1)
- nicht-invasives Messsystem (1)
- nickel oxide (1)
- noise measurement (1)
- non-invasive (1)
- nose (1)
- ns-3 (1)
- oil painting (1)
- open fitting (1)
- optimization (1)
- osseointegration (1)
- osteosynthesis (1)
- oxide electronics (1)
- oxygen membrane (1)
- pandemics (1)
- parking (1)
- partial shading (1)
- pattern recognition (1)
- pedestrian detection (1)
- perception (1)
- percolation (1)
- performance (1)
- personalization (1)
- physics-informed ML (1)
- plague (1)
- pn-diode (1)
- pole placement (1)
- pose estimation (1)
- powertrain testing (1)
- precision medicine (1)
- predictive control (1)
- primary authentication (1)
- primary progressive aphasia (1)
- primäre progrediente Aphasie (1)
- printed Antennas (1)
- process atmosphere (1)
- programming languages (1)
- proof-of-concept study (1)
- prostheses (1)
- prosthetics (1)
- pruning (1)
- quality feedback survey and results assessment (1)
- radiation protection (1)
- radio networks (1)
- random resistor networks (1)
- ray tracing (1)
- real-time system (1)
- real-time systems (1)
- rekeying (1)
- remaining useful life (1)
- renewable energy (1)
- robustness (1)
- sample‐to‐sample fluctuation (1)
- scalability (1)
- scalar fields (1)
- second "Iron Hand" (1)
- secure communication (1)
- security keys (1)
- seismic (1)
- semf (1)
- sensor and actuator networks (1)
- sensory feedback (1)
- septal occluder device (1)
- sharding algorithm (1)
- shingle solar cells (1)
- shop floor (1)
- short-term solar forecast (1)
- silicone (1)
- single-sign-on (1)
- sintering (1)
- skin cancer (1)
- skin cancer detection (1)
- smalltalk (1)
- software defined radio (1)
- solar module (1)
- sparse backpropagation (1)
- spatial release from maskin (1)
- spectral defense (1)
- spectraldefense (1)
- speech intelligibility model (1)
- spinal cord stimulation (1)
- split manufacturing (1)
- statistical methods, ROS (1)
- stochastic approach (1)
- stochastic computing (1)
- storage efficiency (1)
- storage optimization (1)
- style (1)
- style transfer (1)
- summarization (1)
- surface nets (1)
- surgical navigation (1)
- syndrome coding (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature sensor (1)
- tessellation (1)
- test bench (1)
- test bench coupling (1)
- thermoelectrics (1)
- thickness estimation (1)
- thinned ASIC in foil (1)
- throughput (1)
- titanium (1)
- titanium fibers (1)
- topology (1)
- tracking (1)
- transesophageal electrical pacing (1)
- transesophageal neurostimulation (1)
- transfer learning (1)
- transmit beamforming (1)
- triangulation (1)
- trust management (1)
- trust management system (1)
- trustworthy ai (1)
- unilateral hearing loss (1)
- unique interdisciplinary international higher education approach (1)
- universal Roboter UR5e (1)
- upper limb (1)
- ventricular tachycardia (1)
- virtual simulations (1)
- visual analytics (1)
- visualization (1)
- visuelle Steuerung (1)
- watch glass nails (1)
- wide area networks (1)
- wireless sensor networks (1)
- wood identification (1)
- z-Transformation (1)
- zeitdiskrete Regelverfahren (1)
- zeitdiskreter PI-Zustandsregler (1)
- zeros (1)
- zweistufiger Beobachterentwurf (1)
- Ösophaguselektrodensonde (1)
- Ösophaguskatheter (1)
- Übersetzungsstrategie (1)
- übertragbare Wirkleistung (1)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (565) (remove)
Open Access
- Open Access (251)
- Closed Access (181)
- Closed (121)
- Bronze (54)
- Diamond (31)
- Gold (29)
- Grün (3)
- Hybrid (3)
Das Ziel in dieser Arbeit ist die Programmierung von einem Mikroprozessor, der als ein Richtmikrofon verwendet wird, um unterschiedlichen Richtcharakteristiken zu erzeugen.
Dabei stellt sich die Frage: Ist es möglich ein Mikroprozessor so zu programmieren, dass er eine Stereoaufnahme so verarbeiten kann, sodass unterschiedliche Richtcharakteristiken erzeugt werden könnten?
Um die Frage zu beantworten, wurde eine technische Ausarbeitung von einem Mikroprozessor und seine Programmierung benötigt. Diese befasst sich mit der Programmierung in C++ / Arduino IDE des Mikrokontrollers und eigene Erstellung von Tests, um die Ergebnisse darzustellen.
Als weitere Basis wurden nur verbraucherorientierten Mikroprozessoren untersucht und die beste Möglichkeit wurde ausgesucht und weiterentwickelt. Zudem lag der Fokus auf der Reproduzierbarkeit der Ergebnisse.
Jeder Mensch ist ständig unfreiwillig von einer Flut akustischer Reize umgeben. Diese Situation stellt für Menschen mit Hörverlust eine besondere Herausforderung dar. Menschen mit Hörverlust hören durch Hörgeräte zwar alles verstärkt, jedoch stellt sich die Frage, ob ein Hörgerät lediglich eine einfache Verstärkung von Schallwellen ist oder ob es darüber hinausgehende Funktionen bieten kann.
Die vorliegende Thesis widmet sich der akustischen Szenenanalyse in Hörgeräten, wobei der Schwerpunkt auf der Integration von Machine Learning liegt. Das Ziel besteht darin, eine automatisierte Erkennung und Anpassung an verschiedene akustische Situationen zu ermöglichen. Die Arbeit konzentriert sich insbesondere auf die Analyse grundlegender Szenarien wie: Sprache in Ruhe, absolute Ruhe, Sprache in Störgeräuschen und Störgeräuschen in Audiodaten.
In dieser Arbeit wird die Identifikation von Trägheitsparametern von Mehrkörpersystemen, am Beispiel eines ein aus vier Segmenten bestehenden Roboterarms untersucht. Es werden verschiedene neuronale Netzarchitekturen zur Identifikation der Trägheitsparameter des Roboterarms exploriert. Als Referenz für das Abschneiden der Ansätze wird ein vorab implementierter numerischer Optimierungsansatz, welcher mittels der Software „Matalb“ umgesetzt wurde, benutzt. Der Ansatz zum Aufstellen der benötigten Bewegungsgleichungen und die Formulierung des Regressionsproblems unterscheidet sich von den in der Literatur verwendeten Ansätzen, und beruht auf einem neu entwickelten Sensorkonzept der Hochschule Offenburg (des Sweaty Labors).
Der numerische Ansatz, insbesondere nach Linearisierung des Problems, erzielte herausragende Ergebnisse und konnte die idealen Parameterwerte präzise identifizieren. Demgegenüber standen die neuronalen Netzwerke, deren Potenzial trotz umfassender Untersuchung verschiedener Architekturen und Ansätze nicht vollends ausgeschöpft werden konnte. Die Resultate zeigen deutlich die Grenzen und Herausforderungen bei der Anwendung maschineller Lernmethoden in der spezifischen Aufgabenstellung der Trägheitsparameteridentifikation auf.
Diese Arbeit leistet einen Beitrag zum Verständnis der Möglichkeiten und Grenzen bei der Anwendung neuer Messtechnologien und Berechnungsverfahren in der Robotik. Die überlegene Leistung des numerischen Solvers gegenüber den neuronalen Netzansätzen unterstreicht die Bedeutung weiterer Forschungen in diesem Bereich.
Garbage in, Garbage out: How does ambiguity in data affect state-of-the-art pedestrian detection?
(2024)
This thesis investigates the critical role of data quality in computer vision, particularly in the realm of pedestrian detection. The proliferation of deep learning methods has emphasised the importance of large datasets for model training, while the quality of these datasets is equally crucial. Ambiguity in annotations, arising from factors like mislabelling, inaccurate bounding box geometry and annotator disagreements, poses significant challenges to the reliability and robustness of the pedestrian detection models and their evaluation. This work aims to explore the effects of ambiguous data on model performance with a focus on identifying and separating ambiguous instances, employing an ambiguity measure utilizing annotator estimations of object visibility and identity. Through accurate experimentation and analysis, trade-offs between data cleanliness and representativeness, noise removal and retention of valuable data emerged, elucidating their impact on performance metrics like the log average miss-rate, recall and precision. Furthermore, a strong correlation between ambiguity and occlusion was discovered with higher ambiguity corresponding to greater occlusion prevalence. The EuroCity Persons dataset served as the primary dataset, revealing a significant proportion of ambiguous instances with approximately 8.6% ambiguity in the training dataset and 7.3% in the validation set. Results demonstrated that removing ambiguous data improves the log average miss-rate, particularly by reducing the false positive detections. Augmentation of the training data with samples from neighbouring classes enhanced the recall but diminished precision. Error correction of wrong false positives and false negatives significantly impacts model evaluation results, as evidenced by shifts in the ECP leaderboard rankings. By systematically addressing ambiguity, this thesis lays the foundation for enhancing the reliability of computer vision systems in real-world applications, motivating the prioritisation of developing robust strategies to identify, quantify and address ambiguity.
Immer mehr Unternehmen setzen auf eine Cross-Cloud-Strategie, die es Unternehmen ermöglicht, ihre Anwendungen und Daten über mehrere Cloud-Plattformen hinweg effizient zu verwalten und zu betreiben. Konsistenz und Atomarität zwischen den Cloud-Plattformen zu wahren, stellt eine große Herausforderung dar. Hierzu wird in dieser Arbeit eine Lösung vorgestellt, um Cross-Cloud-Atomarität zu erreichen, welche auf Basis des 2-Phasen-Commit-Protokolls (2PC) beruht. In diesem Zusammenhang wird die Funktionsweise des 2PC-Protokolls erörtert und Erweiterungen sowie Alternativen zum Protokoll kurz angesprochen. Zusätzlich werden alternative Lösungsansätze diskutiert, die für die Erzielung von Cross-Cloud-Atomarität in Betracht gezogen werden können. Dadurch wird ein umfassender Einblick in das Thema sowie mögliche Lösungsansätze für diese Herausforderung gewährt.
As the Industry 4.0 is evolving, the previously separated Operational Technology (OT) and Information Technology (IT) is converging. Connecting devices in the industrial setting to the Internet exposes these systems to a broader spectrum of cyber-attacks. The reason is that since OT does not have much security measures as much as IT, it is more vulnerable from the attacker's perspective. Another factor contributing to the vulnerability of OT is that, when it comes to cybersecurity, industries have focused on protecting information technology and less prioritizing the control systems. The consequences of a security breach in an OT system can be more adverse as it can lead to physical damage, industrial accidents and physical harm to human beings. Hence, for the OT networks, certificate-based authentication is implemented. This involves stages of managing credentials in their communication endpoints. In the previous works of ivESK, a solution was developed for managing credentials. This involves a CANopen-based physical demonstrator where the certificate management processes were developed. The extended feature set involving certificate management will be based on the existing solution. The thesis aims to significantly improve such a solution by addressing two key areas that is enhancing functionality and optimizing real-time performance. Regarding the first goal, firstly, an analysis of the existing feature set shall be carried out, where the correct functionality shall be guaranteed. The limitations from the previously implemented system will be addressed and to make sure it can be applied to real world scenarios, it will be implemented and tested in the physical demonstrator. This will lay a concrete foundation that these certificate management processes can be used in the industries in large-scale networks. Implementation of features like revocation mechanism for certificates, automated renewal of the credentials and authorization attribute checks for the certificate management will be implemented. Regarding the second goal, the impact of credential management processes on the ongoing CANopen real-time traffic shall be a studied. Since in real life scenarios, mission-critical applications like Industrial control systems, medical devices, and transportation networks rely on real-time communication for reliable operation, delays or disruptions caused by credential management processes can have severe consequences. Optimizing these processes is crucial for maintaining system integrity and safety. The effect to minimize the disturbance of the credential management processes on the normal operation of the CANopen network shall be characterized. This shall comprise testing real-time parameters in the network such as CPU load, network load and average delay. Results obtained from each of these tests will be studied.
JavaScript-Frameworks (JSF) sind im Bereich der Webentwicklung seit längerem prominent. Jährlich werden neue JSF entwickelt, um spezifische Probleme zu lösen. In den letzten Jahren hat sich der Trend entwickelt, bei der Wahl des JSF verstärkt auch auf die Performanz der entwickelten Webseite zu achten. Dabei wird versucht, den Anteil an JavaScript auf der Webseite zu reduzieren oder ganz zu eliminieren. Besonders neu ist der Ansatz der "Island Architecture", die erstmals 2019 vorgeschlagen wurde. In dieser Thesis soll die Performanz der meistbenutzten und des performantesten JSF mit dem JSF "Astro" verglichen werden, welches die "Island Architecture" von sich aus unterstützt. Der Schwerpunkt liegt beim Vergleichen der Webseitenperformanz, jedoch werden auch Effizienz und Einfachheit während der Entwicklung untersucht. Das Ziel dieser Arbeit ist es, potenzielle Frameworks zu untersuchen, die die Effizienz und Produktivität für den Nutzer und während der Entwicklung steigern können.
Modellprädiktive Regelung findet zunehmend Anwendung im industriellen Umfeld. Durch schnellere Computer und optimierte Programmierung ist es heute möglich, rechenintensive Regelalgorithmen in Echtzeit auf Mikrocontrollern zu berechnen. Eine besondere Herausforderung besteht jedoch darin, diese Technologie in der Realität einzusetzen. Weil exakte Kenntnisse über das reale System vorliegen müssen, können geringfügige Modellierungsfehler bei der Prädiktion für lange Prädiktionshorizonte schwerwiegende Folgen haben. Das ist insbesondere der Fall, wenn Systeme instabil sind und zu chaotischem Verhalten neigen.
Diese Arbeit behandelt ein breites Spektrum systemtheoretischer Inhalte und zielt darauf ab, ein reales Furuta-Pendel durch modellprädiktive Regelung in der instabilen Ruhelage zu stabilisieren. Hierfür wird ein mathematisches Modell als Prädiktionsmodell hergeleitet, welches durch verschiedene Systemidentifikationsmethoden spezifiziert und validiert wird. Es werden verschiedene Filter-Techniken wie das Kalman-Filter zur Zustandsschätzung oder das Exponential Moving Average (EMA)-Filter zur Filterung von Sensordaten eingesetzt.
Das Furuta-Pendel ist ein komplexes mechatronisches System. Die Aufgaben dieser Arbeit beschränken sich daher nicht nur auf theoretische Aspekte. Neben der Auslegung elektrischer Bauelemente und Schaltungen werden zusätzliche Sensoren zu einem bestehenden System hinzugefügt und mechanische Anpassungen vorgenommen. Darüber hinaus werden Entscheidungen zur Softwarearchitektur getroffen sowie die gesamte Implementierung auf einem Mikrocontroller durchgeführt.
Trotz intensiver Bemühungen konnte kein Modell gefunden werden, welches die gemessenen Ein- und Ausgangsdaten vergleichbar simulieren kann, sodass es den Anforderungen der modellprädiktiven Regelung entspricht. Stattdessen gelang es während der Systemidentifikationsphase einen Linear Quadratic Regulator (LQR) mit unterlagertem Proportional–Integral (PI) Stromregler als Kaskade zu entwerfen, der sowohl simulativ als auch in der Realität das Pendel stabilisieren kann.
Die Bachelorarbeit wurde im Rahmen einer Äquivalenz mit der Ingenieurschule INSA Straßburg geschrieben. Zum Thema wurde eine Projektarbeit im Auftrag der Kriminalpolizei mit einer Bearbeitungszeit von drei Semestern. Aufgabenstellung war es, einen Überblick eines Tatorts ohne menschlichen Eingriff zu verschaffen. Noch heute müssen die Polizisten den Tatort betreten, um Beweisspuren zu sammeln. Das Problem hierbei ist, dass dadurch Hinweise fast systematisch verloren gehen.
Mit einem ferngesteuerten Luftschiff sollte diese Aufgabenstellung gemeistert werden. Die Arbeit beschäftigt sich spezifisch mit dem Entwurf eines integrierten Kamerasystems und mit der Implementierung der Elektronik im Gesamtsystem für einen ersten Prototypen. Auf die Konzeptionierung der Fortbewegung und des Flugobjekts wird somit nicht in Detail eingegangen. Diese Aspekte werden bei der Erstellung des Lastenhefts geschildert und bei Berührungspunkten mit dem im Fokus stehenden Themengebiet erklärt.
Auf struktureller Ebene wird wie gefolgt vorgegangen: Die technischen Lösungen werden abgewogen, getestet und progressiv zusammengeführt. Zum Ende der Bearbeitungszeit können ferngesteuert Bilder und Panoramen aufgenommen und der Tatort live mit einem Video-Feedback observiert werden. Die Elektronik wurde, nach Erarbeitung der elektronischen Architektur, mithilfe einer gedruckten Leiterplatte kompakt in der Gondel des Luftschiffs integriert. Mit zahlreichen Optimierungsperspektiven wurde der erste Prototyp fertiggestellt und das Ziel dieser Arbeit erreicht.
Diese Arbeit befasst sich mit dem Entwurf und der Herstellung einer Roboterhandprothese, die amputierten Menschen eine gewisse Mobilität und eine teilweise Nutzung der Hand ermöglichen soll.
Das Projekt konzentriert sich insbesondere auf die Erkennung der vom Benutzer ausgeführten Bewegung und wird die Schritte der Erfassung, der Bewegung der Übertragung und die Erkennung detailliert darstellen.
Im Rahmen des Projekts "Myo-Hand" soll ein Prototyp einer myoelektrischen Handprothese entwickelt werden. Diese Prothese soll für handamputierte Menschen nützlich sein, da sie ihren Komfort und ihre Unabhängigkeit im Alltag verbessert und somit zu ihrer Eingliederung in die Gesellschaft beiträgt.
In dieser Abschlussarbeit werden die gesamte Arbeit, Studien und Realisierungen vorgestellt, die in den letzten zwei Semestern (WS2022 und SS2023) der Mechanik der Prothese durchgeführt wurden.
Nach einer kurzen Vorstellung der Arbeit des letzten Jahres wird ein Überblick über die Idee und die allgemeine Funktionsweise der Prothese gegeben, die verschiedene Komponenten umfasst: Elektronik, Machine-Learning, Steuerung, Wiederverwertbarkeit und Carbon Footprint. Das Lastenheft wird ebenfalls vorgestellt.
Die technologischen Entscheidungen werden näher erläutert: das Design der Teile, die Wahl der Verbindungen und die verwendeten Motoren. In einem zweiten Teil werden die Schritte zur Herstellung des ersten und zweiten Prototyps sowie eine Kritik des Ergebnisses vorgestellt. Weiter werden die Verbesserungen und die Ziele bis Januar 2024 besprochen.
Anschließend werden der Lebenszyklus der Prothese und ihr Carbon Footprint analysiert und mithilfe der Software Ecodesign Studio berechnet.
With the expansion of IoT devices in many aspects of our life, the security of such systems has become an important challenge. Unlike conventional computer systems, any IoT security solution should consider the constraints of these systems such as computational capability, memory, connectivity, and power consumption limitations. Physical Unclonable Functions (PUFs) with their special characteristics were introduced to satisfy the security needs while respecting the mentioned constraints. They exploit the uncontrollable and reproducible variations of the underlying component for security applications such as identification, authentication, and communication security. Since IoT devices are typically low cost, it is important to reuse existing elements in their hardware (for instance sensors, ADCs, etc.) instead of adding extra costs for the PUF hardware. Micro-electromechanical system (MEMS) devices are widely used in IoT systems as sensors and actuators. In this thesis, a comprehensive study of the potential application of MEMS devices as PUF primitives is provided. MEMS PUF leverages the uncontrollable variations in the parameters of MEMS elements to derive secure keys for cryptographic applications. Experimental and simulation results show that our proposed MEMS PUFs are capable of generating enough entropy for a complex key generation, while their responses show low fluctuations in different environmental conditions.
Keeping in mind that the PUF responses are prone to change in the presence of noise and environmental variations, it is critical to derive reliable keys from the PUF and to use the maximum entropy at the same time. In the second part of this thesis, we elaborate on different key generation schemes and their advantages and drawbacks. We propose the PUF output positioning (POP) and integer linear programming (ILP) methods, which are novel methods for grouping the PUF outputs in order to maximize the extracted entropy. To implement these methods, the key enrollment and key generation algorithms are presented. The proposed methods are then evaluated by applying on the responses of the MEMS PUF, where it can be practically shown that the proposed method outperforms other existing PUF key generation methods.
The final part of this thesis is dedicated to the application of the MEMS PUF as a security solution for IoT systems. We select the mutual authentication of IoT devices and their backend system, and propose two lightweight authentication protocols based on MEMS PUFs. The presented protocols undergo a comprehensive security analysis to show their eligibility to be used in IoT systems. As the result, the output of this thesis is a lightweight security solution based on MEMS PUFs, which introduces a very low overhead on the cost of the hardware.
This paper provides a comprehensive overview of approaches to the determination of isocontours and isosurfaces from given data sets. Different algorithms are reported in the literature for this purpose, which originate from various application areas, such as computer graphics or medical imaging procedures. In all these applications, the challenge is to extract surfaces with a specific isovalue from a given characteristic, so called isosurfaces. These different application areas have given rise to solution approaches that all solve the problem of isocontouring in their own way. Based on the literature, the following four dominant methods can be identified: the marching cubes algorithms, the tessellation-based algorithms, the surface nets algorithms and the ray tracing algorithms. With regard to their application, it can be seen that the methods are mainly used in the fields of medical imaging, computer graphics and the visualization of simulation results. In our work, we provide a broad and compact overview of the common methods that are currently used in terms of isocontouring with respect to certain criteria and their individual limitations. In this context, we discuss the individual methods and identify possible future research directions in the field of isocontouring.
"Ad fontes!"
Francesco Petrarca (1301–1374)
In the beginning, there was an idea: the reconstruction of the first "Iron Hand" of the Franconian imperial knight Götz von Berlichingen (1480–1562). We found that with this historical prosthesis, simple actions for daily use, such as holding a wine glass, a mobile phone, a bicycle handlebar grip, a horse’s reins, or some grapes, are possible without effort. Controlling this passive artificial hand, however, is based on the help of a healthy second hand.
This thesis focuses on the development and implementation of a Datagram Transport Layer Security (DTLS) communication framework within the ns-3 network simulator, specifically targeting the LoRaWAN model network. The primary aim is to analyse the behaviour and performance of DTLS protocols across different network conditions within a LoRaWAN context. The key aspects of this work include the following.
Utilization of ns-3: This thesis leverages ns-3’s capabilities as a powerful discrete event network simulator. This platform enables the emulation of diverse network environments, characterized by varying levels of latency, packet loss, and bandwidth constraints.
Emulation of Network Challenges: The framework specifically addresses unique challenges posed by certain network configurations, such as duty cycle limitations. These constraints, which limit the time allocated for data transmission by each device, are crucial in understanding the real-world performance of DTLS protocols.
Testing in Multi-client-server Scenarios: A significant feature of this framework is its ability to test DTLS performance in complex scenarios involving multiple clients and servers. This is vital for assessing the behaviour of a protocol under realistic network conditions.
Realistic Environment Simulation: By simulating challenging network conditions, such as congestion, limited bandwidth, and resource constraints, the framework provides a realistic environment for thorough evaluation. This allows for a comprehensive analysis of DTLS in terms of security, performance, and scalability.
Overall, this thesis contributes to a deeper understanding of DTLS protocols by providing a robust tool for their evaluation under various and challenging network conditions.
Ultra-low-power passive telemetry systems for industrial and biomedical applications have gained much popularity lately. The reduction of the power consumption and size of the circuits poses critical challenges in ultra-low-power circuit design. Biotelemetry applications like leakage detection in silicone breast implants require low-power-consuming small-size electronics. In this doctoral thesis, the design, simulation, and measurement of a programmable mixed-signal System-on-Chip (SoC) called General Application Passive Sensor Integrated Circuit (GAPSIC) is presented. Owing to the low power consumption, GAPSIC is capable of completely passive operation. Such a batteryless passive system has lower maintenance complexity and is also free from battery-related health hazards. With a die area of 4.92 mm² and a maximum analog power consumption of 592 µW, GAPSIC has one of the best figure-of-merits compared to similar state-of-the-art SoCs. Regarding possible applications, GAPSIC can read out and digitally transmit the signals of resistive sensors for pressure or temperature measurements. Additionally, GAPSIC can measure electrocardiogram (ECG) signals and conductivity.
The design of GAPSIC complies with the International Organization for Standardization (ISO) 15693/NFC (near field communication) 5 standard for radio frequency identification (RFID), corresponding to the frequency range of 13.56 MHz. A passive transponder developed with GAPSIC comprises of an external memory storage and very few other external components, like an antenna and sensors. The passive tag antenna and reader antenna use inductive coupling for communication and energy transfer, which enables passive operation. A passive tag developed with GAPSIC can communicate with an NFC compatible smart device or an ISO 15693 RFID reader. An external memory storage contains the programmable application-specific firmware.
As a mixed-signal SoC, GAPSIC includes both analog and digital circuitries. The analog block of GAPSIC includes a power management unit, an RFID/NFC communication unit, and a sensor readout unit. The digital block includes an integrated 32-bit microcontroller, developed by the Hochschule Offenburg ASIC design center, and digital peripherals. A 16-kilobyte random-access memory and a read-only 16-kilobyte memory constitute the GAPSIC internal memory. For the fabrication of GAPSIC, one poly, six-metal 0.18 µm CMOS process is used.
The design of GAPSIC includes two stages. In the first stage, a standalone RFID/NFC frontend chip with a power management unit, an RFID/NFC communication unit, a clock regenerator unit, and a field detector unit was designed. In the second stage, the rest of the functional blocks were integrated with the blocks of the RFID/NFC frontend chip for the final integration of GAPSIC. To reduce the power consumption, conventional low-power design techniques were applied extensively like multiple power supplies, and the operation of complementary metal-oxide-semiconductor (CMOS) transistors in the sub-threshold region of operation, as well as further innovative circuit designs.
An overvoltage protection circuit, a power rectifier, a bandgap reference circuit, and two low-dropout (LDO) voltage regulators constitute the power management unit of GAPSIC. The overvoltage protection circuit uses a novel method where three stacked transistor pairs shunt the extra voltage. In the power rectifier, four rectifier units are arranged in parallel, which is a unique approach. The four parallel rectifier units provide the optimal choice in terms of voltage drop and the area required.
The communication unit is responsible for RFID/NFC communication and incorporates demodulation and load modulation circuitry. The demodulator circuit comprises of an envelope detector, a high-pass filter, and a comparator. Following a new approach, the bandgap reference circuit itself acts as the load for the envelope detector circuit, which minimizes the circuit complexity and area. For the communication between the reader and the RFID/NFC tag, amplitude-shift keying (ASK) is used to modulate signals, where the smallest modulation index can be as low as 10%. A novel technique involving a comparator with a preset offset voltage effectively demodulates the ASK signal. With an effective die area of 0.7 mm² and power consumption of 107 µW, the standalone RFID/NFC frontend chip has the best figure-of-merits compared to the state-of-the-art frontend chips reported in the relevant literature. A passive RFID/NFC tag developed with the standalone frontend chip, as well as temperature and pressure sensors demonstrate the full passive operational capability of the frontend chip. An NFC reader device using a custom-built Android-based application software reads out the sensor data from the passive tag.
The sensor readout circuit consists of a channel selector with two differential and four single-ended inputs with a programmable-gain instrumentation amplifier. The entire sensor readout part remains deactivated when not in use. The internal memory stores the measured offset voltage of the instrumentation amplifier, where a firmware code removes the offset voltage from the measured sensor signal. A 12-bit successive approximation register (SAR) type analog-to-digital-converter (ADC) based on a charge redistribution architecture converts the measured sensor data to a digital value. The digital peripherals include a serial peripheral interface, four timers, RFID/NFC interfaces, sensor readout unit interfaces, and 12-bit SAR logic.
Two sets of studies with custom-made NFC tag antennas for biomedical applications were conducted to ascertain their compatibility with GAPSIC. The first study involved the link efficiency measurements of NFC tag antennas and an NFC reader antenna with porcine tissue. In a separate experiment, the effect of a ferrite compared to air core on the antenna-coupling factor was investigated. With the ferrite core, the coupling factor increased by four times.
Among the state-of-the-art SoCs published in recent scientific articles, GAPSIC is the only passive programmable SoC with a power management unit, an RFID/NFC communication interface, a sensor readout circuit, a 12-bit SAR ADC, and an integrated 32-bit microcontroller. This doctoral research includes the preliminary study of three passive RFID tags designed with discrete components for biomedical and industrial applications like measurements of temperature, pH, conductivity, and oxygen concentration, along with leakage detection in silicone breast implants. Besides its small size and low power consumption, GAPSIC is suitable for each of the biomedical and industrial applications mentioned above due to the integrated high-performance microcontroller, the robust programmable instrumentation amplifier, and the 12-bit analog-to-digital converter. Furthermore, the simulation and measurement data show that GAPSIC is well suited for the design of a passive tag to monitor arterial blood pressure in patients experiencing Peripheral Artery Disease (PAD), which is proposed in this doctoral thesis as an exemplary application of the developed system.
Decarbonisation Strategies in Energy Systems Modelling: APV and e-tractors as Flexibility Assets
(2023)
This work presents an analysis of the impact of introducing Agrophotovoltaic technologies and electric tractors into Germany’s energy system. Agrophotovoltaics involves installing photovoltaic systems in agricultural areas, allowing for dual usage of the land for both energy generation and food production. Electric tractors, which are agricultural machinery powered by electric motors, can also function as energy storage units, providing flexibility to the grid. The analysis includes a sensitivity study to understand how the availability of agricultural land influences Agrophotovoltaic investments, followed by the examination of various scenarios that involve converting diesel tractors to electric tractors. These scenarios are based on the current CO2 emission reduction targets set by the German Government, aiming for a 65% reduction below 1990 levels by 2030 and achieving zero emissions by 2045. The results indicate that approximately 3% of available agricultural land is necessary to establish a viable energy mix in Germany. Furthermore, the expansion of electric tractors tends to reduce the overall system costs and enhances the energy-cost-efficiency of Agrophotovoltaic investments.
Das Softwareunternehmen HRworks implementiert eine Personalverwaltungssoftware unter Verwendung der Programmiersprache Smalltalk und des Model-View-Controller (MVC) Musters. Innerhalb des Unternehmens erfordert jede Model-Klasse des Patterns das Vorhandensein einer korrespondierenden Controllerklasse. Controller verfügen über ein wiederkehrendes Grundgerüst, das bei jeder neuen Implementierung umgesetzt werden muss. Die Unterscheidungen innerhalb dieses Grundgerüsts ergeben sich lediglich aus dem Namen und der spezifischen Struktur der korrespondierenden Model-Klasse. Die vorliegende Arbeit adressiert die Herausforderung der automatischen Generierung dieses Controllergrundgerüsts, wobei die Besonderheiten jeder Model-Klasse berücksichtigt wird. Dies wird durch den gezielten Einsatz von Metaprogrammierung in der Programmiersprache Smalltalk realisiert und durch eine Benutzeroberfläche in der Entwicklungsumgebung unterstützt. Zusätzlich wird der Controller um eine Datentypprüfung erweitert, wofür ein spezialisierter Parser implementiert wurde. Dieser extrahiert aus einem definierten Getter der Model-Klasse den entsprechenden Datentyp des Attributes. Im Ergebnis liefert die Arbeit eine Methodik zur automatisierten Generierung und Anpassung von Controllergrundgerüsten sowie dazugehörigen Teststrukturen basierend auf der jeweiligen Model-Klasse. Zusätzlich wird die Funktionalität der Controller durch eine integrierte Datentypprüfung erweitert.
Vorhofflimmern ist die häufigste tachykarde Herzrhythmusstörung weltweit. Dabei verliert das Herz seinen normofrequenten Sinusrhythmus und schlägt nicht mehr regelmäßig, sondern zu schnell und unregelmäßig. Vorhofflimmern ist normalerweise keine lebensbedrohliche Herzrhythmusstörung, aber es kann zu einem Schlaganfall führen. Die Ursache dieser Herzrhythmusstörung sind die Kreisende bzw. die fokalen Erregungen im linken Atrium, die hauptsächliche aus einer oder mehreren Pulmonalvenen kommen. Die übliche Therapieverfahren des Vorhofflimmerns ist die Pulmonalvenenisolation.
Diese Bachelorthesis beschäftigt sich daher mit der Modellierung unterschiedlicher linksatrialer Fokus-Modelle und intrakardialer Elektrodenkatheter für die Diagnostik und Terminierung von Vorhofflimmern mittels Pulmonalvenenisolation im Offenburger Herzrhythmusmodell nach Schalk, Krämer und Benke, welches in CST
Studio Suite realisiert wurde.
Zu Beginn wurden die verschiedenen linksatrialen fokalen Flimmerquellen modelliert und daraufhin simuliert. Hierbei wurde jeweils eine Simulation mit linksatrialen fokalen Flimmerquellen, die aus einzelnen, dualen oder allen vier Pulmonalvenen kommen, durchgeführt. Es wurde ebenfalls eine weitere Simulation mit Biosignalen (aus der Realität) erstellt. Mit diesen Simulationen konnte nun der elektrische Erregungsablauf sichtbar gemacht werden. Daraufhin wurden die Katheter für die Diagnostik und für die Pulmonalvenenisolation modelliert und in das bestehende Offenburger Herzrhythmusmodell integriert. Bei den Diagnostik-Kathetern handelte es sich um 10-polige Lasso® Katheter, zwei Varianten von PentaRay® NAV eco Katheter und 4-polige Diagnostik-Katheter „OSYPKA FINDER pure®“. Ablationskatheter sind zwei Varianten von Pentaspline Basket pose Katheter und HELIOSTAR™ Ablation Ballon. Abschließend wurden verschiedene Varianten von Isolationsverfahren der Pulmonalvenen modelliert und daraufhin die linksatrialen fokalen Flimmerquellen nach der Isolation der Pulmonalvenen simuliert.
Artificial intelligence (AI), and in particular machine learning algorithms, are of increasing importance in many application areas but interpretability and understandability as well as responsibility, accountability, and fairness of the algorithms' results, all crucial for increasing the humans' trust into the systems, are still largely missing. Big industrial players, including Google, Microsoft, and Apple, have become aware of this gap and recently published their own guidelines for the use of AI in order to promote fairness, trust, interpretability, and other goals. Interactive visualization is one of the technologies that may help to increase trust in AI systems. During the seminar, we discussed the requirements for trustworthy AI systems as well as the technological possibilities provided by interactive visualizations to increase human trust in AI.
Introduction: Subjects with mild to moderate hearing loss today often receive hearing aids (HA) with open-fitting (OF). In OF, direct sound reaches the eardrums with minimal damping. Due to the required processing delay in digital HA, the amplified HA sound follows some milliseconds later. This process occurs in both ears symmetrically in bilateral HA provision and is likely to have no or minor detrimental effect on binaural hearing. However, the delayed and amplified sound are only present in one ear in cases of unilateral hearing loss provided with one HA. This processing alters interaural timing differences in the resulting ear signals.
Methods: In the present study, an experiment with normal-hearing subjects to investigate speech intelligibility in noise with direct and delayed sound was performed to mimic unilateral and bilateral HA provision with OF.
Results: The outcomes reveal that these delays affect speech reception thresholds (SRT) in the unilateral OF simulation when presenting speech and noise from different spatial directions. A significant decrease in the median SRT from –18.1 to –14.7 dB SNR is observed when typical HA processing delays are applied. On the other hand, SRT was independent of the delay between direct and delayed sound in the bilateral OF simulation.
Discussion: The significant effect emphasizes the development of rapid processing algorithms for unilateral HA provision.
Virtual-Reality
(2023)
Die Virtual-Reality (VR) Technologie ermöglicht Unternehmen eine Produktpräsentation, die weit über traditionelle Darstellungsmethoden hinausgeht. Obgleich die Integration der VR-Technologie für Unternehmen viele Chancen eröffnet, ist deren Einsatz auch mit Risiken verbunden. Insbesondere der Mangel an empirisch gesicherten Erkenntnissen zur Kundenakzeptanz, zu den Auswirkungen der Nutzung sowie zu Kannibalisierungseffekten ist ein wesentlicher Grund, der die Verbreitung von VR in der Kundenkommunikation noch hemmt. Das Buch adressiert diese Forschungslücken und identifiziert mittels eines nutzerzentrierten, quantitativen Forschungsdesigns konkrete Chancen und Risiken, die mit dem Einsatz von VR-Produktpräsentationen verbunden sind.
This paper presents the new Deep Reinforcement Learning (DRL) library RL-X and its application to the RoboCup Soccer Simulation 3D League and classic DRL benchmarks. RL-X provides a flexible and easy-to-extend codebase with self-contained single directory algorithms. Through the fast JAX-based implementations, RL-X can reach up to 4.5x speedups compared to well-known frameworks like Stable-Baselines3.
The use of artificial intelligence continues to impact a broad variety of domains, application areas, and people. However, interpretability, understandability, responsibility, accountability, and fairness of the algorithms' results - all crucial for increasing humans' trust into the systems - are still largely missing. The purpose of this seminar is to understand how these components factor into the holistic view of trust. Further, this seminar seeks to identify design guidelines and best practices for how to build interactive visualization systems to calibrate trust.
With the rising necessity of explainable artificial intelligence (XAI), we see an increase in task-dependent XAI methods on varying abstraction levels. XAI techniques on a global level explain model behavior and on a local level explain sample predictions. We propose a visual analytics workflow to support seamless transitions between global and local explanations, focusing on attributions and counterfactuals on time series classification. In particular, we adapt local XAI techniques (attributions) that are developed for traditional datasets (images, text) to analyze time series classification, a data type that is typically less intelligible to humans. To generate a global overview, we apply local attribution methods to the data, creating explanations for the whole dataset. These explanations are projected onto two dimensions, depicting model behavior trends, strategies, and decision boundaries. To further inspect the model decision-making as well as potential data errors, a what-if analysis facilitates hypothesis generation and verification on both the global and local levels. We constantly collected and incorporated expert user feedback, as well as insights based on their domain knowledge, resulting in a tailored analysis workflow and system that tightly integrates time series transformations into explanations. Lastly, we present three use cases, verifying that our technique enables users to (1)~explore data transformations and feature relevance, (2)~identify model behavior and decision boundaries, as well as, (3)~the reason for misclassifications.
Modern CNNs are learning the weights of vast numbers of convolutional operators. In this paper, we raise the fundamental question if this is actually necessary. We show that even in the extreme case of only randomly initializing and never updating spatial filters, certain CNN architectures can be trained to surpass the accuracy of standard training. By reinterpreting the notion of pointwise ($1\times 1$) convolutions as an operator to learn linear combinations (LC) of frozen (random) spatial filters, we are able to analyze these effects and propose a generic LC convolution block that allows tuning of the linear combination rate. Empirically, we show that this approach not only allows us to reach high test accuracies on CIFAR and ImageNet but also has favorable properties regarding model robustness, generalization, sparsity, and the total number of necessary weights. Additionally, we propose a novel weight sharing mechanism, which allows sharing of a single weight tensor between all spatial convolution layers to massively reduce the number of weights.
In the past ten years, applications of artificial neural networks have changed dramatically. outperforming earlier predictions in domains like robotics, computer vision, natural language processing, healthcare, and finance. Future research and advancements in CNN architectures, Algorithms and applications are expected to revolutionize various industries and daily life further. Our task is to find current products that resemble the given product image and description. Deep learning-based automatic product identification is a multi-step process that starts with data collection and continues with model training, deployment, and continuous improvement. The caliber and variety of the dataset, the design selected, and ongoing testing and improvement all affect the model's effectiveness. We achieved 81.47% training accuracy and 72.43% validation accuracy for our combined text and image classification model. Additionally, we have discussed the outcomes from the other dataset and numerous methods for creating an appropriate model.
An international study summarizes the threat situation in the OT environment under the heading "Growing security threats" [1]. According to this study, attacks on automation systems are likely to increase in the future. Accordingly, an automation system must be able to protect the integrity of the transmitted information in the future. This requirement is motivated, among other things, by the fact that the network-side isolation of industrial communication systems is no longer considered sufficient as the sole protective measure. This paper uses the example of PROFINET to show how the future requirements for a real-time communication protocol can be met and how they can be derived from the IEC 62443 standard.
Analysing and predicting the advance rate of a tunnel boring machine (TBM) in hard rock is integral to tunnelling project planning and execution. It has been applied in the industry for several decades with varying success. Most prediction models are based on or designed for large-diameter TBMs, and much research has been conducted on related tunnelling projects. However, only a few models incorporate information from projects with an outer diameter smaller than 5 m and no penetration prediction model for pipe jacking machines exists to date. In contrast to large TBMs, small-diameter TBMs and their projects have been considered little in research. In general, they are characterised by distinctive features, including insufficient geotechnical information, sometimes rather short drive lengths, special machine designs and partially concurring lining methods like pipe jacking and segment lining. A database which covers most of the parameters mentioned above has been compiled to investigate the performance of small-diameter TBMs in hard rock. In order to provide sufficient geological and technical variance, this database contains 37 projects with 70 geotechnically homogeneous areas. Besides the technical parameters, important geotechnical data like lithological information, unconfined compressive strength, tensile strength and point load index is included and evaluated. The analysis shows that segment lining TBMs have considerably higher penetration rates in similar geological and technical settings mostly due to their design parameters. Different methodologies for predicting TBM penetration, including state-of-the-art models from the literature as well as newly derived regression and machine learning models, are discussed and deployed for backward modelling of the projects contained in the database. New ranges of application for small-diameter tunnelling in several industry-standard penetration models are presented, and new approaches for the penetration prediction of pipe jacking machines in hard rock are proposed.
Following the traditional paradigm of convolutional neural networks (CNNs), modern CNNs manage to keep pace with more recent, for example transformer-based, models by not only increasing model depth and width but also the kernel size. This results in large amounts of learnable model parameters that need to be handled during training. While following the convolutional paradigm with the according spatial inductive bias, we question the significance of \emph{learned} convolution filters. In fact, our findings demonstrate that many contemporary CNN architectures can achieve high test accuracies without ever updating randomly initialized (spatial) convolution filters. Instead, simple linear combinations (implemented through efficient 1×1 convolutions) suffice to effectively recombine even random filters into expressive network operators. Furthermore, these combinations of random filters can implicitly regularize the resulting operations, mitigating overfitting and enhancing overall performance and robustness. Conversely, retaining the ability to learn filter updates can impair network performance. Lastly, although we only observe relatively small gains from learning 3×3 convolutions, the learning gains increase proportionally with kernel size, owing to the non-idealities of the independent and identically distributed (\textit{i.i.d.}) nature of default initialization techniques.
We have developed a methodology for the systematic generation of a large image dataset of macerated wood references, which we used to generate image data for nine hardwood genera. This is the basis for a substantial approach to automate, for the first time, the identification of hardwood species in microscopic images of fibrous materials by deep learning. Our methodology includes a flexible pipeline for easy annotation of vessel elements. We compare the performance of different neural network architectures and hyperparameters. Our proposed method performs similarly well to human experts. In the future, this will improve controls on global wood fiber product flows to protect forests.
Fix your downsampling ASAP! Be natively more robust via Aliasing and Spectral Artifact free Pooling
(2023)
Convolutional neural networks encode images through a sequence of convolutions, normalizations and non-linearities as well as downsampling operations into potentially strong semantic embeddings. Yet, previous work showed that even slight mistakes during sampling, leading to aliasing, can be directly attributed to the networks' lack in robustness. To address such issues and facilitate simpler and faster adversarial training, [12] recently proposed FLC pooling, a method for provably alias-free downsampling - in theory. In this work, we conduct a further analysis through the lens of signal processing and find that such current pooling methods, which address aliasing in the frequency domain, are still prone to spectral leakage artifacts. Hence, we propose aliasing and spectral artifact-free pooling, short ASAP. While only introducing a few modifications to FLC pooling, networks using ASAP as downsampling method exhibit higher native robustness against common corruptions, a property that FLC pooling was missing. ASAP also increases native robustness against adversarial attacks on high and low resolution data while maintaining similar clean accuracy or even outperforming the baseline.
Motivated by the recent trend towards the usage of larger receptive fields for more context-aware neural networks in vision applications, we aim to investigate how large these receptive fields really need to be. To facilitate such study, several challenges need to be addressed, most importantly: (i) We need to provide an effective way for models to learn large filters (potentially as large as the input data) without increasing their memory consumption during training or inference, (ii) the study of filter sizes has to be decoupled from other effects such as the network width or number of learnable parameters, and (iii) the employed convolution operation should be a plug-and-play module that can replace any conventional convolution in a Convolutional Neural Network (CNN) and allow for an efficient implementation in current frameworks. To facilitate such models, we propose to learn not spatial but frequency representations of filter weights as neural implicit functions, such that even infinitely large filters can be parameterized by only a few learnable weights. The resulting neural implicit frequency CNNs are the first models to achieve results on par with the state-of-the-art on large image classification benchmarks while executing convolutions solely in the frequency domain and can be employed within any CNN architecture. They allow us to provide an extensive analysis of the learned receptive fields. Interestingly, our analysis shows that, although the proposed networks could learn very large convolution kernels, the learned filters practically translate into well-localized and relatively small convolution kernels in the spatial domain.
Assessing the robustness of deep neural networks against out-of-distribution inputs is crucial, especially in safety-critical domains like autonomous driving, but also in safety systems where malicious actors can digitally alter inputs to circumvent safety guards. However, designing effective out-of-distribution tests that encompass all possible scenarios while preserving accurate label information is a challenging task. Existing methodologies often entail a compromise between variety and constraint levels for attacks and sometimes even both. In a first step towards a more holistic robustness evaluation of image classification models, we introduce an attack method based on image solarization that is conceptually straightforward yet avoids jeopardizing the global structure of natural images independent of the intensity. Through comprehensive evaluations of multiple ImageNet models, we demonstrate the attack's capacity to degrade accuracy significantly, provided it is not integrated into the training augmentations. Interestingly, even then, no full immunity to accuracy deterioration is achieved. In other settings, the attack can often be simplified into a black-box attack with model-independent parameters. Defenses against other corruptions do not consistently extend to be effective against our specific attack.
Project website: https://github.com/paulgavrikov/adversarial_solarization
Entity Matching (EM) defines the task of learning to group objects by transferring semantic concepts from example groups (=entities) to unseen data. Despite the general availability of image data in the context of many EM-problems, most currently available EM-algorithms solely rely on (textual) meta data. In this paper, we introduce the first publicly available large-scale dataset for "visual entity matching", based on a production level use case in the retail domain. Using scanned advertisement leaflets, collected over several years from different European retailers, we provide a total of ~786k manually annotated, high resolution product images containing ~18k different individual retail products which are grouped into ~3k entities. The annotation of these product entities is based on a price comparison task, where each entity forms an equivalence class of comparable products. Following on a first baseline evaluation, we show that the proposed "visual entity matching" constitutes a novel learning problem which can not sufficiently be solved using standard image based classification and retrieval algorithms. Instead, novel approaches which allow to transfer example based visual equivalent classes to new data are needed to address the proposed problem. The aim of this paper is to provide a benchmark for such algorithms.
Information about the dataset, evaluation code and download instructions are provided under https://www.retail-786k.org/.
Detecting Images Generated by Deep Diffusion Models using their Local Intrinsic Dimensionality
(2023)
Diffusion models recently have been successfully applied for the visual synthesis of strikingly realistic appearing images. This raises strong concerns about their potential for malicious purposes. In this paper, we propose using the lightweight multi Local Intrinsic Dimensionality (multiLID), which has been originally developed in context of the detection of adversarial examples, for the automatic detection of synthetic images and the identification of the according generator networks. In contrast to many existing detection approaches, which often only work for GAN-generated images, the proposed method provides close to perfect detection results in many realistic use cases. Extensive experiments on known and newly created datasets demonstrate that the proposed multiLID approach exhibits superiority in diffusion detection and model identification.Since the empirical evaluations of recent publications on the detection of generated images are often mainly focused on the "LSUN-Bedroom" dataset, we further establish a comprehensive benchmark for the detection of diffusion-generated images, including samples from several diffusion models with different image sizes.The code for our experiments is provided at https://github.com/deepfake-study/deepfake-multiLID.
Die Erfindung betrifft in einem ersten Aspekt eine Vorrichtung zur transkutanen Aufbringung eines elektrischen Stimulationsreizes auf ein Ohr. Die Vorrichtung umfasst einen Schaltungsträger, mindestens zwei Elektroden sowie eine Steuerungseinheit, wobei die Steuerungseinheit dazu konfiguriert ist, anhand von Stimulationsparametern ein elektrisches Stimulationssignal an den Elektroden zu erzeugen. Dabei ist die Vorrichtung, insbesondere eine Oberfläche des Schaltungsträgers der Vorrichtung, auf eine anatomische Form eines Ohres angepasst, sodass Elektroden auf der Oberfläche des Schaltungsträgers aufgebracht sind und ausgewählte Bereiche des Ohres kontaktieren Die Vorrichtung ist dadurch kennzeichnet, dass diese weiterhin einen Sensor zur Erkennung mindestens eines physiologischen Parameter umfasst und eine Steuerungseinheit dazu konfiguriert ist, anhand des mindestens einen physiologischen Parameters die Stimulationsparameter für den Stimulationsreiz anzupassen.In einem weiteren Aspekt betrifft die Erfindung ein Verfahren zur Herstellung der erfindungsgemäßen Vorrichtung.
Die Erfindung betrifft ein Verfahren zum Maximieren der von einer analogen Entropiequelle abgeleiteten Entropie, wobei das Verfahren folgende Schritte aufweist:- Bereitstellen von Eingabedaten für die analoge Entropiequelle (2);- Erzeugen von Rückgabewerten durch die analoge Entropiequelle basierend auf den Eingabedaten (3); und- Gruppieren der Rückgabewerte, wobei das Gruppieren der Rückgabewerte ein Anwenden von Versätzen auf Rückgabewerte aufweist (4).
One of the most important questions about smart metering systems for the end users is their data privacy and security. Indeed, smart metering systems provide a lot of advantages for distribution system operators (DSO), but functionalities offered to users of existing smart meters are still limited and society is becoming increasingly critical. Smart metering systems are accused of interfering with personal rights and privacy, providing unclear tariff regulations which not sufficiently encourage households to manage their electricity consumption in advance. In the specific field of smart grids, data security appears to be a necessary condition for consumer confidence without which they will not be able to give their consent to the collection and use of personal data concerning them.
Precisely synchronized communication is a major precondition for many industrial applications. At the same time, hardware cost and power consumption need to be kept as low as possible in the Internet of Things (IoT) paradigm. While many wired solutions on the market achieve these requirements, wireless alternatives are an interesting field for research and development. This article presents a novel IEEE802.11n/ac wireless solution, exhibiting several advantages over state-of-the-art competitors. It is based on a market-available wireless System on a Chip with modified low-level communication firmware combined with a low-cost field-programmable gate array. By achieving submicrosecond synchronization accuracy, our solution outperforms the precision of low-cost products by almost four orders of magnitude. Based on inexpensive hardware, the presented wireless module is up to 20 times cheaper than software-defined-radio solutions with comparable timing accuracy. Moreover, it consumes three to five times less power. To back up our claims, we report data that we collected with a high sampling rate (2000 samples per second) during an extended measurement campaign of more than 120 h, which makes our experimental results far more representative than others reported in the literature. Additional support is provided by the size of the testbed we used during the experiments, composed of a hybrid network with nine nodes divided into two independent wireless segments connected by a wired backbone. In conclusion, we believe that our novel Industrial IoT module architecture will have a significant impact on the future technological development of high-precision time-synchronized communication for the cost-sensitive industrial IoT market.
Blockchain interoperability: the state of heterogenous blockchain-to-blockchain communication
(2023)
Blockchain technology has been increasingly adopted over the past few years since the introduction of Bitcoin, with several blockchain architectures and solutions being proposed. Most proposed solutions have been developed in isolation, without a standard protocol or cryptographic structure to work with. This has led to the problem of interoperability, where solutions running on different blockchain platforms are unable to communicate, limiting the scope of use. With blockchains being adopted in a variety of fields such as the Internet of Things, it is expected that the problem of interoperability if not addressed quickly, will stifle technology advancement. This paper presents the current state of interoperability solutions proposed for heterogenous blockchain systems. A look is taken at interoperability solutions, not only for cryptocurrencies, but also for general data-based use cases. Current open issues in heterogenous blockchain interoperability are presented. Additionally, some possible research directions are presented to enhance and to extend the existing blockchain interoperability solutions. It was discovered that though there are a number of proposed solutions in literature, few have seen real-world implementation. The lack of blockchain-specific standards has slowed the progress of interoperability. It was also realized that most of the proposed solutions are developed targeting cryptocurrency-based applications.
Printed electronics can add value to existing products by providing new smart functionalities, such as sensing elements over large-areas on flexible or non-conformal surfaces. Here we present a hardware concept and prototype for a thinned ASIC integrated with an inkjet-printed temperature sensor alongside in-built additional security and unique identification features. The hybrid system exploits the advantages of inkjet-printable platinum-based sensors, physically unclonable function circuits and a fluorescent particle-based coating as a tamper protection layer.
PROFINET Security: A Look on Selected Concepts for Secure Communication in the Automation Domain
(2023)
We provide a brief overview of the cryptographic security extensions for PROFINET, as defined and specified by PROFIBUS & PROFINET International (PI). These come in three hierarchically defined Security Classes, called Security Class 1,2 and 3. Security Class 1 provides basic security improvements with moderate implementation impact on PROFINET components. Security Classes 2 and 3, in contrast, introduce an integrated cryptographic protection of PROFINET communication. We first highlight and discuss the security features that the PROFINET specification offers for future PROFINET products. Then, as our main focus, we take a closer look at some of the technical challenges that were faced during the conceptualization and design of Security Class 2 and 3 features. In particular, we elaborate on how secure application relations between PROFINET components are established and how a disruption-free availability of a secure communication channel is guaranteed despite the need to refresh cryptographic keys regularly. The authors are members of the PI Working Group CB/PG10 Security.
Wireless communication networks are crucial for enabling megatrends like the Internet of Things (IoT) and Industry 4.0. However, testing these networks can be challenging due to the complex network topology and RF characteristics, requiring a multitude of scenarios to be tested. To address this challenge, the authors developed and extended an automated testbed called Automated Physical TestBed (APTB). This testbed provides the means to conduct controlled tests, analyze coexistence, emulate multiple propagation paths, and model dependable channel conditions. Additionally, the platform supports test automation to facilitate efficient and systematic experimentation. This paper describes the extended architecture, implementation, and performance evaluation of the APTB testbed. The APTB testbed provides a reliable and efficient solution for testing wireless communication networks under various scenarios. The implementation and performance verification of the testbed demonstrate its effectiveness and usefulness for researchers and industry practitioners.
TSN, or Time Sensitive Networking, is becoming an essential technology for integrated networks, enabling deterministic and best effort traffic to coexist on the same infrastructure. In order to properly configure, run and secure such TSN, monitoring functionality is a must. The TSN standard already has some preparations to provide such functionality and there are different methods to choose from. We implemented different methods to measure the time synchronisation accuracy between devices as a C library and compared the measurement results. Furthermore, the library has been integrated into the ControlTSN engineering framework.
As industrial networks continue to expand and connect more devices and users, they face growing security challenges such as unauthorized access and data breaches. This paper delves into the crucial role of security and trust in industrial networks and how trust management systems (TMS) can mitigate malicious access to these networks.The TMS presented in this paper leverages distributed ledger technology (blockchain) to evaluate the trustworthiness of blockchain nodes, including devices and users, and make access decisions accordingly. While this approach is applicable to blockchain, it can also be extended to other areas. This approach can help prevent malicious actors from penetrating industrial networks and causing harm. The paper also presents the results of a simulation to demonstrate the behavior of the TMS and provide insights into its effectiveness.
This paper presents an overview of EREMI, a two-year project funded under ERASMUS+ KA203, and its results. The project team’s main objective was to develop and validate an advanced interdisciplinary higher education curriculum, which includes lifelong learning components. The curriculum focuses on enhancing resource efficiency in the manufacturing industry and optimising poorly or non-digitised industrial physical infrastructure systems. The paper also discusses the results of the project, highlighting the successful achievement of its goals. EREMI effectively supports the transition to Industry 5.0 by preparing a common European pool of future experts. Through comprehensive research and collaboration, the project team has designed a curriculum that equips students with the necessary skills and knowledge to thrive in the evolving manufacturing landscape. Furthermore, the paper explores the significance of EREMI’s contributions to the field, emphasising the importance of resource efficiency and system optimisation in industrial settings. By addressing the challenges posed by under-digitised infrastructure, the project aims to drive sustainable and innovative practices in manufacturing. All five project partner organisations have been actively engaged in offering relevant educational content and framework for decentralised sustainable economic development in regional and national contexts through capacity building at a local level. A crucial element of the added value is the new channel for obtaining feedback from students. The survey results, which are outlined in the paper, offer valuable insights gathered from students, contributing to the continuous improvement of the project.
Fused Filament Fabrication (FFF) is a widespread additive manufacturing technology, mostly in the field of printable polymers. The use of filaments filled with metal particles for the manufacture of metallic parts by FFF presents specific challenges regarding debinding and sintering. For aluminium and its alloys, the sintering temperature range overlaps with the temperature range of thermal decomposition of many commonly used “backbone” polymers, which provide stability to the green parts. Moreover, the high oxygen affinity of aluminium necessitates the use of special sintering regimes and alloying strategies. Therefore, it is challenging to achieve both low porosity and low levels of oxygen and carbon impurities at the same time. Feedstocks compatible with the special requirements of aluminium alloys were developed. We present results on the investigation of debinding/sintering regimes by Fourier Transform Infrared spectroscopy (FTIR) based In-Situ Process Gas Analysis and discuss optimized thermal treatment strategies for Al-based FFF.