Refine
Year of publication
- 2023 (46) (remove)
Document Type
- Conference Proceeding (46) (remove)
Conference Type
- Konferenzartikel (41)
- Konferenz-Abstract (4)
- Sonstiges (1)
Is part of the Bibliography
- yes (46)
Keywords
- Deep Leaning (7)
- RoboCup (3)
- Current measurement (2)
- Kalman Filter (2)
- Switches (2)
- certificate management (2)
- programming (2)
- 5G mobile communication (1)
- Additive Manufacturing (1)
- Aluminum (1)
- Anti-Windup (1)
- Authentication (1)
- Authorization (1)
- Automation (1)
- Bearings (1)
- Blockchains (1)
- Boundary conditions (1)
- Bowtie antenna (1)
- Cleaning (1)
- Data breech (1)
- Debinding (1)
- Deep Neural Network (1)
- Digital Flex Twin Optimization (1)
- EAP-TLS (1)
- EKF-SLAM (1)
- Energy Flexibility (1)
- Energy Flexibility for Companies (1)
- Energy Marketing of Industrial Flexibilities (1)
- Estimation (1)
- Failure analysis (1)
- Fault Classification (1)
- Fused Filament Fabrication (1)
- Handschrift (1)
- Handswritten Character Recognition (1)
- Harmonic analysis (1)
- Hybrid system (1)
- IEC/IEEE 60802 security (1)
- IIoT (1)
- Industrial Blockchain (1)
- Inverters (1)
- Künstliche Intelligenz (1)
- Limiting (1)
- Logic gates (1)
- Machine Learning (1)
- Magnetic sensors (1)
- Manufacturing automation (1)
- Monitoring (1)
- Monocular Depth Estimation (1)
- NETCONF security (1)
- Neural networks (1)
- OT security (1)
- Optimization (1)
- Optimization with Digital Twins (1)
- Optische Zeichenerkennung (1)
- PI control (1)
- PKI (1)
- PROFINET Security (1)
- Parameter estimation (1)
- Performance (1)
- Performance evaluation (1)
- Permanent magnet machines (1)
- Physical unclonable function (1)
- Predictions (1)
- Predictive Maintenance (1)
- Pulse width modulation (1)
- RUL (1)
- Radio frequency (1)
- Renewable Energy Markets (1)
- Rotors (1)
- Security (1)
- Semiconductor device measurement (1)
- Sensor phenomena and characterization (1)
- Sintering (1)
- Software (1)
- Software algorithms (1)
- Stromregelung (1)
- Stromzustandsregler (1)
- Synchronmaschine (1)
- TLS (1)
- TSN security (1)
- Testbed (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- TinyML (1)
- Torque (1)
- Trust management (1)
- Virtual Reality (1)
- Wireless IoT (1)
- Yolov5 (1)
- accelerometer (1)
- accountability (1)
- artificial intelligence (1)
- bearing (1)
- bench-marking (1)
- credentials (1)
- cryptography (1)
- curriculum learning (1)
- deep reinforcement learning (1)
- degradation stages (1)
- detection (1)
- efficient training (1)
- embedded systems (1)
- explainability (1)
- fairness (1)
- ground penetrating radar (1)
- interactive visualization (1)
- machine learning (1)
- millimeter-wave (1)
- performance (1)
- predictive maintenance (1)
- primary authentication (1)
- printed electronics (1)
- responsibility (1)
- secure communication (1)
- skin cancer (1)
- skin cancer detection (1)
- solar module (1)
- sparse backpropagation (1)
- system authenticity (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- trust (1)
- understandability (1)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (46) (remove)
Open Access
- Closed (35)
- Open Access (11)
- Bronze (5)
- Diamond (4)
- Grün (2)
Die Positionierung mobiler Systeme mit hoher Genauigkeit ist eine Voraussetzung für intelligentes autonomes Verhalten, sowohl in der Feldrobotik als auch in industriellen Umgebungen. Dieser Beitrag beschreibt den Aufbau einer Roboterplattform und ihre Verwendung für den Test und die Bewertung von Kalman-Filter-Konfigurationen. Der Aufbau wurde mit einem mobilen Roboter Husky A200 und einem LiDAR-Sensor (Light Detection and Ranging) realisiert. Zur Verifizierung des vorgeschlagenen Aufbaus wurden fünf verschiedene Szenarien ausgearbeitet. Mit denen wurden die Filter auf ihre Leistungsfähigkeit hinsichtlich der Genauigkeit der Positionsbestimmung getestet.
A method for evaluating skin cancer detection based on millimeter-wave technologies is presented. For this purpose, the relative permittivities are calculated using the effective medium theory for the benign and cancerous lesion, considering the change in water content between them. These calculated relative permittivities are further used for the simulation and evaluation of skin cancer detection using a substrate-integrated waveguide probe. A difference in the simulated scattering parameters S 11 of up to 13dB between healthy and cancerous skin can be determined in the best-case.
Convolutional neural networks (CNN) define the state-of-the-art solution on many perceptual tasks. However, current CNN approaches largely remain vulnerable against adversarial perturbations of the input that have been crafted specifically to fool the system while being quasi-imperceptible to the human eye. In recent years, various approaches have been proposed to defend CNNs against such attacks, for example by model hardening or by adding explicit defence mechanisms. Thereby, a small “detector” is included in the network and trained on the binary classification task of distinguishing genuine data from data containing adversarial perturbations. In this work, we propose a simple and light-weight detector, which leverages recent findings on the relation between networks’ local intrinsic dimensionality (LID) and adversarial attacks. Based on a re-interpretation of the LID measure and several simple adaptations, we surpass the state-of-the-art on adversarial detection by a significant m argin and reach almost perfect results in terms of F1-score for several networks and datasets. Sources available at: https://github.com/adverML/multiLID
As industrial networks continue to expand and connect more devices and users, they face growing security challenges such as unauthorized access and data breaches. This paper delves into the crucial role of security and trust in industrial networks and how trust management systems (TMS) can mitigate malicious access to these networks.The TMS presented in this paper leverages distributed ledger technology (blockchain) to evaluate the trustworthiness of blockchain nodes, including devices and users, and make access decisions accordingly. While this approach is applicable to blockchain, it can also be extended to other areas. This approach can help prevent malicious actors from penetrating industrial networks and causing harm. The paper also presents the results of a simulation to demonstrate the behavior of the TMS and provide insights into its effectiveness.
Training deep neural networks using backpropagation is very memory and computationally intensive. This makes it difficult to run on-device learning or fine-tune neural networks on tiny, embedded devices such as low-power micro-controller units (MCUs). Sparse backpropagation algorithms try to reduce the computational load of on-device learning by training only a subset of the weights and biases. Existing approaches use a static number of weights to train. A poor choice of this so-called backpropagation ratio limits either the computational gain or can lead to severe accuracy losses. In this paper we present TinyProp, the first sparse backpropagation method that dynamically adapts the back-propagation ratio during on-device training for each training step. TinyProp induces a small calculation overhead to sort the elements of the gradient, which does not significantly impact the computational gains. TinyProp works particularly well on fine-tuning trained networks on MCUs, which is a typical use case for embedded applications. For typical datasets from three datasets MNIST, DCASE2020 and CIFAR10, we are 5 times faster compared to non-sparse training with an accuracy loss of on average 1%. On average, TinyProp is 2.9 times faster than existing, static sparse backpropagation algorithms and the accuracy loss is reduced on average by 6 % compared to a typical static setting of the back-propagation ratio.
Sweaty has already participated several times in RoboCup soccer competitions (Adult Size). Now the work is focused coordinating the play of two robots. Moreover, we are working on stabilizing the gait by adding additional sensor information. An ongoing work is the optimization of the control strategy by balancing between impedance and position control. By minimizing the jerk, gait and overall gameplay should improve significantly.
Team description papers of magmaOffenburg are incremental in the sense that each year we address a different topic of our team and the tools around our team. In this year’s team description paper we focus on the architecture of the software. It is a main factor for being able to keep the code maintainable even after 15 years of development. We also describe how we make sure that the code follows this architecture.
Erlang is a functional programming language with dynamic typing. The language offers great flexibility for destructing values through pattern matching and dynamic type tests. Erlang also comes with a type language supporting parametric polymorphism, equi-recursive types, as well as union and a limited form of intersection types. However, type signatures only serve as documentation; there is no check that a function body conforms to its signature.
Set-theoretic types and semantic subtyping fit Erlang’s feature set very well. They allow expressing nearly all constructs of its type language and provide means for statically checking type signatures. This article brings set-theoretic types to Erlang and demonstrates how existing Erlang code can be statically type checked without or with only minor modifications to the code. Further, the article formalizes the main ingredients of the type system in a small core calculus, reports on an implementation of the system, and compares it with other static type checkers for Erlang.
Seismic data processing relies on multiples attenuation to improve inversion and interpretation. Radon-based algorithms are often used for multiples and primaries discrimination. Deep learning, based on convolutional neural networks (CNNs), has shown encouraging applications for demultiple that could mitigate Radon-based challenges. In this work, we investigate new strategies to train a CNN for multiples removal based on different loss functions. We propose combined primaries and multiples labels in the loss for training a CNN to predict primaries, multiples, or both simultaneously. Moreover, we investigate two distinctive training methods for all the strategies: UNet based on minimum absolute error (L1) training, and adversarial training (GAN-UNet). We test the trained models with the different strategies and methods on 400 synthetic data. We found that training to predict multiples, including the primaries …