@inproceedings{KirschMatareFerreinetal.2020, author = {Kirsch, Maximilian and Matar{\´e}, Victor and Ferrein, Alexander and Schiffer, Stefan}, title = {Integrating golog++ and ROS for Practical and Portable High-level Control}, series = {Proceedings of the 12th International Conference on Agents and Artificial Intelligence - Volume 2}, booktitle = {Proceedings of the 12th International Conference on Agents and Artificial Intelligence - Volume 2}, publisher = {SciTePress}, address = {Set{\´u}bal, Portugal}, doi = {10.5220/0008984406920699}, pages = {692 -- 699}, year = {2020}, abstract = {The field of Cognitive Robotics aims at intelligent decision making of autonomous robots. It has matured over the last 25 or so years quite a bit. That is, a number of high-level control languages and architectures have emerged from the field. One concern in this regard is the action language GOLOG. GOLOG has been used in a rather large number of applications as a high-level control language ranging from intelligent service robots to soccer robots. For the lower level robot software, the Robot Operating System (ROS) has been around for more than a decade now and it has developed into the standard middleware for robot applications. ROS provides a large number of packages for standard tasks in robotics like localisation, navigation, and object recognition. Interestingly enough, only little work within ROS has gone into the high-level control of robots. In this paper, we describe our approach to marry the GOLOG action language with ROS. In particular, we present our architecture on inte grating golog++, which is based on the GOLOG dialect Readylog, with the Robot Operating System. With an example application on the Pepper service robot, we show how primitive actions can be easily mapped to the ROS ActionLib framework and present our control architecture in detail.}, language = {en} } @article{FiedlerLaddClemensetal.2020, author = {Fiedler, Thomas M. and Ladd, Mark E. and Clemens, Markus and Bitz, Andreas}, title = {Safety of subjects during radiofrequency exposure in ultra-high-field magnetic resonance imaging}, series = {IEEE Letters on Electromagnetic Compatibility Practice and Applications}, volume = {2}, journal = {IEEE Letters on Electromagnetic Compatibility Practice and Applications}, number = {3}, publisher = {IEEE}, address = {New York, NY}, isbn = {2637-6423}, doi = {10.1109/LEMCPA.2020.3029747}, pages = {1 -- 8}, year = {2020}, abstract = {Magnetic resonance imaging (MRI) is one of the most important medical imaging techniques. Since the introduction of MRI in the mid-1980s, there has been a continuous trend toward higher static magnetic fields to obtain i.a. a higher signal-to-noise ratio. The step toward ultra-high-field (UHF) MRI at 7 Tesla and higher, however, creates several challenges regarding the homogeneity of the spin excitation RF transmit field and the RF exposure of the subject. In UHF MRI systems, the wavelength of the RF field is in the range of the diameter of the human body, which can result in inhomogeneous spin excitation and local SAR hotspots. To optimize the homogeneity in a region of interest, UHF MRI systems use parallel transmit systems with multiple transmit antennas and time-dependent modulation of the RF signal in the individual transmit channels. Furthermore, SAR increases with increasing field strength, while the SAR limits remain unchanged. Two different approaches to generate the RF transmit field in UHF systems using antenna arrays close and remote to the body are investigated in this letter. Achievable imaging performance is evaluated compared to typical clinical RF transmit systems at lower field strength. The evaluation has been performed under consideration of RF exposure based on local SAR and tissue temperature. Furthermore, results for thermal dose as an alternative RF exposure metric are presented.}, language = {en} } @article{HueningBackes2020, author = {H{\"u}ning, Felix and Backes, Andreas}, title = {Direct observation of large Barkhausen jump in thin Vicalloy wires}, series = {IEEE Magnetics Letters}, volume = {11}, journal = {IEEE Magnetics Letters}, number = {Art. 2506504}, publisher = {IEEE}, address = {New York, NY}, isbn = {1949-307X}, doi = {10.1109/LMAG.2020.3046411}, pages = {1 -- 4}, year = {2020}, language = {en} } @inproceedings{DinghoferHartung2020, author = {Dinghofer, Kai and Hartung, Frank}, title = {Analysis of Criteria for the Selection of Machine Learning Frameworks}, series = {2020 International Conference on Computing, Networking and Communications (ICNC)}, booktitle = {2020 International Conference on Computing, Networking and Communications (ICNC)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.1109/ICNC47757.2020.9049650}, pages = {373 -- 377}, year = {2020}, abstract = {With the many achievements of Machine Learning in the past years, it is likely that the sub-area of Deep Learning will continue to deliver major technological breakthroughs [1]. In order to achieve best results, it is important to know the various different Deep Learning frameworks and their respective properties. This paper provides a comparative overview of some of the most popular frameworks. First, the comparison methods and criteria are introduced and described with a focus on computer vision applications: Features and Uses are examined by evaluating papers and articles, Adoption and Popularity is determined by analyzing a data science study. Then, the frameworks TensorFlow, Keras, PyTorch and Caffe are compared based on the previously described criteria to highlight properties and differences. Advantages and disadvantages are compared, enabling researchers and developers to choose a framework according to their specific needs.}, language = {en} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @inproceedings{LeiseBreuerAltherretal.2020, author = {Leise, Philipp and Breuer, Tim and Altherr, Lena and Pelz, Peter F.}, title = {Development, validation and assessment of a resilient pumping system}, series = {Proceedings of the Joint International Resilience Conference, JIRC2020}, booktitle = {Proceedings of the Joint International Resilience Conference, JIRC2020}, isbn = {978-90-365-5095-6}, pages = {97 -- 100}, year = {2020}, abstract = {The development of resilient technical systems is a challenging task, as the system should adapt automatically to unknown disturbances and component failures. To evaluate different approaches for deriving resilient technical system designs, we developed a modular test rig that is based on a pumping system. On the basis of this example system, we present metrics to quantify resilience and an algorithmic approach to improve resilience. This approach enables the pumping system to automatically react on unknown disturbances and to reduce the impact of component failures. In this case, the system is able to automatically adapt its topology by activating additional valves. This enables the system to still reach a minimum performance, even in case of failures. Furthermore, timedependent disturbances are evaluated continuously, deviations from the original state are automatically detected and anticipated in the future. This allows to reduce the impact of future disturbances and leads to a more resilient system behaviour.}, language = {en} } @inproceedings{LorenzAltherrPelz2020, author = {Lorenz, Imke-Sophie and Altherr, Lena and Pelz, Peter F.}, title = {Resilience enhancement of critical infrastructure - graph-theoretical resilience analysis of the water distribution system in the German city of Darmstadt}, series = {14th WCEAM Proceedings}, booktitle = {14th WCEAM Proceedings}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-64228-0}, doi = {10.1007/978-3-030-64228-0_13}, pages = {137 -- 149}, year = {2020}, abstract = {Water suppliers are faced with the great challenge of achieving high-quality and, at the same time, low-cost water supply. Since climatic and demographic influences will pose further challenges in the future, the resilience enhancement of water distribution systems (WDS), i.e. the enhancement of their capability to withstand and recover from disturbances, has been in particular focus recently. To assess the resilience of WDS, graph-theoretical metrics have been proposed. In this study, a promising approach is first physically derived analytically and then applied to assess the resilience of the WDS for a district in a major German City. The topology based resilience index computed for every consumer node takes into consideration the resistance of the best supply path as well as alternative supply paths. This resistance of a supply path is derived to be the dimensionless pressure loss in the pipes making up the path. The conducted analysis of a present WDS provides insight into the process of actively influencing the resilience of WDS locally and globally by adding pipes. The study shows that especially pipes added close to the reservoirs and main branching points in the WDS result in a high resilience enhancement of the overall WDS.}, language = {en} } @incollection{SchneiderWisselinkNoelleetal.2020, author = {Schneider, Dominik and Wisselink, Frank and N{\"o}lle, Nikolai and Czarnecki, Christian}, title = {Influence of artificial intelligence on commercial interactions in the consumer market}, series = {Automatisierung und Personalisierung von Dienstleistungen : Methoden - Potenziale - Einsatzfelder}, booktitle = {Automatisierung und Personalisierung von Dienstleistungen : Methoden - Potenziale - Einsatzfelder}, editor = {Bruhn, Manfred and Hadwich, Karsten}, publisher = {Springer Gabler}, address = {Wiesbaden}, isbn = {978-3-658-30167-5 (Print)}, doi = {10.1007/978-3-658-30168-2_7}, pages = {183 -- 205}, year = {2020}, abstract = {Recently, novel AI-based services have emerged in the consumer market. AI-based services can affect the way consumers take commercial decisions. Research on the influence of AI on commercial interactions is in its infancy. In this chapter, a framework creating a first overview of the influence of AI on commercial interactions is introduced. This framework summarizes the findings of comparing numerous customer journeys of novel AI-based services with corresponding non-AI equivalents.}, language = {en} } @article{OrzadaFiedlerBitzetal.2020, author = {Orzada, Stephan and Fiedler, Thomas M. and Bitz, Andreas and Ladd, Mark E. and Quick, Harald H.}, title = {Local SAR compression with overestimation control to reduce maximum relative SAR overestimation and improve multi-channel RF array performance}, series = {Magnetic Resonance Materials in Physics, Biology and Medicine}, journal = {Magnetic Resonance Materials in Physics, Biology and Medicine}, number = {34 (2021)}, publisher = {Springer}, address = {Heidelberg}, isbn = {1352-8661}, doi = {10.1007/s10334-020-00890-0}, pages = {153 -- 164}, year = {2020}, abstract = {Objective In local SAR compression algorithms, the overestimation is generally not linearly dependent on actual local SAR. This can lead to large relative overestimation at low actual SAR values, unnecessarily constraining transmit array performance. Method Two strategies are proposed to reduce maximum relative overestimation for a given number of VOPs. The first strategy uses an overestimation matrix that roughly approximates actual local SAR; the second strategy uses a small set of pre-calculated VOPs as the overestimation term for the compression. Result Comparison with a previous method shows that for a given maximum relative overestimation the number of VOPs can be reduced by around 20\% at the cost of a higher absolute overestimation at high actual local SAR values. Conclusion The proposed strategies outperform a previously published strategy and can improve the SAR compression where maximum relative overestimation constrains the performance of parallel transmission.}, language = {en} } @inproceedings{LorenzAltherrPelz2020, author = {Lorenz, Imke-Sophie and Altherr, Lena and Pelz, Peter F.}, title = {Assessing and Optimizing the Resilience of Water Distribution Systems Using Graph-Theoretical Metrics}, series = {Operations Research Proceedings 2019}, booktitle = {Operations Research Proceedings 2019}, editor = {Neufeld, Janis S. and Buscher, Udo and Lasch, Rainer and M{\"o}st, Dominik and Sch{\"o}nberger, J{\"o}rn}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-48439-2}, doi = {10.1007/978-3-030-48439-2_63}, pages = {521 -- 527}, year = {2020}, abstract = {Water distribution systems are an essential supply infrastructure for cities. Given that climatic and demographic influences will pose further challenges for these infrastructures in the future, the resilience of water supply systems, i.e. their ability to withstand and recover from disruptions, has recently become a subject of research. To assess the resilience of a WDS, different graph-theoretical approaches exist. Next to general metrics characterizing the network topology, also hydraulic and technical restrictions have to be taken into account. In this work, the resilience of an exemplary water distribution network of a major German city is assessed, and a Mixed-Integer Program is presented which allows to assess the impact of capacity adaptations on its resilience.}, language = {en} }