@inproceedings{HeuermannHarzheimMuehmel2021, author = {Heuermann, Holger and Harzheim, Thomas and M{\"u}hmel, Marc}, title = {A maritime harmonic radar search and rescue system using passive and active tags}, series = {2020 17th European Radar Conference (EuRAD)}, booktitle = {2020 17th European Radar Conference (EuRAD)}, publisher = {IEEE}, address = {New York, NY}, isbn = {978-2-87487-061-3}, doi = {10.1109/EuRAD48048.2021.00030}, pages = {73 -- 76}, year = {2021}, abstract = {This article introduces a new maritime search and rescue system based on S-band illumination harmonic radar (HR). Passive and active tags have been developed and tested attached to life jackets and a rescue boat. This system was able to detect and range the active tags up to a range of 5800 m in tests on the Baltic Sea with an antenna input power of only 100 W. All electronic GHz components of the system, excluding the S-band power amplifier, were custom developed for this purpose. Special attention is given to the performance and conceptual differences between passive and active tags used in the system and integration with a maritime X-band navigation radar is demonstrated.}, language = {en} } @inproceedings{FerreinMeessenLimpertetal.2021, author = {Ferrein, Alexander and Meeßen, Marcus and Limpert, Nicolas and Schiffer, Stefan}, title = {Compiling ROS schooling curricula via contentual taxonomies}, series = {Robotics in Education}, booktitle = {Robotics in Education}, editor = {Lepuschitz, Wilfried}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-67411-3}, doi = {10.1007/978-3-030-67411-3_5}, pages = {49 -- 60}, year = {2021}, abstract = {The Robot Operating System (ROS) is the current de-facto standard in robot middlewares. The steadily increasing size of the user base results in a greater demand for training as well. User groups range from students in academia to industry professionals with a broad spectrum of developers in between. To deliver high quality training and education to any of these audiences, educators need to tailor individual curricula for any such training. In this paper, we present an approach to ease compiling curricula for ROS trainings based on a taxonomy of the teaching contents. The instructor can select a set of dedicated learning units and the system will automatically compile the teaching material based on the dependencies of the units selected and a set of parameters for a particular training. We walk through an example training to illustrate our work.}, language = {en} } @inproceedings{HoegenDonckerRuetters2020, author = {Hoegen, Anne von and Doncker, Rik W. De and R{\"u}tters, Ren{\´e}}, title = {Teaching Digital Control of Operational Amplifier Processes with a LabVIEW Interface and Embedded Hardware}, series = {2020 23rd International Conference on Electrical Machines and Systems (ICEMS)}, booktitle = {2020 23rd International Conference on Electrical Machines and Systems (ICEMS)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.23919/ICEMS50442.2020.9290928}, pages = {1117 -- 1122}, year = {2020}, abstract = {Control engineering theory is hard to grasp for undergraduates during the first semesters, as it deals with the dynamical behavior of systems also in combination with control strategies on an abstract level. Therefore, operational amplifier (OpAmp) processes are reasonable and very effective systems to connect mathematical description with actual system's behavior. In this paper, we present an experiment for a laboratory session in which an embedded system, driven by a LabVIEW human machine interface (HMI) via USB, controls the analog circuits.With this setup we want to show the possibility of firstly, analyzing a first order process and secondly, designing a P-and PI-controller. Thereby, the theory of control engineering is always applied to the empirical results in order to break down the abstract level for the students.}, language = {en} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @inproceedings{ChristianMontagSchubaetal.2018, author = {Christian, Esser and Montag, Tim and Schuba, Marko and Allhof, Manuel}, title = {Future critical infrastructure and security - cyberattacks on charging stations}, series = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, booktitle = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, publisher = {Society of Automotive Engineers of Japan (JSAE)}, address = {Tokyo}, isbn = {978-1-5108-9157-9}, pages = {665 -- 671}, year = {2018}, language = {en} } @inproceedings{KoenigVoelkerWolf2018, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin}, title = {The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game's story}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {98 -- 106}, year = {2018}, abstract = {During the development of a Competence Developing Game's (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG's target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories.}, language = {en} } @inproceedings{DowidatKoenigWolf2017, author = {Dowidat, Linda and K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {The motivational competence developing game framework}, series = {Mensch und Computer 2017 - Tagungsband}, booktitle = {Mensch und Computer 2017 - Tagungsband}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Regensburg}, doi = {10.18420/muc2017-mci-0130}, pages = {15 -- 26}, year = {2017}, abstract = {Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This 'motivational Competence Developing Game Framework' demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper.}, language = {en} } @inproceedings{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {Cybersecurity awareness training provided by the competence developing game GHOST}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {81 -- 87}, year = {2018}, abstract = {This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game}, language = {en} } @inproceedings{WalterElsenMuelleretal.1999, author = {Walter, Peter and Elsen, Ingo and M{\"u}ller, Holger and Kraiss, Karl-Friedrich}, title = {3D object recognition with a specialized mixtures of experts architecture}, series = {IJCNN'99. International Joint Conference on Neural Networks. Proceedings}, booktitle = {IJCNN'99. International Joint Conference on Neural Networks. Proceedings}, publisher = {IEEE}, address = {New York}, isbn = {0-7803-5529-6}, issn = {1098-7576}, doi = {10.1109/IJCNN.1999.836243}, pages = {3563 -- 3568}, year = {1999}, abstract = {Aim of the AXON2 project (Adaptive Expert System for Object Recogniton using Neuml Networks) is the development of an object recognition system (ORS) capable of recognizing isolated 3d objects from arbitrary views. Commonly, classification is based on a single feature extracted from the original image. Here we present an architecture adapted from the Mixtures of Eaqerts algorithm which uses multiple neuml networks to integmte different features. During tmining each neural network specializes in a subset of objects or object views appropriate to the properties of the corresponding feature space. In recognition mode the system dynamically chooses the most relevant features and combines them with maximum eficiency. The remaining less relevant features arz not computed and do therefore not decelerate the-recognition process. Thus, the algorithm is well suited for ml-time applications.}, language = {en} } @inproceedings{Elsen1998, author = {Elsen, Ingo}, title = {A pixel based approach to view based object recognition with self-organizing neural networks}, series = {IECON'98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society}, booktitle = {IECON'98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society}, publisher = {IEEE}, address = {New York}, isbn = {0-7803-4503-7}, doi = {10.1109/IECON.1998.724032}, pages = {2040 -- 2044}, year = {1998}, abstract = {This paper addresses the pixel based classification of three dimensional objects from arbitrary views. To perform this task a coding strategy, inspired by the biological model of human vision, for pixel data is described. The coding strategy ensures that the input data is invariant against shift, scale and rotation of the object in the input domain. The image data is used as input to a class of self organizing neural networks, the Kohonen-maps or self-organizing feature maps (SOFM). To verify this approach two test sets have been generated: the first set, consisting of artificially generated images, is used to examine the classification properties of the SOFMs; the second test set examines the clustering capabilities of the SOFM when real world image data is applied to the network after it has been preprocessed to be invariant against shift, scale and rotation. It is shown that the clustering capability of the SOFM is strongly dependant on the invariance coding of the images.}, language = {en} } @inproceedings{ElsenKraissKrumbiegel1997, author = {Elsen, Ingo and Kraiss, Karl-Friedrich and Krumbiegel, Dirk}, title = {Pixel based 3D object recognition with bidirectional associative memories}, series = {International Conference on Neural Networks 1997}, booktitle = {International Conference on Neural Networks 1997}, publisher = {IEEE}, address = {New York}, isbn = {0-7803-4122-8}, pages = {1679 -- 1684}, year = {1997}, abstract = {This paper addresses the pixel based recognition of 3D objects with bidirectional associative memories. Computational power and memory requirements for this approach are identified and compared to the performance of current computer architectures by benchmarking different processors. It is shown, that the performance of special purpose hardware, like neurocomputers, is between one and two orders of magnitude higher than the performance of mainstream hardware. On the other hand, the calculation of small neural networks is performed more efficiently on mainstream processors. Based on these results a novel concept is developed, which is tailored for the efficient calculation of bidirectional associative memories. The computational efficiency is further enhanced by the application of algorithms and storage techniques which are matched to characteristics of the application at hand.}, language = {en} } @inproceedings{ChircuCzarneckiFriedmannetal.2023, author = {Chircu, Alina and Czarnecki, Christian and Friedmann, Daniel and Pomaskow, Johanna and Sultanow, Eldar}, title = {Towards a Digital Twin of Society}, series = {Proceedings of the 56th Hawaii International Conference on System Sciences 2023}, booktitle = {Proceedings of the 56th Hawaii International Conference on System Sciences 2023}, publisher = {University of Hawai'i}, address = {Honolulu}, isbn = {978-0-9981331-6-4}, pages = {6748 -- 6757}, year = {2023}, abstract = {This paper describes the potential for developing a digital twin of society- a dynamic model that can be used to observe, analyze, and predict the evolution of various societal aspects. Such a digital twin can help governmental agencies and policy makers in interpreting trends, understanding challenges, and making decisions regarding investments or policies necessary to support societal development and ensure future prosperity. The paper reviews related work regarding the digital twin paradigm and its applications. The paper presents a motivating case study- an analysis of opportunities and challenges faced by the German federal employment agency, Bundesagentur f¨ur Arbeit (BA), proposes solutions using digital twins, and describes initial proofs of concept for such solutions.}, language = {en} } @inproceedings{AltherrConzenElsenetal.2023, author = {Altherr, Lena and Conzen, Max and Elsen, Ingo and Frauenrath, Tobias and Lyrmann, Andreas}, title = {Sensor retrofitting of existing buildings in an interdisciplinary teaching project at university level}, series = {Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel}, booktitle = {Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel}, editor = {Reiff-Stephan, J{\"o}rg and J{\"a}kel, Jens and Schwarz, Andr{\´e}}, publisher = {le-tex publishing services GmbH}, address = {Leipzig}, isbn = {978-3-910103-01-6}, doi = {10.33968/2023.04}, pages = {31 -- 40}, year = {2023}, abstract = {Existing residential buildings have an average lifetime of 100 years. Many of these buildings will exist for at least another 50 years. To increase the efficiency of these buildings while keeping costs at reasonable rates, they can be retrofitted with sensors that deliver information to central control units for heating, ventilation and electricity. This retrofitting process should happen with minimal intervention into existing infrastructure and requires new approaches for sensor design and data transmission. At FH Aachen University of Applied Sciences, students of different disciplines work together to learn how to design, build, deploy and operate such sensors. The presented teaching project already created a low power design for a combined CO2, temperature and humidity measurement device that can be easily integrated into most home automation systems}, language = {en} } @inproceedings{DeyElsenFerreinetal.2021, author = {Dey, Thomas and Elsen, Ingo and Ferrein, Alexander and Frauenrath, Tobias and Reke, Michael and Schiffer, Stefan}, title = {CO2 Meter: a do-it-yourself carbon dioxide measuring device for the classroom}, series = {PETRA '21: Proceedings of the 14th Pervasive Technologies Related to Assistive Environments Conference}, booktitle = {PETRA '21: Proceedings of the 14th Pervasive Technologies Related to Assistive Environments Conference}, editor = {Makedon, Fillia}, publisher = {Association for Computing Machinery}, address = {New York}, isbn = {9781450387927}, doi = {10.1145/3453892.3462697}, pages = {292 -- 299}, year = {2021}, abstract = {In this paper we report on CO2 Meter, a do-it-yourself carbon dioxide measuring device for the classroom. Part of the current measures for dealing with the SARS-CoV-2 pandemic is proper ventilation in indoor settings. This is especially important in schools with students coming back to the classroom even with high incidents rates. Static ventilation patterns do not consider the individual situation for a particular class. Influencing factors like the type of activity, the physical structure or the room occupancy are not incorporated. Also, existing devices are rather expensive and often provide only limited information and only locally without any networking. This leaves the potential of analysing the situation across different settings untapped. Carbon dioxide level can be used as an indicator of air quality, in general, and of aerosol load in particular. Since, according to the latest findings, SARS-CoV-2 can be transmitted primarily in the form of aerosols, carbon dioxide may be used as a proxy for the risk of a virus infection. Hence, schools could improve the indoor air quality and potentially reduce the infection risk if they actually had measuring devices available in the classroom. Our device supports schools in ventilation and it allows for collecting data over the Internet to enable a detailed data analysis and model generation. First deployments in schools at different levels were received very positively. A pilot installation with a larger data collection and analysis is underway.}, language = {en} } @inproceedings{ViehmannLimpertHofmannetal.2023, author = {Viehmann, Tarik and Limpert, Nicolas and Hofmann, Till and Henning, Mike and Ferrein, Alexander and Lakemeyer, Gerhard}, title = {Winning the RoboCup logistics league with visual servoing and centralized goal reasoning}, series = {RoboCup 2022: Robot World Cup XXV}, booktitle = {RoboCup 2022: Robot World Cup XXV}, editor = {Eguchi, Amy and Lau, Nuno and Paetzel-Pr{\"u}smann, Maike and Wanichanon, Thanapat}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-28468-7 (Print)}, doi = {https://doi.org/10.1007/978-3-031-28469-4_25}, pages = {300 -- 312}, year = {2023}, abstract = {The RoboCup Logistics League (RCLL) is a robotics competition in a production logistics scenario in the context of a Smart Factory. In the competition, a team of three robots needs to assemble products to fulfill various orders that are requested online during the game. This year, the Carologistics team was able to win the competition with a new approach to multi-agent coordination as well as significant changes to the robot's perception unit and a pragmatic network setup using the cellular network instead of WiFi. In this paper, we describe the major components of our approach with a focus on the changes compared to the last physical competition in 2019.}, language = {en} } @inproceedings{NeugebauerBrutschyMeyeretal.2014, author = {Neugebauer, Georg and Brutschy, Lucas and Meyer, Ulrike and Wetzel, Susanne}, title = {Privacy-preserving multi-party reconciliation secure in the malicious model}, series = {DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security}, booktitle = {DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security}, editor = {Garcia-Alfaro, Joaquin and Lioudakis, Georgios and Cuppens-Boulahia, Nora and Foley, Simon and Fitzgerald, William M.}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-642-54567-2 (Print)}, doi = {10.1007/978-3-642-54568-9_12}, pages = {178 -- 193}, year = {2014}, abstract = {The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case.}, language = {en} } @inproceedings{NethSchubaBrodkorbetal.2023, author = {Neth, Jannik and Schuba, Marko and Brodkorb, Karsten and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Digital forensics triage app for android}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, isbn = {9798400707728}, doi = {10.1145/3600160.3605017}, pages = {6 Seiten}, year = {2023}, abstract = {Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator - without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format.}, language = {en} } @inproceedings{ArndtConzenElsenetal.2023, author = {Arndt, Tobias and Conzen, Max and Elsen, Ingo and Ferrein, Alexander and Galla, Oskar and K{\"o}se, Hakan and Schiffer, Stefan and Tschesche, Matteo}, title = {Anomaly detection in the metal-textile industry for the reduction of the cognitive load of quality control workers}, series = {PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments}, booktitle = {PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments}, publisher = {ACM}, isbn = {9798400700699}, doi = {10.1145/3594806.3596558}, pages = {535 -- 542}, year = {2023}, abstract = {This paper presents an approach for reducing the cognitive load for humans working in quality control (QC) for production processes that adhere to the 6σ -methodology. While 100\% QC requires every part to be inspected, this task can be reduced when a human-in-the-loop QC process gets supported by an anomaly detection system that only presents those parts for manual inspection that have a significant likelihood of being defective. This approach shows good results when applied to image-based QC for metal textile products.}, language = {en} } @inproceedings{ZaehlTheisWolfetal.2023, author = {Z{\"a}hl, Philipp M. and Theis, Sabine and Wolf, Martin and K{\"o}hler, Klemens}, title = {Teamwork in software development and what personality has to do with it - an overview}, series = {Virtual, Augmented and Mixed Reality}, booktitle = {Virtual, Augmented and Mixed Reality}, editor = {Chen, Jessie Y. C. and Fragomeni, Gino}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-35633-9 (Print)}, doi = {10.1007/978-3-031-35634-6_10}, pages = {130 -- 153}, year = {2023}, abstract = {Due to the increasing complexity of software projects, software development is becoming more and more dependent on teams. The quality of this teamwork can vary depending on the team composition, as teams are always a combination of different skills and personality types. This paper aims to answer the question of how to describe a software development team and what influence the personality of the team members has on the team dynamics. For this purpose, a systematic literature review (n=48) and a literature search with the AI research assistant Elicit (n=20) were conducted. Result: A person's personality significantly shapes his or her thinking and actions, which in turn influences his or her behavior in software development teams. It has been shown that team performance and satisfaction can be strongly influenced by personality. The quality of communication and the likelihood of conflict can also be attributed to personality.}, language = {en} } @inproceedings{AlhaskirTschescheLinkeetal.2023, author = {Alhaskir, Mohamed and Tschesche, Matteo and Linke, Florian and Schriewer, Elisabeth and Weber, Yvonne and Wolking, Stefan and R{\"o}hrig, Rainer and Koch, Henner and Kutafina, Ekaterina}, title = {ECG matching: an approach to synchronize ECG datasets for data quality comparisons}, series = {Proceedings of the 68th Annual Meeting of the German Association of Medical Informatics, Biometry, and Epidemiology e.V. (gmds) 2023}, volume = {307}, booktitle = {Proceedings of the 68th Annual Meeting of the German Association of Medical Informatics, Biometry, and Epidemiology e.V. (gmds) 2023}, editor = {R{\"o}hrig, Rainer and Grabe, Niels and Haag, Martin and H{\"u}bner, Ursula and Sax, Ulrich and Schmidt, Carsten Oliver and Sedlmayr, Martin and Zapf, Antonia}, publisher = {IOS Press}, isbn = {978-1-64368-428-4 (Print)}, doi = {10.3233/SHTI230718}, pages = {225 -- 232}, year = {2023}, abstract = {Clinical assessment of newly developed sensors is important for ensuring their validity. Comparing recordings of emerging electrocardiography (ECG) systems to a reference ECG system requires accurate synchronization of data from both devices. Current methods can be inefficient and prone to errors. To address this issue, three algorithms are presented to synchronize two ECG time series from different recording systems: Binned R-peak Correlation, R-R Interval Correlation, and Average R-peak Distance. These algorithms reduce ECG data to their cyclic features, mitigating inefficiencies and minimizing discrepancies between different recording systems. We evaluate the performance of these algorithms using high-quality data and then assess their robustness after manipulating the R-peaks. Our results show that R-R Interval Correlation was the most efficient, whereas the Average R-peak Distance and Binned R-peak Correlation were more robust against noisy data.}, language = {en} }