Refine
Year of publication
Institute
- Fachbereich Elektrotechnik und Informationstechnik (1183) (remove)
Language
- English (717)
- German (465)
- Multiple languages (1)
Document Type
- Article (637)
- Conference Proceeding (302)
- Book (114)
- Part of a Book (64)
- Patent (17)
- Report (9)
- Other (8)
- Contribution to a Periodical (6)
- Course Material (6)
- Doctoral Thesis (6)
Keywords
- Multimediamarkt (7)
- Enterprise Architecture (5)
- MINLP (5)
- Engineering optimization (4)
- Gamification (4)
- Serious Game (4)
- Auslenkung (3)
- Digitale Transformation (3)
- Digitalisierung (3)
- Education (3)
Die Verbindung der Welten dressierter Elektronen und grenzenloser Kreativität bietet ein großes Potential; zum Beispiel bei modernen Skulpturen, deren Form sich durch Motoren verändern kann. An der FH Aachen wurde ein solches Projekt verwirklicht: Eine Matrix aus Holzkugeln kann Piktogramme anzeigen, aber auch mathematische Funktionen visualisieren. In diesem Artikel beschreiben wir die clevere Ansteuerung der Motoren.
K3 User Guide
(2000)
IT-Sicherheit im Automobil
(2014)
Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbehörden immer häufiger gegenüberstehen.
Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden
geführt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei müssen die Ermittler möglichst
schnell und gezielt erkennen können, ob eine App tatsächlich schadhaft manipuliert wurde, was
manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen
zwar bei der generellen Erkennung schadhafter Software, sind aber für die polizeiliche Praxis nicht
geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen berücksichtigt
und so für den Einsatz in der Strafverfolgung in Frage kommt.
RGB-D sensors such as the Microsoft Kinect or the Asus Xtion are inexpensive 3D sensors. A depth image is computed by calculating the distortion of a known infrared light (IR) pattern which is projected into the scene. While these sensors are great devices they have some limitations. The distance they can measure is limited and they suffer from reflection problems on transparent, shiny, or very matte and absorbing objects. If more than one RGB-D camera is used the IR patterns interfere with each other. This results in a massive loss of depth information. In this paper, we present a simple and powerful method to overcome these problems. We propose a stereo RGB-D camera system which uses the pros of RGB-D cameras and combine them with the pros of stereo camera systems. The idea is to utilize the IR images of each two sensors as a stereo pair to generate a depth map. The IR patterns emitted by IR projectors are exploited here to enhance the dense stereo matching even if the observed objects or surfaces are texture-less or transparent. The resulting disparity map is then fused with the depth map offered by the RGB-D sensor to fill the regions and the holes that appear because of interference, or due to transparent or reflective objects. Our results show that the density of depth information is increased especially for transparent, shiny or matte objects.
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
The adoption of the Digital Health Transformation is a tremendous paradigm change in health organizations, which is not a trivial process in reality. For that reason, in this chapter, it is proposed a methodology with the objective to generate a changing culture in healthcare organisations. Such a change culture is essential for the successful implementation of any supporting methods like Interactive Process Mining. It needs to incorporate (mostly) new ways of team-based and evidence-based approaches for solving structural problems in a digital healthcare environment.
Für viele Zwecke ist es nützlich, von einem technischen System ein mathematisches Modell zu haben. Für Systeme, die sich durch eine Verzögerung höherer Ordnung mit oder ohne Ausgleich beschreiben lassen, wird ein Identifizierungsverfahren vorgestellt, das aus gemessenen Zeitfunktionen die Bestimmung einer Übertragungsfunktion ermöglicht. Die Systeme werden dabei durch Testsignale erregt. Die Modellkoeffizienten werden dann mit Hilfe eines Integrationsverfahrens aus dem Testsignal und der Antwort des Systems auf dieses Testsignal bestimmt. Ein praktisches Beispiel zeigt die Leistungsfähigkeit des Verfahrens.
In addition to the technical content, modern courses at university should also teach professional skills to enhance the competencies of students towards their future work. The competency driven approach including technical as well as professional skills makes it necessary to find a suitable way for the integration into the corresponding module in a scalable and flexible manner. Agile development, for example, is essential for the development of modern systems and applications and makes use of dedicated professional skills of the team members, like structured group dynamics and communication, to enable the fast and reliable development. This paper presents an easy to integrate and flexible approach to integrate Scrum, an agile development method, into the lab of an existing module. Due to the different role models of Scrum the students have an individual learning success, gain valuable insight into modern system development and strengthen their communication and organization skills. The approach is implemented and evaluated in the module Vehicle Systems, but it can be transferred easily to other technical courses as well. The evaluation of the implementation considers feedback of all stakeholders, students, supervisor and lecturers, and monitors the observations during project lifetime.
The field of Cognitive Robotics aims at intelligent decision making of autonomous robots. It has matured over the last 25 or so years quite a bit. That is, a number of high-level control languages and architectures have emerged from the field. One concern in this regard is the action language GOLOG. GOLOG has been used in a rather large number of applications as a high-level control language ranging from intelligent service robots to soccer robots. For the lower level robot software, the Robot Operating System (ROS) has been around for more than a decade now and it has developed into the standard middleware for robot applications. ROS provides a large number of packages for standard tasks in robotics like localisation, navigation, and object recognition. Interestingly enough, only little work within ROS has gone into the high-level control of robots. In this paper, we describe our approach to marry the GOLOG action language with ROS. In particular, we present our architecture on inte grating golog++, which is based on the GOLOG dialect Readylog, with the Robot Operating System. With an example application on the Pepper service robot, we show how primitive actions can be easily mapped to the ROS ActionLib framework and present our control architecture in detail.
Innovation und Kommunikation
(2013)
Daten und Informationen sind die wichtigsten Ressourcen vieler Unternehmen und müssen daher entsprechend geschützt werden. Getrieben durch die erhöhte Vernetzung von Informationstechnologie, die höhere Offenheit infolge datengetriebener Dienstleistungen und eine starke Zunahme an Datenquellen, rücken die Gefahren von Informationsdiebstahl, -manipulation und -verlust in den Fokus von produzierenden Unternehmen. Auf dem Weg zum lern- und wandlungsfähigen Unternehmen kann dies zu einem großen Hindernis werden, da einerseits zu hohe Sicherheitsanforderungen neue Entwicklungen beschränken, andererseits wegen des Mangels an ausreichenden Informationssicherheitskonzepten Unternehmen weniger Innovationen wagen. Deshalb bedarf es individuell angepasster Konzepte für die Bereiche IT-Security, IT-Safety und Datenschutz für vernetzte Produkte, Produktion und Arbeitsplätze. Bei der Entwicklung und Durchsetzung dieser Konzepte steht der Faktor Mensch im Zentrum aller Überlegungen.
In diesem Kapitel wird dargestellt, wie der Faktor Mensch bei der Erstellung von Informationssicherheitskonzepten in verschiedenen Phasen zu beachten ist. Beginnend mit der Integration von Informationssystemen und damit verbundenen Sicherheitsmaßnahmen, über die Administration, bis hin zur Anwendung durch den Endnutzer, werden Methoden beschrieben, die den Menschen, verbunden mit seinem Mehrwert wie auch den Risiken, einschließen. Dabei werden sowohl Grundlagen aufgezeigt als auch Konzepte vorgestellt, mit denen Entscheider in der Unternehmens-IT Leitlinien für die Informationssicherheit festlegen können.
Information Channels
(2000)
Information and communication technology for integrated mobility concepts such as E-carsharing
(2015)
During the past decade attitude towards sharing things has changed extremely. Not just personal data is shared (e.g. in social networks) but also mobility. Together with the increased ecological awareness of the recent years, new mobility concepts have evolved. E-carsharing has become a symbol for these changes of attitude. The management of a shared car fleet, the energy management of electric mobility and the management of various carsharing users with individual likes and dislikes are just some of the major challenges of e-carsharing. Weaving it into integrated mobility concepts, this raises complexity even further. These challenges can only be overcome by an appropriate amount of well-shaped information available at the right place and time. In order to gather, process and share the required information, fleet cars have to be equipped with modern information and communication technology (ICT) and become so-called fully connected cars. Ensuring the usability of these ICT systems is another challenge that is often neglected, even though it is usability that makes carsharing comfortable, attractive and supports users’ new attitudes. By means of an integrated and consistent concept for human-machine interaction (HMI), the usability of such systems can be raised tremendously.
Recently, novel AI-based services have emerged in the consumer market. AI-based services can affect the way consumers take commercial decisions. Research on the influence of AI on commercial interactions is in its infancy. In this chapter, a framework creating a first overview of the influence of AI on commercial interactions is introduced. This framework summarizes the findings of comparing numerous customer journeys of novel AI-based services with corresponding non-AI equivalents.