Conference Proceeding
Refine
Year of publication
Institute
- Fachbereich Elektrotechnik und Informationstechnik (234) (remove)
Language
- English (234) (remove)
Document Type
- Conference Proceeding (234) (remove)
Keywords
- Enterprise Architecture (5)
- Engineering education (2)
- Engineering optimization (2)
- MINLP (2)
- Machine Learning (2)
- Robotic Process Automation (2)
- Serious Game (2)
- Ventilation System (2)
- Water distribution system (2)
- autonomous driving (2)
- 3D object detection (1)
- Accuracy (1)
- Agile development (1)
- Agility (1)
- Android (1)
- Angle Sensor (1)
- Anomaly detection (1)
- Artificial Intelligence (1)
- Automation (1)
- Awareness (1)
- Building Automation (1)
- Business Engineering (1)
- Business Process (1)
- CDG (1)
- CO2 (1)
- Carbon Dioxide (1)
- Case Study (1)
- Case study (1)
- Competence Developing Game (1)
- Competence Developing Games (1)
- Computational modeling (1)
- Connected Automated Vehicle (1)
- Conpot (1)
- Control (1)
- Control engineering (1)
- Cooling system (1)
- Cryptographic protocols (1)
- Customer Orientation (1)
- DC machines (1)
- Data analysis (1)
- Data visualization (1)
- Datasets (1)
- Deep learning (1)
- Digital Age (1)
- Digital Twin Evolution (1)
- Digital transformation (1)
- Digital triage (1)
- Digital twin (1)
- Discrete Optimisation (1)
- Drinking Water Supply (1)
- Education (1)
- Efficiency (1)
- Efficiency optimization (1)
- Electrocardiography (1)
- Electronic learning (1)
- Elicit (1)
- Energy (1)
- Energy Disaggregation (1)
- Energy efficiency (1)
- Engineering optimisation (1)
- Experimental validation (1)
- FPGA (1)
- Frequency Doubler (1)
- Future Skills (1)
- GPU (1)
- Gamification (1)
- Graph Theory (1)
- Harmonic Radar (1)
- Heuristic algorithms (1)
- Home Assistant (1)
- Home Automation Platform (1)
- ICS (1)
- Image Database (1)
- Image Forensics (1)
- Implementation Case (1)
- Incremental Encoder (1)
- Industrial optimisation (1)
- Interdisciplinarity (1)
- LQR (1)
- Latin Hypercube Sampling (1)
- LiDAR (1)
- Literature review (1)
- Low voltage (1)
- MATLAB , MLPI , Motion control , Open Core , industrial drives , rapid control prototypin , sercos automation bus (1)
- MPC (1)
- Malicious model (1)
- Manifolds (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- Matlab (1)
- Minimum Risk Manoeuvre (1)
- Mixed-Integer Nonlinear Optimisation (1)
- Mixed-integer nonlinear programming (1)
- Mixed-integer programming (1)
- Mobile Phones (1)
- Monitoring (1)
- Mpc (1)
- Navigation (1)
- Network design (1)
- Neural networks (1)
- Next Generation Network (1)
- OR 2019 (1)
- Online services (1)
- Open Source (1)
- Operational Design Domain (1)
- Optimal Topology (1)
- Optimization (1)
- PPO (1)
- Path-following (1)
- Performance (1)
- Personality (1)
- Piecewise Linearization (1)
- Piecewise linearization (1)
- Player Types (1)
- Position Encoder (1)
- Power dissipation (1)
- Powertrain (1)
- Preface (1)
- Privacy-enhancing technologies (1)
- Process design (1)
- Process engineering (1)
- Process optimization (1)
- Process reference model (1)
- Prototype (1)
- Pump System (1)
- Quality control (1)
- Quantum Computing (1)
- Quantum Machine Learning (1)
- Reference Process Model (1)
- Reinforcement Learning (1)
- Rescue System (1)
- Research process (1)
- Resilience (1)
- Resilience Assessment (1)
- Resilience assessment (1)
- Resilience metric graph theory (1)
- Resilient infrastructure (1)
- Rotational Encoder (1)
- Rotatory Inverted Pendulum (1)
- Secure multi-party computation (1)
- Sensors comparison (1)
- Serious Games (1)
- Similarity Theory (1)
- Smart Building (1)
- Society (1)
- Software (1)
- Software Robots (1)
- Software packages (1)
- Solver Per- formance (1)
- Story (1)
- Stress testing (1)
- Subject-oriented Business Process Management (1)
- Sustainability (1)
- Synchronous machines (1)
- System Design Problem (1)
- TGA (1)
- Tag (1)
- Teamwork (1)
- Technical Operations Research (1)
- Telecommunication (1)
- Telecommunication Industry (1)
- Telecommunications Industry. (1)
- Text analytics (1)
- Text mining (1)
- Three-dimensional displays (1)
- Throughput (1)
- Time-series synchronization (1)
- Training (1)
- Transdisciplinarity (1)
- Transformation Project (1)
- Transformative Competencies (1)
- Transiton of Control (1)
- Transponder (1)
- Triage-app (1)
- V2X (1)
- Validation (1)
- Video Game (1)
- Water (1)
- Water Supply System (1)
- Water supply system (1)
- Wearable electronic device (1)
- Wiegand Effect (1)
- Zero-knowledge proofs (1)
- active learning (1)
- agile (1)
- anticipation strategy (1)
- business analytics (1)
- business simulation (1)
- competence developing games (1)
- cybersecurity (1)
- decision analytics (1)
- digital economy (1)
- do-it-yourself (1)
- eTOM (1)
- education (1)
- embedded hardware (1)
- enhanced Telecom Operations Map (eTOM) (1)
- fault detection (1)
- honeynet (1)
- honeypot (1)
- information systems (1)
- lab work (1)
- learning theories (1)
- mathematical optimization (1)
- metrological characterization (1)
- model-predictive control (1)
- motivation theories (1)
- passive inter-modulation (1)
- power integrity (1)
- professional skills (1)
- requirements (1)
- sensor networks (1)
- signal integrity (1)
- software engineering (1)
- systematic literature review (1)
- tablet game (1)
- water supply system (1)
Clinical assessment of newly developed sensors is important for ensuring their validity. Comparing recordings of emerging electrocardiography (ECG) systems to a reference ECG system requires accurate synchronization of data from both devices. Current methods can be inefficient and prone to errors. To address this issue, three algorithms are presented to synchronize two ECG time series from different recording systems: Binned R-peak Correlation, R-R Interval Correlation, and Average R-peak Distance. These algorithms reduce ECG data to their cyclic features, mitigating inefficiencies and minimizing discrepancies between different recording systems. We evaluate the performance of these algorithms using high-quality data and then assess their robustness after manipulating the R-peaks. Our results show that R-R Interval Correlation was the most efficient, whereas the Average R-peak Distance and Binned R-peak Correlation were more robust against noisy data.
The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case.
The RoboCup Logistics League (RCLL) is a robotics competition in a production logistics scenario in the context of a Smart Factory. In the competition, a team of three robots needs to assemble products to fulfill various orders that are requested online during the game. This year, the Carologistics team was able to win the competition with a new approach to multi-agent coordination as well as significant changes to the robot’s perception unit and a pragmatic network setup using the cellular network instead of WiFi. In this paper, we describe the major components of our approach with a focus on the changes compared to the last physical competition in 2019.
Due to the increasing complexity of software projects, software development is becoming more and more dependent on teams. The quality of this teamwork can vary depending on the team composition, as teams are always a combination of different skills and personality types. This paper aims to answer the question of how to describe a software development team and what influence the personality of the team members has on the team dynamics. For this purpose, a systematic literature review (n=48) and a literature search with the AI research assistant Elicit (n=20) were conducted. Result: A person’s personality significantly shapes his or her thinking and actions, which in turn influences his or her behavior in software development teams. It has been shown that team performance and satisfaction can be strongly influenced by personality. The quality of communication and the likelihood of conflict can also be attributed to personality.
This paper presents an approach for reducing the cognitive load for humans working in quality control (QC) for production processes that adhere to the 6σ -methodology. While 100% QC requires every part to be inspected, this task can be reduced when a human-in-the-loop QC process gets supported by an anomaly detection system that only presents those parts for manual inspection that have a significant likelihood of being defective. This approach shows good results when applied to image-based QC for metal textile products.
Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator – without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format.
KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys.
Nowadays, the most employed devices for recoding videos or capturing images are undoubtedly the smartphones. Our work investigates the application of source camera identification on mobile phones. We present a dataset entirely collected by mobile phones. The dataset contains both still images and videos collected by 67 different smartphones. Part of the images consists in photos of uniform backgrounds, especially collected for the computation of the RSPN. Identifying the source camera given a video is particularly challenging due to the strong video compression. The experiments reported in this paper, show the large variation in performance when testing an highly accurate technique on still images and videos.
Modern implementations of driver assistance systems are evolving from a pure driver assistance to a independently acting automation system. Still these systems are not covering the full vehicle usage range, also called operational design domain, which require the human driver as fall-back mechanism. Transition of control and potential minimum risk manoeuvres are currently research topics and will bridge the gap until full autonomous vehicles are available. The authors showed in a demonstration that the transition of control mechanisms can be further improved by usage of communication technology. Receiving the incident type and position information by usage of standardised vehicle to everything (V2X) messages can improve the driver safety and comfort level. The connected and automated vehicle’s software framework can take this information to plan areas where the driver should take back control by initiating a transition of control which can be followed by a minimum risk manoeuvre in case of an unresponsive driver. This transition of control has been implemented in a test vehicle and was presented to the public during the IEEE IV2022 (IEEE Intelligent Vehicle Symposium) in Aachen, Germany.
The work in modern open-pit and underground mines requires the transportation of large amounts of resources between fixed points. The navigation to these fixed points is a repetitive task that can be automated. The challenge in automating the navigation of vehicles commonly used in mines is the systemic properties of such vehicles. Many mining vehicles, such as the one we have used in the research for this paper, use steering systems with an articulated joint bending the vehicle’s drive axis to change its course and a hydraulic drive system to actuate axial drive components or the movements of tippers if available. To address the difficulties of controlling such a vehicle, we present a model-predictive approach for controlling the vehicle. While the control optimisation based on a parallel error minimisation of the predicted state has already been established in the past, we provide insight into the design and implementation of an MPC for an articulated mining vehicle and show the results of real-world experiments in an open-pit mine environment.