Refine
Year of publication
Document Type
- Conference Proceeding (229)
- Bachelor Thesis (100)
- Article (99)
- Master's Thesis (34)
- Part of a Book (27)
- Report (20)
- Book (17)
- Part of Periodical (13)
- Contribution to a Periodical (8)
- Doctoral Thesis (7)
Language
- English (287)
- German (275)
- Multiple languages (4)
Keywords
- Hochschule Ruhr West (9)
- Zeitschrift (9)
- Fachhochschule (8)
- Mülheim an der Ruhr (8)
- Intergenerational Collaboration (3)
- Intergenerational Innovation (3)
- Sentiment Analysis (3)
- Usability (3)
- Automotive HMI (2)
- Digitalisierung (2)
Institute
- Fachbereich 1 - Institut Informatik (372)
- Fachbereich 4 - Institut Mess- und Senstortechnik (96)
- Fachbereich 2 - Wirtschaftsinstitut (54)
- Fachbereich 1 - Institut Energiesysteme und Energiewirtschaft (16)
- Fachbereich 3 - Institut Bauingenieurwesen (11)
- Fachbereich 3 - Institut Maschinenbau (5)
- Fachbereich 4 - Institut Naturwissenschaften (3)
Practical application of object detection systems, in research or industry, favors highly optimized black box solutions. We show how such a highly optimized system can be further augmented in terms of its reliability with only a minimal increase of computation times, i.e. preserving realtime boundaries. Our solution leaves the initial (HOG-based) detector unchanged and introduces novel concepts of non-linear metrics and fusion of ROIs. In this context we also introduce a novel way of combining feature vectors for mean-shift grouping. We evaluate our approach on a standarized image database with a HOG detector, which is representative for practical applications. Our results show that the amount of false-positive detections can be reduced by a factor of 4 with a negligable complexity increase. Although introduced and applied to a HOG-based system, our approach can easily be adapted for different detectors.
The Bitcoin whitepaper states that security of the system is guaranteed as long as honest miners control more than half of the current total computational power. The whitepaper assumes a static difficulty, thus it is equally hard to solve a cryptographic proof-of-work puzzle for any given moment of the system history. However, the real Bitcoin network is using an adaptive difficulty adjustment mechanism. In this paper we introduce and analyze a new kind of attack on a mining difficulty retargeting function used in Bitcoin. A malicious miner is increasing his mining profits from the attack, named coin-hopping attack, and, as a side effect, an average delay between blocks is increasing. We propose an alternative difficulty adjustment algorithm in order to reduce an incentive to perform coin-hopping, and also to improve stability of inter-block delays. Finally, we evaluate the presented approach and show that the novel algorithm performs better than the original algorithm of Bitcoin.
Web based security applications have become increasingly important in the past years. Especially in times of blockchain based crypto currencies, user authentication is a critical aspect for the overall security, integrity and acceptance of such systems. While blockchain technologies provide a decentralized approach, the client side still largely relies on centralized security approaches. Those centralized approaches are easier to implement, but at the same time bear the risk of usual security flaws. Therefore, this paper presents a decentralized approach for increasing the security by adding a decentralized two-factor authentication mechanism to the execution of
operations.
Detection of influential actors in social media plays an important role for increasing the quality and efficiency of work and services in many fields such as education, marketing, etc. This work aims to introduce a new approach for the characterization of influential actors in online social media, such as Twitter. We present on a model of influence of an actor that is based on the attractiveness of the actor in terms of the number of other new actors with which he or she has established relations over time. We have used this concept and measure of influence to determine optimal seeds in a simulation of influence maximization using two empirically collected social networks for the underlying graphs.
Industry 4.0 is known as the fourth industrial revolution which refers to the integration of technologies that make the factories interoperable by seamlessly connecting machines, employees and sensors for communication. In Industry 4.0, one of the key features is the use of new technologies to recognize the current context. Thus, the employees are supported with contextual information for speeding up decision-making during various processes related to planning, production, maintenance, etc. As a contribution to this area, the work described here aims to introduce a cyber-physical system (CPS) approach to provide context-based and intelligent support to employees in heavy industries using new technologies, especially in the field of mobile devices. In this work, mobile device sensors and image processing techniques are used to recognize the context which requires specific support. In addition, new scenarios and associated processes are developed to support the employees on the basis of new, flexible, adaptive and mobile technologies.
To enable a robotic assistant to autonomously reach for and transport objects while avoiding obstacles we have generalized the attractor dynamics approach established for vehicles to trajectory formation in robot arms. This approach is able to deal with the time-varying environments that occur when a human operator moves in a shared workspace. Stable fixed points (attractors) for the heading direction of the end-effector shift during movement and are being tracked by the system. This enables the attractor dynamics approach to avoid the spurious states that hamper potential field methods. Separating planning and control computationally, the approach is also simpler to implement. The stability properties of the movement plan make it possible to deal with fluctuating and imprecise sensory information. We implement this approach on a seven degree of freedom anthropomorphic arm reaching for objects on a working surface. We use an exact solution of the inverse kinematics, which enables us to steer the spatial position of the elbow clear of obstacles. The straight-line trajectories of the end-effector that emerge as long as the arm is far from obstacles make the movement goals of the robotic assistant predictable for the human operator, improving man-machine interaction
For any kind of assistant systems, the ability to interact with the human operator and taking into account his or her assumptions and expectations, is the basis for a reasonable behavior. As a consequence the human behavior have to be studied in order to generate driver models that are learned from human driving data. In this work we focus on the improvement of the immersion in driving simulation environment by developing and implementing a cheap and efficient method for head tracking. We also explain why head tracking feedback is crucial for the quality of collected behavioural data, especially for simulators with close screen distances.
In this paper we present an approach for contextual big data analytics in social networks, particularly in Twitter. The combination of a Rich Context Model (RCM) with machine learning is used in order to improve the quality of the data mining techniques. We propose the algorithm and architecture of our approach for real-time contextual analysis of tweets. The proposed approach can be used to enrich and empower the predictive analytics or to provide relevant context-aware recommendations.
Die transurethrale Resektion der Prostata (TUR-P) ist der Gold Standard für die endoskopisch-chirurgische Behandlung der Benignen Prostatahyperplasie (BPH). Unbekannt ist jedoch, ob bei der bipolaren TUR-P die Möglichkeit von elektrothermischen Verletzung von benachbar-
tem nichtopertiertem Gewebe besteht. Grund hierfür könnten höhere Ausgangsleistungen der Chirurgie-Generatoren sein. Deshalb werden experimentell gemessene Werte der räumlichen Verlustleistungsdichte um ein bipolares Resektoskop als Quellterm für die Berechnung der Temperaturänderung im operationsnahen Gewebe verwendet. Die Temperaturberechnung basiert auf der numerischen Lösung der Wärmeleitungsgleichung nach Penne. Für die gewählten Randbedingungen und Eingabeparameter sind keine signifikanten Temperaturerhöhungen im Berechnungsgebiet am proximalen Ende des Resektoskop-Schaftes festzustellen. Um ein umfassendes Verständnis zu gewinnen sollen weiterführende Untersuchungen mit einer Variation der Randbedingungen und Eingabeparameter durchgeführt werden.
The term “Cloud Computing” does not primarily specify new types of core technologies but rather addresses features to do with integration, interoperability and accessibility. Although not new, virtualization and automation are core features that characterize Cloud Computing. In this paper, we intend to explore the possibility of integrating cloud services with educational scenarios without re-defining neither the technology nor the usage scenarios from scratch. Our suggestion is based on certain solutions that have already been implemented and tested for specific cases.
It is common to have a large noise and/or a strong interference around the frequency band of a Power Line Communication (PLC) system due to the fact that the PLC channel is not designed for communication. If there are no efficient operations at the receiver to suppress this out-of-band noise and interference to some extent, the Signal-to-Noise Ratio (SNR) will decrease and system will suffer performance loss consequently. Normally, the effort of Analog Front End (AFE) on the suppression of out-of-band interference is finite and it is uneconomic to change the AFE structure to make a performance improvement. Therefore, an appropriate structure of Digital Front End (DFE) at the receiver is necessary to reduce the impact of out-of-band noise and interference furthermore. In this paper, three different kinds of DFE structure at the receiver are introduced: classic DFE, time domain Nyquist windowing and Equivalent Complex Baseband (ECB) approach. The performance of these DFE structures is compared, not only from the aspect of out-of-band suppression, but also from the system overhead they need.
In recent years, hardware for the production and consumption of virtual reality content has reached level of prices that make it affordable to everyone. Accordingly schools and universities are showing increased interest in implementations of virtual reality technologies for supporting their innovative educational activities. Hence, this paper presents a flexible architecture for supporting the development of virtual reality learning scenarios conveniently deployed for educational purposes. We also suggest an example of such
educational scenario for medical purposes deployable with the suggested architecture. In addition, we developed and used a questionnaire answered by 17 medical students in order to derive additional requirements for refining such scenarios. Then, we present these efforts while aiming at deployments usable also for additional domains. Finally, we summarize and mention aspects we will address
in our coming efforts while deploying such activities.
In this paper we describe an architecture for behavioral organization based on dynamical systems. This architecture
enables the generation of complex behavioral sequences, which is demonstrated using the example of approaching and
passing a door. The behavioral sequence is generated by activating and deactivating the elementary behaviors dependent
on sensory information and internal logical conditions. The architecture is demonstrated on a mobile KOALA robot and
in simulation as well.
In the field of magnetic inductance tomography,
signal processing is a real challenge. This is due to the divergent
nature of magnetic fields. The sensitivity, i.e. the change in the
receiving signal by means of an electrically conductive sample
in a measuring volume depends strongly on the positioning
of the sample. Objects that are located near the transmitting
or receiving coils are very well locatable, where objects in
larger distance are hard to detect. In this paper an approach
is presented that improves the topology of the magnetic fields
in the ”magnetic induction tomography” (MIT) by changing
geometric constructions and current patterns of coils so far,
as to allow a sharper localization of objects within the space.
The aim is to level the distribution of the sensitivity in the
measuring volume, so that electrically conductive objects with
a larger distance between transmitting and receiving unit can
be detected with almost the same signal intensity as objects
close to the transmitting and receiving unit. The simulation tool
Comsolic is used for the geometric modeling making a finite
element analysis (FEA). The subsequent signal processing and
analysis of the simulation results are implemented in Matlabic .
Within this FEA the coil geometries and current patterns are
changed numerically, so that the minimum object size, that is
still detectable, is, compared to the known MIT, reduced and the
sensitivity of the system is improved. To validate the simulation in
Comsolic , first simulation results are compared with analytical
models and analyses.