Refine
Year of publication
Document Type
- Conference Proceeding (229)
- Bachelor Thesis (101)
- Article (99)
- Master's Thesis (34)
- Part of a Book (27)
- Report (20)
- Book (17)
- Part of Periodical (13)
- Contribution to a Periodical (8)
- Doctoral Thesis (7)
Language
- English (287)
- German (276)
- Multiple languages (4)
Keywords
- Hochschule Ruhr West (9)
- Zeitschrift (9)
- Fachhochschule (8)
- Mülheim an der Ruhr (8)
- Intergenerational Collaboration (3)
- Intergenerational Innovation (3)
- Sentiment Analysis (3)
- Usability (3)
- Automotive HMI (2)
- Digitalisierung (2)
Institute
- Fachbereich 1 - Institut Informatik (372)
- Fachbereich 4 - Institut Mess- und Senstortechnik (96)
- Fachbereich 2 - Wirtschaftsinstitut (55)
- Fachbereich 1 - Institut Energiesysteme und Energiewirtschaft (16)
- Fachbereich 3 - Institut Bauingenieurwesen (11)
- Fachbereich 3 - Institut Maschinenbau (5)
- Fachbereich 4 - Institut Naturwissenschaften (3)
In recent times, a lot of attacks against central server infrastructures have been recognized. Those infrastructures have seen attacks ranging from attacks against Internt of Things (IoT) infrastructures, via attacks against public infrastructure to attacks against cryptocurrency exchanges and blockchain based infrastructures themselves, e.g., the already almost legendary Decentralized Autonomous Organization (DAO) hack. Measured by press coverage, attacks against cryptocurrency exchanges and infrastructures seem to be among the most prominently reported attacks, probably due to the large amount of money that is stolen during those attacks and the great (but obviously still quite risky) potential (and financial involvement) of the blockchain technology. Naturally, attacks like the ones we have seen recently in crease the notion of uncertainty of blockchain technologies among the people,mreflected in lower values of cryptocurrencies in general. Obviously, this demands for an overall increase of security of cryptocurrency based technologies. Therefore, this paper provides an architectural approach, based on a proxy,to increase security of publicly available nodes of a blockchain based technology. Furthermore, it provides a first evaluation of the approach based on the results of an extensive community test of a new cryptocurrency.
Integrating Social Networking Sites in Day-to-Day Learning Scenarios - A Facebook Based Approach
(2012)
In recent years, the number of users in social networking sites regularly increased. Especially younger people spend a tremendous time on social networking sites like Facebook, YouTube, Flickr, Google+ and many more. Since obviously this is the place on the World-Wide-Web where our students spent their spare time, we integrated social networking sites in our day-to-day learning scenarios. This is on the one hand to start working with our students where they feel comfortable, and on the other hand to allow to foster the communication among our students about the topic of the lectures.
While more and more nuclear installations facing the end of their lifetime, decommissioning financing issues gain importance in political discussions.
The financing needs are huge along the Uranium value chain. Following the polluter pays principle the operator of a nuclear installation is expected to accumulate all the necessary decommissioning funds during the operating life of its facility. However, since decommissioning experience is still limited,
since the decommissioning process can take several decades and since the time
period between the shutdown of a nuclear installation and the final disposal of radioactive waste can be very long, there are substantial risks that costs will be underestimated and that the liable party and the funds accumulated might
not be available anymore when decommissioning activities have to be paid.
Nevertheless, these financing risks can be reduced by the implementation of transparent, restricted, well-governed decommissioning financing schemes, with a system of checks and balances that aims at avoiding negative effects
stemming from conflicts of interests.
Wissensmanagement (WM) und IT-gestütztes Lernen sind gerade in kleinen Behörden der Öffentlichen Verwaltung (ÖV), wie z.B. in ländlichen
Gemeinden, noch ausbaufähig. Am Beispiel des EU-Projekts EAGLE werden
Projektergebnisse als Verbesserungsansätze für ein arbeitsprozessorientiertes, IT-gestütztes Lernen vorgestellt. Neuartige Plattform-Features und ihr ÖV-spezifischer Nutzen werden erläutert. Die Ergebnisse der Plattformvalidierung werden vorgestellt. Ferner werden Vorschläge gemacht, wie die Ergebnisse aus EAGLE mit WM und weiteren Wissensquellen der ÖV, wie z.B. der Registratur, zu einem Gesamtkonzept mit bereits vorhandenen Fortbildungs- und WM-Ansätzen verbunden werden können.
Magnetisch-induktive Techniken finden seit langer Zeit viele Anwendungsfelder in der Medizin, Sicherheitstechnik und der Industrie. Obwohl die technischen Grundlagen seit vielen Jahrzehnten bekannt sind, werden auf Basis detaillierter Analysen spezielle Lösungsansätze verfolgt, die neuartiges Anwendungspotential erschließen sollen. Dazu dienen verbesserte Werkzeuge wie Computersimulationen und analytische Berechnungen sowie neu kombinierte Methoden und Aufbauten aus Leistungselektronik und Signaldetektion. Die Vorteile magnetisch-induktiver Techniken sind dabei u.a., dass sie das Prüfobjekt nicht schädigen, berührungslos arbeiten, robust gegenüber Verschmutzungen und einfach im Aufbau sind. Ein Nachteil dieser Technik ist die unzureichende Auflösung von feinen Strukturen. In der aktuellen Forschung und Entwicklung werden unterschiedliche Spulenanordnungen zur Anwendung in industriellen und medizinischen Fragestellungen untersucht und optimiert. Thema dieser Arbeit ist es, durch Verbesserung der Spuleneigenschaften, neue Anwendungsbereiche für die zerstörungsfreie Materialprüfung zu erschließen. Es wird eine Methode vorgestellt, die Eigenschaften magnetisch-induktiver Tastspulen zu verbessern und so den Aufwand bei der Signalverarbeitung zur Rekonstruktion im Rechner zu reduzieren sowie die Auflösung zu erhöhen. Dazu werden zwei Spulenanordnungen, Transmissions -Tastspulen und Gradiometer - Tastspulen, vergleichend
gegenübergestellt und ihre technischen Grenzen aufgezeigt.
Simulated reality environment incorporating humans and physically plausible behaving robots, providing natural interaction channels, with the option to link simulator to real perception and motion, is gaining importance for the development of cognitive, intuitive interacting and collaborating robotic systems. In the present work we introduce a head tracking system which is utilized to incorporate human ego motion in simulated environment improving immersion in the context of human-robot collaborative tasks.
Autonomous robots with limited computational capacity call for control approaches that generate meaningful, goal-directed behavior without using a large amount of resources. The attractor dynamics approach to movement generation is a framework that links sensor data to motor commands via coupled dynamical systems that have attractors at behaviorally desired states. The low computational demands leave enough system resources for higher level function like forming a sequence of local goals to reach a distant one. The comparatively high performance of local behavior generation allows the global planning to be relatively simple. In the present paper, we apply this approach to generate walking trajectories for a small humanoid robot, the Aldebaran Nao, that are goal-directed and avoid obstacles. The sensor information is a single camera in the head of the robot. The limited field of vision is compensated by head movements. The design of the dynamical system for motion generation and the choice of state variable makes a computationally expensive scene representation or local map building unnecessary.
In the presented work we compare machine learning techniques in the context of lane change behavior performed by humans in a semi-naturalistic simulated environment. We evaluate different learning approaches using differing feature combinations in order to identify appropriate feature, best feature combination, and the most appropriate machine learning technique for the described task. Based on the data acquired from human drivers in the traffic simulator NISYS TRS 1 , we trained a recurrent neural network, a feed forward neural network and a set of support vector machines. In the followed test drives the system was able to predict lane changes up to 1.5 sec in beforehand.
Practical application of object detection systems, in research or industry, favors highly optimized black box solutions. We show how such a highly optimized system can be further augmented in terms of its reliability with only a minimal increase of computation times, i.e. preserving realtime boundaries. Our solution leaves the initial (HOG-based) detector unchanged and introduces novel concepts of non-linear metrics and fusion of ROIs. In this context we also introduce a novel way of combining feature vectors for mean-shift grouping. We evaluate our approach on a standarized image database with a HOG detector, which is representative for practical applications. Our results show that the amount of false-positive detections can be reduced by a factor of 4 with a negligable complexity increase. Although introduced and applied to a HOG-based system, our approach can easily be adapted for different detectors.
The Bitcoin whitepaper states that security of the system is guaranteed as long as honest miners control more than half of the current total computational power. The whitepaper assumes a static difficulty, thus it is equally hard to solve a cryptographic proof-of-work puzzle for any given moment of the system history. However, the real Bitcoin network is using an adaptive difficulty adjustment mechanism. In this paper we introduce and analyze a new kind of attack on a mining difficulty retargeting function used in Bitcoin. A malicious miner is increasing his mining profits from the attack, named coin-hopping attack, and, as a side effect, an average delay between blocks is increasing. We propose an alternative difficulty adjustment algorithm in order to reduce an incentive to perform coin-hopping, and also to improve stability of inter-block delays. Finally, we evaluate the presented approach and show that the novel algorithm performs better than the original algorithm of Bitcoin.
Web based security applications have become increasingly important in the past years. Especially in times of blockchain based crypto currencies, user authentication is a critical aspect for the overall security, integrity and acceptance of such systems. While blockchain technologies provide a decentralized approach, the client side still largely relies on centralized security approaches. Those centralized approaches are easier to implement, but at the same time bear the risk of usual security flaws. Therefore, this paper presents a decentralized approach for increasing the security by adding a decentralized two-factor authentication mechanism to the execution of
operations.
Detection of influential actors in social media plays an important role for increasing the quality and efficiency of work and services in many fields such as education, marketing, etc. This work aims to introduce a new approach for the characterization of influential actors in online social media, such as Twitter. We present on a model of influence of an actor that is based on the attractiveness of the actor in terms of the number of other new actors with which he or she has established relations over time. We have used this concept and measure of influence to determine optimal seeds in a simulation of influence maximization using two empirically collected social networks for the underlying graphs.
Industry 4.0 is known as the fourth industrial revolution which refers to the integration of technologies that make the factories interoperable by seamlessly connecting machines, employees and sensors for communication. In Industry 4.0, one of the key features is the use of new technologies to recognize the current context. Thus, the employees are supported with contextual information for speeding up decision-making during various processes related to planning, production, maintenance, etc. As a contribution to this area, the work described here aims to introduce a cyber-physical system (CPS) approach to provide context-based and intelligent support to employees in heavy industries using new technologies, especially in the field of mobile devices. In this work, mobile device sensors and image processing techniques are used to recognize the context which requires specific support. In addition, new scenarios and associated processes are developed to support the employees on the basis of new, flexible, adaptive and mobile technologies.
To enable a robotic assistant to autonomously reach for and transport objects while avoiding obstacles we have generalized the attractor dynamics approach established for vehicles to trajectory formation in robot arms. This approach is able to deal with the time-varying environments that occur when a human operator moves in a shared workspace. Stable fixed points (attractors) for the heading direction of the end-effector shift during movement and are being tracked by the system. This enables the attractor dynamics approach to avoid the spurious states that hamper potential field methods. Separating planning and control computationally, the approach is also simpler to implement. The stability properties of the movement plan make it possible to deal with fluctuating and imprecise sensory information. We implement this approach on a seven degree of freedom anthropomorphic arm reaching for objects on a working surface. We use an exact solution of the inverse kinematics, which enables us to steer the spatial position of the elbow clear of obstacles. The straight-line trajectories of the end-effector that emerge as long as the arm is far from obstacles make the movement goals of the robotic assistant predictable for the human operator, improving man-machine interaction