004 Informatik
Refine
Year of publication
- 2017 (16) (remove)
Document Type
- Conference Proceeding (9)
- Article (6)
- Report (1)
Is part of the Bibliography
- no (16)
Keywords
Institute
Automotive user interfaces and, in particular, automated vehicle technology pose a plenty of challenges to researchers, vehicle manufacturers, and third-party suppliers to support all diverse facets of user needs. To give an example, they emerge from the variation of different user groups ranging from inexperienced, thrill-seeking young novice drivers to elderly drivers with all their natural limitations. To allow assessing the quality of automotive user interfaces and automated driving technology already during development and within virtual test processes, the proposed workshop is dedicated to the quest of finding objective, quantifiable quality criteria for describing future driving experiences. The workshop is intended for HCI, AutomotiveUI, and "Human Factors" researchers and practitioners as well for designers and developers. In adherence to the conference main topic "Spielend einfach interagieren" this workshop calls in particular for contributions in the area of human factors and ergonomics (user acceptance, trust, user experience, driving fun, natural user interfaces etc.) and artificial intelligence (predictive HMIs, adaptive systems, intuitive interaction).
Das CameraFramework wurde entwickelt, um mittels Socket-Kommunikation [1] als Middleware zwischen verschiedenen Kamerainstanzen mit eigenen Kameratreibern und Clienten zu fungieren. Über diesen Kommunikationsweg ist es möglich Clienten nicht nur lokal, sondern auch über das Netzwerk mit Kameradaten zu versorgen. Um neue Kameras mit dem Framework nutzen zu können, muss die Implementierung gewissen Regeln folgen, was durch ein vorgegebenes Basis-Interface (abstrakte Basis-Klasse in C++ [2]) fast vollständig sichergestellt ist. Neue Kameras werden zur Laufzeit über dynamische Bibliotheken geladen. Parameter für Kameras sind über ein XML-File [3] einzustellen. Funktionen zur Übergabe von neuen Kameradaten sind implementiert und müssen durch den Entwickler der einzelnen Kamerainterfaces aufgerufen werden.
Die Zuordnung von Kameradaten zum passenden Nutzer übernimmt das Framework. Jeder Clienterhält seinen eigenen konfigurierbaren Ringbuffer [4] um unabhängig von anderen Nutzern und Kameras zu sein. Die Aufgaben des Frameworks sind auf verschiedene Module, wie in Abbildung 1 dargestellt, aufgeteilt.
Autonomous driving is one of the future visions in which many vehicle manufacturers are working with high pressure.
Nowadays, it is already supported partially by high-class vehicles. A completely autonomous journey is indeed the goal, but in cars for
the public road traffic still not available. Automatic lane keeping assistants, speed regulators as well as shield and obstacle detections
are parts or precursors on the way to completely autonomous driving.
The American vehicle manufacturer Tesla is not only known for its electric drive, but also for the fact that high-pressure work is carried out on the autonomous drive. Tesla is thus the only vehicle manufacturer to use its users as so-called beta testers for its assistance systems. The progress and the function of the currently available Model S in the field of assistance systems and autonomic driving is documented and described in this paper. It is shown how good or bad the test vehicle manages scenarios in normal road traffic situations
with the assistance systems, e.g. lane keeping assistant, speed control, lane change and distance assistant, and which scenarios can
not be managed by the vehicle itself.
Das kEFIR‐Projekt untersucht die praktische Anwendung von thermographischen Verfahren zur Analyse der strukturellen Integrität von Windkraftrotorblättern. Das Projekt entstand in Zusammenarbeit der Hochschule Ruhr West (HRW) mit der IQbis Consulting GmbH im Rahmen eines ZIM‐Förderprojekts des Bundesministeriums für Wirtschaft und Energie (BMWi). Hintergrund ist die zunehmende Anzahl von Windkraftanlagen (WKA) und der somit steigende Wartungsaufwand. Um einen reibungslosen Betrieb dieser Anlagen zu gewährleisten und damit den besonderen Anforderungen an die Verfügbarkeit energieerzeugender Anlagen sicherzustellen, ist ein Bedarf an qualitativ hochwertigen Fehleranalysesystemen für im Betrieb befindlicher WKA von besonderer Bedeutung. Erfahrungsgemäß ist der Zeitaufwand für diese Inspektionen mit aktuellen Mitteln sehr groß und wird üblicherweise mit mehreren Arbeitstagen kalkuliert. Die Reproduzierbarkeit der gewonnenen Daten ist bei den derzeitigen Methoden meist nicht gewährleistet. Um frühzeitig auf Instabilitäten oder Schäden in den Rotorblättern einer WKA aufmerksam zu werden, ist die Entwicklung eines schnellen und qualitativ hoch wertigen Fehleranalysesystems von zentraler Bedeutung. Ein Forschungsschwerpunkt in diesem Zusammenhang ist die Entwicklung von geeigneten bildgebenden und berührungslosen Verfahren, welche bei den Inspektionen eingesetzt werden können. Beispielsweise erlaubt der Einsatz thermographischer Sensoren eine Analyse nicht nur der Rotorblattoberfläche, sondern auch ihrer inneren Struktur. Weiterhin ist aufgrund des schnell wachsenden Marktes bei unbemannten Luftfahrzeugen, wie beispielsweise positionsstabiler Quatrocoptersysteme, eine zusätzliche Möglichkeit gegeben, die Inspektion von Windenergieanlagen mit Hilfe mobiler, kompakter und fliegender Analysesysteme zu unterstützen.
Anonymity-preserving Methods for Client-side Filtering in Position-based Collaboration Approaches
(2017)
In recent times, a lot of attacks against central server infrastructures have been recognized. Those infrastructures have seen attacks ranging from attacks against Internt of Things (IoT) infrastructures, via attacks against public infrastructure to attacks against cryptocurrency exchanges and blockchain based infrastructures themselves, e.g., the already almost legendary Decentralized Autonomous Organization (DAO) hack. Measured by press coverage, attacks against cryptocurrency exchanges and infrastructures seem to be among the most prominently reported attacks, probably due to the large amount of money that is stolen during those attacks and the great (but obviously still quite risky) potential (and financial involvement) of the blockchain technology. Naturally, attacks like the ones we have seen recently in crease the notion of uncertainty of blockchain technologies among the people,mreflected in lower values of cryptocurrencies in general. Obviously, this demands for an overall increase of security of cryptocurrency based technologies. Therefore, this paper provides an architectural approach, based on a proxy,to increase security of publicly available nodes of a blockchain based technology. Furthermore, it provides a first evaluation of the approach based on the results of an extensive community test of a new cryptocurrency.
Practical application of object detection systems, in research or industry, favors highly optimized black box solutions. We show how such a highly optimized system can be further augmented in terms of its reliability with only a minimal increase of computation times, i.e. preserving realtime boundaries. Our solution leaves the initial (HOG-based) detector unchanged and introduces novel concepts of non-linear metrics and fusion of ROIs. In this context we also introduce a novel way of combining feature vectors for mean-shift grouping. We evaluate our approach on a standarized image database with a HOG detector, which is representative for practical applications. Our results show that the amount of false-positive detections can be reduced by a factor of 4 with a negligable complexity increase. Although introduced and applied to a HOG-based system, our approach can easily be adapted for different detectors.
The Bitcoin whitepaper states that security of the system is guaranteed as long as honest miners control more than half of the current total computational power. The whitepaper assumes a static difficulty, thus it is equally hard to solve a cryptographic proof-of-work puzzle for any given moment of the system history. However, the real Bitcoin network is using an adaptive difficulty adjustment mechanism. In this paper we introduce and analyze a new kind of attack on a mining difficulty retargeting function used in Bitcoin. A malicious miner is increasing his mining profits from the attack, named coin-hopping attack, and, as a side effect, an average delay between blocks is increasing. We propose an alternative difficulty adjustment algorithm in order to reduce an incentive to perform coin-hopping, and also to improve stability of inter-block delays. Finally, we evaluate the presented approach and show that the novel algorithm performs better than the original algorithm of Bitcoin.