Refine
Year
Publication Type
- Part of a Book (119)
- Lecture (78)
- Article (66)
- Conference Proceeding (32)
- Book (20)
- Participation in a Norm (DIN, RFC etc.) (13)
- Report (1)
Language
- English (187)
- German (115)
- Multiple languages (27)
Has Fulltext
- no (329) (remove)
Keywords
- Photovoltaik, Solarstrom, Speicher (5)
- Cyber Security (4)
- Photovoltaik (3)
- Outdoor-EL (2)
- Photovoltaics (2)
- Solarstrom (2)
- Algorithm learning (1)
- Analysis (1)
- Author Keywords: Industrial robot, Automatic robot programming, SME, low volume, high variant, path planning, matching, machine vision (1)
- Batteries (1)
Faculty
- Elektrotechnik und Informatik (ETI) (329) (remove)
Strategies to Secure End-to-End Communication - And Their Application to SCTP-Based Communication
(2011)
Magnetic field sensors based on quantum mechanic effects are often
susceptible to misalignments of the magnetic field or need advanced
procedures to compensate for these. Also, the record breaking sensitivities reported for superconducting quantum interference devices and alkali vapor magnetometers come along with large and complex experimental setups. The nitrogen vacancy center in diamond can be used to design a simple, small, and robust sensor without employing microwave radiation. By using compressed nanodiamond particles, it is possible to eliminate the need of an alignment of the magnetic field and still obtain the absolute magnetic flux density in a single measurement. In order to demonstrate the capabilities of this approach, a centimeter-sized modified automotive demo board is employed as a complete sensor with a sensitivity of 78 µT/Wurzel Hz.
This document is a compilation of issues found since the publication of RFC 4960 in September 2007, based on experience with implementing, testing, and using the Stream Control Transmission Protocol (SCTP) along with the suggested fixes. This document provides deltas to RFC 4960 and is organized in a time-ordered way. The issues are listed in the order in which they were brought up. Because some text is changed several times, the last delta in the text is the one that should be applied. In addition to the deltas, a description of each problem and the details of the solution for each are also provided.
Additional Policies for the Partially Reliable Stream Control Transmission Protocol Extension
(2015)
packetdrill
(2017)
Automatic Classification of Left Ventricular Wall Segments in Small Animal Ultrasound Imaging.
(2014)
This paper deals with the issue of automating the
process of machine learning and analyzing bio-datasets. For this
a user-friendly website has been developed for the interaction
with the researchers. On this website it is possible to upload
datasets and to share them, if desired, with other scientists. The
uploaded data can also be analyzed by various methods and
functions. The signals inside these datasets can also be visualized.
Furthermore several algorithms have been implemented to create
machine learning models with the uploaded data. Based on these
generated models new data can be classified or calculated. For all
these applications the simplest possible handling was
implemented to make the website available to all interested
researchers.
WebRTC Data Channels
(2017)
A NEAT Way to Browse the Web
(2017)
Accurate self-localisation is a fundamental ability of any mobile robot. In Monte Carlo localisation, a probability distribution over a space of possible hypotheses accommodates the inherent uncertainty in the position estimate, whereas bounded-error localisation provides a region that is guaranteed to contain the robot. However, this guarantee is accompanied by a constant probability over the confined region and therefore the information yield may not be sufficient for certain practical applications. Four hybrid localisation algorithms are proposed, combining probabilistic filtering with non-linear bounded-error state estimation based on interval analysis. A forward-backward contractor and the Set Inverter via Interval Analysis are hybridised with a bootstrap filter and an unscented particle filter, respectively. The four algorithms are applied to global localisation of an underwater robot, using simulated distance measurements to distinguishable landmarks. As opposed to previous hybrid methods found in the literature, the bounded-error state estimate is not maintained throughout the whole estimation process. Instead, it is only computed once in the beginning, when solving the wake-up robot problem, and after kidnapping of the robot, which drastically reduces the computational cost when compared to the existing algorithms. It is shown that the novel algorithms can solve the wake-up robot problem as well as the kidnapped robot problem more accurately than the two conventional probabilistic filters.
Camera based path planning for low quantity - high variant manufacturing with industrial robots
(2019)
The acquisition costs for industrial robots have been steadily decreasing in past years. Nevertheless, they still face significant drawbacks in the required effort for the preparation of complex robot tasks which causes these systems to be rarely present so far in small and medium-sized enterprises (SME) that focus mainly on small volume, high variant manufacturing. In this paper, we propose a camera-based path planning framework that allows the fast preparation and execution of robot tasks in dynamic environments which leads to less planning overhead, fast program generation and reduced cost and hence overcomes the major impediments for the usage of industrial robots for automation in SMEs with focus on low volume and high variant manufacturing. The framework resolves existing problems in different steps. The exact position and orientation of the workpiece are determined from a 3D environment model scanned by an optical sensor. The so retrieved information is used to plan a collision-free path that meets the boundary conditions of the specific robot task. Experiments show the potential and effectiveness of the the framework presented here by evaluating a case study.
Sichere ABAP-Programmierung
(2009)
Technical and organizational steps are necessary to mitigate cyber threats and reduce risks. Human behavior is the last line of defense for many hospitals and is considered as equally important as technical security. Medical staff must be properly trained to perform such procedures. This paper presents the first qualitative, interdisciplinary research on how members of an intermediate care unit react to a cyberattack against their patient monitoring equipment. We conducted a simulation in a hospital training environment with 20 intensive care nurses. By the end of the experiment, 12 of the 20 participants realized the monitors’ incorrect behavior. We present a qualitative behavior analysis of high performing participants (HPP) and low performing participants (LPP). The HPP showed fewer signs of stress, were easier on their colleagues, and used analog systems more often than the LPP. With 40% of our participants not recognizing the attack, we see room for improvements through the use of proper tools and provision of adequate training to prepare staff for potential attacks in the future.
Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked.
Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs.
Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients.