Refine
H-BRS Bibliography
- yes (178)
Departments, institutes and facilities
- Fachbereich Informatik (178) (remove)
Document Type
- Article (79)
- Report (44)
- Conference Object (32)
- Part of a Book (8)
- Master's Thesis (7)
- Preprint (5)
- Book (monograph, edited volume) (1)
- Conference Proceedings (1)
- Working Paper (1)
Year of publication
Has Fulltext
- yes (178) (remove)
Keywords
- Robotik (6)
- Usable Security (5)
- Big Data Analysis (4)
- Machine Learning (4)
- Risk-based Authentication (4)
- Virtuelle Realität (4)
- computer vision (4)
- 802.11 (3)
- Cutting sticks-Problem (3)
- Knowledge Graphs (3)
- Perceptual Upright (3)
- Risk-based Authentication (RBA) (3)
- Teilsummenaufteilung (3)
- Virtual Reality (3)
- WiLD (3)
- 3D-Scanner (2)
- Artificial Intelligence (2)
- Authentication features (2)
- Bioinformatics (2)
- Computer Vision (2)
- Deep Learning (2)
- Forschungsbericht (2)
- GDPR (2)
- Gravitation (2)
- IEEE 802.11 (2)
- IEEE802.11 (2)
- Long-Distance WiFi (2)
- Mengenpartitionsproblem (2)
- Natural Language Processing (2)
- Object Detection (2)
- Password (2)
- Perception (2)
- Raumwahrnehmung (2)
- Ray Tracing (2)
- Transformers (2)
- Usable Security and Privacy (2)
- Verkehrssimulation (2)
- automated sensor-screening (2)
- biometrics (2)
- deep learning (2)
- domestic robots (2)
- haptics (2)
- robot competitions (2)
- robotics (2)
- security (2)
- semiconducting metal oxide gas sensor array (2)
- virtual reality (2)
- virtuelle Umgebungen (2)
- 0-1-Integer-Problem (1)
- 16S rRNA gene sequencing (1)
- 3D Segmentation (1)
- 3D navigation (1)
- 3D user interface (1)
- AI usage in sports (1)
- AML (1)
- API Documentation (1)
- AR (1)
- ARRs (1)
- Abstract Syntax Tree (1)
- Active Learning (1)
- Adaptive Behavior (1)
- Adaptive Case Management (1)
- Agents (1)
- Algorithmische Informationstheorie (1)
- Algorithms (1)
- Allgegenwärtige Spiele (1)
- Analyse (1)
- Apprenticeship Learning (1)
- Assistenzsystem (1)
- Aufrecht (1)
- Augmented Reality (1)
- Authentication (1)
- B-cell leukemia (1)
- BPMS (1)
- Bacteria, Anaerobic (1)
- Ball Tracking (1)
- Benchmark (1)
- Bildverarbeitung (1)
- Black-Box Optimization (1)
- Blockchain (1)
- Bond graph (1)
- Bounding box explanations (1)
- Bubble-Chart (1)
- CC (1)
- CEHL (1)
- Calibration (1)
- Camera selection (1)
- Camera view analysis (1)
- Centrifugation (1)
- Centrifuge (1)
- Cervical cancer screening (1)
- Cervicovaginal microbiome (1)
- Chaitin-Konstante (1)
- Change-Prozess (1)
- Chemical imaging (1)
- Chloroquine (1)
- Classification explanations (1)
- Cloud Computing (1)
- Code Generation (1)
- Codierung (1)
- Cognition (1)
- Collaboration/Cooperation (1)
- Colposcopy (1)
- Comparative Analysis (1)
- Complexity (1)
- Computer Graphics (1)
- Content Security Policies (1)
- Convexity (1)
- Created Gravity (1)
- Creative Commons (1)
- Cryptography (1)
- Current research information systems (1)
- Curriculum (1)
- Cutting sticks problem (1)
- CyberGlove (1)
- DCF (1)
- DNA extraction protocols (1)
- DNA profile (1)
- DOI (1)
- Data Protection Officer (1)
- Data Publication (1)
- DataCite (1)
- Database Management Systems (1)
- Datenbanksysteme (1)
- Declarative Process Modeling (1)
- Demonstration-based training (1)
- Developer Centered Security (1)
- Digital Ecosystem (1)
- Digital Object Identifier (1)
- Digitale Lehre (1)
- Digitaler Stress (1)
- Directed Acyclic Graph (1)
- Directional Antenna (1)
- Directional antennas (1)
- Disco (1)
- Domain-Specific Language (1)
- Domain-Specific Modeling Languages, (1)
- Domestic Robots (1)
- Drosophila (1)
- Dynamic Case Management (1)
- E-Health (1)
- ETV6-RUNX1 (1)
- Earth Observation (1)
- Ecosystem simulation (1)
- Edutainment (1)
- Electromagnetic Fields (1)
- Elephantiasis (1)
- Emotion (1)
- EnOcean (1)
- Entropy (1)
- Environmental Data (1)
- Eriodictyol (1)
- Erweiterte Realität (1)
- Evaluation (1)
- Evaluation als Kommunikationsanlass (1)
- Executive functions (1)
- Expert Interviews (1)
- Explainable Artificial Intelligence (XAI) (1)
- FDI (1)
- FIVIS (1)
- FOS: Computer and information sciences (1)
- FPGA (1)
- FS20 (1)
- Fahrradfahrsimulator (1)
- Fahrsimulator (1)
- Fault detection and isolation (1)
- Feedback (1)
- First-order frequency domain sensitivities (1)
- Five Factor Model (1)
- Flussnetz (1)
- Free-Space Loss (FSL) (1)
- Fuzzy Miner (1)
- GDDL (1)
- GLI (1)
- Gabor filters (1)
- Gefahrenprävention (1)
- Genomics (1)
- Genomics/methods (1)
- Gnu Linear Programming Kit (1)
- Gradient-based explanation methods (1)
- Graph Convolutional Neural Networks (1)
- Graph embeddings (1)
- Graph theory (1)
- Graphentheorie (1)
- Grasp Domain Definition Language (1)
- Grasp Planner (1)
- Grasping (1)
- Group behavior analysis (1)
- HDBR (1)
- HPV diagnostic (1)
- HSP70 (1)
- HSP90 (1)
- HTTP (1)
- Handzeichenerkennung (1)
- Header whitelisting (1)
- Healthcare logistics (1)
- Hochschulehre (1)
- Hochschullehre (1)
- HomeMatic (1)
- Hough Forests (1)
- Human orientation perception (1)
- Human-Centered Design (1)
- Human-Centered Robotics (1)
- Human-Computer-Interaction (HCI) (1)
- Humans (1)
- Hybrid models of engineering systems (1)
- Hybrid systems (1)
- Hydroxychloroquine (1)
- Hyper-parameter Tuning (1)
- ICF (1)
- ISO9999 (1)
- Image Classification (1)
- Immersive analytics (1)
- Implementation Challenges (1)
- Incremental bond graph (1)
- Inductive Visual Miner (1)
- Informations-, Kommunikations- und Medientechnologie (1)
- Instantaneous assignment (1)
- Instantiation (1)
- Instruction design (1)
- Interaction devices (1)
- Interactive Object Detection (1)
- Interaktion (1)
- Interference (1)
- Intermediaries (1)
- Interventionstudie (1)
- KNX (1)
- Knowledge Worker (1)
- Knowledge-intensive Process (1)
- Kollaboration/Kooperation (1)
- Kolmogorov-Komplexität (1)
- Kombinatorische Optimierung (1)
- Kompression und Zufälligkeit von Zeichenketten (1)
- Künstliche Gravitation (1)
- LAA (1)
- LBP (1)
- LDP (1)
- LOTUS Sensor Node (1)
- LP-Heuristik (1)
- LSTM (1)
- LTE-U (1)
- Lagerlogistik (1)
- Language Engineering (1)
- Large display interaction (1)
- Large-Scale Online Services (1)
- Learning and Adaptive Systems (1)
- Leg (1)
- Lehr-Lernpsychologie (1)
- Lernen (1)
- Lernumgebung (1)
- Lineare Programmierung (1)
- LoRa (1)
- LoRa receiver accuracy (1)
- Long-Term Autonomy (1)
- Longley-Rice (1)
- Longley-Rice Irregular Terrain Model (ITM) (1)
- Lymphedema (1)
- MAC (1)
- MBZ (1)
- MESD (1)
- METEOR score (1)
- MOX gas sensors (1)
- Malware (1)
- Markov Cluster Algorithm (1)
- Materialwissenschaften (1)
- Maximalflussproblem (1)
- Measurement (1)
- Mengenpartitionierungsproblem (1)
- Mensch-Computer-Interaktion (1)
- Mensch-Maschine-Kommunikation (1)
- Meteorological Data (1)
- Minimaler Schnitt (1)
- Mixed-Reality (MR) (1)
- Mobiler Roboter (1)
- Model-Driven Engineering (1)
- Molecular rotation (1)
- Multi-camera (1)
- Multi-object visualization (1)
- Multi-robot systems (1)
- Multimodal hyperspectral data (1)
- NGS (1)
- NLP (1)
- NP-Vollständigkeit (1)
- Naive physics (1)
- Navigation (1)
- Neuroscience (1)
- OCT (1)
- OCU (1)
- OER (1)
- Object Segmentation (1)
- Object detectors (1)
- Older adults (1)
- Open Educational Ressources (1)
- Open source software (1)
- OpenFlow (1)
- OpenStack (1)
- Operation Research (1)
- Optical Flow (1)
- Optimierungsproblem (1)
- Organic compounds and Functional groups (1)
- Out Of Distribution (OOD) data (1)
- Outer Space Research (1)
- PAD (1)
- PCR inhibitors (1)
- PHR (1)
- Part Segmentation (1)
- Path loss model (1)
- Path-Packing (1)
- Pattern recognition (1)
- Personal Health Record (1)
- Personality (1)
- Persönlichkeit (1)
- Persönlichkeitseigenschaften (1)
- Persönlichkeitsfaktor (1)
- Pervasive Gaming (1)
- Physical activity (1)
- Point Cloud Segmentation (1)
- Point Clouds (1)
- Poisson Disc Distribution (1)
- Privacy patterns (1)
- ProM (1)
- Process Automation (1)
- Process Mining (1)
- Process Models (1)
- Proof-of-Stake (1)
- Proof-of-Work (1)
- Propagation (1)
- Proximity (1)
- Prozessautomation (1)
- Psychology (1)
- Qualitative reasoning (1)
- Qualitätspakt Lehre (1)
- Quantitative analysis of explanations (1)
- Quantum mechanical methods (1)
- RGB-D (1)
- ROPOD (1)
- RSSI (1)
- Radfahren (1)
- Random number generator (1)
- RapidMiner (1)
- Re-authentication (1)
- Real-Time Image Processing (1)
- Recommender systems (1)
- Relative Energies (1)
- Rendering (1)
- Requirements Engineering (1)
- Robotic faults (1)
- Robotics (cs.RO) (1)
- Roleplaying Game (RPG) (1)
- Rollenspiel (1)
- Rollenspiele (1)
- Rucksackproblem (1)
- SAML (1)
- SARS-CoV-2 (1)
- SEMA (1)
- SMPA loop (1)
- SOAP (1)
- Saliency maps (1)
- Sanity checks for explaining detectors (1)
- Scale Tuning (1)
- Scene understanding through Deep Learning (1)
- School experiments (1)
- Secure Coding Practices (1)
- Segmentation (1)
- Semantic Segmentation (1)
- Semantic gap (1)
- Semantic search (1)
- Sensitivity matrix in symbolic form (1)
- Set partition problem (1)
- Side Channel Analysis (1)
- Silmitasertib (1)
- Simulation (1)
- Skin (1)
- Skin detection (1)
- Software Architecture (1)
- Software Framework (1)
- Software Supply Chain (1)
- Somatogravic Illusion (1)
- Spatio-Temporal (1)
- Spectral Analysis (1)
- Spectral Clustering (1)
- Spectroscopy (1)
- Spectrum occupancy (1)
- Spherical Treadmill (1)
- Studienverlauf (1)
- Supervised classification (1)
- TEL-AML1 (1)
- Task allocation (1)
- Teaching Quality Pact (1)
- Temporal constraints (1)
- Terrain rendering (1)
- Time extended assignment (1)
- TinyECC 2.0 (1)
- Token (1)
- Translocation (1)
- Two-Ray (1)
- Two-factor Authentication (1)
- U-NII band (1)
- UAV (1)
- UGV (1)
- USAR (1)
- Uncertainty Estimation (1)
- Unity (1)
- Unknown parameter degradation (1)
- User experience design (1)
- User-Centered Design (1)
- User-Computer Interface (1)
- User-centered privacy engineering (1)
- VR (1)
- VR-based systems (1)
- Valproic acid (1)
- Verkehrserziehung (1)
- Verkehrsnetz (1)
- Verkehrsnetzwerke (1)
- Vibrational microspectroscopy (1)
- View selection (1)
- Visual Computing (1)
- Wahrnehmung (1)
- Wang-tiles (1)
- Web (1)
- Weltraumforschung (1)
- Wi-Fi (1)
- WiFi (1)
- WiFi-based Long Distance (WiLD) (1)
- Wireless Sensor Network (1)
- Wireless backhaul (1)
- Workflow (1)
- Workflow Management (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- YAWL (1)
- Young adults (1)
- ZWave (1)
- Zentrifuge (1)
- ZigBee (1)
- accelerometer (1)
- adaptive trigger (1)
- analog/digital signal processing (1)
- analytical redundancy relation residuals (1)
- assistive robotics (1)
- assistive robots (1)
- authentication (1)
- automatic measurement validation (1)
- automatic music generation (1)
- automation of sample processing (1)
- automatisierte Netzwerkgenerierung (1)
- autonomous driving (1)
- averaged bond graph models (1)
- benchmarking (1)
- bicausal diagnostic Bond Graphs (1)
- binary classification (1)
- bioinformatics (1)
- bond graph modelling (1)
- bond graphs (1)
- bond-graph-based physical systems modelling (1)
- bootstrapping (1)
- building automation (1)
- built environment (1)
- camera (1)
- change process (1)
- closed kinematic chain (1)
- cognitive radio (1)
- collision (1)
- conformations (1)
- constraint relaxation (1)
- control (1)
- control architectures (1)
- controller design (1)
- convex optimization (1)
- convolutional neural networks (1)
- data analysis (1)
- data glove (1)
- database (1)
- database systems (1)
- degraded DNA (1)
- diagnostic bond graphs (1)
- differential algebraic equation systems (1)
- directional antennas (1)
- drugs (1)
- dynamics (1)
- e-Research (1)
- elite sports (1)
- employee privacy (1)
- energy (1)
- energy saving (1)
- evaluation as a mean to communication (1)
- explainable AI (1)
- external faults (1)
- extraction-linked bias (1)
- eye movement (1)
- eye tracking (1)
- facial expression recognition (1)
- factor analysis (1)
- failure prognostic (1)
- fault indicators (1)
- fault scenarios (1)
- fault detection (1)
- feature (1)
- fiducial marker (1)
- fingerprint (1)
- fitness-fatigue model (1)
- fixed causalities generation of analytical redundancy relations (1)
- forensic (1)
- foveated rendering (1)
- gaze (1)
- grasp motions (1)
- grasping (1)
- gravito-inertial force (1)
- head down bed rest (1)
- heart rate control (1)
- heart rate modeling (1)
- heart rate prediction (1)
- high degree of diagnostic coverage and reliability (1)
- high diagnostic coverage and reliability (1)
- high dynamic range resistance readout (1)
- high-throughput DNA sequencing (1)
- high-throughput sequencing (1)
- higher education (1)
- hospital environment (1)
- hospital-acquired infections (1)
- human microbiome (1)
- hybrid dynamics solver (1)
- hybrid system (1)
- ideal switches (1)
- image captioning (1)
- immersive Visualisierung (1)
- indicators calculation (1)
- industrial robots (1)
- informational self-determination (1)
- infrared pattern (1)
- instance segmentation (1)
- intelligente Agenten (1)
- intelligente virtuelle Agenten (1)
- interaction (1)
- interactive computer graphics (1)
- interference (1)
- isolation (1)
- knowledge graphs (1)
- large-high-resolution displays (1)
- latent class analysis (1)
- leaning-based interfaces (1)
- learning traces (1)
- load control (1)
- locomotion interface (1)
- long-distance 802.11 (1)
- long-distance modeling (1)
- massive parallel sequencing (1)
- mathematical modeling (1)
- mebendazole (1)
- mental models (1)
- microbial community structure (1)
- microbial ecology (1)
- microbiome (1)
- microbiome analyses (1)
- mixed reality (1)
- mobile manipulators (1)
- mobility assistance system (1)
- mode-dependent implicit state space model (1)
- mode-switching linear time-invariant models (1)
- model exchange (1)
- modelling methodology (1)
- motion capture (1)
- multi-channel power sourcing (1)
- multibody system (1)
- multibond graphs (1)
- music analysis (1)
- natural language processing (1)
- navigational search (1)
- near infrared (1)
- next generation sequencing (1)
- numerical computation of residuals (1)
- object detection (1)
- object-oriented modelling (1)
- open educational resources (OERs) (1)
- operation mode independent causalities (1)
- optical character recognition (1)
- optical coherence tomography (1)
- optical sensor (1)
- optical tracking (1)
- optimized geometries (1)
- parameter estimation (1)
- parameter sensitivity of residuals (1)
- perceived quality (1)
- perception of upright (1)
- performance modeling (1)
- performance prediction (1)
- person and object detection and recognition (1)
- phenomenological approaches (1)
- posture analysis (1)
- power electronic systems (1)
- predictive maintenance (1)
- prehensile motions (1)
- presentation attack detection (1)
- presentation attack detection (PAD) (1)
- prioritizable ranking (1)
- privacy at work (1)
- process (1)
- pseudo-random number generator (1)
- psychophysics (1)
- quantitative model-based fault detection (1)
- question answering (1)
- rapid prototyping tool (1)
- region of interest (1)
- reinforcement learning (1)
- remaining useful life (1)
- repeated trend projection (1)
- representation learning (1)
- residual bond graph sinks (1)
- residual sinks (1)
- reuse of indicators (1)
- road (1)
- robot behaviour model (1)
- robot control (1)
- robot dynamics (1)
- robot personalisation (1)
- robotic arm (1)
- robotic evaluation (1)
- routing (1)
- rural areas (1)
- scene-segmentation (1)
- scenes (1)
- semantic mapping (1)
- sensemaking (1)
- sensor resilience (1)
- short tandem repeat (1)
- simulation (1)
- simulation of fault scenarios (1)
- slope based signature (1)
- small molecule (1)
- software engineering (1)
- software-defined networking (1)
- space flight analog (1)
- spatial orientation (1)
- spatial updating (1)
- spectrum scan (1)
- spectrum sensing (1)
- speech understanding (1)
- spinal posture (1)
- static friction (1)
- structural equation modeling (1)
- subjective visual vertical (1)
- switched three-phase power inverter (1)
- system mode independent bond graph representation (1)
- task models (1)
- taxonomie (1)
- technology mapping (1)
- teleoperation (1)
- text detection (1)
- text localization (1)
- text mining (1)
- textual model description languages (1)
- time series analysis (1)
- tools for education (1)
- trace model (1)
- trace-based system (1)
- traffic sign detection (1)
- traffic sign localization (1)
- training monitoring (1)
- training performance relationship (1)
- transfer learning (1)
- true random number generator (1)
- uncertainties (1)
- usable privacy controls (1)
- user input (1)
- user interaction (1)
- user modelling (1)
- user study (1)
- vestibular system (1)
- vibration (1)
- visual attention (1)
- wearable sensor (1)
- wearable sensors (1)
- weight perception (1)
- wireless mesh networks (1)
- xorshift-generator (1)
Due to their user-friendliness and reliability, biometric systems have taken a central role in everyday digital identity management for all kinds of private, financial and governmental applications with increasing security requirements. A central security aspect of unsupervised biometric authentication systems is the presentation attack detection (PAD) mechanism, which defines the robustness to fake or altered biometric features. Artifacts like photos, artificial fingers, face masks and fake iris contact lenses are a general security threat for all biometric modalities. The Biometric Evaluation Center of the Institute of Safety and Security Research (ISF) at the University of Applied Sciences Bonn-Rhein-Sieg has specialized in the development of a near-infrared (NIR)-based contact-less detection technology that can distinguish between human skin and most artifact materials. This technology is highly adaptable and has already been successfully integrated into fingerprint scanners, face recognition devices and hand vein scanners. In this work, we introduce a cutting-edge, miniaturized near-infrared presentation attack detection (NIR-PAD) device. It includes an innovative signal processing chain and an integrated distance measurement feature to boost both reliability and resilience. We detail the device’s modular configuration and conceptual decisions, highlighting its suitability as a versatile platform for sensor fusion and seamless integration into future biometric systems. This paper elucidates the technological foundations and conceptual framework of the NIR-PAD reference platform, alongside an exploration of its potential applications and prospective enhancements.
During robot-assisted therapy, a robot typically needs to be partially or fully controlled by therapists, for instance using a Wizard-of-Oz protocol; this makes therapeutic sessions tedious to conduct, as therapists cannot fully focus on the interaction with the person under therapy. In this work, we develop a learning-based behaviour model that can be used to increase the autonomy of a robot’s decision-making process. We investigate reinforcement learning as a model training technique and compare different reward functions that consider a user’s engagement and activity performance. We also analyse various strategies that aim to make the learning process more tractable, namely i) behaviour model training with a learned user model, ii) policy transfer between user groups, and iii) policy learning from expert feedback. We demonstrate that policy transfer can significantly speed up the policy learning process, although the reward function has an important effect on the actions that a robot can choose. Although the main focus of this paper is the personalisation pipeline itself, we further evaluate the learned behaviour models in a small-scale real-world feasibility study in which six users participated in a sequence learning game with an assistive robot. The results of this study seem to suggest that learning from guidance may result in the most adequate policies in terms of increasing the engagement and game performance of users, but a large-scale user study is needed to verify the validity of that observation.
The European General Data Protection Regulation requires the implementation of Technical and Organizational Measures (TOMs) to reduce the risk of illegitimate processing of personal data. For these measures to be effective, they must be applied correctly by employees who process personal data under the authority of their organization. However, even data processing employees often have limited knowledge of data protection policies and regulations, which increases the likelihood of misconduct and privacy breaches. To lower the likelihood of unintentional privacy breaches, TOMs must be developed with employees’ needs, capabilities, and usability requirements in mind. To reduce implementation costs and help organizations and IT engineers with the implementation, privacy patterns have proven to be effective for this purpose. In this chapter, we introduce the privacy pattern Data Cart, which specifically helps to develop TOMs for data processing employees. Based on a user-centered design approach with employees from two public organizations in Germany, we present a concept that illustrates how Privacy by Design can be effectively implemented. Organizations, IT engineers, and researchers will gain insight on how to improve the usability of privacy-compliant tools for managing personal data.
Users should always play a central role in the development of (software) solutions. The human-centered design (HCD) process in the ISO 9241-210 standard proposes a procedure for systematically involving users. However, due to its abstraction level, the HCD process provides little guidance for how it should be implemented in practice. In this chapter, we propose three concrete practical methods that enable the reader to develop usable security and privacy (USP) solutions using the HCD process. This chapter equips the reader with the procedural knowledge and recommendations to: (1) derive mental models with regard to security and privacy, (2) analyze USP needs and privacy-related requirements, and (3) collect user characteristics on privacy and structure them by user group profiles and into privacy personas. Together, these approaches help to design measures for a user-friendly implementation of security and privacy measures based on a firm understanding of the key stakeholders.
Self-motion perception is a multi-sensory process that involves visual, vestibular, and other cues. When perception of self-motion is induced using only visual motion, vestibular cues indicate that the body remains stationary, which may bias an observer’s perception. When lowering the precision of the vestibular cue by for example, lying down or by adapting to microgravity, these biases may decrease, accompanied by a decrease in precision. To test this hypothesis, we used a move-to-target task in virtual reality. Astronauts and Earth-based controls were shown a target at a range of simulated distances. After the target disappeared, forward self-motion was induced by optic flow. Participants indicated when they thought they had arrived at the target’s previously seen location. Astronauts completed the task on Earth (supine and sitting upright) prior to space travel, early and late in space, and early and late after landing. Controls completed the experiment on Earth using a similar regime with a supine posture used to simulate being in space. While variability was similar across all conditions, the supine posture led to significantly higher gains (target distance/perceived travel distance) than the sitting posture for the astronauts pre-flight and early post-flight but not late post-flight. No difference was detected between the astronauts’ performance on Earth and onboard the ISS, indicating that judgments of traveled distance were largely unaffected by long-term exposure to microgravity. Overall, this constitutes mixed evidence as to whether non-visual cues to travel distance are integrated with relevant visual cues when self-motion is simulated using optic flow alone.
This work proposes a novel approach for probabilistic end-to-end all-sky imager-based nowcasting with horizons of up to 30 min using an ImageNet pre-trained deep neural network. The method involves a two-stage approach. First, a backbone model is trained to estimate the irradiance from all-sky imager (ASI) images. The model is then extended and retrained on image and parameter sequences for forecasting. An open access data set is used for training and evaluation. We investigated the impact of simultaneously considering global horizontal (GHI), direct normal (DNI), and diffuse horizontal irradiance (DHI) on training time and forecast performance as well as the effect of adding parameters describing the irradiance variability proposed in the literature. The backbone model estimates current GHI with an RMSE and MAE of 58.06 and 29.33 W m−2, respectively. When extended for forecasting, the model achieves an overall positive skill score reaching 18.6 % compared to a smart persistence forecast. Minor modifications to the deterministic backbone and forecasting models enables the architecture to output an asymmetrical probability distribution and reduces training time while leading to similar errors for the backbone models. Investigating the impact of variability parameters shows that they reduce training time but have no significant impact on the GHI forecasting performance for both deterministic and probabilistic forecasting while simultaneously forecasting GHI, DNI, and DHI reduces the forecast performance.
This paper presents the b-it-bots RoboCup@Work team and its current hardware and functional architecture for the KUKA youBot robot. We describe the underlying software framework and the developed capabilities required for operating in industrial environments including features such as reliable and precise navigation, flexible manipulation, robust object recognition and task planning. New developments include an approach to grasp vertical objects, placement of objects by considering the empty space on a workstation, and the process of porting our code to ROS2.
Neuromorphic computing aims to mimic the computational principles of the brain in silico and has motivated research into event-based vision and spiking neural networks (SNNs). Event cameras (ECs) capture local, independent changes in brightness, and offer superior power consumption, response latencies, and dynamic ranges compared to frame-based cameras. SNNs replicate neuronal dynamics observed in biological neurons and propagate information in sparse sequences of ”spikes”. Apart from biological fidelity, SNNs have demonstrated potential as an alternative to conventional artificial neural networks (ANNs), such as in reducing energy expenditure and inference time in visual classification. Although potentially beneficial for robotics, the novel event-driven and spike-based paradigms remain scarcely explored outside the domain of aerial robots.
To investigate the utility of brain-inspired sensing and data processing in a robotics application, we developed a neuromorphic approach to real-time, online obstacle avoidance on a manipulator with an onboard camera. Our approach adapts high-level trajectory plans with reactive maneuvers by processing emulated event data in a convolutional SNN, decoding neural activations into avoidance motions, and adjusting plans in a dynamic motion primitive formulation. We conducted simulated and real experiments with a Kinova Gen3 arm performing simple reaching tasks involving static and dynamic obstacles. Our implementation was systematically tuned, validated, and tested in sets of distinct task scenarios, and compared to a non-adaptive baseline through formalized quantitative metrics and qualitative criteria.
The neuromorphic implementation facilitated reliable avoidance of imminent collisions in most scenarios, with 84% and 92% median success rates in simulated and real experiments, where the baseline consistently failed. Adapted trajectories were qualitatively similar to baseline trajectories, indicating low impacts on safety, predictability and smoothness criteria. Among notable properties of the SNN were the correlation of processing time with the magnitude of perceived motions (captured in events) and robustness to different event emulation methods. Preliminary tests with a DAVIS346 EC showed similar performance, validating our experimental event emulation method. These results motivate future efforts to incorporate SNN learning, utilize neuromorphic processors, and target other robot tasks to further explore this approach.
The non-filarial and non-communicable disease podoconiosis affects around 4 million people and is characterized by severe leg lymphedema accompanied with painful intermittent acute inflammatory episodes, called acute dermatolymphangioadenitis (ADLA) attacks. Risk factors have been associated with the disease but the mechanisms of pathophysiology remain uncertain. Lymphedema can lead to skin lesions, which can serve as entry points for bacteria that may cause ADLA attacks leading to progression of the lymphedema. However, the microbiome of the skin of affected legs from podoconiosis individuals remains unclear. Thus, we analysed the skin microbiome of podoconiosis legs using next generation sequencing. We revealed a positive correlation between increasing lymphedema severity and non-commensal anaerobic bacteria, especially Anaerococcus provencensis, as well as a negative correlation with the presence of Corynebacterium, a constituent of normal skin flora. Disease symptoms were generally linked to higher microbial diversity and richness, which deviated from the normal composition of the skin. These findings show an association of distinct bacterial taxa with lymphedema stages, highlighting the important role of bacteria for the pathogenesis of podoconiosis and might enable a selection of better treatment regimens to manage ADLA attacks and disease progression.
While humans can effortlessly pick a view from multiple streams, automatically choosing the best view is a challenge. Choosing the best view from multi-camera streams poses a problem regarding which objective metrics should be considered. Existing works on view selection lack consensus about which metrics should be considered to select the best view. The literature on view selection describes diverse possible metrics. And strategies such as information-theoretic, instructional design, or aesthetics-motivated fail to incorporate all approaches. In this work, we postulate a strategy incorporating information-theoretic and instructional design-based objective metrics to select the best view from a set of views. Traditionally, information-theoretic measures have been used to find the goodness of a view, such as in 3D rendering. We adapted a similar measure known as the viewpoint entropy for real-world 2D images. Additionally, we incorporated similarity penalization to get a more accurate measure of the entropy of a view, which is one of the metrics for the best view selection. Since the choice of the best view is domain-dependent, we chose demonstration-based training scenarios as our use case. The limitation of our chosen scenarios is that they do not include collaborative training and solely feature a single trainer. To incorporate instructional design considerations, we included the trainer’s body pose, face, face when instructing, and hands visibility as metrics. To incorporate domain knowledge we included predetermined regions’ visibility as another metric. All of those metrics are taken into account to produce a parameterized view recommendation approach for demonstration-based training. An online study using recorded multi-camera video streams from a simulation environment was used to validate those metrics. Furthermore, the responses from the online study were used to optimize the view recommendation performance with a normalized discounted cumulative gain (NDCG) value of 0.912, which shows good performance with respect to matching user choices.