Refine
H-BRS Bibliography
- yes (178) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (178) (remove)
Document Type
- Article (79)
- Report (44)
- Conference Object (32)
- Part of a Book (8)
- Master's Thesis (7)
- Preprint (5)
- Book (monograph, edited volume) (1)
- Conference Proceedings (1)
- Working Paper (1)
Year of publication
Has Fulltext
- yes (178) (remove)
Keywords
- Robotik (6)
- Usable Security (5)
- Big Data Analysis (4)
- Machine Learning (4)
- Risk-based Authentication (4)
- Virtuelle Realität (4)
- computer vision (4)
- 802.11 (3)
- Cutting sticks-Problem (3)
- Knowledge Graphs (3)
- Perceptual Upright (3)
- Risk-based Authentication (RBA) (3)
- Teilsummenaufteilung (3)
- Virtual Reality (3)
- WiLD (3)
- 3D-Scanner (2)
- Artificial Intelligence (2)
- Authentication features (2)
- Bioinformatics (2)
- Computer Vision (2)
- Deep Learning (2)
- Forschungsbericht (2)
- GDPR (2)
- Gravitation (2)
- IEEE 802.11 (2)
- IEEE802.11 (2)
- Long-Distance WiFi (2)
- Mengenpartitionsproblem (2)
- Natural Language Processing (2)
- Object Detection (2)
- Password (2)
- Perception (2)
- Raumwahrnehmung (2)
- Ray Tracing (2)
- Transformers (2)
- Usable Security and Privacy (2)
- Verkehrssimulation (2)
- automated sensor-screening (2)
- biometrics (2)
- deep learning (2)
- domestic robots (2)
- haptics (2)
- robot competitions (2)
- robotics (2)
- security (2)
- semiconducting metal oxide gas sensor array (2)
- virtual reality (2)
- virtuelle Umgebungen (2)
- 0-1-Integer-Problem (1)
- 16S rRNA gene sequencing (1)
- 3D Segmentation (1)
- 3D navigation (1)
- 3D user interface (1)
- AI usage in sports (1)
- AML (1)
- API Documentation (1)
- AR (1)
- ARRs (1)
- Abstract Syntax Tree (1)
- Active Learning (1)
- Adaptive Behavior (1)
- Adaptive Case Management (1)
- Agents (1)
- Algorithmische Informationstheorie (1)
- Algorithms (1)
- Allgegenwärtige Spiele (1)
- Analyse (1)
- Apprenticeship Learning (1)
- Assistenzsystem (1)
- Aufrecht (1)
- Augmented Reality (1)
- Authentication (1)
- B-cell leukemia (1)
- BPMS (1)
- Bacteria, Anaerobic (1)
- Ball Tracking (1)
- Benchmark (1)
- Bildverarbeitung (1)
- Black-Box Optimization (1)
- Blockchain (1)
- Bond graph (1)
- Bounding box explanations (1)
- Bubble-Chart (1)
- CC (1)
- CEHL (1)
- Calibration (1)
- Camera selection (1)
- Camera view analysis (1)
- Centrifugation (1)
- Centrifuge (1)
- Cervical cancer screening (1)
- Cervicovaginal microbiome (1)
- Chaitin-Konstante (1)
- Change-Prozess (1)
- Chemical imaging (1)
- Chloroquine (1)
- Classification explanations (1)
- Cloud Computing (1)
- Code Generation (1)
- Codierung (1)
- Cognition (1)
- Collaboration/Cooperation (1)
- Colposcopy (1)
- Comparative Analysis (1)
- Complexity (1)
- Computer Graphics (1)
- Content Security Policies (1)
- Convexity (1)
- Created Gravity (1)
- Creative Commons (1)
- Cryptography (1)
- Current research information systems (1)
- Curriculum (1)
- Cutting sticks problem (1)
- CyberGlove (1)
- DCF (1)
- DNA extraction protocols (1)
- DNA profile (1)
- DOI (1)
- Data Protection Officer (1)
- Data Publication (1)
- DataCite (1)
- Database Management Systems (1)
- Datenbanksysteme (1)
- Declarative Process Modeling (1)
- Demonstration-based training (1)
- Developer Centered Security (1)
- Digital Ecosystem (1)
- Digital Object Identifier (1)
- Digitale Lehre (1)
- Digitaler Stress (1)
- Directed Acyclic Graph (1)
- Directional Antenna (1)
- Directional antennas (1)
- Disco (1)
- Domain-Specific Language (1)
- Domain-Specific Modeling Languages, (1)
- Domestic Robots (1)
- Drosophila (1)
- Dynamic Case Management (1)
- E-Health (1)
- ETV6-RUNX1 (1)
- Earth Observation (1)
- Ecosystem simulation (1)
- Edutainment (1)
- Electromagnetic Fields (1)
- Elephantiasis (1)
- Emotion (1)
- EnOcean (1)
- Entropy (1)
- Environmental Data (1)
- Eriodictyol (1)
- Erweiterte Realität (1)
- Evaluation (1)
- Evaluation als Kommunikationsanlass (1)
- Executive functions (1)
- Expert Interviews (1)
- Explainable Artificial Intelligence (XAI) (1)
- FDI (1)
- FIVIS (1)
- FOS: Computer and information sciences (1)
- FPGA (1)
- FS20 (1)
- Fahrradfahrsimulator (1)
- Fahrsimulator (1)
- Fault detection and isolation (1)
- Feedback (1)
- First-order frequency domain sensitivities (1)
- Five Factor Model (1)
- Flussnetz (1)
- Free-Space Loss (FSL) (1)
- Fuzzy Miner (1)
- GDDL (1)
- GLI (1)
- Gabor filters (1)
- Gefahrenprävention (1)
- Genomics (1)
- Genomics/methods (1)
- Gnu Linear Programming Kit (1)
- Gradient-based explanation methods (1)
- Graph Convolutional Neural Networks (1)
- Graph embeddings (1)
- Graph theory (1)
- Graphentheorie (1)
- Grasp Domain Definition Language (1)
- Grasp Planner (1)
- Grasping (1)
- Group behavior analysis (1)
- HDBR (1)
- HPV diagnostic (1)
- HSP70 (1)
- HSP90 (1)
- HTTP (1)
- Handzeichenerkennung (1)
- Header whitelisting (1)
- Healthcare logistics (1)
- Hochschulehre (1)
- Hochschullehre (1)
- HomeMatic (1)
- Hough Forests (1)
- Human orientation perception (1)
- Human-Centered Design (1)
- Human-Centered Robotics (1)
- Human-Computer-Interaction (HCI) (1)
- Humans (1)
- Hybrid models of engineering systems (1)
- Hybrid systems (1)
- Hydroxychloroquine (1)
- Hyper-parameter Tuning (1)
- ICF (1)
- ISO9999 (1)
- Image Classification (1)
- Immersive analytics (1)
- Implementation Challenges (1)
- Incremental bond graph (1)
- Inductive Visual Miner (1)
- Informations-, Kommunikations- und Medientechnologie (1)
- Instantaneous assignment (1)
- Instantiation (1)
- Instruction design (1)
- Interaction devices (1)
- Interactive Object Detection (1)
- Interaktion (1)
- Interference (1)
- Intermediaries (1)
- Interventionstudie (1)
- KNX (1)
- Knowledge Worker (1)
- Knowledge-intensive Process (1)
- Kollaboration/Kooperation (1)
- Kolmogorov-Komplexität (1)
- Kombinatorische Optimierung (1)
- Kompression und Zufälligkeit von Zeichenketten (1)
- Künstliche Gravitation (1)
- LAA (1)
- LBP (1)
- LDP (1)
- LOTUS Sensor Node (1)
- LP-Heuristik (1)
- LSTM (1)
- LTE-U (1)
- Lagerlogistik (1)
- Language Engineering (1)
- Large display interaction (1)
- Large-Scale Online Services (1)
- Learning and Adaptive Systems (1)
- Leg (1)
- Lehr-Lernpsychologie (1)
- Lernen (1)
- Lernumgebung (1)
- Lineare Programmierung (1)
- LoRa (1)
- LoRa receiver accuracy (1)
- Long-Term Autonomy (1)
- Longley-Rice (1)
- Longley-Rice Irregular Terrain Model (ITM) (1)
- Lymphedema (1)
- MAC (1)
- MBZ (1)
- MESD (1)
- METEOR score (1)
- MOX gas sensors (1)
- Malware (1)
- Markov Cluster Algorithm (1)
- Materialwissenschaften (1)
- Maximalflussproblem (1)
- Measurement (1)
- Mengenpartitionierungsproblem (1)
- Mensch-Computer-Interaktion (1)
- Mensch-Maschine-Kommunikation (1)
- Meteorological Data (1)
- Minimaler Schnitt (1)
- Mixed-Reality (MR) (1)
- Mobiler Roboter (1)
- Model-Driven Engineering (1)
- Molecular rotation (1)
- Multi-camera (1)
- Multi-object visualization (1)
- Multi-robot systems (1)
- Multimodal hyperspectral data (1)
- NGS (1)
- NLP (1)
- NP-Vollständigkeit (1)
- Naive physics (1)
- Navigation (1)
- Neuroscience (1)
- OCT (1)
- OCU (1)
- OER (1)
- Object Segmentation (1)
- Object detectors (1)
- Older adults (1)
- Open Educational Ressources (1)
- Open source software (1)
- OpenFlow (1)
- OpenStack (1)
- Operation Research (1)
- Optical Flow (1)
- Optimierungsproblem (1)
- Organic compounds and Functional groups (1)
- Out Of Distribution (OOD) data (1)
- Outer Space Research (1)
- PAD (1)
- PCR inhibitors (1)
- PHR (1)
- Part Segmentation (1)
- Path loss model (1)
- Path-Packing (1)
- Pattern recognition (1)
- Personal Health Record (1)
- Personality (1)
- Persönlichkeit (1)
- Persönlichkeitseigenschaften (1)
- Persönlichkeitsfaktor (1)
- Pervasive Gaming (1)
- Physical activity (1)
- Point Cloud Segmentation (1)
- Point Clouds (1)
- Poisson Disc Distribution (1)
- Privacy patterns (1)
- ProM (1)
- Process Automation (1)
- Process Mining (1)
- Process Models (1)
- Proof-of-Stake (1)
- Proof-of-Work (1)
- Propagation (1)
- Proximity (1)
- Prozessautomation (1)
- Psychology (1)
- Qualitative reasoning (1)
- Qualitätspakt Lehre (1)
- Quantitative analysis of explanations (1)
- Quantum mechanical methods (1)
- RGB-D (1)
- ROPOD (1)
- RSSI (1)
- Radfahren (1)
- Random number generator (1)
- RapidMiner (1)
- Re-authentication (1)
- Real-Time Image Processing (1)
- Recommender systems (1)
- Relative Energies (1)
- Rendering (1)
- Requirements Engineering (1)
- Robotic faults (1)
- Robotics (cs.RO) (1)
- Roleplaying Game (RPG) (1)
- Rollenspiel (1)
- Rollenspiele (1)
- Rucksackproblem (1)
- SAML (1)
- SARS-CoV-2 (1)
- SEMA (1)
- SMPA loop (1)
- SOAP (1)
- Saliency maps (1)
- Sanity checks for explaining detectors (1)
- Scale Tuning (1)
- Scene understanding through Deep Learning (1)
- School experiments (1)
- Secure Coding Practices (1)
- Segmentation (1)
- Semantic Segmentation (1)
- Semantic gap (1)
- Semantic search (1)
- Sensitivity matrix in symbolic form (1)
- Set partition problem (1)
- Side Channel Analysis (1)
- Silmitasertib (1)
- Simulation (1)
- Skin (1)
- Skin detection (1)
- Software Architecture (1)
- Software Framework (1)
- Software Supply Chain (1)
- Somatogravic Illusion (1)
- Spatio-Temporal (1)
- Spectral Analysis (1)
- Spectral Clustering (1)
- Spectroscopy (1)
- Spectrum occupancy (1)
- Spherical Treadmill (1)
- Studienverlauf (1)
- Supervised classification (1)
- TEL-AML1 (1)
- Task allocation (1)
- Teaching Quality Pact (1)
- Temporal constraints (1)
- Terrain rendering (1)
- Time extended assignment (1)
- TinyECC 2.0 (1)
- Token (1)
- Translocation (1)
- Two-Ray (1)
- Two-factor Authentication (1)
- U-NII band (1)
- UAV (1)
- UGV (1)
- USAR (1)
- Uncertainty Estimation (1)
- Unity (1)
- Unknown parameter degradation (1)
- User experience design (1)
- User-Centered Design (1)
- User-Computer Interface (1)
- User-centered privacy engineering (1)
- VR (1)
- VR-based systems (1)
- Valproic acid (1)
- Verkehrserziehung (1)
- Verkehrsnetz (1)
- Verkehrsnetzwerke (1)
- Vibrational microspectroscopy (1)
- View selection (1)
- Visual Computing (1)
- Wahrnehmung (1)
- Wang-tiles (1)
- Web (1)
- Weltraumforschung (1)
- Wi-Fi (1)
- WiFi (1)
- WiFi-based Long Distance (WiLD) (1)
- Wireless Sensor Network (1)
- Wireless backhaul (1)
- Workflow (1)
- Workflow Management (1)
- XML Signature (1)
- XML Signature Wrapping (1)
- YAWL (1)
- Young adults (1)
- ZWave (1)
- Zentrifuge (1)
- ZigBee (1)
- accelerometer (1)
- adaptive trigger (1)
- analog/digital signal processing (1)
- analytical redundancy relation residuals (1)
- assistive robotics (1)
- assistive robots (1)
- authentication (1)
- automatic measurement validation (1)
- automatic music generation (1)
- automation of sample processing (1)
- automatisierte Netzwerkgenerierung (1)
- autonomous driving (1)
- averaged bond graph models (1)
- benchmarking (1)
- bicausal diagnostic Bond Graphs (1)
- binary classification (1)
- bioinformatics (1)
- bond graph modelling (1)
- bond graphs (1)
- bond-graph-based physical systems modelling (1)
- bootstrapping (1)
- building automation (1)
- built environment (1)
- camera (1)
- change process (1)
- closed kinematic chain (1)
- cognitive radio (1)
- collision (1)
- conformations (1)
- constraint relaxation (1)
- control (1)
- control architectures (1)
- controller design (1)
- convex optimization (1)
- convolutional neural networks (1)
- data analysis (1)
- data glove (1)
- database (1)
- database systems (1)
- degraded DNA (1)
- diagnostic bond graphs (1)
- differential algebraic equation systems (1)
- directional antennas (1)
- drugs (1)
- dynamics (1)
- e-Research (1)
- elite sports (1)
- employee privacy (1)
- energy (1)
- energy saving (1)
- evaluation as a mean to communication (1)
- explainable AI (1)
- external faults (1)
- extraction-linked bias (1)
- eye movement (1)
- eye tracking (1)
- facial expression recognition (1)
- factor analysis (1)
- failure prognostic (1)
- fault indicators (1)
- fault scenarios (1)
- fault detection (1)
- feature (1)
- fiducial marker (1)
- fingerprint (1)
- fitness-fatigue model (1)
- fixed causalities generation of analytical redundancy relations (1)
- forensic (1)
- foveated rendering (1)
- gaze (1)
- grasp motions (1)
- grasping (1)
- gravito-inertial force (1)
- head down bed rest (1)
- heart rate control (1)
- heart rate modeling (1)
- heart rate prediction (1)
- high degree of diagnostic coverage and reliability (1)
- high diagnostic coverage and reliability (1)
- high dynamic range resistance readout (1)
- high-throughput DNA sequencing (1)
- high-throughput sequencing (1)
- higher education (1)
- hospital environment (1)
- hospital-acquired infections (1)
- human microbiome (1)
- hybrid dynamics solver (1)
- hybrid system (1)
- ideal switches (1)
- image captioning (1)
- immersive Visualisierung (1)
- indicators calculation (1)
- industrial robots (1)
- informational self-determination (1)
- infrared pattern (1)
- instance segmentation (1)
- intelligente Agenten (1)
- intelligente virtuelle Agenten (1)
- interaction (1)
- interactive computer graphics (1)
- interference (1)
- isolation (1)
- knowledge graphs (1)
- large-high-resolution displays (1)
- latent class analysis (1)
- leaning-based interfaces (1)
- learning traces (1)
- load control (1)
- locomotion interface (1)
- long-distance 802.11 (1)
- long-distance modeling (1)
- massive parallel sequencing (1)
- mathematical modeling (1)
- mebendazole (1)
- mental models (1)
- microbial community structure (1)
- microbial ecology (1)
- microbiome (1)
- microbiome analyses (1)
- mixed reality (1)
- mobile manipulators (1)
- mobility assistance system (1)
- mode-dependent implicit state space model (1)
- mode-switching linear time-invariant models (1)
- model exchange (1)
- modelling methodology (1)
- motion capture (1)
- multi-channel power sourcing (1)
- multibody system (1)
- multibond graphs (1)
- music analysis (1)
- natural language processing (1)
- navigational search (1)
- near infrared (1)
- next generation sequencing (1)
- numerical computation of residuals (1)
- object detection (1)
- object-oriented modelling (1)
- open educational resources (OERs) (1)
- operation mode independent causalities (1)
- optical character recognition (1)
- optical coherence tomography (1)
- optical sensor (1)
- optical tracking (1)
- optimized geometries (1)
- parameter estimation (1)
- parameter sensitivity of residuals (1)
- perceived quality (1)
- perception of upright (1)
- performance modeling (1)
- performance prediction (1)
- person and object detection and recognition (1)
- phenomenological approaches (1)
- posture analysis (1)
- power electronic systems (1)
- predictive maintenance (1)
- prehensile motions (1)
- presentation attack detection (1)
- presentation attack detection (PAD) (1)
- prioritizable ranking (1)
- privacy at work (1)
- process (1)
- pseudo-random number generator (1)
- psychophysics (1)
- quantitative model-based fault detection (1)
- question answering (1)
- rapid prototyping tool (1)
- region of interest (1)
- reinforcement learning (1)
- remaining useful life (1)
- repeated trend projection (1)
- representation learning (1)
- residual bond graph sinks (1)
- residual sinks (1)
- reuse of indicators (1)
- road (1)
- robot behaviour model (1)
- robot control (1)
- robot dynamics (1)
- robot personalisation (1)
- robotic arm (1)
- robotic evaluation (1)
- routing (1)
- rural areas (1)
- scene-segmentation (1)
- scenes (1)
- semantic mapping (1)
- sensemaking (1)
- sensor resilience (1)
- short tandem repeat (1)
- simulation (1)
- simulation of fault scenarios (1)
- slope based signature (1)
- small molecule (1)
- software engineering (1)
- software-defined networking (1)
- space flight analog (1)
- spatial orientation (1)
- spatial updating (1)
- spectrum scan (1)
- spectrum sensing (1)
- speech understanding (1)
- spinal posture (1)
- static friction (1)
- structural equation modeling (1)
- subjective visual vertical (1)
- switched three-phase power inverter (1)
- system mode independent bond graph representation (1)
- task models (1)
- taxonomie (1)
- technology mapping (1)
- teleoperation (1)
- text detection (1)
- text localization (1)
- text mining (1)
- textual model description languages (1)
- time series analysis (1)
- tools for education (1)
- trace model (1)
- trace-based system (1)
- traffic sign detection (1)
- traffic sign localization (1)
- training monitoring (1)
- training performance relationship (1)
- transfer learning (1)
- true random number generator (1)
- uncertainties (1)
- usable privacy controls (1)
- user input (1)
- user interaction (1)
- user modelling (1)
- user study (1)
- vestibular system (1)
- vibration (1)
- visual attention (1)
- wearable sensor (1)
- wearable sensors (1)
- weight perception (1)
- wireless mesh networks (1)
- xorshift-generator (1)
Studienverläufe von Studenten weichen nicht selten vom offiziell geplanten Curriculum ab. Für eine den Studienerfolg verbessernde Planung und Weiterentwicklung von Studiengängen und Curricula fehlen den Verantwortlichen häufig Erkenntnisse über tatsächliche sowie typischerweise erfolgreiche und weniger erfolgreiche Studienverlaufsmuster. Process-Mining-Techniken können helfen, mehr Transparenz bei der Auswertung von Studienverläufen zu schaffen und so die Erkennung typischer Studienverlaufsmuster, die Überprüfung der Übereinstimmung der konkreten Studienverläufe mit dem vorgegebenen Curriculum sowie eine zielgerechte Verbesserung des Curriculums zu unterstützen.
YAWL (Yet Another Workflow Language) is an open source Business Process Management System, first released in 2003. YAWL grew out of a university research environment to become a unique system that has been deployed worldwide as a laboratory environment for research in Business Process Management and as a productive system in other scientific domains.
XPERSIF: a software integration framework & architecture for robotic learning by experimentation
(2008)
The integration of independently-developed applications into an efficient system, particularly in a distributed setting, is the core issue addressed in this work. Cooperation between researchers across various field boundaries in order to solve complex problems has become commonplace. Due to the multidisciplinary nature of such efforts, individual applications are developed independent of the integration process. The integration of individual applications into a fully-functioning architecture is a complex and multifaceted task. This thesis extends a component-based architecture, previously developed by the authors, to allow the integration of various software applications which are deployed in a distributed setting. The test bed for the framework is the EU project XPERO, the goal of which is robot learning by experimentation. The task at hand is the integration of the required applications, such as planning of experiments, perception of parametrized features, robot motion control and knowledge-based learning, into a coherent cognitive architecture. This allows a mobile robot to use the methods involved in experimentation in order to learn about its environment. To meet the challenge of developing this architecture within a distributed, heterogeneous environment, the authors specified, defined, developed, implemented and tested a component-based architecture called XPERSIF. The architecture comprises loosely-coupled, autonomous components that offer services through their well-defined interfaces and form a service-oriented architecture. The Ice middleware is used in the communication layer. Its deployment facilitates the necessary refactoring of concepts. One fully specified and detailed use case is the successful integration of the XPERSim simulator which constitutes one of the kernel components of XPERO.The results of this work demonstrate that the proposed architecture is robust and flexible, and can be successfully scaled to allow the complete integration of the necessary applications, thus enabling robot learning by experimentation. The design supports composability, thus allowing components to be grouped together in order to provide an aggregate service. Distributed simulation enabled real time tele-observation of the simulated experiment. Results show that incorporating the XPERSim simulator has substantially enhanced the speed of research and the information flow within the cognitive learning loop.
XML Signature Wrapping (XSW) has been a relevant threat to web services for 15 years until today. Using the Personal Health Record (PHR), which is currently under development in Germany, we investigate a current SOAP-based web services system as a case study. In doing so, we highlight several deficiencies in defending against XSW. Using this real-world contemporary example as motivation, we introduce a guideline for more secure XML signature processing that provides practitioners with easier access to the effective countermeasures identified in the current state of research.
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users. To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users.
To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
The development of mobile robotic systems is a demanding task regarding its complexity, required resources and skills in multiple fields such as software development, artificial intelligence, mechanical design, electrical engineering, signal processing, sensor technology or control theory. This holds true particularly for soccer playing robots, where additional aspects like high dynamics, cooperation and high physical stress have to be dealt with. In robot competitions such as RoboCup, additional skills in the domains of team, project and knowledge management are of importance.
Background: Virtual reality combined with spherical treadmills is used across species for studying neural circuits underlying navigation.
New Method: We developed an optical flow-based method for tracking treadmil ball motion in real-time using a single high-resolution camera.
Results: Tracking accuracy and timing were determined using calibration data. Ball tracking was performed at 500 Hz and integrated with an open source game engine for virtual reality projection. The projection was updated at 120 Hz with a latency with respect to ball motion of 30 ± 8 ms.
Comparison: with Existing Method(s) Optical flow based tracking of treadmill motion is typically achieved using optical mice. The camera-based optical flow tracking system developed here is based on off-the-shelf components and offers control over the image acquisition and processing parameters. This results in flexibility with respect to tracking conditions – such as ball surface texture, lighting conditions, or ball size – as well as camera alignment and calibration.
Conclusions: A fast system for rotational ball motion tracking suitable for virtual reality animal behavior across different scales was developed and characterized.
While humans can effortlessly pick a view from multiple streams, automatically choosing the best view is a challenge. Choosing the best view from multi-camera streams poses a problem regarding which objective metrics should be considered. Existing works on view selection lack consensus about which metrics should be considered to select the best view. The literature on view selection describes diverse possible metrics. And strategies such as information-theoretic, instructional design, or aesthetics-motivated fail to incorporate all approaches. In this work, we postulate a strategy incorporating information-theoretic and instructional design-based objective metrics to select the best view from a set of views. Traditionally, information-theoretic measures have been used to find the goodness of a view, such as in 3D rendering. We adapted a similar measure known as the viewpoint entropy for real-world 2D images. Additionally, we incorporated similarity penalization to get a more accurate measure of the entropy of a view, which is one of the metrics for the best view selection. Since the choice of the best view is domain-dependent, we chose demonstration-based training scenarios as our use case. The limitation of our chosen scenarios is that they do not include collaborative training and solely feature a single trainer. To incorporate instructional design considerations, we included the trainer’s body pose, face, face when instructing, and hands visibility as metrics. To incorporate domain knowledge we included predetermined regions’ visibility as another metric. All of those metrics are taken into account to produce a parameterized view recommendation approach for demonstration-based training. An online study using recorded multi-camera video streams from a simulation environment was used to validate those metrics. Furthermore, the responses from the online study were used to optimize the view recommendation performance with a normalized discounted cumulative gain (NDCG) value of 0.912, which shows good performance with respect to matching user choices.
Risk-based authentication (RBA) is an adaptive security measure to strengthen password-based authentication against account takeover attacks. Our study on 65 participants shows that users find RBA more usable than two-factor authentication equivalents and more secure than password-only authentication. We identify pitfalls and provide guidelines for putting RBA into practice.
Improving the study entry supports students in a decisive phase of their university education. Implementing improvements is a change process and can only be successful if the relevant stakeholders are addressed and convinced. In the described Teaching Quality Pact project evaluation data is used as a mean to discuss in the university the situation of the study programs. As these discussions were based on empirical data rather than on opinion, it was possible to achieve an open discussion about measures that are implemented. The open discussion is maintained during the project when results of the measures taken are analyzed.
Die Wahrnehmung des perzeptionellen Aufrecht (perceptual upright, PU) variiert in Abhängigkeit der Gewichtung verschiedener gravitationsbezogener und körperbasierter Merkmale zwischen Kontexten und aufgrund individueller Unterschiede. Ziel des Vorhabens war es, systematisch zu untersuchen, welche Zusammenhänge zwischen visuellen und gravitationsbedingten Merkmalen bestehen. Das Vorhaben baute auf vorangegangen Untersuchungen auf, deren Ergebnisse indizieren, dass eine Gravitation von ca. 0,15g notwendig ist, um effiziente Selbstorientierungsinformationen bereit zu stellen (Herpers et. al, 2015; Harris et. al, 2014).
In dem hier beschriebenen Vorhaben wurden nun gezielt künstliche Gravitationsbedingungen berücksichtigt, um die Gravitationsschwelle, ab der ein wahrnehmbarer Einfluss beobachtbar ist, genauer zu quantifizieren bzw. die oben genannte Hypothese zu bestätigen. Es konnte gezeigt werden, dass die zentripetale Kraft, die auf einer rotierenden Zentrifuge entlang der Längsachse des Körpers wirkt, genauso efektiv wie Stehen mit normaler Schwerkraft ist, um das Gefühl des perzeptionellen Aufrechts auszulösen. Die erzielten Daten deuten zudem darauf hin, dass ein Gravitationsfeld von mindestens 0,15 g notwendig ist, um eine efektive Orientierungsinformation für die Wahrnehmung von Aufrecht zu liefern. Dies entspricht in etwa der Gravitationskraft von 0,17 g, die auf dem Mond besteht. Für eine lineare Beschleunigung des Körpers liegt der vestibulare Schwellenwert bei etwa 0,1 m/s2 und somit liegt der Wert für die Situation auf dem Mond von 1,6 m/s2 deutlich über diesem Schwellenwert.
The non-filarial and non-communicable disease podoconiosis affects around 4 million people and is characterized by severe leg lymphedema accompanied with painful intermittent acute inflammatory episodes, called acute dermatolymphangioadenitis (ADLA) attacks. Risk factors have been associated with the disease but the mechanisms of pathophysiology remain uncertain. Lymphedema can lead to skin lesions, which can serve as entry points for bacteria that may cause ADLA attacks leading to progression of the lymphedema. However, the microbiome of the skin of affected legs from podoconiosis individuals remains unclear. Thus, we analysed the skin microbiome of podoconiosis legs using next generation sequencing. We revealed a positive correlation between increasing lymphedema severity and non-commensal anaerobic bacteria, especially Anaerococcus provencensis, as well as a negative correlation with the presence of Corynebacterium, a constituent of normal skin flora. Disease symptoms were generally linked to higher microbial diversity and richness, which deviated from the normal composition of the skin. These findings show an association of distinct bacterial taxa with lymphedema stages, highlighting the important role of bacteria for the pathogenesis of podoconiosis and might enable a selection of better treatment regimens to manage ADLA attacks and disease progression.
It is challenging to provide users with a haptic weight sensation of virtual objects in VR since current consumer VR controllers and software-based approaches such as pseudo-haptics cannot render appropriate haptic stimuli. To overcome these limitations, we developed a haptic VR controller named Triggermuscle that adjusts its trigger resistance according to the weight of a virtual object. Therefore, users need to adapt their index finger force to grab objects of different virtual weights. Dynamic and continuous adjustment is enabled by a spring mechanism inside the casing of an HTC Vive controller. In two user studies, we explored the effect on weight perception and found large differences between participants for sensing change in trigger resistance and thus for discriminating virtual weights. The variations were easily distinguished and associated with weight by some participants while others did not notice them at all. We discuss possible limitations, confounding factors, how to overcome them in future research and the pros and cons of this novel technology.
Airborne and spaceborne platforms are the primary data sources for large-scale forest mapping, but visual interpretation for individual species determination is labor-intensive. Hence, various studies focusing on forests have investigated the benefits of multiple sensors for automated tree species classification. However, transferable deep learning approaches for large-scale applications are still lacking. This gap motivated us to create a novel dataset for tree species classification in central Europe based on multi-sensor data from aerial, Sentinel-1 and Sentinel-2 imagery. In this paper, we introduce the TreeSatAI Benchmark Archive, which contains labels of 20 European tree species (i.e., 15 tree genera) derived from forest administration data of the federal state of Lower Saxony, Germany. We propose models and guidelines for the application of the latest machine learning techniques for the task of tree species classification with multi-label data. Finally, we provide various benchmark experiments showcasing the information which can be derived from the different sensors including artificial neural networks and tree-based machine learning methods. We found that residual neural networks (ResNet) perform sufficiently well with weighted precision scores up to 79 % only by using the RGB bands of aerial imagery. This result indicates that the spatial content present within the 0.2 m resolution data is very informative for tree species classification. With the incorporation of Sentinel-1 and Sentinel-2 imagery, performance improved marginally. However, the sole use of Sentinel-2 still allows for weighted precision scores of up to 74 % using either multi-layer perceptron (MLP) or Light Gradient Boosting Machine (LightGBM) models. Since the dataset is derived from real-world reference data, it contains high class imbalances. We found that this dataset attribute negatively affects the models' performances for many of the underrepresented classes (i.e., scarce tree species). However, the class-wise precision of the best-performing late fusion model still reached values ranging from 54 % (Acer) to 88 % (Pinus). Based on our results, we conclude that deep learning techniques using aerial imagery could considerably support forestry administration in the provision of large-scale tree species maps at a very high resolution to plan for challenges driven by global environmental change. The original dataset used in this paper is shared via Zenodo (https://doi.org/10.5281/zenodo.6598390, Schulz et al., 2022). For citation of the dataset, we refer to this article.
In this paper we present the steps towards a well-designed concept of a 5VR6 system for school experiments in scientific domains like physics, biology and chemistry. The steps include the analysis of system requirements in general, the analysis of school experiments and the analysis of input and output devices demands. Based on the results of these steps we show a taxonomy of school experiments and provide a comparison between several currently available devices which can be used for building such a system. We also compare the advantages and shortcomings of 5VR6 and 5AR6 systems in general to show why, in our opinion, 5VR6 systems are better suited for school-use.
Trojanized software packages used in software supply chain attacks constitute an emerging threat. Unfortunately, there is still a lack of scalable approaches that allow automated and timely detection of malicious software packages and thus most detections are based on manual labor and expertise. However, it has been observed that most attack campaigns comprise multiple packages that share the same or similar malicious code. We leverage that fact to automatically reproduce manually identified clusters of known malicious packages that have been used in real world attacks, thus, reducing the need for expert knowledge and manual inspection. Our approach, AST Clustering using MCL to mimic Expertise (ACME), yields promising results with a 𝐹1 score of 0.99. Signatures are automatically generated based on characteristic code fragments from clusters and are subsequently used to scan the whole npm registry for unreported malicious packages. We are able to identify and report six malicious packages that have been removed from npm consequentially. Therefore, our approach can support the detection by reducing manual labor and hence may be employed by maintainers of package repositories to detect possible software supply chain attacks through trojanized software packages.
Maintaining orientation in an environment with non-Earth gravity (1 g) is critical for an astronaut's operational performance. Such environments present a number of complexities for balance and motion. For example, when an astronaut tilts due to ascending or descending an inclined plane on the moon, the gravity vector will be tilted correctly, but the magnitude will be different from on earth. If this results in a mis-perceived tilt, then that may lead to postural and perceptual errors, such as mis-perceiving the orientation of oneself or the ground plane and corresponding errors in task judgment.
In an effort to assist researchers in choosing basis sets for quantum mechanical modeling of molecules (i.e. balancing calculation cost versus desired accuracy), we present a systematic study on the accuracy of computed conformational relative energies and their geometries in comparison to MP2/CBS and MP2/AV5Z data, respectively. In order to do so, we introduce a new nomenclature to unambiguously indicate how a CBS extrapolation was computed. Nineteen minima and transition states of buta-1,3-diene, propan-2-ol and the water dimer were optimized using forty-five different basis sets. Specifically, this includes one Pople (i.e. 6-31G(d)), eight Dunning (i.e. VXZ and AVXZ, X=2-5), twenty-five Jensen (i.e. pc-n, pcseg-n, aug-pcseg-n, pcSseg-n and aug-pcSseg-n, n=0-4) and nine Karlsruhe (e.g. def2-SV(P), def2-QZVPPD) basis sets. The molecules were chosen to represent both common and electronically diverse molecular systems. In comparison to MP2/CBS relative energies computed using the largest Jensen basis sets (i.e. n=2,3,4), the use of smaller sizes (n=0,1,2 and n=1,2,3) provides results that are within 0.11--0.24 and 0.09-0.16 kcal/mol. To practically guide researchers in their basis set choice, an equation is introduced that ranks basis sets based on a user-defined balance between their accuracy and calculation cost. Furthermore, we explain why the aug-pcseg-2, def2-TZVPPD and def2-TZVP basis sets are very suitable choices to balance speed and accuracy.
The reciprocal translocation t(12;21)(p13;q22), the most common structural genomic alteration in B-cell precursor acute lymphoblastic leukaemia in children, results in a chimeric transcription factor TEL-AML1 (ETV6-RUNX1). We identified directly and indirectly regulated target genes utilizing an inducible TEL-AML1 system derived from the murine pro B-cell line BA/F3 and a monoclonal antibody directed against TEL-AML1. By integration of promoter binding identified with chromatin immunoprecipitation (ChIP)-on-chip, gene expression and protein output through microarray technology and stable labelling of amino acids in cell culture, we identified 217 directly and 118 indirectly regulated targets of the TEL-AML1 fusion protein. Directly, but not indirectly, regulated promoters were enriched in AML1-binding sites. The majority of promoter regions were specific for the fusion protein and not bound by native AML1 or TEL. Comparison with gene expression profiles from TEL-AML1-positive patients identified 56 concordantly misregulated genes with negative effects on proliferation and cellular transport mechanisms and positive effects on cellular migration, and stress responses including immunological responses. In summary, this work for the first time gives a comprehensive insight into how TEL-AML1 expression may directly and indirectly contribute to alter cells to become prone for leukemic transformation.