Refine
H-BRS Bibliography
- yes (65) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (65) (remove)
Document Type
- Conference Object (23)
- Article (18)
- Preprint (9)
- Report (4)
- Book (monograph, edited volume) (2)
- Part of a Book (2)
- Conference Proceedings (2)
- Research Data (2)
- Doctoral Thesis (2)
- Master's Thesis (1)
Year of publication
- 2022 (65) (remove)
Keywords
- Machine Learning (4)
- Knowledge Graphs (3)
- virtual reality (3)
- 3D user interface (2)
- Bioinformatics (2)
- Computer Vision (2)
- Control Systems and Automation (2)
- Deep Learning (2)
- Electrical Machines and Power Electronics (2)
- Intelligent controls (2)
- Natural Language Processing (2)
- Renewable Energy Systems (2)
- Security (2)
- Transformers (2)
- Usable Security (2)
- embedded systems (2)
- haptics (2)
- usable privacy (2)
- 3D Segmentation (1)
- AI usage in sports (1)
- ANSYS (1)
- Abstract Syntax Tree (1)
- Air Pollution Monitoring (1)
- Artificial Intelligence (1)
- Artificial Intelligence (cs.AI) (1)
- Augmented Reality (1)
- Autonomous Driving (1)
- Ballastless track (1)
- Beacon Chain (1)
- Bounding box explanations (1)
- Classification explanations (1)
- Cloud computing (1)
- Complexity (1)
- Conformation (1)
- Corporate Social Responsibility (1)
- Crystal structure (1)
- Current research information systems (1)
- Cypher (1)
- Data Generation (1)
- Digitaler Stress (1)
- Distance Perception (1)
- Employee Privacy (1)
- Environment Perception (1)
- Ethereum (1)
- Experiment (1)
- Explainable Artificial Intelligence (XAI) (1)
- FOS: Computer and information sciences (1)
- Feedback (1)
- GDPR (1)
- Gradient-based explanation methods (1)
- Graph Convolutional Neural Networks (1)
- Graph embeddings (1)
- Graph theory (1)
- HDBR (1)
- High-speed track (1)
- Highly Automated Driving (1)
- Human orientation perception (1)
- Human-Centered Design (1)
- IaaS (1)
- Image representation (1)
- Information Privacy (1)
- IoT (1)
- LSTM (1)
- Ligands (1)
- LoRa (1)
- LoRaWAN (1)
- MOX gas sensors (1)
- Machine Learning (cs.LG) (1)
- Malware (1)
- Markov Cluster Algorithm (1)
- Mathematical methods (1)
- Microgravity (1)
- Molecular structure (1)
- Multi-object visualization (1)
- NLP (1)
- Neural Machine Translation (1)
- Noise reduction (1)
- OCT (1)
- Object Segmentation (1)
- Object detectors (1)
- Open Access (1)
- PAD (1)
- PaaS (1)
- Parametric study (1)
- Part Segmentation (1)
- Perception (1)
- Perceptual Upright (1)
- Performance (1)
- Persönlichkeit (1)
- Persönlichkeitseigenschaften (1)
- Persönlichkeitsfaktor (1)
- Point Cloud Segmentation (1)
- Proof of Stake (1)
- Proximity (1)
- Quantitative analysis of explanations (1)
- Right to Informational Self-Determination (1)
- SMPA loop (1)
- SQL (1)
- SaaS (1)
- Safety (1)
- Saliency maps (1)
- Sanity checks for explaining detectors (1)
- Scalability (1)
- Self-supervised learning (1)
- Semantic Segmentation (1)
- Semantic search (1)
- Service-based cloud computing (1)
- Simulator (1)
- Software Supply Chain (1)
- Sonar (1)
- Supervised learning (1)
- TLS (1)
- Transfer learning (1)
- Underwater (1)
- Usable Privacy (1)
- adaptive trigger (1)
- authentication (1)
- automatic measurement validation (1)
- automatic music generation (1)
- biometrics (1)
- blockchain (1)
- collision (1)
- controller design (1)
- cybersickness (1)
- digital co-creation (1)
- elite sports (1)
- employee privacy (1)
- explainable AI (1)
- factor analysis (1)
- feature (1)
- fingerprint (1)
- flying (1)
- guidance (1)
- head down bed rest (1)
- human-centred design (1)
- hybrid system (1)
- intervention mechanisms (1)
- latent class analysis (1)
- low-cost air sensor (1)
- motion sickness (1)
- multisensory cues (1)
- music analysis (1)
- neutral buoyancy (1)
- optic flow (1)
- optical coherence tomography (1)
- presentation attack detection (1)
- prioritizable ranking (1)
- privacy by design (1)
- psychophysics (1)
- representation learning (1)
- security and privacy literacy (1)
- self-motion perception (1)
- situation awareness (1)
- slope based signature (1)
- space flight analog (1)
- structural equation modeling (1)
- subjective visual vertical (1)
- time series analysis (1)
- traffic surveillance (1)
- transparency-enhancing technologies (1)
- travel techniques (1)
- vection (1)
- vibration (1)
- view management (1)
- weight perception (1)
Vection underwater
(2022)
TSEM: Temporally Weighted Spatiotemporal Explainable Neural Network for Multivariate Time Series
(2022)
Deep learning has become a one-size-fits-all solution for technical and business domains thanks to its flexibility and adaptability. It is implemented using opaque models, which unfortunately undermines the outcome trustworthiness. In order to have a better understanding of the behavior of a system, particularly one driven by time series, a look inside a deep learning model so-called posthoc eXplainable Artificial Intelligence (XAI) approaches, is important. There are two major types of XAI for time series data, namely model-agnostic and model-specific. Model-specific approach is considered in this work. While other approaches employ either Class Activation Mapping (CAM) or Attention Mechanism, we merge the two strategies into a single system, simply called the Temporally Weighted Spatiotemporal Explainable Neural Network for Multivariate Time Series (TSEM). TSEM combines the capabilities of RNN and CNN models in such a way that RNN hidden units are employed as attention weights for the CNN feature maps temporal axis. The result shows that TSEM outperforms XCM. It is similar to STAM in terms of accuracy, while also satisfying a number of interpretability criteria, including causality, fidelity, and spatiotemporality.
It is challenging to provide users with a haptic weight sensation of virtual objects in VR since current consumer VR controllers and software-based approaches such as pseudo-haptics cannot render appropriate haptic stimuli. To overcome these limitations, we developed a haptic VR controller named Triggermuscle that adjusts its trigger resistance according to the weight of a virtual object. Therefore, users need to adapt their index finger force to grab objects of different virtual weights. Dynamic and continuous adjustment is enabled by a spring mechanism inside the casing of an HTC Vive controller. In two user studies, we explored the effect on weight perception and found large differences between participants for sensing change in trigger resistance and thus for discriminating virtual weights. The variations were easily distinguished and associated with weight by some participants while others did not notice them at all. We discuss possible limitations, confounding factors, how to overcome them in future research and the pros and cons of this novel technology.
Trojanized software packages used in software supply chain attacks constitute an emerging threat. Unfortunately, there is still a lack of scalable approaches that allow automated and timely detection of malicious software packages and thus most detections are based on manual labor and expertise. However, it has been observed that most attack campaigns comprise multiple packages that share the same or similar malicious code. We leverage that fact to automatically reproduce manually identified clusters of known malicious packages that have been used in real world attacks, thus, reducing the need for expert knowledge and manual inspection. Our approach, AST Clustering using MCL to mimic Expertise (ACME), yields promising results with a 𝐹1 score of 0.99. Signatures are automatically generated based on characteristic code fragments from clusters and are subsequently used to scan the whole npm registry for unreported malicious packages. We are able to identify and report six malicious packages that have been removed from npm consequentially. Therefore, our approach can support the detection by reducing manual labor and hence may be employed by maintainers of package repositories to detect possible software supply chain attacks through trojanized software packages.
This edited volume on “Recent Advances in Renewable Energy” presents a selection of refereed papers presented at the 1st International Conference on Electrical Systems and Automation. The book provides rigorous discussions, the state of the art, and recent developments in the field of renewable energy sources supported by examples and case studies, making it an educational tool for relevant undergraduate and graduate courses. The book will be a valuable reference for beginners, researchers, and professionals interested in renewable energy.
This book which is the second part of two volumes on ''Control of Electrical and Electronic Systems” presents a compilation of selected contributions to the 1st International Conference on Electrical Systems & Automation. The book provides rigorous discussions, the state of the art, and recent developments in the modelling, simulation and control of power electronics, industrial systems, and embedded systems. The book will be a valuable reference for beginners, researchers, and professionals interested in control of electrical and electronic systems.
Die Digitalisierung und der Einsatz von Informations- und Kommunikationstechnologien (ICT) hat im Arbeits- und Privatleben neben einer höheren Produktivität auch zu neuen Formen von psychischem Stress geführt. Das Stresserleben, das mit dem Einsatz von ICT verbunden ist, wird in der Literatur auch als Technostress bezeichnet. Die Forschung zu diesem Thema zeigt, dass die Entstehung von Technostress von individuellen Faktoren abhängt. Die Persönlichkeit von ICT-Anwenderinnen und Anwendern bestimmt nicht nur das Auftreten von Technostress, sondern hat auch Einfluss auf dessen gesundheitliche und leistungsbezogene Folgen. In diesem Literaturreview wird der Forschungsstand zu der Rolle von Persönlichkeitsunterschieden bei der Entstehung von Technostress und dessen Folgen systematisch zusammengefasst. Die Auswertung der relevanten Forschungsartikel erfolgt hinsichtlich verwendeter Variablen, Stichproben und Studiendesigns, statistischer Methoden, Theorien und Frameworks. Abschließend werden der aktuelle Forschungsstand eingeordnet und Forschungslücken aufgezeigt.
MOTIVATION
The majority of biomedical knowledge is stored in structured databases or as unstructured text in scientific publications. This vast amount of information has led to numerous machine learning-based biological applications using either text through natural language processing (NLP) or structured data through knowledge graph embedding models (KGEMs). However, representations based on a single modality are inherently limited.
RESULTS
To generate better representations of biological knowledge, we propose STonKGs, a Sophisticated Transformer trained on biomedical text and Knowledge Graphs (KGs). This multimodal Transformer uses combined input sequences of structured information from KGs and unstructured text data from biomedical literature to learn joint representations in a shared embedding space. First, we pre-trained STonKGs on a knowledge base assembled by the Integrated Network and Dynamical Reasoning Assembler (INDRA) consisting of millions of text-triple pairs extracted from biomedical literature by multiple NLP systems. Then, we benchmarked STonKGs against three baseline models trained on either one of the modalities (i.e., text or KG) across eight different classification tasks, each corresponding to a different biological application. Our results demonstrate that STonKGs outperforms both baselines, especially on the more challenging tasks with respect to the number of classes, improving upon the F1-score of the best baseline by up to 0.084 (i.e., from 0.881 to 0.965). Finally, our pre-trained model as well as the model architecture can be adapted to various other transfer learning applications.
AVAILABILITY
We make the source code and the Python package of STonKGs available at GitHub (https://github.com/stonkgs/stonkgs) and PyPI (https://pypi.org/project/stonkgs/). The pre-trained STonKGs models and the task-specific classification models are respectively available at https://huggingface.co/stonkgs/stonkgs-150k and https://zenodo.org/communities/stonkgs.
SUPPLEMENTARY INFORMATION
Supplementary data are available at Bioinformatics online.
Self-supervised learning has proved to be a powerful approach to learn image representations without the need of large labeled datasets. For underwater robotics, it is of great interest to design computer vision algorithms to improve perception capabilities such as sonar image classification. Due to the confidential nature of sonar imaging and the difficulty to interpret sonar images, it is challenging to create public large labeled sonar datasets to train supervised learning algorithms. In this work, we investigate the potential of three self-supervised learning methods (RotNet, Denoising Autoencoders, and Jigsaw) to learn high-quality sonar image representation without the need of human labels. We present pre-training and transfer learning results on real-life sonar image datasets. Our results indicate that self-supervised pre-training yields classification performance comparable to supervised pre-training in a few-shot transfer learning setup across all three methods. Code and self-supervised pre-trained models are be available at https://github.com/agrija9/ssl-sonar-images
Vietnam requires a sustainable urbanization, for which city sensing is used in planning and de-cision-making. Large cities need portable, scalable, and inexpensive digital technology for this purpose. End-to-end air quality monitoring companies such as AirVisual and Plume Air have shown their reliability with portable devices outfitted with superior air sensors. They are pricey, yet homeowners use them to get local air data without evaluating the causal effect. Our air quality inspection system is scalable, reasonably priced, and flexible. Minicomputer of the sys-tem remotely monitors PMS7003 and BME280 sensor data through a microcontroller processor. The 5-megapixel camera module enables researchers to infer the causal relationship between traffic intensity and dust concentration. The design enables inexpensive, commercial-grade hardware, with Azure Blob storing air pollution data and surrounding-area imagery and pre-venting the system from physically expanding. In addition, by including an air channel that re-plenishes and distributes temperature, the design improves ventilation and safeguards electrical components. The gadget allows for the analysis of the correlation between traffic and air quali-ty data, which might aid in the establishment of sustainable urban development plans and poli-cies.
Fatigue strength estimation is a costly manual material characterization process in which state-of-the-art approaches follow a standardized experiment and analysis procedure. In this paper, we examine a modular, Machine Learning-based approach for fatigue strength estimation that is likely to reduce the number of experiments and, thus, the overall experimental costs. Despite its high potential, deployment of a new approach in a real-life lab requires more than the theoretical definition and simulation. Therefore, we study the robustness of the approach against misspecification of the prior and discretization of the specified loads. We identify its applicability and its advantageous behavior over the state-of-the-art methods, potentially reducing the number of costly experiments.
Robust Identification and Segmentation of the Outer Skin Layers in Volumetric Fingerprint Data
(2022)
Despite the long history of fingerprint biometrics and its use to authenticate individuals, there are still some unsolved challenges with fingerprint acquisition and presentation attack detection (PAD). Currently available commercial fingerprint capture devices struggle with non-ideal skin conditions, including soft skin in infants. They are also susceptible to presentation attacks, which limits their applicability in unsupervised scenarios such as border control. Optical coherence tomography (OCT) could be a promising solution to these problems. In this work, we propose a digital signal processing chain for segmenting two complementary fingerprints from the same OCT fingertip scan: One fingerprint is captured as usual from the epidermis (“outer fingerprint”), whereas the other is taken from inside the skin, at the junction between the epidermis and the underlying dermis (“inner fingerprint”). The resulting 3D fingerprints are then converted to a conventional 2D grayscale representation from which minutiae points can be extracted using existing methods. Our approach is device-independent and has been proven to work with two different time domain OCT scanners. Using efficient GPGPU computing, it took less than a second to process an entire gigabyte of OCT data. To validate the results, we captured OCT fingerprints of 130 individual fingers and compared them with conventional 2D fingerprints of the same fingers. We found that both the outer and inner OCT fingerprints were backward compatible with conventional 2D fingerprints, with the inner fingerprint generally being less damaged and, therefore, more reliable.