Refine
H-BRS Bibliography
- yes (61) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (33)
- Institute of Visual Computing (IVC) (16)
- Fachbereich Ingenieurwissenschaften und Kommunikation (11)
- Fachbereich Angewandte Naturwissenschaften (9)
- Fachbereich Wirtschaftswissenschaften (5)
- Institut für Cyber Security & Privacy (ICSP) (3)
- Institut für Sicherheitsforschung (ISF) (3)
- Institut für funktionale Gen-Analytik (IFGA) (3)
- Sprachenzentrum (1)
Document Type
- Conference Object (27)
- Article (21)
- Report (4)
- Bachelor Thesis (2)
- Book (monograph, edited volume) (2)
- Part of a Book (2)
- Preprint (2)
- Conference Proceedings (1)
Year of publication
- 2010 (61) (remove)
Language
- English (61) (remove)
Has Fulltext
- no (61) (remove)
Keywords
- Human-Robot Interaction (2)
- Malaria (2)
- Acceptance (1)
- Accuracy (1)
- Actuator and Sensor Systems (1)
- AdoMETDC (1)
- Analysis of Bond Graph Models (1)
- Automated Modelling (1)
- Automotive Systems (1)
- Blob Detection (1)
Green IT is one of the most recent buzzwords in the IT business. Often it is considered as the key to all future IT problems by one half of IT experts and as an overestimated hype by the other half. Green IT aims to integrate information and communication technologies into a business wide sustainability strategy without any productivity drawbacks. It includes measures and tactics to reduce the IT's environmental impact e.g. by reducing the power consumption and using energy from renewable sources, and by using technologies such as virtualisation.
Low Cost Displays
(2010)
Bond Graph Methodology
(2010)
Nowadays, engineering systems are becoming increasingly complex and, for design purposes, must be considered as multidisciplinary systems made up of components from different engineering disciplines. With regard to the systematic development and the analysis of models, interdisciplinary methodologies supported by software become more and more important. Bond graphs are a graphical description formalism particularly suited for multidisciplinary systems and used by modellers across the world.
Bond Graph Methodology gives a comprehensive, in-depth representation of the state of the art, including recent results gathered from research articles, dissertations and contributions by the author on a number of topics. The structured and rigorous presentation systematically covers model development, analysis of models, numerical computation of models and modern software that can be used for a bond graph approach. The book also includes a range of case studies illustrating various applications of the methodology and provides a glossary.
Bond Graph Methodology addresses fundamentals, as well as advanced topics, e.g., models of variable structure, bond graphs for sensitivity analysis and generation of equations for the study of robustness. The compilation and presentation of the material has been inspired by the author's extensive experience in research and teaching.
A useful text for advanced courses in modelling, simulation and control, Bond Graph Methodology can also be used for self-study. It has been designed to serve readers interested in the subject of bond graph modelling and those with expertise in related areas, as well as members of the worldwide community of bond graph modellers.
On an Integration of an Information Security Management System into an Enterprise Architecture
(2010)
This ICB Research Report constitutes the proceedings of the following four workshops which were held on Tuesday, 29th June 2010 as part of the Requirements Engineering: Foundation for Software Quality (REFSQ) conference 2010 at the University of Duisburg-Essen. First Workshop on Creativity in Requirements Engineering (CreaRE). First International Workshop on Product Line Requirements Engineering and Quality (PLREQ). First Workshop on Requirements Prioritization for customer-oriented Software-Development (RePriCo). First Workshop on Requirements Engineering in Small Companies (RESC).
In the past RE research targeted mainly the needs of RE practice in the context of larger enterprises. However, Small and Medium Enterprises (SME) develop, customize and maintain a considerable part of software. Often, these companies are unable to apply RE methods and techniques without modifications. Besides, shortcomings in applying RE methods due to time constraints or limited resources may arise.
We report on submillimetre bolometer observations of the isolated neutron star RX J1856.5−3754 using the Large Apex Bolometer Camera bolometer array on the Atacama Pathfinder Experiment telescope. No cold dust continuum emission peak at the position of RX J1856.5−3754 was detected. The 3σ flux density upper limit of 5 mJy translates into a cold dust mass limit of a few earth masses. We use the new submillimetre limit, together with a previously obtained H-band limit, to constrain the presence of a gaseous, circumpulsar disc. Adopting a simple irradiated disc model, we obtain a mass accretion limit of Graphic and a maximum outer disc radius of ∼1014 cm. By examining the projected proper motion of RX J1856.5−3754, we speculate about a possible encounter of the neutron star with a dense fragment of the CrA molecular cloud a few thousand years ago.
As competition for tourists becomes more global, understanding and accommodating the needs of international tourists, with their different cultural backgrounds, has become increasingly important. This study highlights the variations in tourist industry service--particularly as they relate to different cultures. Specifically, service failures experienced by Japanese and German tourists in the U.S. were categorized using the Critical Incident Technique (CIT). The results were compared with earlier studies of service failures experienced by American consumers in the tourist industry. The sample consists of 128 Japanese and 94 “Germanic” (German, Austrian, Swiss-German) respondents. The Japanese and German sample rated “Inappropriate employee behavior” most significant category of service failure. More than half of these respondents said that, because of the failure, they would avoid the offending U.S. business. This is a much stronger response than an American sample had reported in an earlier study. The implications for managers and researchers are discussed.
Microcontroller-based sensor systems offer great opportunities for the implementation of safety features for potentially dangerous machinery. However, in general they are difficult to assess with regard to their reliability and failure rate. This paper describes the safety assessment of hardware and software of a new and innovative sensor system. The hardware is assessed by standardized methods according to norm EN ISO 13849-1, while the use of model checking is presented as an approach to solve the problem of validating the software.
In this paper, we introduce an optical sensor system, which is integrated into an industrial push-button. The sensor allows to classify the type of material that is in contact with the button when pressed into different material categories on the basis of the material's so called "spectral signature". An approach for a safety sensor system at circular table saws on the same base has been introduced previously on SIAS-2007. This contactless working sensor is able to distinguish reliably between skin, textiles, leather and various other kinds of materials. A typical application for this intelligent push-button is the use at possibly dangerous machines, whose operating instructions include either the prohibition or the obligation to wear gloves during the work at the machine. An exemple of machines at which no gloves are allowed are pillar drilling machines, because of the risk of getting caught in the drill chuck and being turned in by the machine. In many cases this causes very serious hand injuries. Depending on the application needs, the sensor system integrated into the push-button can be configured flexibly by software to prevent the operator from accidentally starting a machine with or without gloves, which can decrease the risk of severe accidents significantly. Especially two-hand controls are incentive to manipulation for easier handling. By equipping both push-buttons of a two-hand control with material classification properties, the user is forced to operate the controls with his bare fingers. That limitation disallows the manipulation of a two-hand control by a simple rodding device.