Refine
H-BRS Bibliography
- yes (146) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (73)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (32)
- Fachbereich Angewandte Naturwissenschaften (29)
- Fachbereich Ingenieurwissenschaften und Kommunikation (29)
- Institute of Visual Computing (IVC) (24)
- Fachbereich Wirtschaftswissenschaften (13)
- Institut für Cyber Security & Privacy (ICSP) (11)
- Institut für funktionale Gen-Analytik (IFGA) (10)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (9)
- Institut für Verbraucherinformatik (IVI) (7)
- Institut für Sicherheitsforschung (ISF) (4)
- Graduierteninstitut (3)
- Institut für Detektionstechnologien (IDT) (1)
- Präsidium (1)
- Sprachenzentrum (1)
- Stabsstelle Kommunikation und Marketing (1)
- Zentrum für Wissenschafts- und Technologietransfer (ZWT) (1)
Document Type
- Conference Object (79)
- Article (46)
- Part of a Book (5)
- Report (4)
- Doctoral Thesis (3)
- Part of Periodical (2)
- Preprint (2)
- Working Paper (2)
- Book (monograph, edited volume) (1)
- Lecture (1)
Year of publication
- 2015 (146) (remove)
Language
- English (146) (remove)
Keywords
- Eco-Feedback (4)
- FPGA (3)
- Sustainable Interaction Design (3)
- Workplace (3)
- 802.11 (2)
- Crisis Communication (2)
- Development Policy (2)
- Education (2)
- Issues Monitoring (2)
- Organizational Culture (2)
Fundamentals of Energy Meteorology - Influence of atmospheric parameters on solar energy production
(2015)
Mesenchymal stem cells (MSCs) are an attractive cell source for Regenerative Dentistry in particular due to their ability to differentiate towards osteoblasts, among other lineages. Tooth and jaw bone loss are frequent sequelae of traumatic and pathological conditions in both the young and the elderly and must be met by appropriate prosthetic replacements. For successful osseointegration of the dental implant a sufficient bone level is necessary. Besides the utilization of bone autografts or synthetic biomaterials, medical research is more and more focused on the utilization of MSCs. Compared to cells obtained from liposuction material, ectomesenchymal stem cells derived from the head area e.g. out of dental follicles or particulate, non-vascularized bone chips show a higher differentiation potential towards osteoblasts.
It is know that mesenchymal stem cells (MSCs) actively secretemultiple biologically-active factors during their process of differentiation which gives rise to a variey of cytotypes including bone and fatcells. It is also acknowledged that the chemokines secreted throughoutMSC differentiation may play an important role in the development and growth of tumor cells, although literature data appear somewhat indeterminate due to the contradictory evidence often found.
Background: Falls and fall-related injuries are a serious public health issue. Exercise programs can effectively reduce fall risk in older people. The iStoppFalls project developed an Information and Communication Technology-based system to deliver an unsupervised exercise program in older people’s homes. The primary aims of the iStoppFalls randomized controlled trial were to assess the feasibility (exercise adherence, acceptability and safety) of the intervention program and its effectiveness on common fall risk factors.
Methods: A total of 153 community-dwelling people aged 65+ years took part in this international, multicentre, randomized controlled trial. Intervention group participants conducted the exercise program for 16 weeks, with a recommended duration of 120 min/week for balance exergames and 60 min/week for strength exercises. All intervention and control participants received educational material including advice on a healthy lifestyle and fall prevention. Assessments included physical and cognitive tests, and questionnaires for health, fear of falling, number of falls, quality of life and psychosocial outcomes.
Results: The median total exercise duration was 11.7 h (IQR = 22.0) over the 16-week intervention period. There were no adverse events. Physiological fall risk (Physiological Profile Assessment, PPA) reduced significantly more in the intervention group compared to the control group (F1,127 = 4.54, p = 0.035). There was a significant three-way interaction for fall risk assessed by the PPA between the high-adherence (>90 min/week; n = 18, 25.4 %), low-adherence (<90 min/week; n = 53, 74.6 %) and control group (F2,125 = 3.12, n = 75, p = 0.044). Post hoc analysis revealed a significantly larger effect in favour of the high-adherence group compared to the control group for fall risk (p = 0.031), postural sway (p = 0.046), stepping reaction time (p = 0.041), executive functioning (p = 0.044), and quality of life (p for trend = 0.052).
Conclusions: The iStoppFalls exercise program reduced physiological fall risk in the study sample. Additional subgroup analyses revealed that intervention participants with better adherence also improved in postural sway, stepping reaction, and executive function.
The latest advances in the field of smart card technologies allow modern cards to be more than just simple security tokens. Recent developments facilitate the use of interactive components like buttons, displays or even touch-sensors within the card's body thus conquering whole new areas of application. With interactive functionalities the usability aspect becomes the most important one for designing secure and popularly accepted products. Unfortunately, the usability can only be tested fully with completely integrated hence expensive smart card prototypes. This restricts severely application specific research, case studies of new smart card user interfaces and the optimization of design aspects, as well as hardware requirements by making usability and acceptance tests in smart card development very costly and time-consuming. Rapid development and simulation of smart card interfaces and applications can help to avoid this restriction. This paper presents a rapid development process for new smart card interfaces and applications based on common smartphone technology using a tool called SCUID^Sim. We will demonstrate the variety of usability aspects that can be analyzed with such a simulator by discussing some selected example projects.
Secure vehicular communication has been discussed over a long period of time. Now,- this technology is implemented in different Intelligent Transportation System (ITS) projects in europe. In most of these projects a suitable Public Key Infrastructure (PKI) for a secure communication between involved entities in a Vehicular Ad hoc Network (VANET) is needed. A first proposal for a PKI architecture for Intelligent Vehicular Systems (IVS PKI) is given by the car2car communication consortium. This architecture however mainly deals with inter vehicular communication and is less focused on the needs of Road Side Units. Here, we propose a multi-domain PKI architecture for Intelligent Transportation Systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, today. The PKI domains are cryptographically linked based on local trust lists. In addition, a crypto agility concept is suggested, which takes adaptation of key length and cryptographic algorithms during PKI operation into account.
Introduction: After cellulose, lignin represents the most abundant biopolymer on earth that accounts for up to 18-35 % by weight of lignocellulose biomass. Today, it is a by-product of the paper and pulping industry. Although lignin is available in huge amounts, mainly in form of so called black liquor produced via Kraft-pulping, processes for the valorization of lignin are still limited [1]. Due to its hyperbranched polyphenol-like structure, lignin gained increasing interest as biobased building block for polymer synthesis [2]. The present work is focused on extraction and purification of lignin from industrial black liquor and synthesis of lignin-based polyurethanes.
Semantic Image Segmentation Combining Visible and Near-Infrared Channels with Depth Information
(2015)
Image understanding is a vital task in computer vision that has many applications in areas such as robotics, surveillance and the automobile industry. An important precondition for image understanding is semantic image segmentation, i.e. the correct labeling of every image pixel with its corresponding object name or class. This thesis proposes a machine learning approach for semantic image segmentation that uses images from a multi-modal camera rig. It demonstrates that semantic segmentation can be improved by combining different image types as inputs to a convolutional neural network (CNN), when compared to a single-image approach. In this work a multi-channel near-infrared (NIR) image, an RGB image and a depth map are used. The detection of people is further improved by using a skin image that indicates the presence of human skin in the scene and is computed based on NIR information. It is also shown that segmentation accuracy can be enhanced by using a class voting method based on a superpixel pre-segmentation. Models are trained for 10-class, 3-class and binary classification tasks using an original dataset. Compared to the NIR-only approach, average class accuracy is increased by 7% for 10-class, and by 22% for 3-class classification, reaching a total of 48% and 70% accuracy, respectively. The binary classification task, which focuses on the detection of people, achieves a classification accuracy of 95% and true positive rate of 66%. The report at hand describes the proposed approach and the encountered challenges and shows that a CNN can successfully learn and combine features from multi-modal image sets and use them to predict scene labeling.
TinyECC 2.0 is an open source library for Elliptic Curve Cryptography (ECC) in wireless sensor networks. This paper analyzes the side channel susceptibility of TinyECC 2.0 on a LOTUS sensor node platform. In our work we measured the electromagnetic (EM) emanation during computation of the scalar multiplication using 56 different configurations of TinyECC 2.0. All of them were found to be vulnerable, but to a different degree. The different degrees of leakage include adversary success using (i) Simple EM Analysis (SEMA) with a single measurement, (ii) SEMA using averaging, and (iii) Multiple-Exponent Single-Data (MESD) with a single measurement of the secret scalar. It is extremely critical that in 30 TinyECC 2.0 configurations a single EM measurement of an ECC private key operation is sufficient to simply read out the secret scalar. MESD requires additional adversary capabilities and it affects all TinyECC 2.0 configurations, again with only a single measurement of the ECC private key operation. These findings give evidence that in security applications a configuration of TinyECC 2.0 should be chosen that withstands SEMA with a single measurement and, beyond that, an addition of appropriate randomizing countermeasures is necessary.
This paper proposes an Artificial Plasmodium Algorithm (APA) mimicked a contraction wave of a plasmodium of physarum polucephalum. Plasmodia can live using the contracion wave in their body to communicate to others and transport a nutriments. In the APA, each plasmodium has two information as the wave information: the direction and food index. We apply APA to a maze solving and route planning of road map.
In this paper, a set of micro-benchmarks is proposed to determine basic performance parameters of single-node mainstream hardware architectures for High Performance Computing. Performance parameters of recent processors, including those of accelerators, are determined. The investigated systems are Intel server processor architectures as well as the two accelerator lines Intel Xeon Phi and Nvidia graphic processors. Results show similarities for some parameters between all architectures, but significant differences for others.
Persons entering the working range of industrial robots are exposed to a high risk of collision with moving parts of the system, potentially causing severe injuries. Conventional systems, which restrict the access to this area, range from walls and fences to light barriers and other vision based protective devices (VBPD). None of these systems allow to distinguish between humans and workpieces in a safe and reliable manner. In this work, a new approach is investigated, which uses an active near-infrared (NIR) camera system with advanced capabilities of skin detection to distinguish humans from workpieces based on characteristic spectral signatures. This approach allows to implement more intelligent muting processes and at the same time increases the safety of persons working close to the robots. The conceptual integration of such a camera system into a VBPD and the enhancement of person detection methods through skin detection are described and evaluated in this paper. Based upon this work, next steps could be the development of multimodal sensor systems to safeguard working ranges of collaborating robots using the described camera system.
Manufacturers of machinery are increasingly using application programming of safety controls in order to implement safety functions. The EN ISO 13849-1 and EN 62061 standards define requirements concerning the development of software employed for safety functions. The IFA began addressing the subject of safety-related application software many years ago. Between 2011 and 2013, Project FF-FP0319 concerning standardscompliant development and documentation of safetyrelated user software in machine construction was successfully completed at the Bonn-Rhein-Sieg University of Applied Sciences in conjunction with numerous partner bodies from the machine construction sector and with funding from the DGUV. For this purpose, a procedure – the IFA matrix method – was developed, and evaluated and documented with reference to examples from industry, for implementation of the requirements concerning the development of software for machine safety functions. This paper provides insights into both the IFA matrix method and the new IFA report on the subject, and with information on what further tools are planned.