Refine
H-BRS Bibliography
- yes (146) (remove)
Departments, institutes and facilities
- Fachbereich Informatik (73)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (32)
- Fachbereich Angewandte Naturwissenschaften (29)
- Fachbereich Ingenieurwissenschaften und Kommunikation (29)
- Institute of Visual Computing (IVC) (24)
- Fachbereich Wirtschaftswissenschaften (13)
- Institut für Cyber Security & Privacy (ICSP) (11)
- Institut für funktionale Gen-Analytik (IFGA) (10)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (9)
- Institut für Verbraucherinformatik (IVI) (7)
Document Type
- Conference Object (79)
- Article (46)
- Part of a Book (5)
- Report (4)
- Doctoral Thesis (3)
- Part of Periodical (2)
- Preprint (2)
- Working Paper (2)
- Book (monograph, edited volume) (1)
- Lecture (1)
- Master's Thesis (1)
Year of publication
- 2015 (146) (remove)
Language
- English (146) (remove)
Keywords
- Eco-Feedback (4)
- FPGA (3)
- Sustainable Interaction Design (3)
- Workplace (3)
- 802.11 (2)
- Crisis Communication (2)
- Development Policy (2)
- Education (2)
- Issues Monitoring (2)
- Organizational Culture (2)
We present GEM-NI -- a graph-based generative-design tool that supports parallel exploration of alternative designs. Producing alternatives is a key feature of creative work, yet it is not strongly supported in most extant tools. GEM-NI enables various forms of exploration with alternatives such as parallel editing, recalling history, branching, merging, comparing, and Cartesian products of and for alternatives. Further, GEM-NI provides a modal graphical user interface and a design gallery, which both allow designers to control and manage their design exploration. We conducted an exploratory user study followed by in-depth one-on-one interviews with moderately and highly skills participants and obtained positive feedback for the system features, showing that GEM-NI supports creative design work well.
Binary relations with certain properties such as biorders, equivalences or difunctional relations can be represented as particular matrices. In order for these properties to be identified usually a rearrangement of rows and columns is required in order to reshape it into a recognisable normal form. Most algorithms performing these transformations are working on binary matrix representations of the underlying relations. This paper presents an approach to use the RLE-compressed matrix representation as a data structure for storing relations to test whether they are biorders in a hopefully more efficient way.
IT-accessiblity is often treated as an orphan in companies. Even though the proportion of disabled people is substantial and people become older and more susceptible to disabilities. Besides cost factors, companies often do not have a plan how to implement and control IT-accessibility successfully. However, most companies are familiar with IT-maturity frameworks to evaluate and improve their own IT-infrastructure. It would facilitate dealing with IT-accessibility, if IT-maturity frameworks consider IT-accessibility and provide recommendations and solutions for a successful implementation. Therefore, this article conducts a review of an acknowledged IT-maturity framework with regard to its capability to enable implementation of IT-accessibility in an organization. The first part of this article will illustrate the motivation and background for the authors concern with such a topic. Afterwards the authors will introduce the reader to the reviewed IT-maturity framework and provide basic knowledge on IT-accessibility. The main part of the article will deal with the review of the applied IT-maturity framework and outline examples of critical capabilities for successfully implementing IT-accessibility in an organization. The final section will derive implications and close with planned future research activities in this field.
Understanding the Internet of Things: A Conceptualisation of Business-to-Thing (B2T) Interactions
(2015)
Work in progress: Starter-project for first semester students to survey their engineering studies
(2015)
The central theme of the 2014 Annual Report is human thinking.
In an interview, University President Hartmut Ihne and 3Sat moderator Gert Scobel discuss the concept of thought: "Should we be allowed to give up our autonomy voluntarily?"
Our university’s Language Centre Director James Chamberlain examines to what extent thinking varies in different languages.
Professor Paul Plöger from the Department of Computer Science explains why robots have tremendous problems understanding complex relationships in open environments.
Rather than focusing solely on our university’s future, the Annual Report links the fascinating theme to the enormous variety of life, research and tuition offered by H-BRS.
Background: Falls and fall-related injuries are a serious public health issue. Exercise programs can effectively reduce fall risk in older people. The iStoppFalls project developed an Information and Communication Technology-based system to deliver an unsupervised exercise program in older people’s homes. The primary aims of the iStoppFalls randomized controlled trial were to assess the feasibility (exercise adherence, acceptability and safety) of the intervention program and its effectiveness on common fall risk factors.
Methods: A total of 153 community-dwelling people aged 65+ years took part in this international, multicentre, randomized controlled trial. Intervention group participants conducted the exercise program for 16 weeks, with a recommended duration of 120 min/week for balance exergames and 60 min/week for strength exercises. All intervention and control participants received educational material including advice on a healthy lifestyle and fall prevention. Assessments included physical and cognitive tests, and questionnaires for health, fear of falling, number of falls, quality of life and psychosocial outcomes.
Results: The median total exercise duration was 11.7 h (IQR = 22.0) over the 16-week intervention period. There were no adverse events. Physiological fall risk (Physiological Profile Assessment, PPA) reduced significantly more in the intervention group compared to the control group (F1,127 = 4.54, p = 0.035). There was a significant three-way interaction for fall risk assessed by the PPA between the high-adherence (>90 min/week; n = 18, 25.4 %), low-adherence (<90 min/week; n = 53, 74.6 %) and control group (F2,125 = 3.12, n = 75, p = 0.044). Post hoc analysis revealed a significantly larger effect in favour of the high-adherence group compared to the control group for fall risk (p = 0.031), postural sway (p = 0.046), stepping reaction time (p = 0.041), executive functioning (p = 0.044), and quality of life (p for trend = 0.052).
Conclusions: The iStoppFalls exercise program reduced physiological fall risk in the study sample. Additional subgroup analyses revealed that intervention participants with better adherence also improved in postural sway, stepping reaction, and executive function.
Advanced driver assistance systems (ADAS) are technology systems and devices designed as an aid to the driver of a vehicle. One of the critical components of any ADAS is the traffic sign recognition module. For this module to achieve real-time performance, some preprocessing of input images must be done, which consists of a traffic sign detection (TSD) algorithm to reduce the possible hypothesis space. Performance of TSD algorithm is critical.
One of the best algorithms used for TSD is the Radial Symmetry Detector (RSD), which can detect both Circular [7] and Polygonal traffic signs [5]. This algorithm runs in real-time on high end personal computers, but computational performance of must be improved in order to be able to run in real-time in embedded computer platforms.
To improve the computational performance of the RSD, we propose a multiscale approach and the removal of a gaussian smoothing filter used in this algorithm. We evaluate the performance on both computation times, detection and false positive rates on a synthetic image dataset and on the german traffic sign detection benchmark [29].
We observed significant speedups compared to the original algorithm. Our Improved Radial Symmetry Detector is up to 5.8 times faster than the original on detecting Circles, up to 3.8 times faster on Triangle detection, 2.9 times faster on Square detection and 2.4 times faster on Octagon detection. All of this measurements were observed with better detection and false positive rates than the original RSD.
When evaluated on the GTSDB, we observed smaller speedups, in the range of 1.6 to 2.3 times faster for Circle and Regular Polygon detection, but for Circle detection we observed a decreased detection rate than the original algorithm, while for Regular Polygon detection we always observed better detection rates. False positive rates were high, in the range of 80% to 90%.
We conclude that our Improved Radial Symmetry Detector is a significant improvement of the Radial Symmetry Detector, both for Circle and Regular polygon detection. We expect that our improved algorithm will lead the way to obtain real-time traffic sign detection and recognition in embedded computer platforms.
Hand speed is particularly important in boxing both for protection against incoming blows and delivering blows. Sixteen amateur boxers (10 male, 6 female) with varying levels of experience from a boxing gym performed 20 jabs and 20 cross punches in air. The movement was recorded with a small wrist mounted accelerometer under the glove. The maximum velocity of each punch was determined from the RMS acceleration profile. The mean values of the jab maximal velocity was higher than the cross maximal velocity for 9 participants. The cross showed some dependence on reach (Spearman's correlation coefficient r = 0.57) and the jab dependence on experience (Spearman's correlation coefficient r = 0.56). The accelerometer technique has some promise for routine assessment of fist speed.
Over the past two decades many governments of low and middle income countries have started to introduce social protection measures or to extend the coverage and improve the functioning of public social protection systems. These reforms are a "global phenomenon" and can be observed in many African, Asian and Latin American countries. This paper focuses on international determinants for policy change within social protection by assessing the state of the art of both policy diffusion and policy transfer studies. Empirical studies of policy transfer and diffusion in the field of social protection are furthermore assessed in light of the theoretical background.
TinyECC 2.0 is an open source library for Elliptic Curve Cryptography (ECC) in wireless sensor networks. This paper analyzes the side channel susceptibility of TinyECC 2.0 on a LOTUS sensor node platform. In our work we measured the electromagnetic (EM) emanation during computation of the scalar multiplication using 56 different configurations of TinyECC 2.0. All of them were found to be vulnerable, but to a different degree. The different degrees of leakage include adversary success using (i) Simple EM Analysis (SEMA) with a single measurement, (ii) SEMA using averaging, and (iii) Multiple-Exponent Single-Data (MESD) with a single measurement of the secret scalar. It is extremely critical that in 30 TinyECC 2.0 configurations a single EM measurement of an ECC private key operation is sufficient to simply read out the secret scalar. MESD requires additional adversary capabilities and it affects all TinyECC 2.0 configurations, again with only a single measurement of the ECC private key operation. These findings give evidence that in security applications a configuration of TinyECC 2.0 should be chosen that withstands SEMA with a single measurement and, beyond that, an addition of appropriate randomizing countermeasures is necessary.
The paper examines the effectiveness of transgovernmental policy networks as a governance structure for policy diffusion. The analysis is based on a survey including 50 social protection policy maker and technical practitioner who are country delegates to transgovernmental policy networks within the policy area of social protection. The paper provides anecdotal empirical evidence that policy networks contribute to policy diffusion by inducing mutual learning processes.
Communicating Sequential Processes (CSP) [7] is a calculus for concurrent systems that has been the basis of subject-oriented business process management (S-BPM) [4]. We use CSPm -- a machine readable dialect of CSP -- to create a sequence of models for a case study on an "Automated Teller Machine" [1]. We use the refinement checker FDR2 to prove that certain models are correct implementations of specifications.