Refine
H-BRS Bibliography
- yes (42)
Departments, institutes and facilities
- Fachbereich Informatik (42) (remove)
Document Type
- Conference Object (27)
- Article (6)
- Report (5)
- Preprint (2)
- Book (monograph, edited volume) (1)
- Conference Proceedings (1)
Year of publication
- 2010 (42) (remove)
Has Fulltext
- no (42)
Keywords
- Human-Robot Interaction (2)
- Navigation (2)
- Sicherheitslücke (2)
- Acceptance (1)
- Accuracy (1)
- Analysis of Bond Graph Models (1)
- Automated Modelling (1)
- Blob Detection (1)
- Bond graph modelling (1)
- Bondgraph (1)
Publikation von Umweltdaten
(2010)
Bond Graph Methodology
(2010)
Nowadays, engineering systems are becoming increasingly complex and, for design purposes, must be considered as multidisciplinary systems made up of components from different engineering disciplines. With regard to the systematic development and the analysis of models, interdisciplinary methodologies supported by software become more and more important. Bond graphs are a graphical description formalism particularly suited for multidisciplinary systems and used by modellers across the world.
Bond Graph Methodology gives a comprehensive, in-depth representation of the state of the art, including recent results gathered from research articles, dissertations and contributions by the author on a number of topics. The structured and rigorous presentation systematically covers model development, analysis of models, numerical computation of models and modern software that can be used for a bond graph approach. The book also includes a range of case studies illustrating various applications of the methodology and provides a glossary.
Bond Graph Methodology addresses fundamentals, as well as advanced topics, e.g., models of variable structure, bond graphs for sensitivity analysis and generation of equations for the study of robustness. The compilation and presentation of the material has been inspired by the author's extensive experience in research and teaching.
A useful text for advanced courses in modelling, simulation and control, Bond Graph Methodology can also be used for self-study. It has been designed to serve readers interested in the subject of bond graph modelling and those with expertise in related areas, as well as members of the worldwide community of bond graph modellers.
On an Integration of an Information Security Management System into an Enterprise Architecture
(2010)
This ICB Research Report constitutes the proceedings of the following four workshops which were held on Tuesday, 29th June 2010 as part of the Requirements Engineering: Foundation for Software Quality (REFSQ) conference 2010 at the University of Duisburg-Essen. First Workshop on Creativity in Requirements Engineering (CreaRE). First International Workshop on Product Line Requirements Engineering and Quality (PLREQ). First Workshop on Requirements Prioritization for customer-oriented Software-Development (RePriCo). First Workshop on Requirements Engineering in Small Companies (RESC).
In the past RE research targeted mainly the needs of RE practice in the context of larger enterprises. However, Small and Medium Enterprises (SME) develop, customize and maintain a considerable part of software. Often, these companies are unable to apply RE methods and techniques without modifications. Besides, shortcomings in applying RE methods due to time constraints or limited resources may arise.
Microcontroller-based sensor systems offer great opportunities for the implementation of safety features for potentially dangerous machinery. However, in general they are difficult to assess with regard to their reliability and failure rate. This paper describes the safety assessment of hardware and software of a new and innovative sensor system. The hardware is assessed by standardized methods according to norm EN ISO 13849-1, while the use of model checking is presented as an approach to solve the problem of validating the software.
In this paper, we introduce an optical sensor system, which is integrated into an industrial push-button. The sensor allows to classify the type of material that is in contact with the button when pressed into different material categories on the basis of the material's so called "spectral signature". An approach for a safety sensor system at circular table saws on the same base has been introduced previously on SIAS-2007. This contactless working sensor is able to distinguish reliably between skin, textiles, leather and various other kinds of materials. A typical application for this intelligent push-button is the use at possibly dangerous machines, whose operating instructions include either the prohibition or the obligation to wear gloves during the work at the machine. An exemple of machines at which no gloves are allowed are pillar drilling machines, because of the risk of getting caught in the drill chuck and being turned in by the machine. In many cases this causes very serious hand injuries. Depending on the application needs, the sensor system integrated into the push-button can be configured flexibly by software to prevent the operator from accidentally starting a machine with or without gloves, which can decrease the risk of severe accidents significantly. Especially two-hand controls are incentive to manipulation for easier handling. By equipping both push-buttons of a two-hand control with material classification properties, the user is forced to operate the controls with his bare fingers. That limitation disallows the manipulation of a two-hand control by a simple rodding device.
This work presents a person independent pointing gesture recognition application. It uses simple but effective features for the robust tracking of the head and the hand of the user in an undefined environment. The application is able to detect if the tracking is lost and can be reinitialized automatically. The pointing gesture recognition accuracy is improved by the proposed fingertip detection algorithm and by the detection of the width of the face. The experimental evaluation with eight different subjects shows that the overall average pointing gesture recognition rate of the system for distances up to 250 cm (head to pointing target) is 86.63% (with a distance between objects of 23 cm). Considering just frontal pointing gestures for distances up to 250 cm the gesture recognition rate is 90.97% and for distances up to 194 cm even 95.31%. The average error angle is 7.28◦.
Threat Modeling ermöglicht als heuristisches Verfahren die methodische Überprüfung eines Systementwurfs oder einer Softwarearchitektur, um Sicherheitslücken kostengünstig und frühzeitig - idealerweise in der Design Phase - im Software-Entwicklungsprozess zu identifizieren, einzugrenzen und zu beheben. Threat Modeling lässt sich aber auch noch erfolgreich in der Verifikationsphase oder noch später - nach dem Release - zur Auditierung der Software einsetzen. Durch die Früherkennung von Sicherheitslücken können die Kosten zur Behebung bis auf ein Hundertstel reduziert werden. Die auf dem Markt verfügbaren Threat Modeling Tools werden identifiziert, analysiert und hinsichtlich Ihrer Eignung zur Erstellung komplexer, vollständiger Threat Models mit entwickelten Bewertungsparametern einem einfachen Bewertungsverfahren unterworfen.
In Mixed Reality (MR) Environments, the user's view is augmented with virtual, artificial objects. To visualize virtual objects, the position and orientation of the user's view or the camera is needed. Tracking of the user's viewpoint is an essential area in MR applications, especially for interaction and navigation. In present systems, the initialization is often complex. For this reason, we introduce a new method for fast initialization of markerless object tracking. This method is based on Speed Up Robust Features and paradoxically on a traditional marker-based library. Most markerless tracking algorithms can be divided into two parts: an offline and an online stage. The focus of this paper is optimization of the offline stage, which is often time-consuming.
Reversible logic synthesis is an emerging research topic with different application areas like low-power CMOS design, quantum- and optical computing. The key motivation behind reversible logic synthesis is the optimization of the heat dissipation problem current architectures show, by reducing it to theoretically zero [2].
This contribution presents an easy to implement 3D tracking approach that works with a single standard webcam. We describe the algorithm and show that it is well suited for being used as an intuitive interaction method in 3D video games. The algorithm can detect and distinguish multiple objects in real-time and obtain their orientation and position relative to the camera. The trackable objects are equipped with planar patterns of five visual markers. By tracking (stereo) glasses worn by the user and adjusting the in-game camera's viewing frustum accordingly, the well-known immersive "screen as a window" effect can be achieved, even without the use of any special tracking equipment.
The perceived distance of self motion induced in a stationary observer by optic flow is overestimated (Redlick et al., Vis Res. 2001 41: 213). Here we assessed how different components of translational optic flow contribute to perceived distance traveled. Subjects sat on a stationary bicycle in front of a virtual reality display that extended beyond 90deg on each side. They monocularly viewed a target presented in a virtual hallway wallpapered with stripes that changed colour to prevent tracking individual stripes. Subjects then looked centrally or 30, 60 or 90° eccentrically while their view was restricted to an ellipse with faded edges (25 x 42deg) centered on their fixation. Subjects judged when they had reached the target’s remembered position. Perceptual gain (perceived/actual distance traveled) was highest when subjects were looking in a direction that depended on the simulated speed of motion. Results were modeled as the sum of separate mechanisms sensitive to radial and laminar optic flow. In our display distances were perceived as compressed. However, there was no correlation between perceptual compression and perceived speed of motion. These results suggest that visually induced self motion in virtual displays can be subject to large but predictable error.
Zentrale Archivierung und verteilte Kommunikation digitaler Bilddaten in der Pneumokoniosevorsorge
(2010)
Pneumokoniose-Vorsorgeuntersuchungen erfordern die Befundung einer Röntgenthoraxaufnahme nach ILO-Staublungenklassifikation. Inzwischen werden die benötigten Aufnahmen bereits in großem Umfang digital angefertigt und kommuniziert. Hierdurch entstehen neue Anforderungen an verwendete Technik und Workflow-Mechanismen, um einen effizienten Ablauf von Untersuchung, Befundung und Dokumentation zu gewährleisten.