Refine
Departments, institutes and facilities
- Fachbereich Informatik (77)
- Fachbereich Angewandte Naturwissenschaften (20)
- Fachbereich Ingenieurwissenschaften und Kommunikation (17)
- Fachbereich Wirtschaftswissenschaften (14)
- Institute of Visual Computing (IVC) (14)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (11)
- Institut für Verbraucherinformatik (IVI) (7)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (6)
- Institut für Sicherheitsforschung (ISF) (5)
- Fachbereich Sozialpolitik und Soziale Sicherung (4)
Document Type
- Report (201) (remove)
Year of publication
Keywords
- Robotik (5)
- Engineering (4)
- Cutting sticks-Problem (3)
- Teilsummenaufteilung (3)
- Virtuelle Realität (3)
- AAL-Technik (2)
- Benutzeroberfläche (2)
- Deep Learning (2)
- Forschungsbericht (2)
- Gravitation (2)
Tracelets and Specifications
(2017)
In the accompanying paper [1] the authors study a model of concurrent programs in terms of events and a dependence relation, i.e., a set of arrows, between them. There also two simplifying interface models are presented; they abstract in different ways from the intricate network of internal points and arrows of program components. This report supplements [1] by presenting full proofs for the properties of the interface models, in particular, that both models exhibit homomorphic behaviour w.r.t. sequential and concurrent composition. [1] B. Möller, C.A.R. Hoare, M.E. Müller, G. Struth: A discrete geometric model of concurrent program execution. In H. Zhu, J. Bowen: Proc. UTP 16. LNCS 10134. Springer 2017, 1-25
Formal concept analysis (FCA) as introduced in [4] deals with contexts and concepts. Roughly speaking, a context is an environment that is equipped with some kind of "knowledge". Such contexts are also known as information or knowledge representation systems where the knowledge consists of (intensional) descriptions relating sets of objects to sets of properties. Given extsensional and intensional descriptions (the latter one in terms of binary attributes), they can be arranged in a taxonomy or concept lattice.
Technology Transfer in Developing Countries: Computer Integrated Manufacturing (CIM) in China
(1994)
This work provides a short but technical introduction to the main building blocks of a blockchain. It argues that a blockchain is not a revolutionary technology but rather a clever combination of three fields: cryptography, decentralization and game theory. In addition, it summaries the differences between a public, private and federate blockchain model and the two prominent consensus mechanism Proof-of-Work (POW) and Proof-of-Stake (POS).
Population ageing and growing prevalence of disability have resulted in a growing need for personal care and assistance. The insufficient supply of personal care workers and the rising costs of long-term care have turned this phenomenon into a greater social concern. This has resulted in a growing interest in assistive technology in general, and assistive robots in particular, as a means of substituting or supplementing the care provided by humans, and as a means of increasing the independence and overall quality of life of persons with special needs. Although many assistive robots have been developed in research labs world-wide, very few are commercially available. One of the reasons for this, is the cost. One way of optimising cost is to develop solutions that address specific needs of users. As a precursor to this, it is important to identify gaps between what the users need and what the technology (assistive robots) currently provides. This information is obtained through technology mapping.
The current literature lacks a mapping between user needs and assistive robots, at the level of individual systems. The user needs are not expressed in uniform terminology across studies, which makes comparison of results difficult. In this research work, we have illustrated the technology mapping of assistive robots using the International Classification of Functioning, Disability and Health (ICF). ICF provides standard terminology for expressing user needs in detail. Expressing the assistive functions of robots also in ICF terminology facilitates communication between different stakeholders (rehabilitation professionals, robotics researchers, etc.).
We also investigated existing taxonomies for assistive robots. It was observed that there is no widely accepted taxonomy for classifying assistive robots. However, there exists an international standard, ISO 9999, which classifies commercially available assistive products. The applicability of the latest revision of ISO 9999 standard for classifying mobility assistance robots has been studied. A partial classification of assistive robots based on ISO 9999 is suggested. The taxonomy and technology mapping are illustrated with the help of four robots that have the potential to provide mobility assistance. These are the SmartCane, the SmartWalker, MAid and Care-O-bot (R) 3. SmartCane, SmartWalker and MAid provide assistance by supporting physical movement. Care-O-bot (R) 3 provides assistance by reducing the need to move.
Szenariogestützte Endauswahl
(1996)
SISAL: User manual
(1990)
Unternehmen im Maschinenbau realisieren Sicherheitsfunktionen immer mehr durch die Anwendungsprogrammierung von sicherheitsgerichteten Steuerungen. Die aktuellen Normen DIN EN ISO 13849 und DIN EN 62061 definieren erstmals auch Anforderungen an die Softwareentwicklung von Sicherheitsfunktionen. Dadurch sollen gefährliche systematische Fehler in der sicherheitsbezogenen Anwendungssoftware für eine Maschine vermieden werden. Wesentliche Anforderung dieser Normen ist, einen strukturierten Entwicklungsprozess einzuhalten: das V-Modell. Auch die weiteren Anforderungen zu fehlervermeidenden und -beherrschenden Maßnahmen bei der Entwicklung sind in den Normen wie üblich sehr allgemein gehalten. Zudem gibt es bislang wenige publizierte Beispiele und Vorschläge für die Umsetzung dieser Anforderungen. Daher ist die Interpretation der Normen bei der Softwareentwicklung im Maschinenbau oft unklar und bereitet Schwierigkeiten in der Umsetzung. Dies war der Anlass für ein von der DGUV gefördertes und an der Hochschule Bonn-Rhein-Sieg durchgeführtes Projekt (FF-FP0319, Laufzeit 2011 bis 2013). In dem Projekt wurde gemeinsam mit regionalen Maschinenbauunternehmen eine praktisch anwendbare Entwicklungsmethode – die Matrixmethode des IFA – hergeleitet und in einem Forschungsbericht mit vielen Beispielen dokumentiert. Dieser Forschungsbericht bildet den Kern des vorliegenden IFA Reports. Mit der hier dargestellten Matrixmethode des IFA kann Anwendungssoftware von Sicherheitsfunktionen normgerecht spezifiziert, validiert und dokumentiert werden. Darüber hinaus vermittelt der Report weitere Informationen rund um Anwendungsprogrammierung für sicherheitsbezogene Maschinensteuerungen. Der Aufwand für die Anwendungsprogrammierung ist bei Standardsteuerungen typischerweise höher als für zertifizierte Sicherheitssteuerungen. Daher beziehen sich mehrere Kapitel des Reports auf die Anwendung von Standardsteuerungen. Zur effizienten Anwendung der Matrixmethode entwickelt das IFA ein Softwaretool namens SOFTEMA. Die Beispiele des Reports sind zum Download verfügbar und können mit SOFTEMA betrachtet werden.
Die vorliegende Arbeit beschäftigt sich mit der numerischen Behandlung Differential-Algebraischer Gleichungen (DAE" s). DAE" s treten beispielsweise bei der Modellierung der Dynamik mechanischer System, der Schaltkreissimulation sowie der chemischen Reaktionskinetik auf. Es werden Rosenbrock-Wanner ähnliche Verfahren zu deren Lösung hergeleitet und an technischen Modellen (Fahrzeugachse und Verstärker) getestet.
This paper describes the security mechanisms of several wireless building automation technologies, namely ZigBee, EnOcean, ZWave, KNX, FS20, and Home-Matic. It is shown that none of the technologies provides the necessary measure ofsecurity that should be expected in building automation systems. One of the conclusions drawn is that software embedded in systems that are build for a lifetime of twenty years or more needs to be updatable.
Schlussbericht HIGEDIS
(2015)
Recent work in image captioning and scene-segmentation has shown significant results in the context of scene-understanding. However, most of these developments have not been extrapolated to research areas such as robotics. In this work we review the current state-ofthe- art models, datasets and metrics in image captioning and scenesegmentation. We introduce an anomaly detection dataset for the purpose of robotic applications, and we present a deep learning architecture that describes and classifies anomalous situations. We report a METEOR score of 16.2 and a classification accuracy of 97 %.