Refine
Year of publication
Document Type
- Conference Proceeding (46) (remove)
Keywords
- LiDAR (3)
- Agile Lehre (2)
- Gazebo (2)
- Inverted Classroom (2)
- Power Consumption (2)
- Robot operating system (ROS) (2)
- Scrum (2)
- Simulation and Modeling (2)
- biogas (2)
- mobile field laboratory (2)
Institute
- Fakultät IuI (46) (remove)
Pregnancy loss is the most common complication in pregnancy. Yet those who experience it can find it challenging to disclose this loss and feelings associated
with it, and to seek support for psychological and physical recovery. We describe our process for
interleaving interviews, theoretical development, speculative design, and prototyping Not Alone to
explore the design space for online disclosures and
support seeking in the pregnancy loss context.
Interviews with 27 women who had experienced pregnancy loss resulted in theoretical concepts such as
“network-level reciprocal disclosure” (NLRD). We discuss how interview findings informed the design of
the Not Alone prototype, a mobile application aimed at enabling disclosure and social support exchange among those with pregnancy loss experience. The Not Alone prototype embodies concepts that facilitate NLRD: perceptions of homophily, anonymity levels, and selfdisclosure by talking about one’s experience and engaging with others’ disclosures. In future work, we will use Not Alone as a technology probe for exploring
NLRD as a design principle.
High Performance and Privacy for Distributed Energy Management: Introducing PrivADE+ and PPPM
(2018)
Distributed Energy Management (DEM) will play a vital role in future smart grids. An important and often
overlooked factor in this concept is privacy. This paper presents two privacy-preserving DEM algorithms
called PrivADE+ and PPPM. PrivADE+ uses a round-based energy management procedure for switchable and
dynamically adaptable loads. PPPM utilises on the market-based PowerMatcher approach. Both algorithms
apply homomorphic encryption to privately gather aggregated data and exchange commands. Simulations
show that PrivADE+ and PPPM achieve good energy management quality with low communication requirements
and without negative influences on robustness.
We describe an automated approach, to easily track patients regaining their walking ability while recovering from neurological diseases like e.g. stroke. Based on captured gait data and objective measures derived out of it the rehabilitation process can be optimized and thus steered. In order to apply such system in clinical practice two key requirements have to be fulfilled: (i) the system needs to be applicable in terms of ease of use and performance; (ii) the derived measures need to be accurate.
The Internet of Things (IoT) relies on sensor devices to measure real-world phenomena in order to provide IoT services. The sensor readings are shared with multiple entities, such as IoT services, other IoT devices or other third parties. The collected data may be sensitive and include personal information. To protect the privacy of the users, the data needs to be protected through an encryption algorithm. For sharing cryptographic cipher-texts with a group of users Attribute-Based Encryption (ABE) is well suited, as it does not require to create group keys. However, the creation of ABE cipher-texts is slow when executed on resource constraint devices, such as IoT sensors. In this paper, we present a modification of an ABE scheme, which not only allows to encrypt data efficiently using ABE, but also reduces the size of the cipher-text, that must be transmitted by the sensor. We also show how our modification can be used to realise an instantaneous key revocation mechanism.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with real, physical entities. These entities are devices of different categories and range in size from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires expert knowledge in order for them to work within the limited resources. That means to find a suitable configuration for the algorithms to perform properly on the device. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are captured in security policies, but they do not consider resource availability on the involved device and their consumption while executing security algorithms. This paper presents a resource aware information exchange model and a generation tool that uses high-level security policies as input. The model forms the conceptual basis for an automated security configuration recommendation system.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with physical entities in the real world. These entities are devices of different categories and sizes range from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires of them to work within the limited resources. This means to find a suitable implementation and configuration for a security algorithm, that performs properly on the device, which may become a challenging task. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are recorded in security policies, but they do not consider resource availability on the involved device and its power consumption while executing security algorithms. This paper presents an IoT security configuration tool that helps the designer of an IoT environment to experiment with the trade-off between maximizing security and extending the lifetime of a resource constrained IoT device. The tool is controlled with high-level description of security goals in the form of policies. It allows the designer to validate various (security) configurations for a single IoT device up to a large sensor network.
Innerhalb eines Forschungsprojektes wurde ein Energiesystemoptimierungsmodell entwickelt, das mögliche Geschäftsmodelle als Weiterbetriebsoptionen für Biogasanlagen betrachtet. Insbesondere der Einfluss von fluktuierenden Strommarktpreisen und variierenden Treibhausgasquoten soll kritisch im innerdeutschen Kontext beleuchtet werden.
Knowledge of the small-scale nutrient status of a field is an important basis for decision-making when it comes to optimising the fertiliser use in crop production. Currently, the traditional method involves soil sampling in the field and soil sample analysis in the laboratory as two separate working processes.
The previous research project "soil2data" developed a mobile field laboratory for different carrier vehicles. In the follow-up project "prototypes4soil2data", the results of soil2data are further developed. A mixed soil sample is collected during the drive on the field. The soil sample is then wet-chemically prepared and analysed. The overall soil sampling and analysis process is divided into the following process steps: soil sampling planning, soil sampling, soil preparation, soil analysis and data management. The process steps are modified for the mobile field laboratory and the process steps run in parallel. The new soil extraction method is based on official German methods (VDLUFA) to ensure the interoperability of the analysis results with the VDLUFA fertiliser recommendations. An innovative key component is the NUTRISTAT analysis module (lab-on-chip with ISFET measurement technology). It can measure pH, the nutrients NO3-, H2PO4-, K+ and the electrical conductivity. In addition to the advantages of rapid data availability and no need to transport soil material to the laboratory, it provides a future basis for new application, e.g. verification of current results in the field during soil sampling with existing results or dynamic adjustment of soil sampling during work in the field.
Die Unterstützung des Maschinenführers auf der Landmaschine durch digitale Dienste nimmt immer stärker zu. Die Darstellungsmöglichkeiten sind jedoch auf die Größe der eingesetzten Terminals beschränkt. Um Sichteinschränkungen aus der Kabine durch zusätzliche Terminals zu vermeiden, ist der Einsatz von Augmented Reality sinnvoll. Hier lassen sich die vorhandenen Informationen statisch oder dynamisch in das Sichtfeld des Landwirts einblenden. Doch erst durch die in diesen Beitrag gezeigte Overlay Darstellungsebene mit integrierten Informationen lässt sich das Potenzial der Augmented Reality vollständig nutzen.
Die Nutzung von Sensorsystemen bei der teilflächenspezifischen Bewirtschaftung eines Schlags steigert den Ertrag sowie die Wirtschaftlichkeit des Pflanzenanbaus. Dennoch tragen weitere Faktoren zur optimalen Nährstoffversorgung einer Pflanze bei, als sie von solch einem lokal arbeitenden System erfasst werden. Um die Effizienz dieser Precision Farming Systeme auszubauen ist der nächste, hier erfolgreich durchgeführte Schritt die Anbindung der mobilen Landmaschine über das Internet an eine regionsübergreifende Datenanalyseplattform und die Ausführung zeitkritischer Optimierungsfunktionen auf der Landmaschine.