004 Informatik
Refine
Year of publication
Document Type
- Conference Proceeding (45) (remove)
Is part of the Bibliography
- yes (45)
Keywords
- LiDAR (3)
- Agile Lehre (2)
- Gazebo (2)
- Inverted Classroom (2)
- Power Consumption (2)
- Robot operating system (ROS) (2)
- Scrum (2)
- Simulation and Modeling (2)
- AI compliance (1)
- AVB/TSN (1)
Institute
- Fakultät IuI (33)
- Fakultät WiSo (9)
- Fakultät AuL (2)
- Institut für Management und Technik (1)
Recent real-time networking developments have enabled ultra reliability, very low latency and high data rates in wired networks. Wireless networking developments have also shown that they can achieve very high data rates with consistency, but they still lack in providing ultra reliability and extremely low latency. Time Sensitive Networking (TSN) developments have brought these capabilities in Industry automation and Automotive industry too. Although TSN is standardized for wired networks for a long time, for wireless networks it will be standardized within the IEEE 802.11be standard for Wi-Fi and 3GPP Release 17 for 5G in the near future. This paper provides an overview of TSN in wired and wireless networks with the aim of comparing different simulators and presenting their offered functionality and shortcomings. These tools can be used to make oneself familiar with TSN algorithms, standards, and for the development and testing of time sensitive networks. Afterwards, the paper discusses open research questions for using TSN over wireless networks.
This paper presents a framework for OMNeT++ which includes time synchronization model for WLANs. Synchronization is based on the Generalized Precision Time Protocol (gPTP) standard, which aims to achieve an accuracy of less than 100 nanoseconds. The presented model is developed and implemented in OMNeT++, a discrete event network simulator, using its INET library. A new type of WLAN node is modeled which supports time synchronization at the Link layer. A clock module for WLAN nodes is also modeled which implements variable clock drift to simulate noise interference in clock frequency oscillators. Simulations with our WLAN nodes are done and the results show that using gPTP based time synchronization in wireless networks, accuracy of ±3ns can be achieved.
Long Range Wide Area Network (LoRaWAN) operates in the ISM band with 868 MHz, where the Time on Air (ToA) is regulated in the EU to 1 %. LoRaWAN nodes use the Adaptive Data Rate (ADR) algorithm to adapt their data rates during operation. The standard ADR algorithm works well with stationary nodes, however is very slow in the adaptation for mobile nodes. This paper introduces a new ADR algorithm for LoRaWAN that is supported by higher level meta-data for sensor streams, namely Quality of Information (QoI). With the help of QoI it is possible to provide additional information to the new ADR algorithm, reducing the convergence time and thus improving the Packet Delivery Ratio (PDR) of data from mobile sensor nodes. The new algorithm requires only modifications on network server side and keeps backwards compatibility with LoRaWAN nodes. Results show a significant better PDR compared to the standard ADR in scenarios with a limited number of mobile nodes.
Auf vielen Landmaschinen wird der CAN-Bus zur Übertragung von Daten zwischen Sensoren, Aktoren und Steuergeräten genutzt. Anwendungen wie Rückfahrkameras und Bird-ViewAnzeigen erfordern in der Regel zusätzliche, breitbandige Kommunikationskanäle. Dieser Beitrag untersucht, inwieweit ein gemeinschaftliches Kommunikationsmedium auf Basis von Ethernet zur Realisierung aktueller und zukünftiger Anwendungen auf Landmaschinen genutzt werden kann. Zusätzlich wird der Einsatz aktueller Technologien wie Audio/Video Bridging, Time-Sensitive Networking und Wifi auf einem Landmaschinengespann untersucht und bewertet.
Analysis of methods for prioritizing critical data transmissions in agricultural vehicular networks
(2020)
Applying wireless communication technologies to agricultural vehicular networks often results in high end-to-end delays and loss of packets due to intermittent or broken connectivity. This paper analyses the methods for the successful delivery of the vehicular data within acceptable delay times. Different kinds of data that are generated and transmitted in agricultural networks are considered in this paper, followed by the data prioritization methods which allow critical data to be prioritized against other data. In this regard, Enhanced Distributed Channel Access, Differentiated Services, and application-based data rate variation are discussed in conjunction with the Simple Network Management Protocol. These techniques are simulated or tested separately and then together and the results show that even in poor network conditions, high-prioritized data is not lost or delayed.
Die Digitalisierung des Bodenbeprobungsverfahrens mit einer automatisierten Generierung einer Düngeempfehlung auf Grundlage der analysierten Bodennährstoffgehalte – direkt nach Beendigung der Bodenbeprobung auf dem Acker – ist ein übergeordnetes Ziel bei der Nutzung des mobilen Feldlabors „soil2data“. Neben den Bodennährstoffanalyse-Ergebnissen sind für die Umsetzung einer automatisierten generierten Düngeempfehlung weitere Informationen notwendig.
Die Quellen dieser Informationen haben einen unterschiedlichen Ursprung. Es sind Daten aus verschiedenen Quellen vom Bewirtschafter, von Dienstleistern und vom mobilen Feldlabor, welche miteinander verknüpft und synchronisiert werden müssen. Für einen automatisierten Prozessablauf zur Generierung einer Düngeempfehlung ist die Datenorganisation eine essenzielle Voraussetzung. Die Grundlage der Empfehlung sind die Tabellenwerke der offiziellen Düngeempfehlung, die bei den für die Düngung zuständigen Behörden der Bundesländer vorliegen. In dieser Publikation werden die notwendigen Daten und der Prozessdatenfluss für die Bodenbeprobung und Düngeempfehlung-Generierung beschrieben und grafisch dargestellt.
Artificial intelligence (AI) promises transformative impacts on society, industry, and agriculture, while being heavily reliant on diverse, quality data. The resource-intensive "data
problem" has initialized a shift to synthetic data. One downside of synthetic data is known as the "reality gap", a lack of realism. Hybrid data, combining synthetic and real data, addresses this. The paper examines terminological inconsistencies and proposes a unified taxonomy for real, synthetic, augmented, and hybrid data. It aims to enhance AI training datasets in smart agriculture, addressing the challenges in the agricultural data landscape. Utilizing hybrid data in AI models offers improved prediction performance and adaptability.
Compliance of agricultural AI systems : app-based legal verification throughout the development
(2024)
Significant advances in artificial intelligence (AI) have been achieved; however, practical implementation in agriculture remains limited. Compliance with emerging regulations, such as the EU AI Act and GDPR, is now vital, even for non-critical AI systems. Developers need tools to assess legal compliance, which is complex, often requiring full legal advice. To address this issue, we are developing a support app that simplifies the legal aspects of AI system development, covering the entire lifecycle, from conception to distribution. The current app, which covers the key legal area of copyright and will soon include GDPR and the AI Act, aims to bridge the gap between AI research and agriculture. An evaluation of our app by experts from both the legal and the IT domains shows that the app assists the developers so that they make legally correct statements. Consequently, it promotes legal compliance and awareness among developers, contributing to the seamless integration of AI into agriculture. The need for compliant AI systems in various industries, including agriculture, will only increase as regulations evolve.
SimBO is a flexible framework for optimizing discrete event-driven simulations (DES) using sequential optimization algorithms. While specifically designed for Bayesian Optimization (BO) in the context of DES, SimBO can be applied to any black-box problem with other optimization algorithms. The framework consists of four encapsulated components - the black-box problem, the sequential optimization algorithm, a database for experiment configuration and results, and a web-based graphical user interface - that communicate via well-defined interfaces. Each component can be run in different environments, allowing for cooperation between different hardware- and software configurations. In our research context, SimBO’s architecture enabled BO algorithms to be run on a high-performance cluster with GPU support, while the simulation is executed on a local Windows machine using the Simio simulation software. The framework’s flexibility also makes it suitable for evolving from a research-focused tool to a production-ready, cloud-based optimization tool for modern algorithms.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with physical entities in the real world. These entities are devices of different categories and sizes range from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires of them to work within the limited resources. This means to find a suitable implementation and configuration for a security algorithm, that performs properly on the device, which may become a challenging task. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are recorded in security policies, but they do not consider resource availability on the involved device and its power consumption while executing security algorithms. This paper presents an IoT security configuration tool that helps the designer of an IoT environment to experiment with the trade-off between maximizing security and extending the lifetime of a resource constrained IoT device. The tool is controlled with high-level description of security goals in the form of policies. It allows the designer to validate various (security) configurations for a single IoT device up to a large sensor network.