Fakultät IuI
Refine
Year of publication
Document Type
- Conference Proceeding (58)
- Article (16)
- Book (6)
- Working Paper (5)
- Part of a Book (2)
- Bachelor Thesis (1)
- Doctoral Thesis (1)
- Moving Images (1)
- Other (1)
- Part of Periodical (1)
Keywords
- Inverted Classroom (4)
- LiDAR (3)
- Scrum (3)
- Agile Lehre (2)
- Future Skills (2)
- Gazebo (2)
- Kugelstrahlen (2)
- Materialermüdung (2)
- Power Consumption (2)
- Robot operating system (ROS) (2)
- Simulation and Modeling (2)
- Validierung (2)
- biogas (2)
- lab on a chip (2)
- mobile field laboratory (2)
- soil nutrients analysis (2)
- soil sampling (2)
- soil2data (2)
- time synchronization (2)
- 5G (1)
- 802.1AS (1)
- AI compliance (1)
- AVB/TSN (1)
- Abwärme (1)
- Accident prevention (1)
- Additives (1)
- Agile Didaktik (1)
- Agiles Lernen (1)
- Agricultural Automation (1)
- Agricultural streering system (1)
- Agriculture (1)
- Artificial intelligent (1)
- Artificial neural networks (1)
- Augmented data (1)
- BPMN (1)
- Bodennährstoffanalyse (1)
- Business Process Modeling (1)
- Chromatography (1)
- Closed-loop control systems (1)
- Cognitive enhancement technologies (1)
- Computer-Human Interaction (1)
- Cycling simulator (1)
- DMN (1)
- DTNs (1)
- Decision support application (1)
- Delphi-Studie (1)
- DiffServ (1)
- Digital (1)
- Digitalisierung Bodenbeprobung (1)
- Distributed Energy Management, Smart Grid, Privacy, Communication Performance, Robustness (1)
- Dokumentation (1)
- Dynamic Adaptation (1)
- Dynamic Process Adaption (1)
- EDCA (1)
- Einheitszelle (1)
- Einzelbeschuss (1)
- Embedded Software Engineering (1)
- Embedded Systems (1)
- Energy Bug (1)
- Energy Efficiency (1)
- Erfolg (1)
- Ethernet (1)
- Ethical AI (1)
- FIB-SEM tomography (1)
- Fahrerassistenzsysteme (1)
- Fatigue-relevant scatter (1)
- FeNiCrAl (1)
- Flipped Classroom (1)
- Functional safety (1)
- Gait Analysis (1)
- Game engine (1)
- Generalized periodicity (1)
- Getreideernte (1)
- HTML (1)
- Hybrid data (1)
- IEEE 802.1Q (1)
- ISFET measurement technology (1)
- ISFET-sensor module (1)
- Industry (1)
- Innovation (1)
- Innovationsmanagement (1)
- Internet of Things (1)
- Inverse Distance Weighting (1)
- Inverted Classroom Model (1)
- IoT (1)
- Kinematics Estimation (1)
- Klimaschutz (1)
- Kriging (1)
- Landkreis Osnabrück (1)
- Landmaschinenkommunikation (1)
- Language Extension (1)
- Law (1)
- Lebensdauercharakteristik (1)
- LoRaWAN (1)
- MARTE (1)
- Marker-less Skeleton Tracking (1)
- Mathematik (1)
- Meta Modeling (1)
- Migration (1)
- Mobility (1)
- Model-Driven Development (1)
- OMNeT++ (1)
- OSM (1)
- Open Source (1)
- OppNets (1)
- Orthopaedic Technical Support (1)
- Pflanzenmodelle (1)
- Physiotherapie (1)
- Poly(propylene) (1)
- Polymere (1)
- Pre-stress shot peening (1)
- Pregnancy Loss (1)
- Process Robustness Verification (1)
- Prozessdaten (1)
- QoS (1)
- Radiation (1)
- Realistic traffic simulation (1)
- Reality gap (1)
- Reckzügel (1)
- Rehabilitation, Person Tracking, Usability, Reliability (1)
- Reibermüdung (1)
- Reliable Communication (1)
- Shot peening intensity (1)
- Simulation (1)
- Simulation und Test (1)
- Simulationsmodell (1)
- Sines criterion (1)
- Sines-Kriterium (1)
- Smart Cities (1)
- Smart farming (1)
- Software (1)
- Software Design Pattern (1)
- Surfaces (1)
- Synthetic data (1)
- TSN (1)
- Telecommunication networks (1)
- Trust (1)
- UML (1)
- Unit cell (1)
- Unreliable Communication Environments (1)
- Verfestigungsstrahlen (1)
- Waldhoff (1)
- Web (1)
- Web-Components (1)
- Web-Engineering (1)
- Wifi (1)
- agricultural vehicular network (1)
- agriculture (1)
- agriculture robotics (1)
- automatisch generierte Düngeempfehlung (1)
- bioeconomy (1)
- biotechnological processes (1)
- bio‐based chemicals (1)
- concept mobile field laboratory (1)
- cooperative busines models (1)
- design (1)
- digital farming (1)
- drivers and barriers (1)
- economic evaluation (1)
- embedded software engineering (1)
- energy bug (1)
- energy efficiency (1)
- eye-tracking (1)
- fermentation (1)
- field-lab (1)
- fretting fatigue (1)
- gPTP (1)
- green hydrogen (1)
- grief (1)
- hybrid locomotion (1)
- hydrogen (1)
- ion-selective field effect transistors (ISFET) (1)
- life characteristic (1)
- miscarriage (1)
- mobile Fieldlab soil2data (1)
- mobiles Feldlabor soil2data (1)
- model-driven development (1)
- model-in-the-loop (1)
- nitridation (1)
- nutritional behavior (1)
- nutritional choices (1)
- precision farming (1)
- prioritization (1)
- rBPMN (1)
- robotics (1)
- second‐generation biorefineries (1)
- selbstorganisiertes Lernen (1)
- smart city; monitoring; plausibility; traffic data; time series; spatio-temporal; reasoning (1)
- social media (1)
- soil nutrient analysis (1)
- soil preparation for analysis (1)
- soil sensor (1)
- space robotics (1)
- spatial resoning, distance algorithm, IoT, (1)
- tsn (1)
- void formation (1)
- wlan (1)
- überfachliche Kompetenzen (1)
Institute
- Fakultät IuI (93) (remove)
Pregnancy loss is the most common complication in pregnancy. Yet those who experience it can find it challenging to disclose this loss and feelings associated
with it, and to seek support for psychological and physical recovery. We describe our process for
interleaving interviews, theoretical development, speculative design, and prototyping Not Alone to
explore the design space for online disclosures and
support seeking in the pregnancy loss context.
Interviews with 27 women who had experienced pregnancy loss resulted in theoretical concepts such as
“network-level reciprocal disclosure” (NLRD). We discuss how interview findings informed the design of
the Not Alone prototype, a mobile application aimed at enabling disclosure and social support exchange among those with pregnancy loss experience. The Not Alone prototype embodies concepts that facilitate NLRD: perceptions of homophily, anonymity levels, and selfdisclosure by talking about one’s experience and engaging with others’ disclosures. In future work, we will use Not Alone as a technology probe for exploring
NLRD as a design principle.
Oleamide is used as a lubricant in the manufacturing and application of polypropylene (PP) medical devices. Samples of PP were prepared with 0, 1500, and 15 000 ppm oleamide content as lubricant. The samples were either left non-sterile, sterilized with ethylene oxide (ETO), γ-radiation (γ) or autoclaved (A) and stored for up to 4 weeks. To determine the oleamide bulk-to-surface distribution depending on sterilization method and storage time an extraction method and a washing technique were applied. The oleamide content was determined by gas chromatography (GC-FID) and compared with the coefficient of friction (COF). The COF dependent on the measured lubricant content at the surface. The content of lubricant on the surface depends on the type of sterilization: ETO increased the lubricant content to some extent, γ-sterilization and autoclaving reduced it. After storage, no migration of the lubricant to the surface could be detected.
High Performance and Privacy for Distributed Energy Management: Introducing PrivADE+ and PPPM
(2018)
Distributed Energy Management (DEM) will play a vital role in future smart grids. An important and often
overlooked factor in this concept is privacy. This paper presents two privacy-preserving DEM algorithms
called PrivADE+ and PPPM. PrivADE+ uses a round-based energy management procedure for switchable and
dynamically adaptable loads. PPPM utilises on the market-based PowerMatcher approach. Both algorithms
apply homomorphic encryption to privately gather aggregated data and exchange commands. Simulations
show that PrivADE+ and PPPM achieve good energy management quality with low communication requirements
and without negative influences on robustness.
We describe an automated approach, to easily track patients regaining their walking ability while recovering from neurological diseases like e.g. stroke. Based on captured gait data and objective measures derived out of it the rehabilitation process can be optimized and thus steered. In order to apply such system in clinical practice two key requirements have to be fulfilled: (i) the system needs to be applicable in terms of ease of use and performance; (ii) the derived measures need to be accurate.
The Internet of Things (IoT) relies on sensor devices to measure real-world phenomena in order to provide IoT services. The sensor readings are shared with multiple entities, such as IoT services, other IoT devices or other third parties. The collected data may be sensitive and include personal information. To protect the privacy of the users, the data needs to be protected through an encryption algorithm. For sharing cryptographic cipher-texts with a group of users Attribute-Based Encryption (ABE) is well suited, as it does not require to create group keys. However, the creation of ABE cipher-texts is slow when executed on resource constraint devices, such as IoT sensors. In this paper, we present a modification of an ABE scheme, which not only allows to encrypt data efficiently using ABE, but also reduces the size of the cipher-text, that must be transmitted by the sensor. We also show how our modification can be used to realise an instantaneous key revocation mechanism.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with real, physical entities. These entities are devices of different categories and range in size from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires expert knowledge in order for them to work within the limited resources. That means to find a suitable configuration for the algorithms to perform properly on the device. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are captured in security policies, but they do not consider resource availability on the involved device and their consumption while executing security algorithms. This paper presents a resource aware information exchange model and a generation tool that uses high-level security policies as input. The model forms the conceptual basis for an automated security configuration recommendation system.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with physical entities in the real world. These entities are devices of different categories and sizes range from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires of them to work within the limited resources. This means to find a suitable implementation and configuration for a security algorithm, that performs properly on the device, which may become a challenging task. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are recorded in security policies, but they do not consider resource availability on the involved device and its power consumption while executing security algorithms. This paper presents an IoT security configuration tool that helps the designer of an IoT environment to experiment with the trade-off between maximizing security and extending the lifetime of a resource constrained IoT device. The tool is controlled with high-level description of security goals in the form of policies. It allows the designer to validate various (security) configurations for a single IoT device up to a large sensor network.