Filtern
Erscheinungsjahr
Dokumenttyp
- Konferenzveröffentlichung (200) (entfernen)
Sprache
- Englisch (200) (entfernen)
Volltext vorhanden
- nein (200) (entfernen)
Schlagworte
- Field measurement (2)
- Solar modules (2)
- AEM-Electrolysis (1)
- Air handling unit (1)
- Alternative Geschäftsmodelle (1)
- Assisted living technologies (1)
- Assistive robotics (1)
- Augmented Reality (1)
- CFD Simulation (1)
- Climate change (1)
- Continuous Queries (1)
- Crowdfunding (1)
- Current Pulses (1)
- Datalog (1)
- Deductive Databases (1)
- Electrodeposition (1)
- Erweiterte Realität <Informatik> (1)
- Flat-Channel (1)
- Future capacity needs (1)
- High Reynold Numer (1)
- Human-Robot Interaction (1)
- Human-centered computing (1)
- Hydraulic compression, Carbon Nano Fibers, PEM Fuel Cells, Catalyst utilization (1)
- Incremental Evaluation (1)
- Journalismus (1)
- Kalman filter (1)
- Launcher (1)
- Mixed Reality (1)
- Ni-Mo alloy Catalyst (1)
- PEM Electrolysis, Hydrogen, Hydraulic Compression, High Pressure (1)
- People with disabilities (1)
- Performance prediction (1)
- Physics-Informed Deep Learning (1)
- Robot assistive drinking (1)
- Robot assistive eating (1)
- Sinusoidal (1)
- Temperature coefficients (1)
- Tetraplegie (1)
- Thermal Stress (1)
- Update Propagation (1)
- Urban heat island (1)
- Zustandsmaschine (1)
- consent banner (1)
- cookie banner (1)
- cookies (1)
- human-centered design (1)
- hybrid sensor system (1)
- participatory design (1)
- privacy (1)
- risk management (1)
- sensor fusion (1)
- state machine (1)
- user acceptance (1)
- web measurement (1)
Institut
- Westfälisches Institut für Gesundheit (49)
- Institut für Internetsicherheit (45)
- Westfälisches Energieinstitut (23)
- Elektrotechnik und angewandte Naturwissenschaften (18)
- Informatik und Kommunikation (16)
- Maschinenbau Bocholt (12)
- Wirtschaft und Informationstechnik Bocholt (7)
- Institut für biologische und chemische Informatik (6)
- Fachbereiche (2)
- Institut Arbeit und Technik (2)
- Wirtschaftsingenieurwesen (2)
- Institut für Innovationsforschung und -management (1)
- Mechatronik-Institut Bocholt (1)
- Wirtschaftsrecht (1)
Segmentation of radio-angiographic images using morphological filters, thinning and region growing
(1997)
Opportunities and Challenges in Mixed-Reality for an Inclusive Human-Robot Collaboration Environment
(2018)
This paper presents an approach to enhance robot control using Mixed-Reality. It highlights the opportunities and challenges in the interaction design to achieve a Human-Robot Collaborative environment. In fact, Human-Robot Collaboration is the perfect space for social inclusion. It enables people, who suffer severe physical impairments, to interact with the environment by providing them movement control of an external robotic arm. Now, when discussing about robot control it is important to reduce the visual-split that different input and output modalities carry. Therefore, Mixed-Reality is of particular interest when trying to ease communication between humans and robotic systems.
This Article introduces two research projects towards assistive robotic arms for people with severe body impairments. Both projects aim to develop new control and interaction designs to promote accessibility and a better performance for people with functional losses in all four extremities, e.g. due to quadriplegic or multiple sclerosis. The project MobILe concentrates on using a robotic arm as drinking aid and controlling it with smart glasses, eye-tracking and augmented reality. A user oriented development process with participatory methods were pursued which brought new knowledge about the life and care situation of the future target group and the requirements a robotic drinking aid needs to meet. As a consequence the new project DoF-Adaptiv follows an even more participatory approach, including the future target group, their family and professional caregivers from the beginning into decision making and development processes within the project. DoF-Adaptiv aims to simplify the control modalities of assistive robotic arms to enhance the usability of the robotic arm for activities of daily living. lo decide on exemplary activities, like eating or open a door, the future target group, their family and professional caregivers are included in the decision making process. Furthermore all relevant stakeholders will be included in the investigation of ethical, legal and social implications as well as the identification of potential risks. This article will show the importance of the participatory design for the development and research process in MobILe and DoF-Adaptiv.
We investigate the possibility to use update propagation methods for optimizing the evaluation of continuous queries. Update propagation allows for the efficient determination of induced changes to derived relations resulting from an explicitly performed base table update. In order to simplify the computation process, we propose the propagation of updates with different degrees of granularity which corresponds to an incremental query evaluation with different levels of accuracy. We show how propagation rules for diferent update granularities can be systematically derived, combined and further optimized by using Magic Sets. This way, the costly evaluation of certain subqueries within a continuous query can be systematically circumvented allowing for cutting down on the number of pipelined tuples considerably.
Membrane electrode assemblies (MEA) developed at the Westphalian Energy Institute for polymer electrolyte membrane fuel cells (PEMFC) are high tech systems containing various materials structured in nanoscale, at which electrochemical reactions occur on catalyst nano particle surfaces. For low reactance homogeneous compression of the MEA’s layers is necessary. A novel stack architecture for electrochemical cells, especially PEMFC as well as PEM electrolysers, has been developed according to achieve ideal cell operation conditions. Single cells of such a stack are inserted into flexible slots that are surrounded by hydraulic media. While operation the hydraulic media is pressurised which leads to an even compression and cooling of the stack’s cells. With this stack design it has been possible to construct a test facility for simultaneous characterisation of several MEA samples. As compression and temperature conditions of every single sample are equal, with the novel test system the effect of e.g. different electrode configurations can be investigated. Furthermore, the modular stack design leads to the development of hybrid energy applications combining fuel cells, electrolysers, batteries as well as metal hydride tanks in one system.
Various aqueous citrate electrolyte compositions for the Ni-Mo electrodeposition are explored in order to deposit Ni-Mo alloys with Mo-content ranging from 40 wt% to 65 wt% to find an alloy composition with superior catalytic activity towards the hydrogen evolution reaction (HER). The depositions were performed on copper substrates mounted onto a rotating disc electrode (RDE) and were investigated via scanning electron microscopy (SEM), X-ray fluorescence (XRF) and X-ray diffraction (XRD) methods as well as linear sweep voltammetry (LSV) and impedance spectroscopy. Kinetic parameters were calculated via Tafel analysis. Partial deposition current densities and current efficiencies were determined by correlating XRF measurements with gravimetric results. The variation of the electrolyte composition and deposition parameters enabled the deposition of alloys with Mo-content over the range of 40-65 wt%. An increase in Mo-content in deposited alloys was recorded with an increase in rotation speed of the RDE. Current efficiency of the deposition was in the magnitude of <1%, which is characteristic for the deposition of alloys with high Mo-content. The calculated kinetic parameters were used to determine the Mo-content with the highest catalytic activity for use in the HER.
Measurement studies are essential for research and industry alike to understand the Web’s inner workings better and help quantify specific phenomena. Performing such studies is demanding due to the dynamic nature and size of the Web. An experiment’s careful design and setup are complex, and many factors might affect the results. However, while several works have independently observed differences in
the outcome of an experiment (e.g., the number of observed trackers) based on the measurement setup, it is unclear what causes such deviations. This work investigates the reasons for these differences by visiting 1.7M webpages with five different measurement setups. Based on this, we build ‘dependency trees’ for each page and cross-compare the nodes in the trees. The results show that the measured trees differ considerably, that the cause of differences can be attributed to specific nodes, and that even identical measurement setups can produce different results.
Cookie notices (or cookie banners) are a popular mechanism for websites to provide (European) Internet users a tool to choose which cookies the site may set. Banner implementations range from merely providing information that a site uses cookies over offering the choice to accepting or denying all cookies to allowing fine-grained control of cookie usage. Users frequently get annoyed by the banner’s pervasiveness as they interrupt “natural” browsing on the Web. As a remedy, different browser extensions have been developed to automate the interaction with cookie banners.
In this work, we perform a large-scale measurement study comparing the effectiveness of extensions for “cookie banner interaction.” We configured the extensions to express different privacy choices (e.g., accepting all cookies, accepting functional cookies, or rejecting all cookies) to understand their capabilities to execute a user’s preferences. The results show statistically significant differences in which cookies are set, how many of them are set, and which types are set—even for extensions that aim to implement the same cookie choice. Extensions for “cookie banner interaction” can effectively reduce the number of set cookies compared to no interaction with the banners. However, all extensions increase the tracking requests significantly except when rejecting all cookies.
Steganography, the art of concealing information in different types of medias, is a very old practice. Yet, it only recently started being used by malware operators on a large scale. Malware programmers and operators are increasing their efforts in developing covert communication channels between infected computers and their command and control servers. In addition to steganography, recent examples include hiding communication in inconspicuous network traffic such as DNS queries or HTTP 404 error messages.
When used properly, these covert communication channels can bypass many automated detection mechanisms and render malware communication difficult to detect and block. From an attacker's perspective, covert communication channels are a valuable addition because they allow messages to blend in with legitimate traffic and thus significantly lower the chance of being detected even when inspected by a human analyst.
This presentation studies recent advances in covert communication channels used by real-world malware. First, we will show how steganography has recently been used in three different malware families (Stegoloader, Vawtrak, and Lurk). We will dive into the implementation details on how steganography is implemented and discuss the strengths and weaknesses of each approach. Furthermore, we will detail and compare the usage of inconspicuous carrier protocols for covert communication channels in malware. Examples will span commodity cybercrime as well as targeted attack malware.
The cases that are discussed in this presentation are based on real life incidents. While it is easy to speculate how covert communication channels might be used by malicious actors, documentation of real-world cases is sparse. Yet covert communication channels have arrived in both, the commodity cybercrime and targeted attack world. It is thus vital to understand the status-quo and identify current trends in cybercriminal and targeted attack malware. As such, we believe that it is mandatory to highlight what is currently being used in the wild.