Refine
Year of publication
Document type
- Conference Proceeding (135) (remove)
Keywords
- Cloud computing (22)
- Security (18)
- Industry 4.0 (12)
- Privacy (8)
- Monitoring (7)
- Blockchain (6)
- Audit (5)
- Cloud Computing (5)
- OSGi (5)
- AAL (4)
- Accountability (4)
- Authentication (4)
- Cloud (4)
- Data privacy (4)
- Docker (4)
- Machine learning (4)
- PaaS (4)
- Computer architecture (3)
- Digital evidence (3)
- Fuzzy logic (3)
- Industrie 4.0 (3)
- Internet of things (3)
- QoS (3)
- SLA (3)
- Smart contracts (3)
- Software agents (3)
- Access control (2)
- Ambient assisted living (2)
- Augmentation (2)
- Biometrics (2)
- CPS (2)
- Computational modeling (2)
- Container (2)
- Container virtualization (2)
- Context aware (2)
- Digital forensics (2)
- Distributed data validation network (2)
- Evidence (2)
- Federated cloud (2)
- Fuzzy Logic (2)
- Generative models (2)
- HPC (2)
- Hardware (2)
- IaaS (2)
- Industrial internet of things (2)
- IoT (2)
- ML (2)
- MLOps (2)
- Maintenance (2)
- Mobile security (2)
- Modularization (2)
- Neural network (2)
- Ontologies (2)
- Pix2Pix (2)
- Predictive maintenance (2)
- Quality of service (2)
- SWRL rules (2)
- System call tracing (2)
- Usability (2)
- Virtual machining (2)
- Virtualization (2)
- ABE (1)
- Access-control (1)
- Agent confidentiality (1)
- Agent migration (1)
- Agent trust (1)
- Anomalieerkennung (1)
- Anomalous behavior (1)
- Anomalous behaviour (1)
- Anomaly detection (1)
- Application deployment (1)
- Application software (1)
- Artificial intelligence (1)
- Artificial neural network (1)
- Artificial neural networks (1)
- Attribute certificate (1)
- Authentication technologies (1)
- Authorization (1)
- Automl (1)
- Autonomous agents (1)
- Autorisierung (1)
- BLEU (1)
- Benchmark testing (1)
- Big Data (1)
- Big data (1)
- Big data frameworks (1)
- Biological neural networks (1)
- Biological system modeling (1)
- Bounding-box regression (1)
- Business (1)
- CNN (1)
- Cache (1)
- Chatbot (1)
- Circuit synthesis (1)
- Cloud Customer (1)
- Cloud Forensics (1)
- Cloud Provider (1)
- Cloud database (1)
- Cloud forensics challenges (1)
- Cloud forensics solutions (1)
- Cloud infrastructure (1)
- Cloud security (1)
- Cloud-edge computing (1)
- Clouds (1)
- Cluster-based data validation (1)
- Coils (1)
- Condition monitoring (1)
- Container Virtualization (1)
- Context (1)
- Context enhancement protocol (1)
- Context-Awareness (1)
- Context-aware (1)
- Continuous authentication (1)
- Convolutional generative adversarial network (1)
- Costs (1)
- Cross company business model (1)
- Customer relationship management (1)
- Cyber physical systems (1)
- Cyber security (1)
- Cybersecurity (1)
- DHT (1)
- Data acquisition (1)
- Data flow (1)
- Data protection (1)
- Data validation (1)
- Data-driven (1)
- Decision support systems (1)
- Deloyment (1)
- Dementia (1)
- Dementia health care (1)
- Denial of service (1)
- Deployment (1)
- Design engineering (1)
- Desktop grid (1)
- DigNest (1)
- Digital Evidence (1)
- Digital Forensics (1)
- Digital forensic (1)
- Digital innovation hub (1)
- Digital investigation (1)
- Digital twin (1)
- Digital wallet (1)
- Digitized agreements (1)
- Distance measurement (1)
- Distributed DNN (1)
- Distributed OSGi (1)
- Distributed computing (1)
- Distributed reflection denial of service (1)
- Distributed system (1)
- Domain analysis provisioner (1)
- Edge Computing (1)
- Edge security (1)
- Educational institutions (1)
- Emergency-situations (1)
- Endoscopy (1)
- Energy forecast (1)
- Evidential clustering (1)
- Evolutionary strategy (1)
- Expert system (1)
- Explainable AI (1)
- Factory of the future (1)
- FastCAM (1)
- Federated identity (1)
- Federated service (1)
- Fertigung (1)
- Filter (1)
- Fog computing (1)
- Fuzzy clustering (1)
- Fuzzy control (1)
- GII (1)
- GreedyDual-Size (1)
- Grinding burn (1)
- Grinding parameters (1)
- Health informatics (1)
- Healthcare (1)
- Healthcare workforce training (1)
- High Performance Computing (1)
- Home appliances (1)
- Hybrid (1)
- Hybrid AI (1)
- Hybrid Cloud (1)
- Hyperparameter tuning (1)
- I/O isolation (1)
- IIoT (1)
- IT compliance (1)
- Identity management (1)
- Image caption generation (1)
- Image classification (1)
- Industrial blockchain (1)
- Industrial cyber physical system (1)
- Innovation hubs (1)
- Instance segmentation (1)
- JADE (1)
- KPI (1)
- Kernel (1)
- LRU (1)
- LRU-MIN (1)
- LRU-threshold (1)
- Load Balancing (1)
- Load modeling (1)
- Locality aware (1)
- Log2(SIZE) (1)
- Logic circuits (1)
- METEOR (1)
- MIX (1)
- Machine integration (1)
- Machine maintenance (1)
- Mathematical model (1)
- Medical services (1)
- Medizinische Informatik (1)
- Meta learning (1)
- Metalworking (1)
- Meteorology (1)
- Metric (1)
- Metrics (1)
- Mobile agent security (1)
- Mobile device (1)
- Modelling language (1)
- Montenegro (1)
- Multimodal data (1)
- NLP (1)
- Nachhaltigkeit (1)
- Natural language processing (1)
- Neural net-works (1)
- Neuro-fuzzy (1)
- Neuronale Netze (1)
- OSGi Service Architecture (1)
- Object detection (1)
- Ontology (1)
- OpenVZ (1)
- Operating system (1)
- Optical fiber sensors (1)
- Optical fibers (1)
- Optimization (1)
- P2P (1)
- P2P communication (1)
- PaaS Management (1)
- Parallel algorithms (1)
- Partitioning algorithms (1)
- Peer-reviewed conference (1)
- Peer-reviewed of the scientific committee (1)
- Performance evaluation (1)
- Persistence (1)
- Poisoning (1)
- Poster (1)
- Poster Presentation (1)
- Prediction (1)
- Price models (1)
- Privacy protection (1)
- Private cloud (1)
- Privilege management infrastructure (1)
- Protocols (1)
- Proxy (1)
- Public key cryptography (1)
- Public key infrastructure (1)
- Quality assessment (1)
- Quality prediction (1)
- Reliability (1)
- Reminisence therapy (1)
- Replacement-Algorithm (1)
- Resource Discovery (1)
- Reusable architectural patterns (1)
- Risk analysis (1)
- Rule-based-security (1)
- SIZE (1)
- SaaS (1)
- Scaling service (1)
- Security Zertifikat (1)
- Security monitoring (1)
- Semantic segmentation (1)
- Sensor fusion (1)
- Servers (1)
- Shortest path problem (1)
- Sicherheit (1)
- Simulation (1)
- Single sign-on (1)
- Smart medical wearables (1)
- Smart system (1)
- Standards organizations (1)
- Steel surface damage (1)
- Storage (1)
- Storage management (1)
- TAS (1)
- Taxonomy (1)
- Time factors (1)
- Time-Series analysis (1)
- Timing (1)
- Traceability (1)
- Training (1)
- Transparency (1)
- Transparent authentication (1)
- Trust management (1)
- Tutor (1)
- Universal image quality index (1)
- Unreliability (1)
- User authentication (1)
- User centric ontology (1)
- User manuals (1)
- User study (1)
- User survey (1)
- Users' perceptions (1)
- Users’ security practices (1)
- Variety (1)
- Velocity (1)
- Veracity (1)
- Verifiability (1)
- Virtual instance (1)
- Virtual machine monitors (1)
- Visual XAI (1)
- Visual attention network (1)
- Visual attention networks (1)
- Visualisation (1)
- Volume (1)
- Western Balkans (1)
- XAI (1)
- Yolo (1)
- academia-business cooperation (1)
In this paper, we present a study on the utilization of smart medical wearables and the user manuals of such devices. A total of 342 individuals provided input for 18 questions that address user behavior in the investigated context and the connections between various assessments and preferences. The presented work clusters individuals based on their professional relation to user manuals and analyzes the obtained results separately for these groups.
Health informatics plays a crucial role in modern healthcare provision. Training and continuous education are essential to bolster the healthcare workforce on health informatics. In this work, we present the training events within EU-funded DigNest project. The aim of the training events, the subjects offered, and the overall evaluation of the results are described in this paper.
This poster presents a Montenegrin Digital Academic Innovation Hub aimed to support education, innovations, and academia-business cooperation in medical informatics (as one of four priority areas) at national level in Montenegro. The Hub topology and its organisation in the form of two main nodes, with services established within key pillars: Digital Education; Digital Business Support; Innovations and cooperation with industry; and Employment support.
Supervised object detection models are trained to recognize certain objects. These models are classified into two types: single-stage detectors and two-stage detectors. The single-stage detectors just need one pass through the model to anticipate all the bounding boxes, whereas the two-stage detectors require to first estimate the image portions where the object could be located. Due to their speed and simplicity, single-stage anchor-based models are used in many industrial settings. Training such models require bounding boxes that describe the spatial location of an object, which are usually drawn by an expert. However, the question remains, how much area should be considered when drawing the bounding boxes? In this paper, we demonstrate the effects that the size and placement of a rectangular bounding box can have on the performance of the anchor-based models. For this, we first perform experiments on a synthetically generated binary dataset and then on a real-world object detection dataset. Our results show that fixing the size of the bounding boxes can help in improving the performance of the model in the case of single class object detection (approximately 50% improvement in mAP@[.5:.95] for real world dataset). Furthermore, we also demonstrate how freely available tools can be combined for obtaining the best possible semi automated object labeling pipeline.
ARTHUR – Distributed Measuring System for Synchronous Data Acquisition from Different Data Sources
(2023)
In industrial manufacturing lines, different machines are well orchestrated and applied for their well-defined purpose. As each of these machines must be monitored and maintained in the first place, there are scenarios in which a Data Acquisition system brings enormous benefits. Since the cost of such professional systems is often not appropriate or feasible for research projects or prototyping, a proof of concept is often achieved by applying end-user hardware. In this work, a distributed measurement system for supporting the collection of data is described with respect to AI-based projects for research and teaching. ARTHUR (meAsuRing sysTem witH distribUted sensoRs) is arbitrarily expandable and has so far been used in the field of data acquisition on machine tools. Typical measured values are Accoustic Emission values, force plates X-Y-Z force values, simple PLC switching signals, OPC-UA machine parameters, etc., which were recorded by a wide variety of sensors. The overall ATHUR system is based on Raspberry Pis and consists of a master node, multiple independent measurement worker nodes, a streaming system realized with Redis, as well as a gateway that stores the data in the cloud. The major objectives of the ARTHUR system are scalability and the support for low-cost measuring components while solely applying open-source software. The work on hand discusses the advantages and disadvantages regarding the hard- and software of this TCP/IP-based system.