Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailThe Optical Diode Ideality Factor Enables Fast Screening of Semiconductors for Solar Cells
Babbe, Finn UL; Choubrac, Leo; Siebentritt, Susanne UL

in Solar RRL (2018), 1800248

Detailed reference viewed: 147 (5 UL)
Peer Reviewed
See detailOn the design and performance evaluation of automatic traffic report generation systems with huge data volumes
Vega Moreno, Carlos Gonzalo UL; Miravalls Sierra, Eduardo; Julián Moreno, Guillermo et al

in International Journal of Network Management (2018), 28(6), 2044

Summary In this paper, we analyze the performance issues involved in the generation of automated traffic reports for large IT infrastructures. Such reports allow the IT manager to proactively detect ... [more ▼]

Summary In this paper, we analyze the performance issues involved in the generation of automated traffic reports for large IT infrastructures. Such reports allow the IT manager to proactively detect possible abnormal situations and roll out the corresponding corrective actions. With the ever-increasing bandwidth of current networks, the design of automated traffic report generation systems is very challenging. In a first step, the huge volumes of collected traffic are transformed into enriched flow records obtained from diverse collectors and dissectors. Then, such flow records, along with time series obtained from the raw traffic, are further processed to produce a usable report. As will be shown, the data volume in flow records turns out to be very large as well and requires careful selection of the key performance indicators (KPIs) to be included in the report. In this regard, we discuss the use of high-level languages versus low-level approaches, in terms of speed and versatility. Furthermore, our design approach is targeted for rapid development in commodity hardware, which is essential to cost-effectively tackle demanding traffic analysis scenarios. Actually, the paper shows feasibility of delivering a large number of KPIs, as will be detailed later, for several TBytes of traffic per day using a commodity hardware architecture and high-level languages. [less ▲]

Detailed reference viewed: 58 (1 UL)
Full Text
Peer Reviewed
See detailMultifractality of jump diffusion processes
Yang, Xiaochuan UL

in Annales de L'Institut Henri Poincaré. Analyse Non Linéaire (2018)

Detailed reference viewed: 69 (1 UL)
Full Text
Peer Reviewed
See detailMagnetotransport signatures of three-dimensional topological insulator nanostructures
Moors, Kristof UL; Schüffelgen, P.; Rosenbach, D. et al

in Physical Review. B (2018), 97(24), 245429

We study the magnetotransport properties of patterned 3D topological insulator nanostructures with several leads, such as kinks or Y-junctions, near the Dirac point with analytical as well as numerical ... [more ▼]

We study the magnetotransport properties of patterned 3D topological insulator nanostructures with several leads, such as kinks or Y-junctions, near the Dirac point with analytical as well as numerical techniques. The interplay of the nanostructure geometry, the external magnetic field, and the spin-momentum locking of the topological surface states lead to a richer magnetoconductance phenomenology as compared to straight nanowires. Similar to straight wires, a quantized conductance with perfect transmission across the nanostructure can be realized across a kink when the input and output channels are pierced by a half-integer magnetic flux quantum. Unlike for straight wires, there is an additional requirement depending on the orientation of the external magnetic field. A right-angle kink shows a unique π -periodic magnetoconductance signature as a function of the in-plane angle of the magnetic field. For a Y-junction, the transmission can be perfectly steered to either of the two possible output legs by a proper alignment of the external magnetic field. These magnetotransport signatures offer new ways to explore topological surface states and could be relevant for quantum transport experiments on nanostructures which can be realized with existing fabrication methods. [less ▲]

Detailed reference viewed: 95 (6 UL)
Full Text
Peer Reviewed
See detailDIRECTIVE 2012/13/EU ON THE RIGHT TO INFORMATION IN CRIMINAL PROCEEDINGS
Allegrezza, Silvia UL; Covolo, Valentina UL

in Allegrezza, Silvia; Covolo, Valentina (Eds.) EFFECTIVE DEFENCE RIGHTS IN CRIMINAL PROCEEDINGS A European and Comparative Study on Judicial Remedies (2018)

Detailed reference viewed: 51 (1 UL)
See detailAmok an Schulen: Prävention, Intervention und Nachsorge bei School Shootings
Böhmer, Matthias UL

Book published by Springer (2018)

School Shootings - umgangssprachlich auch als Amokläufe an Schulen bezeichnet - stellen eine seltene, aber schwerwiegende Form von zielgerichteter Gewalt an Schulen dar. Dieses Buch stellt erstens die in ... [more ▼]

School Shootings - umgangssprachlich auch als Amokläufe an Schulen bezeichnet - stellen eine seltene, aber schwerwiegende Form von zielgerichteter Gewalt an Schulen dar. Dieses Buch stellt erstens die in der aktuellen wissenschaftlichen Forschung diskutierten Ursachen dar. Neben Tätermerkmalen wird auf das private wie schulische Lebensumfeld , den Einfluss von Massenmedien, die Zugänglichkeit zu Waffen sowie auf den Konsum gewalthaltiger Medien abgehoben. Zweitens werden primär- und sekundärpräventive Maßnahmen dargestellt wie das Profiling, Threat Assessments sowie das Phänomen des Leakings. Und drittens liegt der Fokus auf der Nachsorge bei School Shootings, deren Ziel es ist, erlebte psychotraumatische Belastung zu bewältigen. Es werden notfallpsychologische Akuthilfen, kurzfristige bis mittelfristige, traumafokussierte, sowie längerfristige Interventionsmaßnahmen für Kinder, Jugendliche und Erwachsene näher erläutert. Praxisexkurse zur Prävention als auch zur Nachsorge ergänzen die entsprechenden Kapitel. [less ▲]

Detailed reference viewed: 106 (11 UL)
See detailGCAI-2018. 4th Global Conference on Artificial Intelligence
Lee, Daniel; Steen, Alexander UL; Walsh, Toby

Book published by EasyChair (2018)

Detailed reference viewed: 33 (4 UL)
Full Text
Peer Reviewed
See detailBenchmark Dataset for Evaluation of Range-Based People Tracker Classifiers in Mobile Robots
Álvarez-Aparicio, Claudia; Guerrero-Higueras, Ángel Manuel; Olivera, Maria Carmen Calvo et al

in Frontiers in Neurorobotics (2018), 11

Detailed reference viewed: 67 (0 UL)
Full Text
Peer Reviewed
See detailMessage Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots
Rodriguez Lera, Francisco Javier UL; Matellán-Olivera, Vicente; Balsa-Comerón, Jesús et al

in Frontiers in ICT (2018), 5

In human-robot interaction situations, robot sensors collect huge amounts of data from the environment in order to characterize the situation. Some of the gathered data ought to be treated as private ... [more ▼]

In human-robot interaction situations, robot sensors collect huge amounts of data from the environment in order to characterize the situation. Some of the gathered data ought to be treated as private, such as medical data (i.e., medication guidelines), personal and safety information (i.e., images of children, home habits, alarm codes, etc.). However, most robotic software development frameworks are not designed for securely managing this information. This paper analyzes the scenario of hardening one of the most widely used robotic middlewares, Robot Operating System (ROS). The study investigates a robot’s performance when ciphering the messages interchanged between ROS nodes under the publish/subscribe paradigm. In particular, this research focuses on the nodes which manage cameras and LIDAR sensors, which are two of the most extended sensing solutions in mobile robotics, and analyzes the collateral effects on the robot's achievement under different computing capabilities and encryption algorithms (3DES, AES and Blowfish) to robot performance. The findings present empirical evidence that simple encryption algorithms are lightweight enough to provide cyber-security even in low-powered robots when carefully designed and implemented. Nevertheless, these techniques come with a number of serious drawbacks regarding robot autonomy and performance if they are applied randomly. To avoid these issues, we define a taxonomy that links the type of ROS message, computational units, and the encryption methods. As a result, we present a model to select the optimal options for hardening a mobile robot using ROS. [less ▲]

Detailed reference viewed: 64 (0 UL)
See detailProceedings of the 12th International Symposium on Theoretical Aspects of Software Engineering
Pang, Jun UL; Zhang, Chenyi; He, Jifeng et al

Book published by IEEE Computer Society (2018)

Detailed reference viewed: 31 (2 UL)
Full Text
Peer Reviewed
See detailHiMoP: A three-component architecture to create more human-acceptable social-assistive robots
Rodriguez Lera, Francisco Javier UL; Matellán-Olivera, Vicente; Conde-González, Miguel Á. et al

in Cognitive Processing (2018), 19(2), 233--244

Generation of autonomous behavior for robots is a general unsolved problem. Users perceive robots as repetitive tools that do not respond to dynamic situations. This research deals with the generation of ... [more ▼]

Generation of autonomous behavior for robots is a general unsolved problem. Users perceive robots as repetitive tools that do not respond to dynamic situations. This research deals with the generation of natural behaviors in assistive service robots for dynamic domestic environments, particularly, a motivational-oriented cognitive architecture to generate more natural behaviors in autonomous robots. The proposed architecture, called HiMoP, is based on three elements: a Hierarchy of needs to define robot drives; a set of Motivational variables connected to robot needs; and a Pool of finite-state machines to run robot behaviors. The first element is inspired in Alderfer's hierarchy of needs, which specifies the variables defined in the motivational component. The pool of finite-state machine implements the available robot actions, and those actions are dynamically selected taking into account the motivational variables and the external stimuli. Thus, the robot is able to exhibit different behaviors even under similar conditions. A customized version of the ``Speech Recognition and Audio Detection Test,'' proposed by the RoboCup Federation, has been used to illustrate how the architecture works and how it dynamically adapts and activates robots behaviors taking into account internal variables and external stimuli. [less ▲]

Detailed reference viewed: 100 (0 UL)
Full Text
Peer Reviewed
See detailInfluence of Sodium and Rubidium Postdeposition Treatment on the Quasi-Fermi Level Splitting of Cu(In,Ga)Se2 Thin Films
Wolter, Max UL; Bissig, Benjamin; Avancini, Enrico et al

in IEEE Journal of Photovoltaics (2018)

Detailed reference viewed: 99 (3 UL)
Full Text
Peer Reviewed
See detailInterdiffusion and Doping Gradients at the Buffer/Absorber Interface in Thin-Film Solar Cells
Werner, Florian UL; Babbe, Finn UL; Burkhart, Jan UL et al

in ACS Applied Materials and Interfaces (2018), 10

Detailed reference viewed: 115 (9 UL)
Full Text
Peer Reviewed
See detailGenerating symbolic representation from sensor data: Inferring knowledge in robotics competitions
Rodriguez Lera, Francisco Javier UL; Martín-Rico, F.; Matelián-Olivera, V.

in 2018 IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC) (2018)

Detailed reference viewed: 61 (0 UL)
Full Text
See detailGrenzüberschreitende Finanzdienstleistungen
Zetzsche, Dirk Andreas UL; Lehmann, M.

Book published by Mohr Siebeck (2018)

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailDas grenzüberschreitende Investmentdreieck – das IPR und IZPR der Investmentfonds
Zetzsche, Dirk Andreas UL

in Cross-Border Financial Services (2018)

Detailed reference viewed: 53 (1 UL)
Full Text
Peer Reviewed
See detailAluminum pretreatment by a laser ablation process: influence of processing parameters on the joint strength of laser welded aluminum – polyamide assemblies
Al Sayyad, Adham UL; Bardon, Julien; Hirchenhahn, Pierre et al

in Procedia CIRP (2018)

Laser welding of metal – polymer assemblies is an innovative bonding process. It was already demonstrated that laser surface pretreatments of aluminum (Al), prior to laser welding with a polymer, impacts ... [more ▼]

Laser welding of metal – polymer assemblies is an innovative bonding process. It was already demonstrated that laser surface pretreatments of aluminum (Al), prior to laser welding with a polymer, impacts joints strength. This work adopts a design of experiments (DoE) approach to investigate the influence of several Al laser ablation parameters on joint strength of laser welded Al – polyamide (PA6.6) assemblies. Significant parameters were highlighted, process window was outlined, and optimal parameters were identified. After assembly failure, the joint area was evaluated using optical microscopy. Depending on the laser ablation parameters, the joint area can be enhanced resulting in a significant increase in the corresponding bearable shear load. [less ▲]

Detailed reference viewed: 94 (9 UL)