Refine
Year of publication
Document Type
- Bachelor Thesis (14)
- Master's Thesis (12)
- Researchpaper (4)
- Periodicalpart (3)
- Study Thesis (3)
- Book (2)
- Diploma Thesis (2)
- Article (1)
- Report (1)
Language
- English (42) (remove)
Has Fulltext
- yes (42)
Is part of the Bibliography
- no (42) (remove)
Keywords
- Computergraphik (2)
- Deep Learning (2)
- Deterministic Lockstep (2)
- Gamification (2)
- International Media Management, International Strategy ,Global Strategy ,Transnational Media Corporations ,Media Management ,International Management (2)
- Maschinelles Lernen (2)
- Networked Games (2)
- Verteilte Systeme (2)
- Visual Effects (2)
- deep learning (2)
Institute
- FB 1: Druck und Medien (19)
- Computer Science and Media (Master) (5)
- FB 2: Electronic Media (4)
- Bibliotheks- und Medienmanagement (Bachelor, Diplom) (3)
- FB 3: Information und Kommunikation (3)
- Audiovisuelle Medien (Bachelor, Diplom) (2)
- Bibliotheks- und Informationsmanagement (Bachelor, Master) (2)
- Medieninformatik (Bachelor, Diplom) (2)
- Bibliothek (1)
- Mobile Medien (Bachelor) (1)
Nowadays more and more companies use agile software development to build software in short release cycles. Monolithic applications are split into microservices, which can independently be maintained and deployed by agile teams. Modern platforms like Docker support this process. Docker offers services to containerize such services and orchestrate them in a container cluster. A software supply chain is the umbrella term for the process of developing, automated building and testing, as well as deploying a complete application. By combining a software supply chain and Docker, those processes can be automated in standardized environments. Since Docker is a young technology and software supply chains are critical processes in organizations, security needs to be reviewed. In this work a software supply chain based on Docker is built and a threat modeling process is used to assess its security. The main components are modeled and threats are identified using STRIDE. Afterwards risks are calculated and methods to secure the software supply chain based on security objectives confidentiality, integrity and availability are discussed. As a result, some components require special treatments in security context since they have a high residual risk of being targeted by an attacker. This work can be used as basis to build and secure the main components of a software supply chain. However additional components such as logging, monitoring as well as integration into existing business processes need to be reviewed.
Before gas is transported, natural gas traders have to plan with many contracts every day. If a cost-optimized solution is sought the most attractive contracts of a large contract set have to be selected. This kind of cost-optimization is also known as day-ahead balancing problem. In this work it is shown that it is possible to express this problem as a linear program that considers important influences and restrictions in the daily trading.
The aspects of the day-ahead balancing problem are examined and modelled individually. This way a basic linear program is gradually adapted towards a realistic mathematical formulation. The resulting linear optimization problem is implemented as a prototype that considers the discussed aspects of a cost-optimized contract selection.
Concepts and Services for Asylum Seekers in Public Libraries Using the Example of Germany and Norway
(2016)
The goal of the following bachelor thesis is to introduce concepts of public libraries concerning asylum seekers. As an example the thesis is using public libraries in Germany and Norway. Therefore, the reader will be introduced to the general situation, living conditions and preconditions of asylum seekers in both countries as well as to preconditions of libraries and librarians concerning monetary and territorial aspects and education of library staff. Important international library representatives as well as local actors will be introduced and the importance of cooperation between libraries and other organizations will be examined. In the main part practical methods, services, offers and ways of how libraries can help asylum seekers will be elaborated and possibilities how asylum seekers can actively participate in the library will be explained. Challenges which can occur will be detected and elaborated. Furthermore, the public library of Bergen in Norway and the public library of Duisburg in Germany will be presented as best practice examples.
Deep learning methods have proven highly effective for object recognition tasks, especially
in the form of artificial neural networks. In this bachelor’s thesis, a way is shown to imple-
ment a ready-to-use object recognition implementation on the NAO robotic platform using
Convolutional Neural Networks based on pretrained models. Recognition of multiple objects
at once is realized with the help of the Multibox algorithm. The implementation’s object
recognition rates are evaluated and analyzed in several tests.
Furthermore, the implementation offers a graphical user interface with several options to
adjust the recognition process and for controlling movements of the robot’s head in order
to easier acquire objects in the field of view. Additionally, a dialogue system for querying
further results is presented.
In recent years new trends such as industry 4.0 boosted the research and
development in the field of autonomous systems and robotics. Robots collaborate and
even take over complete tasks of humans. But the high degree of automation requires
high reliability even in complex and changing environments. Those challenging
conditions make it hard to rely on static models of the real world. In addition to
adaptable maps, mobile robots require a local and current understanding of the scene.
The Bosch Start-Up Company is developing robots for intra-logistic systems, which
could highly benefit from such a detailed scene understanding. The aim of this work
is to research and develop such a system for warehouse environments. While the
possible field of application is in general very broad, this work will focus on the
detection and localization of warehouse specific objects such as palettes.
In order to provide a meaningful perception of the surrounding a RGB-D camera is
used. A pre-trained convolutional network extracts scene understanding in the form
of pixelwise class labels. As this convolutional network is the core of the application,
this work focuses on different network set-ups and learning strategies. One difficulty
was the lack of annotated training data. Since the creation of densely labeled images
is a very time consuming process it was important to elaborate on good alternatives.
One interesting finding was that it’s possible to transfer learning to a high extent from
similar models pre-trained on thousands of RGB-images. This is done by selective
interventions on the net parameters. By ensuring a good initialization it’s possible
to train towards a well performing model within few iterations. In this way it’s
possible to train even branched nets at once. This can also be achieved by including
certain normalization steps. Another important aspect was to find a suitable way
to incorporate depth-information. How to fuse depth into the existing model? By
providing the height over ground as an additional feature the segmentation accuracy
was further improved while keeping the extra computational costs low.
Finally the segmentation maps are refined by a conditional random field. The joint
training of both parts results in accurate object segmentations comparable to recently
published state-of-the-art models.
When searching for bugs in Java enterprise applications, an essential part of the
eort consists in redeploying the source code and relaunching the server over and
over. In order to improve this situation, this thesis suggests the implementation
of a runtime debugging tool. The tool's purpose is to facilitate the enrichment of
operating application code with logging statements, which are inteded to generate
additional output concerning the webapp's current state. On behalf of this
so-called instrumentation, the actual process of debugging could be supported
and accelerated without having to interrupt the server's execution.
Due to the signicance of Java EE as well as Spring for today's enterprise development,
the implementation of a dedicated debugging tool for each platform
shall be covered. Both solutions pursue the same goal, but dier in the approach
and the programming paradigm forming their basis. This document introduces
their implementation details and evaluates them against a specication that de-
nes the general conditions and expectations in terms of the capabilities of a
satisfying result.
By now GPUs have become powerful general purpose processors that found their way not only into desktop systems but also supercomputers. To use GPUs efficiently one needs to understand their basic architecture and their limitations. We take a look at how GPUs evolved and how they differ from CPUs to gain a deeper understanding of the workloads well suited for GPUs.
Talking about highly scalable and reliable sys-
tems, issues like logging and monitoring are often
disregarded. However, being able to manage to-
day’s software systems absolutely requires deep
knowledge about the current state of applications
as well as the underlying infrastructure. Extract-
ing and preparing debug information as well as
various metrics in a fast and clearly arranged
manner is an essential precondition in order to
handle this task.
Since we at Bertsch Innovation GmbH also
face increasing requirements concerning Media-
Cockpit as one of our core products, we decided
to establish a centralized logging infrastructure
in order to come up to the application’s evolution
towards a more and more distributed system.
In this paper, I want to describe the steps
that I have taken in order to setup a functioning
logging tool stack consisting of Elasticsearch,
Logstash and Kibana (usually abbreviated as ELK stack ). Besides outlining proper
setup and configuration, I will also discuss possi-
ble pitfalls as well as custom adjustments made
when ELK did not meet our demands.
Innovative architecture and networks for learner-centred, local education and life-long-learning are receiving growing attention. Yet, practitioners still require practical guidance, given the challenge of involving and interacting with new and diverse stake-holder groups, such as architects and politicians, or the community at large. With the goal of advancing scientific and practical frameworks, this thesis approaches how stakeholders in ‘education-centred urban development’ (ECUD) can be helped to accomplish mutual understanding and more effective communication and interaction during planning.
Assuming the organizational theory of ‘networked governance’ (NG), a literature re-view is conducted across ‘institutional learning space development’ (ILSD) and the ‘learning city / region’ discourse (LCR), in order to discuss stakeholder involvement in planning. Six key themes are summarized and tested against a case study of ‘Hume Global Learning Village’ (HGLV), Australia, using a document analysis and expert online interviews.
The review finds the following themes: First, the concepts of ILSD and ECUD can be very abstract to comprehend, and stakeholders’ varied understandings of ‘learning’ demands an open, continuous dialogue. Next, individual leadership needs to initiate a vision, and multiply buy-in and followers. Securing sustainable funding sources is a precondition to foster participation and commitment. Long-standing organizational ‘silo-thinking’ has to be opened up towards cultures of sharing, collaboration, and innovation. Facilitation capacities are crucial to provide an inclusive planning process where con-sent and commitment is fostered. Lastly, change and positive learning effects may take a long time to show – this expectation has to be internalized by all stakeholders.
Despite few optimal interview sources, the case study confirms the themes, and illustrates that excess leadership can ensure the other conditions. This suggests that the six themes can serve as a framework for practitioners to conduct successful stake-holder involvement in planning. However, they are not unique among good-case literature. Moreover, the review shows a literature gap in how a suitable degree of stakeholder involvement can be selected. It is recommended to consolidate the various, alterna-tive planning processes and models, and further triangulate local experiences, in order to close this gap and derive more comprehensive and universal tools for practitioners.
This bachelor thesis wants to describe a prototypical implementation of a 3D user interface for intuitive real-time set editing in virtual production. Furthermore this approach is evaluated qualitatively through a user group, testing the device and fill in a questionnaire. The dimension of virtual elements created with computer graphics technology in all areas of entertainment industry is steadily growing since the past years. Nevertheless can the editing process of virtual elements still require a costly process in terms of time and money. With the appearance of new input devices and improved tracking technologies it is interesting to evaluate if a real-time editing process could improve this situation. Being currently bound to experts on special workstations, this could lead to a more intuitive and real-time workflow, enabling everybody on a film set to influence the digital editing process and work collaboratively on the scene consisting of virtual and real elements.