Universität Stuttgart
Permanent URI for this communityhttps://elib.uni-stuttgart.de/handle/11682/1
Browse
Item Open Access 3D pose estimation of vehicles from monocular videos using deep learning(2018) Cheng, QingIn this thesis, we present a novel approach, Deep3DP, to perform 3D pose estimation of vehicles from monocular images intended for autonomous driving scenarios. A robust deep neural network is applied to simultaneously perform 3D dimension proximity estimation, 2D part localization, and 2D part visibility prediction. In the inference phase, these learned features are fed to a pose estimation algorithm to recover the 3D location, 3D orientation, and 3D dimensions of the vehicles with the help of a set of 3D vehicle models. Our approach can perform these six tasks simultaneously in real time and handle highly occluded or truncated vehicles. The experiment results show that our approach achieves state-of-the-art performance on six tasks and outperforms most of the monocular methods on the challenging KITTI benchmark.Item Open Access 3D video tracking and localization of underwater swarm robots(2012) Antoni, MartinAutonomous underwater vehicles (AUV) are robots, which usually estimate their position by localization the help of internal or external sensors. In this thesis, small swarm robots from the CoCoRo are used as experimental platform. It is often useful, to know the exact position inside the testing area to evaluate swarm algorithms. Controlling the position of the robot should be possible as well. A software is developed, which is able to track a robot inside an aquarium. Two cameras are install at each side of this aquarium for determining the 3D position which includes the diving depth. Perspective distortions, which come from viewing angle, are compensated with the help of image transformation. With the corrected image, the template matching algorithm with normalized cross-correlation is used to track the robot in the camera image. A wireless connection is established between the computer and the robot to read out sensor data and to control the motors. Waypoints can be set by the user which the robot follows. The computer uses two independent controllers for rotational and for distance control.Item Open Access A 3D-aware conditional diffusion model for gaze redirection(2024) Cho, Yeon JooGaze redirection refers to the task of modifying the direction of eye gaze and its corresponding facial counterparts to a targeted direction, while preserving the original identity of the subject. An effective gaze redirection approach must (i) be aware of the 3D nature of the task, (ii) accurately redirect the gaze into any specified direction, and (iii) generate photorealistic output images that preserve the shape and texture details from the input images. In response to these requirements, this thesis presents a novel approach to gaze redirection using a 3D-aware conditional diffusion model that leverages the intrinsic geometric properties of human faces. This approach effectively transforms the task into a conditional image-to-image translation. To embed 3D awareness comprehensively, we adopt a viewpoint-conditioned diffusion model, that can learn the 3D context of the facial geometry. Then, the conditions to this model are unique gaze rotations and latent facial parameters from the face images. These strategies are further reinforced by a novel loss function focused on gaze direction and head orientation, which enhances the model's ability to learn and apply accurate gaze and head adjustments effectively. Together, these elements underscore the potential of our approach to produce high-quality, accurate gaze redirection, fulfilling the complex demands of this sophisticated visual task.Item Open Access About the design changes required for enabling ECM systems to exploit cloud technology(2020) Shao, GangSince the late 1980s, Enterprise Content Management Systems (ECM systems) have been used to store, manage, distribute all kinds of documents, media content, and information in enterprises. ECM systems also enable enterprises to integrate their business processes with contents, employing corporate information lifecycle and governance as well as automation of contents processing. The ever-changing business models and increasing demands have pushed ECM systems to evolve into a very active content repository with expectations such as high availability, high scalability, high customizability. These expectations soon became a costly financial burden for enterprises. The on-going hype around cloud computing has raised attention with its claims on improved manageability, less maintenance, and cost-effectiveness. Embracing the cloud might be a good solution for the next high-performance ECM system at an affordable price. To achieve such a goal, the designs of ECM systems must be changed before deployment into the cloud. Thus, this thesis aims to analyze the architecture design of legacy ECM systems, determine its shortcomings, and propose design changes required for embracing cloud technologies. The main proposal to design changes are i) decomposing an ECM system to its constituent components, ii) containerizing those components and create standard images, iii) decoupling the physical link between the data storage device from the applications container by utilizing docker volumes in dedicated persistent data containers instead, iv) utilizing software-defined network infrastructure where possible. These design changes then were tested with a proof-of-concept prototype, where an ECM product was successfully deployed and tested using Docker in a cloud environment backed by OpenStack.Item Open Access Absicherung der SOME/IP Kommunikation bei Adaptive AUTOSAR(2017) Kreissl, JochenDie Entwicklung einer neuen Generation vernetzter, (teil-)autonomer und zumindest teilweise elektrisch betriebener Fahrzeuge fordert von der Automobilindustrie den Wechsel zu einer neuen Fahrzeugarchitektur, welche den Einsatz dynamischer Softwarekomponenten auf leistungsstarker Hardware ermöglicht. Um den schnellen Austausch der notwendigen Informationen zwischen einzelnen Systemen zu gewährleisten, werden zudem On-Board Kommunikationsnetze mit hoher Bandbreite benötigt. Die adaptive AUTomotive Open System ARchitecture (AUTOSAR) Plattform in Verbindung mit IP-basierter, service-orientierter Kommunikation soll die Basis für diese neue Fahrzeuggeneration bereitstellen. Für eine hohe Abstraktionsebene der Kommunikation zwischen einzelnen Softwarekomponenten sieht die adaptive AUTOSAR Spezifikation den Einsatz der Scalable service-Oriented MiddlewarE over IP (SOME/IP) vor, welche den dynamischen Aufbau von Kommunikationskanälen zwischen den Komponenten zur Laufzeit des Systems ermöglicht (Service Discovery). Durch den hohen Grad der Vernetzung von Fahrzeugen, insbesondere durch die Internetanbindung via moderner Mobilfunkstandards, steigt zugleich die Gefahr von Angriffen auf Fahrzeuge durch Hacker und Schadsoftware. Um dennoch die Sicherheit der übertragenen Daten, und damit indirekt die Sicherheit der Passagiere, zu gewährleisten, müssen die eingesetzten Kommunikationsprotokolle höchsten Sicherheitsansprüchen genügen. Nach einer kurzen Einführung der adaptive AUTOSAR Plattform und des SOME/IP-Protokolls wird in der folgenden Arbeit eine Gefahren- und Risikoanalyse der Fahrzeugarchitektur durchgeführt. Dabei liegt der Schwerpunkt auf der Analyse der On-Board Kommunikation. Weiterhin werden Sicherheitsprotokolle untersucht, welche die aufgedeckten Schwachstellen wirksam und effizient absichern, wobei auf den Einsatz asymmetrischer Verfahren soweit wie möglich verzichtet wird. Insbesondere werden Protokolle zur Absicherung von Multicast-basierter Kommunikation betrachtet, da das SOME/IP-Protokoll für die Implementierung effizienter Gruppenkommunikation und das Auffinden von Softwarekomponenten IP-Multicast einsetzt. Die betrachteten Protokolle werden im Anschluss auf ihre Kompatibilität mit dem SOME/IP-Standard untersucht und durch Kombination verschiedener Ansätze ein Gesamtkonzept für die Absicherung der gesamten SOME/IP-Kommunikation innerhalb des Systems entwickelt. Während die Unicast-Kommunikation mithilfe des weit verbreiteten Transport Layer Security (TLS) Protokoll erreicht werden kann, wird eine Kombination von TLS und dem Time Efficient Stream Loss-tolerant Authentication (TESLA) Protokoll vorgestellt, um die Multicast-Kommunikation von SOME/IP abzusichern. Wird die Option zur Sitzungswiederaufnahme (Session Resumption) des TLS-Protokolls genutzt, so kommt das vorgestellte Konzept vollkommen ohne asymmetrische Kryptographie aus und erreicht dennoch die Sicherheitseigenschaften Geheimhaltung und Senderauthentifizierung für alle Kommunikationskonzepte des SOME/IP Protokolls. Die Authentizität übertragener Nachrichten kann dabei insbesondere auch dann garantiert werden, wenn ein Angreifer vollständige Kontrolle über einen Kommunikationspartner besitzt.Item Open Access Accelerated computation using runtime partial reconfiguration(2013) Nayak, Naresh GaneshRuntime reconfigurable architectures, which integrate a hard processor core along with a reconfigurable fabric on a single device, allow to accelerate a computation by means of hardware accelerators implemented in the reconfigurable fabric. Runtime partial reconfiguration provides the flexibility to dynamically change these hardware accelerators to adapt the computing capacity of the system. This thesis presents the evaluation of design paradigms which exploit partial reconfiguration to implement compute intensive applications on such runtime reconfigurable architectures. For this purpose, image processing applications are implemented on Zynq-7000, a System on a Chip (SoC) from Xilinx Inc. which integrates an ARM Cortex A9 with a reconfigurable fabric. This thesis studies different image processing applications to select suitable candidates that benefit if implemented on the above mentioned class of reconfigurable architectures using runtime partial reconfiguration. Different Intellectual Property (IP) cores for executing basic image operations are generated using high level synthesis for the implementation. A software based scheduler, executed in the Linux environment running on the ARM core, is responsible for implementing the image processing application by means of loading appropriate IP cores into the reconfigurable fabric. The implementation is evaluated to measure the application speed up, resource savings, power savings and the delay on account of partial reconfiguration. The results of the thesis suggest that the use of partial reconfiguration to implement an application provides FPGA resource savings. The extent of resource savings depend on the granularity of the operations into which the application is decomposed. The thesis could also establish that runtime partial reconfiguration can be used to accelerate the computations in reconfigurable architectures with processor core like the Zynq-7000 platform. The achieved computational speed-up depends on factors like the number of hardware accelerators used for the computation and the used reconfiguration schedule. The thesis also highlights the power savings that may be achieved by executing computations in the reconfigurable fabric instead of the processor core.Item Open Access Accelerating segment anything models via token merging : a comparative study and a spectrum preservation-based approach(2025) Xie, SiweiThe Segment Anything Model (SAM) has emerged as a significant advancement in image segmentation, demonstrating exceptional generalization across diverse datasets with minimal task-specific tuning. However, its computational demands, inherited from Vision Transformers (ViTs), pose considerable challenges for deployment in resource-constrained environments. This thesis addresses these challenges by integrating token merging strategies, which have proven effective in enhancing the efficiency of ViTs without additional training. Specifically, we conduct a comprehensive analysis of SAM’s architecture and adapt existing token merging techniques to reduce computational overhead while maintaining high segmentation accuracy. We propose an architecture for SAM that incorporates these strategies and evaluate its performance and computational efficiency across various datasets, showing that our approach effectively accelerates SAM’s inference speed while preserving segmentation quality. Furthermore, we propose GradToMe based on PiToMe, an innovative method that leverages gradient approximation and grid-based sampling to combine similar tokens. This approach emphasizes spectrum preservation to retain critical information during the token reduction process, thereby improving the effectiveness of token merging and further saving computational costs. Consequently, our results demonstrate that this approach enhances the feasibility of deploying SAM in real-time applications, making it more suitable for use in resource-limited environments without compromising performance. Code is available at: https://github.com/xxjsw/tome_sam.Item Open Access Accelerating TensorFlow machine learning inferences on FPGA-based edge platforms(2025) Naganna, HarshithAs the world becomes more interconnected and data-driven, the demand for real-time data analysis and forecasting is increasing. Time-series forecasting, which predicts future values based on historical data, is widely used in this context. Machine learning and deep learning models are effective for such tasks but are computationally intensive, posing challenges for deployment on edge devices with limited processing power and energy constraints. This work explores hardware–software co-design using FPGAs (Field Programmable Gate Arrays) to accelerate time-series inference. FPGAs offer parallel computation capabilities, reducing latency and increasing throughput for real-time applications. We implement the accelerator on AMD’s Zynq UltraScale+ MPSoC, which combines a dual-core Cortex-A53 processor with programmable logic on a single chip, enabling seamless offloading of complex computations. The accelerator was developed using Vitis HLS and integrated with the processing system via Vivado. A PetaLinux project enabled communication with the Linux kernel, while custom C++ drivers interfaced the accelerator with the TensorFlow Lite runtime over the AXI protocol. A TensorFlow Lite delegate was developed to offload fully connected layer computations seamlessly onto the FPGA. The complete system was deployed on the Zynq UltraScale+ MPSoC, and experimental evaluation compared CPU-only and CPU–FPGA setups in terms of latency, power consumption, resource utilization, and accuracy. Results showed that inference on the FPGA accelerator was only 0.5% slower than the CPU-only baseline, as the primary focus was on establishing the hardware-software co-design pipeline rather than optimizing the hardware for maximum performance. Model evaluation achieved a mean absolute error (MAE) of 0.01 and mean squared error (MSE) of 0.20 for the magnitude component, while the phase component obtained an MAE of 4.75 and MSE of 14.99. These findings demonstrate that even with minimal optimization, FPGA acceleration integrated with TensorFlow Lite delegates provides a functional and extensible framework for real-time forecasting on edge devices, paving the way for more efficient and responsive edge computing solutions.Item Open Access Accountable secure multi-party computation for tally-hiding e-voting(2020) Rivinius, MarcWith multi-party computation becoming more and more efficient and thus more practical, we can start to investigate application scenarios. One application where multi-party computation can be used to great effect is e-voting. Unlike classical e-voting protocols, one can get tally-hiding e-voting systems. There, some part of the tally (especially the whole set of votes) is not made public. Notwithstanding this, most existing (verifiable) multi-party computation protocols are not suitable for e-voting. A property that is arguably more important than verifiability is missing: accountability -- as a matter of fact, we need external accountability in this setting, where anyone audit the protocol. This is especially of importance for e-voting systems and more researchers are paying attention to it lately. To this effect, we introduce a general multi-party computation protocol that meets all the requirements to be used in e-voting systems. Our protocol achieves accountability and fairness in the honest majority setting and is -- to our best knowledge -- the first one to do so.Item Open Access ACP Dashboard: an interactive visualization tool for selecting analytics configurations in an industrial setting(2017) Volga, YuliyaThe production process on a factory can be described by big amount of data. It is used to optimize the production process, reduce number of failures and control material waste. For this, data is processed, analyzed and classified using the analysis techniques - text classification algorithms. Thus there should be an approach that supports choice of algorithms on both, technical and management levels. We propose a tool called Analytics Configuration Performance Dashboard which facilitates process of algorithm configurations comparison. It is based on a meta-learning approach. Additionally, we introduce three business metrics on which algorithms are compared, they map onto machine learning algorithm evaluation metrics and help to assess algorithms from industry perspective. Moreover, we develop a visualization in order to provide clear representation of the data. Clustering is used to define groups of algorithms that have common performance in business metrics. We conclude with evaluation of the proposed approach and techniques, which were chosen for its implementation.Item Open Access Active exploration and identification of kinematic devices(2016) Mohrmann, JochenAs an important part of solving the lockbox problem, this thesis deals with the problem of identifying kinematic devices based on data generated using an Active Learning strategy. We model the belief over different device types and parameters using a discrete multinomial distribution. We discretize directions as a Geodesic sphere. This allows an isotropic distribution without being biased towards certain directions. The belief update is based on experience using a Bayes Filter. This allows to localize the correct states, even if an action fails to generate movement. Our action selection strategy aims to minimize the number of actions necessary to identify devices by considering the expected future belief. We evaluate the effectiveness of different information measures and compare them with a random strategy within a simulation. Our experiments show that the use of the MaxCE strategy creates the best results. We were able to correctly identify prismatic, revolute, and fixed devices in 3D space.Item Open Access Active learning strategies for deep learning based question answering models(2024) Lin, Kuan-YuQuestion Answering (QA) systems enable machines to understand human language, requiring robust training on related datasets. Nonetheless, large, high-quality datasets are only sometimes available due to cost restrictions. Active learning (AL) addresses this challenge by selecting the data with high information value as small subsets for model training, considering computational resources while preserving performance. There are many different ways to detect the information value of the data, which in turn leads to a variety of AL strategies. In this study, we aim to investigate the performance change of the QA system after applying various AL strategies. In addition, we use the BatchBALD strategy, compared with its predecessor, the BALD strategy, to inspect the advantages of batch querying in data selection. Eventually, we propose Unique Context Selection (UC) and Unique Embedding Selection Methods (UE) to enhance the sampling effectiveness by ensuring maximal diversity of context and embedding within querying samples, respectively. Observing the experimental results, we learn that each dataset has its own AL strategy that brings out its best results, and there is no universal optimal AL strategy for QA tasks. BatchBALD maintains the modeling results similar to BALD in the regular setting while significantly reducing computation time, though this feature is not practiced in the low-resource setting. Finally, UC could not enhance the effectiveness of AL since half of the datasets used in this study consisted of more than 65% unique contexts. However, the effect of UE enhancement deviates across datasets and AL strategies, but it can be observed that most of the AL strategies with the best effect of UE enhancement can increase by more than 0.5% F1. Compared with context, a feature of datasets is limited to natural language processing tasks; embedding is more generalized and has a good enhancement effect, which is worth studying in depth.Item Open Access Adaptation of the data access layer to enable cloud data access(2012) Reza, S. M. MohsinIn the current era of technology, Cloud computing has become significantly popular within enterprise IT community, as it brings a large number of opportunities and provides solutions for user’s data, software, and computations. As part of the Cloud computing the service model Database-as-a-Service (DBaaS) has been recognized, where application can access highly available, scaled, and elastic data store services on demand with the possibility of paying only for the resources are actually consumed. While enterprise IT becoming larger these days, the current challenges are to manage the traditional database with entire enterprise data. One possible solution is to move the application data to the Cloud and then accessing Cloud data from the traditional application on local server. Thus, ensuring the use of economies of scale and reducing the capital expenditure of enterprise IT. Moving data layer to the Cloud introduces an issue how an application can access data from the Cloud data store services with full functionality of accessing like traditional database service. To ensure this possibility, the application needs to be implemented a Data Access Layer (DAL) separately in order to enable access to Cloud data, where DAL is responsible for encapsulating the data access functionalities and interacts with business logic within the application system. Thus reduces the application complexity and brings the solutions for managing entire enterprise, data. However, accessing heterogeneous data store services the DAL requires implementing necessary adaptations. This master’s thesis focuses on investigating the adaptations of SQL statements required for accessing Relational Database Management Systems (RDMS) in the Cloud. In this scope, we perform testing on several RDMS (i.e. MySQL, Oracle, PostgreSQL) in different Cloud services in order to determine the required adaptations. However, the adaptations are to be implemented in DAL for enable accessing Cloud data. Evaluating the adaptations of SQL statements, a software application called SQL Evaluation tool has been developed in this master’s thesis, where the application has implemented a DAL explicitly and is capable to execute the SQL statements simultaneously in different Cloud data store services. The purpose of developing this application is verifying the concept of adaptation of DAL.Item Open Access Adaptive robust scheduling in wireless Time-Sensitive Networks (TSN)(2024) Egger, SimonThe correct operation of upper-layer services is unattainable in wireless Time-Sensitive Networks (TSN) if the schedule cannot provide formal reliability guarantees to each stream. Still, current TSN scheduling literature leaves reliability, let alone provable reliability, either poorly quantified or entirely unaddressed. This work aims to remedy this shortcoming by designing an adaptive mechanism to compute robust schedules. For static wireless channels, robust schedules enforce the streams' reliability requirements by allocating sufficiently large wireless transmission intervals and by isolating omission faults. While robustness against omission faults is conventionally achieved by strictly isolating each transmission, we show that controlled interleaving of wireless streams is crucial for finding eligible schedules. We adapt the Disjunctive Graph Model (DGM) from job-shop scheduling to design TSN-DGM as a metaheuristic scheduler that can schedule up to one hundred wireless streams with fifty cross-traffic streams in under five minutes. In comparison, we demonstrate that strict transmission isolation already prohibits scheduling a few wireless streams. For dynamic wireless channels, we introduce shuffle graphs as a linear-time adaptation strategy that converts reliability surpluses from improving wireless links into slack and reliability impairments from degrading wireless links into tardiness. While TSN-DGM is able to improve the adapted schedule considerably within ten seconds of reactive rescheduling, we justify that the reliability contracts between upper-layer services and the infrastructure provider should specify a worst-case channel degradation beyond which no punctuality guarantees can be made.Item Open Access Adding value to object storage: integrating analytics with cloud storage back ends(2016) Noori, HodaWith the vast interest of customers in using the cloud infrastructure, cloud providers are going beyond limits to offer advanced functionalities. They try their utmost best to present the services in a way that makes the customers highly attracted and convince them about value and benefits of using such services. For this purpose, cloud providers need to have an access to customers’ data, hence customer-sensitive data stored in repositories should be transferred to the cloud. Object storages are one of the possible solutions for the implementation of repositories in cloud environments. However, due to the data being confidential and fragile, security and encryption mechanisms are required. The application of Enterprise Content Management (ECM) system highly relies on metadata, thus there is a need to keep metadata unencrypted while encrypting data itself. Therefore, cloud providers that are hosting ECM systems are forced to keep metadata unencrypted in order to satisfy the main functionalities of ECM systems on the cloud. Although other cloud providers can offer data encryption and unencrypted metadata as an option to their customers. This leads to the conclusion that enhancing object storages with analysis capabilities in ECM systems is more beneficial if it is done on top of unencrypted metadata. In this thesis I investigate how value can be added to such cloud storage services by only using access the metadata. I specifically focus on providing analytics functionality on metadata. This Master’s thesis aims at providing the means to efficiently analyze the metadata inside a cloud-based ECM system (OSECM) which uses Swift Object Store as its back end repository. I extended the OSECM system with required components by providing new modules that enable the retrieval of metadata from the object storage and the insertion of this metadata into a metadata warehouse. The importance of metadata replication in a distinct data warehouse offers the possibility of benefiting from SQL query capabilities for analysis purposes. Furthermore, an existing tool was integrated as the analysis component to offer the means for interaction with the underlying metadata warehouse and the user interface. Finally, after applying analysis queries, the results are presented on the user interface using the predefined set of visualization interfaces. The supported data structure for the visualization of the result are also defined in this work.Item Open Access Item Open Access Addressing TCAM limitations in an SDN-based pub/sub system(2017) Balogh, AlexanderContent-based publish/subscribe is a popular paradigm that enables asynchronous exchange of events between decoupled applications that is practiced in a wide range of domains. Hence, extensive research has been conducted in the area of efficient large-scale pub/sub system. A more recent development are content-based pub/sub systems that utilize software-defined networking (SDN) in order to implement event-filtering in the network layer. By installing content-filters in the ternary content-addressable memory (TCAM) of switches, these systems are able to achieve event filtering and forwarding at line-rate performance. While offering great performance, TCAM is also expensive, power hunger and limited in size. However, current SDN-based pub/sub systems don't address these limitations, thus using TCAM excessively. Therefore, this thesis provides techniques for constraining TCAM usage in such systems. The proposed methods enforce concrete flow limits without dropping any events by selectively merging content-filters into more coarse granular filters. The proposed algorithms leverage information about filter properties, traffic statistics, event distribution and global filter state in order to minimize the increase of unnecessary traffic introduced through merges. The proposed approach is twofold. A local enforcement algorithm ensures that the flow limit of a particular switch is never violated. This local approach is complemented by a periodically executed global optimization algorithm that tries to find a flow configuration on all switches, which minimized to increase in unnecessary traffic, given the current set of advertisements and subscriptions. For both classes, two algorithms with different properties are outlined. The proposed algorithms are integrated into the PLEROMA middleware and evaluated thoroughly in a real SDN testbed as well as in a large-scale network emulation. The evaluations demonstrate the effectiveness of the approaches under diverse and realistic workloads. In some cases, reducing the number of flows by more than 70% while increasing the false positive rate by less than 1% is possible.Item Open Access Adiabatic approximation for the dynamics of magnetoexcitons in Cu2O(2019) Ertl, JanWhen exciting an electron in a semiconductor from the valence to the conduction band, the missing electron in the valence band can be treated as a positively charged quasi particle, the hole. As a bound state of electron and hole the exciton is the solid state analogon to the hydrogen atom. The most important difference when comparing exctions to hydrogen-like systems is the influence of the band structure in the solid state system. The band structure breaks the full rotational symmetry of the hydrogen-like system leading to additional features in the absorption spectra of cuprous oxide. Absorption spectra for magnetoexcitons in cuprous oxide can be calculated in a quantum mechanical framework with good accordance to the experimental spectra. However those calculations are limited to low principal quantum numbers. On the other hand experimental data is available for higher energies. In the range of the gap energy one can observe quasi-Landau resonances. In atomic physics these features can be explained within a semiclassical theory. This connects properties of classical orbits to the observed absorption spectra. This thesis aims to lay down the foundations for the calculation of classical orbits for magentoexcitons in cuprous oxide as well as their parameters to provide the tools to apply semiclassical theory.Item Open Access Adjoint functors between crossed squares and [2,0]-simplicial groups(2025) Asiki, Natalia-MariaWe consider the category [2,0]-SimpGrp of [2,0]-simplicial groups, the category CrSq of crossed squares and the category 2-CrMod of 2-crossed modules. Porter constructed a functor Sq from [2,0]-SimpGrp to CrSq. The category CrSq carries a transposition functor Tr. Conduché has constructed a total 2-crossed module functor To from CrSq to 2-CrMod and a reconstruction equivalence Rec from 2-CrMod to [2,0]-SimpGrp. We show that Sq is left-adjoint to the composite of Tr, To and Rec.Item Open Access Adjusting virtual worlds to real world feedback limitations while using quadcopters(2017) Hoppe, MatthiasThe current development of Virtual Reality technologies are mostly focused on providing deeper immersion by improving displays and 3D audio quality. The influence of interaction and haptic feedback is often neglected. State-of-the-art technologies are still adapting gamepads and forcing the user to hold controllers that give haptic feedback by simply applying vibration. Such interaction and haptic feedback methods are therefore inducing less presence on the user. We suggest a method of combining hands free hand tracking and providing haptic feedback by utilising quadcopters as a feedback device. We reviewed haptic quadcopter feedback by conducting three user studies to validate the quality of quadcopter feedback, explore the ability to simulate various objects and explore additional feedback methods for simulating objects with extreme properties. We found that haptic feedback provided by quadcopters in combination with hand tracking is a feasible improvement of providing feedback. Furthermore, haptic quadcopter feedback is well received while simulating interaction with small, light object or objects with a soft surface. In cases of non-moving, solid objects additional feedback methods can be applied to increase the resistance felt by the user. While limitations have to be kept in mind when it comes to designing virtual worlds to include quadcopter feedback, we see it as a suitable way of providing flexible, three-dimensional, hands-free, haptic feedback.