Christoph Reich

Christoph Reich
Furtwangen University | HFU · Faculty of Computer Science

About

183
Publications
54,580
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,735
Citations
Additional affiliations
January 2005 - May 2016
Furtwangen University
Position
  • Professor (Full)
Position
  • Cloud Computing
Position
  • Networkprogramming

Publications

Publications (183)
Article
Full-text available
Montenegro restored its national independence in 2006, and in the 17 years since then, the country has made significant progress in digital transformation, which is especially important for its accession to the European Union. In this paper, this period of 17 years of Montenegrin digital transformation is reviewed. The work aims to provide comprehe...
Preprint
Full-text available
For the purpose of improve the sustainability of products sold in the EU, Digital Product Passports is a mandatory solution. These passports would systematically gather information about products, such as detailing the materials involved to aid recycling and remanufacturing efforts, or recording the emissions produced throughout the manufacturing p...
Chapter
Full-text available
Data scientists, researchers and engineers want to understand, whether machine learning models for object detection work accurate and precise. Networks like Yolo use bounding boxes as a result to localize the object in the image. The principal aim of this paper is to address the problem of a lack of an effective metric for evaluating the results of...
Preprint
Full-text available
In recent years, the manufacturing sector has benefited from a variety of technological innovations regarding automation and utilization of artificial intelligence on the shopfloor. During the manufacturing processes of a product, a variety of meta data can be derived from each working step and considered during subsequent stages of its liefycle li...
Chapter
Full-text available
Generative models and their possible applications are almost limitless. But there are still problems that such models have. On one hand, the models are difficult to train. Stability in training, mode collapse or non convergence, together with the huge parameter space make it extremely costly and difficult to train and optimize generative models. Th...
Article
Full-text available
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance. This paper confronts the challenge of ensuring data integrity and trust in IIoT systems by leveraging the capabilities of blockchain technology. The unique characteristics of blockchain...
Conference Paper
Up until now, it has been shown that big parts of the so called Industry 4.0 are impacted by Machine Learning (ML) in some way or another. In many shopfloor situations, there are different sensors involved and all data is eventually structured, accumulated and prepared for application in various ML-based scenarios, e.g., predictive maintenance of a...
Article
Full-text available
Quality assurance (QA) plays a crucial role in manufacturing to ensure that products meet their specifications. However, manual QA processes are costly and time-consuming, thereby making artificial intelligence (AI) an attractive solution for automation and expert support. In particular, convolutional neural networks (CNNs) have gained a lot of int...
Conference Paper
Full-text available
As machine learning becomes increasingly pervasive, its resource demands and financial implications escalate, necessitating energy and cost optimisations to meet stakeholder demands. Quality metrics for predictive machine learning models are abundant, but efficiency metrics remain rare. We propose a framework for efficiency metrics, that enables th...
Conference Paper
Full-text available
Hyperparameter tuning is an important aspect in machine-learning especially for deep generative models. Tuning models to stabilize training and to get the best accuracy can be a time consuming and protracted process. Generative models have a large search space requiring resources and knowledge to find the best parameters. Therefore, in most cases t...
Chapter
The importance of machine learning (ML) has been increasing dramatically for years. From assistance systems to production optimisation to healthcare support, almost every area of daily life and industry is coming into contact with machine learning. Besides all the benefits ML brings, the lack of transparency and difficulty in creating traceability...
Article
Full-text available
Health informatics plays a crucial role in modern healthcare provision. Training and continuous education are essential to bolster the healthcare workforce on health informatics. In this work, we present the training events within EU-funded DigNest project. The aim of the training events, the subjects offered, and the overall evaluation of the resu...
Article
Full-text available
This poster presents a Montenegrin Digital Academic Innovation Hub aimed to support education, innovations, and academia-business cooperation in medical informatics (as one of four priority areas) at national level in Montenegro. The Hub topology and its organisation in the form of two main nodes, with services established within key pillars: Digit...
Article
Full-text available
In this paper, we present a study on the utilization of smart medical wearables and the user manuals of such devices. A total of 342 individuals provided input for 18 questions that address user behavior in the investigated context and the connections between various assessments and preferences. The presented work clusters individuals based on thei...
Article
Full-text available
The YOLO series of object detection algorithms, including YOLOv4 and YOLOv5, have shown superior performance in various medical diagnostic tasks, surpassing human ability in some cases. However, their black-box nature has limited their adoption in medical applications that require trust and explainability of model decisions. To address this issue,...
Conference Paper
Full-text available
In today's technology-driven era, managing digital identities has become a critical concern due to the widespread use of online services and digital devices. This has led to a fragmented landscape of digital identities, burdening individuals with multiple usernames, passwords, and authentication methods. To address this challenge, digital wallets h...
Article
The common corpus optimization method 'stop words removal' is based on the assumption that text tokens with high occurrence frequency can be removed without affecting classification performance. Linguistic information regarding sentence structure is ignored as well as preferences of the classification technology. We propose the Weighted Unimportant...
Article
Full-text available
The Industrial Internet of Things (IIoT) holds significant potential for improving efficiency, quality, and flexibility. In decentralized systems, there are no trust-based centralized authentication techniques, which are unsuitable for distributed networks or subnets, as they have a single point of failure. However, in a decentralized system, more...
Article
Full-text available
0000−0001−9115−7668] , Fatemeh Stodt 2[0000−0003−0863−0907] , Christoph Reich 1[0000−0001−9831−2181] , and Nathan Clarke 3[0000−0002−3595−3800] Abstract. The importance of machine learning (ML) has been increasing dramatically for years. From assistance systems to production optimisation to health-care support, almost every area of daily life and i...
Chapter
Supervised object detection models are trained to recognize certain objects. These models are classified into two types: single-stage detectors and two-stage detectors. The single-stage detectors just need one pass through the model to anticipate all the bounding boxes, whereas the two-stage detectors require to first estimate the image portions wh...
Article
Full-text available
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of important information, products becoming compromised, and damage to industrial controls. Recently...
Article
Full-text available
The digitization and general industrial development of Montenegro is a great challenge for engineering and science due to its special characteristics. As the accession of Montenegro to the European Union has been an ongoing agenda for over a decade now, and the accession of the country is expected by 2025, adapting the interconnectivity and smart a...
Article
Full-text available
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future. For ML to be used in an industrial setting in a safe and effective way, the different steps needed to use ML must be put together in an ML p...
Conference Paper
Identity management, authentication, and attribute verification are among the main concerns in many IoT applications. Considering the privacy concerns, attribute verification became more important in many applications. Many of the proposed models in this field suffer from privacy and scalability issues as they depend on a centralized entity. In thi...
Book
Full-text available
To deliver better healthcare to patients and advance healthcare solutions as well as to increase the efficiency of the manufacturing process and thus reduce material and energy consumption in production, more and more artificial intelligence (AI) methods are applied in the field of both, Medicine and Manufacturing. Some of the exciting applications...
Article
Full-text available
Image augmentation has become an important part of the data preprocessing pipeline, helping to acquire more samples by altering existing samples by cutting, shifting, etc.. For some domains, augmenting existing images is not sufficient, due to missing samples in the domains (e.g., faulty work pieces or events that occur infrequently). In such a cas...
Chapter
The ‘things’ layer in Internet of Things (IoT) consists of a massive number of devices, many of which are power and resource constrained. Decentralized Attribute-based Encryption (DABE) provides a one-to-many scheme that fits the distributed nature of IoT, however requires extensive computation power which makes its adoption difficult. In this work...
Article
Full-text available
Purpose Ultrasound (US) and Shear Wave Elastography (SWE) imaging are non-invasive methods used for breast lesion characterization. While US and SWE images provide both morphological information, SWE visualizes in addition the elasticity of tissue. In this study a Discriminative Convolutional Neural Network (DCNN) model is applied to US and SWE ima...
Chapter
The Internet of things (IoT) network resources generate enormous data. The generated real-time data can be used in various fields to improve the quality of the provided services and make smart decisions. One of the main concerns in such systems is validating the received data. Most data validations techniques rely and run on a centralized entity, w...
Conference Paper
The traditional field of industrial manufacturing is in the process of being revolutionized as machines become smart and processes are translated to and perfected by digital systems. The application of Machine Learning (ML) has established itself as a smart technology in the manufacturing industry. The optimal operation and training of ML applicati...
Chapter
Full-text available
Enormous potential of artificial intelligence (AI) exists in numerous products and services, especially in healthcare and medical technology. Explainability is a central prerequisite for certification procedures around the world and the fulfilment of transparency obligations. Explainability tools increase the comprehensibility of object recognition...
Article
In the context of Industry 4.0, smart factories use advanced sensing and data analytic technologies to understand and monitor the manufacturing processes. To enhance production efficiency and reliability, statistical Artificial Intelligence (AI) technologies such as machine learning and data mining are used to detect and predict potential anomalies...
Chapter
Full-text available
Health and health systems are not excluded from the influence of digitalization. In Montenegro, regarding the digitization process, when compared to other sectors, the health sector is lagging. In this poster presentation, we present an ambitious Erasmus+ DigN€ST project aimed on modernization of digitalization of healthcare system in Montenegro, a...
Article
Full-text available
To achieve a fully connected network in Internet of Things (IoT) there are number of challenges that have to be overcome. Among those, a big challenge is how to keep all of the devices accessible everywhere and every time. In the IoT network, the assumption is that each IoT device can be reached by any client at any given time. In practice, this is...
Chapter
The resources in Internet of Things (IoT) are distributed among different physical geographic locations. In centralized resource discovery, the resources are registered in a centralized third-party server, and the clients can discover any resource by querying the centralized entity. In the decentralized resource discovery, the task of resource regi...
Conference Paper
In edge/fog computing infrastructures, the resources and services are offloaded to the edge and computations are distributed among different nodes instead of transmitting them to a centralized entity. Distributed Hash Table (DHT) systems provide a solution to organizing and distributing the computations and storage without involving a trusted third...
Preprint
Full-text available
Distributed machine learning algorithms that employ Deep Neural Networks (DNNs) are widely used in Industry 4.0 applications, such as smart manufacturing. The layers of a DNN can be mapped onto different nodes located in the cloud, edge and shop floor for preserving privacy. The quality of the data that is fed into and processed through the DNN is...
Article
Full-text available
Nowadays, machine learning projects have become more and more relevant to various real-world use cases. The success of complex Neural Network models depends upon many factors, as the requirement for structured and machine learning-centric project development management arises. Due to the multitude of tools available for different operational phases...
Article
Full-text available
The resources in the Internet of Things (IoT) network are distributed among different parts of the network. Considering huge number of IoT resources, the task of discovering them is challenging. While registering them in a centralized server such as a cloud data center is one possible solution, but due to billions of IoT resources and their limited...
Article
Full-text available
While the number of devices connected together as the Internet of Things (IoT) is growing, the demand for an efficient and secure model of resource discovery in IoT is increasing. An efficient resource discovery model distributes the registration and discovery workload among many nodes and allow the resources to be discovered based on their attribu...
Conference Paper
The Internet of Things (IoT) consists of billions of resources distributed among different geographical locations. In centralized resource discovery, the resources are registered in a centralized third party server, and the clients can discover any resource by querying the centralized entity. In the decentralized resource discovery the task of reso...
Conference Paper
The huge number of resources and their computation power capabilities in the Internet of Things (IoT) network brings new challenges comparing to traditional networks. Among those challenges is the used approach to register and discover the resources in IoT. In traditional network architectures, the resources are registered in a centralized trusted...
Article
Full-text available
In recent years, both the Internet of Things (IoT) and blockchain technologies have been highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the Fourth Industrial Revolution, which benefits from communication and connectivity to reduce cost and to increase productivity through sensor-based autonomy. These automated...
Chapter
Digital transformation strengthens the interconnection of companies in order to develop optimized and better customized, cross-company business models. These models require secure, reliable, and traceable evidence and monitoring of contractually agreed information to gain trust between stakeholders. Blockchain technology using smart contracts allow...
Article
Full-text available
Within manufacturing processes, faults and failures may cause severe economic loss. With the vision of Industry 4.0, artificial intelligence techniques such as data mining play a crucial role in automatic fault and failure prediction. However, due to the heterogeneous nature of industrial data, data mining results normally lack both machine and hum...
Conference Paper
The number of devices connected together in the Internet of Things (IoT) are growing and therefore the demand of an efficient and secure method for discovering the resources in IoT is increasing. In most of IoT schemes, the resources are discovered based on their properties (i.e. their location, types, etc.) and the clients are able to discover the...
Chapter
Containers have become popular in HPC environments to improve the mobility of applications and the delivery of user-supplied code. In this paper we evaluate Podman, an enterprise container engine that supports rootless containers , in combination with runc and crun as container runtimes using a real-world workload with LS-DYNA and the industry-stan...
Article
In the Industry 4.0 context, especially when considering large factories producing costly goods, monitoring sensor values is important to ensure high quality. This reduces large costs for mending faulty products or recall of those. Different approaches are used to ensure efficient monitoring and validation of sensor values. The Distributed Data Val...
Conference Paper
The generated real-time data on the Internet of Things (IoT) and the ability to gather and manipulate them are positively affecting various fields. One of the main concerns in IoT is how to provide trustworthy data. The data validation network ensures that the generated data by data sources in the IoT are trustworthy. However, the existing data val...
Conference Paper
In this paper, Region based Distributed Hash Table (RDHT) is proposed that can used in fog computing infrastructure to create an overlay of fog nodes divided logically into multiple regions based on their physical locations. RDHT generates a single overlay and it can be generated without specific organizing entity or location based devices.
Conference Paper
Full-text available
Abstract—Generative Adversarial Networks (GANs) are part of the deep generative model family and able to generate synthetic samples based on the underlying distribution of real-world data. With expanding interest new discoveries and recent advances are hard to follow. Recent advancements to stabilize training, will help GANs to open up new domains...
Conference Paper
Full-text available
Schleifen ist zu einem Standard-Produktionsschritt für die Präzisionsfertigung von Metallteilen geworden. Nicht optimale Prozessbedingungen während des Schleifprozesses können jedoch zu einer unangemessenen lokalen Temperaturerhöhung in der Randzone des Werkstücks führen und den sogenannten „Schleifbrand“ verursachen. Dies kann zu Gefügeveränderung...
Preprint
Full-text available
Increased collaborative production and dynamic selection of production partners within industry 4.0 manufacturing leads to ever-increasing automatic data exchange between companies. Automatic and unsupervised data exchange creates new attack vectors, which could be used by a malicious insider to leak secrets via an otherwise considered secure chann...
Preprint
Full-text available
The digital transformation of companies is expected to increase the digital interconnection between different companies to develop optimized, customized, hybrid business models. These cross-company business models require secure, reliable, and traceable logging and monitoring of contractually agreed information sharing between machine tools, operat...
Conference Paper
The digital transformation of companies is expected to increase the digital interconnection between different companies to develop optimized, customized, hybrid business models. These cross-company business models require secure, reliable, and traceable logging and monitoring of contractually agreed information sharing between machine tools, operat...
Chapter
Containers have to be secured in a multi-tenant environment. To secure the use of containerized environments, the effectiveness of a rule-based security monitoring approach have been investigated. The approach of this paper can be used to detect a wide range of potentially malicious behaviour of workloads in containerized environments. Additionally...
Conference Paper
Billions of resources are connected to each other through the Internet of Things (IoT). Due to the huge number of connected resources in IoT, the challenge is how to discover the appropriate resources efficiently. The task becomes more challenging by taking into consideration the limited storage and computation power of devices and the distributed...
Article
Full-text available
As today’s manufacturing domain is becoming more and more knowledge-intensive, knowledge-based systems (KBS) are widely applied in the predictive maintenance domain to detect and predict anomalies in machines and machine components. Within a KBS, decision rules are a comprehensive and interpretable tool for classification and knowledge discovery fr...
Conference Paper
Ensuring data quality is central to the digital transformation in industry. Business processes such as predictive maintenance or condition monitoring can be implemented or improved based on the available data. In order to guarantee high data quality, a single data validation system are usually used to validate the production data for further use. H...
Conference Paper
Cylindrical grinding is an important process in the manufacturing industry. During this process, the problem of grinding burn may appear, which can cause the workpiece to be worthless. In this work, a machine learning neural network approach is used to predict grinding burn based on the process parameters to prevent damage. A small dataset of 21 sa...
Conference Paper
Current cloud architectures do not comply with today's digital forensics procedures-largely due to the fundamental dynamic nature of the cloud. Data acquisition is the first and arguably the most important process within digital forensics-to ensure data integrity and admissibility. Currently investigators have no option but to rely on the Cloud Ser...
Article
Full-text available
Following the trend of Industry 4.0, automation in different manufacturing processes has triggered the use of intelligent condition monitoring systems, which are crucial for improving productivity and availability of production systems. To develop such an intelligent system, semantic technologies are of paramount importance. This paper introduces a...
Chapter
Full-text available
Within the product life cycle, manufacturing processes are steps through which raw materials are assembled and transformed into final products. When different applications share information concerning manufacturing processes, the lack of information interoperability is a challenging issue that emerges during the manufacturing process implementation...
Article
Full-text available
Condition monitoring is performed to identify the functioning state of a machine or a mechanical system. It is an important task by which the machine or mechanical system deterioration tendency and the location of a failure can be detected. In recent years, ontologies have shown promising results to enhance knowledge sharing in condition monitoring...
Article
Full-text available
Within manufacturing processes, anomalies such as machinery faults and failures may lead to the outage situation of production lines. The outage of production lines is detrimental for the availability of production systems and may cause severe economic loss. To avoid the economic loss that may be caused by the outage situation, the prediction of an...
Conference Paper
Cybersecurity becomes ever more important since the industry is transforming towards an Industrial Internet of Things (IIoT). Essential parts of the whole security concept are securing the communication between clients and servers on different business layers, like plant floor network and enterprise network, separation of information model and auth...

Network

Cited By