Refine
Document Type
- Conference Proceeding (213) (remove)
Conference Type
- Konferenzartikel (183)
- Konferenz-Abstract (21)
- Sonstiges (5)
- Konferenz-Poster (2)
- Konferenzband (2)
Keywords
- RoboCup (12)
- Machine Learning (9)
- Deep Leaning (7)
- Heart rhythm model (5)
- Modeling and simulation (5)
- Robustness (4)
- machine learning (4)
- Generative Adversarial Network (3)
- Radar (3)
- cryptography (3)
- neural networks (3)
- printed electronics (3)
- Computer Vision (2)
- Cryoballoon catheter ablation (2)
- Current measurement (2)
- Energy Flexibility (2)
- Geophysik (2)
- Kalman Filter (2)
- Mikroelektronik (2)
- NB-IoT (2)
- Neural networks (2)
- Predictive Maintenance (2)
- Security (2)
- Stability (2)
- Supraventricular tachycardia (2)
- Switches (2)
- UWB radars (2)
- accountability (2)
- artificial intelligence (2)
- atrial fibrillation (2)
- autoattack (2)
- cardiac ablation (2)
- catheter ablation (2)
- certificate management (2)
- convolutional neural networks (2)
- efficient training (2)
- explainability (2)
- fairness (2)
- heart rhythm model (2)
- image classification (2)
- imaging algorithms (2)
- interactive visualization (2)
- medical imaging (2)
- microwave (2)
- programming (2)
- responsibility (2)
- scattering measurements (2)
- semantics (2)
- trust (2)
- understandability (2)
- 3D print (1)
- 3D-Modelling (1)
- 5G (1)
- 5G mobile communication (1)
- 5G private networks (1)
- AC machines (1)
- AIN Cantilever (1)
- AV nodal reentry tachycardia (1)
- AV reentrant tachycardia (1)
- Additive Manufacturing (1)
- Adversarial Attacks (1)
- Adversarial Robustness (1)
- Agent based sensor (1)
- Air Pollution (1)
- Aliasing (1)
- Aluminum (1)
- Amplitude and Phase Errors (1)
- Angle of Arrival (1)
- Anti-Windup (1)
- Approximation (1)
- Artificial Intelligence (1)
- Atrial fibrillation (1)
- Authentication (1)
- Authorization (1)
- Automated idea generation (1)
- Automation (1)
- Automotive Radar (1)
- Battery storage (1)
- Bearings (1)
- Bioimpedance measurement (1)
- Biomimetics (1)
- Blockchain (1)
- Blockchains (1)
- Boundary conditions (1)
- Bowtie antenna (1)
- CNN (1)
- CNNs (1)
- Calibration (1)
- Cardiac Resynchronization Therapy (1)
- Cardiac resynchronization therapy (1)
- Challenges in Action Recognition (1)
- Chemical engineering (1)
- Cleaning (1)
- Clustering (1)
- Collaboration of Academia and Industry (1)
- Compensation (1)
- Control Algorithms (1)
- Current Control (1)
- DC-AC converters (1)
- Data Mining (1)
- Data breech (1)
- Debinding (1)
- Deep Learning (1)
- Deep Neural Network (1)
- Demand side flexibility (1)
- Device characterization (1)
- Diagnostics (1)
- Digital Beamforming (1)
- Digital Flex Twin Optimization (1)
- Digital Twin (1)
- Digitale Turschilder (1)
- Digitalization (1)
- Drehstrom (1)
- E-Ink (1)
- E-Paper (1)
- EAP-TLS (1)
- EKF-SLAM (1)
- ETAP Simulations (1)
- Eco-inventive principles (1)
- Economics (1)
- Edge AI (1)
- Education (1)
- Eigenvalues (1)
- Electromagnetic and thermal simulation (1)
- Embedded AI (1)
- Embedded Systems (1)
- Energiemanagement (1)
- Energy Flexibility for Companies (1)
- Energy Harvesting (1)
- Energy Management (1)
- Energy Marketing of Industrial Flexibilities (1)
- Energy management (1)
- Energy systems modeling (1)
- Environmental monitoring (1)
- Error (1)
- Esophageal catheter (1)
- Estimation (1)
- FUSION (1)
- Failure analysis (1)
- Fault Classification (1)
- Featherweight Go (1)
- Federated Learning (1)
- Field Programmable Gate Array (FPGA) (1)
- Fused Filament Fabrication (1)
- GPU Computing (1)
- Gleichstrom (1)
- Handschrift (1)
- Handswritten Character Recognition (1)
- Harmonic analysis (1)
- Heart Rhythm Simulation (1)
- Hemodynamic monitoring (1)
- Herzrhythmusmodell (1)
- High frequency ablation (1)
- His-Bundle Pacing (1)
- Hochspannung (1)
- Hybrid system (1)
- IEC/IEEE 60802 security (1)
- IEEE802.15.4 (1)
- IIoT (1)
- InceptionTime (1)
- Industrial Blockchain (1)
- Inertial (1)
- Ink (1)
- Internet of Things (1)
- Inventive principles (1)
- Inventive problem solving (1)
- Inverters (1)
- IoT Security (1)
- IoT security (1)
- Kryoballonkatheter (1)
- Künstliche Intelligenz (1)
- LPWAN (1)
- Large Grid-Connected PV Systems (1)
- Left Atrial Appendage Closure (1)
- Limiting (1)
- Load Flow Analysis (1)
- Logic gates (1)
- Long Term Evolution (1)
- Low-Cost Füllstandssensor (1)
- Low-Power (1)
- MEMS (1)
- MIMO (1)
- MLOps (1)
- Machine learning (1)
- Magnetic sensors (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Mean Square Error (1)
- Measurement (1)
- Medizintechnik (1)
- Microgrid(s) (1)
- Mode Collapse (1)
- Model Calibration (1)
- Model Predictive Control (1)
- Model Search (1)
- Modellierung und Simulation (1)
- Monitoring (1)
- Monocular Depth Estimation (1)
- Monte-Carlo (1)
- Monte-Carlo Simulation (1)
- Monte-Carlo method (1)
- Multiside heart stimulation (1)
- NETCONF security (1)
- NFC (1)
- Nature-inspired principles (1)
- Network Test (1)
- Netzintegration (1)
- Nyquist-Shannon (1)
- OT security (1)
- Octave Convolution (1)
- Optimization (1)
- Optimization and control (1)
- Optimization with Digital Twins (1)
- Optische Zeichenerkennung (1)
- PI control (1)
- PKI (1)
- PROFINET IO (1)
- PROFINET Security (1)
- PV System (1)
- Parallelization (1)
- Parameter Estimation (1)
- Parameter estimation (1)
- Pattern Recognition (1)
- Peak shaving (1)
- Peer to peer network (1)
- Performance (1)
- Performance evaluation (1)
- Permanent magnet machines (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Physiological Pacing (1)
- Power Loss (1)
- Predictions (1)
- Predictive Models (1)
- Process design (1)
- Pulmonalvenenisolation (1)
- Pulmonary vein isolation (1)
- Pulse width modulation (1)
- RFID (1)
- RUL (1)
- Radio frequency (1)
- Random call model (1)
- Real-Time Communication (1)
- Regularization (1)
- Renewable Energy Markets (1)
- Representation Learning (1)
- ResNet (1)
- Road-Quality Prediction (1)
- Roboter (1)
- Rotors (1)
- Sampling (1)
- Second-order Optimization (1)
- Self-Calibration (1)
- Semiconductor Device (1)
- Semiconductor device measurement (1)
- Sensor phenomena and characterization (1)
- Sintering (1)
- Smart Energy Metering (1)
- Smart Gardening (1)
- Smart Grids (1)
- Smart Home (1)
- Smart-UPS (1)
- SmartMAC (1)
- Software (1)
- Software algorithms (1)
- Software for measurements (1)
- Solar Radiation (1)
- Spinal cord stimulation (1)
- Stromregelung (1)
- Stromzustandsregler (1)
- Subspace Clustering (1)
- Substrates (1)
- Sustainable technology (1)
- Synchronmaschine (1)
- Systematic innovation (1)
- TLS (1)
- TRIZ methodology (1)
- TSN security (1)
- Testbed (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- Time series data (1)
- Time-series Classification (1)
- TinyML (1)
- Torque (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Transesophageal left atrial pacing (1)
- Trust management (1)
- Ultra-Low Energy (1)
- Unsupervised Conditional Training (1)
- Unsupervised Learning (1)
- Variational Autoencoders (1)
- Virtual Reality (1)
- Vorhofflimmern (1)
- Wireless IoT (1)
- Wireless Sensor Nodes (1)
- Wärmepumpen (1)
- Yolov5 (1)
- accelerometer (1)
- adversarial (1)
- adversarial attacks (1)
- adversarial detection (1)
- atrial flutter (1)
- attribute manipulation (1)
- autoML (1)
- autonomous systems (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- biocompatibility test (1)
- biodegradable (1)
- biomaterials (1)
- biomechanical stimulation (1)
- building management systems (1)
- camera-based navigation (1)
- cellular radio (1)
- cifar (1)
- computer network management (1)
- correlation (1)
- credentials (1)
- crossbar (1)
- curb (1)
- curriculum learning (1)
- cybersecurity (1)
- deep learning (1)
- deep reinforcement learning (1)
- defense (1)
- degradation stages (1)
- detection (1)
- dictionary passing (1)
- echocardiography (1)
- electrolyte-gated transistors (1)
- embedded systems (1)
- energy harvesting (1)
- face editing (1)
- face recognition (1)
- fail-operational (1)
- fingerprinting (1)
- fourier (1)
- gan (1)
- generative adversarial networks (1)
- ground penetrating radar (1)
- hair (1)
- heart rhythm simulation (1)
- heat pump (1)
- height estimation (1)
- home automation (1)
- hybrid systems (1)
- identification (1)
- image color analysis (1)
- imagenet (1)
- impedance cardiography (1)
- industrial Ethernet (1)
- industrial IoT (1)
- industrial communication (1)
- irrigation (1)
- lid (1)
- machine-to-machine communication (1)
- mahalanobis (1)
- metal oxide transistor (1)
- millimeter-wave (1)
- model-predictive control (1)
- molybdenum (1)
- multipath (1)
- mutual authentication (1)
- natürliche Leistung (1)
- neural architecture search (1)
- noise measurement (1)
- nose (1)
- parking (1)
- pattern recognition (1)
- perception (1)
- performance (1)
- physical unclonable function (1)
- physically unclonable function (PUF) (1)
- predictive maintenance (1)
- primary authentication (1)
- printed Antennas (1)
- programming languages (1)
- pruning (1)
- pulmonary vein isolation (1)
- radio networks (1)
- rekeying (1)
- resource efficiency (1)
- secure communication (1)
- security (1)
- skin cancer (1)
- skin cancer detection (1)
- software defined radio (1)
- solar module (1)
- sparse backpropagation (1)
- spectral defense (1)
- spectraldefense (1)
- statistical methods, ROS (1)
- stochastic computing (1)
- style (1)
- style transfer (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- transmit beamforming (1)
- ventricular tachycardia (1)
- wide area networks (1)
- wireless sensor networks (1)
- übertragbare Wirkleistung (1)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (213) (remove)
Open Access
- Closed Access (82)
- Open Access (75)
- Closed (55)
- Bronze (27)
- Diamond (9)
- Grün (3)
- Gold (1)
Disturbances of the cardiac conduction system causing reentry mechanisms above the atrioventricular (AV) node are induced by at least one accessory pathway with different conducting properties and refractory periods. This work aims to further develop the already existing and continuously expanding Offenburg heart rhythm model to visualise the most common supraventricular reentry tachycardias to provide a better understanding of the cause of the respective reentry mechanism.
The visualization of heart rhythm disturbance and atrial fibrillation therapy allow the optimization of new cardiac catheter ablations. With the simulation software CST (Computer Simulation Technology, Darmstadt) electromagnetic and thermal simulations can be carried out to analyze and optimize different heart rhythm disturbance and cardiac catheters for pulmonary vein isolation. Another form of visualization is provided by haptic, three-dimensional print models. These models can be produced using an additive manufacturing method, such as a 3D printer. The aim of the study was to produce a 3D print of the Offenburg heart rhythm model with a representation of an atrial fibrillation ablation procedure to improve the visualization of simulation of cardiac catheter ablation.
The basis of 3D printing was the Offenburg heart rhythm model and the associated simulation of cryoablation of the pulmonary vein. The thermal simulation shows the pulmonary vein isolation of the left inferior pulmonary vein with the cryoballoon catheter Arctic Front AdvanceTM from Medtronic. After running through the simulation, the thermal propagation during the procedure was shown in the form of different colors. The three-dimensional print models were constructed on the base of the described simulation in a CAD program. Four different 3D printers are available for this purpose in a rapid prototyping laboratory at the University of Applied Science Offenburg. Two different printing processes were used: 1. a binder jetting printer with polymer gypsum and 2. a multi-material printer with photopolymer. A final print model with additional representation of the esophagus and internal esophagus catheter was also prepared for printing.
With the help of the thermal simulation results and the subsequent evaluation, it was possible to make a conclusion about the propagation of the cold emanating from the catheter in the myocardium and the surrounding tissue. It could be measured that already 3 mm from the balloon surface into the myocardium the temperature drops to 25 °C. The simulation model was printed using two 3D printing methods. Both methods as well as the different printing materials offer different advantages and disadvantages. While the first model made of polymer gypsum can be produced quickly and cheaply, the second model made of photopolymer takes five times longer and was twice as expensive. On the other hand, the second model offers significantly better properties and was more durable overall. All relevant parts, especially the balloon catheter and the conduction, are realistically represented. Only the thermal propagation in the form of different colors is not shown on this model.
Three-dimensional heart rhythm models as well as virtual simulations allow a very good visualization of complex cardiac rhythm therapy and atrial fibrillation treatment methods. The printed models can be used for optimization and demonstration of cryoballoon catheter ablation in patients with atrial fibrillation.
The Internet of Things (IoT) application has becoming progressively in-demand, most notably for the embedded devices (ED). However, each device has its own difference in computational capabilities, memory usage, and energy resources in connecting to the Internet by using Wireless Sensor Networks (WSNs). In order for this to be achievable, the WSNs that form the bulk of the IoT implementation requires a new set of technologies and protocol that would have a defined area, in which it addresses. Thus, IPv6 Low Power Area Network (6LoWPAN) was designed by the Internet Engineering Task Force (IETF) as a standard network for ED. Nevertheless, the communication between ED and 6LoWPAN requires appropriate routing protocols for it to achieve the efficient Quality of Service (QoS). Among the protocols of 6LoWPAN network, RPL is considered to be the best protocol, however its Energy Consumption (EC) and Routing Overhead (RO) is considerably high when it is implemented in a large network. Therefore, this paper would propose the HRPL to enchance the RPL protocol in reducing the EC and RO. In this study, the researchers would present the performance of RPL and HRPL in terms of EC, Control traffic Overhead (CTO) and latency based on the simulation of the 6LoWPAN network in fixed environment using COOJA simulator. The results show HRPL protocol achieves better performance in all the tested topology in terms of EC and CTO. However, the latency of HRPL only improves in chain topology compared with RPL. We found that further research is required to study the relationship between the latency and the load of packet transmission in order to optimize the EC usage.
Seismic data has often missing traces due to technical acquisition or economical constraints. A compete dataset is crucial in several processing and inversion techniques. Deep learning algorithms, based on convolutional neural networks (CNNs), have shown alternative solutions that overcome limitation of traditional interpolation methods e.g. data regularity, linearity assumption, etc. There are two different paradigms of CNN methods for seismic interpolation. The first one, so-called deep prior interpolation (DPI), trains a CNN to map random noise to a complete seismic image using only the decimated image itself. The second one, referred as standard deep learning method, trains a CNN to map a decimated seismic image into a complete one using a dataset of complete and artificially decimated images. Within this research, we systematically compare the performance of both methods for different quantities of regular and irregular missing traces using 4 datasets. We evaluate the results of both methods using 5 well-known metrics. We found that DPI method performs better than the standard method if the percentage of missing traces is low (10%) and otherwise if the level of decimation is high (50%).
Radio frequency identification (RFID) antennas are popular for high frequency (HF) RFID, energy transfer and near field communication (NFC) applications. Particularly for wireless measurement systems the RFID/NFC technology is a good option to implement a wireless communication interface. In this context, the design of corresponding reader and transmitter antennas plays a major role for achieving suitable transmission quality. This work proves the feasibility of the rapid prototyping of a RFID/NFC antenna, which is used for the wireless communication and energy harvesting at the required frequency of 13.56 MHz. A novel and low-cost direct ink writing (DIW) technology utilizing highly viscous silver nanoparticle ink is used for this process. This paper describes the development and analysis of low-cost printed flexible RFID/NFC antennas on cost-effective substrates for a microelectronic vital parameter measurement system. Furthermore, we compare the measured technical parameters with existing copper-based counterparts on a FR4 substrate.
The monitoring of industrial environments ensures that highly automated processes run without interruption. However, even if the industrial machines themselves are monitored, the communication lines are currently not continuously monitored in todays installations. They are checked usually only during maintenance intervals or in case of error. In addition, the cables or connected machines usually have to be removed from the system for the duration of the test. To overcome these drawbacks, we have developed and implemented a cost-efficient and continuous signal monitoring of Ethernet-based industrial bus systems. Several methods have been developed to assess the quality of the cable. These methods can be classified to either passive or active. Active methods are not suitable if interruption of the communication is undesired. Passive methods, on the other hand, require oversampling, which calls for expensive hardware. In this paper, a novel passive method combined with undersampling targeting cost-efficient hardware is proposed.
The Go programming language is an increasingly popular language but some of its features lack a formal investigation. This article explains Go's resolution mechanism for overloaded methods and its support for structural subtyping by means of translation from Featherweight Go to a simple target language. The translation employs a form of dictionary passing known from type classes in Haskell and preserves the dynamic behavior of Featherweight Go programs.
In recent years, predictive maintenance tasks, especially for bearings, have become increasingly important. Solutions for these use cases concentrate on the classification of faults and the estimation of the Remaining Useful Life (RUL). As of today, these solutions suffer from a lack of training samples. In addition, these solutions often require high-frequency accelerometers, incurring significant costs. To overcome these challenges, this research proposes a combined classification and RUL estimation solution based on a Convolutional Neural Network (CNN) and a Long Short-Term Memory (LSTM) network. This solution relies on a hybrid feature extraction approach, making it especially appropriate for low-cost accelerometers with low sampling frequencies. In addition, it uses transfer learning to be suitable for applications with only a few training samples.
The desire to connect more and more devices and to make them more intelligent and more reliable, is driving the needs for the Internet of Things more than ever. Such IoT edge systems require sound security measures against cyber-attacks, since they are interconnected, spatially distributed, and operational for an extended period of time. One of the most important requirements for the security in many industrial IoT applications is the authentication of the devices. In this paper, we present a mutual authentication protocol based on Physical Unclonable Functions, where challenge-response pairs are used for both device and server authentication. Moreover, a session key can be derived by the protocol in order to secure the communication channel. We show that our protocol is secure against machine learning, replay, man-in-the-middle, cloning, and physical attacks. Moreover, it is shown that the protocol benefits from a smaller computational, communication, storage, and hardware overhead, compared to similar works.
Cryptographic protection of messages requires frequent updates of the symmetric cipher key used for encryption and decryption, respectively. Protocols of legacy IT security, like TLS, SSH, or MACsec implement rekeying under the assumption that, first, application data exchange is allowed to stall occasionally and, second, dedicated control messages to orchestrate the process can be exchanged. In real-time automation applications, the first is generally prohibitive, while the second may induce problematic traffic patterns on the network. We present a novel seamless rekeying approach, which can be embedded into cyclic application data exchanges. Although, being agnostic to the underlying real-time communication system, we developed a demonstrator emulating the widespread industrial Ethernet system PROFINET IO and successfully use this rekeying mechanism.