Refine
Year of publication
- 2016 (52) (remove)
Document Type
- Article (reviewed) (52) (remove)
Has Fulltext
- no (52)
Is part of the Bibliography
- yes (52)
Keywords
- Energieversorgung (3)
- Computertomografie (2)
- Durchblutung (2)
- Lichtbogenofen (2)
- Lithium-Ionen-Akkumulator (2)
- Messtechnik (2)
- Radiologie (2)
- Schlafforschung (2)
- Ultraschall (2)
- Wärmeübertragung (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (30)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (15)
- INES - Institut für nachhaltige Energiesysteme (9)
- Fakultät Wirtschaft (W) (6)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (1)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (1)
Open Access
- Closed Access (10)
- Open Access (10)
- Closed (3)
Passive solar elements for both direct and indirect gains, are systems used to maintain a comfortable living environment while saving energy, especially in the building energy retrofit and adaptation process. Sunspaces, thermal mass and glazing area and orientation have been often used in the past to guarantee adequate indoor conditions when mechanical devices were not available. After a period of neglect, nowadays they are again considered as appropriate systems to help face environmental issues in the building sector, and both international and national legislation takes into consideration the possibility of including them in the building planning tools, also providing economic incentives. Their proper design needs dynamic simulation, often difficult to perform and time consuming. Moreover, results generally suffer from several uncertainties, so quasi steady-state procedures are often used in everyday practice with good results, but some corrections are still needed. In this paper, a comparative analysis of different solutions for the construction of verandas in an existing building is presented, following the procedure provided by the slightly modified and improved Standard EN ISO 13790:2008. Advantages and disadvantages of different configurations considering thermal insulation, windows typology and mechanical ventilation systems are discussed and a general intervention strategy is proposed. The aim is to highlight the possibility of using sunspaces in order to increase the efficiency of the existing building stock, considering ease of construction and economic viability.
Energy Performance of Verandas in the Building Retrofit Process (PDF Download Available). Available from: https://www.researchgate.net/publication/303093420_Energy_Performance_of_Verandas_in_the_Building_Retrofit_Process [accessed Jul 5, 2017].
Bud type carbon nanohorns (CNHs) are composed of carbon and have a closed conical tip at one end protruding from an aggregate structure. By employing a simple oxidation process in CO2 atmosphere, it is possible to open the CNH tips which increases their specific surface area by four fold. These tip opened CNHs combine the microporous nature of activated carbons and the crystalline mesoporous character of carbon nanotubes. The results for the high pressure CO2 gas adsorption of tip opened CNHs are reported herein for the first time and are found to be superior to traditional CO2 adsorbents like zeolites. The modified CNHs are also found to be promising materials for lithium ion batteries and the performance is found to be on a par with carbon nanotubes and carbon nanofibers.
This paper presents the results of the idea generation experiment that repeats the study originally conducted at RMIT. In order to establish the influence that the experimental treatments make on the number and the breadth of solution ideas proposed by problem solvers with different knowledge levels, students from different years of study were recruited. Ninety students from the Offenburg University of Applied Sciences, Germany were divided into three groups. All students were asked to generate ideas on cleaning lime deposits from the inside of a water pipe and were given 16 minutes to record their individual ideas. Students of two experimental groups were shown some words for two minuted each. The Su-Field group was exposed to the eight fields of MATCEMIB. The Random Word group was shown eight random words every two minutes. The Su-Field group outperformed both the Control group and the Random Word group in the number of ideas generated. It was also found that the students from the Su-Field group proposed significantly broader solutions than the students from the Control and Random Word groups. The overall results of the experiment support the conclusions made by the RMIT researchers that simple ideation techniques can significantly improve idea generation and that the systematised Substance-Field Analysis is a suitable heuristic for engineering students.
Structured Innovation with TRIZ in Science and Industry - Creating Value for Customers and Society
(2016)
Covert channels have been known for a long time because of their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example, the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit as well as the L1 and L2 caches, which enable establishing multiple covert channels. Even virtualization, which is known for its isolation of multiple machines, is prone to covert- and side-channel attacks because of the sharing of resources. Therefore, it is not surprising that cloud computing is not immune to this kind of attacks. Moreover, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of illegitimate communication. In such a setting, the “air gap” between physical servers and networks disappears, and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand, we will provide a survey on vulnerable spots that an adversary could exploit trying to exfiltrate private data from target virtual machines through covert channels in a cloud environment. We will evaluate the feasibility of example attacks and point out proposed mitigation solutions in case they exist.
Optimal microgrid scheduling with peak load reduction involving an electrolyzer and flexible loads
(2016)
This work consists of a multi-objective mixed-integer linear programming model for defining optimized schedules of components in a grid-connected microgrid. The microgrid includes a hydrogen energy system consisting of an alkaline electrolyzer, hydrogen cylinder bundles and a fuel cell for energy storage. Local generation is provided from photovoltaic panels, and the load is given by a fixed load profile combined with a flexible electrical load, which is a battery electric vehicle. The electrolyzer has ramp-up constraints which are modeled explicitly. The objective function includes, besides operational costs and an environmental indicator, a representation of peak power costs, thus leading to an overall peak load reduction under optimized operation. The model is used both for controlling a microgrid in a field trial set-up deployed in South-West Germany and for simulating the microgrid operation for defined period, thus allowing for economic system evaluation. Results from defined sample runs show that the energy storage is primarily used for trimming the peak of electricity drawn from the public grid and is not solely operated with excess power. The flexible demand operation also helps keeping the peak at its possible minimum.
Fans stärken Marken
(2016)
We present a novel scheme for Slotted ALOHA random access systems that combines physical-layer network coding (PLNC) with multiuser detection (MUD). The PLNC and MUD are applied jointly at the physical layer to be able to extract any linear combination of messages experiencing a collision within a slot. The set of combinations extracted from a whole frame is then processed by the receiver to recover the original packets. A simple precoding stage at the transmitting terminals allows the receiver to further decrease the packet loss rate. We present results for the decoding at the physical layer as well as several performance measures at frame level, namely, throughput, packet loss rate, and energy efficiency. The results we present are promising and suggest that a cross-layer approach leveraging on the joint use of PLNC and MUD can significantly improve the performance of random access systems in the presence of slow fading.
This paper presents an overview of the coding aspects of a GNSS receiver. Coding allows detection and correction of channel-induced errors at the receiver, here the focus is on the mitigation of threats from malicious interferences. Although the effects of interference at different stages of GNSS baseband processing has been deeply analyzed in the literature, little attention was devoted to its impact on the navigation message decoding stage. Theis paper provides an introduction to the various coding schemes employed by current GNSS signals, discussing their performance in the presence of noise in terms of block-error rate. Additionally, the benefits of soft-decoding schemes for navigation message decoding are highlighted when jamming interferences are present. The proposed scheme requires estimating the noise plus interference power, yielding to enhanced decoding performances under severe jamming conditions. Finally, cryptographic schemes as a means of providing anti-spoofing for geosecurity location-based services, and their potential vulnerability are discussed, with particular emphasis on the dependence on the dependence of the scheme on successful navigation message decoding
To do justice to the legacy of Alexander von Humboldt, a 19th century German scientist and explorer an information and knowledge management system is required to preserve the author’s original intent and promote an awareness of all his relevant works. Although all of Humboldt's works can be found on the internet as digitized papers, the complexity and internal interconnectivity of the writings is not very transparent. Humboldt's concepts of interaction cannot be adequately represented only by digitized papers or scanned documents.
The Humboldt Portal is an attempt to create a new generation of digital libraries, providing a new form of interaction and synthesis between humanistic texts and scientific observation. The digital version of his documents supplies dynamic links to sources, maps, images, graphs and relevant texts in accordance with his visions, because “everything is interconnectedness”.