Refine
Year of publication
- 2015 (126) (remove)
Document Type
- Conference Proceeding (61)
- Article (reviewed) (45)
- Article (unreviewed) (10)
- Part of a Book (8)
- Patent (2)
Conference Type
- Konferenzartikel (51)
- Konferenz-Abstract (6)
- Sonstiges (3)
- Konferenz-Poster (1)
Language
- English (126) (remove)
Has Fulltext
- no (126) (remove)
Is part of the Bibliography
- yes (126)
Keywords
- Kommunikation (5)
- Applikation (4)
- Abtragung (3)
- Ausbildung (3)
- Dünnschichtchromatographie (3)
- Eingebettetes System (3)
- Licht (3)
- Mikrostruktur (3)
- Polymere (3)
- Sicherheit (3)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (50)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (42)
- Fakultät Wirtschaft (W) (19)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (18)
- INES - Institut für nachhaltige Energiesysteme (16)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (14)
- ACI - Affective and Cognitive Institute (9)
- WLRI - Work-Life Robotics Institute (4)
- IUAS - Institute for Unmanned Aerial Systems (2)
- IfTI - Institute for Trade and Innovation (1)
Open Access
- Closed Access (64)
- Open Access (33)
- Bronze (5)
- Closed (1)
- Diamond (1)
Soccer simulation league is one of the founding leagues of RoboCup. In this paper we discuss the past, present and planned future achievements and changes. Also we summarize the connections and inter-league achievements of this league and provide an overview of the community contributions that made this league successful.
Ripple: Overview and Outlook
(2015)
Ripple is a payment system and a digital currency which evolved completely independently of Bitcoin. Although Ripple holds the second highest market cap after Bitcoin, there are surprisingly no studies which analyze the provisions of Ripple.
In this paper, we study the current deployment of the Ripple payment system. For that purpose, we overview the Ripple protocol and outline its security and privacy provisions in relation to the Bitcoin system. We also discuss the consensus protocol of Ripple. Contrary to the statement of the Ripple designers, we show that the current choice of parameters does not prevent the occurrence of forks in the system. To remedy this problem, we give a necessary and sufficient condition to prevent any fork in the system. Finally, we analyze the current usage patterns and trade dynamics in Ripple by extracting information from the Ripple global ledger. As far as we are aware, this is the first contribution which sheds light on the current deployment of the Ripple system.
We present a 3D simulation approach utilising the diffuse interface representation of the phase-field method combined with a heat transfer equation to analyse the thermal conductivity in air-filled aluminium foams with complex cellular structures of different porosity. Algorithmic methods are introduced to create synthetic open-cell foam structures and to compute the thermal conductivity by means of phase-field modelling. A material law for the effective thermal conductivity is derived by determining the appropriate exponent depending on the relative density in the system. The results are compared with the thermal conductivity in massive aluminium and in pure air.
A two-dimensional single-phase model is developed for the steady-state and transient analysis of polymer electrolyte membrane fuel cells (PEMFC). Based on diluted and concentrated solution theories, viscous flow is introduced into a phenomenological multi-component modeling framework in the membrane. Characteristic variables related to the water uptake are discussed. A Butler–Volmer formulation of the current-overpotential relationship is developed based on an elementary mechanism of electrochemical oxygen reduction. Validated by using published V–I experiments, the model is then used to analyze the effects of operating conditions on current output and water management, especially net water transport coefficient along the channel. For a power PEMFC, the long-channel configuration is helpful for internal humidification and anode water removal, operating in counterflow mode with proper gas flow rate and humidity. In time domain, a typical transient process with closed anode is also investigated.
The state-of-the-art electrochemical impedance spectroscopy (EIS) calculations have not yet started from fully multi-dimensional modeling. For a polymer electrolyte membrane fuel cell (PEMFC) with long flow channel, the impedance plot shows a multi-arc characteristic and some impedance arcs could merge. By using a step excitation/Fourier transform algorithm, an EIS simulation is implemented for the first time based on the full 2D PEMFC model presented in the first part of this work. All the dominant transient behaviors are able to be captured. A novel methodology called ‘configuration of system dynamics’, which is suitable for any electrochemical system, is then developed to resolve the physical meaning of the impedance spectra. In addition to the high-frequency arc due to charge transfer, the Nyquist plots contain additional medium/low-frequency arcs due to mass transfer in the diffusion layers and along the channel, as well as a low-frequency arc resulting from water transport in the membrane. In some case, the impedance spectra appear partly inductive due to water transport, which demonstrates the complexity of the water management of PEMFCs and the necessity of physics-based calculations.
It is the purpose of this paper to address ethical issues concerning the development and application of Assistive Technology at Workplaces (ATW). We shall give a concrete technical concept how such technology might be constructed and propose eight technical functions it should adopt in order to serve its purpose. Then, we discuss the normative questions why one should use ATW, and by what means. We argue that ATW is good to the extent that it ensures social inclusion and consider four normative domains in which its worth might consists in. In addition, we insist that ATW must satisfy two requirements of good workplaces, which we specify as (a) an exploitation restraint and (b) a duty of care.
In the present study, in vitro toxicity as well as biopersistence and photopersistence of four artificial sweeteners (acesulfame, cyclamate, saccharine, and sucralose) and five antibiotics (levofloxacin, lincomycin, linezolid, marbofloxacin, and sarafloxacin) and of their phototransformation products (PTPs) were investigated. Furthermore, antibiotic activity was evaluated after UV irradiation and after exposure to inocula of a sewage treatment plant. The study reveals that most of the tested compounds and their PTPs were neither readily nor inherently biodegradable in the Organisation for Economic Co-operation and Development (OECD)-biodegradability tests. The study further demonstrates that PTPs are formed upon irradiation with an Hg lamp (UV light) and, to a lesser extent, upon irradiation with a Xe lamp (mimics sunlight). Comparing the nonirradiated with the corresponding irradiated solutions, a higher chronic toxicity against bacteria was found for the irradiated solutions of linezolid. Neither cytotoxicity nor genotoxicity was found in human cervical (HeLa) and liver (Hep-G2) cells for any of the investigated compounds or their PTPs. Antimicrobial activity of the tested fluoroquinolones was reduced after UV treatment, but it was not reduced after a 28-day exposure to inocula of a sewage treatment plant. This comparative study shows that PTPs can be formed as a result of UV treatment. The study further demonstrated that UV irradiation can be effective in reducing the antimicrobial activity of antibiotics, and consequently may help to reduce antimicrobial resistance in wastewaters. Nevertheless, the study also highlights that some PTPs may exhibit a higher ecotoxicity than the respective parent compounds. Consequently, UV treatment does not transform all micropollutants into harmless compounds and may not be a large-scale effluent treatment option.
The formation and analysis of ten microporous triazolyl isophthalate based MOFs, including nine isomorphous and one isostructural compound is presented. The compounds 1 M – 3 M with the general formula [ M ( R 1 - R 2 - trz - ia ) ] ∞ 3 ·x H 2 O (M 2+ = Co 2+ , Cu 2+ , Zn 2+ , Cd 2+ ; R 1 = H, Me; R 2 = 2py, 2pym, prz (2py = 2-pyridinyle; 2pym = 2-pyrimidinyle; prz = pyrazinyle)) crystallize with rtl topology. They are available as single crystals and also easily accessible in a multi-gram scale via refluxing the metal salts and the protonated ligands in a solvent. Their isomorphous structures facilitate the synthesis of heteronuclear MOFs; in case of 2 M , Co 2+ ions could be gradually substituted by Cu 2+ ions. The Co 2+ :Cu 2+ ratios were determined by ICP-OES spectroscopy, the distribution of Co 2+ and Cu 2+ in the crystalline samples are investigated by SEM-EDX analysis leading to the conclusions that Cu 2+ is more favorably incorporated into the framework compared to Co 2+ and, moreover, that the distribution of the two metal ions between the crystals and within the crystals is inhomogeneous if the crystals were grown slowly. The various compositions of the heteronuclear materials lead to different colors and the sorption properties for CO 2 and N 2 are dependent on the integrated metal ions.
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit (ALU) as well as the L1 and L2 cache which enables establishing multiple covert channels. Even virtualization which is known for its isolation of multiple machines is prone to covert and side-channel attacks due to the sharing of resources. Therefore itis not surprising that cloud computing is not immune to this kind of attacks. Even more, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of unwanted communication. In such a setting the ”air gap” between physical servers and networks disappears and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand we will provide a survey on weak spots an adversary trying to exfiltrate private data from target virtual machines could exploit in a cloud environment. We will evaluate the feasibility of example attacks and point out possible mitigation solutions if they exist.