Refine
Document Type
- Doctoral Thesis (29) (remove)
Is part of the Bibliography
- yes (29)
Keywords
- Finite-Elemente-Methode (2)
- Implantat (2)
- Materialermüdung (2)
- Simulation (2)
- Ablationstherapie (1)
- Adaptive Steuerung (1)
- Algotithmus (1)
- Aluminiumgusslegierung (1)
- Aluminiumlegierung (1)
- Batterie (1)
- Binaural hearing (1)
- Brennstoffzelle (1)
- Building Technologies (1)
- Collision Avoidance (1)
- Data privacy (1)
- Deep learning (1)
- Defibrillatortherapie (1)
- Didaktik (1)
- Economic Model Predictive Control (1)
- Einsamkeit (1)
- Electrochemical pressure impedance spectroscopy (EPIS) (1)
- Elektrotherapie (1)
- Energiemanagement (1)
- Evaluation (1)
- Experimental Demonstration (1)
- Eyetracking (1)
- Gamification (1)
- Governance (1)
- Gütesiegel (1)
- Hardware Security (1)
- Herzfehler (1)
- Herzschrittmachertherapie (1)
- Hochschulen (1)
- Hörgerät (1)
- Induktive Schnittstelle (1)
- Industrie 4.0 (1)
- Intelligentes Stromnetz (1)
- Interaction metaphor (1)
- Internet der Dinge (1)
- Lebensdauermodellierung (1)
- Lehrmittel (1)
- Lithium-ion battery (1)
- MPC (1)
- Marktforschung (1)
- Mass transport processes (1)
- Medizintechnik (1)
- Mikrostruktur (1)
- Mikrostrukturbasierte Finite-Elemente-Simulation (1)
- Modeling (1)
- Modellierung (1)
- Multiple lineare Regressiomn (1)
- Nahfeldkommunikation (1)
- Neural Architecture Search (1)
- Okkluder (1)
- Online-Marketing (1)
- Optimal Scheduling (1)
- Optimization (1)
- Passives System (1)
- Physically Unclonable Function (1)
- Plastizität (1)
- Polymer electrolyte membrane fuel cell (PEMFC) (1)
- Predictive Control (1)
- Printed Electronics (1)
- Psychische Gesundheit (1)
- RFID (1)
- Range Imaging (1)
- Rechnungslegung (1)
- SEI (1)
- Schädigungsmechanismen (1)
- Sector Coupling (1)
- Spektroskopie (1)
- Split-Manufacturing (1)
- Static interaural time offsets (1)
- Statistik (1)
- Stoffübertragung (1)
- Studium (1)
- Systementwurf (1)
- TABS Steuerung (1)
- Thermoaktives Bauteilsystem (1)
- Thermomechanische Ermüdung (1)
- Unterrichtsmethode (1)
- Vertrauen (1)
- Virtual Reality (1)
- Virtuelle Realität (1)
- Vorhofseptumdefekt (1)
- Warmarbeitsstahl (1)
- ageing reactions (1)
- bloom filters (1)
- data malleability (1)
- data processing (1)
- data-driven simulation (1)
- digital shadow (1)
- gedruckte Elektronik (1)
- homomorphic encryption (1)
- in-vitro Simulation (1)
- inventive design (1)
- lithium plating (1)
- loneliness (1)
- mental health apps (1)
- modelling (1)
- optimization (1)
- printed electronics (1)
- problem-solving (1)
- split manufacturing (1)
- thermische Entfestigung (1)
- university students (1)
- wireless sensor network (1)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (11)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (5)
- Fakultät Wirtschaft (W) (4)
- INES - Institut für nachhaltige Energiesysteme (4)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (3)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (1)
- Fakultät Medien (M) (ab 22.04.2021) (1)
- IMLA - Institute for Machine Learning and Analytics (1)
- POIM - Peter Osypka Institute of Medical Engineering (1)
- Zentrale Einrichtungen (1)
Open Access
- Open Access (19)
- Closed Access (4)
- Diamond (4)
- Bronze (3)
- Closed (3)
Клиновые акустические волны в твёрдом те-ле — это третий фундаментальный тип волн, после объёмных и поверхност-ных волн, импульсы которых распространяются без изменений своих форм (дисперсия отсутствует). Систему упругого клина можно получить из систе-мы упругого полупространства, “разрезав” его вдоль некоторой плоскости, а систему упругого полупространства можно получить из распределённой в пространстве упругой среды тем же методом, поэтому связи между поверх-ностными и объёмными волнами должны во многом повторяться при рас-смотрении клиновых и поверхностных волн. Например, существование быст-рых псевдоповерхностных волн в системе упругого полупространства, излу-чающих энергию при распространении в объёмные волны, имеет свой аналог и для системы упругого клина: совсем недавно были открыты псевдоклино-вые волны, излучающие как объёмные, так и поверхностные волны по мере своего распространения. С другой стороны, в этой же последовательности объёмных, поверхностных и клиновых волн должны выделяться и отличи-тельные особенности. Если поверхностные волны отличаются от объёмных волн тем, что они локализованы на двухмерной поверхности (объёмные вол-ны являются нелокализованными), то клиновые волны локализованы вдоль одномерной поверхности (линии) — кромки клина. Клиновые волны — это волноводные акустические волны, которые распространяются без дифракци-онных потерь, а также они не обладают дисперсией, поскольку в системе бесконечного упругого клина нет ни одного параметра размерности длины.
В заключении приведены основные результаты работы, которые со-стоят в следующем:
1. С помощью метода функций Лагерра была построена функция динами-ческого отклика на импульсный линейный источник (функция Грина) для задачи Лэмба в полупространстве, а также были изучены вопросы о сходимости и устойчивости данного построения. Было показано, что в предельном случае построенная функция динамического отклика совпа-дает с классической функцией Грина для этой задачи.
2. На основе результатов предыдущего пункта была построена функция Грина для упругого клина (и функция плотности состояния на кром-ке, совпадающая с диагональными компонентами функции Грина), с по-мощью которой удалось идентифицировать импульсы псевдоклиновых волн на экспериментальных кривых.
3. Для определённых клиновых конфигураций в анизотропных упругих средах (тетрагональных кристаллах) удалось получить критерий суще-ствования клиновых волн на основе характеристик поверхностных волн, распространяющихся на гранях исследуемых конфигураций, а также в некоторых случаях удалось классифицировать клиновые волны по типу симметрии.
4. Была разработана теория, описывающая формы импульсов клиновых волн при различных режимах генерации: абляционном и термоупругом.
5. Для клиновых волн была представлена нелинейная теория второго по-рядка. Были проведены численные расчёты функции ядра эволюцион-ного уравнения клиновых волн для кремниевых клиньев с одной гранью, совпадающей с поверхностью (111) (поверхность скола), и с произволь-ной ориентацией второй грани.
6. Были описаны фундаментальные отличия нелинейных линовых волн от нелинейных объёмных и поверхностных волн, а также было проведено численное моделирование эволюции импульса клиновых волн, которое показало соответствие теории эксперименту.
7. Получены решения солитонного типа для клиновых волн. Рассмотрены взаимодействия солитонов и свойства солитонного распада.
In diesem Buch erfolgt die Ausarbeitung eines im Sinne der kaufmännischen Rechnungslegung zweckadäquat ausgestalteten Hochschulrechnungswesens, das insbesondere auch hochschulspezifische Sachverhalte einer Lösung zuzuführen vermag.
Auf der Grundlage kaufmännischer Jahresabschlüsse aus unterschiedlichen Bundesländern werden zunächst bestehende Unterschiede in der Rechnungslegung der Hochschulen aufgezeigt. Im Hinblick auf Sinn und Zweck der kaufmännischen Rechnungslegung werden unterschiedliche Vorgehensweisen in einer vereinheitlichten Ausgestaltung zusammengefasst. In diesem Zusammenhang sind auch die Governance-Strukten im Steuerungsverhältnis zwischen den Bundesländern und den öffentlichen Hochschulen in der Entwicklung des Rechnungslegungssystems berücksichtigt.
Virtual-Reality
(2023)
Die Virtual-Reality (VR) Technologie ermöglicht Unternehmen eine Produktpräsentation, die weit über traditionelle Darstellungsmethoden hinausgeht. Obgleich die Integration der VR-Technologie für Unternehmen viele Chancen eröffnet, ist deren Einsatz auch mit Risiken verbunden. Insbesondere der Mangel an empirisch gesicherten Erkenntnissen zur Kundenakzeptanz, zu den Auswirkungen der Nutzung sowie zu Kannibalisierungseffekten ist ein wesentlicher Grund, der die Verbreitung von VR in der Kundenkommunikation noch hemmt. Das Buch adressiert diese Forschungslücken und identifiziert mittels eines nutzerzentrierten, quantitativen Forschungsdesigns konkrete Chancen und Risiken, die mit dem Einsatz von VR-Produktpräsentationen verbunden sind.
Emotionale Reaktionen von Nutzern auf Stimuli einer interaktiven Anwendung gelten als zentrale Indikatoren für positive oder negative User Experience. Oliver Gasts Untersuchung stellt ein Verfahren vor, das die Messung und Interpretation der Emotionen bei der Nutzung interaktiver Anwendungen ermöglicht. Denn der Erfolg von webbasierten Applikationen, wie z. B. Online-Shops, hängt in sehr hohem Maße von der Erfüllung der Erwartungen des einzelnen Nutzers ab. Mit den Ergebnissen seiner Untersuchung hat der Autor ein Modell erstellt und evaluiert, welches die relevanten Indikatoren für Mimik basierte Emotionsbewertung umfassend aufzeigt.
Die vorliegende Arbeit beschäftigt sich mit dem Ermüdungs- und Schädigungsverhalten der in Verbrennungsmotoren eingesetzten Aluminiumgusslegierungen AlSi7Cu0,5Mg-T7 und AlSi12Cu3Ni2Mg-T7. Im Vergleich zur niederzyklischen sowie thermomechanischen Ermüdungsbeanspruchung führt die zusätzliche Überlagerung hochzyklischer Belastungen zu einer signifikanten Lebensdauerreduktion, die mit der Replika-Technik beobachteten Beschleunigung des Kurzrisswachstums erklärt werden kann. Frakto- und metallographische Untersuchungen zeigen, dass Rissinitiierung und Lebensdauerverhalten durch Gussdefekte sowie von belastungs- und temperaturabhängigen Schädigungsmechanismen bestimmt werden. Die Lebensdauern werden mit einem mechanismenbasierten Risswachstumsmodell vorhergesagt. Dazu wird der Schädigungsparameter DTMF,brittle entwickelt, der die charakteristischen Schädigungsmechanismen berücksichtigt. Die Legierung AlSi12Cu3Ni2Mg-T7 wird abschließend mit der Finite-Elemente-Methode und mikrostrukturbasierten Zellmodellen untersucht. Mit den Simulationsergebnissen können die experimentell beobachteten Schädigungsmechanismen fundiert gestützt werden.
This thesis deals with the redesign of manufacturing systems by simulation and optimization. Material flow simulation is a common tool for solving problems in system design. Limitations are the high requirements in time and knowledge to execute simulation studies, evaluate results and solve design problems. New chances arrives with the technologies of industry 4.0 and the digital shadow, providing data for simulation. However, the methods to use production data for the redesign of production systems are not available yet. Purpose of this work is providing the methods to automate simulation from digital shadow, use simulation to optimize and solve problems in system design. Two case studies are used to support the action research approach of this work. The result of this work is a framework for the application of the digital shadow in optimization and problem-solving.
With this generation of devices, Virtual Reality (VR) has actually made it into the living rooms of end-users. These devices feature 6-DOF tracking, allowing them to move naturally in virtual worlds and experience them even more immersively. However, for a natural locomotion in the virtual, one needs a corresponding free space in the real environment. The available space is often limited, especially in everyday environments and under normal spatial conditions. Furnishings and objects of daily life can quickly become obstacles for VR users if they are not cleared away. Since the idea behind VR is to place users into a virtual world and to hide the real world as much as possible, invisible objects represent potential obstacles. The currently available systems offer only rudimentary assistance for this problem. If a user threatens to leave the space previously defined for use, a visual boundary is displayed to allow orientation within the space. These visual metaphors are intended to prevent users from leaving the safe area. However, there is no detection of potentially dangerous objects within this part of space. Objects that have not been cleared away or that have been added in the meantime may still become obstacles. This thesis shows how possible obstacles in the environment can be detected automatically with range imaging cameras and how users can be effectively warned about them in the virtual environment without significantly disturbing their sense of presence. Four different interactive visual metaphors are used to signalize the obstacles within the VE. With the help of a user study, the four signaling variants and the obstacle detection were evaluated and tested.
In the work at hand, we state that privacy and malleability of data are two aspects highly desired but not easy to associate. On the one hand, we are trying to shape data to make them usable and editable in an intelligible way, namely without losing their initial information. On the other hand, we are looking for effective privacy on data such that no external or non-authorized party could learn about their content. In such a way, we get overlapping requirements by pursuing different goals; it is trivial to be malleable without being secure, and vice versa. We propose four “real-world” use cases identified as scenarios where these two contradictory features are required and taking place in distinct environments. These considered backgrounds consist of firstly, cloud security auditing, then privacy of mobile network users and industry 4.0 and finally, privacy of COVID-19 tracing app users. After presenting useful background material, we propose to employ multiple approaches to design solutions to solve the use cases. We combine homomorphic encryption with searchable encryption and private information retrieval protocol to build an effective construction for the could auditing use case. As a second step, we develop an algorithm to generate the appropriate parameters to use the somewhat homomorphic encryption scheme by considering correctness, performance and security of the respective application. Finally, we propose an alternative use of Bloom filter data structure by adding an HMAC function to allow an outsourced third party to perform set relations in a private manner. By analyzing the overlapping bits occurring on Bloom filters while testing the inclusiveness or disjointness of the sets, we show how these functions maintain privacy and allow operations directly computed on the data structure. Then, we show how these constructions could be applied to the four selected use cases. Our obtained solutions have been implemented and we provide promising results that validate their efficiency and thus relevancy.
Modern society is more than ever striving for digital connectivity -- everywhere and at any time, giving rise to megatrends such as the Internet of Things (IoT). Already today, 'things' communicate and interact autonomously with each other and are managed in networks. In the future, people, data, and things will be interlinked, which is also referred to as the Internet of Everything (IoE). Billions of devices will be ubiquitously present in our everyday environment and are being connected over the Internet.
As an emerging technology, printed electronics (PE) is a key enabler for the IoE offering novel device types with free form factors, new materials, and a wide range of substrates that can be flexible, transparent, as well as biodegradable. Furthermore, PE enables new degrees of freedom in circuit customizability, cost-efficiency as well as large-area fabrication at the point of use.
These unique features of PE complement conventional silicon-based technologies. Additive manufacturing processes enable the realization of many envisioned applications such as smart objects, flexible displays, wearables in health care, green electronics, to name but a few.
From the perspective of the IoE, interconnecting billions of heterogeneous devices and systems is one of the major challenges to be solved. Complex high-performance devices interact with highly specialized lightweight electronic devices, such as e.g. smartphones and smart sensors. Data is often measured, stored, and shared continuously with neighboring devices or in the cloud. Thereby, the abundance of data being collected and processed raises privacy and security concerns.
Conventional cryptographic operations are typically based on deterministic algorithms requiring high circuit and system complexity, which makes them unsuitable for lightweight devices.
Many applications do exist, where strong cryptographic operations are not required, such as e.g. in device identification and authentication. Thereby, the security level mainly depends on the quality of the entropy source and the trustworthiness of the derived keys. Statistical properties such as the uniqueness of the keys are of great importance to precisely distinguish between single entities.
In the past decades, hardware-intrinsic security, particularly physically unclonable functions (PUFs), gained a lot of attraction to provide security features for IoT devices. PUFs use their inherent variations to derive device-specific unique identifiers, comparable to fingerprints in biometry.
The potentials of this technology include the use of a true source of randomness, on demand key derivation, as well as inherent key storage.
Combining these potentials with the unique features of PE technology opens up new opportunities to bring security to lightweight electronic devices and systems. Although PE is still far from being matured and from being as reliable as silicon technology, in this thesis we show that PE-based PUFs are promising candidates to provide key derivation suitable for device identification in the IoE.
Thereby, this thesis is primarily concerned with the development, investigation, and assessment of PE-based PUFs to provide security functionalities to resource constrained printed devices and systems.
As a first contribution of this thesis, we introduce the scalable PE-based Differential Circuit PUF (DiffC-PUF) design to provide secure keys to be used in security applications for resource constrained printed devices. The DiffC-PUF is designed as a hybrid system architecture incorporating silicon-based and inkjet-printed components. We develop an embedded PUF platform to enable large-scale characterization of silicon and printed PUF cores.
In the second contribution of this thesis, we fabricate silicon PUF cores based on discrete components and perform statistical tests under realistic operating conditions. A comprehensive experimental analysis on the PUF security metrics is carried out. The results show that the silicon-based DiffC-PUF exhibits nearly ideal values for the uniqueness and reliability metrics. Furthermore, the identification capabilities of the DiffC-PUF are investigated and it is shown that additional post-processing can further improve the quality of the identification system.
In the third contribution of this thesis, we firstly introduce an evaluation workflow to simulate PE-based DiffC-PUFs, also called hybrid PUFs. Hereof, we introduce a Python-based simulation environment to investigate the characteristics and variations of printed PUF cores based on Monte Carlo (MC) simulations. The simulation results show, that the security metrics to be expected from the fabricated devices are close to ideal at the best operating point.
Secondly, we employ fabricated printed PUF cores for statistical tests under varying operating conditions including variations in ambient temperature, relative humidity, and supply voltage. The evaluations of the uniqueness, bit aliasing, and uniformity metrics are in good agreement with the simulation results. The experimentally determined mean reliability value is relatively low, which can be explained by the missing passivation and encapsulation of the printed transistors. The investigation of the identification capabilities based on the raw PUF responses shows that the pure hybrid PUF is not suitable for cryptographic applications, but qualifies for device identification tasks.
The final contribution is to switch to the perspective of an attacker. To judge on the security capabilities of the hybrid PUF, a comprehensive security analysis in the manner of a cryptanalysis is performed. The analysis of the entropy of the hybrid PUF shows that its vulnerability against model-based attacks mainly depends on the selected challenge building method. Furthermore, an attack methodology is introduced to assess the performances of different mathematical cloning attacks on the basis of eavesdropped challenge-response pairs (CRPs). To clone the hybrid PUF, a sorting algorithm is introduced and compared with commonly used supervised machine learning (ML) classifiers including logistic regression (LR), random forest (RF), as well as multi-layer perceptron (MLP).
The results show that the hybrid PUF is vulnerable against model-based attacks. The sorting algorithm benefits from shorter training times compared to the ML algorithms. If the eavesdropped CRPs are erroneous, the ML algorithms outperform the sorting algorithm.
Ultra-low-power passive telemetry systems for industrial and biomedical applications have gained much popularity lately. The reduction of the power consumption and size of the circuits poses critical challenges in ultra-low-power circuit design. Biotelemetry applications like leakage detection in silicone breast implants require low-power-consuming small-size electronics. In this doctoral thesis, the design, simulation, and measurement of a programmable mixed-signal System-on-Chip (SoC) called General Application Passive Sensor Integrated Circuit (GAPSIC) is presented. Owing to the low power consumption, GAPSIC is capable of completely passive operation. Such a batteryless passive system has lower maintenance complexity and is also free from battery-related health hazards. With a die area of 4.92 mm² and a maximum analog power consumption of 592 µW, GAPSIC has one of the best figure-of-merits compared to similar state-of-the-art SoCs. Regarding possible applications, GAPSIC can read out and digitally transmit the signals of resistive sensors for pressure or temperature measurements. Additionally, GAPSIC can measure electrocardiogram (ECG) signals and conductivity.
The design of GAPSIC complies with the International Organization for Standardization (ISO) 15693/NFC (near field communication) 5 standard for radio frequency identification (RFID), corresponding to the frequency range of 13.56 MHz. A passive transponder developed with GAPSIC comprises of an external memory storage and very few other external components, like an antenna and sensors. The passive tag antenna and reader antenna use inductive coupling for communication and energy transfer, which enables passive operation. A passive tag developed with GAPSIC can communicate with an NFC compatible smart device or an ISO 15693 RFID reader. An external memory storage contains the programmable application-specific firmware.
As a mixed-signal SoC, GAPSIC includes both analog and digital circuitries. The analog block of GAPSIC includes a power management unit, an RFID/NFC communication unit, and a sensor readout unit. The digital block includes an integrated 32-bit microcontroller, developed by the Hochschule Offenburg ASIC design center, and digital peripherals. A 16-kilobyte random-access memory and a read-only 16-kilobyte memory constitute the GAPSIC internal memory. For the fabrication of GAPSIC, one poly, six-metal 0.18 µm CMOS process is used.
The design of GAPSIC includes two stages. In the first stage, a standalone RFID/NFC frontend chip with a power management unit, an RFID/NFC communication unit, a clock regenerator unit, and a field detector unit was designed. In the second stage, the rest of the functional blocks were integrated with the blocks of the RFID/NFC frontend chip for the final integration of GAPSIC. To reduce the power consumption, conventional low-power design techniques were applied extensively like multiple power supplies, and the operation of complementary metal-oxide-semiconductor (CMOS) transistors in the sub-threshold region of operation, as well as further innovative circuit designs.
An overvoltage protection circuit, a power rectifier, a bandgap reference circuit, and two low-dropout (LDO) voltage regulators constitute the power management unit of GAPSIC. The overvoltage protection circuit uses a novel method where three stacked transistor pairs shunt the extra voltage. In the power rectifier, four rectifier units are arranged in parallel, which is a unique approach. The four parallel rectifier units provide the optimal choice in terms of voltage drop and the area required.
The communication unit is responsible for RFID/NFC communication and incorporates demodulation and load modulation circuitry. The demodulator circuit comprises of an envelope detector, a high-pass filter, and a comparator. Following a new approach, the bandgap reference circuit itself acts as the load for the envelope detector circuit, which minimizes the circuit complexity and area. For the communication between the reader and the RFID/NFC tag, amplitude-shift keying (ASK) is used to modulate signals, where the smallest modulation index can be as low as 10%. A novel technique involving a comparator with a preset offset voltage effectively demodulates the ASK signal. With an effective die area of 0.7 mm² and power consumption of 107 µW, the standalone RFID/NFC frontend chip has the best figure-of-merits compared to the state-of-the-art frontend chips reported in the relevant literature. A passive RFID/NFC tag developed with the standalone frontend chip, as well as temperature and pressure sensors demonstrate the full passive operational capability of the frontend chip. An NFC reader device using a custom-built Android-based application software reads out the sensor data from the passive tag.
The sensor readout circuit consists of a channel selector with two differential and four single-ended inputs with a programmable-gain instrumentation amplifier. The entire sensor readout part remains deactivated when not in use. The internal memory stores the measured offset voltage of the instrumentation amplifier, where a firmware code removes the offset voltage from the measured sensor signal. A 12-bit successive approximation register (SAR) type analog-to-digital-converter (ADC) based on a charge redistribution architecture converts the measured sensor data to a digital value. The digital peripherals include a serial peripheral interface, four timers, RFID/NFC interfaces, sensor readout unit interfaces, and 12-bit SAR logic.
Two sets of studies with custom-made NFC tag antennas for biomedical applications were conducted to ascertain their compatibility with GAPSIC. The first study involved the link efficiency measurements of NFC tag antennas and an NFC reader antenna with porcine tissue. In a separate experiment, the effect of a ferrite compared to air core on the antenna-coupling factor was investigated. With the ferrite core, the coupling factor increased by four times.
Among the state-of-the-art SoCs published in recent scientific articles, GAPSIC is the only passive programmable SoC with a power management unit, an RFID/NFC communication interface, a sensor readout circuit, a 12-bit SAR ADC, and an integrated 32-bit microcontroller. This doctoral research includes the preliminary study of three passive RFID tags designed with discrete components for biomedical and industrial applications like measurements of temperature, pH, conductivity, and oxygen concentration, along with leakage detection in silicone breast implants. Besides its small size and low power consumption, GAPSIC is suitable for each of the biomedical and industrial applications mentioned above due to the integrated high-performance microcontroller, the robust programmable instrumentation amplifier, and the 12-bit analog-to-digital converter. Furthermore, the simulation and measurement data show that GAPSIC is well suited for the design of a passive tag to monitor arterial blood pressure in patients experiencing Peripheral Artery Disease (PAD), which is proposed in this doctoral thesis as an exemplary application of the developed system.