Refine
Year of publication
- 2015 (80) (remove)
Document Type
- Conference Proceeding (34)
- Bachelor Thesis (15)
- Article (reviewed) (9)
- Article (unreviewed) (7)
- Patent (6)
- Master's Thesis (4)
- Periodical Part (3)
- Report (1)
- Working Paper (1)
Conference Type
- Konferenzartikel (27)
- Konferenzband (3)
- Konferenz-Abstract (2)
- Konferenz-Poster (1)
- Sonstiges (1)
Language
- German (39)
- English (39)
- Other language (1)
- Spanish (1)
Keywords
- Ausbildung (3)
- Licht (3)
- Physik (3)
- Alexander von Humboldt (2)
- Metallisieren (2)
- Mikroelektronik (2)
- Mikrostruktur (2)
- Musik (2)
- Produktion (2)
- Rezension (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (28)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (26)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (17)
- Fakultät Wirtschaft (W) (5)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (5)
- INES - Institut für nachhaltige Energiesysteme (2)
- Rektorat/Verwaltung (2)
- ACI - Affective and Cognitive Institute (1)
- CRT - Campus Research & Transfer (1)
- POIM - Peter Osypka Institute of Medical Engineering (1)
Open Access
- Open Access (80) (remove)
본 발명은 기판들을 금속화하기 위한 디바이스에 관한 것이다. 특별히, 본 발명은 습식-화학물질 연속 (인-라인) 처리 시스템 환경에서 솔라 셀들을 전기도금하기 위해 사용되는 컨택 엘리먼트(contact element)들의 분야에 관한 것이다. 코팅 재료로 평평한 기판들(1)들을 전기화학적으로 코팅하기 위한 본 발명에 따른 습식-화학물질 처리 시스템은 전해질 용액, 이송 수단들 - 이송 수단들을 이용하여 평평한 기판(1)이 전해질 용액을 통과하여 수평으로 이송될 수 있는 - 을 수용하는 용기(basin), 및 회전축(5)을 갖는 샤프트(4) 및 기판(1) 위에서 구르기에 적합한 원통형의 원주 표면을 포함하는 적어도 하나의 컨택 엘리먼트(2)를 가지며, 원주 표면은 극성이 역전될 수 있는 방식으로 전류 소스 (6)에 연결될 수 있는 적어도 하나의 전기적으로 전도성인 세그먼트 (3A) 및 적어도 하나의 전기적으로 절연된 세그먼트 (3B)를 포함하고, 컨택 엘리먼트 (2)의 회전축 (5)은 전해질 용액의 표면 위에 위치되고, 컨택 엘리먼트 (2)는 소모 전극(consumable electrode)으로 디자인된다.
In der Wertanalyse ist die Methodik TRIZ (Theorie der Lösung erfinderischer Problemstellungen) seit vielen Jahren als Werkzeug zur Kostensenkung oder zur Steigerung der Funktionalität von Produkten bekannt. Seit ihrem ersten Bekanntwerden in Westeuropa hat sich auch TRIZ weiterentwickelt. So wurden Methoden zur Modellierung von Systemen inzwischen erweitert und um Werkzeuge zur schnellen Lösungsfindung, zur Fehlervoraussage und zur Produktplanung neu entwickelt. Durch den weltweiten wissenschaftlichen Fortschritt, die Verwendung unterschiedlicher Sprachen und neue Literatur ist andererseits auch die verwendete Terminologie angewachsen und nicht mehr eindeutig. Die neue VDI-Richtlinie 4521, von deren erstem Teil nun der Gründruck vorliegt, zielt deswegen auf eine Standardisierung der Terminologie und eine vereinheitlichte Beschreibung der Methoden ab. Mit ihrer Hilfe sollen das Studium der Methodik erleichtert, die Benutzung von Literatur vereinfacht und Inhalte der TRIZ klarer darstellbar werden.
Verfahren zur Bestimmung von Eigenschaften einer Rohrleitung, insbesondere der Position eines Abzweigs einer Abwasserrohrleitung, (a) bei dem ein Schallwellensendesignal (S, S') an einem vorgegebenen Einspeisepunkt in die Rohrleitung (1) eingespeist wird und sich in axialer Richtung der Rohrleitung (1) ausbreitet, (b) wobei das Frequenzspektrum des Schallwellensendesignals (S, S') eine Frequenzkomponente oder einen Spektralbereich aufweist, dessen maximale Frequenz kleiner ist als die untere Grenzfrequenz (fc) für die erste Obermode, (c) bei dem innerhalb der Rohrleitung (1) reflektierte Anteile (Sr1, Sr2, Sr3, S'r1, S'r2, S'r3) des Schallwellensendesignals (S, S') als Schallwellenempfangssignal (E, E') detektiert werden, und (d) bei dem die Rohrleitung (1) durch eine Auswertung des Schallwellenempfangssignal (E, E') in Bezug auf das Schallwellensendesignal (S, S') hinsichtlich des Vorhandenseins von Schallwellenreflexionen (Sr1, Sr2, Sr3, S'r1, S'r2, S'r3) verursachenden Reflexionsorten entlang der Rohrleitung (1) untersucht wird, (e) wobei mittels der Auswertung des Schallwellenempfangssignals (E, E') zumindest jeweils der Abstand (I) eines Reflexionsortes von dem Einspeisepunkt bestimmt wird.
Systemic Constellations are a phenomenological approach to resolving personal, professional and organizational issues. They offer a way of mapping a present reality, working at the source of the hidden dynamics and moving to a resolution. This systemic approach often delivers surprising and unexpected insights while also offering the possibility to analyze and solve organizational problems. Rational analysis provides the whole picture of the problem which often turns out to be too complex for a decision making. Systemic constellations can help to simplify and clarify the situation and inform what has to happen next [8], [17]. The outcomes of systemic constellations as an additional resource for solving comprehensive technical problems have not yet been sufficiently investigated. In structural constellation work dealing with technical problems, the individuals who are involved in the problem situation are used to represent different system components, substances or fields. A moderator voices the feedback from the representatives concerning their feelings or intuitive movements, and points to possible solutions. For example, a moderator places the representatives somewhere in the room, develops a three-dimensional picture of the constellation of the analyzed situation and tries to expose the factors empowering or blocking the way towards constructive solutions [13]. This paper explores the theoretical background and practical outcomes of the systemic constellation method for technical problem solving. It presents some case study work which has been conducted in recent years, and then discusses its findings and implications. The research outlined in this paper demonstrates that the noteworthy contribution of structural constellation work for problem solving is typically the result of a combination of functional analysis and the feeling-as-information principle. The constellation work helps, at first, to reveal the subjective experiences, such as feelings, moods, emotions, and bodily sensations, and then to accept them as a source of objective information relevant to the decision making process. In accordance with the latest research [19], the use of feelings as a source of information follows the same principles as the use of any other information. This paper provides the structures of some standard templates and types of constellation work for technical problems, and discusses the preconditions for their application.
The overview of public key infrastructure based security approaches for vehicular communications
(2015)
Modern transport infrastructure becomes a full member of globally connected network. Leading vehicle manufacturers have already triggered development process, output of which will open a new horizon of possibilities for consumers and developers by providing a new communication entity - a car, thus enabling Car2X communications. Nevertheless some of available systems already provide certain possibilities for vehicles to communicate, most of them are considered not sufficiently secured. During last 15 years a number of big research projects funded by European Union and USA governments were started and concluded after which a set of standards were published prescribing a common architecture for Car2X and vehicles onboard communications. This work concentrates on combining inner and outer vehicular communications together with a use of Public Key Infrastructure (PKI).
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.