Refine
Year of publication
- 2020 (229) (remove)
Document Type
- Conference Proceeding (70)
- Article (unreviewed) (36)
- Article (reviewed) (32)
- Part of a Book (27)
- Contribution to a Periodical (12)
- Other (11)
- Patent (11)
- Book (10)
- Letter to Editor (7)
- Report (7)
Conference Type
- Konferenzartikel (64)
- Konferenz-Poster (2)
- Konferenzband (2)
- Konferenz-Abstract (1)
- Sonstiges (1)
Language
- English (121)
- German (106)
- Other language (2)
Has Fulltext
- no (229) (remove)
Is part of the Bibliography
- yes (229) (remove)
Keywords
- Assistive Technology (8)
- Deafblindness (5)
- Innovation (5)
- Projektmanagement (5)
- COVID-19 (4)
- Wearables (4)
- Bildungsmanagement (3)
- Haptics (3)
- Human Computer Interaction (3)
- Künstliche Intelligenz (3)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (87)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (65)
- Fakultät Wirtschaft (W) (56)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (25)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (15)
- ACI - Affective and Cognitive Institute (10)
- IMLA - Institute for Machine Learning and Analytics (10)
- INES - Institut für nachhaltige Energiesysteme (10)
- IfTI - Institute for Trade and Innovation (5)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (2)
Open Access
- Closed Access (135)
- Open Access (70)
- Bronze (6)
- Closed (1)
- Diamond (1)
RETIS – Real-Time Sensitive Wireless Communication Solution for Industrial Control Applications
(2020)
Ultra-Reliable Low Latency Communications (URLLC) has been always a vital component of many industrial applications. The paper proposes a new wireless URLLC solution called RETIS, which is suitable for factory automation and fast process control applications, where low latency, low jitter, and high data exchange rates are mandatory. In the paper, we describe the communication protocol as well as the hardware structure of the network nodes for implementing the required functionality. Many techniques enabling fast, reliable wireless transmissions are used – short Transmission Time Interval (TTI), Time-Division Multiple Access (TDMA), MIMO, optional duplicated data transfer, Forward Error Correction (FEC), ACK mechanism. Preliminary tests show that reliable end-to-end latency down to 350 μs and packet exchange rate up to 4 kHz can be reached (using quadruple MIMO and standard IEEE 802.15.4 PHY at 250 kbit/s).
Novel manufacturing technologies, such as printed electronics, may enable future applications for the Internet of Everything like large-area sensor devices, disposable security, and identification tags. Printed physically unclonable functions (PUFs) are promising candidates to be embedded as hardware security keys into lightweight identification devices. We investigate hybrid PUFs based on a printed PUF core. The statistics on the intra- and inter-hamming distance distributions indicate a performance suitable for identification purposes. Our evaluations are based on statistical simulations of the PUF core circuit and the thereof generated challenge-response pairs. The analysis shows that hardware-intrinsic security features can be realized with printed lightweight devices.
Modern society is more than ever striving for digital connectivity -- everywhere and at any time, giving rise to megatrends such as the Internet of Things (IoT). Already today, 'things' communicate and interact autonomously with each other and are managed in networks. In the future, people, data, and things will be interlinked, which is also referred to as the Internet of Everything (IoE). Billions of devices will be ubiquitously present in our everyday environment and are being connected over the Internet.
As an emerging technology, printed electronics (PE) is a key enabler for the IoE offering novel device types with free form factors, new materials, and a wide range of substrates that can be flexible, transparent, as well as biodegradable. Furthermore, PE enables new degrees of freedom in circuit customizability, cost-efficiency as well as large-area fabrication at the point of use.
These unique features of PE complement conventional silicon-based technologies. Additive manufacturing processes enable the realization of many envisioned applications such as smart objects, flexible displays, wearables in health care, green electronics, to name but a few.
From the perspective of the IoE, interconnecting billions of heterogeneous devices and systems is one of the major challenges to be solved. Complex high-performance devices interact with highly specialized lightweight electronic devices, such as e.g. smartphones and smart sensors. Data is often measured, stored, and shared continuously with neighboring devices or in the cloud. Thereby, the abundance of data being collected and processed raises privacy and security concerns.
Conventional cryptographic operations are typically based on deterministic algorithms requiring high circuit and system complexity, which makes them unsuitable for lightweight devices.
Many applications do exist, where strong cryptographic operations are not required, such as e.g. in device identification and authentication. Thereby, the security level mainly depends on the quality of the entropy source and the trustworthiness of the derived keys. Statistical properties such as the uniqueness of the keys are of great importance to precisely distinguish between single entities.
In the past decades, hardware-intrinsic security, particularly physically unclonable functions (PUFs), gained a lot of attraction to provide security features for IoT devices. PUFs use their inherent variations to derive device-specific unique identifiers, comparable to fingerprints in biometry.
The potentials of this technology include the use of a true source of randomness, on demand key derivation, as well as inherent key storage.
Combining these potentials with the unique features of PE technology opens up new opportunities to bring security to lightweight electronic devices and systems. Although PE is still far from being matured and from being as reliable as silicon technology, in this thesis we show that PE-based PUFs are promising candidates to provide key derivation suitable for device identification in the IoE.
Thereby, this thesis is primarily concerned with the development, investigation, and assessment of PE-based PUFs to provide security functionalities to resource constrained printed devices and systems.
As a first contribution of this thesis, we introduce the scalable PE-based Differential Circuit PUF (DiffC-PUF) design to provide secure keys to be used in security applications for resource constrained printed devices. The DiffC-PUF is designed as a hybrid system architecture incorporating silicon-based and inkjet-printed components. We develop an embedded PUF platform to enable large-scale characterization of silicon and printed PUF cores.
In the second contribution of this thesis, we fabricate silicon PUF cores based on discrete components and perform statistical tests under realistic operating conditions. A comprehensive experimental analysis on the PUF security metrics is carried out. The results show that the silicon-based DiffC-PUF exhibits nearly ideal values for the uniqueness and reliability metrics. Furthermore, the identification capabilities of the DiffC-PUF are investigated and it is shown that additional post-processing can further improve the quality of the identification system.
In the third contribution of this thesis, we firstly introduce an evaluation workflow to simulate PE-based DiffC-PUFs, also called hybrid PUFs. Hereof, we introduce a Python-based simulation environment to investigate the characteristics and variations of printed PUF cores based on Monte Carlo (MC) simulations. The simulation results show, that the security metrics to be expected from the fabricated devices are close to ideal at the best operating point.
Secondly, we employ fabricated printed PUF cores for statistical tests under varying operating conditions including variations in ambient temperature, relative humidity, and supply voltage. The evaluations of the uniqueness, bit aliasing, and uniformity metrics are in good agreement with the simulation results. The experimentally determined mean reliability value is relatively low, which can be explained by the missing passivation and encapsulation of the printed transistors. The investigation of the identification capabilities based on the raw PUF responses shows that the pure hybrid PUF is not suitable for cryptographic applications, but qualifies for device identification tasks.
The final contribution is to switch to the perspective of an attacker. To judge on the security capabilities of the hybrid PUF, a comprehensive security analysis in the manner of a cryptanalysis is performed. The analysis of the entropy of the hybrid PUF shows that its vulnerability against model-based attacks mainly depends on the selected challenge building method. Furthermore, an attack methodology is introduced to assess the performances of different mathematical cloning attacks on the basis of eavesdropped challenge-response pairs (CRPs). To clone the hybrid PUF, a sorting algorithm is introduced and compared with commonly used supervised machine learning (ML) classifiers including logistic regression (LR), random forest (RF), as well as multi-layer perceptron (MLP).
The results show that the hybrid PUF is vulnerable against model-based attacks. The sorting algorithm benefits from shorter training times compared to the ML algorithms. If the eavesdropped CRPs are erroneous, the ML algorithms outperform the sorting algorithm.
Gasdynamik
(2020)
Für kompressible Strömungen werden die Erhaltungssätze für Masse, Impuls und Energie hergeleitet. Die Eigenschaften der Stoßgleichungen wie Rankine-Hugoniot-Relation und Rayleigh-Gerade werden betrachtet. Zur Berechnung der Kräfte auf umströmte Körper werden die Auftriebs- und Widerstandsbeiwerte ermittelt. Auf der Basis der Stromfadentheorie wird die Auslegung von Lavaldüsen behandelt. Das physikalische Verhalten linearer Unter- und Überschallströmungen und transsonischer Profilumströmungen wird analysiert.
VR als Chance für Museen
(2020)
Social Media Marketing
(2020)
In diesem Beitrag wird ein Planungsprozess mit seinen einzelnen Phasen für ein Social Media Marketing vorgestellt. Darüber hinaus werden zentrale Implementierungsoptionen beschrieben. Hierzu gehören Werbung (über Plattformen und Influencer), Kundenservice, Community Management, Social Recruitment, interne Nutzung und Business Profile.
The development of Internet of Things (IoT) embedded devices is proliferating, especially in the smart home automation system. However, the devices unfortunately are imposing overhead on the IoT network. Thus, the Internet Engineering Task Force (IETF) have introduced the IPv6 Low-Power Wireless Personal Area Network (6LoWPAN) to provide a solution to this constraint. 6LoWPAN is an Internet Protocol (IP) based communication where it allows each device to connect to the Internet directly. As a result, the power consumption is reduced. However, the limitation of data transmission frame size of the IPv6 Routing Protocol for Low-power and Lossy Network’s (RPL’s) had made it to be the running overhead, and thus consequently degrades the performance of the network in terms of Quality of Service (QoS), especially in a large network. Therefore, HRPL was developed to enhance the RPL protocol to minimize redundant retransmission that causes the routing overhead. We introduced the T-Cut Off Delay to set the limit of the delay and the H field to respond to actions taken within the T-Cut Off Delay. Thus, this paper presents the comparison performance assessment of HRPL between simulation and real-world scenarios (6LoWPAN Smart Home System (6LoSH) testbed) in validating the HRPL functionalities. Our results show that HRPL had successfully reduced the routing overhead when implemented in 6LoSH. The observed Control Traffic Overhead (CTO) packet difference between each experiment is 7.1%, and the convergence time is 9.3%. Further research is recommended to be conducted for these metrics: latency, Packet Delivery Ratio (PDR), and throughput.
Das Standardlehrbuch zum internationalen Steuerrecht
Kenntnisse im internationalen Steuerrecht werden in der steuerlichen Ausbildung immer wichtiger. Mit dem „Wilke“ sichern Sie sich einen umfassenden und fundierten Einstieg in diese komplexe Materie. Leicht verständlich und anschaulich vermittelt dieses Standardlehrbuch Ihnen alle relevanten Grundlagen des internationalen Steuerrechts.
Der Aufbau des Buchs orientiert sich dabei sowohl an den Bedürfnissen der Ausbildung als auch denen der Praxis. Als idealer Begleiter unterstützt es Sie in jeder Phase Ihrer beruflichen Entwicklung – von den ersten Schritten in der Steuerberater-Ausbildung bis hin zur erfolgreich abgeschlossenen Weiterbildung zum Fachberater für Internationales Steuerrecht.
Die 15. Auflage berücksichtigt die Entwicklung auf dem Gebiet des internationalen Steuerrechts in Gesetzgebung, Rechtsprechung, Literatur und Verwaltung bis Ende März 2020.
Rechtsstand: 1.4.2020
Do you know that for each banana bunch the complete plant must be cut as well? Only in Brazil 440 million trees are planted annually. With an average weight of 30 kg per banana plant you can estimate about 13,5 million tons of banana residues per year. Although there exist some projects to use these residues for the production of valuable products (e.g fibers for textile and paper production) most of this organic waste material is unused and left for composting on the farmland.
The basic idea of this project is to evaluate this organic waste material for converting it to a renewable and CO2 neutral fuel. Therefore, the different parts of the banana plant (heart, leaves and pseudo stem) were analyzed regarding their biogas potential (specific biogas yield and biogas production kinetics). In further studies the effect of mechanical and enzymatic pretreatments of the different parts of the plants was investigated. This examination could then be the basis for an energetic usage of this organic residue.
The biogas batch experiments were performed according to the german guideline VDI 4630 in 2-L-Batch reactors at 37°C. As biogas substrates, the heart, the leaves and the pseudo stem of the banana plant residue with and without enzymatic/mechanical pretreatment were used.
The different parts of the banana plants result in a specific biogas production yield in the range of 260-470 norm liters per kg organic dry mass.
To determine the influence of the mechanical pretreatment (particle size 1-15 mm) on the biogas production kinetics, the kinetic constants were defined and calculated. The reduction of the particle size leads to an improved biogas production kinetics. Therefore experiments will demonstrate, if the results from the batch experiments can be converted in the continuous fed biogas reactor. The experiments of the enzymatic pretreatment are still under investigation.
We propose in this work to solve privacy preserving set relations performed by a third party in an outsourced configuration. We argue that solving the disjointness relation based on Bloom filters is a new contribution in particular by having another layer of privacy on the sets cardinality. We propose to compose the set relations in a slightly different way by applying a keyed hash function. Besides discussing the correctness of the set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. We are in particular interested in how having bits overlapping in the Bloom filters impacts the privacy level of our approach. Finally, we present our results with real-world parameters in two concrete scenarios.
While prospect of tracking mobile devices' users is widely discussed all over European countries to counteract COVID-19 propagation, we propose a Bloom filter based construction providing users' location privacy and preventing mass surveillance.
We apply a solution based on Bloom filters data structure that allows a third party, a government agency, to perform some privacy-preserving set relations on a mobile telco's access logfile.
By computing set relations, the government agency, given the knowledge of two identified persons, has an instrument that provides a (possible) infection chain from the initial to the final infected user no matter at which location on a worldwide scale they are.
The benefit of our approach is that intermediate possible infected users can be identified and subsequently contacted by the agency. With such approach, we state that solely identities of possible infected users will be revealed and location privacy of others will be preserved. To this extent, it meets General Data Protection Regulation (GDPR)requirements in this area.
Das Buch bietet eine fundierte Einführung in die Chronologie bekannter Angriffe und Verwundbarkeiten auf mobile Systeme und dessen konzeptionelle Einordnung der letzten zwei Dekaden. So erhält der Leser einen einmaligen Überblick über die Vielfältigkeit nachweisbar ausgenutzter Angriffsvektoren auf verschiedenste Komponenten mobiler drahtloser Geräte sowie den teilweise inhärent sicherheitskritischen Aktivitäten moderner mobiler OS. Eine für Laien wie Sicherheitsarchitekten gleichermaßen fesselnde Lektüre, die das Vertrauen in sichere mobile Systeme stark einschränken dürfte.
Der Inhalt
Verwundbarkeit von 802.15.4: PiP-Injektion
Verwundbarkeit von WLAN: KRACK-Angriff auf WPA2
Verwundbarkeit von Bluetooth: Blueborne und Co.
Verwundbarkeiten von NFC und durch NFC
Angriffe über das Baseband
Android Sicherheitsarchitektur
Horizontale Rechteausweitung
Techniken zu Obfuskierung und De-Obfuskierung von Apps
Apps mit erhöhten Sicherheitsbedarf: Banking Apps
Positionsbestimmung durch Swarm-Mapping
Seitenkanäle zur Überwindung des ‚Air-gap‘
Ausblick: 5G Sicherheitsarchitektur
Die Zielgruppen: Studierende der Informatik, Wirtschaftsinformatik, Elektrotechnik oder verwandter Studiengänge Praktiker, IT-Sicherheitsbeauftragte, Datenschutzbeauftragte, Entscheidungsträger, Nutzer drahtloser Geräte, die an einem ‚Blick unter die Motorhaube‘ interessiert sind.
Digitale Geschäftsmodelle zeichnen sich oft durch die spezifische Nutzung von proprietären Daten oder Algorithmen aus. Wettbewerbsvorteile von Firmen mit digitalen Geschäftsmodellen sind dann charakterisiert durch Merkmale von erfolgsrelevanter Information und Aspekten von deren Offenlegung − oder bewusst gewählter Intransparenz − die intrinsisch zu asymmetrischer Information führen. Management und Personal der Firma kennen die Erfolgsaussichten und die relevanten Risikofaktoren dann besser als mögliche Kapitalgeber.
Time-of-Flight Cameras Enabling Collaborative Robots for Improved Safety in Medical Applications
(2020)
Human-robot collaboration is being used more and more in industry applications and is finding its way into medical applications. Industrial robots that are used for human-robot collaboration, cannot detect obstacles from a distance. This paper introduced the idea of using wireless technology to connect a Time-of-Flight camera to off-the-shelf industrial robots. This way, the robot can detect obstacles up to a distance of five meters. Connecting Time-of-Flight cameras to robots increases the safety in human-robot collaboration by detecting obstacles before a collision. After looking at the state of the art, the authors elaborated the different requirements for such a system. The Time-of-Flight camera from Heptagon is able to work in a range of up to five meters and can connect to the control unit of the robot via a wireless connection.
In der Forschungsgruppe um Prof. Dr. Thomas Wendt werden Themen in unterschiedlichsten Bereichen von Automatisierungstechnik über funktionale Sicherheit bis hin zur 3D-gedruckten Elektronik / Sensorik behandelt. Insgesamt arbeiten vier Doktoranden und vier Mitarbeiter an der Weiterentwicklung der verschiedenen Technologien, die in diesem Artikel zusammengefasst dargestellt sind.
Schlussbericht IntelliKOMP
(2020)
Im Rahmen des Verbundprojektes IntelliKOMP sollten smarte Werkzeughalter und Spannfutter für Werkzeugmaschinen im Hinblick auf Industrie 4.0 entwickelt werden. Durch eine hochintegrierte Elektronik in den peripheren Maschinenkomponenten soll mittels Sensoren eine Datenerfassung, -verarbeitung und drahtlose -übertragung erfolgen. Durch diese Daten soll bspw. eine prädiktive Wartung ermöglicht werden.
Neuromorphic computing systems have demonstrated many advantages for popular classification problems with significantly less computational resources. We present in this paper the design, fabrication and training of a programmable neuromorphic circuit, which is based on printed electrolytegated field-effect transistor (EGFET). Based on printable neuron architecture involving several resistors and one transistor, the proposed circuit can realize multiply-add and activation functions. The functionality of the circuit, i.e. the weights of the neural network, can be set during a post-fabrication step in form of printing resistors to the crossbar. Besides the fabrication of a programmable neuron, we also provide a learning algorithm, tailored to the requirements of the technology and the proposed programmable neuron design, which is verified through simulations. The proposed neuromorphic circuit operates at 5V and occupies 385mm 2 of area.
Innovation ist die Triebfeder wirtschaftlicher Entwicklung. Niemand hat das so früh erkannt und so klar formuliert wie Joseph Schumpeter: „Der fundamentale Antrieb, der die kapitalistische Maschine in Bewegung setzt und hält, kommt von den neuen Konsumgütern, den neuen Produktions- oder Transportmethoden, den neuen Märkten, den neuen Formen der industriellen Organisation, welche die kapitalistische Unternehmung schafft.“
Um medizinische Behandlungsverfahren in der Praxis besser verstehen und anwenden zu können, gewinnt die Visualisierung der Prozesse an immer größerer Bedeutung. Durch Anwendung der Computer-Simulationssoftware CST können elektromagnetische und thermische Simulationen zur Analyse verschiedener Herzrhythmusstörungen durchgeführt werden. Eine weitere Form der Visualisierung erfolgt durch haptische, dreidimensionale Druckmodelle. Diese Modelle können mit einem generativen Herstellungsverfahren, wie z. B. einem 3D-Drucker, in kürzester Zeit hergestellt werden.
Wow, You Are Terrible at This!: An Intercultural Study on Virtual Agents Giving Mixed Feedback
(2020)
While the effects of virtual agents in terms of likeability, uncanniness, etc. are well explored, it is unclear how their appearance and the feedback they give affects people's reactions. Is critical feedback from an agent embodied as a mouse or a robot taken less serious than from a human agent? In an intercultural study with 120 participants from Germany and the US, participants had to find hidden objects in a game and received feedback on their performance by virtual agents with different appearances. As some levels were designed to be unsolvable, critical feedback was unavoidable. We hypothesized that feedback would be taken more serious, the more human the agent looked. Also, we expected the subjects from the US to react more sensitively to criticism. Surprisingly, our results showed that the agents' appearance did not significantly change the participants' perception. Also, while we found highly significant differences in inspirational and motivational effects as well as in perceived task load between the two cultures, the reactions to criticism were contrary to expectations based on established cultural models. This work improves our understanding on how affective virtual agents are to be designed, both with respect to culture and to dialogue strategies.
Morphological transition of a rod-shaped phase into a string of spherical particles is commonly observed in the microstructures of alloys during solidification (Ratke and Mueller, 2006). This transition phenomenon can be explained by the classic Plateau-Rayleigh theory which was derived for fluid jets based on the surface area minimization principle. The quintessential work of Plateau-Rayleigh considers tiny perturbations (amplitude much less than the radius) to the continuous phase and for large amplitude perturbations, the breakup condition for the rod-shaped phase is still a knotty issue. Here, we present a concise thermodynamic model based on the surface area minimization principle as well as a non-linear stability analysis to generalize Plateau-Rayleigh’s criterion for finite amplitude perturbations. Our results demonstrate a breakup transition from a continuous phase via dispersed particles towards a uniform-radius cylinder, which has not been found previously, but is observed in our phase-field simulations. This new observation is attributed to a geometric constraint, which was overlooked in former studies. We anticipate that our results can provide further insights on microstructures with spherical particles and cylinder-shaped phases.
Short-term load forecasting (STLF) has been playing a key role in the electricity sector for several decades, due to the need for aligning energy generation with the demand and the financial risk connected with forecasting errors. Following the top-down approach, forecasts are calculated for aggregated load profiles, meaning the sum of singular loads from consumers belonging to a balancing group. Due to the emerging flexible loads, there is an increasing relevance for STLF of individual factories. These load profiles are typically more stochastic compared to aggregated ones, which imposes new requirements to forecasting methods and tools with a bottom-up approach. The increasing digitalization in industry with enhanced data availability as well as smart metering are enablers for improved load forecasts. There is a need for STLF tools processing live data with a high temporal resolution in the minute range. Furthermore, behin-the-meter (BTM) data from various sources like submetering and production planning data should be integrated in the models. In this case, STLF is becoming a big data problem so that machine learning (ML) methods are required. The research project “GaIN” investigates the improvement of the STLF quality of an energy utility using BTM data and innovative ML models. This paper describes the project scope, proposes a detailed definition for a benchmark and evaluates the readiness of existing STLF methods to fulfil the described requirements as a reviewing paper.
The review highlights that recent STLF investigations focus on ML methods. Especially hybrid models gain more and more importance. ML can outperform classical methods in terms of automation degree and forecasting accuracy. Nevertheless, the potential for improving forecasting accuracy by the use of ML models depends on the underlying data and the types of input variables. The described methods in the analyzed publications only partially fulfil the tool requirements for STLF on company level. There is still a need to develop suitable ML methods to integrate the expanded data base in order to improve load forecasts on company level.
This paper explains the realization of a concept for research-oriented photonics education. Using the example of the integration of an actual PhD project, it is shown how students are familiarized with the topic of research and scientific work in the first semesters. Typical research activities are included as essential parts of the learning process. Research should be made visible and tangible for the students. The authors will present all aspects of the learning environment, their impressions and experiences with the implemented scenario, as well as first evaluation results of the students.
Amorphous In-Ga-Zn-O (IGZO) is a high-mobility semiconductor employed in modern thin-film transistors for displays and it is considered as a promising material for Schottky diode-based rectifiers. Properties of the electronic components based on IGZO strongly depend on the manufacturing parameters such as the oxygen partial pressure during IGZO sputtering and post-deposition thermal annealing. In this study, we investigate the combined effect of sputtering conditions of amorphous IGZO (In:Ga:Zn=1:1:1) and post-deposition thermal annealing on the properties of vertical thin-film Pt-IGZO-Cu Schottky diodes, and evaluated the applicability of the fabricated Schottky diodes for low-frequency half-wave rectifier circuits. The change of the oxygen content in the gas mixture from 1.64% to 6.25%, and post-deposition annealing is shown to increase the current rectification ratio from 10 5 to 10 7 at ±1 V, Schottky barrier height from 0.64 eV to 0.75 eV, and the ideality factor from 1.11 to 1.39. Half-wave rectifier circuits based on the fabricated Schottky diodes were simulated using parameters extracted from measured current-voltage and capacitance-voltage characteristics. The half-wave rectifier circuits were realized at 100 kHz and 300 kHz on as-fabricated Schottky diodes with active area of 200 μm × 200 μm, which is relevant for the near-field communication (125 kHz - 134 kHz), and provided the output voltage amplitude of 0.87 V for 2 V supply voltage. The simulation results matched with the measurement data, verifying the model accuracy for circuit level simulation.
Deafblindness, also known as dual sensory loss, is the combination of sight and hearing impairments of such extent that it becomes difficult for one sense to compensate for the other. Communication issues are a key concern for the Deafblind community. We present the design and technical implementation of the Tactile Board: a mobile Augmentative and Alternative Communication (AAC) device for individuals with deafblindness. The Tactile Board allows text and speech to be translated into vibrotactile signs that are displayed real-time to the user via a haptic wearable. Our aim is to facilitate communication for the deafblind community, creating opportunities for these individuals to initiate and engage in social interactions with other people without the direct need of an intervener.
Co-Designing Assistive Tools to Support Social Interactions by Individuals Living with Deafblindness
(2020)
Deafblindness is a dual sensory impairment that affects many aspects of life, including mobility, access to information, communication, and social interactions. Furthermore, individuals living with deafblindness are under a high risk of social isolation. Therefore, we identified opportunities for applying assistive tools to support social interactions through co-ideation activities with members of the deafblind community. This work presents our co-design approach, lessons learned and directions for designing meaningful assistive tools for dual sensory loss.
In the work at hand, we state that privacy and malleability of data are two aspects highly desired but not easy to associate. On the one hand, we are trying to shape data to make them usable and editable in an intelligible way, namely without losing their initial information. On the other hand, we are looking for effective privacy on data such that no external or non-authorized party could learn about their content. In such a way, we get overlapping requirements by pursuing different goals; it is trivial to be malleable without being secure, and vice versa. We propose four “real-world” use cases identified as scenarios where these two contradictory features are required and taking place in distinct environments. These considered backgrounds consist of firstly, cloud security auditing, then privacy of mobile network users and industry 4.0 and finally, privacy of COVID-19 tracing app users. After presenting useful background material, we propose to employ multiple approaches to design solutions to solve the use cases. We combine homomorphic encryption with searchable encryption and private information retrieval protocol to build an effective construction for the could auditing use case. As a second step, we develop an algorithm to generate the appropriate parameters to use the somewhat homomorphic encryption scheme by considering correctness, performance and security of the respective application. Finally, we propose an alternative use of Bloom filter data structure by adding an HMAC function to allow an outsourced third party to perform set relations in a private manner. By analyzing the overlapping bits occurring on Bloom filters while testing the inclusiveness or disjointness of the sets, we show how these functions maintain privacy and allow operations directly computed on the data structure. Then, we show how these constructions could be applied to the four selected use cases. Our obtained solutions have been implemented and we provide promising results that validate their efficiency and thus relevancy.
Silicon (Si) has turned out to be a promising active material for next‐generation lithium‐ion battery anodes. Nevertheless, the issues known from Si as electrode material (pulverization effects, volume change etc.) are impeding the development of Si anodes to reach market maturity. In this study, we are investigating a possible application of Si anodes in low‐power printed electronic applications. Tailored Si inks are produced and the impact of carbon coating on the printability and their electrochemical behavior as printed Si anodes is investigated. The printed Si anodes contain active material loadings that are practical for powering printed electronic devices, like electrolyte gated transistors, and are able to show high capacity retentions. A capacity of 1754 mAh/gSi is achieved for a printed Si anode after 100 cycles. Additionally, the direct applicability of the printed Si anodes is shown by successfully powering an ink‐jet printed transistor.
Fully Printed Inverters using Metal‐Oxide Semiconductor and Graphene Passives on Flexible Substrates
(2020)
Printed and flexible metal‐oxide transistor technology has recently demonstrated great promise due to its high performance and robust mechanical stability. Herein, fully printed inverter structures using electrolyte‐gated oxide transistors on a flexible polyimide (PI) substrate are discussed in detail. Conductive graphene ink is printed as the passive structures and interconnects. The additive printed transistors on PI substrates show an on/off ratio of 106 and show mobilities similar to the state‐of‐the‐art printed transistors on rigid substrates. Printed meander structures of graphene are used as pull‐up resistances in a transistor–resistor logic to create fully printed inverters. The printed and flexible inverters show a signal gain of 3.5 and a propagation delay of 30 ms. These printed inverters are able to withstand a tensile strain of 1.5% following more than 200 cycles of mechanical bending. The stability of the electrical direct current (DC) properties has been observed over a period of 5 weeks. These oxide transistor‐based fully printed inverters are relevant for digital printing methods which could be implemented into roll‐to‐roll processes.
Die industrielle Kommunikation war früher von relativ eingeschränkten, geschlossenen Feldbussystemen geprägt. Mit der zunehmenden Öffnung von Automatisierungsnetzen durch die horizontale und vertikale Integration in Produktionsanlagen entstehen gefährliche Angriffsflächen, die zum Diebstahl von Produktionsgeheimnissen, der Manipulation oder dem kompletten Lahmlegen der Produktionsprozesse führen können. Hieraus ergeben sich grundlegend neue Anforderung an die Datensicherheit, denen mit innovativen Lösungsansätzen begegnet werden muss.
Ziel des Forschungsvorhabens „SecureField“ war es, die Umsetzbarkeit und Anwendbarkeit des Ansatzes „(D)TLS-over-Anything“ zu untersuchen und nachzuweisen, sowie einen Werkzeugkasten zur Definition und Implementierung entsprechender Sicherheitslösungen vorzubereiten. Als langjährig etablierter Standard im IT-Umfeld stellte sich das (Datagram) Transport Layer Security ((D)TLS) Protokoll in Kombination mit einer industrie- bzw. automatisierungskompatiblen Public-Key-Infrastruktur (PKI) als äußerst vielversprechende Möglichkeit dar, Datensicherheit auch im OT-Umfeld zu erzielen. Hierbei sollten insbesondere KMU adressiert werden, für welche eigene Entwicklungsarbeiten in diesem Umfeld häufig zu aufwändig und technisch sowie wirtschaftlich zu riskant sind.
Mit „SecureField“ konnten Ergebnisse auf mehreren Ebenen erzielt werden. Zunächst konnte im Projektverlauf ein umfassendes und generisches Konzept zur Ende-zu-Ende-Absicherung von Kommunikationspfaden und -protokollen im industriellen Umfeld erarbeitet werden. Dieses Konzept besteht aus einem generischen Kommunikationsmodell sowie aus einem generischen Authentifikationsmodell.
With the increasing degree of interconnectivity in industrial factories, security becomes more and more the most important stepping-stone towards wide adoption of the Industrial Internet of Things (IIoT). This paper summarizes the most important aspects of one keynote of DESSERT2020 conference. It highlights the ongoing and open research activities on the different levels, from novel cryptographic algorithms over security protocol integration and testing to security architectures for the full lifetime of devices and systems. It includes an overview of the research activities at the authors' institute.
Das Monitoring von Industrieanlagen stellt in der Wirtschaft sicher, dass hoch-automatisierte Prozesse reibungslos ablaufen können. Meistens steht hier das Monitoring der Anlagen selbst im Mittelpunkt, die Kommunikationsleitungen für den Datenaustausch auf Ethernet-Basis (z.B. Profinet) sind gegenwärtig noch nicht Teil einer kontinuierlichen Überwachung. Zwar werden auch hier die physischen Verbindungen überprüft, jedoch geschieht häufig dies nur zum Zeitpunkt der Inbetriebnahme, wenn die Anlage noch nicht in das Gesamtsystem integriert ist oder während eines Wartungszyklus, wenn die Maschine für die Dauer der Wartung aus dem Betriebsablauf genommen wird. Dies führt dazu, dass insbesondere heute, wo vor allem Ethernet zunehmend als Basis für die industrielle Kommunikation herangezogen wird, Maschinenausfälle aufgrund fehlender Kabelüberwachung immer wahrscheinlicher werden. Um dem entgegenwirken zu können, wurde im Projekt Ko2SiBus ein neues Messverfahren konzipiert, implementiert und validiert, das kostengünstig in neue oder bestehende Systeme integriert werden kann. Um die Tauglichkeit zu zeigen, wurden die Projektergebnisse in Prototypen und Demonstratoren implementiert, die sowohl als Stand-Alone aber auch als Integrationslösungen dienen können.
The authentication method of electronic devices, based on individual forms of correlograms of their internal electric noises, is well-known. Specific physical differences in the components – for example, caused by variations in production quality – cause specific electrical signals, i.e. electric noise, in the electronic device. It is possible to obtain this information and to identify the specific differences of the individual devices using an embedded analog-to-digital converter (ADC). These investigations confirm the possibility to identify and authenticate electronic devices using bit templates, calculated from the sequence of values of the normalized autocorrelation function of noise. Experiments have been performed using personal computers. The probability of correct identification and authentication increases with increasing noise recording duration. As a result of these experiments, an accuracy of 98.1% was achieved for a 1 second-long registration of EM for a set of investigated computers.
Mass transfer phenomena in membrane fuel cells are complex and diversified because of the presence of complex transport pathways including porous media of very different pore sizes and possible formation of liquid water. Electrochemical impedance spectroscopy, although allowing valuable information on ohmic phenomena, charge transfer and mass transfer phenomena, may nevertheless appear insufficient below 1 Hz. Use of another variable, that is, back pressure, as an excitation variable for electrochemical pressure impedance spectroscopy is shown here a promising tool for investigations and diagnosis of fuel cells.
In this contribution, we propose an system setup for the detection andclassification of objects in autonomous driving applications. The recognition algo-rithm is based upon deep neural networks, operating in the 2D image domain. Theresults are combined with data of a stereo camera system to finally incorporatethe 3D object information into our mapping framework. The detection systemis locally running upon the onboard CPU of the vehicle. Several network archi-tectures are implemented and evaluated with respect to accuracy and run-timedemands for the given camera and hardware setup.
Die transösophageale Neurostimulation ist eine neue Therapieform und könnte unter anderem zur Schmerzlinderung während einer transösophagealen Linksherzstimulation angewendet werden. Sie ist in die Kategorie der Rückenmarksstimulation (SCS) einzuordnen, die die meist verwendete Technik der Neurostimulation ist. Die derzeit auf dem Markt vorhandenen Ösophaguskatheter werden bei einer elektrophysiologischen Untersuchung mit Ablation und transösophagealer Echokardiographie zur Temperaturüberwachung eingesetzt. Das Ziel dieser Arbeit war, das vorhandene Offenburger Herzrhythmusmodell, um die Wirbelsäule zu erweitern, einen neuen Ösophagus-Elektroden- Katheter für die transösophageale elektrische Stimulation des Rückenmarks zu modellieren und mittels 3D-Computer-Simulationen auf Ihre Wirksamkeit zu untersuchen.
Eine kontinuierliche Überwachung von Ethernet-Leitungne beugt Maschinenausfällen in der Industrie vor. Aktuell fehlen jedoch geiegnete Methoden, um diese Überwachung flächendeckend durchzuführen. Im Projekt Ko²SiBus wurde deshalb ein kostengünstiges Verfahren zur kontinuierlichen Überwachung von Ethernet-Leitungen entwickelt.
Threat Modelling is an accepted technique to identify general threats as early as possible in the software development lifecycle. Previous work of ours did present an open-source framework and web-based tool (OVVL) for automating threat analysis on software architectures using STRIDE. However, one open problem is that available threat catalogues are either too general or proprietary with respect to a certain domain (e.g. .Net). Another problem is that a threat analyst should not only be presented (repeatedly) with a list of all possible threats, but already with some automated support for prioritizing these. This paper presents an approach to dynamically generate individual threat catalogues on basis of the established CWE as well as related CVE databases. Roughly 60% of this threat catalogue generation can be done by identifying and matching certain key values. To map the remaining 40% of our data (~50.000 CVE entries) we train a text classification model by using the already mapped 60% of our dataset to perform a supervised machine-learning based text classification. The generated entire dataset allows us to identify possible threats for each individual architectural element and automatically provide an initial prioritization. Our dataset as well as a supporting Jupyter notebook are openly available.
OVVL (the Open Weakness and Vulnerability Modeller) is a tool and methodology to support threat modeling in the early stages of the secure software development lifecycle. We provide an overview of OVVL (https://ovvl.org), its data model and browser-based UI. We equally provide a discussion of initial experiments on how identified threats in the design phase can be aligned with later activities in the software lifecycle (issue management and security testing).
Cooling towers or recoolers are one of the major consumers of electricity in a HVAC plant. The implementation and analysis of advanced control methods in a practical application and its comparison with conventional controllers is necessary to establish a framework for their feasibility especially in the field of decentralised energy systems. A standard industrial controller, a PID and a model based controller were developed and tested in an experimental set-up using market-ready components. The characteristics of these controllers such as settling time, control difference, and frequency of control actions are compared based on the monitoring data. Modern controllers demonstrated clear advantages in terms of energy savings and higher accuracy and a model based controller was easier to set-up than a PID.
Optimisation based economic despatch of real-world complex energy systems demands reduced order and continuously differentiable component models that can represent their part-load behaviour and dynamic responses. A literature study of existing modelling methods and the necessary characteristics the models should meet for their successful application in model predictive control of a polygeneration system are presented. Deriving from that, a rational modelling procedure using engineering principles and assumptions to develop simplified component models is applied. The models are quantitatively and qualitatively evaluated against experimental data and their efficacy for application in a building automation and control architecture is established.
This paper presents a novel low-jitter interface between a low-cost integrated IEEE802.11 chip and a FPGA. It is designed to be part of system hardware for ultra-precise synchronization between wireless stations. On physical level, it uses Wi-Fi chip coexistence signal lines and UART frame encoding. On its basis, we propose an efficient communication protocol providing precise timestamping of incoming frames and internal diagnostic mechanisms for detecting communication faults. Meanwhile it is simple enough to be implemented both in low-cost FPGA and commodity IEEE802.11 chip firmware. The results of computer simulation shows that developed FPGA implementation of the proposed protocol can precisely timestamp incoming frames as well as detect most of communication errors even in conditions of high interference. The probability of undetected errors was investigated. The results of this analysis are significant for the development of novel wireless synchronization hardware.
Wireless synchronization of industrial controllers is a challenging task in environments where wired solutions are not practical. The best solutions proposed so far to solve this problem require pretty expensive and highly specialized FPGA-based devices. With this work we counter the trend by introducing a straightforward approach to synchronize a fairly cheap IEEE 802.11 integrated wireless chip (IWC) with external devices. More specifically we demonstrate how we can reprogram the software running in the 802.11 IWC of the Raspberry Pi 3B and transform the receiver input potential of the wireless transceiver into a triggering signal for an external inexpensive FPGA. Experimental results show a mean-square synchronization error of less than 496 ns, while the absolute synchronization error does not exceed 6 μs. The jitter of the output signal that we obtain after synchronizing the clock of the external device did not exceed 5.2 μs throughout the whole measurement campaign. Even though we do not score new records in term of accuracy, we do in terms of complexity, cost, and availability of the required components: all these factors make the proposed technique a very promising of the deployment of large-scale low-cost automation solutions.
Laser ultrasound was used to determine dispersion curves of surface acoustic waves on a Si (001) surface covered by AlScN films with a scandium content between 0 and 41%. By including off-symmetry directions for wavevectors, all five independent elastic constants of the film were extracted from the measurements. Results for their dependence on the Sc content are presented and compared to corresponding data in the literature, obtained by alternative experimental methods or by ab-initio calculations.
Dieses Buch verspricht unter dem Titel „… Wie Unternehmen den Wandel meistern“ Antworten zu geben, aber: Prognosen sind schwierig, vor allem, wenn sie die Zukunft betreffen. Dieses mal Winston Churchill, mal Kurt Tucholsky oder anderen zugeschriebene Zitat macht deutlich, dass jeder Unternehmer – Geschäftsführer, Vorstandsmitglied, Inhaber – die Notwendigkeit des Wandels für sich selbst erkennen und diesen zum richtigen Zeitpunkt in angemessenem Umfang einleiten muss. Dabei besteht die Gesamtheit aller betrieblichen Tätigkeiten zu einem ganz wesentlichen Teil aus Projekten und auch der (mehr oder weniger technologiegetriebene) Wandel des Unternehmens selbst wird ein Projekt sein.
„Nichts geschieht ohne Risiko, aber ohne Risiko geschieht auch nichts“, sagte der ehemalige Bundespräsident Walther Scheel. Der Ausspruch sensibilisiert dafür, dass in fast allen Themen und Prozessen Risiken stecken und die Akteure ein kalkulierbares Risiko eingehen sollten, um auch in komplexen Themen einen signifikanten Fortschritt zu erlangen. In unserem Fall sind die Akteure Projektleiter und Projektteammitglieder, die kaum eigene/persönliche Risiken eingehen, sondern Projektrisiken professionell managen müssen. Die Teammitglieder sind dabei von den Projekten selten persönlich bedroht, sondern das Projekt oder das Unternehmen und entsprechend sind die Risiken oft auch deutlich größer, als eine einzelne Person es sich vorstellen oder persönlich verantworten kann.
… nicht nur in der Energiewirtschaft, sondern auch im positiven und wahrsten Sinne des Wortes in der Fachgruppe PM Windenergie. In über 40 Jahren GPM wurde immer wieder deutlich, dass Projekte und Programme in Wirtschaft und Gesellschaft nicht nur begleitet, sondern auch aus der GPM heraus mitgestaltet werden. Die Entwicklung und die Ergebnisse der Fachgruppe Windenergie machen dies besonders deutlich.
Jedes Projektteam braucht engagierte Teammitglieder, der NQSZ 147-04 AA zum Projektmanagement auch
(2020)
Automotive service suppliers are keen to invent products that help to reduce particulate matter pollution substantial, but governance worldwide are not yet ready to introduce this retrofitting of helpful devices statutory. To develop a strategy how to introduce these devices to the market based on user needs is the objective of our research. The contribution of this paper is three-fold: we will provide an overview of the current options of particulate matter pollution solutions (I). This corpus is used to come to a more precise description of the specific needs and wishes of target groups (II). Finally, a representative empirical study via social media channels with German car owners will help to develop a strategy to introduce retrofit devices into the German market (III).
Die voranschreitende Digitalisierung ist ein Enabler für Business Analytics wodurch sich wiederum ein weiteres Innovationspotenzial durch dessen Nutzung in der datengetriebenen betrieblichen Entscheidungsunterstützung ergibt. Die Herausforderung besteht nun darin, bereits bei der Planung eines Digitalisierungsprojektes das Potenzial für weitergehende Business Analytics-Anwendungen zu erkennen, um dieses auszuschöpfen. Dabei spielen weniger die Methodenspezialisten, sondern eher die Entscheider in den Fachabteilungen die zentrale Rolle.
Printed Electronics technology is a key-enabler for smart sensors, soft robotics, and wearables. The inkjet printed electrolyte-gated field effect transistor (EGFET) technology is a promising candidate for such applications due to its low-power operation, high field-effect mobility, and on-demand fabrication. Unlike conventional silicon-based technologies, inkjet printed electronics technology is an additive manufacturing process where multiple layers are printed on top of each other to realize functional devices such as transistors and their interconnections. Due to the additive manufacturing process, the technology has limited routing layers. For routing of complex circuits, insulating crossovers are printed at the intersection of routing paths to isolate them. The crossover can alter the electrical properties of a circuit based on specific location on a routing path. In this work, we propose a crossover-aware placement and routing (COPnR) methodology for inkjet-printed circuits by integrating the crossover constraints in our design framework. Our proposed placement methodology is based on a state-of-the-art evolutionary algorithm while the routing optimization is done using a genetic algorithm. The proposed methodology is compared with the industrial standard placement and routing (PnR) tools. On average, the proposed methodology has 38% fewer crossovers and 94% fewer failing paths compared to the industrial PnR tools applied to printed circuit designs.
Konstrukteure im Maschinenbau stehen häufig vor der Problemstellung, hochfest vorgespannte Schraubenverbindungen und einen durchgehenden Korrosionsschutz zu vereinen. Die Normen und Richtlinien bieten hierzu Stand heute keine ausreichenden Antworten. Die Hochschule Offenburg befasst sich im Rahmen einer industriellen Gemeinschaftsforschung mit der Fragestellung, welchen Einfluss organische Beschichtungen auf die Vorspannkraft insbesondere bei erhöhten Umgebungstemperaturen haben. In dieser Arbeit werden die ersten Ergebnisse zum Einfluss der Einzelschichtstärke des Beschichtungssystems präsentiert.
A disturbed synchronization of the ventricular contraction can cause a highly developed systolic heart failure in affected patients with reduction of the left ventricular ejection fraction, which can often be explained by a diseased left bundle branch block (LBBB). If medication remains unresponsive, the concerned patients will be treated with a cardiac resynchronization therapy (CRT) system. The aim of this study was to integrate His-bundle pacing into the Offenburg heart rhythm model in order to visualize the electrical pacing field generated by His-Bundle-Pacing. Modelling and electrical field simulation activities were performed with the software CST (Computer Simulation Technology) from Dessault Systèms. CRT with biventricular pacing is to be achieved by an apical right ventricular electrode and an additional left ventricular electrode, which is floated into the coronary vein sinus. The non-responder rate of the CRT therapy is about one third of the CRT patients. His- Bundle-Pacing represents a physiological alternative to conventional cardiac pacing and cardiac resynchronization. An electrode implanted in the His-bundle emits a stronger electrical pacing field than the electrical pacing field of conventional cardiac pacemakers. The pacing of the Hisbundle was performed by the Medtronic Select Secure 3830 electrode with pacing voltage amplitudes of 3 V, 2 V and 1,5 V in combination with a pacing pulse duration of 1 ms. Compared to conventional pacemaker pacing, His-bundle pacing is capable of bridging LBBB conduction disorders in the left ventricle. The His-bundle pacing electrical field is able to spread via the physiological pathway in the right and left ventricles for CRT with a narrow QRS-complex in the surface ECG.
Background: A disturbed synchronization of the ventricular contraction can cause a highly developed systolic heart failure in affected patients, which can often be explained by a diseased left bundle branch block (LBBB). If medication remains unresponsive, the concerned patients will be treated with a cardiac resynchronization therapy (CRT) system. The aim of this study was to integrate His bundle pacing into the Offenburg heart rhythm model in order to visualize the electrical pacing field generated by His bundle pacing.
Methods: Modelling and electrical field simulation activities were performed with the software CST (Computer Simulation Technology) from Dessault Systèms. CRT with biventricular pacing is to be achieved by an apical right ventricular electrode and an additional left ventricular electrode, which is floated into the coronary vein sinus. This conventional type of biventricular pacing leads to a reduction of the left ventricular ejection fraction. Furthermore, the non-responder rate of the CRT therapy is about one third of the CRT patients.
Results: His bundle pacing represents a physiological alternative to conventional cardiac pacing and cardiac resynchronization. An electrode implanted in the His bundle emits a stronger electrical pacing field than the electrical pacing field of conventional cardiac pacemakers. The pacing of the His bundle was performed by the Medtronic Select Secure 3830 electrode with pacing voltage amplitudes of 3 V, 2 V and 1.5 V in combination with a pacing pulse duration of 1 ms.
Conclusions: Compared to conventional cardiac pacemaker pacing, His bundle pacing is capable of bridging LBBB conduction disorders in the left ventricle. The His bundle pacing electrical field is able to spread via the physiological pathway in the right and left ventricles for CRT with a narrow QRS-complex in the surface ECG.
Im Archiv für Kriminologie wurden bislang drei Arbeiten zur 3-D-CAD-Rekonstruktion der ersten "Eisernen Hand" des berühmten Reichsritters Gottfried ("Götz") von Berlichingen (1480-1562) vorgestellt. Mittlerweile sind einige neue Gesichtspunkte herausgearbeitet worden, die hier kurz als Ergänzung mitgeteilt werden sollen.
In der vorliegenden Arbeit werden fotografische Aufnahmen zweier verschiedener Abgüsse von Paganinis rechter Hand vorgestellt und näher beschrieben. Es handelt sich um einen mutmaßlich originalen Bronzeabguss, der vermutlich kurz nach Paganinis Tod auf dessen Totenbett abgenommen wurde, und eine in heutiger Zeit angefertigte Kopie aus Fiberplastik mit goldfarbenem Anstrich. Die Hand ist im proximalen Handgelenk stark abgewinkelt, was dafür spricht, dass die Hand des Toten auf einem Kissen gelegen haben könnte, um den Abguss vorzunehmen. Überdies zeigt sich eine verkrampfte Stellung der Finger und Hand, am ehesten infolge Totenstarre. Man findet zudem arthrotische Veränderungen sowie hervortretende Sehnen und atrophierte Muskulatur. Beim Bronzeabguss sind die beschriebenen Auffälligkeiten deutlicher zu erkennen. Ein 3D-Scan des Bronzeabgusses der rechten Hand Paganinis mit einem Strukturlichtscanner würde die Möglichkeit eröffnen, Messdaten der Hand zu erhalten.
(1) Background: Little is known about the baroque composer Domenico Scarlatti (1685-1757), whose life was centred behind closed doors at the royal court in Spain. There are no reports about his illnesses. From his compositions, mainly for harpsichord, an outstanding virtuosity can be read. (2) Case Presentation: In this case report, the only known oil painting of Domenico Scarlatti is presented, on which he is about 50 years old. In it one recognizes conspicuous hands with hints of watch glass nails and drumstick fingers. (3) Discussion: Whether Scarlatti had chronic hypoxia of peripheral body regions as a sign of, e.g., bronchial cancer or a severe heart disease, is not known. (4) Conclusions: The above-mentioned signs recorded in the oil painting, even if they were not interpretable at that time, are clearly represented and recorded for us and are open to diagnostic discussion from today's point of view.
In this entry, the 3D CAD reconstructions and 3D multi-material polymer replica printings of knight Götz von Berlichingen´s first „Iron Hand,“ which were developed in the last few years at Offenburg University, are presented. Even by today's standards, the first “Iron Hand”–as could be shown in the replicas–demonstrates sophisticated mechanics and well thought-out functionality and still offers inspiration and food for discussion when it comes to the question of an artificial prosthetic replacement for a hand.
In der vorliegenden Arbeit wurde die von Wilhelm His Sr. angefertigte und im Jahr 1895 publizierte Fotografie des mutmaßlichen Skeletts von Johann Sebastian Bach auf ihre Abbildungsqualität untersucht. Dies erfolgte durch direkte Messungen an einem digitalen Scan der Fotografie. Dabei wurde der von His der Fotografie beigelegte Lineal-Maßstab in mehrere 10-cm-Stücke unterteilt und die Länge dieser Abschnitte im Digitalisat mit dem Messinstrument von Adobe Acrobat ausgemessen. Darüber hinaus wurden die Längen der Femora ermittelt und mit den Maßen verglichen, die 1895 an den tatsächlichen (realen) Knochen ermittelt wurden. In dem Digitalisat entsprachen 190 cm im Lineal 244,48 mm. Der Mittelwert der 19 bestimmten 10-cm-Abschnitte betrug 100,49 mm (Median 100,49 mm, Standardabweichung 0,49 mm). Die historische Femurlänge links betrug 443,5 mm, rechts 451,0 mm. Die im Digitalisat ermittelte Femurlänge betrug links 443,8 mm, rechts 451,1 mm. Zusätzlich wurden die projizierten Centrum-Collum-Diaphysen-Winkel bestimmt. Die Daten lassen den Schluss zu, dass die Oben/unten-Verzerrung sowie die Rechts/links-Verzerrung nicht nennenswert sind und das von His angefertigte Foto mit einer hohen Genauigkeit der Abbildungsqualität und des Linsenapparats der Kamera angefertigt wurde, die es ermöglicht, bestimmte Skelettanteile aussagekräftig zu beurteilen und auszumessen.
Im Beitrag wird gezeigt, wie sich die Ackermann’sche Formel zur Polvorgabe bei zeitkontinuierlichen
Ein- und Mehrgrößenzustandsregelungen in einfacher
Weise auf nicht vollständig steuerbare Regelstrecken
erweitern lässt. Das vorgestellte Verfahren basiert
auf einer teilsystemorientierten Zustandstransformation
in Verbindung mit der Einführung zusätzlicher fiktiver Stellgrößen, über die nichtsteuerbare Streckeneigenwerte
formal beeinflusst werden könnten, aber durch Nullsetzen
dieser Stellgrößen nicht beeinflusst werden. Dem
Reglerentwurf vorausgehende Maßnahmen zur Elimination
von nicht steuerbaren Anteilen aus dem Streckenmodell
sind daher nicht erforderlich. Im Vergleich zum Fall
einer vollständig steuerbaren Regelstrecke erfordert die
Anwendung des vorgestellten Verfahrens kaum Mehraufwand,
was am Beispiel eines Eingrößen- und eines Mehrgrößensystems
illustriert wird.
Das vorliegende Buch behandelt lineare zeitdiskrete Regelverfahren und gliedert sich in zwei Teile mit ganz unterschiedlichen thematischen Schwerpunkten. In den ersten sechs Kapiteln steht die Analyse und Synthese von zeitdiskreten Regelungen im Bildbereich im Vordergrund. Im zweiten Teil des Buchs werden im Zeitbereich angesiedelte zeitdiskrete Reglerentwurfsverfahren behandelt. Dort dominieren Zustandsraumverfahren die Erläuterungen.
The interaction between agents in multiagent-based control systems requires peer to peer communication between agents avoiding central control. The sensor nodes represent agents and produce measurement data every time step. The nodes exchange time series data by using the peer to peer network in order to calculate an aggregation function for solving a problem cooperatively. We investigate the aggregation process of averaging data for time series data of nodes in a peer to peer network by using the grouping algorithm of Cichon et al. 2018. Nodes communicate whether data is new and map data values according to their sizes into a histogram. This map message consists of the subintervals and vectors for estimating the node joining and leaving the subinterval. At each time step, the nodes communicate with each other in synchronous rounds to exchange map messages until the network converges to a common map message. The node calculates the average value of time series data produced by all nodes in the network by using the histogram algorithm. The relative error for comparing the output of averaging time series data, and the ground truth of the average value in the network will decrease as the size of the network increases. We perform simulations which show that the approximate histograms method provides a reasonable approximation of time series data.
Time Sensitive Networking (TSN) provides mechanisms to enable deterministic and real-time networking in industrial networks. Configuration of these mechanisms is key to fully deploy and integrate TSN in the networks. The IEEE 802.1 Qcc standard has proposed different configuration models to implement a TSN configuration. Up until now, TSN and its configuration have been explored mostly for Ethernet-based industrial networks. However, they are still considered “work-in-progress” for wireless networks. This work focuses on the fully centralized model and describes a generic concept to enable the configuration of TSN mechanisms in wireless industrial networks. To this end, a configuration entity is implemented to conFigure the wireless end stations to satisfy their requirements. The proposed solution is then validated with the Digital Enhanced Cordless Telecommunication ultra-low energy (DECT ULE) wireless communication protocol.
In this report, we have studied field-effect transistors (FETs) using low-density alumina for electrolytic gating. Device layers have been prepared starting from the structured ITO glasses by printing the In 2 O 3 channels, low-temperature atomic layer deposition (ALD) of alumina (Al 2 O 3 ), and printing graphene top gates. The transistor performance could be deliberately changed by alternating the ambient humidity; furthermore, ID,ON/ID,OFF-ratios of up to seven orders of magnitude and threshold voltages between 0.66 and 0.43 V, decreasing with an increasing relative humidity between 40% and 90%, could be achieved. In contrast to the common usage of Al 2 O 3 as the dielectric in the FETs, our devices show electrolyte-typegating behavior. This is a result from the formation of protons on the Al 2 O 3 surfaces at higher humidities. Due to the very high local capacitances of the Helmholtz double layers at the channel surfaces, the operation voltage can be as low as 1 V. At low humidities (≤30%), the solid electrolyte dries out and the performance breaks down; however, it can fully reversibly be regained upon a humidity increase. Using ALD-derived alumina as solid electrolyte gating material, thus, allows low-voltage operation and provides a chemically stable gating material while maintaining low process temperatures. However, it has proven to be highly humidity-dependent in its performance.
Mathematik 1 Beweisaufgaben
(2020)
Die Beweisaufgabensammlung richtet sich an angehende Ingenieure, die die im Rahmen einer Mathematik 1-Vorlesung eingeführten Formeln nicht nur anwenden, sondern selbst herleiten wollen. Zur Unterstützung dienen neben ausführlichen Lösungen die in einem Extrakapitel angegebenen Lösungshinweise: halbfertige Skizzen, Teilergebnisse, Nennung der Beweismethode oder eine Auflistung der relevanten Gleichungen. Bei umfangreicheren Herleitungen ist eine Aufteilung in mehrere Aufgaben vorgenommen worden. Für die 2. Auflage wurden 45 weitere Beweisaufgaben aufgenommen, viele aus dem Bereich der Geometrie, z.B. der Höhensatz des Euklid, Abstandsformeln oder ein Vergleich der verschiedenen Darstellungsarten einer Ebene. Neben der pq-Formel wird nun auch die abc-Formel hergeleitet, die Potenzgesetze werden durch Wurzelgesetze komplettiert, und es wird bewiesen, dass die Kubikwurzel sogar im Sattelpunkt streng monoton steigt. Es wird diskutiert, warum man 0 hoch 0 zu eins definieren sollte, die verschiedenen Darstellungsformen einer Parabel ineinander überführt und gezeigt, woher das Newton-Verfahren kommt.
Die Beweise werden ergänzt durch zwei Formelsammlungen, mit denen sich eine typische Mathematik 1-Klausur lösen lässt. Die Gleichungen und Regeln der Lern-Formelsammlung sind von so elementarer Bedeutung, dass sie jeder Ingenieurstudent auswendig können sollte. Formeln und Lösungsstrategien, die aufgrund ihres etwas anspruchsvolleren Inhalts nicht jeder im Kopf haben muss, finden sich in der Klausur-Formelsammlung.
This paper describes a comparative study of two tactile systems supporting navigation for persons with little or no visual and auditory perception. The efficacy of a tactile head-mounted device (HMD) was compared to that of a wearable device, a tactile belt. A study with twenty participants showed that the participants took significantly less time to complete a course when navigating with the HMD, as compared to the belt.
Die Literatur hat in den letzten Jahren einen breiten Diskurs zur Digitalisierung im Rechnungswesen eröffnet. Während die erste Digitalisierungswelle noch grundlegende Digitalisierungsprozesse umfasste, betrifft die zweite Digitalisierungswelle das Unternehmen in seiner Gesamtheit und geht weit über eine digitale Datenverarbeitung hinaus. Digitalisierung reicht daher von der Anwendung grundlegender digitaler Technologien zur Unterstützung von Geschäftsprozessen über Automatisierung betrieblicher Prozesse bis hin zu einer umfassenden digitalen Transformation des gesamten Unternehmens.
Emotionen sind Teil jedes menschlichen Wesens: Sie begleiten Konsumenten und Konsumentinnen durch alle Alltagssituationen – auch und insbesondere bei Kaufentscheidungen. Jedoch war es bisher nur bedingt möglich, diese Emotionen im Dialogmarketing genau zu erfassen und zu interpretieren. Die innovative Customer Experience Tracking Methode der Hochschule Offenburg ermöglicht eine verzerrungsreduzierte Messung und Auswertung von Kundenemotionen, die vor, während und nach der Benutzerinteraktion mit Dialogmarketingaktivitäten auftreten. Aus den im Labor oder im Feld gewonnenen Untersuchungsergebnissen lassen sich konkrete Handlungsempfehlungen ableiten, um Dialogmarketingangebote im Offline-, Online- oder crossmedialen Bereich optimal auf die Bedürfnisse und Erwartungen der Kunden und Kundinnen auszurichten.
Unternehmen im B2B und B2C stehen zunehmend vor der Herausforderung etablierte Geschäftsmodelle zu überdenken und die Integration neuer Kommunikations- und Vertriebskonzepte in Erwägung zu ziehen. Doch fehlt es zumeist an „digitalen Kompetenzen“, welche in Form neuer Mitarbeiter und Mitarbeiterinnen eingestellt bzw. durch die Hinzuziehung von Dienstleistern eingekauft werden müssen. Diese benötigen aber zunächst Zeit das Selbstverständnis, die Kultur und Vision des betreffenden Unternehmens zu erfassen.
To reach customers by dialog marketing campaigns is more and more difficult. This is a common problem of companies and marketing agencies worldwide: information overload, multi-channel-communication and a confusing variety of offers make it hard to gain the attention of the target group. The contribution of this paper is four-fold: we provide an overview of the current state of print dialog marketing activities and trends (I). Based on this corpus we identify the main key performance indicators of dialog marketing customer interaction (II). A qualitative user experience study identifies the customer wishes and needs, focusing on lottery offers for senior citizens (III). Finally, we evaluate the success of two different dialog marketing campaigns with 20,000 clients and compare the key performance indicators of the original hands-on experience-based print mailings with user experience tested and optimized mailings (IV).
Im Rahmen des Forschungsprojekts Professional UX entwickelt die Hochschule Offenburg gemeinsam mit dem Softwarehaus Dr. Hornecker in Freiburg eine innovative Systemlösung, die es ermöglicht, anhand von Mimik, Stimme und Blickverlauf beim Nutzer entstehende Emotionen bei der Nutzung interaktiver Anwendungen zu erfassen und zu interpretieren. Ziel der Untersuchung ist es, Indikatoren zu identifizieren, die eine exakte Zuordnung von wahrgenommenen Reizen zu den jeweils ausgelösten Emotionen erlauben. Sobald negative Emotionen wie Ärger oder Unsicherheit auftreten, kann dieser erfasst und im Nachgang der jeweils irritierende Reiz eliminiert werden. Das Projektteam hat einen ersten Prototyp für die Professional UX Systemlösung in Form von Hard- und Software entwickelt, mit dem es möglich ist, UX-Messungen während der User Interaktion durchzuführen und automatisiert mithilfe von KI auswerten zu lassen.
In this paper, we describe the PALM model system 6.0. PALM (formerly an abbreviation for Parallelized Large-eddy Simulation Model and now an independent name) is a Fortran-based code and has been applied for studying a variety of atmospheric and oceanic boundary layers for about 20 years. The model is optimized for use on massively parallel computer architectures. This is a follow-up paper to the PALM 4.0 model description in Maronga et al. (2015). During the last years, PALM has been significantly improved and now offers a variety of new components. In particular, much effort was made to enhance the model with components needed for applications in urban environments, like fully interactive land surface and radiation schemes, chemistry, and an indoor model. This paper serves as an overview paper of the PALM 6.0 model system and we describe its current model core. The individual components for urban applications, case studies, validation runs, and issues with suitable input data are presented and discussed in a series of companion papers in this special issue.
High-performance Ag–Se-based n-type printed thermoelectric (TE) materials suitable for room-temperature applications have been developed through a new and facile synthesis approach. A high magnitude of the Seebeck coefficient up to 220 μV K–1 and a TE power factor larger than 500 μW m–1 K–2 for an n-type printed film are achieved. A high figure-of-merit ZT ∼0.6 for a printed material has been found in the film with a low in-plane thermal conductivity κF of ∼0.30 W m–1 K–1. Using this material for n-type legs, a flexible folded TE generator (flexTEG) of 13 thermocouples has been fabricated. The open-circuit voltage of the flexTEG for temperature differences of ΔT = 30 and 110 K is found to be 71.1 and 181.4 mV, respectively. Consequently, very high maximum output power densities pmax of 6.6 and 321 μW cm–2 are estimated for the temperature difference of ΔT = 30 K and ΔT = 110 K, respectively. The flexTEG has been demonstrated by wearing it on the lower wrist, which resulted in an output voltage of ∼72.2 mV for ΔT ≈ 30 K. Our results pave the way for widespread use in wearable devices.
Environmentally-friendly implementation of new technologies and eco-innovative solutions often faces additional secondary ecological problems. On the other hand, existing biological systems show a lesser environmental impact as compared to the human-made products or technologies. The paper defines a research agenda for identification of underlying eco-inventive principles used in the natural systems created through evolution. Finally, the paper proposes a comprehensive method for capturing eco-innovation principles in biological systems in addition and complementary to the existing biomimetic methods and TRIZ methodology and illustrates it with an example.
Sustainable design of equipment for process intensification requires a comprehensive and correct identification of relevant stakeholder requirements, design problems and tasks crucial for innovation success. Combining the principles of the Quality Function Deployment with the Importance-Satisfaction Analysis and Contradiction Analysis of requirements gives an opportunity to define a proper process innovation strategy more reliably and to develop an optimal process intensification technology with less secondary engineering and ecological problems.
In the modern knowledge-based and digital economy, the value of knowledge is growing relative to other assets and new intellectual property is being created at an ever-increasing rate. Therefore, the ability to find non-trivial solutions, systematically generate new concepts, and create intellectual property rapidly become crucial to achieving competitive advantage and leveraging the intellectual potential of organizations.
Cross-industry innovation is commonly understood as identification of analogies and interdisciplinary transfer or copying of technologies, processes, technical solutions, working principles or models between industrial sectors. In general, creative thinking in analogies belongs to the efficient ideation techniques. However, engineering graduates and specialists frequently lack the skills to think across the industry boundaries systematically. To overcome this drawback an easy-to-use method based on five analogies has been evaluated through its applications by students and engineers in numerous experiments and industrial case studies. The proposed analogies help to identify and resolve engineering contradictions and apply approaches of the Theory of Inventive Problem Solving TRIZ and biomimetics. The paper analyses the outcomes of the systematized analogies-based ideation and outlines that its performance continuously grows with the engineering experience. It defines metrics for ideation efficiency and ideation performance function.
Interaction and capturing information from the surrounding is dominated by vision and hearing. Haptics on the other side, widens the bandwidth and could also replace senses (sense switching) for impaired. Haptic technologies are often limited to point-wise actuation. Here, we show that actuation in two-dimensional matrices instead creates a richer input. We describe the construction of a full-body garment for haptic communication with a distributed actuating network. The garment is divided into attachable-detachable panels or add-ons that each can carry a two dimensional matrix of actuating haptic elements. Each panel adds to an enhanced sensoric capability of the human- garment system so that together a 720° system is formed. The spatial separation of the panels on different body locations supports semantic and theme-wise separation of conversations conveyed by haptics. It also achieves directional faithfulness, which is maintaining any directional information about a distal stimulus in the haptic input.
Analysis of Miniaturized Printed Flexible RFID/NFC Antennas Using Different Carrier Substrates
(2020)
Antennas for Radio Frequency Identification (RFID) provide benefits for high frequencies (HF) and wireless data transmission via Near Field Communication (NFC) and many other applications. In this case, various requirements for the design of the reader and transmitter antennas must be met in order to achieve a suitable transmission quality. In this work, a miniaturized cost-effective RFID/NFC antenna for a microelectronic measurement system is designed and printed on different flexible carrier substrates using a new and low-cost Direct Ink Writing (DIW) technology. Various practical aspects such as reflection and impedance magnitude as well as the behavior of the printed RFID/NFC antennas are analyzed and compared to an identical copper-based antenna of the same size. The results are presented in this paper. Furthermore, the problems during the printing process itself on the different substrates are evaluated. The effects of the characteristics on the antenna under kink-free bending tests are examined and subsequently long-term measurements are carried out.
During the day-to-day exploitation of localization systems in mines, the technical staff tends to incorrectly rearrange radio equipment: positions of devices may not be accurately marked on a map or their positions may not correspond to the truth. This situation may lead to positioning inaccuracies and errors in the operation of the localization system.This paper presents two Bayesian algorithms for the automatic corrections of positions of the equipment on the map using trajectories restored by the inertial measurement units mounted to mobile objects, like pedestrians and vehicles. As a basis, a predefined map of the mine represented as undirected weighted graph was used as input. The algorithms were implemented using the Simultaneous Localization and Mapping (SLAM) approach.The results prove that both methods are capable to detect misplacement of access points and to provide corresponding corrections. The discrete Bayesian filter outperforms the unscented Kalman filter, which, however, requires more computational power.
Wer sich als Pädagoge und Wissenschaftler mit dem Thema Digitalisierung im Kontext von Unterricht, Lehre und Bildungsprozessen befasst, stellt schnell fest: Kaum jemand realisiert die Tragweite der durch Digitaltechnik und Netzwerke möglichen und von IT-Konzernen forcierten Transformation von Bildungseinrichtungen zu immer stärker automatisierten, kybernetisch gesteuerten Beschulungs- und Prüfanstalten. „It’s the economy, stupid“ wird zum Mantra auch der Bildung. Der Begriff Learning Analytics als Teilaspekt von Big Data Analytics weist ebenso auf Automatisierungstechnik für Lernprozesse wie der Begriff der datengestützten Schulentwicklung (Hartong, Learning Analytics und Big data in der Bildung, 2019). Mit Summit Learning (Facebook), Google Classroom oder Apple Education sind vollautomatisierte Systeme in den USA bereits im Einsatz. Der DigitalPakt Schule schafft die technischen Voraussetzungen für die Beschulung per Netz und Cloud in Deutschland (Lankau, Bildungsmarkt Schule. Tatsächliche Kosten des Digitalpakt Schule und verdeckte Interessen, 2019a).
Die Diskussionen über die Bedeutung und Folgen der Digitalisierung sind kaum noch überschaubar. Einig sind sich die meisten, dass Digitalisierung und die sogenannte „Künstliche Intelligenz“ (sKI) sowohl „alternativlos“ wie entscheidend für die Zukunft seien. Wer bei diesen Techniken nicht an der Spitze stünde, würde wirtschaftlich abgehängt und letztlich zum Verlierer. Die erste Frage ist aber: Wer steht denn an der Spitze und ist es erstrebenswert, sich dazu zu gesellen? Die zweite Frage ist, was sich konkret an technischen Systemen hinter Schlagworten wie Big Data, Künstlicher Intelligenz und autonomen Systemen verbirgt. Nicht zuletzt steht in Frage, welche Konsequenzen diese Systeme für den Einzelnen haben (können und/oder werden).