Refine
Year of publication
Document Type
- Conference Proceeding (455)
- Article (reviewed) (242)
- Part of a Book (200)
- Article (unreviewed) (156)
- Other (75)
- Book (60)
- Contribution to a Periodical (34)
- Report (8)
- Letter to Editor (4)
- Doctoral Thesis (3)
- Patent (3)
- Working Paper (1)
Conference Type
- Konferenzartikel (397)
- Konferenz-Abstract (38)
- Sonstiges (9)
- Konferenz-Poster (8)
- Konferenzband (3)
Language
- English (622)
- German (615)
- Other language (2)
- Russian (2)
Has Fulltext
- no (1241) (remove)
Is part of the Bibliography
- yes (1241) (remove)
Keywords
- Dünnschichtchromatographie (19)
- Digitalisierung (12)
- Gamification (10)
- Adsorption (9)
- Assistive Technology (9)
- Industrie 4.0 (9)
- Haustechnik (8)
- Data Analytics (7)
- Human Computer Interaction (7)
- Kommunikation (7)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (363)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (268)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (244)
- Fakultät Wirtschaft (W) (182)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (136)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (78)
- INES - Institut für nachhaltige Energiesysteme (63)
- Fakultät Medien (M) (ab 22.04.2021) (50)
- ACI - Affective and Cognitive Institute (39)
- WLRI - Work-Life Robotics Institute (20)
Open Access
- Closed Access (1241) (remove)
RETIS – Real-Time Sensitive Wireless Communication Solution for Industrial Control Applications
(2020)
Ultra-Reliable Low Latency Communications (URLLC) has been always a vital component of many industrial applications. The paper proposes a new wireless URLLC solution called RETIS, which is suitable for factory automation and fast process control applications, where low latency, low jitter, and high data exchange rates are mandatory. In the paper, we describe the communication protocol as well as the hardware structure of the network nodes for implementing the required functionality. Many techniques enabling fast, reliable wireless transmissions are used – short Transmission Time Interval (TTI), Time-Division Multiple Access (TDMA), MIMO, optional duplicated data transfer, Forward Error Correction (FEC), ACK mechanism. Preliminary tests show that reliable end-to-end latency down to 350 μs and packet exchange rate up to 4 kHz can be reached (using quadruple MIMO and standard IEEE 802.15.4 PHY at 250 kbit/s).
Industrie 4.0 bedeutet nicht nur einen Wandel der technischen Möglichkeiten und Arbeitsbedingungen, sondern auch einen Bedarf an neuen, sich kontinuierlich weiterentwickelnden Kompetenzen und die Bereitschaft der Beschäftigten, Veränderungen mitzugestalten. Spielerische Ansätze der Kompetenzentwicklung können v.a. bei weiterbildungsfernen Mitarbeitern hilfreich sein, um das komplexe Thema verständlich zu vermitteln. Der Beitrag beschreibt ein Seminarkonzept mit integriertem Brettspiel, mit dem Teilnehmer anhand eines fiktiven Unternehmens (Müller GmbH) die Transformation eines Unternehmens in die Industrie 4.0 spielerisch nachvollziehen. Dieses Konzept erweist sich in einer ersten Evaluation als durchaus vielversprechend.
In this paper, we propose a new streaming media service development environment comprising of a streaming media service model, a XML based service specification language and several implementation and configuration management tools. Our approach is based on a high level streaming service specification language, which allows specifying a service in terms of media objects, QoS, and distribution policies. Driven by such a streaming service specification and a streaming component library implemented with Java Media Framework, the required distributed application infrastructure is generated automatically by a service manager. To support flexible instantiation and termination of services as well as change management during runtime, e.g. migration or substitution of streaming components, we introduce instantiation and termination rules, and reconfiguration rules.
Novel manufacturing technologies, such as printed electronics, may enable future applications for the Internet of Everything like large-area sensor devices, disposable security, and identification tags. Printed physically unclonable functions (PUFs) are promising candidates to be embedded as hardware security keys into lightweight identification devices. We investigate hybrid PUFs based on a printed PUF core. The statistics on the intra- and inter-hamming distance distributions indicate a performance suitable for identification purposes. Our evaluations are based on statistical simulations of the PUF core circuit and the thereof generated challenge-response pairs. The analysis shows that hardware-intrinsic security features can be realized with printed lightweight devices.
Uncontrollable manufacturing variations in electrical hardware circuits can be exploited as Physical Unclonable Functions (PUFs). Herein, we present a Printed Electronics (PE)-based PUF system architecture. Our proposed Differential Circuit PUF (DiffC-PUF) is a hybrid system, combining silicon-based and PE-based electronic circuits. The novel approach of the DiffC-PUF architecture is to provide a specially designed real hardware system architecture, that enables the automatic readout of interchangeable printed DiffC-PUF core circuits. The silicon-based addressing and evaluation circuit supplies and controls the printed PUF core and ensures seamless integration into silicon-based smart systems. Major objectives of our work are interconnected applications for the Internet of Things (IoT).
Ausgehend von eindimensionalen reibungsfreien Strömungen wird die Bernoulli-Gleichung und die Energiebilanz hergeleitet. Mit der Eulerschen Betrachtungsweise wird der Unterschied zwischen stationären und zeitabhängigen Strömungen verdeutlicht und an zahlreichen Beispielen angewandt. Die zweidimensionalen reibungsfreien und inkompressiblen Strömungen werden mit der Potenzialtheorie behandelt. Die Lösungseigenschaften werden am Beispiel der Zylinderumströmung ohne und mit Zirkulation aufgezeigt.
Gasdynamik
(2004)
Gasdynamik
(2020)
Für kompressible Strömungen werden die Erhaltungssätze für Masse, Impuls und Energie hergeleitet. Die Eigenschaften der Stoßgleichungen wie Rankine-Hugoniot-Relation und Rayleigh-Gerade werden betrachtet. Zur Berechnung der Kräfte auf umströmte Körper werden die Auftriebs- und Widerstandsbeiwerte ermittelt. Auf der Basis der Stromfadentheorie wird die Auslegung von Lavaldüsen behandelt. Das physikalische Verhalten linearer Unter- und Überschallströmungen und transsonischer Profilumströmungen wird analysiert.
Die Navier-Stokes Gleichungen bilden mit der Energiegleichung die Basis zur Beschreibung reibungsbehafteter Strömungen. Kennzahlen bilden die Grundlage der Ähnlichkeitsbetrachtungen und Modellgesetze. Lösungen werden für laminare und turbulente Strömungen ermittelt. Der Impulssatz dient zur Berechnung von Kraftwirkungen. Druckverluste bei Durchströmungen und Strömungswiderstände bei Umströmungen werden an Beispielen ermittelt. Die Grenzschichttheorie findet bei hohen Reynoldszahlen Anwendung.
Die Eigenschaften von Fluiden sind zur Beschreibung von Strömungsvorgängen mit den Erhaltungssätzen für Masse, Impuls und Energie notwendig. Für inkompressible Fluide wird die Grenze der Dichteänderung in Abhängigkeit der Machzahl angegeben. Die Rheologie behandelt die Fließeigenschaften der Fluide bei Deformationen in Strömungen. Die Viskosität tritt beim newtonschen Schubspannungsansatz auf. Das Verhalten von Druck und Dichte in der Hydro- und Aerostatik wird beschrieben.
Die Kombination von Reibung und Kompressibilität wird bei der Rohrströmung, der Kugelumströmung und der laminaren und turbulenten Plattengrenzschicht untersucht. Das Auftreten von Verdichtungsstößen führt zur Stoß-Grenzschicht-Interferenz und auf den Tsien-Parameter. Die Mach-Reynoldszahl Ähnlichkeit in der Gasdynamik führt zur Abgrenzung der verschiedenen Strömungsbereiche. Resultate von Windkanaluntersuchungen sowie analytischen und numerischen Berechnungen werden für das Rhombusprofil und das NACA 0012 Profil analysiert.
This mature textbook brings the fundamentals of fluid mechanics in a concise and mathematically understandable presentation. In the current edition, a section on dissipation and viscous potential flows has been added. Exercises with solutions help to apply the material correctly and promote understanding.
There are additional long-term effects which also change the micro-structure of the polymer network and consequently the effective number of polymer chains in the material. These effects are summarized by ageing processes and will be used in the following to explain the basic assumptions of the model which can be generalized to simulate the viscous behaviour of the material. An implementation of these concepts into FEM codes is straightforward and has been carried out to the solver ABAQUS, Baaser & Ziegler (2006), Baaser et al. (2009).
Marketingrecht
(2018)
In diesem einführenden Kapitel geben die Autoren einen Überblick über die Entstehung des Marketing-Controllings, dessen Aufgaben, organisatorische Einbindung in das Unternehmen sowie dessen strategische und operative Ausprägungen. Zudem werden die einzelnen Beiträge dieses Handbuches im Zusammenhang vorgestellt.
SWOT-Analyse
(2018)
Portfolio-Analyse
(2018)
Business Reengineering
(2018)
Leuchtturmmarketing
(2019)
Online-Marketing-Controlling
(2021)
Vor dem Hintergrund der zentralen Bedeutung von Online-Marketing-Maßnahmen vor allem im Kontext der Kommunikationspolitik und den hieraus resultierenden steigenden Investitionen werden in dem vorliegenden Beitrag verschiedene Online-Marketing-Controlling-Instrumente vorgestellt. Die Darstellung baut auf einem Strukturierungsrahmen auf, um eine Kategorisierung und sinnvolle Beschreibung der Vielzahl an Instrumenten zu gewährleisten. Darüber hinaus wird in dem Beitrag ein umfassender Prozess für das Online-Marketing-Controlling dargestellt.
Social-Media-Controlling
(2021)
Social Media spielen in immer mehr Organisationen für unterschiedliche Zielsetzungen eine wichtige Rolle. Entsprechend wächst auch die Bedeutung der Kontrolle der in Social Media durchgeführten Aktivitäten. Im Rahmen dieses Beitrages werden zunächst die zentralen Funktionen eines Social-Media-Controllings vorgestellt und ein Prozess zu dessen sinnvoller Umsetzung beschrieben. Auf Basis einer Übersicht bestehender Kennzahlenmodelle wird dann im weiteren Verlauf ein umfassendes Kennzahlenmodell entwickelt.
VR als Chance für Museen
(2020)
Einleitung
(2018)
Social Media Marketing
(2020)
In diesem Beitrag wird ein Planungsprozess mit seinen einzelnen Phasen für ein Social Media Marketing vorgestellt. Darüber hinaus werden zentrale Implementierungsoptionen beschrieben. Hierzu gehören Werbung (über Plattformen und Influencer), Kundenservice, Community Management, Social Recruitment, interne Nutzung und Business Profile.
Social-Media-Marketing ist für Kommunen ein wichtiges Instrument, mit ihren vielfältigen Zielgruppen zu interagieren. Gerade vor dem Hintergrund der zahlreichen Herausforderungen, mit denen Kommunen konfrontiert sind, bieten Social-Media-Aktivitäten großes Potenzial, diesen zumindest partiell zu begegnen. Ein erfolgreicher Einsatz von Social Media setzt einen gut durchdachten Planungsprozess voraus. Im Rahmen dieses Beitrages werden ein solcher Planungsprozess sowie einige wichtige Implementierungsmöglichkeiten für Kommunen vorgestellt.
Strategische Analysetechniken ermöglichen langfristig eine strukturierte Erfassung unternehmensinterner Ressourcen in Ausrichtung auf den Markt. Die hier beschriebenen Basis-Techniken umfassen das Produkt-Lebenszyklusanalyse-Modell, verschiedene Typen der Portfolio-Analyse, die Wertketten-Analyse und die SWOT-Analyse. Diese Techniken unterstützen das Marketing-Controlling, Geschäftsfeld- und Marktanalysen für das Management zu erstellen und strategische Handlungsoptionen abzuleiten.
Benchmarking
(2018)
Online-Marktforschung
(2018)
Social CRM
(2018)
No-Line Ansatz
(2018)
Einführender Überblick
(2018)
Social Media Controlling
(2018)
Vor dem Hintergrund wachsender Herausforderungen wird ein professionelles Marketing für Städte und Gemeinden immer wichtiger. Zentrales Ziel dabei ist es, die Attraktivität einer Stadt für die eigene Bevölkerung, Unternehmen und Touristen zu erhöhen. Im vorliegenden Beitrag sollen zunächst einige Rahmenbedingungen des Stadtmarketing skizziert werden. Im Mittelpunkt steht die Vorstellung eines Prozesses, der eine strukturierte Planung und Durchführung des Stadtmarketing ermöglicht.
Das Markenmanagement spielt für das Stadtmarketing eine immer wichtigere Rolle. Im vorliegenden Beitrag wird dabei zunächst auf die Bedeutung und die Besonderheiten des Markenmanagements für Städte eingegangen. Im Mittelpunkt des Beitrages steht ein kompakter Überblick über die zentralen Aspekte des Markenmanagements für Städte. Schließlich wird in einem Exkurs die Bedeutung von Global Cities im Zusammenhang mit dem Markenmanagement vorgestellt.
Städte und Gemeinden müssen sich heute den veränderten Informations- und Kommunikationsverhalten in der Gesellschaft anpassen und entsprechend den Kommunikationsmix erweitern beziehungsweise neu ausrichten. Dabei bieten insbesondere die Online-Kommunikationsmaßnahmen zahlreiche neue Möglichkeiten, zum Beispiel das Targeting. Der folgende Beitrag gibt zunächst einen Überblick über den Kommunikationsprozess und das Content-Marketing. Im Anschluss werden einige wichtige Kommunikationsinstrumente für das Stadtmarketing näher vorgestellt.
Remote code attestation protocols are an essential building block to offer a reasonable system security for wireless embedded devices. In the work at hand we investigate in detail the trustability of a purely software-based remote code attestation based inference mechanism over the wireless when e.g. running the prominent protocol derivate SoftWare-based ATTestation for Embedded Devices (SWATT). Besides the disclosure of pitfalls of such a protocol class we also point out good parameter choices which allow at least a meaningful plausibility check with a balanced false positive and false negative ratio.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
The importance of obtaining simultaneous particle size and concentration values has grown up with continuing discussion of the health effects, of internal combustion engine generated particulate emissions and in particular of Diesel soot emissions. In the present work an aerosol measurement system is described that delivers information about particle size and concentration directly from the undiluted exhaust gas.
Using three laser diodes of different wavelengths which form one parallel light beam, each spectral attenuation is analysed by a single detector and the particle diameter and concentration is evaluated by the use of the Mie theory and shown on-line at a frequency of 1 Hz. The system includes an optical long-path-cell (White principle) with an adjustable path length from 2.5 to 15 m, which allows the analysis within a broad concentration range.
On-line measurements of the particulate emissions in the hot, undiluted exhaust of Diesel engines are presented under stationary and transient engine’s load conditions. Mean particle diameters well below 100 nm are detected for modern Diesel engines. The measured particle concentration corresponds excellently with the traditional gravimetrical measurements of the diluted exhaust. Additionally, measurements of particle emissions (mostly condensed hydricarbons) from a two-stroke engine are presented and discussed.
The flow field-flow fractionation (FIFFF) technique is a promising method for separating and analysing particles and large size macromolecules from a few nanometers to approximately 50 μm. A new fractionation channel is described featuring well defined flow conditions even for low channel heights with convenient assembling and operations features. The application of the new flow field-flow fractionation channel is proved by the analysis of pigments and other small particles of technical interest in the submicrometer range. The experimental results including multimodal size distributions are presented and discussed.
The development of Internet of Things (IoT) embedded devices is proliferating, especially in the smart home automation system. However, the devices unfortunately are imposing overhead on the IoT network. Thus, the Internet Engineering Task Force (IETF) have introduced the IPv6 Low-Power Wireless Personal Area Network (6LoWPAN) to provide a solution to this constraint. 6LoWPAN is an Internet Protocol (IP) based communication where it allows each device to connect to the Internet directly. As a result, the power consumption is reduced. However, the limitation of data transmission frame size of the IPv6 Routing Protocol for Low-power and Lossy Network’s (RPL’s) had made it to be the running overhead, and thus consequently degrades the performance of the network in terms of Quality of Service (QoS), especially in a large network. Therefore, HRPL was developed to enhance the RPL protocol to minimize redundant retransmission that causes the routing overhead. We introduced the T-Cut Off Delay to set the limit of the delay and the H field to respond to actions taken within the T-Cut Off Delay. Thus, this paper presents the comparison performance assessment of HRPL between simulation and real-world scenarios (6LoWPAN Smart Home System (6LoSH) testbed) in validating the HRPL functionalities. Our results show that HRPL had successfully reduced the routing overhead when implemented in 6LoSH. The observed Control Traffic Overhead (CTO) packet difference between each experiment is 7.1%, and the convergence time is 9.3%. Further research is recommended to be conducted for these metrics: latency, Packet Delivery Ratio (PDR), and throughput.
The Internet of Things (IoT) application has becoming progressively in-demand, most notably for the embedded devices (ED). However, each device has its own difference in computational capabilities, memory usage, and energy resources in connecting to the Internet by using Wireless Sensor Networks (WSNs). In order for this to be achievable, the WSNs that form the bulk of the IoT implementation requires a new set of technologies and protocol that would have a defined area, in which it addresses. Thus, IPv6 Low Power Area Network (6LoWPAN) was designed by the Internet Engineering Task Force (IETF) as a standard network for ED. Nevertheless, the communication between ED and 6LoWPAN requires appropriate routing protocols for it to achieve the efficient Quality of Service (QoS). Among the protocols of 6LoWPAN network, RPL is considered to be the best protocol, however its Energy Consumption (EC) and Routing Overhead (RO) is considerably high when it is implemented in a large network. Therefore, this paper would propose the HRPL to enchance the RPL protocol in reducing the EC and RO. In this study, the researchers would present the performance of RPL and HRPL in terms of EC, Control traffic Overhead (CTO) and latency based on the simulation of the 6LoWPAN network in fixed environment using COOJA simulator. The results show HRPL protocol achieves better performance in all the tested topology in terms of EC and CTO. However, the latency of HRPL only improves in chain topology compared with RPL. We found that further research is required to study the relationship between the latency and the load of packet transmission in order to optimize the EC usage.
In the last decade, IPv6 over Low power Wireless Personal Area Networks (IEEE802.15.4), also known as 6LoWPAN, has well evolved as a primary contender for short range wireless communications and holds the promise of an Internet of Things, which is completely based on the Internet Protocol. The authors' team has developed a 6LoWPAN protocol stack in C language, the stack without the necessity to use a specific design environment or operating system. It is highly flexible, modular, and portable and can be enhanced by several interesting modules, like a Wake-On-Radio-(WOR) MAC layer or a TLS1.2 based security sublayer. The stack is made available as open source at https://github.com/hso-esk/emb6. It was extensively tested on the Automated Physical Testbed (APTB) for Wireless Systems, which is available in the authors' lab and allows a flexible setup and full control of arbitrary topologies. The results of the measurements demonstrate a very good stability and short-term with long-term performance also under dynamic conditions.
Extended Performance Measurements of Scalable 6LoWPAN Networks in an Automated Physical Testbed
(2015)
IPv6 over Low power Wireless Personal Area Networks, also known as 6LoWPAN, is becoming more and more a de facto standard for such communications for the Internet of Things, be it in the field of home and building automation, of industrial and process automation, or of smart metering and environmental monitoring. For all of these applications, scalability is a major precondition, as the complexity of the networks continuously increase. To maintain this growing amount of connected nodes a various 6LoWPAN implementations are available. One of the mentioned was developed by the authors' team and was tested on an Automated Physical Testbed for Wireless Systems at the Laboratory Embedded Systems and Communication Electronics of Offenburg University of Applied Sciences, which allows the flexible setup and full control of arbitrary topologies. It also supports time-varying topologies and thus helps to measure performance of the RPL implementation. The results of the measurements prove an excellent stability and a very good short and long-term performance also under dynamic conditions. In all measurements, there is an advantage of minimum 10% with regard to the average times, like global repair time; but the advantage with reagr to average values can reach up to 30%. Moreover, it can be proven that the performance predictions from other papers are consistent with the executed real-life implementations.
Cell lifetime diagnostics and system be-havior of stationary LFP/graphite lithium-ion batteries
(2018)
Walking interfaces offer advantages in navigation of VE systems over other types of locomotion. However, VR helmets have the disadvantage that users cannot see their immediate surroundings. Our publication describes the prototypical implementation of a virtual environment (VE) system, capable of detecting possible obstacles using an RGB-D sensor. In order to warn users of potential collisions with real objects while they are moving throughout the VE tracking area, we designed 4 different visual warning metaphors: Placeholder, Rubber Band, Color Indicator and Arrow. A small pilot study was carried out in which the participants had to solve a simple task and avoid any arbitrarily placed physical obstacles when crossing the virtual scene. Our results show that the Placeholder metaphor (in this case: trees), compared to the other variants, seems to be best suited for the correct estimation of the position of obstacles and in terms of the ability to evade them.
With this generation of devices, Virtual Reality (VR) has actually made it into the living rooms of end-users. These devices feature 6-DOF tracking, allowing them to move naturally in virtual worlds and experience them even more immersively. However, for a natural locomotion in the virtual, one needs a corresponding free space in the real environment. The available space is often limited, especially in everyday environments and under normal spatial conditions. Furnishings and objects of daily life can quickly become obstacles for VR users if they are not cleared away. Since the idea behind VR is to place users into a virtual world and to hide the real world as much as possible, invisible objects represent potential obstacles. The currently available systems offer only rudimentary assistance for this problem. If a user threatens to leave the space previously defined for use, a visual boundary is displayed to allow orientation within the space. These visual metaphors are intended to prevent users from leaving the safe area. However, there is no detection of potentially dangerous objects within this part of space. Objects that have not been cleared away or that have been added in the meantime may still become obstacles. This thesis shows how possible obstacles in the environment can be detected automatically with range imaging cameras and how users can be effectively warned about them in the virtual environment without significantly disturbing their sense of presence. Four different interactive visual metaphors are used to signalize the obstacles within the VE. With the help of a user study, the four signaling variants and the obstacle detection were evaluated and tested.
Szenario-Technik
(2018)
Delphi-Technik
(2018)
Kundenbindung
(2018)
Kundenbindungscontrolling
(2018)
A wide range catalyst screening with noble metal and oxide catalysts for a metal–air battery with an aqueous alkaline electrolyte was carried out. Suitable catalysts reduce overpotentials during the charge and discharge process, and therefore improve the round-trip efficiency of the battery. In this case, the electrodes will be used as optimized cathodes for a future lithium–air battery with an aqueous alkaline electrolyte. Oxide catalysts were synthesized via atmospheric plasma spraying. The screening showed that IrO2, RuO2, La0.6Ca0.4Co3, Mn3O4, and Co3O4 are promising bi-functional catalysts. Considering the high price for the noble metal catalysts further investigations of the oxide catalysts were carried out to analyze their electrochemical behavior at varied temperatures, molarities, and in case of La1−x Ca x CoO3 a varying calcium content. Additionally all catalysts were tested in a longterm test to proof cyclability at varied molarities. Further investigations showed that Co3O4 seems to be the most promising bi-functional catalyst of the tested oxide catalysts. Furthermore, it was shown that a calcium content of x = 0.4 in LCCO has the best performance.
We present a two-dimensional (2D) planar chromatographic separation of estrogenic active compounds on RP-18 W (Merck, 1.14296) phase. A mixture of 8 substances was separated using a solvent mix consisting of hexane, ethyl acetate, acetone (55:15:10, v/v) in the first direction and of acetone and water (15:10, v/v) in the second direction. Separation was performed on an RP-18 W plate over a distance of 70 mm. This 2D-separation method can be used to quantify 17α-ethinylestradiol (EE2) in an effect-directed analysis, using the yeast strain Saccharomyces cerevisiae BJ3505. The test strain (according to McDonnell) contains the estrogen receptor. Its activation by estrogen active compounds is measured by inducing the reporter gene lacZ which encodes the enzyme β-galactosidase. This enzyme activity is determined on plate by using the fluorescent substrate MUG (4-methylumbelliferyl-β-d-galactopyranoside).
Serendipities in der Medizin
(2016)
Zufälle begleiten unser Leben. Auch bei wichtigen Entdeckungen und Entwicklungen in der Medizin spielt der „Zufall“ (engl. „serendipity“) eine Rolle. Hierzu gehören u. a. die Mendelschen Gesetze, die Ermittlung der menschlichen Chromosomenzahl, die Entdeckung der DNS durch Watson und Crick, der PAP-Test oder die Entdeckung der Röntgenstrahlung und der Radioaktivität. Aber auch und gerade in der Pharmakologie gibt es viele Beispiele für Serendipitäten. Einige gehen eng mit Zufällen bei der Entdeckung der Bakteriologie einher.
Do you know that for each banana bunch the complete plant must be cut as well? Only in Brazil 440 million trees are planted annually. With an average weight of 30 kg per banana plant you can estimate about 13,5 million tons of banana residues per year. Although there exist some projects to use these residues for the production of valuable products (e.g fibers for textile and paper production) most of this organic waste material is unused and left for composting on the farmland.
The basic idea of this project is to evaluate this organic waste material for converting it to a renewable and CO2 neutral fuel. Therefore, the different parts of the banana plant (heart, leaves and pseudo stem) were analyzed regarding their biogas potential (specific biogas yield and biogas production kinetics). In further studies the effect of mechanical and enzymatic pretreatments of the different parts of the plants was investigated. This examination could then be the basis for an energetic usage of this organic residue.
The biogas batch experiments were performed according to the german guideline VDI 4630 in 2-L-Batch reactors at 37°C. As biogas substrates, the heart, the leaves and the pseudo stem of the banana plant residue with and without enzymatic/mechanical pretreatment were used.
The different parts of the banana plants result in a specific biogas production yield in the range of 260-470 norm liters per kg organic dry mass.
To determine the influence of the mechanical pretreatment (particle size 1-15 mm) on the biogas production kinetics, the kinetic constants were defined and calculated. The reduction of the particle size leads to an improved biogas production kinetics. Therefore experiments will demonstrate, if the results from the batch experiments can be converted in the continuous fed biogas reactor. The experiments of the enzymatic pretreatment are still under investigation.
Die Mittelbayerische Zeitung ist ein Verlagsbeispiel, das deutlich macht, wie mithilfe einer kontinuierlichen und systematischen Marktbearbeitung auch in stagnierenden Printmärkten eine Stabilisierung der Kundenstruktur möglich ist. Die Kombination mit digitalen Angeboten und die ebenfalls kombinierte Nutzung von unterschiedlichen, teilweise digitalen Kommunikations- und Absatzkanälen sind dabei zentrale Erfolgsfaktoren.
Numerische Physik
(2019)
Dieses Lehrbuch stellt die Numerische Physik anhand einer Vielzahl von Beispielen aus den Bereichen Mechanik, Elektrodynamik, Optik, Statistischer Physik und Quantenmechanik dar. Der Leser lernt hier nicht nur die wichtigsten numerischen Techniken in der Programmiersprache C++ kennen, sondern erhält auch neue Einblicke in die Physik, die konventionelle Zugänge nicht bieten. Das Werk schließt damit eine Lücke zwischen den Standardlehrbüchern der Theoretischen Physik und denen der reinen Programmierung.
Zu jedem der physikalischen Themen gibt es eine kurze Wiederholung des theoretischen Hintergrunds und anschließend werden ausgewählte Beispiele im Detail ausgearbeitet. Übungen am Ende des Kapitels bieten weitere Gelegenheit die Anwendungen des Gelernten zu vertiefen.
Das Buch richtet sich vornehmlich an Physikstudierende höherer Semester, die bereits über eine Basis in Theoretischer Physik verfügen und auch Grundkenntnisse in der Programmierung in C++ mitbringen.
Auf der Produktseite zum Buch auf springer.com finden sich alle Quelltexte zu den Programmen im Buchtext zum Download. Im Anhang erhalten Sie eine Zusammenstellung und Erläuterung frei verfügbarer Software, die sowohl dem Windows-Anwender als auch dem Linux-Freund alle Werkzeuge an die Hand gibt, die er zur Bearbeitung anspruchsvoller physikalischer Fragestellungen benötigt - von Compilern über numerische Bibliotheken bis hin zu Visualisierungstools.
Die Beschäftigung eines Mitarbeiters ist mit drei Kostengruppen verbunden: Beschaffungs- und Einstellkosten, Lohn- und laufende Verwaltungskosten sowie Beendigungskosten. Oft wird bei der Berechnung der Personalkosten oder bei Vergleichen nur der Hauptkostenblock in Form der Lohn- und Verwaltungskosten herangezogen. Bei einer Gesamtbetrachtung des Arbeitsverhältnisses sind aber auch die Kosten für Suche, Auswahl, Einstellung und Beendigung zu berücksichtigen. Die folgende Rechnung quantifiziert modellhaft alle drei Gruppen. Es werden die Gesamtkosten des Einsatzes von Zeitarbeitnehmern (Leiharbeitnehmern) mit den Gesamtkosten der Beschäftigung direkt eingestellter Mitarbeiter verglichen.
Längst kein Auslaufmodell
(2010)
In dem Aufsatz geht es um Arbeitszeugnisse. Im Titelthema der Ausgabe 06/2010 hat sich die Personalwirtschaft kritisch mit der Rechtslage und der Praxis rund um die Ausstellung von Arbeitszeugnissen auseinander gesetzt. „Das Papier nicht wert“ war damals die provokante Überschrift. Ein zu hartes Urteil, wie der Autor von der Hochschule Offenburg findet.
The authors claim that location information of stationary ICT components can never be unclassified. They describe how swarm-mapping crowd sourcing is used by Apple and Google to worldwide harvest geo-location information on wireless access points and mobile telecommunication systems' base stations to build up gigantic databases with very exclusive access rights. After having highlighted the known technical facts, in the speculative part of this article, the authors argue how this may impact cyber deterrence strategies of states and alliances understanding the cyberspace as another domain of geostrategic relevance. The states and alliances spectrum of activities due to the potential existence of such databases may range from geopolitical negotiations by institutions understanding international affairs as their core business, mitigation approaches at a technical level, over means of cyber deterrence-by-retaliation.
We propose in this work to solve privacy preserving set relations performed by a third party in an outsourced configuration. We argue that solving the disjointness relation based on Bloom filters is a new contribution in particular by having another layer of privacy on the sets cardinality. We propose to compose the set relations in a slightly different way by applying a keyed hash function. Besides discussing the correctness of the set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. We are in particular interested in how having bits overlapping in the Bloom filters impacts the privacy level of our approach. Finally, we present our results with real-world parameters in two concrete scenarios.
The interaural time difference (ITD) is an important cue for the localization of sounds. ITD changes as little as 10 μs can be detected by the human auditory system. By provision of one ear with a cochlear implant (CI) ITD are altered due to the partial replacement of the peripheral auditory system. A hearing aid (HA), in contrast, does not replace but adds a processing delay component to the peripheral auditory system extending ITD. The aim of the present study was to quantify interaural stimulation timing between these different modalities to estimate the need for central auditory temporal compensation in single sided deaf CI users or bimodal CI/HA users. For this purpose, wave V latencies of auditory brainstem responses evoked either acoustically (ABR) or electrically via the CI (EABR) have been measured. The sum of delays consisting of CI signal processing measured in the MED-EL OPUS2 audio processor and EABR wave V latencies evoked on different intracochlear sites allowed an estimation of the entire CI channel-specific delay for MED-EL MAESTRO CI systems. We compared these values with ABR wave V latencies measured in the contralateral normal hearing or HA provided ear in different frequency bands. The results showed that EABR wave V latencies were consistently shorter than those evoked acoustically in the unaided normal hearing ear. Thus, artificial delays within the audio processor can be implemented to adjust interaural stimulation timing. The currently implemented group delays in the MED-EL CI system turned out to be reasonably similar to those of the unaided ear. For adjustment of CI and contralateral HA, in contrast, an adjustable additional across-frequency delay in the range of 1–11 ms implemented in the CI would be required. Especially for bimodal CI/HA users the adjustment of interaural stimulation timing may induce improved binaural hearing, reduced need for central auditory temporal compensation and increased acceptance of the CI/HA provision.
Digitale Geschäftsmodelle zeichnen sich oft durch die spezifische Nutzung von proprietären Daten oder Algorithmen aus. Wettbewerbsvorteile von Firmen mit digitalen Geschäftsmodellen sind dann charakterisiert durch Merkmale von erfolgsrelevanter Information und Aspekten von deren Offenlegung − oder bewusst gewählter Intransparenz − die intrinsisch zu asymmetrischer Information führen. Management und Personal der Firma kennen die Erfolgsaussichten und die relevanten Risikofaktoren dann besser als mögliche Kapitalgeber.
The demand of wireless solutions in industrial applications increases since the early nineties. This trend is not only ongoing, it is further pushed by developments in the area of software stacks like the latest Bluetooth Low Energy Stack. It is also pushed by new chip-designs and powerful and highly integrated electronic hardware. The acceptance of wireless technologies as a possible solution for industrial applications, has overcome the entry barrier [1]. The first step to see wireless as standard for many industrial applications is almost accomplished. Nevertheless there is nearly none acceptance of wireless technology for Safety applications. One highly challenging and demanding requirement is still unsolved: The aspect safety and robustness. Those topics have been addressed in many cases but always in a similar manner. WirelessHART as an example addresses this topic with redundant so called multiple propagation paths and frequency hopping to handle with interferences and loss of network participants. So far the pure peer to peer link is rarely investigated and there are less safety solutions available. One product called LoRa™ can be seen as one possible solution to address this lack of safety within wireless links. This paper focuses on the safety performance evaluation of a modem-chip-design. The use of diverse and redundant wireless technologies like LoRa can lead to an increase acceptance of wireless in safety applications. Many measurements in real industrial application have been carried out to be able to benchmark the new chip in terms of the safety aspects. The content of this research results can help to raise the level of confidence in wireless. In this paper, the term “safety” is used for data transmission reliability.
Time-of-Flight Cameras Enabling Collaborative Robots for Improved Safety in Medical Applications
(2020)
Human-robot collaboration is being used more and more in industry applications and is finding its way into medical applications. Industrial robots that are used for human-robot collaboration, cannot detect obstacles from a distance. This paper introduced the idea of using wireless technology to connect a Time-of-Flight camera to off-the-shelf industrial robots. This way, the robot can detect obstacles up to a distance of five meters. Connecting Time-of-Flight cameras to robots increases the safety in human-robot collaboration by detecting obstacles before a collision. After looking at the state of the art, the authors elaborated the different requirements for such a system. The Time-of-Flight camera from Heptagon is able to work in a range of up to five meters and can connect to the control unit of the robot via a wireless connection.
Sichere Detektion von Menschen in der Mensch-Roboter-Kollaboration mit Time-of-Flight Kameras
(2017)
Time-of-Flight Cameras Enabling Collaborative Robots for Improved Safety in Medical Applications
(2017)
Human-robot collaboration is being used more and more in industry applications and is finding its way into medical applications. Industrial robots that are used for human-robot collaboration, cannot detect obstacles from a distance. This paper introduced the idea of using wireless technology to connect a Time-of-Flight camera to off-the-shelf industrial robots. This way, the robot can detect obstacles up to a distance of five meters. Connecting Time-of-Flight cameras to robots increases the safety in human-robot collaboration by detecting obstacles before a collision. After looking at the state of the art, the authors elaborated the different requirements for such a system. The Time-of-Flight camera from Heptagon is able to work in a range of up to five meters and can connect to the control unit of the robot via a wireless connection.
In safety critical applications wireless technologies are not widely spread. This is mainly due to reliability and latency requirements. In this paper a new wireless architecture is presented which will allow for customizing the latency and reliability for every single participant within the network. The architecture allows for building up a network of inhomogeneous participants with different reliability and latency requirements. The used TDMA scheme with TDD as duplex method is acting gentle on resources. Therefore participants with different processing and energy resources are able to participate.