Refine
Document Type
- Conference Proceeding (213) (remove)
Conference Type
- Konferenzartikel (183)
- Konferenz-Abstract (21)
- Sonstiges (5)
- Konferenz-Poster (2)
- Konferenzband (2)
Keywords
- RoboCup (12)
- Machine Learning (9)
- Deep Leaning (7)
- Heart rhythm model (5)
- Modeling and simulation (5)
- Robustness (4)
- machine learning (4)
- Generative Adversarial Network (3)
- Radar (3)
- cryptography (3)
- neural networks (3)
- printed electronics (3)
- Computer Vision (2)
- Cryoballoon catheter ablation (2)
- Current measurement (2)
- Energy Flexibility (2)
- Geophysik (2)
- Kalman Filter (2)
- Mikroelektronik (2)
- NB-IoT (2)
- Neural networks (2)
- Predictive Maintenance (2)
- Security (2)
- Stability (2)
- Supraventricular tachycardia (2)
- Switches (2)
- UWB radars (2)
- accountability (2)
- artificial intelligence (2)
- atrial fibrillation (2)
- autoattack (2)
- cardiac ablation (2)
- catheter ablation (2)
- certificate management (2)
- convolutional neural networks (2)
- efficient training (2)
- explainability (2)
- fairness (2)
- heart rhythm model (2)
- image classification (2)
- imaging algorithms (2)
- interactive visualization (2)
- medical imaging (2)
- microwave (2)
- programming (2)
- responsibility (2)
- scattering measurements (2)
- semantics (2)
- trust (2)
- understandability (2)
- 3D print (1)
- 3D-Modelling (1)
- 5G (1)
- 5G mobile communication (1)
- 5G private networks (1)
- AC machines (1)
- AIN Cantilever (1)
- AV nodal reentry tachycardia (1)
- AV reentrant tachycardia (1)
- Additive Manufacturing (1)
- Adversarial Attacks (1)
- Adversarial Robustness (1)
- Agent based sensor (1)
- Air Pollution (1)
- Aliasing (1)
- Aluminum (1)
- Amplitude and Phase Errors (1)
- Angle of Arrival (1)
- Anti-Windup (1)
- Approximation (1)
- Artificial Intelligence (1)
- Atrial fibrillation (1)
- Authentication (1)
- Authorization (1)
- Automated idea generation (1)
- Automation (1)
- Automotive Radar (1)
- Battery storage (1)
- Bearings (1)
- Bioimpedance measurement (1)
- Biomimetics (1)
- Blockchain (1)
- Blockchains (1)
- Boundary conditions (1)
- Bowtie antenna (1)
- CNN (1)
- CNNs (1)
- Calibration (1)
- Cardiac Resynchronization Therapy (1)
- Cardiac resynchronization therapy (1)
- Challenges in Action Recognition (1)
- Chemical engineering (1)
- Cleaning (1)
- Clustering (1)
- Collaboration of Academia and Industry (1)
- Compensation (1)
- Control Algorithms (1)
- Current Control (1)
- DC-AC converters (1)
- Data Mining (1)
- Data breech (1)
- Debinding (1)
- Deep Learning (1)
- Deep Neural Network (1)
- Demand side flexibility (1)
- Device characterization (1)
- Diagnostics (1)
- Digital Beamforming (1)
- Digital Flex Twin Optimization (1)
- Digital Twin (1)
- Digitale Turschilder (1)
- Digitalization (1)
- Drehstrom (1)
- E-Ink (1)
- E-Paper (1)
- EAP-TLS (1)
- EKF-SLAM (1)
- ETAP Simulations (1)
- Eco-inventive principles (1)
- Economics (1)
- Edge AI (1)
- Education (1)
- Eigenvalues (1)
- Electromagnetic and thermal simulation (1)
- Embedded AI (1)
- Embedded Systems (1)
- Energiemanagement (1)
- Energy Flexibility for Companies (1)
- Energy Harvesting (1)
- Energy Management (1)
- Energy Marketing of Industrial Flexibilities (1)
- Energy management (1)
- Energy systems modeling (1)
- Environmental monitoring (1)
- Error (1)
- Esophageal catheter (1)
- Estimation (1)
- FUSION (1)
- Failure analysis (1)
- Fault Classification (1)
- Featherweight Go (1)
- Federated Learning (1)
- Field Programmable Gate Array (FPGA) (1)
- Fused Filament Fabrication (1)
- GPU Computing (1)
- Gleichstrom (1)
- Handschrift (1)
- Handswritten Character Recognition (1)
- Harmonic analysis (1)
- Heart Rhythm Simulation (1)
- Hemodynamic monitoring (1)
- Herzrhythmusmodell (1)
- High frequency ablation (1)
- His-Bundle Pacing (1)
- Hochspannung (1)
- Hybrid system (1)
- IEC/IEEE 60802 security (1)
- IEEE802.15.4 (1)
- IIoT (1)
- InceptionTime (1)
- Industrial Blockchain (1)
- Inertial (1)
- Ink (1)
- Internet of Things (1)
- Inventive principles (1)
- Inventive problem solving (1)
- Inverters (1)
- IoT Security (1)
- IoT security (1)
- Kryoballonkatheter (1)
- Künstliche Intelligenz (1)
- LPWAN (1)
- Large Grid-Connected PV Systems (1)
- Left Atrial Appendage Closure (1)
- Limiting (1)
- Load Flow Analysis (1)
- Logic gates (1)
- Long Term Evolution (1)
- Low-Cost Füllstandssensor (1)
- Low-Power (1)
- MEMS (1)
- MIMO (1)
- MLOps (1)
- Machine learning (1)
- Magnetic sensors (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Mean Square Error (1)
- Measurement (1)
- Medizintechnik (1)
- Microgrid(s) (1)
- Mode Collapse (1)
- Model Calibration (1)
- Model Predictive Control (1)
- Model Search (1)
- Modellierung und Simulation (1)
- Monitoring (1)
- Monocular Depth Estimation (1)
- Monte-Carlo (1)
- Monte-Carlo Simulation (1)
- Monte-Carlo method (1)
- Multiside heart stimulation (1)
- NETCONF security (1)
- NFC (1)
- Nature-inspired principles (1)
- Network Test (1)
- Netzintegration (1)
- Nyquist-Shannon (1)
- OT security (1)
- Octave Convolution (1)
- Optimization (1)
- Optimization and control (1)
- Optimization with Digital Twins (1)
- Optische Zeichenerkennung (1)
- PI control (1)
- PKI (1)
- PROFINET IO (1)
- PROFINET Security (1)
- PV System (1)
- Parallelization (1)
- Parameter Estimation (1)
- Parameter estimation (1)
- Pattern Recognition (1)
- Peak shaving (1)
- Peer to peer network (1)
- Performance (1)
- Performance evaluation (1)
- Permanent magnet machines (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Physiological Pacing (1)
- Power Loss (1)
- Predictions (1)
- Predictive Models (1)
- Process design (1)
- Pulmonalvenenisolation (1)
- Pulmonary vein isolation (1)
- Pulse width modulation (1)
- RFID (1)
- RUL (1)
- Radio frequency (1)
- Random call model (1)
- Real-Time Communication (1)
- Regularization (1)
- Renewable Energy Markets (1)
- Representation Learning (1)
- ResNet (1)
- Road-Quality Prediction (1)
- Roboter (1)
- Rotors (1)
- Sampling (1)
- Second-order Optimization (1)
- Self-Calibration (1)
- Semiconductor Device (1)
- Semiconductor device measurement (1)
- Sensor phenomena and characterization (1)
- Sintering (1)
- Smart Energy Metering (1)
- Smart Gardening (1)
- Smart Grids (1)
- Smart Home (1)
- Smart-UPS (1)
- SmartMAC (1)
- Software (1)
- Software algorithms (1)
- Software for measurements (1)
- Solar Radiation (1)
- Spinal cord stimulation (1)
- Stromregelung (1)
- Stromzustandsregler (1)
- Subspace Clustering (1)
- Substrates (1)
- Sustainable technology (1)
- Synchronmaschine (1)
- Systematic innovation (1)
- TLS (1)
- TRIZ methodology (1)
- TSN security (1)
- Testbed (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- Time series data (1)
- Time-series Classification (1)
- TinyML (1)
- Torque (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Transesophageal left atrial pacing (1)
- Trust management (1)
- Ultra-Low Energy (1)
- Unsupervised Conditional Training (1)
- Unsupervised Learning (1)
- Variational Autoencoders (1)
- Virtual Reality (1)
- Vorhofflimmern (1)
- Wireless IoT (1)
- Wireless Sensor Nodes (1)
- Wärmepumpen (1)
- Yolov5 (1)
- accelerometer (1)
- adversarial (1)
- adversarial attacks (1)
- adversarial detection (1)
- atrial flutter (1)
- attribute manipulation (1)
- autoML (1)
- autonomous systems (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- biocompatibility test (1)
- biodegradable (1)
- biomaterials (1)
- biomechanical stimulation (1)
- building management systems (1)
- camera-based navigation (1)
- cellular radio (1)
- cifar (1)
- computer network management (1)
- correlation (1)
- credentials (1)
- crossbar (1)
- curb (1)
- curriculum learning (1)
- cybersecurity (1)
- deep learning (1)
- deep reinforcement learning (1)
- defense (1)
- degradation stages (1)
- detection (1)
- dictionary passing (1)
- echocardiography (1)
- electrolyte-gated transistors (1)
- embedded systems (1)
- energy harvesting (1)
- face editing (1)
- face recognition (1)
- fail-operational (1)
- fingerprinting (1)
- fourier (1)
- gan (1)
- generative adversarial networks (1)
- ground penetrating radar (1)
- hair (1)
- heart rhythm simulation (1)
- heat pump (1)
- height estimation (1)
- home automation (1)
- hybrid systems (1)
- identification (1)
- image color analysis (1)
- imagenet (1)
- impedance cardiography (1)
- industrial Ethernet (1)
- industrial IoT (1)
- industrial communication (1)
- irrigation (1)
- lid (1)
- machine-to-machine communication (1)
- mahalanobis (1)
- metal oxide transistor (1)
- millimeter-wave (1)
- model-predictive control (1)
- molybdenum (1)
- multipath (1)
- mutual authentication (1)
- natürliche Leistung (1)
- neural architecture search (1)
- noise measurement (1)
- nose (1)
- parking (1)
- pattern recognition (1)
- perception (1)
- performance (1)
- physical unclonable function (1)
- physically unclonable function (PUF) (1)
- predictive maintenance (1)
- primary authentication (1)
- printed Antennas (1)
- programming languages (1)
- pruning (1)
- pulmonary vein isolation (1)
- radio networks (1)
- rekeying (1)
- resource efficiency (1)
- secure communication (1)
- security (1)
- skin cancer (1)
- skin cancer detection (1)
- software defined radio (1)
- solar module (1)
- sparse backpropagation (1)
- spectral defense (1)
- spectraldefense (1)
- statistical methods, ROS (1)
- stochastic computing (1)
- style (1)
- style transfer (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- transmit beamforming (1)
- ventricular tachycardia (1)
- wide area networks (1)
- wireless sensor networks (1)
- übertragbare Wirkleistung (1)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (213) (remove)
Open Access
- Closed Access (82)
- Open Access (75)
- Closed (55)
- Bronze (27)
- Diamond (9)
- Grün (3)
- Gold (1)
Solar energy plays a central role in the energy transition. Clouds generate locally large fluctuations in the generation output of photovoltaic systems, which is a major problem for energy systems such as microgrids, among others. For an optimal design of a power system, this work analyzed the variability using a spatially distributed sensor network at Stuttgart Airport. It has been shown that the spatial distribution partially reduces the variability of solar radiation. A tool was also developed to estimate the output power of photovoltaic systems using irradiation time series and assumptions about the photovoltaic sites. For days with high fluctuations of the estimated photovoltaic power, different energy system scenarios were investigated. It was found the approach can be used to have a more realistic representation of aggregated PV power taking spatial smoothing into account and that the resulting PV power generation profiles provide a good basis for energy system design considerations like battery sizing.
The number of use cases for autonomous vehicles is increasing day by day especially in commercial applications. One important application of autonomous vehicles can be found within the parcel delivery section. Here, autonomous cars can massively help to reduce delivery efforts and time by supporting the courier actively. One important component of course is the autonomous vehicle itself. Nevertheless, beside the autonomous vehicle, a flexible and secure communication architecture also is a crucial key component impacting the overall performance of such system since it is required to allow continuous interactions between the vehicle and the other components of the system. The communication system must provide a reliable and secure architecture that is still flexible enough to remain practical and to address several use cases. In this paper, a robust communication architecture for such autonomous fleet-based systems is proposed. The architecture provides a reliable communication between different system entities while keeping those communications secure. The architecture uses different technologies such as Bluetooth Low Energy (BLE), cellular networks and Low Power Wide Area Network (LPWAN) to achieve its goals.
The desire to connect more and more devices and to make them more intelligent and more reliable, is driving the needs for the Internet of Things more than ever. Such IoT edge systems require sound security measures against cyber-attacks, since they are interconnected, spatially distributed, and operational for an extended period of time. One of the most important requirements for the security in many industrial IoT applications is the authentication of the devices. In this paper, we present a mutual authentication protocol based on Physical Unclonable Functions, where challenge-response pairs are used for both device and server authentication. Moreover, a session key can be derived by the protocol in order to secure the communication channel. We show that our protocol is secure against machine learning, replay, man-in-the-middle, cloning, and physical attacks. Moreover, it is shown that the protocol benefits from a smaller computational, communication, storage, and hardware overhead, compared to similar works.
In recent years, Physical Unclonable Functions (PUFs) have gained significant attraction in the Internet of Things (IoT) for security applications such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of physical devices to generate unique fingerprints for security applications. One common approach for designing PUFs is exploiting the intrinsic features of sensors and actuators such as MEMS elements, which typically exist in IoT devices. This work presents the Cantilever-PUF, a PUF based on a specific MEMS device – Aluminum Nitride (AlN) piezoelectric cantilever. We show the variations of electrical parameters of AlN cantilevers such as resonance frequency, electrical conductivity, and quality factor, as a result of uncontrollable manufacturing process variations. These variations, along with high thermal and chemical stability, and compatibility with silicon technology, makes AlN cantilever a decent candidate for PUF design. We present a cantilever design, which magnifies the effect of manufacturing process variations on electrical parameters. In order to verify our findings, the simulation results of the Monte Carlo method are provided. The results verify the eligibility of AlN cantilever to be used as a basic PUF device for security applications. We present an architecture, in which the designed Cantilever-PUF is used as a security anchor for PUF-enabled device authentication as well as communication encryption.
To deal with frequent power outages in developing countries, people turn to solutions like uninterruptible power supply (UPS), which stores electric energy during normal operating hours and use it to meet energy needs during rolling blackout intervals. Locally produced UPSs of poorer power quality are widely accessible in the marketplaces, and they have a negative impact on power quality. The charging and discharging of the batteries in these UPSs generate significant amount of power losses in weak grid environments. The Smart-UPS is our proposed smart energy metering (SEM) solution for low voltage consumers that is provided by the distribution company. It does not require batteries, therefore there is no power loss or harmonic distortion due to corresponding charging and discharging. Through load flow and harmonic analysis of both traditional UPS and Smart-UPS systems on ETAP, this paper examines their impact on the harmonics and stability of the distribution grid. The simulation results demonstrate that Smart-UPS can assist fixing power quality issues in a developing country like Pakistan by providing cleaner energy than the battery-operated traditional UPSs.
Due to its potential in improving the efficiency of energy supply, smart energy metering (SEM) has become an area of interest with the surge in Internet of Things (IoT). SEM entails remote monitoring and control of the sensors and actuators associated with the energy supply system. This provides a flexible platform to conceive and implement new data driven Demand Side Management (DSM) mechanisms. The IoT enablement allows the data to be gathered and analyzed at requisite granularity. In addition to efficient use of energy resources and provisioning of power, developing countries face an additional challenge of temporal mismatch in generation capacity and load factors. This leads to widespread deployment of inefficient and expensive Uninterruptible Power Supply (UPS) solutions for limited power provisioning during resulting blackouts. Our proposed “Soft-UPS” allows dynamic matching of load and generation through a combination of managed curtailment. This eliminates inefficiencies in the energy and power value chain and allows a data-driven approach to solving a widespread problem in developing countries, simultaneously reducing both upfront and running costs of conventional UPS and storage. A scalable and modular platform is proposed and implemented in this paper. The architecture employs “WiMODino” using LoRaWAN with a “Lite Gateway” and SQLite repository for data storage. Role based access to the system through an android application has also been demonstrated for monitoring and control.
With the surge in global data consumption with proliferation of Internet of Things (IoT), remote monitoring and control is increasingly becoming popular with a wide range of applications from emergency response in remote regions to monitoring of environmental parameters. Mesh networks are being employed to alleviate a number of issues associated with single-hop communication such as low area coverage, reliability, range and high energy consumption. Low-power Wireless Personal Area Networks (LoWPANs) are being used to help realize and permeate the applicability of IoT. In this paper, we present the design and test of IEEE 802.15.4-compliant smart IoT nodes with multi-hop routing. We first discuss the features of the software stack and design choices in hardware that resulted in high RF output power and then present field test results of different baseline network topologies in both rural and urban settings to demonstrate the deployability and scalability of our solution.
Modeling of Random Variations in a Switched Capacitor Circuit based Physically Unclonable Function
(2020)
The Internet of Things (IoT) is expanding to a wide range of fields such as home automation, agriculture, environmental monitoring, industrial applications, and many more. Securing tens of billions of interconnected devices in the near future will be one of the biggest challenges. IoT devices are often constrained in terms of computational performance, area, and power, which demand lightweight security solutions. In this context, hardware-intrinsic security, particularly physically unclonable functions (PUFs), can provide lightweight identification and authentication for such devices. In this paper, random capacitor variations in a switched capacitor PUF circuit are used as a source of entropy to generate unique security keys. Furthermore, a mathematical model based on the ordinary least square method is developed to describe the relationship between random variations in capacitors and the resulting output voltages. The model is used to filter out systematic variations in circuit components to improve the quality of the extracted secrets.
Soiling is an important issue in the renewable energy sector since it can result in significant yield losses, especially in regions with higher pollution or dust levels. To mitigate the impact of soiling on photovoltaic (PV) plants, it is essential to regularly monitor and clean the panels, as well as develop accurate soiling predictions that can affect cleaning strategies and enhance the overall performance of PV power plants. This research focuses on the problem of soiling loss in photovoltaic power plants and the potential to improve the accuracy of soiling predictions. The study examines how soiling can affect the efficiency and productivity of the modules and how to measure and predict soiling using machine learning (ML) algorithms. The research includes analyzing real data from large-scale ground-mounted PV sites and comparing different soiling measurement methods. It was observed that there were some deviations in the real soiling loss values compared to the expected values for some projects in southern Spain, thus, the main goal of this work is to develop machine learning models that could predict the soiling more accurately. The developed models have a low mean square error (MSE), indicating the accuracy and suitability of the models to predict the soiling rates. The study also investigates the impact of different cleaning strategies on the performance of PV power plants and provides a powerful application to predict both the soiling and the number of cleaning cycles.
Elektronische Türschilder zur Darstellung von Informationen sind insbesondere in öffentlichen Gebäuden zwischenzeitlich weit verbreitet. Die Varianz dieser elektronischen Türschilder reicht vom Tablet-basierten Türschild bis hin zum PC-basierten Türschild mit externem Bildschirm. Zumeist werden die Systeme mit 230 V betrieben. Bei einer großen Summe von Türschildern in öffentlichen Gebäuden kann dies zu einem signifikanten Umsatz an Energie führen. Im Rahmen dieses Papers wird die Entwicklung eines energieautarken arbeiten Türschildes vorgestellt, bei dem ein E-Paper-Display zum Einsatz kommt. Das Türschild lässt sich per Smartphone-App und NFC-Schnittstelle konfigurieren. Es wird insbesondere auf das Low-Power-Hardware-Design der Elektronik und energetische Aspekte eingegangen.
Investigation on Bowtie Antennas Operating at Very Low Frequencies for Ground Penetrating Radar
(2023)
The efficiency of Ground Penetrating Radar (GPR) systems significantly depends on the antenna performance as the signal has to propagate through lossy and inhomogeneous media. GPR antennas should have a low operating frequency for greater penetration depth, high gain and efficiency to increase the receiving power and should be compact and lightweight for ease of GPR surveying. In this paper, two different designs of Bowtie antennas operating at very low frequencies are proposed and analyzed.
Many different methods, such as screen printing, gravure, flexography, inkjet etc., have been employed to print electronic devices. Depending on the type and performance of the devices, processing is done at low or high temperature using precursor- or particle-based inks. As a result of the processing details, devices can be fabricated on flexible or non-flexible substrates, depending on their temperature stability. Furthermore, in order to reduce the operating voltage, printed devices rely on high-capacitance electrolytes rather than on dielectrics. The printing resolution and speed are two of the major challenging parameters for printed electronics. High-resolution printing produces small-size printed devices and high-integration densities with minimum materials consumption. However, most printing methods have resolutions between 20 and 50 μm. Printing resolutions close to 1 μm have also been achieved with optimized process conditions and better printing technology.
The final physical dimensions of the devices pose severe limitations on their performance. For example, the channel lengths being of this dimension affect the operating frequency of the thin-film transistors (TFTs), which is inversely proportional to the square of channel length. Consequently, short channels are favorable not only for high-frequency applications but also for high-density integration. The need to reduce this dimension to substantially smaller sizes than those possible with today’s printers can be fulfilled either by developing alternative printing or stamping techniques, or alternative transistor geometries. The development of a polymer pen lithography technique allows scaling up parallel printing of a large number of devices in one step, including the successive printing of different materials. The introduction of an alternative transistor geometry, namely the vertical Field Effect Transistor (vFET), is based on the idea to use the film thickness as the channel length, instead of the lateral dimensions of the printed structure, thus reducing the channel length by orders of magnitude. The improvements in printing technologies and the possibilities offered by nanotechnological approaches can result in unprecedented opportunities for the Internet of Things (IoT) and many other applications. The vision of printing functional materials, and not only colors as in conventional paper printing, is attractive to many researchers and industries because of the added opportunities when using flexible substrates such as polymers and textiles. Additionally, the reduction of costs opens new markets. The range of processing techniques covers laterally-structured and large-area printing technologies, thermal, laser and UV-annealing, as well as bonding techniques, etc. Materials, such as conducting, semiconducting, dielectric and sensing materials, rigid and flexible substrates, protective coating, organic, inorganic and polymeric substances, energy conversion and energy storage materials constitute an enormous challenge in their integration into complex devices.
Team description papers of magmaOffenburg are incremental in the sense that each year we address a different topic of our team and the tools around our team. In this year’s team description paper we focus on the architecture of the software. It is a main factor for being able to keep the code maintainable even after 15 years of development. We also describe how we make sure that the code follows this architecture.
In this paper, we study the runtime performance of symmetric cryptographic algorithms on an embedded ARM Cortex-M4 platform. Symmetric cryptographic algorithms can serve to protect the integrity and optionally, if supported by the algorithm, the confidentiality of data. A broad range of well-established algorithms exists, where the different algorithms typically have different properties and come with different computational complexity. On deeply embedded systems, the overhead imposed by cryptographic operations may be significant. We execute the algorithms AES-GCM, ChaCha20-Poly1305, HMAC-SHA256, KMAC, and SipHash on an STM32 embedded microcontroller and benchmark the execution times of the algorithms as a function of the input lengths.