Refine
Year of publication
- 2015 (77) (remove)
Document Type
- Conference Proceeding (77) (remove)
Conference Type
- Konferenzartikel (63)
- Konferenz-Abstract (7)
- Konferenzband (3)
- Sonstiges (3)
- Konferenz-Poster (1)
Keywords
- Applikation (5)
- Kommunikation (5)
- Ausbildung (4)
- Funktechnik (3)
- Licht (3)
- Physik (3)
- Sicherheit (3)
- Abtragung (2)
- Alexander von Humboldt (2)
- Datensicherung (2)
- Dienstleistung (2)
- Finite-Elemente-Methode (2)
- Herz (2)
- Hochfrequenztechnik (2)
- Mikroelektronik (2)
- Netzwerk (2)
- Abgas (1)
- Analytical Query (1)
- Archives (1)
- Automotive engineering (1)
- Bestrahlung (1)
- Biogas (1)
- Biomedizin (1)
- Boiler (1)
- Breitbandkommunikation (1)
- CAE (1)
- Cascading Style Sheets (1)
- Communication Systems (1)
- Controlling (1)
- Datenbank (1)
- Datenmanagement (1)
- Defibrillator (1)
- Design (1)
- Design , Produktgestaltung (1)
- Digitalisierung (1)
- Dimension 2 (1)
- Diskretisierung (1)
- Durchblutung (1)
- Dünnschichtchromatographie (1)
- E-Learning (1)
- Einführung (1)
- Eingebettetes System (1)
- Elektrokardiogramm (1)
- Elektronische Medien (1)
- Embedded Software (1)
- Energieverbrauch (1)
- Energieversorgung (1)
- Enzym (1)
- Erweiterte Realität <Informatik> (1)
- Eöelktrokardiogramm (1)
- Festoxidbrennstoffzelle (1)
- Filter Dimension (1)
- Flüssigkristall (1)
- GIS (1)
- Gefäßverschluß (1)
- Gehirn (1)
- Gesellschaft (1)
- Getriebewelle (1)
- Google Maps (1)
- Hash Function (1)
- Hash Table (1)
- Herzrhythmusstörung (1)
- Implementation (1)
- Imprägnierung (1)
- Informatik (1)
- Information Systems (1)
- Informationssystem (1)
- Informationstechnik (1)
- Ingenieurwissenschaften (1)
- Internet der Dinge (1)
- Internet portal (1)
- Kabel (1)
- Kardiologie (1)
- Kerbe (1)
- Klausur (1)
- Lehre (1)
- Leistung (1)
- Leistungselektronik (1)
- Lernsoftware (1)
- Lumineszenz (1)
- Lärmschutz (1)
- Medizintechnik (1)
- Messtechnik (1)
- Messung (1)
- Modellierung (1)
- Naturwissenschaften (1)
- Niedrige Energie (1)
- Optik (1)
- Passivhaus (1)
- Planung (1)
- Polymere (1)
- Produktion (1)
- Programmierung (1)
- Präsentation (1)
- Quellcode (1)
- Raman-Spektroskopie (1)
- Rapid Prototyping (1)
- Recycling (1)
- RoboCup (1)
- Roboter (1)
- Rohrleitung (1)
- Schleudertrauma (1)
- Security (1)
- Sensortechnik (1)
- Speiseröhre (1)
- Spektralanalyse (1)
- Standort (1)
- Statistik (1)
- Strahl (1)
- Strömungsmechanik (1)
- Studium (1)
- Synchronisationstherapie (1)
- TLS (1)
- Target Path (1)
- Vehicle safety (1)
- Verfügbarkeit (1)
- Vergleich (1)
- Wasserstand (1)
- Welle (1)
- Wertanalyse (1)
- Windenergie (1)
- Wissenschaft (1)
- Zahlung (1)
- Zusatzstoff (1)
- cloud computing (1)
- digital library (1)
- dynamic hyperlinks (1)
- information network (1)
- interconnected data (1)
- mild traumatic brain injury (1)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (40)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (17)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (14)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (14)
- Fakultät Wirtschaft (W) (10)
- ACI - Affective and Cognitive Institute (7)
- WLRI - Work-Life Robotics Institute (5)
- INES - Institut für nachhaltige Energiesysteme (3)
- IUAS - Institute for Unmanned Aerial Systems (1)
- POIM - Peter Osypka Institute of Medical Engineering (1)
Open Access
- Closed Access (41)
- Open Access (34)
- Bronze (7)
- Diamond (1)
The demand of wireless solutions in industrial applications increases since the early nineties. This trend is not only ongoing, it is further pushed by developments in the area of software stacks like the latest Bluetooth Low Energy Stack. It is also pushed by new chip-designs and powerful and highly integrated electronic hardware. The acceptance of wireless technologies as a possible solution for industrial applications, has overcome the entry barrier [1]. The first step to see wireless as standard for many industrial applications is almost accomplished. Nevertheless there is nearly none acceptance of wireless technology for Safety applications. One highly challenging and demanding requirement is still unsolved: The aspect safety and robustness. Those topics have been addressed in many cases but always in a similar manner. WirelessHART as an example addresses this topic with redundant so called multiple propagation paths and frequency hopping to handle with interferences and loss of network participants. So far the pure peer to peer link is rarely investigated and there are less safety solutions available. One product called LoRa™ can be seen as one possible solution to address this lack of safety within wireless links. This paper focuses on the safety performance evaluation of a modem-chip-design. The use of diverse and redundant wireless technologies like LoRa can lead to an increase acceptance of wireless in safety applications. Many measurements in real industrial application have been carried out to be able to benchmark the new chip in terms of the safety aspects. The content of this research results can help to raise the level of confidence in wireless. In this paper, the term “safety” is used for data transmission reliability.
6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks) is gaining more and more attraction for the seamless connectivity of embedded devices for the Internet of Things. It can be observed that most of the available solutions are following an open source approach, which significantly leads to a fast development of technologies and of markets. Although the currently available implementations are in a pretty good shape, all of them come with some significant drawbacks. It was therefore decided to start the development of an own implementation, which takes the advantages from the existing solutions, but tries to avoid the drawbacks. This paper discussed the reasoning behind this decision, describes the implementation and its characteristics, as well as the testing results. The given implementation is available as open-source project under [15].
We propose secure multi-party computation techniques for the distributed computation of the average using a privacy-preserving extension of gossip algorithms. While recently there has been mainly research on the side of gossip algorithms (GA) for data aggregation itself, to the best of our knowledge, the aforementioned research line does not take into consideration the privacy of the entities involved. More concretely, it is our objective to not reveal a node's private input value to any other node in the network, while still computing the average in a fully-decentralized fashion. Not revealing in our setting means that an attacker gains only minor advantage when guessing a node's private input value. We precisely quantify an attacker's advantage when guessing - as a mean for the level of data privacy leakage of a node's contribution. Our results show that by perturbing the input values of each participating node with pseudo-random noise with appropriate statistical properties (i) only a minor and configurable leakage of private information is revealed, by at the same time (ii) providing a good average approximation at each node. Our approach can be applied to a decentralized prosumer market, in which participants act as energy consumers or producers or both, referred to as prosumers.
We provide a privacy-friendly cloud-based smart metering storage architecture which provides few-instance storage on encrypted measurements by at the same time allowing SQL queries on them. Our approach is most flexible with respect to two axes: on the one hand it allows to apply filtering rules on encrypted data with respect to various upcoming business cases; on the other hand it provides means for a storage-efficient handling of encrypted measurements by applying server-side deduplication techniques over all incoming smart meter measurements. Although the work at hand is purely dedicated to a smart metering architecture we believe our approach to have value for a broader class of IoT cloud storage solutions. Moreover, it is an example for Privacy-by-design supporting the positive-sum paradigm.
The Metering Bus, also known as M-Bus, is a European standard EN13757-3 for reading out metering devices, like electricity, water, gas, or heat meters. Although real-life M-Bus networks can reach a significant size and complexity, only very simple protocol analyzers are available to observe and maintain such networks. In order to provide developers and installers with the ability to analyze the real bus signals easily, a web-based monitoring tool for the M-Bus has been designed and implemented. Combined with a physical bus interface it allows for measuring and recording the bus signals. For this at first a circuit has been developed, which transforms the voltage and current-modulated M-Bus signals to a voltage signal that can be read by a standard ADC and processed by an MCU. The bus signals and packets are displayed using a web server, which analyzes and classifies the frame fragments. As an additional feature an oscilloscope functionality is included in order to visualize the physical signal on the bus. This paper describes the development of the read-out circuit for the Wired M-Bus and the data recovery.
Monitors are in the center of media productions and hold an important function as the main visual interface. Tablets and smartphones are becoming more and more important work tools in the media industry. As an extension to our lecture contents an intensive discussion of different display technologies and its applications is taking place now. The established LCD (Liquid Crystal Display) technology and the promising OLED (Organic Light Emitting Diode) technology are in the focus.
The classic LCD is currently the most important display technology. The paper will present how the students should develop sense for display technologies besides the theoretical scientific basics. The workshop focuses increasingly on the technical aspects of the display technology and has the goal of deepening the students understanding of the functionality by building simple Liquid Crystal Displays by themselves.
The authors will present their experience in the field of display technologies. A mixture of theoretical and practical lectures has the goal of a deeper understanding in the field of digital color representation and display technologies. The design and development of a suitable learning environment with the required infrastructure is crucial. The main focus of this paper is on the hands-on optics workshop “Liquid Crystal Display in the do-it-yourself”.
Alexander von Humboldt, a German scientist and explorer of the 19th century, viewed the natural world holistically and described the harmony of nature among the diversity of the physical world as a conjoining between all physical disciplines. He noted in his diary: “Everything is interconnectedness.”
The main feature of Humboldt’s pioneering work was later named “Humboldtian science”, meaning the accurate study of interconnected real phenomena in order to find a definite law and a dynamic cause.
Following Humboldt's idea of nature, an Internet edition of his works must preserve the author’s original intention, retain an awareness of all relevant works, and still adhere to the requirements of scholarly edition.
At the present time, however, the highly unconventional form of his publications has undermined the awareness and a comprehensive study of Humboldt’s works.
Digital libraries should supply dynamic links to sources, maps, images, graphs and relevant texts. New forms of interaction and synthesis between humanistic texts and scientific observation need to be created.
Information technology is the only way to do justice to the broad range of visions, descriptions and the idea of nature of Humboldt’s legacy. It finally leads to virtual research environments as an adequate concept to redesign our digital archives, not only for Humboldt’s documents, but for all interconnected data.
Application of Polymer Plaster Composites in Additive Manufacturing of High-Strength Components
(2015)
Today, 3D-printing with polymer plaster composites is a common method in Additive Manufacturing. This technique has proven to be especially suitable for the production of presentation models, due to the low cost of materials and the possibility to produce color-models. But nowadays it requires refinishing through the manual application of a layer of resin. However, the strength of these printed components is very limited, as the applied resin only penetrates a thin edge layer on the surface. This paper develops a new infiltration technique that allows for a significant increase in the strength of the 3D-printed component. For this process, the components are first dehydrated in a controlled two-tier procedure, before they are then penetrated with high-strength resin. The infiltrate used in this process differs significantly from materials traditionally used for infiltration. The result is an almost complete penetration of the components with high-strength infiltrate. As the whole process is computer-integrated, the results are also easier to reproduce, compared to manual infiltration. On the basis of extensive material testing with different testing specimen and testing methods, it can be demonstrated that a significant increase in strength and hardness can be achieved. Finally, this paper also considers the cost and energy consumption of this new infiltration method. As a result of this new technology, the scope of applicability of 3D-printing can be extended to cases that require significantly more strength, like the production of tools for the shaping of metals or used for the molding of plastics. Furthermore, both the process itself and the parameters used are monitored and can be optimized to individual requirements and different fields of application.
Der Studienbeginn wird an der Hochschule Offenburg durch Vorbereitungskurse, sogenannte Brückenkurse, unterstützt. Wir stellen vorläufige Ergebnisse beim Einsatz von Smartphones und Tablets im Rahmen des Physik-Brückenkurses vor, bei dem die Studenten Hilfen zum selbständigen Üben durch eine App erhalten. Durch die Überarbeitung des Kurses und den Einsatz der App konnte der Teilnehmerschwund verringert werden. Die Evaluationsergebnisse bestätigen eine hohe Akzeptanz der Neuerungen seitens der Studierenden. Erste Auswertungen von Ein- und Ausgangstests deuten darauf hin, dass durch den Brückenkurs eine Angleichung der Vorkenntnisse der Studienanfänger erreicht wird, da Teilnehmer mit geringeren Vorkenntnissen tendenziell einen größeren Lernfortschritt erreichen. Durch unterschiedliche Schwierigkeitsstufen und selbstregulierte Übungsphasen in individuellem Tempo können aber auch die Erfordernisse der stärkeren Teilnehmer angemessen berücksichtigt werden.
Im Projekt bwLehrpool wurde ein verteiltes System für die flexible Nutzung von Rechnerpools durch Desktop-Virtualisierung entwickelt. Auf Basis eines zentral gebooteten Linux- Grundsystems können beliebige virtualisierbare Betriebssysteme für Lehrund Prüfungszwecke zentral bereitgestellt und lokal auf den Maschinen aus-gewählt werden. Die verschiedenen Ar- beitsumgebungen müssen nicht mehr auf den PCs installiert werden und erlauben so eine multifunktionale Nutzung von PCs und Räumen für vielfältige Lehrund Lernszenarien sowie für elektronische Prüfungen. bwLehrpool abstrahiert von der PC-Hardware vor Ort und ermöglicht den Dozenten die eigene Gestaltung und Verwaltung ihrer Softwareumgebungen als Self-Service. Darüber hinaus fördert bwLehrpool den hochschulübergreifenden Austausch von Kursumgebungen.
With projectors and depth cameras getting cheaper, assistive systems in industrial manufacturing are becoming increasingly ubiquitous. As these systems are able to continuously provide feedback using in-situ projection, they are perfectly suited for supporting impaired workers in assembling products. However, so far little research has been conducted to understand the effects of projected instructions on impaired workers. In this paper, we identify common visualizations used by assistive systems for impaired workers and introduce a simple contour visualization. Through a user study with 64 impaired participants we compare the different visualizations to a control group using no visual feedback in a real world assembly scenario, i.e. assembling a clamp. Furthermore, we introduce a simplified version of the NASA-TLX questionnaire designed for impaired participants. The results reveal that the contour visualization is significantly better in perceived mental load and perceived performance of the participants. Further, participants made fewer errors and were able to assemble the clamp faster using the contour visualization compared to a video visualization, a pictorial visualization and a control group using no visual feedback.
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit (ALU) as well as the L1 and L2 cache which enables establishing multiple covert channels. Even virtualization which is known for its isolation of multiple machines is prone to covert and side-channel attacks due to the sharing of resources. Therefore itis not surprising that cloud computing is not immune to this kind of attacks. Even more, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of unwanted communication. In such a setting the ”air gap” between physical servers and networks disappears and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand we will provide a survey on weak spots an adversary trying to exfiltrate private data from target virtual machines could exploit in a cloud environment. We will evaluate the feasibility of example attacks and point out possible mitigation solutions if they exist.