Refine
Year of publication
- 2018 (84) (remove)
Document Type
- Conference Proceeding (84) (remove)
Conference Type
- Konferenzartikel (62)
- Konferenz-Abstract (14)
- Konferenz-Poster (3)
- Sonstiges (3)
- Konferenzband (2)
Keywords
- RoboCup (3)
- 5G mobile communication (2)
- Access protocols (2)
- Decoding (2)
- Gamification (2)
- Mikroelektronik (2)
- Multiuser detection (2)
- Payloads (2)
- Physical layer (2)
- access protocols (2)
- decoding (2)
- network coding (2)
- 3D-Druck von leitfähigen Materialien (1)
- 3D-Time-of-Flight Cameras (1)
- Affective Computing (1)
- Ageing (1)
- Assistive Technologies (1)
- Atrial fibrillation (1)
- Atrioventricular delay (1)
- Augmented Reality (1)
- Batteries (1)
- Biventricular pacing (1)
- CRC (1)
- Cardiac resynchronization therapy (1)
- CoBot (1)
- Context-awareness (1)
- Deaf-Blindness (1)
- Electrochemistry (1)
- Emotion Recognition (1)
- Energiemanagement (1)
- Energy Harvesting (EH) (1)
- Eyetracking, Technisches Zeichnen (1)
- FPGA (1)
- Finite element analysis (1)
- Flexibilisierung des Lernortes (1)
- Fractionated atrial signals (1)
- Fractionated ventricular signals (1)
- Gedruckte Elektronik (PE) (1)
- Gender in Science and Technology Studies (STS), digitalization, interactive documentary, participation (1)
- Greifsystemen (1)
- Harmonic analysis (1)
- Herzrhythmusmodell (1)
- Hochfrequenzablation (1)
- Human-Robot Collaboration (1)
- Intellectual Properties (1)
- Knowledge-based Innovation (1)
- Left atrial ECG (1)
- Left atrial delay (1)
- Left cardiac ECG (1)
- Lithium niobate (1)
- Lithium-ion battery (1)
- Low-Power-SoC-Systeme (1)
- MEMS (1)
- MPC (1)
- Mensch-Roboter-Kollaboration (1)
- Metallization (1)
- Mikrostruktur (1)
- Modelling (1)
- PV Applications, Smart PV, PV Battery Systems, PV Power Supplies (1)
- Photovoltaic (1)
- Plastizität (1)
- Rehabilitation (1)
- Roboter (1)
- Robotics (1)
- Robots (1)
- Safe Speed and Separation Monitoring. (1)
- Schaltungsdesign (1)
- Screencast (1)
- Signal averaging ECG (1)
- Simulation (1)
- Smart Grid (1)
- Smart wearables (1)
- Social Robots (1)
- Soft- und Hardcore-Prozessoren (1)
- Soziale Roboter (1)
- Spectral-temporal mapping (1)
- Stahl (1)
- Statistikvideos (1)
- Substrates (1)
- System-on-Chip (1)
- TRIZ (1)
- Tablet Lückenskript (1)
- Task Analysis (1)
- Transesophageal electrocardiography (1)
- Ventricular tachycardia (1)
- Videoclip (1)
- Wearables (1)
- Wishbone (1)
- accelerometer (1)
- cloud security (1)
- cluster (1)
- cross-industry innovation (1)
- cyclic plasticity (1)
- eco-innovation (1)
- elektrische Felder (1)
- gedruckter Sensorik (1)
- glass (1)
- gyroscope (1)
- hot work tool steel (1)
- inertial measurement unit (1)
- innovation management (1)
- kardiale Resynchronisationstherapie (1)
- laser material processing (1)
- machine learning (1)
- particle coarsening (1)
- pigment paste (1)
- printing technologies (1)
- process engineering (1)
- project-based learning (1)
- scanning electron microscope (SEM) (1)
- surface treatment (1)
- temperature dependency (1)
- thermische Felder (1)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (40)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (19)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (13)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (11)
- Fakultät Wirtschaft (W) (10)
- INES - Institut für nachhaltige Energiesysteme (7)
- ACI - Affective and Cognitive Institute (4)
- WLRI - Work-Life Robotics Institute (2)
- CRT - Campus Research & Transfer (1)
- Zentrale Einrichtungen (1)
Open Access
- Closed Access (43)
- Open Access (35)
- Bronze (7)
- Closed (6)
Implementierung von Softcore-Prozessoren und/oder weiteren IPs (Intellectual Property) in FPGAs
(2018)
Die zunehmende Integration von kompletten Systemen auf einem Chip (System-on-Chip, SoC) erfordert auch immer die Integration einer Recheneinheit bzw. eines Prozessorkerns. Möchte man insbesondere Low-Power-SoC-Systeme entwickeln, z.B. drahtlose Sensor-SoC-Systeme für Anwendungen im Rahmen von Industrie 4.0, ist die Implementierung eines solchen Prozessorkerns mit hohen Herausforderungen verbunden. Prinzipiell können hierfür verschiedene Ansätze verfolgt werden, nämlich die Implementierung einer Hardcore Prozessor-IP (IP = Intellectual Property) oder einer Softcore-Prozessor-IP. Im vorliegenden Beitrag wird zunächst auf den derzeitigen Stand der Technik verfügbarer Hardcore- oder Softcore-Prozessoren unter den Randbedingungen der Low-Power-Anforderungen und der weiten Verbreitung des Cores in industriellen Anwendungen eingegangen. Schließlich werden die Ergebnisse der Implementierung und Evaluierung eines derzeit frei verfügbaren 16-bit MSP430-kompatiblen Softcore Prozessors auf einem Altera-Cyclon-FPGA vorgestellt. Aus den Ergebnissen wird ein entsprechendes Fazit für die Implementierung von Low-Power-SoC-Systeme gegeben.
The economic dispatch (ED) problem is a large-scale optimization problem in electricity power grids. Its goal is to find a power output combination of all generator nodes that meet the demand of the customers at minimum operating cost. In recent years, distributed protocols have been proposed to replace the traditional centralized ED calculation for modern smart grid infrastructures with the most realistic being the one proposed by Binetti et al. (2014). However, we show that this protocol leaks private information of the generator nodes. We then propose a privacy-preserving distributed protocol that solves the ED problem. We analyze the security of our protocol and give experimental results from a prototype implementation to show the feasibility of the solution.
Optische Navigationssysteme weisen bisher eine eindeutige Trennung zwischen nachverfolgendem Gerät (Tool Tracker) und nachverfolgten Geräten (Tracked Tools) auf. In dieser Arbeit wird ein neues Konzept vorgestellt, dass diese Trennung aufhebt: Jedes Tracked Tool ist gleichzeitig auch Tool Tracker und besteht aus Marker-LEDs sowie mindestens einer Kamera, mit deren Hilfe andere Tracker in Lage und Orientierung nachverfolgt werden können. Bei Verwendung von nur einer Kamera geschieht dies mittels Pose Estimation, ab zwei Kameras werden die Marker-LEDs trianguliert. Diese Arbeit beinhaltet die Vorstellung des neuen Peer-To-Peer-Tracking-Konzepts, einen sehr schnellen Pose-Estimation-Algorithmus für beliebig viele Marker sowie die Klärung der Frage, ob die mit Pose Estimation erreichbare Genauigkeit vergleichbar mit der eines Stereo-Kamera-Systems ist und den Anforderungen an die chirurgische Navigation gerecht wird.
The CAN bus still is an important fieldbus in various domains, e.g. for in-car communication or automation applications. To counter security threats and concerns in such scenarios we design, implement, and evaluate the use of an end-to-end security concept based on the Transport Layer Security protocol. It is used to establish authenticated, integrity-checked, and confidential communication channels between field devices connected via CAN. Our performance measurements show that it is possible to use TLS at least for non time-critical applications, as well as for generic embedded networks.
The increase in households with grid connected Photovoltaic (PV) battery system poses challenge for the grid due to high PV feed-in as a result of mismatch in energy production and load demand. The purpose of this paper is to show how a Model Predictive Control (MPC) strategy could be applied to an existing grid connected household with PV battery system such that the use of battery is maximized and at the same time peaks in PV energy and load demand are reduced. The benefits of this strategy are to allow increase in PV hosting capacity and load hosting capacity of the grid without the need for external signals from the grid operator. The paper includes the optimal control problem formulation to achieve the peak shaving goals along with the experiment set up and preliminary experiment results. The goals of the experiment were to verify the hardware and software interface to implement the MPC and as well to verify the ability of the MPC to deal with the weather forecast deviation. A prediction correction has also been introduced for a short time horizon of one hour within this MPC strategy to estimate the PV output power behavior.
Implementation of interdisciplinary student teams in design education for additive manufacturing
(2018)
Additive manufacturing (AM) technologies are becoming increasingly popular in all areas of product development. Therefore, it is imperative that students be taught Design for AM. However, due to the rapid development of new methods and materials for AM, it does not make sense to only teach particular design guidelines, as these can quickly become obsolete. Rather, students should acquire the competence to develop guidelines themselves, that take into account the current state of the art. Thus, they will be able to react to changing processes and new materials
in the future. In order to convey the independent development of design guidelines for additive manufacturing by students, a new concept was developed, which is presented in this contribution. In this process, the learning goal is worked out by a group of students on the basis of a practical
task. The group consists of an interdisciplinary team in order to combine different competencies and to provide different perspectives on the task. A case study will show the design and manufacture of a miniature aircraft using Fused Layer Modelling. The aim of the development is above all the design for additive manufacturing. In addition, a low use of resources in combination with lightweight construction should be achieved. In the implementation of the task, the students are confronted with challenging aerodynamic design of wings as well as with the economic evaluation of the development process. An examination of the level of knowledge before and after the case study examines the learning success.
Uncontrollable manufacturing variations in electrical hardware circuits can be exploited as Physical Unclonable Functions (PUFs). Herein, we present a Printed Electronics (PE)-based PUF system architecture. Our proposed Differential Circuit PUF (DiffC-PUF) is a hybrid system, combining silicon-based and PE-based electronic circuits. The novel approach of the DiffC-PUF architecture is to provide a specially designed real hardware system architecture, that enables the automatic readout of interchangeable printed DiffC-PUF core circuits. The silicon-based addressing and evaluation circuit supplies and controls the printed PUF core and ensures seamless integration into silicon-based smart systems. Major objectives of our work are interconnected applications for the Internet of Things (IoT).
Vehicle-to-Everything (V2X) communication promises improvements in road safety and efficiency by enabling low-latency and reliable communication services for vehicles. Besides using Mobile Broadband (MBB), there is a need to develop Ultra Reliable Low Latency Communications (URLLC) applications with cellular networks especially when safety-related driving applications are concerned. Future cellular networks are expected to support novel latencysensitive use cases. Many applications of V2X communication, like collaborative autonomous driving requires very low latency and high reliability in order to support real-time communication between vehicles and other network elements. In this paper, we classify V2X use-cases and their requirements in order to identify cellular network technologies able to support them. The bottleneck problem of the medium access in 4G Long Term Evolution(LTE) networks is random access procedure. It is evaluated through simulations to further detail the future limitations and requirements. Limitations and improvement possibilities for next generation of cellular networks are finally detailed. Moreover, the results presented in this paper provide the limits of different parameter sets with regard to the requirements of V2X-based applications. In doing this, a starting point to migrate to Narrowband IoT (NB-IoT) or 5G - solutions is given.
The next generation cellular networks are expected to improve reliability, energy efficiency, data rate, capacity and latency. Originally, Machine Type Communication (MTC) was designed for low-bandwidth high-latency applications such as, environmental sensing, smart dustbin, etc., but there is additional demand around applications with low latency requirements, like industrial automation, driver-less cars, and so on. Improvements are required in 4G Long Term Evolution (LTE) networks towards the development of next generation cellular networks for providing very low latency and high reliability. To this end, we present an in-depth analysis of parameters that contribute to the latency in 4G networks along with a description of latency reduction techniques. We implement and validate these latency reduction techniques in the open-source network simulator (NS3) for narrowband user equipment category Cat-Ml (LTE-M) to analyze the improvements. The results presented are a step towards enabling narrowband Ultra Reliable Low Latency Communication (URLLC) networks.
The excessive control signaling in Long Term Evolution networks required for dynamic scheduling impedes the deployment of ultra-reliable low latency applications. Semi-persistent scheduling was originally designed for constant bit-rate voice applications, however, very low control overhead makes it a potential latency reduction technique in Long Term Evolution. In this paper, we investigate resource scheduling in narrowband fourth generation Long Term Evolution networks through Network Simulator (NS3) simulations. The current release of NS3 does not include a semi-persistent scheduler for Long Term Evolution module. Therefore, we developed the semi-persistent scheduling feature in NS3 to evaluate and compare the performance in terms of uplink latency. We evaluate dynamic scheduling and semi-persistent scheduling in order to analyze the impact of resource scheduling methods on up-link latency.
The Datagram Transport Layer Security (DTLS) protocol has been designed to provide end-to-end security over unreliable communication links. Where its connection establishment is concerned, DTLS copes with potential loss of protocol messages by implementing its own loss detection and retransmission scheme. However, the default scheme turns out to be suboptimal for links with high transmission error rates and low data rates, such as wireless links in electromagnetically harsh industrial environments. Therefore, in this paper, as a first step we provide an analysis of the standard DTLS handshake's performance under such adverse transmission conditions. Our studies are based on simulations that model message loss as the result of bit transmission errors. We consider several handshake variants, including endpoint authentication via pre-shared keys or certificates. As a second step, we propose and evaluate modifications to the way message loss is dealt with during the handshake, making DTLS deployable in situations which are prohibitive for default DTLS.
The Transport Layer Security (TLS) protocol is a cornerstone of secure network communication, not only for online banking, e-commerce, and social media, but also for industrial communication and cyber-physical systems. Unfortunately, implementing TLS correctly is very challenging, as becomes evident by considering the high frequency of bugfixes filed for many TLS implementations. Given the high significance of TLS, advancing the quality of implementations is a sustained pursuit. We strive to support these efforts by presenting a novel, response-distribution guided fuzzing algorithm for differential testing of black-box TLS implementations. Our algorithm generates highly diverse and mostly-valid TLS stimulation messages, which evoke more behavioral discrepancies in TLS server implementations than other algorithms. We evaluate our algorithm using 37 different TLS implementations and discuss―by means of a case study―how the resulting data allows to assess and improve not only implementations of TLS but also to identify underspecified corner cases. We introduce suspiciousness as a per-implementation metric of anomalous implementation behavior and find that more recent or bug-fixed implementations tend to have a lower suspiciousness score. Our contribution is complementary to existing tools and approaches in the area, and can help reveal implementation flaws and avoid regression. While being presented for TLS, we expect our algorithm's guidance scheme to be applicable and useful also in other contexts. Source code and data is made available for fellow researchers in order to stimulate discussions and invite others to benefit from and advance our work.