Refine
Document Type
- Conference Proceeding (213)
- Article (reviewed) (128)
- Bachelor Thesis (64)
- Master's Thesis (34)
- Article (unreviewed) (27)
- Patent (23)
- Letter to Editor (16)
- Book (12)
- Contribution to a Periodical (12)
- Doctoral Thesis (12)
Conference Type
- Konferenzartikel (183)
- Konferenz-Abstract (21)
- Sonstiges (5)
- Konferenz-Poster (2)
- Konferenzband (2)
Language
- English (373)
- German (189)
- Other language (1)
- Multiple languages (1)
- Russian (1)
Keywords
- Machine Learning (15)
- RoboCup (13)
- Deep Leaning (11)
- Götz von Berlichingen (11)
- neuroprosthetics (8)
- Deep learning (7)
- Medizintechnik (7)
- Blockchain (6)
- Internet of Things (6)
- Regelungstechnik (6)
- Robotik (6)
- machine learning (6)
- Handprothese (5)
- Heart rhythm model (5)
- Herzrhythmusmodell (5)
- IT-Sicherheit (5)
- Modeling and simulation (5)
- Simulation (5)
- neural networks (5)
- printed electronics (5)
- 3D-CAD (4)
- Augmented Reality (4)
- Data Science (4)
- Deep Learning (4)
- E-Fahrzeug (4)
- Embedded Systems (4)
- Energiemanagement (4)
- Iron Hand (4)
- Johann Sebastian Bach (4)
- Künstliche Intelligenz (4)
- Maschinelles Lernen (4)
- Robustness (4)
- Schluckspecht (4)
- Software (4)
- blockchain (4)
- hand prosthesis (4)
- 3D computer-aided design (3)
- Bildverarbeitung (3)
- Generative Adversarial Network (3)
- Hörgerät (3)
- IIoT (3)
- Internet der Dinge (3)
- IoT security (3)
- Programmiersprache (3)
- Radar (3)
- Rust (3)
- Security (3)
- Umweltforschung (3)
- Virtuelle Realität (3)
- Vorhofflimmern (3)
- amputee (3)
- artificial intelligence (3)
- bimodal hearing (3)
- biomaterials (3)
- catheter ablation (3)
- certificate management (3)
- cryptography (3)
- deep learning (3)
- heart rhythm model (3)
- image classification (3)
- programming (3)
- prosthesis (3)
- replica (3)
- security (3)
- sound localization (3)
- 3D multi-material polymer printing (2)
- 3D print (2)
- 3D printing (2)
- 3D-Druck (2)
- 5G (2)
- API (2)
- Ablation (2)
- Akustik (2)
- Aliasing (2)
- Architektur (2)
- Autoencoder (2)
- Automatisierungstechnik (2)
- Bearings (2)
- Bioimpedance measurement (2)
- Biomechanik (2)
- Biomechanische Stimulation (2)
- Blockchains (2)
- Brückenkurse (2)
- CNC (2)
- CNN (2)
- CNNs (2)
- Cardiac Resynchronization Therapy (2)
- Computer Vision (2)
- Computersicherheit (2)
- Cryoballoon catheter ablation (2)
- Current measurement (2)
- Data Mining (2)
- Deep Reinforcement Learning (2)
- Didaktik (2)
- Digital Twin (2)
- Digitale Lehre (2)
- Digitaler Zwilling (2)
- Digitaltechnik (2)
- E-Paper (2)
- Elektrofahrzeug (2)
- Elektromotor (2)
- Energie (2)
- Energy Flexibility (2)
- Energy management (2)
- Entkopplung (2)
- FEM (2)
- Featherweight Go (2)
- Felix Mendelssohn Bartholdy (2)
- Functional neuroimaging (2)
- GPU Computing (2)
- Geophysik (2)
- Hochschuldidaktik (2)
- Implantat (2)
- Informatik (2)
- Kalman Filter (2)
- Katheterablation (2)
- Kryoballonkatheter (2)
- Landwirtschaft (2)
- MATLAB (2)
- Mikroelektronik (2)
- Modellierung und Simulation (2)
- Myo-Hand (2)
- Myoelektrik (2)
- NB-IoT (2)
- NFC (2)
- Nachhaltigkeit (2)
- Neural networks (2)
- Neuronales Netz (2)
- Neurostimulation (2)
- Online-Marketing (2)
- Optimierung (2)
- Optimization (2)
- PKI (2)
- PUF key generation (2)
- Positron emission tomography (2)
- Predictive Maintenance (2)
- Predictive maintenance (2)
- Programmierung (2)
- Prothese (2)
- Prothetik (2)
- Pulmonalvenenisolation (2)
- RFID (2)
- Roboter (2)
- Röntgen (2)
- SLAM (2)
- Scalability (2)
- Schalllokalisation (2)
- Sicherheit (2)
- Stability (2)
- Stromregelung (2)
- Subspace Clustering (2)
- Substrates (2)
- Supraventricular tachycardia (2)
- Switches (2)
- Transfer learning (2)
- Triggerstabilität (2)
- UWB radars (2)
- Virtual Reality (2)
- Visualisierung (2)
- Webentwicklung (2)
- Zustandsraum (2)
- Zustandsregler (2)
- accountability (2)
- adversarial attacks (2)
- ancient Capua leg (2)
- anthropomorphic hand replacement (2)
- atrial fibrillation (2)
- augmented reality (2)
- autoattack (2)
- binaural hearing (2)
- cardiac ablation (2)
- cochlear implant (2)
- computer-aided design (2)
- convolutional neural networks (2)
- debinding (2)
- detection (2)
- efficient training (2)
- esophageal catheter (2)
- explainability (2)
- fairness (2)
- finite element method (2)
- hearing aid (2)
- heat pump (2)
- imaging algorithms (2)
- industrial communication (2)
- interactive visualization (2)
- interaural stimulation timing (2)
- medical imaging (2)
- microwave (2)
- molybdenum (2)
- peer-to-peer (2)
- physical unclonable function (2)
- physically unclonable function (PUF) (2)
- predictive maintenance (2)
- pulmonary vein isolation (2)
- resource efficiency (2)
- responsibility (2)
- scattering measurements (2)
- semantics (2)
- speech in noise (2)
- trust (2)
- understandability (2)
- visual control (2)
- zweite "Eiserne Hand" (2)
- 2-Phasen-Commit (1)
- 3D CAD (1)
- 3D Strukturlichtscanner (1)
- 3D light scanning (1)
- 3D multi-material printing (1)
- 3D-Modelling (1)
- 3D-Visualisierung (1)
- 3D-light scanning (1)
- 3D-print (1)
- 3d print (1)
- 5G mobile communication (1)
- 5G private networks (1)
- 65D17 (1)
- 65D18 (1)
- 68U05 (1)
- AC machines (1)
- AIN Cantilever (1)
- AR (1)
- AR glasses (1)
- ASP.NET Core (1)
- AV nodal reentry tachycardia (1)
- AV reentrant tachycardia (1)
- Abbildungsqualität (1)
- Abguss der Hand (1)
- Ablationstherapie (1)
- Ackermann-Formel (1)
- Ackermann´s formula (1)
- Additive Manufacturing (1)
- Adversarial Attacks (1)
- Adversarial Robustness (1)
- Adversarial examples (1)
- Adversarial robustness (1)
- Agent based sensor (1)
- Agrophotovoltaics (1)
- Air Pollution (1)
- Akrogerie (1)
- Algorithmus (1)
- Aluminum (1)
- Amazon Web Services (1)
- Amplitude and Phase Errors (1)
- Ancient Capua leg (1)
- Android (1)
- Angle of Arrival (1)
- Angular (1)
- Anlagenüberwachung (1)
- Antenna measurements (1)
- Antennas (1)
- Anti-Windup (1)
- Antriebsregelung (1)
- App-Store (1)
- Approximation (1)
- Archiv für Kriminologie (1)
- Artificial Intelligence (1)
- Artifizielle Kognition (1)
- Atrial fibrillation (1)
- Attention-basiert (1)
- Audiometrie (1)
- Audiosignalverarbeitung (1)
- Audioverarbeitung (1)
- Aufmerksamkeit (1)
- Augmented reality (1)
- Augmented-reality glasses (1)
- Aurikuläre Stimulation (1)
- Authentication (1)
- Authorization (1)
- AutoML (1)
- Automated idea generation (1)
- Automation (1)
- Automotive Radar (1)
- Autopsie (1)
- Azzolini degli Onesti (1)
- BIC (1)
- Bartolomeo da Varignana (1)
- Batterie (1)
- Batteriemanagementsystem (1)
- Battery storage (1)
- Bausteinsicht (1)
- Bearing fault classification (1)
- Becquerel (1)
- Benchmarks (1)
- Berühmte Komponisten (1)
- Berühmte Maler (1)
- Berühmte Persönlichkeiten (1)
- Beurteilung (1)
- Bewegung (1)
- Binaural hearing (1)
- Binder-based AM (1)
- Binder-basiertes AM (1)
- Bioimpedanzmessung (1)
- Biomimetics (1)
- Biosignalverstärker (1)
- Blockchain-to-Blockchain communication (1)
- BlueZ (1)
- Bluetooth (1)
- Bluetooth Low Energy (1)
- Bluetooth-Applikation (1)
- Bluetooth-Standard (1)
- Bodenradar (1)
- Boundary conditions (1)
- Bowtie antenna (1)
- Business Intelligence (1)
- CANoe (1)
- CANopen (1)
- CIoT (1)
- CLS-Management (1)
- CO2-Bilanz (1)
- Calibration (1)
- Capua-Bein (1)
- Carbon Footprint (1)
- Cardiac modelling (1)
- Cardiac resynchronization therapy (1)
- Carpe diem (1)
- Cellular networks (1)
- Cesare Lombroso (1)
- Challenges in Action Recognition (1)
- Chemical engineering (1)
- Christian von Mechel (1)
- Cleaning (1)
- Cloud Computing (1)
- Cloud computing (1)
- Cloud storage (1)
- Clustering (1)
- Cochlea-Implantate (1)
- Cochlear-Implantat (1)
- Code Visualisierung (1)
- Code visualization (1)
- Cognitive Computing (1)
- Collaboration of Academia and Industry (1)
- Compensation (1)
- Compiler (1)
- Composable Commerce (1)
- Computer science (1)
- Constrained Networks (1)
- Control Algorithms (1)
- Controller PFC100; 2 x ETHERNET (1)
- Convolutional Neural Network (1)
- Convolutional neural networks (1)
- Crash tests (1)
- Cross-Cloud-Strategie (1)
- Current Control (1)
- Current control (1)
- DC-AC converters (1)
- DTLS (1)
- Dampferzeugung (1)
- Data breech (1)
- Datenanalyse (1)
- Datenmanagement (1)
- Datenqualität (1)
- Deactivation/activation processes (1)
- Debinding (1)
- Decarbonization (1)
- Decoupling (1)
- Deep Learning Verfahren (1)
- Deep Neural Network (1)
- Deep diffusion models (1)
- Defibrillatortherapie (1)
- Demand side flexibility (1)
- DevExtreme (1)
- Device characterization (1)
- Diagnostics (1)
- Digital Beamforming (1)
- Digital Flex Twin Optimization (1)
- Digitale Fotografie (1)
- Digitale Turschilder (1)
- Digitalization (1)
- Discrete-time model (1)
- Diseases (1)
- Distributed Co-Simulation Protocol (1)
- Docker (1)
- Document Denoising (1)
- Domenico Scarlatti (1)
- Drehstrom (1)
- Drehstromantrieb (1)
- Drehzahlregelung (1)
- Druckmessung (1)
- Drucksensor (1)
- Durchflussmessung von Gasen (1)
- Durchlaufzeiten (1)
- E-Commerce System (1)
- E-Ink (1)
- E-Learning (1)
- EAP-Protokoll (1)
- EAP-TLS (1)
- EKF-SLAM (1)
- EKG (1)
- ERP-System (1)
- ESP-IDF (1)
- ETAP Simulations (1)
- ETL Data Pipeline (1)
- EU Timber Regulation (1)
- Echtzeitsystem (1)
- Eco-inventive principles (1)
- Economics (1)
- Edge AI (1)
- Edge Computing (1)
- Education (1)
- Effizienz (1)
- Ehlers-Danlos-Syndrom Typ IV (1)
- Eigenvalues (1)
- Eingabemethode (1)
- Eingebettete Systeme (1)
- Einkommensverhältnisse in der Barockzeit (1)
- Electric Tractors (1)
- Electric Vehicle (1)
- Electrical Engineering (1)
- Electrical and electronic engineering (1)
- Electrical drives (1)
- Electrode Model (1)
- Electromagnetic and thermal simulation (1)
- Electronic Commerce (1)
- Electronic Engineering (1)
- Elektroden-Interface (1)
- Elektromagnetische Reflexionsmethode (1)
- Elektromobilität (1)
- Elektroniksystem (1)
- Elektrophysiologie (1)
- Elektrophysiologische Untersuchung (1)
- Elektrotherapie (1)
- Embalming (1)
- Embedded (1)
- Embedded AI (1)
- Embedded Linux (1)
- Embedded Rust (1)
- Embedded System (1)
- Empfehlung (1)
- Empfehlungssysteme (1)
- Energieautark (1)
- Energiemarkt (1)
- Energiespeicherung (1)
- Energietechnik (1)
- Energieversorgung (1)
- Energiewende (1)
- Energiewirtschaft (1)
- Energiezelle (1)
- Energy Flexibility for Companies (1)
- Energy Harvesting (1)
- Energy Management (1)
- Energy Marketing of Industrial Flexibilities (1)
- Energy System Model (1)
- Energy Transition (1)
- Energy systems modeling (1)
- Energy-Harvesting (1)
- Entbinderung (1)
- Enterprise-Resource-Planning (1)
- Entropie (1)
- Entropy (1)
- Entscheidungslogik (1)
- Entwurfsmuster (1)
- Environmental monitoring (1)
- Erlang (1)
- Error (1)
- Erweiterte Realität (1)
- Esophageal catheter (1)
- Esophageal electrode (1)
- Estimation (1)
- Etylizer (1)
- Evaluation (1)
- Exoskelett (1)
- Explainable AI (1)
- Extensible Authentication Protocol (1)
- FDM-Technik (1)
- FFI (1)
- FLITZMO (1)
- FOTA (1)
- FUSION (1)
- Fahrerloses Transportsystem (1)
- Failure analysis (1)
- Famous composers (1)
- Fanny Hensel (1)
- Fault Classification (1)
- Fault classification (1)
- Federated Learning (1)
- Feldorientierung (1)
- Field Programmable Gate Array (FPGA) (1)
- Field-programmable gate array (FPGA) (1)
- Finite-Elemente-Methode (1)
- Firmware (1)
- Forschung (1)
- Fotografie (1)
- Fototechnik (1)
- Fotovoltaik (1)
- Framework (1)
- Freiheitsgrade (1)
- Funktionalismus (1)
- Furuta pendulum (1)
- Fused Filament Fabrication (1)
- Fußballroboter (1)
- Fußgängererkennung (1)
- Führungsentkopplung (1)
- Führungsgrößenkorrektur (1)
- GPR (1)
- Ganganalyse (1)
- General Energy (1)
- Generative models (1)
- Generics (1)
- Genetic Algorithm (1)
- Genetischer Algorithmus (1)
- Gesicht / Mustererkennung (1)
- Gesichtserkennung (1)
- Giftmord (1)
- Glasfaser (1)
- Gleichstrom (1)
- Go (1)
- Green House effect (1)
- Grinding machines (1)
- Ground penetrating radar (1)
- HF Ablation (1)
- HWS-Schleudertrauma (1)
- Halbleitertechnologie (1)
- Hals-Nasen-Ohren-Heilkunde (1)
- Halswirbelsäule (1)
- Handschrift (1)
- Handswritten Character Recognition (1)
- Handynacken (1)
- Hannes hand (1)
- Hard rock (1)
- Hardware (1)
- Hardware Security (1)
- Harmonic analysis (1)
- Head-mounted Display (1)
- Heart Rhythm Model (1)
- Heart Rhythm Simulation (1)
- Heart rhythm simulation (1)
- Hemodynamic monitoring (1)
- Herzfehler (1)
- Herzfrequenzvariabilität (1)
- Herzkatheterablation (1)
- Herzschrittmachertherapie (1)
- Heuristic algorithms (1)
- High frequency ablation (1)
- Higher Education (1)
- Hirnstammessung (1)
- His-Bundle Pacing (1)
- His-bundle pacing (1)
- Hocheffizienzfahrzeug (1)
- Hochschule (1)
- Hochschullehre (1)
- Hochspannung (1)
- Horaz (1)
- Hot-Spot (1)
- Hybrid Vehicle (1)
- Hybrid system (1)
- Hybride Lehre (1)
- Hybrides Lehren und Lernen (1)
- Hydrokultur (1)
- Hydroponic Farming (1)
- Hydrosphygmograph (1)
- Hyperparameter (1)
- Hörforschung (1)
- Hörgeräte (1)
- Hörsystem (1)
- IEC/IEEE 60802 security (1)
- IEEE802.15.4 (1)
- Impedanzkardiografie (1)
- Implantierbare Neurostimulatoren (1)
- InceptionTime (1)
- Induktive Schnittstelle (1)
- Industrial Blockchain (1)
- Industrial internet of things (1)
- Industrie 4.0 (1)
- Industrie 4.0 Software (1)
- Industry 4.0 (1)
- Industry Use cases (1)
- Industry automation (1)
- Inertial (1)
- Infrarot-Spektroskopie (1)
- Ink (1)
- Integration (1)
- Integrierte Schaltung (1)
- Intelligentes Messsystem (1)
- Intelligentes Stromnetz (1)
- Intermediate domain (1)
- Interoperability (1)
- Inventive principles (1)
- Inventive problem solving (1)
- Inverters (1)
- IoT (1)
- IoT Security (1)
- Island Architecture (1)
- JavaScript (1)
- JavaScript Frameworks (1)
- Jitter (1)
- Kamera-Tracking (1)
- Kamerasystem (1)
- Kanalisation (1)
- Key (1)
- Kindersterblichkeit (1)
- Klassifikation (1)
- Kognitionswissenschaften (1)
- Kognitive Kybernetik (1)
- Kommunikationsprotokoll (1)
- Konfigurationen (1)
- Konnektionismus (1)
- Konsensbildung (1)
- Konstruktivismus (1)
- Kriminalanthropologie (1)
- Kriminaltechnik (1)
- Kriminologie (1)
- LINUX (1)
- LOAM (LiDAR odometry and mapping) (1)
- LPWAN (1)
- LQR (1)
- LSTM (1)
- LabVIEW Programmierung (1)
- Large Grid-Connected PV Systems (1)
- Last-Test (1)
- Laufen lernen (1)
- Laufzeitsicht (1)
- Lecture Tracking (1)
- Left Atrial Appendage Closure (1)
- Lehr-/Lernkonzepte (1)
- Lehrmittel (1)
- Lehrszenarien (1)
- Leistungsbedarf (1)
- Leistungselektronik (1)
- Leonardo da Vinci (1)
- LiDAR (1)
- Lichtsetzung (1)
- Limiting (1)
- Linear MPC (1)
- Linux (1)
- LoRaWAN (1)
- Load Flow Analysis (1)
- Logic gates (1)
- Lokalisation (1)
- Lokalisationstest (1)
- Long Term Evolution (1)
- Low Carbon network (1)
- Low-Cost Füllstandssensor (1)
- Low-Power (1)
- Low-latency (1)
- Luftschadstoffprognose (1)
- Luftschiff (1)
- Luftverunreinigender Stoff (1)
- LwM2M (1)
- Lügendetektor (1)
- M. Pick (1)
- MEMS (1)
- MIMO (1)
- MINT (1)
- MLOps (1)
- MPC (1)
- MVC (1)
- Machine learning (1)
- Machine-learning (1)
- Magnetic resonance (1)
- Magnetic sensors (1)
- Management (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Marfan-Syndrom (1)
- Marketing (1)
- Maschinelles Sehen (1)
- Material Flow (1)
- Materialfluss (1)
- Mathematik (1)
- Maurice Ravel (1)
- Maßstab (1)
- Mean Square Error (1)
- Measurement (1)
- Mechanik (1)
- Medizingeschichte (1)
- Medizinprodukterecht (1)
- Mehrgrößenregelung (1)
- Memento mori! (1)
- Messbereichserweiterung (1)
- Messstellenbetriebsgesetz (1)
- Metaprogrammierung (1)
- Micro-electromechanical system (1)
- Microcontroller (1)
- Microgrid(s) (1)
- Microservice (1)
- Microsoft dot net (1)
- Microtunnelling (1)
- Mikrocontroller (1)
- Mikrocontroller ESP32 (1)
- Mikroprozessor (1)
- Mikroservice (1)
- Mild traumatic brain injury (1)
- Mobilfunk (1)
- Mode Collapse (1)
- Model Calibration (1)
- Model Predictive Control (1)
- Model Search (1)
- Model-View-Controller (1)
- Modellierung (1)
- Modellprädiktive Regelung (1)
- Moderne Messeinrichtung (1)
- Mona Lisa (1)
- Monitoring (1)
- Monocular Depth Estimation (1)
- Monte-Carlo (1)
- Monte-Carlo Simulation (1)
- Monte-Carlo method (1)
- Multi-task learning (1)
- Multiside heart stimulation (1)
- Mumie (1)
- Mumifizierung von Leichen (1)
- Mummy (1)
- Musik (1)
- MySQL (1)
- NETCONF security (1)
- Nahfeldkommunikation (1)
- Naming Game (1)
- Nature-inspired principles (1)
- Natürliche Kognition (1)
- Network Test (1)
- Netzintegration (1)
- Netzwerk (1)
- Netzüberwachung (1)
- Neural Architecture Search (1)
- Neuroakustik (1)
- Neurologie (1)
- Neuroprothetics (1)
- Neurosyphilis (1)
- Nicolo Paganini (1)
- Noise measurement (1)
- Nyquist-Shannon (1)
- OT security (1)
- OTA (1)
- OTRS (1)
- Octave Convolution (1)
- Ofenparametrisierung (1)
- Okkluder (1)
- Online Lehre (1)
- Open Mobile Alliance (1)
- Optical Fiber Network (1)
- Optical Network (1)
- Optimisation (1)
- Optimization and control (1)
- Optimization with Digital Twins (1)
- Optische Zeichenerkennung (1)
- Organic electronics (1)
- Otto Lilienthal (1)
- PI control (1)
- PLA-Filamente (1)
- PROFINET (1)
- PROFINET IO (1)
- PROFINET Security (1)
- PV (1)
- PV System (1)
- PV power forecast (1)
- PV-Module (1)
- PWA (1)
- Parallelization (1)
- Parameter Estimation (1)
- Parameter estimation (1)
- Parameteridentifikation (1)
- Particle swarm optimization (1)
- Passives System (1)
- Pathophysiologie (1)
- Pattern Recognition (1)
- Peak shaving (1)
- Peer to peer network (1)
- Penetration prediction (1)
- Perfomance-Test (1)
- Performance (1)
- Performance Monitoring (1)
- Performance evaluation (1)
- Permanent magnet machines (1)
- Personalized prostheses (1)
- Photovoltaik (1)
- Physical Distancing (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Physically Unclonable Function (1)
- Physiological Pacing (1)
- Physiological cardiac pacing (1)
- Pierre-Marie-Bamberger syndrome (1)
- Plattform (1)
- Polvorgabe (1)
- Polygraph (1)
- Positionsschätzung (1)
- Power Consumption (1)
- Power Loss (1)
- Predictions (1)
- Predictive Control (1)
- Predictive Models (1)
- Printed Electronics (1)
- Process design (1)
- Production (1)
- Produktion (1)
- Prognose (1)
- Programmablauf (1)
- Programming Languages (1)
- Progressive Web App (1)
- Prothesen und Implantate (1)
- Proximal Policy Optimization (1)
- Prozessatmosphären (1)
- Prüfstand (1)
- Public-Key-Infrastructure (1)
- Pulmonary Vein Isolation (PVI) (1)
- Pulmonary vein isolation (1)
- Pulse width modulation (1)
- Python (1)
- Python Visualisierung (1)
- Python visualization (1)
- RFID-/NFC-Ausleseschnittstelle (1)
- ROS (1)
- RTK (1)
- RUL (1)
- RabbitMQ (1)
- Radio frequency (1)
- Radiofrequency identification (1)
- Random call model (1)
- Real-Time Communication (1)
- Recommendations (1)
- Reduktionismus (1)
- Regelung (1)
- Regler-Windup (1)
- Regression (1)
- Regularization (1)
- Rehabilitation (1)
- Reinforcement Learning (1)
- Reinforcement learning (1)
- Rekonstruktion (1)
- Rektifizierung (1)
- Remaining useful life (1)
- Renewable Energy Markets (1)
- Representation Learning (1)
- ResNet (1)
- Resistance (1)
- Rest (1)
- Restbussimulation (1)
- Richtmikrofon (1)
- Riefelharnisch (1)
- Road-Quality Prediction (1)
- Robert Schumann (1)
- RoboCup3D (1)
- Robot Inertia Parameter Identification (1)
- Robotic (1)
- Rosalia Lombardo (1)
- Rotation Matrix (1)
- Rotational pendulum (1)
- Rotors (1)
- Roubst overfitting (1)
- Rückstellmechanismus (1)
- SOA (1)
- SPS-Programmierung (1)
- SSH (1)
- Sampling (1)
- Schaltwerk (1)
- Schlüssel (1)
- Schnittstelle (1)
- Schulprojekt (1)
- Schädel-Hirn-Trauma (1)
- Scientific Reports (1)
- Second Iron Hand (1)
- Second-order Optimization (1)
- Seismic processing (1)
- Self-Calibration (1)
- Semiconductor Device (1)
- Semiconductor device measurement (1)
- Sensopart Kamera: VISOR V20 Robotic Advanced (1)
- Sensor phenomena and characterization (1)
- Sequenzielle Schaltung (1)
- Service Worker (1)
- Shell Eco-marathon (1)
- Siamesische Neuronale Netze (1)
- Simulation und Modellierung (1)
- Sintering (1)
- Skelett (1)
- Small Talk (1)
- Smart City (1)
- Smart Energy Metering (1)
- Smart Gardening (1)
- Smart Grids (1)
- Smart Home (1)
- Smart Load Management (1)
- Smart Meter Gateway (1)
- Smart metering (1)
- Smart-UPS (1)
- SmartMAC (1)
- Smartphone (1)
- Social Distancing (1)
- Software Integration (1)
- Software algorithms (1)
- Software for measurements (1)
- Softwareanforderungen (1)
- Softwarearchitektur (1)
- Softwaredokumentation (1)
- Softwareentwicklung (1)
- Solar Radiation (1)
- Soziale Netzwerke (1)
- Spacial Anchors (1)
- Spielstrategie (1)
- Spinal cord stimulation (1)
- Split-Manufacturing (1)
- Sprachwahrnehmung (1)
- Stabilisierung (1)
- Stand Alone (1)
- Static interaural time offsets (1)
- Station Festo Pick&Place (1)
- Stellgrößenbegrenzung (1)
- Steuerbarkeit (1)
- Steuereinheit (1)
- Steuerung (1)
- Strahlfertigungsverfahren (1)
- Strecken-Windup (1)
- Stromregelung von Drehstromantrieben (1)
- Stromversorgungsnetz (1)
- Stromzustandsregler (1)
- Struma (1)
- Studieneingangsphase (1)
- Störgrößenbeobachter (1)
- Störmodell (1)
- Subarachnodialblutung (1)
- Supraventrikuläre Tachyarrhythmien (1)
- Sustainability (1)
- Sustainable technology (1)
- Synchronisation (1)
- Synchronmaschine (1)
- Synthetischer Datensatz (1)
- Systemarchäologie (1)
- Systematic innovation (1)
- Systemintegration (1)
- Szenenanalyse (1)
- TBM performance (1)
- TCP/IP, Modbus-TCP (1)
- TLS (1)
- TRIZ methodology (1)
- TSN security (1)
- Teensy 4.1 (1)
- Test (1)
- Testablauf (1)
- Testbed (1)
- Testen (1)
- Testsystem (1)
- Ticketingsystem (1)
- Time Sensitive Networking (1)
- Time Series Classification (1)
- Time Synchronization (1)
- Time series data (1)
- Time-series Classification (1)
- TinyML (1)
- Tool Center Point (1)
- Torque (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Transesophageal left atrial pacing (1)
- Transesophageal neurostimulation (1)
- Transformer (1)
- Transösophageale Neurostimulation (1)
- Triangulation (1)
- Triangulation Camera (1)
- Trust management (1)
- Trägheitsparameteridentifikation (1)
- URLLC (1)
- Ultra-Low Energy (1)
- Ultra-Low-Power (1)
- Umwelterziehung (1)
- Unreal Engine (1)
- Unsupervised Conditional Training (1)
- Unsupervised Learning (1)
- Unterrichtsmethode (1)
- Unterschenkelprothese (1)
- Update (1)
- Utility tunnelling (1)
- V2X (1)
- VANET (1)
- Variational Autoencoders (1)
- Verfahren (1)
- Vergiftungsfälle (1)
- Vergänglichkeit (1)
- Verkehr (1)
- Verstärker (1)
- Vesuvius eruption (1)
- Vierquadrantensteller (1)
- Virtuelle Akustik (1)
- Visual Analytics (1)
- Visual Components (1)
- Visual control (1)
- Vitalparametern bei Kleinstlebewesen (1)
- Voltage measurement (1)
- Vorhofseptumdefekt (1)
- Vorkurse (1)
- Vue (1)
- Web development (1)
- Webserver Perfomance (1)
- Whiplash injury (1)
- Whiplash-associated disorders (1)
- Wilhelm His Sr. (1)
- Wireless IoT (1)
- Wireless Sensor Nodes (1)
- Wireless Technology (1)
- Wissenschaftsphilosophie (1)
- Wärmepumpen (1)
- X-in-the-loop (1)
- Yolov5 (1)
- Zentrale Sauerstoffversorgung (1)
- Zertifikate (1)
- Zumi (1)
- Zwei-Faktor-Authentifizierung (1)
- Zweite "Eiserne Hand" (1)
- accelerometer (1)
- adversarial (1)
- adversarial detection (1)
- aerosol modeling (1)
- agile Softwarearchitektur (1)
- air raid of the Royal College of Surgeons London (1)
- ambiguity (1)
- analog physical unclonable function system (1)
- anisotropy (1)
- anthropology (1)
- anthropomorphic replacement hand (1)
- arc42-Template (1)
- artificial neural networks (1)
- assessment (1)
- atrial flutter (1)
- atrial septal defect (1)
- attribute manipulation (1)
- audiometry (1)
- auditorisch evozierte Potentiale (1)
- auditory model (1)
- augmented reality glasses (1)
- authentication (1)
- authorization (1)
- autoML (1)
- autonomous systems (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- biocompatibility test (1)
- biodegradable (1)
- biodegradable implants (1)
- biomechanical stimulation (1)
- bionics (1)
- blockchain-based system (1)
- brain vitrification (1)
- building management systems (1)
- camera-based navigation (1)
- cellular metals (1)
- cellular radio (1)
- cifar (1)
- climate emulation (1)
- composite materials (1)
- compression (1)
- computer graphics (1)
- computer network management (1)
- computer vision (1)
- consensus + innovations (1)
- contour lines (1)
- copper oxide (1)
- correlation (1)
- craniomaxillofacial surgery (1)
- credentials (1)
- crossbar (1)
- curb (1)
- curriculum learning (1)
- cybersecurity (1)
- data quality (1)
- deep reinforcement learning (1)
- defense (1)
- degradation stages (1)
- degrees of freedom (1)
- device closure (1)
- device delay mismatch (1)
- dictionary passing (1)
- digitaler Zwilling (1)
- diode modeling (1)
- distributed energy resources (1)
- distributed ledger (1)
- drumstick fingers (1)
- echocardiography (1)
- economic dispatch (1)
- effective medium theory (1)
- electric machine (1)
- electrical conductivity (1)
- electricity market (1)
- electrode-free (1)
- electrolyte-gated transistors (1)
- electrolytic cell (1)
- electrophysiological investigation (1)
- embedded systems (1)
- energy harvesting (1)
- engine-in-the-loop (1)
- eurocity persons (1)
- exoskeleton (1)
- face editing (1)
- face recognition (1)
- fail-operational (1)
- fingerprinting (1)
- first Röntgen picture (1)
- first iron hand (1)
- fourier (1)
- framework (1)
- frühe Neuzeit (1)
- furnace parameterization (1)
- game theory (1)
- gan (1)
- gedruckte Elektronik (1)
- generative adversarial networks (1)
- gossip protocol (1)
- ground penetrating radar (1)
- hair (1)
- hand prostheses (1)
- hand prosthetic (1)
- hardware-in-the-loop (1)
- heart rhythm simulation (1)
- height estimation (1)
- hieroglyphs (1)
- history-inspired (1)
- home automation (1)
- hybrid electric vehicle (1)
- hybrid networks (1)
- hybrid systems (1)
- hämodynamische Parameter (1)
- identification (1)
- image color analysis (1)
- image processing (1)
- imagenet (1)
- impedance cardiography (1)
- in-vitro Simulation (1)
- indium oxide (1)
- industrial Ethernet (1)
- industrial IoT (1)
- infrared spectroscopy (1)
- input-output decoupling (1)
- integer linear programming (1)
- intelligent neuroprosthetics (1)
- intermediate domain (1)
- internal combustion engine (1)
- interpretation (1)
- invasive (1)
- irrigation (1)
- isocontour lines (1)
- isocontouring (1)
- isocontours (1)
- isosurfaces (1)
- lageunabhängigkeit (1)
- legacy machines (1)
- level set (1)
- lid (1)
- lifelong learning (1)
- linguistics (1)
- lithium-ion battery (1)
- low-cost sensors and devices (1)
- lower limb prosthesis (1)
- maceration, vessel elements (1)
- machine-to-machine communication (1)
- mahalanobis (1)
- maintenance (1)
- manufacturing industries (1)
- manufacturing process (1)
- mapping (1)
- marching cubes (1)
- marching tetrahedra (1)
- matrix modules (1)
- mechanical properties (1)
- medical history (1)
- metal oxide reduction (1)
- metal oxide transistor (1)
- metaprogramming (1)
- micro-photovoltaic system (1)
- millimeter-wave (1)
- mobile robotics (1)
- model predictive control (1)
- model-predictive control (1)
- mold (1)
- multipath (1)
- multivariable control (1)
- musical history (1)
- mutual authentication (1)
- natürliche Leistung (1)
- navigation (1)
- network optimization (1)
- neural architecture search (1)
- neurology (1)
- nicht-invasives Messsystem (1)
- nickel oxide (1)
- noise measurement (1)
- non-invasive (1)
- nose (1)
- ns-3 (1)
- oil painting (1)
- open fitting (1)
- optimization (1)
- osseointegration (1)
- osteosynthesis (1)
- oxide electronics (1)
- oxygen membrane (1)
- pandemics (1)
- parking (1)
- partial shading (1)
- pattern recognition (1)
- pedestrian detection (1)
- perception (1)
- percolation (1)
- performance (1)
- personalization (1)
- physics-informed ML (1)
- plague (1)
- pn-diode (1)
- pole placement (1)
- pose estimation (1)
- powertrain testing (1)
- precision medicine (1)
- predictive control (1)
- primary authentication (1)
- primary progressive aphasia (1)
- primäre progrediente Aphasie (1)
- printed Antennas (1)
- process atmosphere (1)
- programming languages (1)
- proof-of-concept study (1)
- prostheses (1)
- prosthetics (1)
- pruning (1)
- quality feedback survey and results assessment (1)
- radiation protection (1)
- radio networks (1)
- random resistor networks (1)
- ray tracing (1)
- real-time system (1)
- real-time systems (1)
- rekeying (1)
- remaining useful life (1)
- renewable energy (1)
- robustness (1)
- sample‐to‐sample fluctuation (1)
- scalability (1)
- scalar fields (1)
- second "Iron Hand" (1)
- secure communication (1)
- security keys (1)
- seismic (1)
- semf (1)
- sensor and actuator networks (1)
- sensory feedback (1)
- septal occluder device (1)
- sharding algorithm (1)
- shingle solar cells (1)
- shop floor (1)
- short-term solar forecast (1)
- silicone (1)
- single-sign-on (1)
- sintering (1)
- skin cancer (1)
- skin cancer detection (1)
- smalltalk (1)
- software defined radio (1)
- solar module (1)
- sparse backpropagation (1)
- spatial release from maskin (1)
- spectral defense (1)
- spectraldefense (1)
- speech intelligibility model (1)
- spinal cord stimulation (1)
- split manufacturing (1)
- statistical methods, ROS (1)
- stochastic approach (1)
- stochastic computing (1)
- storage efficiency (1)
- storage optimization (1)
- style (1)
- style transfer (1)
- summarization (1)
- surface nets (1)
- surgical navigation (1)
- syndrome coding (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature sensor (1)
- tessellation (1)
- test bench (1)
- test bench coupling (1)
- thermoelectrics (1)
- thickness estimation (1)
- thinned ASIC in foil (1)
- throughput (1)
- titanium (1)
- titanium fibers (1)
- topology (1)
- tracking (1)
- transesophageal electrical pacing (1)
- transesophageal neurostimulation (1)
- transfer learning (1)
- transmit beamforming (1)
- triangulation (1)
- trust management (1)
- trust management system (1)
- trustworthy ai (1)
- unilateral hearing loss (1)
- unique interdisciplinary international higher education approach (1)
- universal Roboter UR5e (1)
- upper limb (1)
- ventricular tachycardia (1)
- virtual simulations (1)
- visual analytics (1)
- visualization (1)
- visuelle Steuerung (1)
- watch glass nails (1)
- wide area networks (1)
- wireless sensor networks (1)
- wood identification (1)
- z-Transformation (1)
- zeitdiskrete Regelverfahren (1)
- zeitdiskreter PI-Zustandsregler (1)
- zeros (1)
- zweistufiger Beobachterentwurf (1)
- Ösophaguselektrodensonde (1)
- Ösophaguskatheter (1)
- Übersetzungsstrategie (1)
- übertragbare Wirkleistung (1)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (565) (remove)
Open Access
- Open Access (251)
- Closed Access (181)
- Closed (121)
- Bronze (54)
- Diamond (31)
- Gold (29)
- Grün (3)
- Hybrid (3)
Solar energy plays a central role in the energy transition. Clouds generate locally large fluctuations in the generation output of photovoltaic systems, which is a major problem for energy systems such as microgrids, among others. For an optimal design of a power system, this work analyzed the variability using a spatially distributed sensor network at Stuttgart Airport. It has been shown that the spatial distribution partially reduces the variability of solar radiation. A tool was also developed to estimate the output power of photovoltaic systems using irradiation time series and assumptions about the photovoltaic sites. For days with high fluctuations of the estimated photovoltaic power, different energy system scenarios were investigated. It was found the approach can be used to have a more realistic representation of aggregated PV power taking spatial smoothing into account and that the resulting PV power generation profiles provide a good basis for energy system design considerations like battery sizing.
With the expansion of IoT devices in many aspects of our life, the security of such systems has become an important challenge. Unlike conventional computer systems, any IoT security solution should consider the constraints of these systems such as computational capability, memory, connectivity, and power consumption limitations. Physical Unclonable Functions (PUFs) with their special characteristics were introduced to satisfy the security needs while respecting the mentioned constraints. They exploit the uncontrollable and reproducible variations of the underlying component for security applications such as identification, authentication, and communication security. Since IoT devices are typically low cost, it is important to reuse existing elements in their hardware (for instance sensors, ADCs, etc.) instead of adding extra costs for the PUF hardware. Micro-electromechanical system (MEMS) devices are widely used in IoT systems as sensors and actuators. In this thesis, a comprehensive study of the potential application of MEMS devices as PUF primitives is provided. MEMS PUF leverages the uncontrollable variations in the parameters of MEMS elements to derive secure keys for cryptographic applications. Experimental and simulation results show that our proposed MEMS PUFs are capable of generating enough entropy for a complex key generation, while their responses show low fluctuations in different environmental conditions.
Keeping in mind that the PUF responses are prone to change in the presence of noise and environmental variations, it is critical to derive reliable keys from the PUF and to use the maximum entropy at the same time. In the second part of this thesis, we elaborate on different key generation schemes and their advantages and drawbacks. We propose the PUF output positioning (POP) and integer linear programming (ILP) methods, which are novel methods for grouping the PUF outputs in order to maximize the extracted entropy. To implement these methods, the key enrollment and key generation algorithms are presented. The proposed methods are then evaluated by applying on the responses of the MEMS PUF, where it can be practically shown that the proposed method outperforms other existing PUF key generation methods.
The final part of this thesis is dedicated to the application of the MEMS PUF as a security solution for IoT systems. We select the mutual authentication of IoT devices and their backend system, and propose two lightweight authentication protocols based on MEMS PUFs. The presented protocols undergo a comprehensive security analysis to show their eligibility to be used in IoT systems. As the result, the output of this thesis is a lightweight security solution based on MEMS PUFs, which introduces a very low overhead on the cost of the hardware.
The number of use cases for autonomous vehicles is increasing day by day especially in commercial applications. One important application of autonomous vehicles can be found within the parcel delivery section. Here, autonomous cars can massively help to reduce delivery efforts and time by supporting the courier actively. One important component of course is the autonomous vehicle itself. Nevertheless, beside the autonomous vehicle, a flexible and secure communication architecture also is a crucial key component impacting the overall performance of such system since it is required to allow continuous interactions between the vehicle and the other components of the system. The communication system must provide a reliable and secure architecture that is still flexible enough to remain practical and to address several use cases. In this paper, a robust communication architecture for such autonomous fleet-based systems is proposed. The architecture provides a reliable communication between different system entities while keeping those communications secure. The architecture uses different technologies such as Bluetooth Low Energy (BLE), cellular networks and Low Power Wide Area Network (LPWAN) to achieve its goals.
The desire to connect more and more devices and to make them more intelligent and more reliable, is driving the needs for the Internet of Things more than ever. Such IoT edge systems require sound security measures against cyber-attacks, since they are interconnected, spatially distributed, and operational for an extended period of time. One of the most important requirements for the security in many industrial IoT applications is the authentication of the devices. In this paper, we present a mutual authentication protocol based on Physical Unclonable Functions, where challenge-response pairs are used for both device and server authentication. Moreover, a session key can be derived by the protocol in order to secure the communication channel. We show that our protocol is secure against machine learning, replay, man-in-the-middle, cloning, and physical attacks. Moreover, it is shown that the protocol benefits from a smaller computational, communication, storage, and hardware overhead, compared to similar works.
Die Erfindung betrifft ein Verfahren zum Maximieren der von einer analogen Entropiequelle abgeleiteten Entropie, wobei das Verfahren folgende Schritte aufweist:- Bereitstellen von Eingabedaten für die analoge Entropiequelle (2);- Erzeugen von Rückgabewerten durch die analoge Entropiequelle basierend auf den Eingabedaten (3); und- Gruppieren der Rückgabewerte, wobei das Gruppieren der Rückgabewerte ein Anwenden von Versätzen auf Rückgabewerte aufweist (4).
In recent years, Physical Unclonable Functions (PUFs) have gained significant attraction in the Internet of Things (IoT) for security applications such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of physical devices to generate unique fingerprints for security applications. One common approach for designing PUFs is exploiting the intrinsic features of sensors and actuators such as MEMS elements, which typically exist in IoT devices. This work presents the Cantilever-PUF, a PUF based on a specific MEMS device – Aluminum Nitride (AlN) piezoelectric cantilever. We show the variations of electrical parameters of AlN cantilevers such as resonance frequency, electrical conductivity, and quality factor, as a result of uncontrollable manufacturing process variations. These variations, along with high thermal and chemical stability, and compatibility with silicon technology, makes AlN cantilever a decent candidate for PUF design. We present a cantilever design, which magnifies the effect of manufacturing process variations on electrical parameters. In order to verify our findings, the simulation results of the Monte Carlo method are provided. The results verify the eligibility of AlN cantilever to be used as a basic PUF device for security applications. We present an architecture, in which the designed Cantilever-PUF is used as a security anchor for PUF-enabled device authentication as well as communication encryption.
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT security applications, such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of different devices to generate unique fingerprints for security applications. When generating PUF-based secret keys, the reliability and entropy of the keys are vital factors. This study proposes a novel method for generating PUF-based keys from a set of measurements. Firstly, it formulates the group-based key generation problem as an optimization problem and solves it using integer linear programming (ILP), which guarantees finding the optimum solution. Then, a novel scheme for the extraction of keys from groups is proposed, which we call positioning syndrome coding (PSC). The use of ILP as well as the introduction of PSC facilitates the generation of high-entropy keys with low error correction costs. These new methods have been tested by applying them on the output of a capacitor network PUF. The results confirm the application of ILP and PSC in generating high-quality keys.
Physical unclonable functions (PUFs) are increasingly generating attention in the field of hardware-based security for the Internet of Things (IoT). A PUF, as its name implies, is a physical element with a special and unique inherent characteristic and can act as the security anchor for authentication and cryptographic applications. Keeping in mind that the PUF outputs are prone to change in the presence of noise and environmental variations, it is critical to derive reliable keys from the PUF and to use the maximum entropy at the same time. In this work, the PUF output positioning (POP) method is proposed, which is a novel method for grouping the PUF outputs in order to maximize the extracted entropy. To achieve this, an offset data is introduced as helper data, which is used to relax the constraints considered for the grouping of PUF outputs, and deriving more entropy, while reducing the secret key error bits. To implement the method, the key enrollment and key generation algorithms are presented. Based on a theoretical analysis of the achieved entropy, it is proven that POP can maximize the achieved entropy, while respecting the constraints induced to guarantee the reliability of the secret key. Moreover, a detailed security analysis is presented, which shows the resilience of the method against cyber-security attacks. The findings of this work are evaluated by applying the method on a hybrid printed PUF, where it can be practically shown that the proposed method outperforms other existing group-based PUF key generation methods.
This thesis focuses on the development and implementation of a Datagram Transport Layer Security (DTLS) communication framework within the ns-3 network simulator, specifically targeting the LoRaWAN model network. The primary aim is to analyse the behaviour and performance of DTLS protocols across different network conditions within a LoRaWAN context. The key aspects of this work include the following.
Utilization of ns-3: This thesis leverages ns-3’s capabilities as a powerful discrete event network simulator. This platform enables the emulation of diverse network environments, characterized by varying levels of latency, packet loss, and bandwidth constraints.
Emulation of Network Challenges: The framework specifically addresses unique challenges posed by certain network configurations, such as duty cycle limitations. These constraints, which limit the time allocated for data transmission by each device, are crucial in understanding the real-world performance of DTLS protocols.
Testing in Multi-client-server Scenarios: A significant feature of this framework is its ability to test DTLS performance in complex scenarios involving multiple clients and servers. This is vital for assessing the behaviour of a protocol under realistic network conditions.
Realistic Environment Simulation: By simulating challenging network conditions, such as congestion, limited bandwidth, and resource constraints, the framework provides a realistic environment for thorough evaluation. This allows for a comprehensive analysis of DTLS in terms of security, performance, and scalability.
Overall, this thesis contributes to a deeper understanding of DTLS protocols by providing a robust tool for their evaluation under various and challenging network conditions.
Diese Arbeit befasst sich mit der Redigitalisierung von ausgedruckten Architektur-zeichnungen mit möglichst einfachen Mitteln. So sollen Fotos von herkömmlichen Smartphones die Grundlage für die Extraktion von Maßstab und Raumgeometrien sein.
Der erste der drei Schritte, die das Foto dabei durchläuft, ist die Beseitigung von perspektivischen Verzerrungen (Rektifizierung). Die hierfür benötigten Punkte werden durch ein, in dieser Arbeit trainiertes, Convolutional Neural Network (CNN) detektiert. Die so ermittelten Positionen stellen im zweiten Schritt, der Ermittlung eines Maßstabes, die Grundlage für das Auslesen der Maßzahlen mittels optical character recognition (OCR) dar. Da Räume nicht als solche in Bauzeichnungen eingezeichnet sind, werden im letzten Schritt, zuerst Wände, Türen und Fenster, durch mehrere mathematische Faltungen (convolutions) lokalisiert und innerhalb dieser Elemente, mittels wachsender Regionen, nach Räumen und Fluren gesucht.
Nach dem ein Foto diese Schritte durchlaufen hat, werden die ermittelten Geometrien sowie der Maßstab in einer Liste abgespeichert und im rektifizierten Bild, zusammen mit den berechneten Flächeninhalten, visualisiert. So kann ein Anwender schnell und einfach den Erfolg des Programmoutputs beurteilen.
Eine Versuchsreihe mit einigen Fotos ergab, dass ein Schattenwurf auf dem Papierplan bei Aufnahme des Lichtbildes zu vermeiden ist, da dieser sowohl bei der Auswertung durch das CNN, als auch innerhalb des OCR-Vorgangs zu Problemen führt, die in einigen Fällen eine Rektifizierung oder Maßstabsermittlung verhinderten.
Bei den übrigen fünf Fotos wurden durchschnittlich 31,8 von 32 Räumen detektiert, dabei wurde zwischen zwei und zwölf mal fälschlicherweise die Fensterbank als Fußboden detektiert. Die Standardabweichung der Flächeninhalte aller Räume betrug dabei 0,66 m², werden nur die Räume betrachtet, bei denen die Fensterbank korrekt erkannt wurde, beträgt die Standardabweichung lediglich 0,25 m².
Insgesamt werden die in dieser Arbeit erzielten Ergebnisse als „gut“ eingestuft, es bleiben jedoch auch einige Optimierungsmöglichkeiten an verschiedenen Stellen, besonders bei der Suche nach Räumen, bestehen.
Method and system for extractin metal and oxygen from powdered metal oxides (EP000004170066A2)
(2023)
A method for extracting metal and oxygen from powdered metal oxides in electrolytic cell is proposed, the electrolytic cell comprising a container, a cathode, an anode and an oxygen-ion-conducting membrane, the method comprising providing a solid oxygen ion conducting electrolyte powder into a container, providing a feedstock comprising at least one metal oxide in powdered form into the container, applying an electric potential across the cathode and the anode, the cathode being in communication with the electrolyte powder and the anode being in communication with the membrane in communication with the electrolyte powder, such that at least one respective metallic species of the at least one metal oxide is reduced at the cathode and oxygen is oxidized at the anode to form molecular oxygen, wherein the potential across the cathode and the anode is greater than the dissociation potential of the at least one metal oxide and less than the dissociation potential of the solid electrolyte powder and the membrane.
To deal with frequent power outages in developing countries, people turn to solutions like uninterruptible power supply (UPS), which stores electric energy during normal operating hours and use it to meet energy needs during rolling blackout intervals. Locally produced UPSs of poorer power quality are widely accessible in the marketplaces, and they have a negative impact on power quality. The charging and discharging of the batteries in these UPSs generate significant amount of power losses in weak grid environments. The Smart-UPS is our proposed smart energy metering (SEM) solution for low voltage consumers that is provided by the distribution company. It does not require batteries, therefore there is no power loss or harmonic distortion due to corresponding charging and discharging. Through load flow and harmonic analysis of both traditional UPS and Smart-UPS systems on ETAP, this paper examines their impact on the harmonics and stability of the distribution grid. The simulation results demonstrate that Smart-UPS can assist fixing power quality issues in a developing country like Pakistan by providing cleaner energy than the battery-operated traditional UPSs.
Due to its potential in improving the efficiency of energy supply, smart energy metering (SEM) has become an area of interest with the surge in Internet of Things (IoT). SEM entails remote monitoring and control of the sensors and actuators associated with the energy supply system. This provides a flexible platform to conceive and implement new data driven Demand Side Management (DSM) mechanisms. The IoT enablement allows the data to be gathered and analyzed at requisite granularity. In addition to efficient use of energy resources and provisioning of power, developing countries face an additional challenge of temporal mismatch in generation capacity and load factors. This leads to widespread deployment of inefficient and expensive Uninterruptible Power Supply (UPS) solutions for limited power provisioning during resulting blackouts. Our proposed “Soft-UPS” allows dynamic matching of load and generation through a combination of managed curtailment. This eliminates inefficiencies in the energy and power value chain and allows a data-driven approach to solving a widespread problem in developing countries, simultaneously reducing both upfront and running costs of conventional UPS and storage. A scalable and modular platform is proposed and implemented in this paper. The architecture employs “WiMODino” using LoRaWAN with a “Lite Gateway” and SQLite repository for data storage. Role based access to the system through an android application has also been demonstrated for monitoring and control.
With the surge in global data consumption with proliferation of Internet of Things (IoT), remote monitoring and control is increasingly becoming popular with a wide range of applications from emergency response in remote regions to monitoring of environmental parameters. Mesh networks are being employed to alleviate a number of issues associated with single-hop communication such as low area coverage, reliability, range and high energy consumption. Low-power Wireless Personal Area Networks (LoWPANs) are being used to help realize and permeate the applicability of IoT. In this paper, we present the design and test of IEEE 802.15.4-compliant smart IoT nodes with multi-hop routing. We first discuss the features of the software stack and design choices in hardware that resulted in high RF output power and then present field test results of different baseline network topologies in both rural and urban settings to demonstrate the deployability and scalability of our solution.
Modeling of Random Variations in a Switched Capacitor Circuit based Physically Unclonable Function
(2020)
The Internet of Things (IoT) is expanding to a wide range of fields such as home automation, agriculture, environmental monitoring, industrial applications, and many more. Securing tens of billions of interconnected devices in the near future will be one of the biggest challenges. IoT devices are often constrained in terms of computational performance, area, and power, which demand lightweight security solutions. In this context, hardware-intrinsic security, particularly physically unclonable functions (PUFs), can provide lightweight identification and authentication for such devices. In this paper, random capacitor variations in a switched capacitor PUF circuit are used as a source of entropy to generate unique security keys. Furthermore, a mathematical model based on the ordinary least square method is developed to describe the relationship between random variations in capacitors and the resulting output voltages. The model is used to filter out systematic variations in circuit components to improve the quality of the extracted secrets.
Blockchain-IIoT integration into industrial processes promises greater security, transparency, and traceability. However, this advancement faces significant storage and scalability issues with existing blockchain technologies. Each peer in the blockchain network maintains a full copy of the ledger which is updated through consensus. This full replication approach places a burden on the storage space of the peers and would quickly outstrip the storage capacity of resource-constrained IIoT devices. Various solutions utilizing compression, summarization or different storage schemes have been proposed in literature. The use of cloud resources for blockchain storage has been extensively studied in recent years. Nonetheless, block selection remains a substantial challenge associated with cloud resources and blockchain integration. This paper proposes a deep reinforcement learning (DRL) approach as an alternative to solving the block selection problem, which involves identifying the blocks to be transferred to the cloud. We propose a DRL approach to solve our problem by converting the multi-objective optimization of block selection into a Markov decision process (MDP). We design a simulated blockchain environment for training and testing our proposed DRL approach. We utilize two DRL algorithms, Advantage Actor-Critic (A2C), and Proximal Policy Optimization (PPO) to solve the block selection problem and analyze their performance gains. PPO and A2C achieve 47.8% and 42.9% storage reduction on the blockchain peer compared to the full replication approach of conventional blockchain systems. The slowest DRL algorithm, A2C, achieves a run-time 7.2 times shorter than the benchmark evolutionary algorithms used in earlier works, which validates the gains introduced by the DRL algorithms. The simulation results further show that our DRL algorithms provide an adaptive and dynamic solution to the time-sensitive blockchain-IIoT environment.
An Overview of Technologies for Improving Storage Efficiency in Blockchain-Based IIoT Applications
(2022)
Since the inception of blockchain-based cryptocurrencies, researchers have been fascinated with the idea of integrating blockchain technology into other fields, such as health and manufacturing. Despite the benefits of blockchain, which include immutability, transparency, and traceability, certain issues that limit its integration with IIoT still linger. One of these prominent problems is the storage inefficiency of the blockchain. Due to the append-only nature of the blockchain, the growth of the blockchain ledger inevitably leads to high storage requirements for blockchain peers. This poses a challenge for its integration with the IIoT, where high volumes of data are generated at a relatively faster rate than in applications such as financial systems. Therefore, there is a need for blockchain architectures that deal effectively with the rapid growth of the blockchain ledger. This paper discusses the problem of storage inefficiency in existing blockchain systems, how this affects their scalability, and the challenges that this poses to their integration with IIoT. This paper explores existing solutions for improving the storage efficiency of blockchain–IIoT systems, classifying these proposed solutions according to their approaches and providing insight into their effectiveness through a detailed comparative analysis and examination of their long-term sustainability. Potential directions for future research on the enhancement of storage efficiency in blockchain–IIoT systems are also discussed.
Soiling is an important issue in the renewable energy sector since it can result in significant yield losses, especially in regions with higher pollution or dust levels. To mitigate the impact of soiling on photovoltaic (PV) plants, it is essential to regularly monitor and clean the panels, as well as develop accurate soiling predictions that can affect cleaning strategies and enhance the overall performance of PV power plants. This research focuses on the problem of soiling loss in photovoltaic power plants and the potential to improve the accuracy of soiling predictions. The study examines how soiling can affect the efficiency and productivity of the modules and how to measure and predict soiling using machine learning (ML) algorithms. The research includes analyzing real data from large-scale ground-mounted PV sites and comparing different soiling measurement methods. It was observed that there were some deviations in the real soiling loss values compared to the expected values for some projects in southern Spain, thus, the main goal of this work is to develop machine learning models that could predict the soiling more accurately. The developed models have a low mean square error (MSE), indicating the accuracy and suitability of the models to predict the soiling rates. The study also investigates the impact of different cleaning strategies on the performance of PV power plants and provides a powerful application to predict both the soiling and the number of cleaning cycles.
An der Offenburger Hochschule wurde eine neue Art der Ansteuerungsmethode für Handprothesen und -orthesen entwickelt, die auf der Verwendung einer Augmented Reality Brille basiert. Dieses neue Prothesensystem soll in einer ersten Studie an Probanden auf seine Alltagstauglichkeit getestet werden. Ziel dieser Arbeit ist es, die regulatorischen Anforderungen an eine solche Studie zusammenzustellen, mit Schwerpunkt auf einem Antrag bei einer Ethikkommission. Außerdem sind mittels Literaturrecherche Tests zu identifizieren und zu analysieren, die für die Beurteilung von Handprothesen verwendet werden. Hierfür wird erörtert was Alltagstauglichkeit bedeutet und welche Eigenschaften und Ziele identifizierte Tests haben.
AI-based Ground Penetrating Radar Signal Processing for Thickness Estimation of Subsurface Layers
(2023)
This thesis focuses on the estimation of subsurface layer thickness using Ground Penetrating Radar (GPR) A-scan and B-scan data through the application of neural networks. The objective is to develop accurate models capable of estimating the thickness of up to two subsurface layers.
Two different approaches are explored for processing the A-scan data. In the first approach, A-scans are compressed using Principal Component Analysis (PCA), and a regression feedforward neural network is employed to estimate the layers’ thicknesses. The second approach utilizes a regression one-dimensional Convolutional Neural Network (1-D CNN) for the same purpose. Comparative analysis reveals that the second approach yields superior results in terms of accuracy.
Subsequently, the proposed 1-D CNN architecture is adapted and evaluated for Step Frequency Continuous Wave (SFCW) radar, expanding its applicability to this type of radar system. The effectiveness of the proposed network in estimating subsurface layer thickness for SFCW radar is demonstrated.
Furthermore, the thesis investigates the utilization of GPR B-scan images as input data for subsurface layer thickness estimation. A regression CNN is employed for this purpose, although the results achieved are not as promising as those obtained with the 1-D CNN using A-scan data. This disparity is attributed to the limited availability of B-scan data, as B-scan generation is a resource-intensive process.