Refine
Year of publication
- 2016 (125) (remove)
Document Type
- Conference Proceeding (61)
- Article (reviewed) (43)
- Article (unreviewed) (8)
- Part of a Book (6)
- Book (3)
- Letter to Editor (2)
- Master's Thesis (1)
- Working Paper (1)
Conference Type
- Konferenzartikel (48)
- Konferenz-Abstract (8)
- Sonstiges (5)
- Konferenzband (1)
Language
- English (125) (remove)
Keywords
- Eingebettetes System (5)
- Energieversorgung (4)
- Haustechnik (4)
- Dünnschichtchromatographie (3)
- Problemlösen (3)
- RoboCup (3)
- 6LoWPAN (2)
- Abtragung (2)
- Batterie (2)
- Brennstoffzelle (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (70)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (26)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (20)
- Fakultät Wirtschaft (W) (16)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (14)
- INES - Institut für nachhaltige Energiesysteme (14)
- ACI - Affective and Cognitive Institute (4)
- IfTI - Institute for Trade and Innovation (1)
- WLRI - Work-Life Robotics Institute (1)
Open Access
- Closed Access (43)
- Open Access (38)
- Bronze (4)
- Closed (2)
Passive solar elements for both direct and indirect gains, are systems used to maintain a comfortable living environment while saving energy, especially in the building energy retrofit and adaptation process. Sunspaces, thermal mass and glazing area and orientation have been often used in the past to guarantee adequate indoor conditions when mechanical devices were not available. After a period of neglect, nowadays they are again considered as appropriate systems to help face environmental issues in the building sector, and both international and national legislation takes into consideration the possibility of including them in the building planning tools, also providing economic incentives. Their proper design needs dynamic simulation, often difficult to perform and time consuming. Moreover, results generally suffer from several uncertainties, so quasi steady-state procedures are often used in everyday practice with good results, but some corrections are still needed. In this paper, a comparative analysis of different solutions for the construction of verandas in an existing building is presented, following the procedure provided by the slightly modified and improved Standard EN ISO 13790:2008. Advantages and disadvantages of different configurations considering thermal insulation, windows typology and mechanical ventilation systems are discussed and a general intervention strategy is proposed. The aim is to highlight the possibility of using sunspaces in order to increase the efficiency of the existing building stock, considering ease of construction and economic viability.
Energy Performance of Verandas in the Building Retrofit Process (PDF Download Available). Available from: https://www.researchgate.net/publication/303093420_Energy_Performance_of_Verandas_in_the_Building_Retrofit_Process [accessed Jul 5, 2017].
Bud type carbon nanohorns (CNHs) are composed of carbon and have a closed conical tip at one end protruding from an aggregate structure. By employing a simple oxidation process in CO2 atmosphere, it is possible to open the CNH tips which increases their specific surface area by four fold. These tip opened CNHs combine the microporous nature of activated carbons and the crystalline mesoporous character of carbon nanotubes. The results for the high pressure CO2 gas adsorption of tip opened CNHs are reported herein for the first time and are found to be superior to traditional CO2 adsorbents like zeolites. The modified CNHs are also found to be promising materials for lithium ion batteries and the performance is found to be on a par with carbon nanotubes and carbon nanofibers.
NEXCODE is a project promoted by the European Space Agency aimed at research design development and demonstration of a receiver chain for telecomm and links in space missions including the presence of new short low-density parity-check codes for error correction. These codes have excellent performance from the error rate viewpoint but also put new challenges as regards synchronization issues and implementation. In this paper after a short review of the results obtained through numerical simulations we present an overview of the breadboard designed for practical testing and the test-plan proposed for the verification of the breadboard and the validation of the new codes and novel synchronization techniques under relevant operation conditions.
This paper presents the results of the idea generation experiment that repeats the study originally conducted at RMIT. In order to establish the influence that the experimental treatments make on the number and the breadth of solution ideas proposed by problem solvers with different knowledge levels, students from different years of study were recruited. Ninety students from the Offenburg University of Applied Sciences, Germany were divided into three groups. All students were asked to generate ideas on cleaning lime deposits from the inside of a water pipe and were given 16 minutes to record their individual ideas. Students of two experimental groups were shown some words for two minuted each. The Su-Field group was exposed to the eight fields of MATCEMIB. The Random Word group was shown eight random words every two minutes. The Su-Field group outperformed both the Control group and the Random Word group in the number of ideas generated. It was also found that the students from the Su-Field group proposed significantly broader solutions than the students from the Control and Random Word groups. The overall results of the experiment support the conclusions made by the RMIT researchers that simple ideation techniques can significantly improve idea generation and that the systematised Substance-Field Analysis is a suitable heuristic for engineering students.
Structured Innovation with TRIZ in Science and Industry - Creating Value for Customers and Society
(2016)
Covert channels have been known for a long time because of their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example, the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit as well as the L1 and L2 caches, which enable establishing multiple covert channels. Even virtualization, which is known for its isolation of multiple machines, is prone to covert- and side-channel attacks because of the sharing of resources. Therefore, it is not surprising that cloud computing is not immune to this kind of attacks. Moreover, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of illegitimate communication. In such a setting, the “air gap” between physical servers and networks disappears, and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand, we will provide a survey on vulnerable spots that an adversary could exploit trying to exfiltrate private data from target virtual machines through covert channels in a cloud environment. We will evaluate the feasibility of example attacks and point out proposed mitigation solutions in case they exist.
Optimal microgrid scheduling with peak load reduction involving an electrolyzer and flexible loads
(2016)
This work consists of a multi-objective mixed-integer linear programming model for defining optimized schedules of components in a grid-connected microgrid. The microgrid includes a hydrogen energy system consisting of an alkaline electrolyzer, hydrogen cylinder bundles and a fuel cell for energy storage. Local generation is provided from photovoltaic panels, and the load is given by a fixed load profile combined with a flexible electrical load, which is a battery electric vehicle. The electrolyzer has ramp-up constraints which are modeled explicitly. The objective function includes, besides operational costs and an environmental indicator, a representation of peak power costs, thus leading to an overall peak load reduction under optimized operation. The model is used both for controlling a microgrid in a field trial set-up deployed in South-West Germany and for simulating the microgrid operation for defined period, thus allowing for economic system evaluation. Results from defined sample runs show that the energy storage is primarily used for trimming the peak of electricity drawn from the public grid and is not solely operated with excess power. The flexible demand operation also helps keeping the peak at its possible minimum.
All business is local
(2016)
High mobility, electrolyte-gated transistors (EGTs) show high DC performance at low voltages (< 2 V). To model those EGTs, we have used different models for the below and the above threshold regime with appropriate interpolation to ensure continuity and smoothness over all regimes. This empirical model matches very well with our measured results obtained by the electrical characterization of EGTs.
First year Business Administration students tend to regard themselves as “non-computer scientists” and often have a lack of motivation about taking IT courses in general, either because they perceive them as too technical, too difficult or somewhat irrelevant. In an attempt to counteract this perception and increase the levels of engagement and willing attendance to class, we decided to flip the traditional lecture model and develop a new teaching and learning approach for the IT Fundamentals course using an open source Enterprise Resource Planning (ERP) system as the platform from which to draw the various underlying IT concepts and through which the relevant competences can be acquired.
This paper describes the implementation process of this new contextualized learning framework “IT via ERP” and the changes in the didactical methods to support it.
We present a novel scheme for Slotted ALOHA random access systems that combines physical-layer network coding (PLNC) with multiuser detection (MUD). The PLNC and MUD are applied jointly at the physical layer to be able to extract any linear combination of messages experiencing a collision within a slot. The set of combinations extracted from a whole frame is then processed by the receiver to recover the original packets. A simple precoding stage at the transmitting terminals allows the receiver to further decrease the packet loss rate. We present results for the decoding at the physical layer as well as several performance measures at frame level, namely, throughput, packet loss rate, and energy efficiency. The results we present are promising and suggest that a cross-layer approach leveraging on the joint use of PLNC and MUD can significantly improve the performance of random access systems in the presence of slow fading.
This paper presents an overview of the coding aspects of a GNSS receiver. Coding allows detection and correction of channel-induced errors at the receiver, here the focus is on the mitigation of threats from malicious interferences. Although the effects of interference at different stages of GNSS baseband processing has been deeply analyzed in the literature, little attention was devoted to its impact on the navigation message decoding stage. Theis paper provides an introduction to the various coding schemes employed by current GNSS signals, discussing their performance in the presence of noise in terms of block-error rate. Additionally, the benefits of soft-decoding schemes for navigation message decoding are highlighted when jamming interferences are present. The proposed scheme requires estimating the noise plus interference power, yielding to enhanced decoding performances under severe jamming conditions. Finally, cryptographic schemes as a means of providing anti-spoofing for geosecurity location-based services, and their potential vulnerability are discussed, with particular emphasis on the dependence on the dependence of the scheme on successful navigation message decoding
This paper describes the new Sweaty II humanoid adult size robot trying to qualify for the RoboCup 2016 adult size humanoid competition. Based on experiences during RoboCup 2014, the Sweaty robot has been completely redesigned to a new robot Sweaty II. A major change is the use of linear actuators for the legs. Another characteristic is its indirect actuation by means of rods. This allows a variable transmission ratio depending on the angle of a joint.
To do justice to the legacy of Alexander von Humboldt, a 19th century German scientist and explorer an information and knowledge management system is required to preserve the author’s original intent and promote an awareness of all his relevant works. Although all of Humboldt's works can be found on the internet as digitized papers, the complexity and internal interconnectivity of the writings is not very transparent. Humboldt's concepts of interaction cannot be adequately represented only by digitized papers or scanned documents.
The Humboldt Portal is an attempt to create a new generation of digital libraries, providing a new form of interaction and synthesis between humanistic texts and scientific observation. The digital version of his documents supplies dynamic links to sources, maps, images, graphs and relevant texts in accordance with his visions, because “everything is interconnectedness”.