Refine
Document Type
- Conference Proceeding (194)
- Article (reviewed) (99)
- Article (unreviewed) (21)
- Letter to Editor (16)
- Master's Thesis (13)
- Doctoral Thesis (8)
- Book (7)
- Patent (7)
- Part of a Book (3)
- Bachelor Thesis (2)
Conference Type
- Konferenzartikel (169)
- Konferenz-Abstract (19)
- Sonstiges (5)
- Konferenz-Poster (1)
Language
- English (373) (remove)
Keywords
- RoboCup (12)
- Deep Leaning (11)
- Machine Learning (11)
- Götz von Berlichingen (8)
- neuroprosthetics (8)
- Blockchain (6)
- machine learning (6)
- Deep learning (5)
- Heart rhythm model (5)
- Modeling and simulation (5)
- neural networks (5)
- printed electronics (5)
- Energiemanagement (4)
- Internet of Things (4)
- Iron Hand (4)
- Robustness (4)
- blockchain (4)
- hand prosthesis (4)
- 3D computer-aided design (3)
- Deep Learning (3)
- Generative Adversarial Network (3)
- IIoT (3)
- IT-Sicherheit (3)
- IoT security (3)
- Radar (3)
- Security (3)
- amputee (3)
- artificial intelligence (3)
- bimodal hearing (3)
- biomaterials (3)
- certificate management (3)
- cryptography (3)
- deep learning (3)
- heart rhythm model (3)
- image classification (3)
- programming (3)
- replica (3)
- security (3)
- sound localization (3)
- 3D multi-material polymer printing (2)
- 3D print (2)
- 3D printing (2)
- 3D-CAD (2)
- 5G (2)
- Aliasing (2)
- Bearings (2)
- Blockchains (2)
- CNC (2)
- CNN (2)
- CNNs (2)
- Cardiac Resynchronization Therapy (2)
- Computer Vision (2)
- Cryoballoon catheter ablation (2)
- Current measurement (2)
- Data Mining (2)
- Energy Flexibility (2)
- Energy management (2)
- FEM (2)
- Featherweight Go (2)
- Functional neuroimaging (2)
- GPU Computing (2)
- Geophysik (2)
- Landwirtschaft (2)
- NB-IoT (2)
- Neural networks (2)
- Optimization (2)
- PUF key generation (2)
- Positron emission tomography (2)
- Predictive Maintenance (2)
- Predictive maintenance (2)
- RFID (2)
- Scalability (2)
- Stability (2)
- Subspace Clustering (2)
- Substrates (2)
- Supraventricular tachycardia (2)
- Switches (2)
- UWB radars (2)
- accountability (2)
- adversarial attacks (2)
- ancient Capua leg (2)
- anthropomorphic hand replacement (2)
- atrial fibrillation (2)
- augmented reality (2)
- autoattack (2)
- binaural hearing (2)
- cardiac ablation (2)
- catheter ablation (2)
- cochlear implant (2)
- computer-aided design (2)
- convolutional neural networks (2)
- detection (2)
- efficient training (2)
- esophageal catheter (2)
- explainability (2)
- fairness (2)
- finite element method (2)
- hearing aid (2)
- heat pump (2)
- imaging algorithms (2)
- industrial communication (2)
- interactive visualization (2)
- interaural stimulation timing (2)
- medical imaging (2)
- microwave (2)
- molybdenum (2)
- peer-to-peer (2)
- physical unclonable function (2)
- physically unclonable function (PUF) (2)
- predictive maintenance (2)
- prosthesis (2)
- pulmonary vein isolation (2)
- resource efficiency (2)
- responsibility (2)
- scattering measurements (2)
- semantics (2)
- speech in noise (2)
- trust (2)
- understandability (2)
- visual control (2)
- zweite "Eiserne Hand" (2)
- 3D CAD (1)
- 3D light scanning (1)
- 3D multi-material printing (1)
- 3D-Modelling (1)
- 3D-light scanning (1)
- 3D-print (1)
- 3d print (1)
- 5G mobile communication (1)
- 5G private networks (1)
- 65D17 (1)
- 65D18 (1)
- 68U05 (1)
- AC machines (1)
- AIN Cantilever (1)
- AR (1)
- AR glasses (1)
- AV nodal reentry tachycardia (1)
- AV reentrant tachycardia (1)
- Additive Manufacturing (1)
- Adversarial Attacks (1)
- Adversarial Robustness (1)
- Adversarial examples (1)
- Adversarial robustness (1)
- Agent based sensor (1)
- Agrophotovoltaics (1)
- Air Pollution (1)
- Algorithmus (1)
- Aluminum (1)
- Amplitude and Phase Errors (1)
- Ancient Capua leg (1)
- Angle of Arrival (1)
- Antenna measurements (1)
- Antennas (1)
- Anti-Windup (1)
- Approximation (1)
- Artificial Intelligence (1)
- Atrial fibrillation (1)
- Audiometrie (1)
- Augmented Reality (1)
- Augmented reality (1)
- Augmented-reality glasses (1)
- Authentication (1)
- Authorization (1)
- Automated idea generation (1)
- Automotive Radar (1)
- Batterie (1)
- Battery storage (1)
- Bearing fault classification (1)
- Becquerel (1)
- Binaural hearing (1)
- Binder-based AM (1)
- Binder-basiertes AM (1)
- Bioimpedance measurement (1)
- Biomimetics (1)
- Blockchain-to-Blockchain communication (1)
- BlueZ (1)
- Bluetooth (1)
- Bluetooth Low Energy (1)
- Bluetooth-Standard (1)
- Bodenradar (1)
- Boundary conditions (1)
- Bowtie antenna (1)
- CANopen (1)
- CIoT (1)
- CO2-Bilanz (1)
- Calibration (1)
- Carbon Footprint (1)
- Cardiac modelling (1)
- Cardiac resynchronization therapy (1)
- Cellular networks (1)
- Challenges in Action Recognition (1)
- Chemical engineering (1)
- Christian von Mechel (1)
- Cleaning (1)
- Cloud computing (1)
- Cloud storage (1)
- Clustering (1)
- Collaboration of Academia and Industry (1)
- Compensation (1)
- Computer science (1)
- Control Algorithms (1)
- Convolutional neural networks (1)
- Crash tests (1)
- Current Control (1)
- Current control (1)
- DC-AC converters (1)
- DTLS (1)
- Data breech (1)
- Datenqualität (1)
- Deactivation/activation processes (1)
- Debinding (1)
- Decarbonization (1)
- Decoupling (1)
- Deep Neural Network (1)
- Deep Reinforcement Learning (1)
- Deep diffusion models (1)
- Demand side flexibility (1)
- Device characterization (1)
- Diagnostics (1)
- Digital Beamforming (1)
- Digital Flex Twin Optimization (1)
- Digital Twin (1)
- Digitalization (1)
- Discrete-time model (1)
- Diseases (1)
- Distributed Co-Simulation Protocol (1)
- Domenico Scarlatti (1)
- EAP-TLS (1)
- ESP-IDF (1)
- ETAP Simulations (1)
- ETL Data Pipeline (1)
- EU Timber Regulation (1)
- Eco-inventive principles (1)
- Economics (1)
- Edge AI (1)
- Edge Computing (1)
- Education (1)
- Eigenvalues (1)
- Electric Tractors (1)
- Electric Vehicle (1)
- Electrical and electronic engineering (1)
- Electrical drives (1)
- Electromagnetic and thermal simulation (1)
- Elektrofahrzeug (1)
- Elektromagnetische Reflexionsmethode (1)
- Embalming (1)
- Embedded AI (1)
- Embedded Systems (1)
- Energiespeicherung (1)
- Energy Flexibility for Companies (1)
- Energy Management (1)
- Energy Marketing of Industrial Flexibilities (1)
- Energy System Model (1)
- Energy Transition (1)
- Energy systems modeling (1)
- Entbinderung (1)
- Entkopplung (1)
- Entropy (1)
- Environmental monitoring (1)
- Error (1)
- Esophageal catheter (1)
- Estimation (1)
- Explainable AI (1)
- FFI (1)
- FUSION (1)
- Failure analysis (1)
- Famous composers (1)
- Fault Classification (1)
- Fault classification (1)
- Federated Learning (1)
- Felix Mendelssohn Bartholdy (1)
- Field Programmable Gate Array (FPGA) (1)
- Field-programmable gate array (FPGA) (1)
- Finite-Elemente-Methode (1)
- Fotovoltaik (1)
- Fused Filament Fabrication (1)
- Fußgängererkennung (1)
- GPR (1)
- Generative models (1)
- Glasfaser (1)
- Green House effect (1)
- Grinding machines (1)
- Ground penetrating radar (1)
- Handschrift (1)
- Handswritten Character Recognition (1)
- Hannes hand (1)
- Hard rock (1)
- Hardware Security (1)
- Harmonic analysis (1)
- Heart Rhythm Simulation (1)
- Heart rhythm simulation (1)
- Hemodynamic monitoring (1)
- Heuristic algorithms (1)
- High frequency ablation (1)
- Higher Education (1)
- His-Bundle Pacing (1)
- His-bundle pacing (1)
- Hybrid Vehicle (1)
- Hybrid system (1)
- Hydrokultur (1)
- Hydroponic Farming (1)
- Hörgerät (1)
- IEC/IEEE 60802 security (1)
- IEEE802.15.4 (1)
- InceptionTime (1)
- Industrial Blockchain (1)
- Industrial internet of things (1)
- Industrie 4.0 (1)
- Industry 4.0 (1)
- Industry Use cases (1)
- Industry automation (1)
- Informatik (1)
- Infrarot-Spektroskopie (1)
- Ink (1)
- Intelligentes Stromnetz (1)
- Intermediate domain (1)
- Interoperability (1)
- Inventive principles (1)
- Inventive problem solving (1)
- Inverters (1)
- IoT (1)
- IoT Security (1)
- Jitter (1)
- Johann Sebastian Bach (1)
- Konfigurationen (1)
- Künstliche Intelligenz (1)
- LINUX (1)
- LOAM (LiDAR odometry and mapping) (1)
- LPWAN (1)
- Large Grid-Connected PV Systems (1)
- Left Atrial Appendage Closure (1)
- Leistungsbedarf (1)
- Leonardo da Vinci (1)
- LiDAR (1)
- Limiting (1)
- Linux (1)
- LoRaWAN (1)
- Load Flow Analysis (1)
- Logic gates (1)
- Long Term Evolution (1)
- Low Carbon network (1)
- Low-latency (1)
- MATLAB (1)
- MEMS (1)
- MIMO (1)
- MLOps (1)
- MPC (1)
- Machine learning (1)
- Machine-learning (1)
- Magnetic resonance (1)
- Magnetic sensors (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Maschinelles Lernen (1)
- Maschinelles Sehen (1)
- Mean Square Error (1)
- Measurement (1)
- Medizintechnik (1)
- Micro-electromechanical system (1)
- Microgrid(s) (1)
- Microtunnelling (1)
- Mild traumatic brain injury (1)
- Mobilfunk (1)
- Mode Collapse (1)
- Model Calibration (1)
- Model Predictive Control (1)
- Model Search (1)
- Mona Lisa (1)
- Monitoring (1)
- Monocular Depth Estimation (1)
- Monte-Carlo (1)
- Monte-Carlo Simulation (1)
- Monte-Carlo method (1)
- Multiside heart stimulation (1)
- Mummy (1)
- NETCONF security (1)
- Nachhaltigkeit (1)
- Nahfeldkommunikation (1)
- Nature-inspired principles (1)
- Network Test (1)
- Netzwerk (1)
- Neural Architecture Search (1)
- Neuronales Netz (1)
- Neuroprothetics (1)
- Noise measurement (1)
- Nyquist-Shannon (1)
- OT security (1)
- Octave Convolution (1)
- Ofenparametrisierung (1)
- Optical Fiber Network (1)
- Optical Network (1)
- Optimization and control (1)
- Optimization with Digital Twins (1)
- Optische Zeichenerkennung (1)
- Organic electronics (1)
- Otto Lilienthal (1)
- PI control (1)
- PKI (1)
- PROFINET (1)
- PROFINET IO (1)
- PROFINET Security (1)
- PV System (1)
- PV power forecast (1)
- Parallelization (1)
- Parameter Estimation (1)
- Parameter estimation (1)
- Particle swarm optimization (1)
- Passives System (1)
- Pattern Recognition (1)
- Peak shaving (1)
- Peer to peer network (1)
- Penetration prediction (1)
- Performance (1)
- Performance evaluation (1)
- Permanent magnet machines (1)
- Personalized prostheses (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Physically Unclonable Function (1)
- Physiological Pacing (1)
- Physiological cardiac pacing (1)
- Pierre-Marie-Bamberger syndrome (1)
- Power Consumption (1)
- Power Loss (1)
- Predictions (1)
- Predictive Control (1)
- Predictive Models (1)
- Printed Electronics (1)
- Process design (1)
- Programmierung (1)
- Programming Languages (1)
- Prozessatmosphären (1)
- Pulmonary vein isolation (1)
- Pulse width modulation (1)
- ROS (1)
- RTK (1)
- RUL (1)
- Radio frequency (1)
- Radiofrequency identification (1)
- Random call model (1)
- Real-Time Communication (1)
- Regularization (1)
- Reinforcement learning (1)
- Remaining useful life (1)
- Renewable Energy Markets (1)
- Representation Learning (1)
- ResNet (1)
- Resistance (1)
- Road-Quality Prediction (1)
- Roboter (1)
- Rosalia Lombardo (1)
- Rotors (1)
- Roubst overfitting (1)
- Rust (1)
- Röntgen (1)
- SLAM (1)
- Sampling (1)
- Scientific Reports (1)
- Second Iron Hand (1)
- Second-order Optimization (1)
- Seismic processing (1)
- Self-Calibration (1)
- Semiconductor Device (1)
- Semiconductor device measurement (1)
- Sensor phenomena and characterization (1)
- Sicherheit (1)
- Sintering (1)
- Smart Energy Metering (1)
- Smart Grids (1)
- Smart Load Management (1)
- Smart metering (1)
- Smart-UPS (1)
- SmartMAC (1)
- Software (1)
- Software algorithms (1)
- Software for measurements (1)
- Solar Radiation (1)
- Spinal cord stimulation (1)
- Split-Manufacturing (1)
- Stand Alone (1)
- Static interaural time offsets (1)
- Stromregelung (1)
- Stromregelung von Drehstromantrieben (1)
- Stromzustandsregler (1)
- Sustainability (1)
- Sustainable technology (1)
- Synchronmaschine (1)
- Systematic innovation (1)
- TBM performance (1)
- TLS (1)
- TRIZ methodology (1)
- TSN security (1)
- Testbed (1)
- Time Sensitive Networking (1)
- Time Series Classification (1)
- Time Synchronization (1)
- Time series data (1)
- Time-series Classification (1)
- TinyML (1)
- Torque (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Transesophageal left atrial pacing (1)
- Transfer learning (1)
- Triangulation (1)
- Triggerstabilität (1)
- Trust management (1)
- URLLC (1)
- Ultra-Low Energy (1)
- Unsupervised Conditional Training (1)
- Unsupervised Learning (1)
- Utility tunnelling (1)
- V2X (1)
- VANET (1)
- Variational Autoencoders (1)
- Vesuvius eruption (1)
- Virtual Reality (1)
- Visual Analytics (1)
- Visual control (1)
- Voltage measurement (1)
- Web development (1)
- Webentwicklung (1)
- Whiplash injury (1)
- Whiplash-associated disorders (1)
- Wireless IoT (1)
- Wireless Technology (1)
- X-in-the-loop (1)
- Yolov5 (1)
- accelerometer (1)
- adversarial (1)
- adversarial detection (1)
- aerosol modeling (1)
- air raid of the Royal College of Surgeons London (1)
- ambiguity (1)
- analog physical unclonable function system (1)
- anisotropy (1)
- anthropology (1)
- anthropomorphic replacement hand (1)
- artificial neural networks (1)
- atrial flutter (1)
- attribute manipulation (1)
- audiometry (1)
- auditory model (1)
- augmented reality glasses (1)
- authentication (1)
- authorization (1)
- autoML (1)
- autonomous systems (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- biocompatibility test (1)
- biodegradable (1)
- biodegradable implants (1)
- biomechanical stimulation (1)
- bionics (1)
- blockchain-based system (1)
- brain vitrification (1)
- building management systems (1)
- camera-based navigation (1)
- cellular radio (1)
- cifar (1)
- climate emulation (1)
- composite materials (1)
- compression (1)
- computer graphics (1)
- computer network management (1)
- computer vision (1)
- consensus + innovations (1)
- contour lines (1)
- copper oxide (1)
- correlation (1)
- craniomaxillofacial surgery (1)
- credentials (1)
- crossbar (1)
- curb (1)
- curriculum learning (1)
- cybersecurity (1)
- data quality (1)
- debinding (1)
- deep reinforcement learning (1)
- defense (1)
- degradation stages (1)
- device delay mismatch (1)
- dictionary passing (1)
- diode modeling (1)
- distributed energy resources (1)
- distributed ledger (1)
- drumstick fingers (1)
- echocardiography (1)
- economic dispatch (1)
- effective medium theory (1)
- electric machine (1)
- electrical conductivity (1)
- electricity market (1)
- electrode-free (1)
- electrolyte-gated transistors (1)
- electrolytic cell (1)
- embedded systems (1)
- energy harvesting (1)
- engine-in-the-loop (1)
- eurocity persons (1)
- exoskeleton (1)
- face editing (1)
- face recognition (1)
- fail-operational (1)
- fingerprinting (1)
- first Röntgen picture (1)
- first iron hand (1)
- fourier (1)
- furnace parameterization (1)
- game theory (1)
- gan (1)
- gedruckte Elektronik (1)
- generative adversarial networks (1)
- gossip protocol (1)
- ground penetrating radar (1)
- hair (1)
- hand prostheses (1)
- hand prosthetic (1)
- hardware-in-the-loop (1)
- heart rhythm simulation (1)
- height estimation (1)
- hieroglyphs (1)
- history-inspired (1)
- home automation (1)
- hybrid electric vehicle (1)
- hybrid networks (1)
- hybrid systems (1)
- identification (1)
- image color analysis (1)
- image processing (1)
- imagenet (1)
- impedance cardiography (1)
- indium oxide (1)
- industrial Ethernet (1)
- industrial IoT (1)
- infrared spectroscopy (1)
- integer linear programming (1)
- intelligent neuroprosthetics (1)
- intermediate domain (1)
- internal combustion engine (1)
- interpretation (1)
- invasive (1)
- irrigation (1)
- isocontour lines (1)
- isocontouring (1)
- isocontours (1)
- isosurfaces (1)
- legacy machines (1)
- level set (1)
- lid (1)
- lifelong learning (1)
- linguistics (1)
- lithium-ion battery (1)
- low-cost sensors and devices (1)
- lower limb prosthesis (1)
- maceration, vessel elements (1)
- machine-to-machine communication (1)
- mahalanobis (1)
- maintenance (1)
- manufacturing industries (1)
- mapping (1)
- marching cubes (1)
- marching tetrahedra (1)
- matrix modules (1)
- medical history (1)
- metal oxide reduction (1)
- metal oxide transistor (1)
- micro-photovoltaic system (1)
- millimeter-wave (1)
- mobile robotics (1)
- model predictive control (1)
- model-predictive control (1)
- mold (1)
- multipath (1)
- musical history (1)
- mutual authentication (1)
- navigation (1)
- network optimization (1)
- neural architecture search (1)
- neurology (1)
- nickel oxide (1)
- noise measurement (1)
- non-invasive (1)
- nose (1)
- ns-3 (1)
- oil painting (1)
- open fitting (1)
- optimization (1)
- osseointegration (1)
- osteosynthesis (1)
- oxide electronics (1)
- oxygen membrane (1)
- pandemics (1)
- parking (1)
- partial shading (1)
- pattern recognition (1)
- pedestrian detection (1)
- perception (1)
- percolation (1)
- performance (1)
- personalization (1)
- physics-informed ML (1)
- plague (1)
- pn-diode (1)
- pose estimation (1)
- powertrain testing (1)
- precision medicine (1)
- predictive control (1)
- primary authentication (1)
- primary progressive aphasia (1)
- printed Antennas (1)
- process atmosphere (1)
- programming languages (1)
- proof-of-concept study (1)
- prostheses (1)
- prosthetics (1)
- pruning (1)
- quality feedback survey and results assessment (1)
- radiation protection (1)
- radio networks (1)
- random resistor networks (1)
- ray tracing (1)
- real-time systems (1)
- rekeying (1)
- remaining useful life (1)
- renewable energy (1)
- robustness (1)
- sample‐to‐sample fluctuation (1)
- scalability (1)
- scalar fields (1)
- second "Iron Hand" (1)
- secure communication (1)
- security keys (1)
- seismic (1)
- sensor and actuator networks (1)
- sensory feedback (1)
- sharding algorithm (1)
- shingle solar cells (1)
- shop floor (1)
- short-term solar forecast (1)
- silicone (1)
- skin cancer (1)
- skin cancer detection (1)
- software defined radio (1)
- solar module (1)
- sparse backpropagation (1)
- spatial release from maskin (1)
- spectral defense (1)
- spectraldefense (1)
- speech intelligibility model (1)
- spinal cord stimulation (1)
- split manufacturing (1)
- statistical methods, ROS (1)
- stochastic approach (1)
- stochastic computing (1)
- storage efficiency (1)
- storage optimization (1)
- style (1)
- style transfer (1)
- summarization (1)
- surface nets (1)
- surgical navigation (1)
- syndrome coding (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature sensor (1)
- tessellation (1)
- test bench (1)
- test bench coupling (1)
- thermoelectrics (1)
- thickness estimation (1)
- thinned ASIC in foil (1)
- throughput (1)
- titanium fibers (1)
- topology (1)
- tracking (1)
- transesophageal electrical pacing (1)
- transesophageal neurostimulation (1)
- transfer learning (1)
- transmit beamforming (1)
- triangulation (1)
- trust management (1)
- trust management system (1)
- trustworthy ai (1)
- unilateral hearing loss (1)
- unique interdisciplinary international higher education approach (1)
- upper limb (1)
- ventricular tachycardia (1)
- virtual simulations (1)
- visual analytics (1)
- visualization (1)
- watch glass nails (1)
- wide area networks (1)
- wireless sensor networks (1)
- wood identification (1)
- zeros (1)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (373) (remove)
Open Access
- Open Access (183)
- Closed Access (115)
- Closed (70)
- Bronze (31)
- Gold (29)
- Diamond (24)
- Grün (3)
- Hybrid (2)
RETIS – Real-Time Sensitive Wireless Communication Solution for Industrial Control Applications
(2020)
Ultra-Reliable Low Latency Communications (URLLC) has been always a vital component of many industrial applications. The paper proposes a new wireless URLLC solution called RETIS, which is suitable for factory automation and fast process control applications, where low latency, low jitter, and high data exchange rates are mandatory. In the paper, we describe the communication protocol as well as the hardware structure of the network nodes for implementing the required functionality. Many techniques enabling fast, reliable wireless transmissions are used – short Transmission Time Interval (TTI), Time-Division Multiple Access (TDMA), MIMO, optional duplicated data transfer, Forward Error Correction (FEC), ACK mechanism. Preliminary tests show that reliable end-to-end latency down to 350 μs and packet exchange rate up to 4 kHz can be reached (using quadruple MIMO and standard IEEE 802.15.4 PHY at 250 kbit/s).
In bimodal cochlear implant (CI) / hearing aid (HA) users a constant interaural time delay in the order of several milliseconds occurs due to differences in signal processing of the devices. For MED-EL CI systems in combination with different HA types, we have quantified the respective device delay mismatch (Zirn et al. 2015). In the current study, we investigate the effect of the device delay mismatch in simulated and actual bimodal listeners on sound localization accuracy.
To deal with the device delay mismatch in actual bimodal listeners we delayed the CI stimulation according to the measured HA processing delay and two other values. With all delay values highly significant improvements of the rms error in the localization task were observed compared to the test without the delay. The results help to narrow down the optimal patient-specific delay value.
In users of a cochlear implant (CI) together with a contralateral hearing aid (HA), so-called bimodal listeners, differences in processing latencies between digital HA and CI up to 9 ms constantly superimpose interaural time differences. In the present study, the effect of this device delay mismatch on sound localization accuracy was investigated. For this purpose, localization accuracy in the frontal horizontal plane was measured with the original and minimized device delay mismatch. The reduction was achieved by delaying the CI stimulation according to the delay of the individually worn HA. For this, a portable, programmable, battery-powered delay line based on a ring buffer running on a microcontroller was designed and assembled. After an acclimatization period to the delayed CI stimulation of 1 hr, the nine bimodal study participants showed a highly significant improvement in localization accuracy of 11.6% compared with the everyday situation without the delay line (p < .01). Concluding, delaying CI stimulation to minimize the device delay mismatch seems to be a promising method to increase sound localization accuracy in bimodal listeners.
Novel manufacturing technologies, such as printed electronics, may enable future applications for the Internet of Everything like large-area sensor devices, disposable security, and identification tags. Printed physically unclonable functions (PUFs) are promising candidates to be embedded as hardware security keys into lightweight identification devices. We investigate hybrid PUFs based on a printed PUF core. The statistics on the intra- and inter-hamming distance distributions indicate a performance suitable for identification purposes. Our evaluations are based on statistical simulations of the PUF core circuit and the thereof generated challenge-response pairs. The analysis shows that hardware-intrinsic security features can be realized with printed lightweight devices.
A physical unclonable function (PUF) is a hardware circuit that produces a random sequence based on its manufacturing-induced intrinsic characteristics. In the past decade, silicon-based PUFs have been extensively studied as a security primitive for identification and authentication. The emerging field of printed electronics (PE) enables novel application fields in the scope of the Internet of Things (IoT) and smart sensors. In this paper, we design and evaluate a printed differential circuit PUF (DiffC-PUF). The simulation data are verified by Monte Carlo analysis. Our design is highly scalable while consisting of a low number of printed transistors. Furthermore, we investigate the best operating point by varying the PUF challenge configuration and analyzing the PUF security metrics in order to achieve high robustness. At the best operating point, the results show areliability of 98.37% and a uniqueness of 50.02%, respectively. This analysis also provides useful and comprehensive insights into the design of hybrid or fully printed PUF circuits. In addition, the proposed printed DiffC-PUF core has been fabricated with electrolyte-gated field-effect transistor technology to verify our design in hardware.
Modern society is more than ever striving for digital connectivity -- everywhere and at any time, giving rise to megatrends such as the Internet of Things (IoT). Already today, 'things' communicate and interact autonomously with each other and are managed in networks. In the future, people, data, and things will be interlinked, which is also referred to as the Internet of Everything (IoE). Billions of devices will be ubiquitously present in our everyday environment and are being connected over the Internet.
As an emerging technology, printed electronics (PE) is a key enabler for the IoE offering novel device types with free form factors, new materials, and a wide range of substrates that can be flexible, transparent, as well as biodegradable. Furthermore, PE enables new degrees of freedom in circuit customizability, cost-efficiency as well as large-area fabrication at the point of use.
These unique features of PE complement conventional silicon-based technologies. Additive manufacturing processes enable the realization of many envisioned applications such as smart objects, flexible displays, wearables in health care, green electronics, to name but a few.
From the perspective of the IoE, interconnecting billions of heterogeneous devices and systems is one of the major challenges to be solved. Complex high-performance devices interact with highly specialized lightweight electronic devices, such as e.g. smartphones and smart sensors. Data is often measured, stored, and shared continuously with neighboring devices or in the cloud. Thereby, the abundance of data being collected and processed raises privacy and security concerns.
Conventional cryptographic operations are typically based on deterministic algorithms requiring high circuit and system complexity, which makes them unsuitable for lightweight devices.
Many applications do exist, where strong cryptographic operations are not required, such as e.g. in device identification and authentication. Thereby, the security level mainly depends on the quality of the entropy source and the trustworthiness of the derived keys. Statistical properties such as the uniqueness of the keys are of great importance to precisely distinguish between single entities.
In the past decades, hardware-intrinsic security, particularly physically unclonable functions (PUFs), gained a lot of attraction to provide security features for IoT devices. PUFs use their inherent variations to derive device-specific unique identifiers, comparable to fingerprints in biometry.
The potentials of this technology include the use of a true source of randomness, on demand key derivation, as well as inherent key storage.
Combining these potentials with the unique features of PE technology opens up new opportunities to bring security to lightweight electronic devices and systems. Although PE is still far from being matured and from being as reliable as silicon technology, in this thesis we show that PE-based PUFs are promising candidates to provide key derivation suitable for device identification in the IoE.
Thereby, this thesis is primarily concerned with the development, investigation, and assessment of PE-based PUFs to provide security functionalities to resource constrained printed devices and systems.
As a first contribution of this thesis, we introduce the scalable PE-based Differential Circuit PUF (DiffC-PUF) design to provide secure keys to be used in security applications for resource constrained printed devices. The DiffC-PUF is designed as a hybrid system architecture incorporating silicon-based and inkjet-printed components. We develop an embedded PUF platform to enable large-scale characterization of silicon and printed PUF cores.
In the second contribution of this thesis, we fabricate silicon PUF cores based on discrete components and perform statistical tests under realistic operating conditions. A comprehensive experimental analysis on the PUF security metrics is carried out. The results show that the silicon-based DiffC-PUF exhibits nearly ideal values for the uniqueness and reliability metrics. Furthermore, the identification capabilities of the DiffC-PUF are investigated and it is shown that additional post-processing can further improve the quality of the identification system.
In the third contribution of this thesis, we firstly introduce an evaluation workflow to simulate PE-based DiffC-PUFs, also called hybrid PUFs. Hereof, we introduce a Python-based simulation environment to investigate the characteristics and variations of printed PUF cores based on Monte Carlo (MC) simulations. The simulation results show, that the security metrics to be expected from the fabricated devices are close to ideal at the best operating point.
Secondly, we employ fabricated printed PUF cores for statistical tests under varying operating conditions including variations in ambient temperature, relative humidity, and supply voltage. The evaluations of the uniqueness, bit aliasing, and uniformity metrics are in good agreement with the simulation results. The experimentally determined mean reliability value is relatively low, which can be explained by the missing passivation and encapsulation of the printed transistors. The investigation of the identification capabilities based on the raw PUF responses shows that the pure hybrid PUF is not suitable for cryptographic applications, but qualifies for device identification tasks.
The final contribution is to switch to the perspective of an attacker. To judge on the security capabilities of the hybrid PUF, a comprehensive security analysis in the manner of a cryptanalysis is performed. The analysis of the entropy of the hybrid PUF shows that its vulnerability against model-based attacks mainly depends on the selected challenge building method. Furthermore, an attack methodology is introduced to assess the performances of different mathematical cloning attacks on the basis of eavesdropped challenge-response pairs (CRPs). To clone the hybrid PUF, a sorting algorithm is introduced and compared with commonly used supervised machine learning (ML) classifiers including logistic regression (LR), random forest (RF), as well as multi-layer perceptron (MLP).
The results show that the hybrid PUF is vulnerable against model-based attacks. The sorting algorithm benefits from shorter training times compared to the ML algorithms. If the eavesdropped CRPs are erroneous, the ML algorithms outperform the sorting algorithm.
Narrowband Internet-of-Things (NB-IoT) is a 3rd generation partnership project (3GPP) standardized cellular technology, adopted for 5G and optimized for massive Machine Type Communication (mMTC). Applications are anticipated around infrastructure monitoring, asset management, smart city and smart energy applications. In this paper, we evaluate the suitability of NB-IoT for private (campus) networks in industrial environments, including complex cloud-based applications around process automation. An end-to-end system has been developed, comprising of a sensor unit connected to a NB-IoT modem, a base station (gNodeB) equipped with a beamforming array and a local (private) network architecture comprising a sensor management system in the edge cloud. The experimental study includes field tests in realistic industrial environments with latency, reliability and coverage measurements. The results show a good suitability of NB-IoT for process automation with high scalability, low-power requirements and moderate latency requirements.
The development of Internet of Things (IoT) embedded devices is proliferating, especially in the smart home automation system. However, the devices unfortunately are imposing overhead on the IoT network. Thus, the Internet Engineering Task Force (IETF) have introduced the IPv6 Low-Power Wireless Personal Area Network (6LoWPAN) to provide a solution to this constraint. 6LoWPAN is an Internet Protocol (IP) based communication where it allows each device to connect to the Internet directly. As a result, the power consumption is reduced. However, the limitation of data transmission frame size of the IPv6 Routing Protocol for Low-power and Lossy Network’s (RPL’s) had made it to be the running overhead, and thus consequently degrades the performance of the network in terms of Quality of Service (QoS), especially in a large network. Therefore, HRPL was developed to enhance the RPL protocol to minimize redundant retransmission that causes the routing overhead. We introduced the T-Cut Off Delay to set the limit of the delay and the H field to respond to actions taken within the T-Cut Off Delay. Thus, this paper presents the comparison performance assessment of HRPL between simulation and real-world scenarios (6LoWPAN Smart Home System (6LoSH) testbed) in validating the HRPL functionalities. Our results show that HRPL had successfully reduced the routing overhead when implemented in 6LoSH. The observed Control Traffic Overhead (CTO) packet difference between each experiment is 7.1%, and the convergence time is 9.3%. Further research is recommended to be conducted for these metrics: latency, Packet Delivery Ratio (PDR), and throughput.
The Internet of Things (IoT) application has becoming progressively in-demand, most notably for the embedded devices (ED). However, each device has its own difference in computational capabilities, memory usage, and energy resources in connecting to the Internet by using Wireless Sensor Networks (WSNs). In order for this to be achievable, the WSNs that form the bulk of the IoT implementation requires a new set of technologies and protocol that would have a defined area, in which it addresses. Thus, IPv6 Low Power Area Network (6LoWPAN) was designed by the Internet Engineering Task Force (IETF) as a standard network for ED. Nevertheless, the communication between ED and 6LoWPAN requires appropriate routing protocols for it to achieve the efficient Quality of Service (QoS). Among the protocols of 6LoWPAN network, RPL is considered to be the best protocol, however its Energy Consumption (EC) and Routing Overhead (RO) is considerably high when it is implemented in a large network. Therefore, this paper would propose the HRPL to enchance the RPL protocol in reducing the EC and RO. In this study, the researchers would present the performance of RPL and HRPL in terms of EC, Control traffic Overhead (CTO) and latency based on the simulation of the 6LoWPAN network in fixed environment using COOJA simulator. The results show HRPL protocol achieves better performance in all the tested topology in terms of EC and CTO. However, the latency of HRPL only improves in chain topology compared with RPL. We found that further research is required to study the relationship between the latency and the load of packet transmission in order to optimize the EC usage.
Neuromorphic computing systems have demonstrated many advantages for popular classification problems with significantly less computational resources. We present in this paper the design, fabrication and training of a programmable neuromorphic circuit, which is based on printed electrolytegated field-effect transistor (EGFET). Based on printable neuron architecture involving several resistors and one transistor, the proposed circuit can realize multiply-add and activation functions. The functionality of the circuit, i.e. the weights of the neural network, can be set during a post-fabrication step in form of printing resistors to the crossbar. Besides the fabrication of a programmable neuron, we also provide a learning algorithm, tailored to the requirements of the technology and the proposed programmable neuron design, which is verified through simulations. The proposed neuromorphic circuit operates at 5V and occupies 385mm 2 of area.
In many application domains, in particular automotives, guaranteeing a very low failure rate is crucial to meet functional and safety standards. Especially, reliable operation of memory components such as SRAM cells is of essential importance. Due to aggressive technology downscaling, process and runtime variations significantly impact manufacturing yield as well as functionality. For this reason, a thorough memory failure rate assessment is imperative for correct circuit operation and yield improvement. In this regard, Monte Carlo simulations have been used as the conventional method to estimate the variability induced failure rate of memory components. However, Monte Carlo methods become infeasible when estimating rare events such as high-sigma failure rates. To this end, Importance Sampling methods have been proposed which reduce the number of required simulations substantially. However, existing methods still suffer from inaccuracies and high computational efforts, in particular for high-sigma problems. In this paper, we fill this gap by presenting an efficient mixture Importance Sampling approach based on Bayesian optimization, which deploys a surface model of the objective function to find the most probable failure points. Its advantages include constant complexity independent of the dimensions of design space, the potential to find the global extrema, and higher trustworthiness of the estimated failure rate by accurately exploring the design space. The approach is evaluated on a 6T-SRAM cell as well as a master-slave latch based on a 28nm FDSOI process. The results show an improvement in accuracy, resulting in up to 63× better accuracy in estimating failure rates compared to the best state-of-the-art solutions on a 28nm technology node.
Emerging applications in soft robotics, wearables, smart consumer products or IoT-devices benefit from soft materials, flexible substrates in conjunction with electronic functionality. Due to high production costs and conformity restrictions, rigid silicon technologies do not meet application requirements in these new domains. However, whenever signal processing becomes too comprehensive, silicon technology must be used for the high-performance computing unit. At the same time, designing everything in flexible or printed electronics using conventional digital logic is not feasible yet due to the limitations of printed technologies in terms of performance, power and integration density. We propose to rather use the strengths of neuromorphic computing architectures consisting in their homogeneous topologies, few building blocks and analog signal processing to be mapped to an inkjet-printed hardware architecture. It has remained a challenge to demonstrate non-linear elements besides weighted aggregation. We demonstrate in this work printed hardware building blocks such as inverter-based comprehensive weight representation and resistive crossbars as well as printed transistor-based activation functions. In addition, we present a learning algorithm developed to train the proposed printed NCS architecture based on specific requirements and constraints of the technology.
Printed electronics (PE) offers flexible, extremely low-cost, and on-demand hardware due to its additive manufacturing process, enabling emerging ultra-low-cost applications, including machine learning applications. However, large feature sizes in PE limit the complexity of a machine learning classifier (e.g., a neural network (NN)) in PE. Stochastic computing Neural Networks (SC-NNs) can reduce area in silicon technologies, but still require complex designs due to unique implementation tradeoffs in PE. In this paper, we propose a printed mixed-signal system, which substitutes complex and power-hungry conventional stochastic computing (SC) components by printed analog designs. The printed mixed-signal SC consumes only 35% of power consumption and requires only 25% of area compared to a conventional 4-bit NN implementation. We also show that the proposed mixed-signal SC-NN provides good accuracy for popular neural network classification problems. We consider this work as an important step towards the realization of printed SC-NN hardware for near-sensor-processing.
The visualization of heart rhythm disturbance and atrial fibrillation therapy allow the optimization of new cardiac catheter ablations. With the simulation software CST (Computer Simulation Technology, Darmstadt) electromagnetic and thermal simulations can be carried out to analyze and optimize different heart rhythm disturbance and cardiac catheters for pulmonary vein isolation. Another form of visualization is provided by haptic, three-dimensional print models. These models can be produced using an additive manufacturing method, such as a 3D printer. The aim of the study was to produce a 3D print of the Offenburg heart rhythm model with a representation of an atrial fibrillation ablation procedure to improve the visualization of simulation of cardiac catheter ablation.
The basis of 3D printing was the Offenburg heart rhythm model and the associated simulation of cryoablation of the pulmonary vein. The thermal simulation shows the pulmonary vein isolation of the left inferior pulmonary vein with the cryoballoon catheter Arctic Front AdvanceTM from Medtronic. After running through the simulation, the thermal propagation during the procedure was shown in the form of different colors. The three-dimensional print models were constructed on the base of the described simulation in a CAD program. Four different 3D printers are available for this purpose in a rapid prototyping laboratory at the University of Applied Science Offenburg. Two different printing processes were used: 1. a binder jetting printer with polymer gypsum and 2. a multi-material printer with photopolymer. A final print model with additional representation of the esophagus and internal esophagus catheter was also prepared for printing.
With the help of the thermal simulation results and the subsequent evaluation, it was possible to make a conclusion about the propagation of the cold emanating from the catheter in the myocardium and the surrounding tissue. It could be measured that already 3 mm from the balloon surface into the myocardium the temperature drops to 25 °C. The simulation model was printed using two 3D printing methods. Both methods as well as the different printing materials offer different advantages and disadvantages. While the first model made of polymer gypsum can be produced quickly and cheaply, the second model made of photopolymer takes five times longer and was twice as expensive. On the other hand, the second model offers significantly better properties and was more durable overall. All relevant parts, especially the balloon catheter and the conduction, are realistically represented. Only the thermal propagation in the form of different colors is not shown on this model.
Three-dimensional heart rhythm models as well as virtual simulations allow a very good visualization of complex cardiac rhythm therapy and atrial fibrillation treatment methods. The printed models can be used for optimization and demonstration of cryoballoon catheter ablation in patients with atrial fibrillation.
The visualization of heart rhythm disturbance and atrial fibrillation therapy allows the optimization of new cardiac catheter ablations. With the simulation software CST (Computer Simulation Technology, Darmstadt) electromagnetic and thermal simulations can be carried out to analyze and optimize different heart rhythm disturbance and cardiac catheters for pulmonary vein isolation. Another form of visualization is provided by haptic, three-dimensional print models. These models can be produced using an additive manufacturing method, such as a 3d printer. The aim of the study was to produce a 3d print of the Offenburg heart rhythm model with a representation of an atrial fibrillation ablation procedure to improve the visualization of simulation of cardiac catheter ablation. The basis of 3d printing was the Offenburg heart rhythm model and the associated simulation of cryoablation of the pulmonary vein. The thermal simulation shows the pulmonary vein isolation of the left inferior pulmonary vein with the cryoballoon catheter Arctic Front Advance™ from Medtronic. After running through the simulation, the thermal propagation during the procedure was shown in the form of different colors. The three-dimensional print models were constructed on the base of the described simulation in a CAD program. Four different 3d printers are available for this purpose in a rapid prototyping laboratory at the University of Applied Science Offenburg. Two different printing processes were used and a final print model with additional representation of the esophagus and internal esophagus catheter was also prepared for printing. With the help of the thermal simulation results and the subsequent evaluation, it was possible to draw a conclusion about the propagation of the cold emanating from the catheter in the myocardium and the surrounding tissue. It was measured that just 3 mm from the balloon surface into the myocardium the temperature dropped to 25 °C. The simulation model was printed using two 3d printing methods. Both methods, as well as the different printing materials offer different advantages and disadvantages. All relevant parts, especially the balloon catheter and the conduction, are realistically represented. Only the thermal propagation in the form of different colors is not shown on this model. Three-dimensional heart rhythm models as well as virtual simulations allow very clear visualization of complex cardiac rhythm therapy and atrial fibrillation treatment methods. The printed models can be used for optimization and demonstration of cryoballoon catheter ablation in patients with atrial fibrillation.
Ensuring that software applications present their users the most recent version of data is not trivial. Self-adjusting computations are a technique for automatically and efficiently recomputing output data whenever some input changes.
This article describes the software architecture of a large, commercial software system built around a framework for coarse-grained self-adjusting computations in Haskell. It discusses advantages and disadvantages based on longtime experience. The article also presents a demo of the system and explains the API of the framework.
Morphological transition of a rod-shaped phase into a string of spherical particles is commonly observed in the microstructures of alloys during solidification (Ratke and Mueller, 2006). This transition phenomenon can be explained by the classic Plateau-Rayleigh theory which was derived for fluid jets based on the surface area minimization principle. The quintessential work of Plateau-Rayleigh considers tiny perturbations (amplitude much less than the radius) to the continuous phase and for large amplitude perturbations, the breakup condition for the rod-shaped phase is still a knotty issue. Here, we present a concise thermodynamic model based on the surface area minimization principle as well as a non-linear stability analysis to generalize Plateau-Rayleigh’s criterion for finite amplitude perturbations. Our results demonstrate a breakup transition from a continuous phase via dispersed particles towards a uniform-radius cylinder, which has not been found previously, but is observed in our phase-field simulations. This new observation is attributed to a geometric constraint, which was overlooked in former studies. We anticipate that our results can provide further insights on microstructures with spherical particles and cylinder-shaped phases.
PROFINET Security: A Look on Selected Concepts for Secure Communication in the Automation Domain
(2023)
We provide a brief overview of the cryptographic security extensions for PROFINET, as defined and specified by PROFIBUS & PROFINET International (PI). These come in three hierarchically defined Security Classes, called Security Class 1,2 and 3. Security Class 1 provides basic security improvements with moderate implementation impact on PROFINET components. Security Classes 2 and 3, in contrast, introduce an integrated cryptographic protection of PROFINET communication. We first highlight and discuss the security features that the PROFINET specification offers for future PROFINET products. Then, as our main focus, we take a closer look at some of the technical challenges that were faced during the conceptualization and design of Security Class 2 and 3 features. In particular, we elaborate on how secure application relations between PROFINET components are established and how a disruption-free availability of a secure communication channel is guaranteed despite the need to refresh cryptographic keys regularly. The authors are members of the PI Working Group CB/PG10 Security.