Refine
Year of publication
- 2018 (111) (remove)
Document Type
- Conference Proceeding (61)
- Article (reviewed) (31)
- Part of a Book (9)
- Letter to Editor (4)
- Article (unreviewed) (3)
- Patent (2)
- Doctoral Thesis (1)
Conference Type
- Konferenzartikel (44)
- Konferenz-Abstract (13)
- Sonstiges (3)
- Konferenz-Poster (1)
Language
- English (111) (remove)
Has Fulltext
- no (111) (remove)
Is part of the Bibliography
- yes (111) (remove)
Keywords
- Mikrostruktur (3)
- Plastizität (3)
- RoboCup (3)
- 5G mobile communication (2)
- Access protocols (2)
- Decoding (2)
- Gamification (2)
- MPC (2)
- Multiuser detection (2)
- Payloads (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (50)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (27)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (15)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (15)
- Fakultät Wirtschaft (W) (13)
- INES - Institut für nachhaltige Energiesysteme (10)
- ACI - Affective and Cognitive Institute (6)
- CRT - Campus Research & Transfer (2)
- WLRI - Work-Life Robotics Institute (1)
- Zentrale Einrichtungen (1)
Open Access
- Closed Access (58)
- Open Access (43)
- Bronze (3)
- Closed (2)
- Diamond (1)
In the 19th century Alexander von Humboldt explored the nature and was conceived a new vision of nature that still influences the way we understand the new world. Humboldt believed in the importance of accurate measurements and precise description of observations. His vision of nature included not only facts but also emotions.
Nowadays smart solutions will be developed by using computer technology, which will influence our relationship to nature, our handling of the complexity and diversity of nature itself and the technological influences on the society. Could we avoid a new form of “Colonialism”, when a network of super computers will create a smarter world?
This paper describes the Sweaty II humanoid adult size robot trying to qualify for the RoboCup 2018 adult size humanoid competition. Sweaty came 2nd in RoboCup 2017 adult size league. The main characteristics of Sweaty are described in the Team Description Paper 2017. The improvements that have been made or are planned to be implemented for RoboCup 2018 are described in this paper.
A Nonlinear FEM Model to Calculate Third-Order Harmonic and Intermodulation in TC-SAW Devices
(2018)
Nonlinearities in Temperature Compensated SAW (TC-SAW) devices in the 2 GHz range are investigated using a nonlinear finite element model by simultaneously considering both third-order intermodulation distortion (IMD3)and third harmonic (H3). In the employed perturbation approach, different contributions to the total H3, the direct and indirect contribution, are discussed. H3 and IMD3 measurements were fitted simultaneously using scaling factors for SiO 2 film and Cu electrode nonlinear material tensors in TC-SAW devices. We employ a P-Matrix simulation as intermediate step: Firstly, measurement and nonlinear P-Matrix calculations for finite devices are compared and coefficients of the P-Matrix simulation are determined. The nonlinear tensor data of the different materials involved in periodic nonlinear finite element method (FEM) computations are optimized to fit periodic P-Matrix calculations by introducing scaling factors. Thus, the contribution of different materials to the nonlinear behavior of TC-SAW devices is obtained and the role of materials is discussed.
Quantification of astaxanthin in salmons by chemiluminescence and absorption after TLC separation
(2018)
Astaxanthin is a keto-carotenoid, belongs to the chemical class of terpenes and is a yellow lipid soluble compound. The compound is present in marine animals like salmons and crustacean. Its colour is due to conjugated double bonds and these double bonds are responsible for its antioxidant effect. Its antioxidant activity is ten times stronger than other carotenoids and nearly 500 fold stronger than vitamin-E. We present a new thin layer chromatography (TLC) method to measure astaxanthin on TLC-plates (Merck, 1.05554) in the visible absorption range as well as by using chemiluminescence. For separation a solvent mixture of cyclohexane and acetone (10 + 2.4, v/v) was used. The RF-value of astaxanthin is 0.14.The limit of detection in vis-absorption is 64 ng / band and the limit of quantification is 92 ng/band. In chemiluminescence the values are 90 ng / band and 115 ng/band. The method offers two independently working measurement modes on a single plate which increase the accuracy of the quantification.
The authors claim that location information of stationary ICT components can never be unclassified. They describe how swarm-mapping crowd sourcing is used by Apple and Google to worldwide harvest geo-location information on wireless access points and mobile telecommunication systems' base stations to build up gigantic databases with very exclusive access rights. After having highlighted the known technical facts, in the speculative part of this article, the authors argue how this may impact cyber deterrence strategies of states and alliances understanding the cyberspace as another domain of geostrategic relevance. The states and alliances spectrum of activities due to the potential existence of such databases may range from geopolitical negotiations by institutions understanding international affairs as their core business, mitigation approaches at a technical level, over means of cyber deterrence-by-retaliation.
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
In a SAW device comprises a SAW chip bearing a SAW transducer arranged within a first signal line parasitic signals due to higher harmonics of the operating frequency of the SAW devices are electrically eliminated by compensating means comprising at least one second signal line having means for producing a cancelling signal different in sign or phase to the parasitic signal, or a shunt line to electrically connect the SAW transducer to a back side metallization of the SAW chip.
Existing ultrasonic stress evaluation methods utilize the acoustoelastic effect for bulk waves propagating in volume, which is unsuitable for a surface treated material, possessing a significant variation in material properties with depth. With knowledge of nonlinear elastic parameters – third-order elastic constants (TOEC) close to the surface of the sample, the acoustoelastic effect might be used with surface acoustic waves. This work is focused on the development of an independent method of TOEC measurement using the effect of nonlinear surface acoustic waves scattering – i.e. the effect of elastic waves interaction in a nonlinear medium.
In this paper, the possible three wave interactions of surface guided waves and bulk waves are described and formulae for the efficiency of harmonic generation and mode mixing are derived. A comparison of the efficiency of surface waves scattering in an isotropic medium for different interaction types is carried out with the help of nonlinear perturbation theory. First results for surface and bulk wave mixing with known second- and third-order elastic constants are shown.
In this paper, we establish a simple model for the exchange of messages in a vehicular network and we consider fundamental limits on the achievable data rate. For a vehicular network, the exchange of data with other nearby vehicles is particularly important for traffic safety, e.g. for collision avoidance, but also for cooperative applications like platooning. These use cases are currently addressed by standards building on IEEE 802.11p, namely ITS-G5 and DSRC (dedicated short range communication), which encounter saturation problems at high vehicle densities. For this reason, we take a step back and ask for the fundamental limits for the common data rate in a vehicular network. After defining a simple single-lane model and the corresponding capacity limits for some basic multiple- access schemes, we present results for a more realistic setting. For both scenarios, non-orthogonal multiple-access (NOMA) yields the best results.
This paper evaluates the implementation of Medium Access Control (MAC) protocols suitable for massive access connectivity in 5G multi-service networks. The access protocol extends multi-packet detection receivers based on Physical Layer Network Coding (PLNC) decoding and Coded Random Access protocols considering practical aspects to implement one-stage MAC protocols for short packet communications in mMTC services. Extensions to enhance data delivery phase in two- stage protocols are also proposed. The assessment of the access protocols is extended under system level simulations where a suitable link to system interface characterization has been taken into account.
Micro-cracks give rise to non-analytic behavior of the stress-strain relation. For the case of a homogeneous spatial distribution of aligned flat micro-cracks, the influence of this property of the stress-strain relation on harmonic generation is analyzed for Rayleigh waves and for acoustic wedge waves with the help of a simple micromechanical model adopted from the literature. For the efficiencies of harmonic generation of these guided waves, explicit expressions are derived in terms of the corresponding linear wave fields. The initial growth rates of the second harmonic, i.e., the acoustic nonlinearity parameter, has been evaluated numerically for steel as matrix material. The growth rate of the second harmonic of Rayleigh waves has also been determined for microcrack distributions with random orientation, using a model expression for the strain energy in terms of strain invariants known in a geophysical context.
Nonlinearity can give rise to intermodulation distortions in surface acoustic wave (SAW) devices operating at high input power levels. To understand such undesired effects, a finite element method (FEM) simulation model in combination with a perturbation theory is applied to find out the role of different materials and higher order nonlinear tensor data for the nonlinearities in such acoustic devices. At high power, the SAW devices containing metal, piezoelectric substrate, and temperature compensating (TC) layers are subject to complicated geometrical, material, and other nonlinearities. In this paper, third-order nonlinearities in TC-SAW devices are investigated. The materials used are LiNbO 3 -rot128YX as the substrate and copper electrodes covered with a SiO 2 film as the TC layer. An effective nonlinearity constant for a given system is determined by comparison of nonlinear P-matrix simulations to third-order intermodulation measurements of test filters in a first step. By employing these constants from different systems, i.e., different metallization ratios, in nonlinear periodic P-matrix simulations, a direct comparison to nonlinear periodic FEM-simulations yields scaling factors for the materials used. Thus, the contribution of the different materials to the nonlinear behavior of TC-SAW devices is obtained and the role of metal electrodes, substrate, and TC film are discussed in detail.
For an elastic medium containing a homogeneous distribution of micro-cracks, an effective one-dimensional stress-strain relation has been determined with finite element simulations. In addition to flat micro-cracks, voids were considered that contain a Hertzian contact, which represents an example for micro-cracks with internal structure. The orientation of both types of micro-cracks was fully aligned or, for flat micro-cracks, totally random. For micro-cracks with Hertzian contacts, the case of random orientation was treated in an approximate way. The two types of defects were found to give rise to different degrees of non-analytic behavior of the effective stress-strain relation, which governs the nonlinear propagation of symmetric (S0) Lamb waves in the long-wavelength limit. The presence of flat micro-cracks causes even harmonics to grow linearly with propagation distance with amplitudes proportional to the amplitude of the fundamental wave, and gives rise to a static strain. The presence of the second type of defects leads to a linear growth of all harmonics with amplitudes proportional to the power 3/2 of the fundamental amplitude, and to a strain-dependent velocity shift. Simple expressions are given for the growth rates of higher harmonics of S0 Lamb waves in terms of the parameters occurring in the effective stress-strain relation. They have partly been determined quantitatively with the help of the FEM results for different micro-crack concentrations.
Among the various types of guided acoustic waves, acoustic wedge waves are non-diffractive and non-dispersive. Both properties make them susceptible to nonlinear effects. Investigations have recently been focused on effects of second-order nonlinearity in connection with anisotropy. The current status of these investigations is reviewed in the context of earlier work on nonlinear properties of two-dimensional guided acoustic waves, in particular surface waves. The role of weak dispersion, leading to solitary waves, is also discussed. For anti-symmetric flexural wedge waves propagating in isotropic media or in anisotropic media with reflection symmetry with respect to the wedge’s mid-plane, an evolution equation is derived that accounts for an effective third-order nonlinearity of acoustic wedge waves. For the kernel functions occurring in the nonlinear terms of this equation, expressions in terms of overlap integrals with Laguerre functions are provided, which allow for their quantitative numerical evaluation. First numerical results for the efficiency of third-harmonic generation of flexural wedge waves are presented.
This paper is discussing the development of a wireless Indoor Smart Gardening System with the focus on energy autonomous working. The Smart Gardening System, which is presented in this paper consists of a network of energy autonomous wireless sensor nodes which are used for monitoring important plant parameters like air temperature, soil moisture, pressure or humidity and in future to control an actuator for the plant irrigation and to measure further parameter as light and fertilizer level. Solar energy harvesting is used for powering the wireless nodes without the usage of a battery. Comparable Smart Gardening Systems are usually battery-powered. Furthermore, the overall Smart Gardening System consists of a battery powered gateway based on a Raspberry Pi 3 system, which controls the wireless nodes and collects their sensor data. The gateway is able to send the information to an internet server application and via Wi-Fi to mobile devices. Particularly the architecture of the energy autonomous wireless nodes will be considered because fully energy autonomous wireless networks could not be implemented without special concepts for the energy supply and architecture of the wireless nodes.
The economic dispatch (ED) problem is a large-scale optimization problem in electricity power grids. Its goal is to find a power output combination of all generator nodes that meet the demand of the customers at minimum operating cost. In recent years, distributed protocols have been proposed to replace the traditional centralized ED calculation for modern smart grid infrastructures with the most realistic being the one proposed by Binetti et al. (2014). However, we show that this protocol leaks private information of the generator nodes. We then propose a privacy-preserving distributed protocol that solves the ED problem. We analyze the security of our protocol and give experimental results from a prototype implementation to show the feasibility of the solution.
Nowadays, robotic systems are an integral part of many orthopedic interventions. Stationary robots improve the accuracy but also require adapted surgical workflows. Handheld robotic devices (HHRDs), however, are easily integrated into existing workflows and represent a more economical solution. Their limited range of motion is compensated by the dexterity of the surgeon. This work presents control algorithms for HHRDs with multiple degrees of freedom (DOF). These algorithms protect pre- or intraoperatively defined regions from being penetrated by the end effector (e.g., a burr) by controlling the joints as well as the device’s power. Accuracy tests on a stationary prototype with three DOF show that the presented control algorithms produce results similar to those of stationary robots and much better results than conventional techniques. This work presents novel and innovative algorithms, which work robustly, accurately, and open up new opportunities for orthopedic interventions.
The CAN bus still is an important fieldbus in various domains, e.g. for in-car communication or automation applications. To counter security threats and concerns in such scenarios we design, implement, and evaluate the use of an end-to-end security concept based on the Transport Layer Security protocol. It is used to establish authenticated, integrity-checked, and confidential communication channels between field devices connected via CAN. Our performance measurements show that it is possible to use TLS at least for non time-critical applications, as well as for generic embedded networks.
The increase in households with grid connected Photovoltaic (PV) battery system poses challenge for the grid due to high PV feed-in as a result of mismatch in energy production and load demand. The purpose of this paper is to show how a Model Predictive Control (MPC) strategy could be applied to an existing grid connected household with PV battery system such that the use of battery is maximized and at the same time peaks in PV energy and load demand are reduced. The benefits of this strategy are to allow increase in PV hosting capacity and load hosting capacity of the grid without the need for external signals from the grid operator. The paper includes the optimal control problem formulation to achieve the peak shaving goals along with the experiment set up and preliminary experiment results. The goals of the experiment were to verify the hardware and software interface to implement the MPC and as well to verify the ability of the MPC to deal with the weather forecast deviation. A prediction correction has also been introduced for a short time horizon of one hour within this MPC strategy to estimate the PV output power behavior.
In rural low voltage grid networks, the use of battery in the households with a grid connected Photovoltaic (PV) system is a popular solution to shave the peak PV feed-in to the grid. For a single electricity price scenario, the existing forecast based control approaches together with a decision based control layer uses weather and load forecast data for the on–off schedule of the battery operation. These approaches do bring cost benefit from the battery usage. In this paper, the focus is to develop a Model Predictive Control (MPC) to maximize the use of the battery and shave the peaks in the PV feed-in and the load demand. The solution of the MPC allows to keep the PV feed-in and the grid consumption profile as low and as smooth as possible. The paper presents the mathematical formulation of the optimal control problem along with the cost benefit analysis . The MPC implementation scheme in the laboratory and experiment results have also been presented. The results show that the MPC is able to track the deviation in the weather forecast and operate the battery by solving the optimal control problem to handle this deviation.
Uncontrollable manufacturing variations in electrical hardware circuits can be exploited as Physical Unclonable Functions (PUFs). Herein, we present a Printed Electronics (PE)-based PUF system architecture. Our proposed Differential Circuit PUF (DiffC-PUF) is a hybrid system, combining silicon-based and PE-based electronic circuits. The novel approach of the DiffC-PUF architecture is to provide a specially designed real hardware system architecture, that enables the automatic readout of interchangeable printed DiffC-PUF core circuits. The silicon-based addressing and evaluation circuit supplies and controls the printed PUF core and ensures seamless integration into silicon-based smart systems. Major objectives of our work are interconnected applications for the Internet of Things (IoT).
Vehicle-to-Everything (V2X) communication promises improvements in road safety and efficiency by enabling low-latency and reliable communication services for vehicles. Besides using Mobile Broadband (MBB), there is a need to develop Ultra Reliable Low Latency Communications (URLLC) applications with cellular networks especially when safety-related driving applications are concerned. Future cellular networks are expected to support novel latencysensitive use cases. Many applications of V2X communication, like collaborative autonomous driving requires very low latency and high reliability in order to support real-time communication between vehicles and other network elements. In this paper, we classify V2X use-cases and their requirements in order to identify cellular network technologies able to support them. The bottleneck problem of the medium access in 4G Long Term Evolution(LTE) networks is random access procedure. It is evaluated through simulations to further detail the future limitations and requirements. Limitations and improvement possibilities for next generation of cellular networks are finally detailed. Moreover, the results presented in this paper provide the limits of different parameter sets with regard to the requirements of V2X-based applications. In doing this, a starting point to migrate to Narrowband IoT (NB-IoT) or 5G - solutions is given.
The next generation cellular networks are expected to improve reliability, energy efficiency, data rate, capacity and latency. Originally, Machine Type Communication (MTC) was designed for low-bandwidth high-latency applications such as, environmental sensing, smart dustbin, etc., but there is additional demand around applications with low latency requirements, like industrial automation, driver-less cars, and so on. Improvements are required in 4G Long Term Evolution (LTE) networks towards the development of next generation cellular networks for providing very low latency and high reliability. To this end, we present an in-depth analysis of parameters that contribute to the latency in 4G networks along with a description of latency reduction techniques. We implement and validate these latency reduction techniques in the open-source network simulator (NS3) for narrowband user equipment category Cat-Ml (LTE-M) to analyze the improvements. The results presented are a step towards enabling narrowband Ultra Reliable Low Latency Communication (URLLC) networks.
The excessive control signaling in Long Term Evolution networks required for dynamic scheduling impedes the deployment of ultra-reliable low latency applications. Semi-persistent scheduling was originally designed for constant bit-rate voice applications, however, very low control overhead makes it a potential latency reduction technique in Long Term Evolution. In this paper, we investigate resource scheduling in narrowband fourth generation Long Term Evolution networks through Network Simulator (NS3) simulations. The current release of NS3 does not include a semi-persistent scheduler for Long Term Evolution module. Therefore, we developed the semi-persistent scheduling feature in NS3 to evaluate and compare the performance in terms of uplink latency. We evaluate dynamic scheduling and semi-persistent scheduling in order to analyze the impact of resource scheduling methods on up-link latency.
The Datagram Transport Layer Security (DTLS) protocol has been designed to provide end-to-end security over unreliable communication links. Where its connection establishment is concerned, DTLS copes with potential loss of protocol messages by implementing its own loss detection and retransmission scheme. However, the default scheme turns out to be suboptimal for links with high transmission error rates and low data rates, such as wireless links in electromagnetically harsh industrial environments. Therefore, in this paper, as a first step we provide an analysis of the standard DTLS handshake's performance under such adverse transmission conditions. Our studies are based on simulations that model message loss as the result of bit transmission errors. We consider several handshake variants, including endpoint authentication via pre-shared keys or certificates. As a second step, we propose and evaluate modifications to the way message loss is dealt with during the handshake, making DTLS deployable in situations which are prohibitive for default DTLS.
The Transport Layer Security (TLS) protocol is a cornerstone of secure network communication, not only for online banking, e-commerce, and social media, but also for industrial communication and cyber-physical systems. Unfortunately, implementing TLS correctly is very challenging, as becomes evident by considering the high frequency of bugfixes filed for many TLS implementations. Given the high significance of TLS, advancing the quality of implementations is a sustained pursuit. We strive to support these efforts by presenting a novel, response-distribution guided fuzzing algorithm for differential testing of black-box TLS implementations. Our algorithm generates highly diverse and mostly-valid TLS stimulation messages, which evoke more behavioral discrepancies in TLS server implementations than other algorithms. We evaluate our algorithm using 37 different TLS implementations and discuss―by means of a case study―how the resulting data allows to assess and improve not only implementations of TLS but also to identify underspecified corner cases. We introduce suspiciousness as a per-implementation metric of anomalous implementation behavior and find that more recent or bug-fixed implementations tend to have a lower suspiciousness score. Our contribution is complementary to existing tools and approaches in the area, and can help reveal implementation flaws and avoid regression. While being presented for TLS, we expect our algorithm's guidance scheme to be applicable and useful also in other contexts. Source code and data is made available for fellow researchers in order to stimulate discussions and invite others to benefit from and advance our work.
Cell lifetime diagnostics and system be-havior of stationary LFP/graphite lithium-ion batteries
(2018)
The paper describes the methodology and experimental results for revealing similarities in thermal dependencies of biases of accelerometers and gyroscopes from 250 inertial MEMS chips (MPU-9250). Temperature profiles were measured on an experimental setup with a Peltier element for temperature control. Classification of temperature curves was carried out with machine learning approach.
A perfect sensor should not have thermal dependency at all. Thus, only sensors inside the clusters with smaller dependency (smaller total temperature slopes) might be pre-selected for production of high accuracy inertial navigation modules. It was found that no unified thermal profile (“family” curve) exists for all sensors in a production batch. However, obviously, sensors might be grouped according to their parameters. Therefore, the temperature compensation profiles might be regressed for each group. 12 slope coefficients on 5 degrees temperature intervals from 0°C to +60°C were used as the features for the k-means++ clustering algorithm.
The minimum number of clusters for all sensors to be well separated from each other by bias thermal profiles in our case is 6. It was found by applying the elbow method. For each cluster a regression curve can be obtained.
Recently, the demand for scalable, efficient and accurate Indoor Positioning Systems (IPS) has seen a rising trend due to their utility in providing Location Based Services (LBS). Visible Light Communication (VLC) based IPS designs, VLC-IPS, leverage Light Emitting Diodes (LEDs) in indoor environments for localization. Among VLC-based designs, Time Difference of Arrival (TDOA) based techniques are shown to provide very low errors in the relative position of receivers. Our considered system consists of five LEDs that act as transmitters and a single receiver (photodiode or image sensor in smart phone) whose position coordinates in an indoor environment are to be determined. As a performance criterion, Cramer Rao Lower Bound (CRLB) is derived for range estimations and the impact of various factors, such as, LED transmission frequency, position of reference LED light, and the number of LED lights, on localization accuracy has been studied. Simulation results show that depending on the optimal values of these factors, location estimation on the order of few centimeters can be realistically achieved.
Modelling detailed chemistry in lithium-ion batteries: Insight into performance, ageing and safety
(2018)
Real-Time Ethernet has become the major communication technology for modern automation and industrial control systems. On the one hand, this trend increases the need for an automation-friendly security solution, as such networks can no longer be considered sufficiently isolated. On the other hand, it shows that, despite diverging requirements, the domain of Operational Technology (OT) can derive advantage from high-volume technology of the Information Technology (IT) domain. Based on these two sides of the same coin, we study the challenges and prospects of approaches to communication security in real-time Ethernet automation systems. In order to capitalize the expertise aggregated in decades of research and development, we put a special focus on the reuse of well-established security technology from the IT domain. We argue that enhancing such technology to become automation-friendly is likely to result in more robust and secure designs than greenfield designs. Because of its widespread deployment and the (to this date) nonexistence of a consistent security architecture, we use PROFINET as a showcase of our considerations. Security requirements for this technology are defined and different well-known solutions are examined according their suitability for PROFINET. Based on these findings, we elaborate the necessary adaptions for the deployment on PROFINET.
Colored glass products with various printing technologies are becoming more important in industry. The aim is to achieve individual solution in a very short delivery time. Conventional thermal treatment of burning glasses in oven for tempered color printing has predominant issues with high time consumption, energy consumption and manufacturing cost. It requires alternative process development.
This paper proposes laser process to overcome issues in conventional treatment with the latest results of tempering colored glass. Samples have been analyzed with the scanning electron microscope (SEM). Two different laser systems have been applied and the glass has been printed with black paste.
In recent years, the application of TRIZ methodology in the process engineering has been found promising to develop comprehensive inventive solution concepts for process intensification (PI). However, the effectiveness of TRIZ for PI is not measured or estimated. The paper describes an approach to evaluate the efficiency of TRIZ application in process intensification by comparing six case studies in the field of chemical, pharmaceutical, ceramic, and mineral industries. In each case study, TRIZ workshops with the teams of researchers and engineers has been performed to analyze initial complex problem situation, to identify problems, to generate new ideas, and to create solution concepts. The analysis of the workshop outcomes estimates fulfilment of the PI-goals, impact of secondary problems, variety and efficiency of ideas and solution concepts. In addition to the observed positive effect of TRIZ application, the most effective inventive principles for process engineering have been identified.
Identification of Secondary Problems of New Technologies in Process Engineering by Patent Analysis
(2018)
The implementation of new technologies in production plants often causes negative side effects and drawbacks. In this context, the prediction of the secondary problems and risks can be used advantageously for selecting best solutions for intensification of the processes. The proposed method puts primary emphasis on systematic and fast anticipation of secondary problems using patent documents, and on extraction and prediction of possible engineering contradictions within novel technical systems. The approach comprises three ways to find secondary problems: (a) direct knowledge-based identification of secondary problems in new technologies or equipment; (b) identification of secondary problems of prototypes mentioned in patent citation trees; and (c) prediction of negative side effects using the correlation matrix for invention goals and secondary problems in a specific engineering domain.
The research work analyses the relationship of 155 Process Intensification (PI) technologies to the components of the Theory of Inventive Problem Solving (TRIZ). It outlines TRIZ inventive principles frequently used in PI, and identifies opportunities for enhancing systematic innovation in process engineering by applying complementary TRIZ and PI. The study also proposes 70 additional inventive TRIZ sub-principles for the problems frequently encountered in process engineering, resulting in the advanced set of 160 inventive operators, assigned to the 40 TRIZ inventive principles. Finally, we analyse and discuss inventive principles used in 150 patent documents published in the last decade in the field of solid handling in the ceramic and pharmaceutical industries.
Process engineering (PE) focuses on the design, operation, control and optimization of chemical, physical and biological processes and has applications in many industries. Process intensification (PI) is the key development approach in the modern process engineering. The theory of inventive problem solving (TRIZ) is today considered as the most comprehensive and systematically organized invention knowledge and creative thinking methodology. This paper analyses the opportunities of TRIZ application in PE and especially in combination with PI. In this context the paper outlines the major challenges for TRIZ application in PE, conceptualizes a possible TRIZ-based approach for process intensification and problem solving in PE, and defines the corresponding research agenda. It also presents the results of the original empirical innovation research in the field of solid handling in the ceramic industry, demonstrates a method for identification and prediction of contradictions and introduces the concept of the probability of contradiction occurrence. Additionally, it describes a technique of process mapping that is based on the function and multi-screen analysis of the processes. This technique is illustrated by a case study dealing with granulation process. The research work presented in this paper is a part of the European project “Intensified by Design® platform for the intensification of processes involving solids handling”.