Refine
Year of publication
Document Type
- Conference Proceeding (456)
- Bachelor Thesis (350)
- Article (reviewed) (243)
- Part of a Book (201)
- Article (unreviewed) (156)
- Master's Thesis (101)
- Other (75)
- Book (71)
- Contribution to a Periodical (34)
- Report (8)
Conference Type
- Konferenzartikel (398)
- Konferenz-Abstract (38)
- Sonstiges (9)
- Konferenz-Poster (8)
- Konferenzband (3)
Language
- German (1038)
- English (666)
- Other language (2)
- Russian (2)
Keywords
- Dünnschichtchromatographie (19)
- Marketing (19)
- Digitalisierung (14)
- Künstliche Intelligenz (13)
- IT-Sicherheit (12)
- Gamification (11)
- JavaScript (11)
- Social Media (11)
- Kommunikation (10)
- Social Media Marketing (10)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (564)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (354)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (298)
- Fakultät Wirtschaft (W) (189)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (181)
- Fakultät Medien (M) (ab 22.04.2021) (115)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (81)
- INES - Institut für nachhaltige Energiesysteme (67)
- ACI - Affective and Cognitive Institute (39)
- WLRI - Work-Life Robotics Institute (20)
Open Access
- Closed Access (1708) (remove)
Die Internationalisierung ist mittlerweile ein zentraler Aspekt der gegenwärtigen ökonomischen Debatte. Inzwischen sind nämlich immer mehr Unternehmungen von der internationalen Verschmelzung der Märkte und Branchen betroffen. Haben lange Zeit überwiegend Großunternehmen und Konzerne über die nationalen Grenzen hinweg agiert, stellt sich zunehmend auch der Mittelstand der Herausforderung der Internationalisierung. Schließlich bieten sich international tätigen Firmen durch die Erschließung neuer Märkte unter anderem eine Reihe von attraktiven Wachstumschancen.
Das Internet hat nicht nur neue Geschäftsmodelle in großer Zahl hervorgebracht, es ist auch bei der Erfindung neuer Werbeformen sehr kreativ. Neben die „klassische“ Bannerwerbung und die inzwischen auch schon intensiv weiter entwickelten Partnerprogramme (Affiliate-Marketing) treten in zunehmender Weise auch und gerade „getarnte“ Werbeformen, die mit Bezeichnungenwie „Stealth-Marketing“ schon vom Namen her für Furore sorgen sollen. Der Beitrag stellt einige dieser Werbeformen vor und beurteilt sie aus rechtlicher Sicht. Dabei erweisen sich diese Marketing-Varianten mitunter als nicht so neu wie ihre Anbieter behaupten.
The development of secure software systems is of ever-increasing importance. While software companies often invest large amounts of resources into the upkeeping and general security properties of large-scale applications when in production, they appear to neglect utilizing threat modeling in the earlier stages of the software development lifecycle. When applied during the design phase of development, and continuously throughout development iterations, threat modeling can help to establish a "Secure by Design" approach. This approach allows issues relating to IT security to be found early during development, reducing the need for later improvement – and thus saving resources in the long term. In this paper the current state of threat modeling is investigated. This investigation drove the derivation of requirements for the development of a new threat modelling framework and tool, called OVVL. OVVL utilizes concepts of established threat modeling methodologies, as well as functionality not available in existing solutions.
In the course of the last few years, our students are becoming increasingly unhappy. Sometimes they stop attending lectures and even seem not to know how to behave correctly. It feels like they are getting on strike. Consequently, drop-out rates are sky-rocketing. The lecturers/professors are not happy either, adopting an “I-don’t-care” attitude.
An interdisciplinary, international team set in to find out: (1) What are the students unhappy about? Why is it becoming so difficult for them to cope? (2) What does the “I-don’t-care” attitude of professors actually mean? What do they care or not care about? (3) How far do the views of the parties correlate? Could some kind of mutual understanding be achieved?
The findings indicate that, at least at our universities, there is rather a long way to go from “Engineering versus Pedagogy” to “Engineering Pedagogy”.
IPv6 over resource-constrained devices (6Lo) emerged as a de-facto standard for the Internet of Things (IoT) applications especially in home and building automation systems. We provide results of an investigation of the applicability of 6LoWPAN with RPL mesh networks for home and building automation use cases. The proper selection of Trickle parameters and neighbor reachable time-outs is important in the RPL protocol suite to respond efficiently to any path failure. These parameters were analyzed in the context of energy consumption w.r.t the number of control packets. The measurements were performed in an Automated Physical Testbeds (APTB). The results match the recommendation by RFC 7733 for selecting various parameters of RPL protocol suite. This paper shows the relationship between various RPL parameters and control traffic overhead during network rebuild. Comparative measurement results with Bluetooth Low Energy (BLE) in this work showed that 6Lo with RPL outperformed BLE in this use case with less control traffic overheads.
Im Jahr 1504 verlor der deutsche Ritter Gottfried („Götz“) von Berlichingen seine
rechte Hand. Schon während seiner Genesung dachte er daran, die Hand zu ersetzen,
und beauftragte bald darauf die erste Handprothese, die sogenannte „Eiserne Hand“.
Jahre später wurde die aufwändigere zweite „Eiserne Hand“ gebaut. Wir haben die erste
Prothese auf der Basis früherer Literaturdaten von
Quasigroch (1982) mit Hilfe von 3-D
Computer-Aided Design (CAD) rekonstruiert. Dazu mussten einige Abmessungen angepasst
und ein paar Annahmen für das CAD-Modell gemacht werden. Die historische passive
Prothese des Götz von Berlichingen ist für die moderne Neuroprothetik interessant, da sie
eine Alternative zu komplexen invasiven Brain-Machine-Interface-Konzepten darstellen
könnte, wo diese Konzepte nicht notwendig, möglich oder vom Patienten gewünscht sind.
In this study, we tested the function of a replica of the over 500-year-old original of the
famous Franconian Imperial Knight Götz von Berlichingen’s first “iron hand”, which we
reconstructed by computer-aided design (CAD) and recently printed using a multi-material
3D printer. In different everyday tasks, the artificial hand prosthesis proved to be remarkably
helpful. Thus, the hand could hold a wine glass, some grapes, or a smartphone. With a
suitable pencil, even writing was possible without any problem. Although for all these
functions the healthy other hand was necessary to assist at the beginning, the artificial hand
is an astonishing mechanical aid with many possibilities. Therefore, in certain cases, the
non-invasive approach of a passive mechanical hand replacement, which is an individual,
quick and cheap solution due to modern 3D printing, may always be worth considering
also for today’s requirements.
Auf Grundlage der Computer-Aided-Design (CAD)-rekonstruierten ersten „Eisernen Hand“ des Götz von Berlichingen wird ein umgebautes, controllergesteuertes sensomotorisches Fingersystem auf seine Funktionalität beim Greifen von unterschiedlichen Gegenständen beschrieben und geprüft. Die elektronischen Finger, die den „Pinzettengriff“ nachahmen und automatisch bei dem zuvor eingestellten Anpressdruck abschalten, bewiesen eine bemerkenswerte Alltagstauglichkeit. Das vorgestellte Grundkonzept könnte eine Alternative bei der Entwicklung einfacher und kostengünstiger, aber dennoch gut einsatzfähiger bionischer Hände sein und zeigt einmal mehr, wie historische Ideen in die Gegenwart transferiert werden können.
Technologie spielt im Sport schon immer eine große Rolle. Mit steigender Leistungsdichte im Spitzensport wird versucht mithilfe technischer Hilfsmittel dem Sportler die optimalen Umstände zu ermöglichen. Dazu gehört nicht nur Technik im Sportequiptment, sondern auch Sportuntersuchungen wie Leistungsdiagnostiken. Im Laufsport zählen dazu Ausdauer- und Krafttests. Bei Ausdauertests werden physiologische Parameter wie Laktat, Herzfrequenz oder Sauerstoffaufnahme gemessen. Zusätzlich wird die Lauftechnik für einen kurzen Zeitpunkt analysiert. Wie sich diese unter anhaltender Belastung verhält, wird nicht untersucht. Mit neuen Technologien im Bereich Bewegungsanalyse, können immer schneller größere Datensätze ausgewertet werden. Aus diesem Grund wird in dieser Studie die Lauftechnik über mehrere Zeitpunkte aufgezeichnet und nach Ermüdungserscheinungen untersucht.
Dazu wurde am Institut für angewandte Trainingswissenschaften (IAT) während einer komplexen Leistungsdiagnostik im März 2021 bei einem Laufbandstufentest (4x2000m oder 4x3000m) die Lauftechnik von 15 Elite- und Elitenachwuchsläufer:innen (m=8, w=7) mithilfe eines 3D-Bewegungsanalyse Systems nach Veränderungen in Winkelstellung und Bodenreaktionskraft untersucht. Als physiologische Vergleichsparameter wurde Herzfrequenz und Laktat aufgenommen.
Bei der Analyse der Daten wurden diese in der Gruppe betrachtet. Dabei haben sich schwach signifikante Veränderungen (p=0,047) der vertikalen Bodenreaktionskraft links am Ende der Stufe aufgezeigt. Weitere signifikante Unterschiede (p=0,020) sind im maximalen Kniehub links zu einem größerer Hüftwinkel am Ende sichtbar. Da sonst keine signifikanten Unterschiede zu sehen sind, lässt sich, bei dem hier durchgeführten Protokoll, nicht statistisch gesichert feststellen, ob auftretende Ermüdungserscheinungen die Lauftechnik beeinflussen und verändern. Um festzustellen, ob es geschlechts- oder protokollanhängige Effekte hinsichtlich einer ermüdungsbedingte Lauftechnikveränderung gibt, wurde auch dies statistisch untersucht.
Hier zeigten sich jeweils in einzelnen Parametern signifikante Unterschiede (Parameter TO\_knee\_left; p=0,026) in der Geschlechtsspezifik und in der protokollabhängigen Untersuchung (Parameter TSw\_hip\_left; p=0,04)
Für weitere Studien zur Untersuchung von Lauftechnikveränderung sollten umfangreichere physiologische Daten zur genaueren Betrachtung der Ermüdung verwendet werden. Grundsätzlich müsste das Protokoll auf eine maximale Ausbelastung (beispielsweise Dauerstufentest von 10-15km oder Ausbelastungs-/Abbruchtest) ausgelegt sein.
Grundlegend ist festzustellen, dass sich Simi-Shape als 3D-Bewegungsanalyse-Methode eignet, um spezifische Parameter in der Lauftechnik zu diagnostizieren, gerade hinsichtlich der Effizienz im Auswerteprozess.
3D-Druck für Privatanwender
(2014)
„It’s basically like a hot-glue gun that uses the same kind of plastic used to make Legos“
So beschreibt Bre Pettis, CEO von Makerbot Industries, das 3D-Druckverfahren welches bei den meisten 3D Druckern für den privaten Gebrauch verwendet wird. Was ist der 3D-Druck eigentlich? Wo kann er eingesetzt werden? Wird irgendwann ein 3D-Drucker in jedem Haushalt zu finden sein? Um Antworten auf diese Fragen zu finden, habe ich im Rahmen meiner Bachelorarbeit einen 3D-Drucker zusammengebaut und versucht mehr über diese spannende Zukunftstechnologie zu erfahren.
Dieser Beitrag stellt die Möglichkeiten des 3D-Druckes unter der Berücksichtigung von Mensch-Roboter-Kollaborations-Anforderungen dar. Dabei werden die Vorteile mit besonderem Fokus auf die zusätzliche Gestaltungsfreiheit erläutert. Anhand von Beispielen wird der Stand der Technik bereits eingesetzter Sensorik sowie deren Notwendigkeit in Greifsystemen erläutert. Im weiteren Verlauf dieses Beitrags werden allgemeine Verfahren für die additive Verarbeitung von leitfähigen Materialien vorgestellt. Daran angeknüpft sind Beispiele speziell zur 3D-gedruckten Sensorik. Abgerundet wird der Beitrag mit einem Ausblick bezüglich 3D-gedruckter Sensorik in MRK-Greifsystemen.
Die Arbeit behandelt das Thema 3D-Gestensteuerungen als MIDI-Controller in Audioanwendungen. Es wird anhand der momentan verfügbaren 3D-Gesten-Steuerungstechnik erforscht, welche Einsatzmöglichkeiten im Bereich der Audiotechnik beziehungsweise im Sounddesign gegeben sind. Die Erforschung der technischen Grundlagen aus Software und Hardware-Modulen als auch die Performance-Bewertungen bilden die technischen Grundlagen ab, während anschliessend ausgewählte Audioanwendungen beschrieben werden, welche in einer Befragung auf ihre Nutzbarkeit überprüft werden. Es wird beschrieben wie man mit einer 3D-Gestensteuerung, wie dem Kinect-Sensor, Musik oder Sounds produzieren kann, und wie man diese Technik sinnvoll einsetzten kann.
Die vorliegende Bachelorthesis befasst sich mit der Reproduktion der ersten „eisernen Hand“ des Götz von Berlichingen. Die Aufgabenstellung ist es, einen Öffnungsmechanismus zu entwickeln, welcher die zwei Fingerblöcke in die geöffnete Grundstreckstellung zurückführt, wenn die Finger zur Handinnenfläche eingefahren sind. Außerdem sollen die Fingerblöcke in drei verschiedenen Positionen einrasten können, wenn sie nach innen gedrückt werden. Insgesamt soll die Mechanik der Fingerblöcke durch 3D-unterstützte Optimierung von Bauteilen verbessert und unterstützt werden.
Der neukonstruierte Öffnungsmechanismus beinhaltet eine Drehfeder pro Fingerblock. Zudem begünstigt die CAD-Optimierung des Daumensystems und des Fingersystems die Mechanik der Fingerblöcke.
The Internet of Things (IoT) application has becoming progressively in-demand, most notably for the embedded devices (ED). However, each device has its own difference in computational capabilities, memory usage, and energy resources in connecting to the Internet by using Wireless Sensor Networks (WSNs). In order for this to be achievable, the WSNs that form the bulk of the IoT implementation requires a new set of technologies and protocol that would have a defined area, in which it addresses. Thus, IPv6 Low Power Area Network (6LoWPAN) was designed by the Internet Engineering Task Force (IETF) as a standard network for ED. Nevertheless, the communication between ED and 6LoWPAN requires appropriate routing protocols for it to achieve the efficient Quality of Service (QoS). Among the protocols of 6LoWPAN network, RPL is considered to be the best protocol, however its Energy Consumption (EC) and Routing Overhead (RO) is considerably high when it is implemented in a large network. Therefore, this paper would propose the HRPL to enchance the RPL protocol in reducing the EC and RO. In this study, the researchers would present the performance of RPL and HRPL in terms of EC, Control traffic Overhead (CTO) and latency based on the simulation of the 6LoWPAN network in fixed environment using COOJA simulator. The results show HRPL protocol achieves better performance in all the tested topology in terms of EC and CTO. However, the latency of HRPL only improves in chain topology compared with RPL. We found that further research is required to study the relationship between the latency and the load of packet transmission in order to optimize the EC usage.
A simple measuring method for acquiring the radiation pattern of an ultrawide band Vivaldi antenna is presented. The measuring is performed by combining two identical Vivaldi antennas and some of the intrinsic properties of a stepped-frequency continue wave radar (SFCW radar) in the
range from 1.0 GHz to 6.0 GHz. A stepper-motor provided the azimuthal rotation for one of the antennas from 0 ◦ to 360 ◦. The tests have been performed within the conventional environment (laboratory / office) without using an anechoic chamber or absorbing materials. Special measuring devices have not been used either. This method has been tested with different pairs of Vivaldi antennas and it can be also used for different ones (with little or no change in the system), as long as their operational
bandwidth is within the frequency range of the SFCW radar.
Keywords — SFCW Radar, Antenna Gain Characterization,
Azimuthal Radiation Pattern
The demand of wireless solutions in industrial applications increases since the early nineties. This trend is not only ongoing, it is further pushed by developments in the area of software stacks like the latest Bluetooth Low Energy Stack. It is also pushed by new chip-designs and powerful and highly integrated electronic hardware. The acceptance of wireless technologies as a possible solution for industrial applications, has overcome the entry barrier [1]. The first step to see wireless as standard for many industrial applications is almost accomplished. Nevertheless there is nearly none acceptance of wireless technology for Safety applications. One highly challenging and demanding requirement is still unsolved: The aspect safety and robustness. Those topics have been addressed in many cases but always in a similar manner. WirelessHART as an example addresses this topic with redundant so called multiple propagation paths and frequency hopping to handle with interferences and loss of network participants. So far the pure peer to peer link is rarely investigated and there are less safety solutions available. One product called LoRa™ can be seen as one possible solution to address this lack of safety within wireless links. This paper focuses on the safety performance evaluation of a modem-chip-design. The use of diverse and redundant wireless technologies like LoRa can lead to an increase acceptance of wireless in safety applications. Many measurements in real industrial application have been carried out to be able to benchmark the new chip in terms of the safety aspects. The content of this research results can help to raise the level of confidence in wireless. In this paper, the term “safety” is used for data transmission reliability.
Threat Modeling is a vital approach to implementing ”Security by Design” because it enables the discovery of vulnerabilities and mitigation of threats during the early stage of the Software Development Life Cycle as opposed to later on when they will be more expensive to fix. This thesis makes a review of the current threat Modeling approaches, methods, and tools. It then creates a meta-model adaptation of a fictitious cloud-based shop application which is tested using STRIDE and PASTA to check for vulnerabilities, weaknesses, and impact risk. The Analysis is done using Microsoft Threat Modeling Tool and IriusRisk. Finally, an evaluation of the results is made to ascertain the effectiveness of the processes involved with highlights of the challenges in threat modeling and recommendations on how security developers can make improvements.
Due to a controversial enrollment policy in most engineering programs at German Universities of Applied Sciences (UAS), many freshmen show very low school grades in key subjects like Math and Physics. Nevertheless they expect to be entertained in the lectures and get demotivated easily. Despite initial reservations, a cheer-and-challenge approach was developed for teaching Mechanics to freshmen having very diverse school grades. When tested, it showed astonishing results.
Radio frequency identification (RFID) antennas are popular for high frequency (HF) RFID, energy transfer and near field communication (NFC) applications. Particularly for wireless measurement systems the RFID/NFC technology is a good option to implement a wireless communication interface. In this context, the design of corresponding reader and transmitter antennas plays a major role for achieving suitable transmission quality. This work proves the feasibility of the rapid prototyping of a RFID/NFC antenna, which is used for the wireless communication and energy harvesting at the required frequency of 13.56 MHz. A novel and low-cost direct ink writing (DIW) technology utilizing highly viscous silver nanoparticle ink is used for this process. This paper describes the development and analysis of low-cost printed flexible RFID/NFC antennas on cost-effective substrates for a microelectronic vital parameter measurement system. Furthermore, we compare the measured technical parameters with existing copper-based counterparts on a FR4 substrate.
The Raman spectra from the chemical compounds toluene and cyclohexane obtained using a Fourier Transform (FT)-Raman spectrometer prototype have been contrasted with the Raman spectra of these same materials collected with two different commercial FT-Raman devices. The FT-Raman spectrometer consist of a Michelson interferometer, a self-designed photon counter and a reference photo-detector. The evaluation methodology of the spectral information, contrary to the commercial devices that commonly use the zero-crossing method, is carried out by re-sampling the Raman scattering and by accurately extracting the optical path information of the Michelson interferometer. The FTRaman arrangement has been built using conventional parts without disregarding the spectral frequency precision that usually such a FTRaman instruments deliver. No additional complex hardware components or costly software modules have been included in this FT-Raman device. The main Raman lines from the spectra obtained with the three FT-Raman devices have been compared with the Raman lines from the standard Raman spectra of these two materials. The values obtained using the FT-Raman spectrometer prototype have shown a frequency accuracy comparable to that obtained with the commercial devices without facing the need for a large investment. Although the proposed FT-Raman prototype cannot be directly compared to the last generation of FT-Raman spectrometers from the commercial manufacturers, such a device could give an opportunity to users that require high frequency precision in their spectral analysis and are provided with rather scarce resources.
The Internet of Things is spreading significantly in every sector, including the household, a variety of industries, healthcare, and emergency services, with the goal of assisting all of those infrastructures by providing intelligent means of service delivery. An Internet of Vulnerabilities (IoV) has emerged as a result of the pervasiveness of the Internet of Things (IoT), which has led to a rise in the use of applications and devices connected to the IoT in our day-to-day lives. The manufacture of IoT devices are growing at a rapid pace, but security and privacy concerns are not being taken into consideration. These intelligent Internet of Things devices are especially vulnerable to a variety of attacks, both on the hardware and software levels, which leaves them exposed to the possibility of use cases. This master’s thesis provides a comprehensive overview of the Internet of Things (IoT) with regard to security and privacy in the area of applications, security architecture frameworks, a taxonomy of various cyberattacks based on various architecture models, such as three-layer, four-layer, and five-layer. The fundamental purpose of this thesis is to provide recommendations for alternate mitigation strategies and corrective actions by using a holistic rather than a layer-by-layer approach. We discussed the most effective solutions to the problems of privacy and safety that are associated with the Internet of Things (IoT) and presented them in the form of research questions. In addition to that, we investigated a number of further possible directions for the development of this research.
The need for the logistics sector to timely respond to the increasing requirements of a globalised and digitalised world relies greatly on the com- petences and skills of its labour force. It becomes therefore essential to reinforce the cooperation between universities and business partners in the logistics and supply chain management fields across the European region and to build a logistics knowledge cluster supported by a communication and collaboration platform to foster continuous learning, skill acquisition and experience sharing anytime anywhere. In this paper we focus on designing the conceptual and technical framework for a communication and collaboration platform with the aim to establish the communication pipelines between the partner institutions, facilitating user interactions and exchange, leading to the creation of new knowledge and innovation in the logistics field. This framework is based on the requirements of the three main stakeholders: students, lecturers and companies, and consists of four functional areas defined according to the platform opera- tional requirements. A working prototype of the platform was developed using the Moodle learning management system and its core tools to determine its applicability and possible enhancement requirements. In the next stages of the project some additional tools like a knowledge base and the integration of the partners’ learning management systems to form the logistics knowledge cluster will be implemented.
The monitoring of industrial environments ensures that highly automated processes run without interruption. However, even if the industrial machines themselves are monitored, the communication lines are currently not continuously monitored in todays installations. They are checked usually only during maintenance intervals or in case of error. In addition, the cables or connected machines usually have to be removed from the system for the duration of the test. To overcome these drawbacks, we have developed and implemented a cost-efficient and continuous signal monitoring of Ethernet-based industrial bus systems. Several methods have been developed to assess the quality of the cable. These methods can be classified to either passive or active. Active methods are not suitable if interruption of the communication is undesired. Passive methods, on the other hand, require oversampling, which calls for expensive hardware. In this paper, a novel passive method combined with undersampling targeting cost-efficient hardware is proposed.
The Go programming language is an increasingly popular language but some of its features lack a formal investigation. This article explains Go's resolution mechanism for overloaded methods and its support for structural subtyping by means of translation from Featherweight Go to a simple target language. The translation employs a form of dictionary passing known from type classes in Haskell and preserves the dynamic behavior of Featherweight Go programs.
This thesis focuses on the development and implementation of a Datagram Transport Layer Security (DTLS) communication framework within the ns-3 network simulator, specifically targeting the LoRaWAN model network. The primary aim is to analyse the behaviour and performance of DTLS protocols across different network conditions within a LoRaWAN context. The key aspects of this work include the following.
Utilization of ns-3: This thesis leverages ns-3’s capabilities as a powerful discrete event network simulator. This platform enables the emulation of diverse network environments, characterized by varying levels of latency, packet loss, and bandwidth constraints.
Emulation of Network Challenges: The framework specifically addresses unique challenges posed by certain network configurations, such as duty cycle limitations. These constraints, which limit the time allocated for data transmission by each device, are crucial in understanding the real-world performance of DTLS protocols.
Testing in Multi-client-server Scenarios: A significant feature of this framework is its ability to test DTLS performance in complex scenarios involving multiple clients and servers. This is vital for assessing the behaviour of a protocol under realistic network conditions.
Realistic Environment Simulation: By simulating challenging network conditions, such as congestion, limited bandwidth, and resource constraints, the framework provides a realistic environment for thorough evaluation. This allows for a comprehensive analysis of DTLS in terms of security, performance, and scalability.
Overall, this thesis contributes to a deeper understanding of DTLS protocols by providing a robust tool for their evaluation under various and challenging network conditions.
The aim of this study was to develop a biomechanically validated finite element model to predict the biomechanical behaviour of the human lumbar spine in compression.
For validation of the finite element model, an in vitro study was performed: Twelve human lumbar cadaveric spinal segments (six segments L2/3 and six segments L4/5) were loaded in axial compression using 600 N in the intact state and following surgical treatment using two different internal stabilisation devices. Range of motion was measured and used to calculate stiffness.
A finite element model of a human spinal segment L3/4 was loaded with the same force in intact and surgically altered state, corresponding to the situation of biomechanical in vitro study.
The results of the cadaver biomechanical and finite element analysis were compared. As they were close together, the finite element model was used to predict: (1) load-sharing within human lumbar spine in compression, (2) load-sharing within osteoporotic human lumbar spine in compression and (3) the stabilising potential of the different spinal implants with respect to bone mineral density.
A finite element model as described here may be used to predict the biomechanical behaviour of the spine. Moreover, the influence of different spinal stabilisation systems may be predicted.
Multi-phase management is crucial for performance and durability of electrochemical cells such as batteries and fuel cells. In this paper we present a generic framework for describing the two-dimensional spatiotemporal evolution of gaseous, liquid and solid phases, as well as their interdependence with interfacial (electro-)chemistry and microstructure in a continuum description. The modeling domain consists of up to seven layers (current collectors, channels, electrodes, separator/membrane), each of which can consist of an arbitrary number of bulk phases (gas, liquid, solid) and connecting interfaces (two-phase or multi-phase boundaries). Bulk and interfacial chemistry is described using global or elementary kinetic reactions. Multi-phase management is coupled to chemistry and to mass and charge transport within bulk phases. The functionality and flexibility of this framework is demonstrated using four application areas in the context of post-lithium-ion batteries and fuel cells, that is, lithium-sulfur (Li-S) cells, lithium-oxygen (Li-O) cells, solid oxide fuel cells (SOFC) and polymer electrolyte membrane fuel cells (PEFC). The results are compared to models available in literature and properties of the generic framework are discussed.
6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks) is gaining more and more attraction for the seamless connectivity of embedded devices for the Internet of Things. It can be observed that most of the available solutions are following an open source approach, which significantly leads to a fast development of technologies and of markets. Although the currently available implementations are in a pretty good shape, all of them come with some significant drawbacks. It was therefore decided to start the development of an own implementation, which takes the advantages from the existing solutions, but tries to avoid the drawbacks. This paper discussed the reasoning behind this decision, describes the implementation and its characteristics, as well as the testing results. The given implementation is available as open-source project under [15].
A Gamified and Adaptive Learning System for Neurodivergent Workers in Electronic Assembling Tasks
(2020)
Learning and work-oriented assistive systems are often designed to fit the workflow of neurotypical workers. Neurodivergent workers and individuals with learning disabilities often present cognitive and sensorimotor characteristics that are better accommodated with personalized learning and working processes. Therefore, we designed an adaptive learning system that combines an augmented interaction space with user-sensitive virtual assistance to support step-by-step guidance for neurodivergent workers in electronic assembling tasks. Gamified learning elements were also included in the interface to provide self-motivation and praise whenever users progress in their learning and work achievements.
A highly scalable IEEE802.11p communication and localization subsystem for autonomous urban driving
(2013)
The IEEE802.11p standard describes a protocol for car-to-X and mainly for car-to-car-communication. It has found its place in hardware and firmware implementations and is currently tested in various field tests. In the research project Ko-TAG, which is part of the research initiative Ko-FAS, cooperative sensor technology is developed for the support of highly autonomous driving. A secondary radar principle based on communication signals enables localization of objects with simultaneous data transmission. It mainly concentrates on the detection of pedestrians and other vulnerable road users (VRU), but also supports pre crash safety applications. Thus it is mainly targeted for the support of traffic safety applications in intra-urban scenarios. This contribution describes the Ko-TAG part of the overall initiative, which develops a subsystem to improve the real-time characteristics of IEEE802.11p needed for precise time of flight real-time localization. In doing this, it still fits into the regulatory schemes. It discusses the approach for definition and verification of the protocol design, while maintaining the close coexistence with existing IEEE802.11p subsystems. System simulations were performed and hardware was implemented. Test results are shown in the last part of the paper.
Uncontrollable manufacturing variations in electrical hardware circuits can be exploited as Physical Unclonable Functions (PUFs). Herein, we present a Printed Electronics (PE)-based PUF system architecture. Our proposed Differential Circuit PUF (DiffC-PUF) is a hybrid system, combining silicon-based and PE-based electronic circuits. The novel approach of the DiffC-PUF architecture is to provide a specially designed real hardware system architecture, that enables the automatic readout of interchangeable printed DiffC-PUF core circuits. The silicon-based addressing and evaluation circuit supplies and controls the printed PUF core and ensures seamless integration into silicon-based smart systems. Major objectives of our work are interconnected applications for the Internet of Things (IoT).
We propose secure multi-party computation techniques for the distributed computation of the average using a privacy-preserving extension of gossip algorithms. While recently there has been mainly research on the side of gossip algorithms (GA) for data aggregation itself, to the best of our knowledge, the aforementioned research line does not take into consideration the privacy of the entities involved. More concretely, it is our objective to not reveal a node's private input value to any other node in the network, while still computing the average in a fully-decentralized fashion. Not revealing in our setting means that an attacker gains only minor advantage when guessing a node's private input value. We precisely quantify an attacker's advantage when guessing - as a mean for the level of data privacy leakage of a node's contribution. Our results show that by perturbing the input values of each participating node with pseudo-random noise with appropriate statistical properties (i) only a minor and configurable leakage of private information is revealed, by at the same time (ii) providing a good average approximation at each node. Our approach can be applied to a decentralized prosumer market, in which participants act as energy consumers or producers or both, referred to as prosumers.
A Localization System Using Inertial Measurement Units from Wireless Commercial Handheld Devices
(2013)
This paper describes a newly developed technology for the calculation of trajectories of mobile objects, which is based on commercially available sensors being integrated into modern mobile phones and other gadgets. First, a step counting technique was implemented. Second, a novel step length estimator is proposed. These two algorithms utilize the data from accelerometer sensor only. Third, the heading information was obtained using a gyroscope with complementary filter in quaternion form. The combined algorithm was implemented on a low-power ARM processor to provide the trajectory points relative to an initial point. The proposed technique was tested by 10 subjects, in different shoes with different paces. The dependence of the performance of the technology on the attaching point of the mobile device is weak. The proposed algorithms have better balance and estimation accuracy and depend in less degree on the variety in physical parameters of people in comparison with the existing techniques. In experiments inertial measurement units were mounted in different places, i.e. in the hand, in trousers or in T-shirt pockets. The return position error did not exceed 5% of the total travelled distance for all performed tests.
A novel Bluetooth Low Energy advertising scan algorithm is presented for hybrid radios that are additionally capable to measure energy on Bluetooth channels, e.g. as they would need to be compliant with IEEE 802.15.4. Scanners applying this algorithm can achieve a low latency whilst consuming only a fraction of the power that existing mechanisms can achieve at a similar latency. Furthermore, the power consumption can scale with the incoming network traffic and in contrast to the existing mechanisms, scanners can operate without any frame loss given ideal network conditions. The algorithm does not require any changes to advertisers, hence, stays compatible with existing devices. Performance evaluated via simulation and experiments on real hardware shows a 37 percent lower power consumption compared to the best existing scan setting while even achieving a slightly lower latency which proves that this algorithm can be used to improve the quality of service of connection-less Bluetooth communication or reduce the connection establishment time of connection-oriented communication.
Cryptographic protection of messages requires frequent updates of the symmetric cipher key used for encryption and decryption, respectively. Protocols of legacy IT security, like TLS, SSH, or MACsec implement rekeying under the assumption that, first, application data exchange is allowed to stall occasionally and, second, dedicated control messages to orchestrate the process can be exchanged. In real-time automation applications, the first is generally prohibitive, while the second may induce problematic traffic patterns on the network. We present a novel seamless rekeying approach, which can be embedded into cyclic application data exchanges. Although, being agnostic to the underlying real-time communication system, we developed a demonstrator emulating the widespread industrial Ethernet system PROFINET IO and successfully use this rekeying mechanism.
High temperature components in internal combustion engines and exhaust systems must withstand severe mechanical and thermal cyclic loads throughout their lifetime. The combination of thermal transients and mechanical load cycling results in a complex evolution of damage, leading to thermomechanical fatigue (TMF) of the material. Analytical tools are increasingly employed by designers and engineers for component durability assessment well before any hardware testing. The DTMF model for TMF life prediction, which assumes that micro-crack growth is the dominant damage mechanism, is capable of providing reliable predictions for a wide range of high-temperature components and materials in internal combustion engines. Thus far, the DTMF model has employed a local approach where surface stresses, strains, and temperatures are used to compute damage for estimating the number of cycles for a small initial defect or micro-crack to reach a critical length. In the presence of significant gradients of stresses, strains, and temperatures, the use of surface field values could lead to very conservative estimates of TMF life when compared with reported lives from hardware testing. As an approximation of gradient effects, a non-local approach of the DTMF model is applied. This approach considers through-thickness fields where the micro-crack growth law is integrated through the thickness considering these variable fields. With the help of software tools, this method is automated and applied to components with complex geometries and fields. It is shown, for the TMF life prediction of a turbocharger housing, that the gradient correction using the non-local approach leads to more realistic life predictions and can distinguish between surface cracks that may arrest or propagate through the thickness and lead to component failure.
When designing and installing Indoor Positioning Systems, several interrelated tasks have to be solved to find an optimum placement of the Access Points. For this purpose, a mathematical model for a predefined number of access points indoors is presented. Two iterative algorithms for the minimization of localization error of a mobile object are described. Both algorithms use local search technique and signal level probabilities. Previously registered signal strengths maps were used in computer simulation.
Quantifying the midsole material characteristics of athletic footwear is a standard task in footwear research and development. Current material testing protocols primarily focus on the determination of cushioning properties of the heel region or the quantification of the midsole properties as one assembly. However, midsoles possess different spatial material properties that have not been quantified from previous methodologies. Therefore, new material testing methods are required to quantify the local material response of athletic footwear. We developed a cyclical force-controlled material testing protocol for the determination of non-homogeneously distributed material stiffness with a high spatial resolution. In five prototype shoes varying in their stiffness distribution, we found that the material properties can be reliably measured across the midsole. Furthermore, we observed a characteristic non-linear material response regardless of the midsole location. We found that the material stiffness increased with an increase of the applied force and that this effect is further intensified by higher testing cycles. Additionally, the obtained midsole stiffness depends on the geometry of the midsole. We explored different approaches to reduce the measurement time of the testing protocol and found that the number of measurements can be reduced by 70% using 2 D-interpolation procedures. Determining the spatial material properties of midsoles needs to be considered to understand foot-shoe interactions. Furthermore, this measurement protocol can be used for quality control within the footwear and can be adapted for considering the effects of different running styles or speeds on ground force application characteristics.
Uptakes of 9.2 mmol g−1 (40.5 wt %) for CO2 at 273 K/0.1 MPa and 15.23 mmol g−1 (3.07 wt %) for H2 at 77 K/0.1 MPa are among the highest reported for metal–organic frameworks (MOFs) and are found for a novel, highly microporous copper‐based MOF (see picture; Cu turquoise, O red, N blue). Thermal analyses show a stability of the flexible framework up to 250 °C.
Metal–organic frameworks (MOFs) as highly porous materials have gained increasing interest because of their distinct adsorption properties.1–3 They exhibit a high potential for applications in gas separation and storage,4 as sensors5 as well as in heterogeneous catalysis.6 In the last few years, the H2 storage capacity of MOFs has been considerably increased. Mesoporous MOFs show high adsorption capacities for CH4, CO2, and H2 at high pressures.2, 3, 7–10 To increase the uptake of H2 and CO2 by physisorption at ambient pressure, adsorbents with small micropores as well as high specific surface areas and micropore volumes are required.11, 12 Such microporous materials seem to be more appropriate for gas‐mixture separation by physisorption than mesoporous materials. For gas separation in MOFs the interactions between the fluid adsorptive and “open metal sites” (coordinatively unsaturated binding sites) or the ligands are regarded as important.13 Industrial processes, such as natural‐gas purification or biogas upgrading, can be improved with those materials during a vapor‐pressure swing adsorption cycle (VPSA cycle) or a temperature swing adsorption cycle (TSA cycle).14 The microporous MOF series CPO‐27‐M (M=Mg, Co, Ni, Zn), for example, shows very high CO2 uptakes at low pressures (<0.1 MPa).15, 16 Concerning H2 adsorption, the microporous MOF PCN‐12 offers with 3.05 wt % the highest uptake at ambient pressure and 77 K reported to date.17
Herein, we present a novel microporous copper‐based MOF equation image[Cu(Me‐4py‐trz‐ia)] (1; Me‐4py‐trz‐ia2−=5‐(3‐methyl‐5‐(pyridin‐4‐yl)‐4H‐1,2,4‐triazol‐4‐yl)isophthalate) with extraordinarily high CO2 and H2 uptakes at ambient pressure, the H2 uptake being similar to that in PCN‐12. The ligand Me‐4py‐trz‐ia2−, which can be obtained from cheap starting materials by a three‐step synthesis in good yield, combines carboxylate, triazole, and pyridine functions and is adopted from a recently presented series of linkers,18 for which up to now only a few coordination polymers are known.
The transition from college to university can have a variety of psychological effects on students who need to cope with daily obligations by themselves in a new setting, which can result in loneliness and social isolation. Mobile technology, specifically mental health apps (MHapps), have been seen as promising solutions to assist university students who are facing these problems, however, there is little evidence around this topic. My research investigates how a mobile app can be designed to reduce social isolation and loneliness among university students. The Noneliness app is being developed to this end; it aims to create social opportunities through a quest-based gamified system in a secure and collaborative network of local users. Initial evaluations with the target audience provided evidence on how an app should be designed for this purpose. These results are presented and how they helped me to plan the further steps to reach my research goals. The paper is presented at MobileHCI 2020 Doctoral Consortium.
In rural low voltage grid networks, the use of battery in the households with a grid connected Photovoltaic (PV) system is a popular solution to shave the peak PV feed-in to the grid. For a single electricity price scenario, the existing forecast based control approaches together with a decision based control layer uses weather and load forecast data for the on–off schedule of the battery operation. These approaches do bring cost benefit from the battery usage. In this paper, the focus is to develop a Model Predictive Control (MPC) to maximize the use of the battery and shave the peaks in the PV feed-in and the load demand. The solution of the MPC allows to keep the PV feed-in and the grid consumption profile as low and as smooth as possible. The paper presents the mathematical formulation of the optimal control problem along with the cost benefit analysis . The MPC implementation scheme in the laboratory and experiment results have also been presented. The results show that the MPC is able to track the deviation in the weather forecast and operate the battery by solving the optimal control problem to handle this deviation.
In this work a method for the estimation of current slopes induced by inverters operating interior permanent magnet synchronous machines is presented. After the derivation of the estimation algorithm, the requirements for a suitable sensor setup in terms of accuracy, dynamic and electromagnetic interference are discussed. The boundary conditions for the estimation algorithm are presented with respect to application within high power traction systems. The estimation algorithm is implemented on a field programmable gateway array. This moving least-square algorithm offers the advantage that it is not dependent on vectors and therefore not every measured value has to be stored. The summation of all measured values leads to a significant reduction of the required storage units and thus decreases the hardware requirements. The algorithm is designed to be calculated within the dead time of the inverter. Appropriate countermeasures for disturbances and hardware restrictions are implemented. The results are discussed afterwards.
This paper presents the use of model predictive control (MPC) based approach for peak shaving application of a battery in a Photovoltaic (PV) battery system connected to a rural low voltage gird. The goals of the MPC are to shave the peaks in the PV feed-in and the grid power consumption and at the same time maximize the use of the battery. The benefit to the prosumer is from the maximum use of the self-produced electricity. The benefit to the grid is from the reduced peaks in the PV feed-in and the grid power consumption. This would allow an increase in the PV hosting and the load hosting capacity of the grid.
The paper presents the mathematical formulation of the optimal control problem
along with the cost benefit analysis. The MPC implementation scheme in the
laboratory and experiment results have also been presented. The results show
that the MPC is able to track the deviation in the weather forecast and operate
the battery by solving the optimal control problem to handle this deviation.
The durability of polymer electrolyte membrane fuel cells (PEMFC) is governed by a nonlinear coupling between system demand, component behavior, and physicochemical degradation mechanisms, occurring on timescales from the sub-second to the thousand-hour. We present a simulation methodology for assessing performance and durability of a PEMFC under automotive driving cycles. The simulation framework consists of (a) a fuel cell car model converting velocity to cell power demand, (b) a 2D multiphysics cell model, (c) a flexible degradation library template that can accommodate physically-based component-wise degradation mechanisms, and (d) a time-upscaling methodology for extrapolating degradation during a representative load cycle to multiple cycles. The computational framework describes three different time scales, (1) sub-second timescale of electrochemistry, (2) minute-timescale of driving cycles, and (3) thousand-hour-timescale of cell ageing. We demonstrate an exemplary PEMFC durability analysis due to membrane degradation under a highly transient loading of the New European Driving Cycle (NEDC).
An algorithm is presented that has successfully been utilized in practice for several years. It improves data analysis in chromatography. The program runs in an extremely reliable way and evaluates chromatographic raw data with an acceptable error. The algorithm requires a minimum of preliminaries and integrates even unsmoothed noisy data correctly.