Refine
Year of publication
- 2016 (228) (remove)
Document Type
- Conference Proceeding (70)
- Article (reviewed) (50)
- Article (unreviewed) (39)
- Part of a Book (37)
- Book (17)
- Patent (8)
- Other (4)
- Letter to Editor (1)
- Report (1)
- Working Paper (1)
Has Fulltext
- no (228) (remove)
Keywords
- Digitalisierung (6)
- Management (6)
- Eingebettetes System (5)
- Energieversorgung (5)
- Haustechnik (5)
- Mathematik (5)
- Bildung (4)
- Messtechnik (4)
- Design (3)
- Dünnschichtchromatographie (3)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (89)
- Fakultät Medien und Informationswesen (M+I) (62)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (42)
- Fakultät Betriebswirtschaft und Wirtschaftsingenieurwesen (B+W) (36)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (21)
- INES - Institut für Energiesystemtechnik (17)
- ACI - Affective and Cognitive Institute (4)
- POI - Peter Osypka Institute for Pacing and Ablation (bis 20.10.2020) (2)
- IfTI - Institute for Trade and Innovation (1)
Klang Orte(n) Zeit Raum.
(2016)
Geschichte(n) der Medizin
(2016)
Nach dem großen Erfolg der beiden ersten Bände liegt jetzt der Abschluss der Trilogie vor. Renommierte Autorinnen und Autoren erzählen einmal mehr lebendige und mitreißende Geschichte(n) der Medizin über Krankheiten, Ärzte und Forscher. Wie kam es beispielsweise zur Entdeckung der "Perkussion"? Wer war Avicenna? Warum wurde der Name Goldberg so berühmt? Was haben Rembrandt und Schiller gemeinsam? Welchen Einfluss nahm deutsche Medizin auf den Fernen Osten? Die populärwissenschaftlich aufbereitete Welt der Medizingeschichte(n) fasziniert nicht nur, sie sorgt auch immer wieder für überraschende Erkenntnisse und Aha-Erlebnisse. Das Buch richtet sich daher gleichermaßen an medizinische Laien wie Fachleute.
Passive solar elements for both direct and indirect gains, are systems used to maintain a comfortable living environment while saving energy, especially in the building energy retrofit and adaptation process. Sunspaces, thermal mass and glazing area and orientation have been often used in the past to guarantee adequate indoor conditions when mechanical devices were not available. After a period of neglect, nowadays they are again considered as appropriate systems to help face environmental issues in the building sector, and both international and national legislation takes into consideration the possibility of including them in the building planning tools, also providing economic incentives. Their proper design needs dynamic simulation, often difficult to perform and time consuming. Moreover, results generally suffer from several uncertainties, so quasi steady-state procedures are often used in everyday practice with good results, but some corrections are still needed. In this paper, a comparative analysis of different solutions for the construction of verandas in an existing building is presented, following the procedure provided by the slightly modified and improved Standard EN ISO 13790:2008. Advantages and disadvantages of different configurations considering thermal insulation, windows typology and mechanical ventilation systems are discussed and a general intervention strategy is proposed. The aim is to highlight the possibility of using sunspaces in order to increase the efficiency of the existing building stock, considering ease of construction and economic viability.
Energy Performance of Verandas in the Building Retrofit Process (PDF Download Available). Available from: https://www.researchgate.net/publication/303093420_Energy_Performance_of_Verandas_in_the_Building_Retrofit_Process [accessed Jul 5, 2017].
Structured Innovation with TRIZ in Science and Industry - Creating Value for Customers and Society
(2016)
Covert channels have been known for a long time because of their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example, the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit as well as the L1 and L2 caches, which enable establishing multiple covert channels. Even virtualization, which is known for its isolation of multiple machines, is prone to covert- and side-channel attacks because of the sharing of resources. Therefore, it is not surprising that cloud computing is not immune to this kind of attacks. Moreover, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of illegitimate communication. In such a setting, the “air gap” between physical servers and networks disappears, and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand, we will provide a survey on vulnerable spots that an adversary could exploit trying to exfiltrate private data from target virtual machines through covert channels in a cloud environment. We will evaluate the feasibility of example attacks and point out proposed mitigation solutions in case they exist.
Optimal microgrid scheduling with peak load reduction involving an electrolyzer and flexible loads
(2016)
This work consists of a multi-objective mixed-integer linear programming model for defining optimized schedules of components in a grid-connected microgrid. The microgrid includes a hydrogen energy system consisting of an alkaline electrolyzer, hydrogen cylinder bundles and a fuel cell for energy storage. Local generation is provided from photovoltaic panels, and the load is given by a fixed load profile combined with a flexible electrical load, which is a battery electric vehicle. The electrolyzer has ramp-up constraints which are modeled explicitly. The objective function includes, besides operational costs and an environmental indicator, a representation of peak power costs, thus leading to an overall peak load reduction under optimized operation. The model is used both for controlling a microgrid in a field trial set-up deployed in South-West Germany and for simulating the microgrid operation for defined period, thus allowing for economic system evaluation. Results from defined sample runs show that the energy storage is primarily used for trimming the peak of electricity drawn from the public grid and is not solely operated with excess power. The flexible demand operation also helps keeping the peak at its possible minimum.
Journalist
(2016)
All business is local
(2016)
Fans stärken Marken
(2016)
High mobility, electrolyte-gated transistors (EGTs) show high DC performance at low voltages (< 2 V). To model those EGTs, we have used different models for the below and the above threshold regime with appropriate interpolation to ensure continuity and smoothness over all regimes. This empirical model matches very well with our measured results obtained by the electrical characterization of EGTs.
First year Business Administration students tend to regard themselves as “non-computer scientists” and often have a lack of motivation about taking IT courses in general, either because they perceive them as too technical, too difficult or somewhat irrelevant. In an attempt to counteract this perception and increase the levels of engagement and willing attendance to class, we decided to flip the traditional lecture model and develop a new teaching and learning approach for the IT Fundamentals course using an open source Enterprise Resource Planning (ERP) system as the platform from which to draw the various underlying IT concepts and through which the relevant competences can be acquired.
This paper describes the implementation process of this new contextualized learning framework “IT via ERP” and the changes in the didactical methods to support it.
Die Erfindung betrifft ein Verfahren zur automatischen Klassifikation des Modulationsformats eines digital modulierten Signals, welches die empfangenen I/Q-Datenpunkte zuerst für jedes Modulationsformat mittels eines Clustering-Verfahrens ausgewertet, wobei nach Durchführung des Clustering-Verfahrens für jedes der Modulationsformate jeweils alle I/Q-Datenpunkte jeweils einem ermittelten Cluster-Schwerpunkt zugeordnet sind. Danach wird für jedes Modulationsformat jeweils der Wert einer Nutzenfunktion bestimmt, welche einen umso höheren (niedrigeren) Wert annimmt, je besser die einem Cluster-Schwerpunkt zugeordneten I/Q-Datenpunkte durch den Cluster-Schwerpunkt abgedeckt sind und je geringer die euklidischen Abstände der ermittelten Custer-Schwerpunkte von dem zugeordneten Konstellationspunkt sind. Es wird dann dasjenige Modulationsformat als das für das digital modulierte Signal zutreffende Modulationsformat angenommen, für welche die Nutzenfunktion den höchsten (niedrigsten) Wert annimmt.
We present a novel scheme for Slotted ALOHA random access systems that combines physical-layer network coding (PLNC) with multiuser detection (MUD). The PLNC and MUD are applied jointly at the physical layer to be able to extract any linear combination of messages experiencing a collision within a slot. The set of combinations extracted from a whole frame is then processed by the receiver to recover the original packets. A simple precoding stage at the transmitting terminals allows the receiver to further decrease the packet loss rate. We present results for the decoding at the physical layer as well as several performance measures at frame level, namely, throughput, packet loss rate, and energy efficiency. The results we present are promising and suggest that a cross-layer approach leveraging on the joint use of PLNC and MUD can significantly improve the performance of random access systems in the presence of slow fading.
This paper presents an overview of the coding aspects of a GNSS receiver. Coding allows detection and correction of channel-induced errors at the receiver, here the focus is on the mitigation of threats from malicious interferences. Although the effects of interference at different stages of GNSS baseband processing has been deeply analyzed in the literature, little attention was devoted to its impact on the navigation message decoding stage. Theis paper provides an introduction to the various coding schemes employed by current GNSS signals, discussing their performance in the presence of noise in terms of block-error rate. Additionally, the benefits of soft-decoding schemes for navigation message decoding are highlighted when jamming interferences are present. The proposed scheme requires estimating the noise plus interference power, yielding to enhanced decoding performances under severe jamming conditions. Finally, cryptographic schemes as a means of providing anti-spoofing for geosecurity location-based services, and their potential vulnerability are discussed, with particular emphasis on the dependence on the dependence of the scheme on successful navigation message decoding
Der hier vorliegende Beitrag beschreibt die mit der Finite-Elemente-Methode (FEM) gewonnenen Untersuchungsergebnisse zur Bestimmung von Stützziffern und Kerbwirkungszahlen bei Getriebewellen. Es handelt sich dabei zum einen um die Kerbüberlagerung einer umlaufenden Halbkreisnut in Kombination mit überlagerter Querbohrung. Da zur Bestimmung der Stützwirkungszahlen die Berechnung der bezogenen Spannungsgradienten in Tiefenrichtung benötigt wird, wurden die Parameter der Kerbgeometrie (der Umlaufnutradius sowie der Querbohrungsdurchmesser) variiert. Als Ergebnis dieser Arbeit wurde festgehalten, dass sich die Formzahl infolge der Durchdringungskerbe im Vergleich zur Formzahl einer Einzelkerbe (z. B. Umlaufnut oder Querbohrung) erhöht und dementsprechend erhöht sich die Kerbwirkungszahl deutlich im Vergleich zu einer Einzelkerbe. Die numerisch erfassten Kerbwirkungszahlen
an den erforschten Durchdringungskerben wurden mit analytischen Ansätzen aus der Fachliteratur verglichen. Entsprechende Diagramme und Zahlenwerte werden zur Abschätzung der Kerbwirkungs- und Stützzahlen je nach Belastungsart Torsion, Biegung und Zug/Druck angegeben.