Refine
Year of publication
Document Type
- Article (reviewed) (146)
- Master's Thesis (68)
- Conference Proceeding (60)
- Contribution to a Periodical (45)
- Bachelor Thesis (29)
- Working Paper (15)
- Study Thesis (13)
- Doctoral Thesis (5)
- Book (3)
- Part of a Book (1)
Conference Type
- Konferenzartikel (52)
- Konferenzband (4)
- Konferenz-Abstract (3)
Language
- English (388) (remove)
Has Fulltext
- yes (388) (remove)
Keywords
- COVID-19 (19)
- Government Measures (13)
- Export (11)
- Corona (9)
- IT-Sicherheit (9)
- 3D printing (8)
- Crisis (8)
- Maschinelles Lernen (6)
- neuroprosthetics (6)
- Blockchain (5)
Institute
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (146)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (77)
- Fakultät Wirtschaft (W) (55)
- INES - Institut für nachhaltige Energiesysteme (53)
- Fakultät Medien (M) (ab 22.04.2021) (47)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (32)
- IfTI - Institute for Trade and Innovation (26)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (25)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (23)
- POIM - Peter Osypka Institute of Medical Engineering (16)
Open Access
- Open Access (295)
- Gold (66)
- Closed (49)
- Closed Access (44)
- Hybrid (35)
- Diamond (25)
- Bronze (23)
- Grün (7)
Knight Götz von Berlichingen (1480–1562) lost his right hand distal to the wrist due to a cannon ball splinter injury in 1504 in the Landshut War of Succession at the age of 24. Early on, Götz commissioned a gunsmith to build the first “Iron Hand,” in which the artificial thumb and two finger blocks could be moved in their basic joints by a spring mechanism and released by a push button. Some years later, probably around 1530, a second “Iron Hand” was built, in which the fingers could be moved passively in all joints. In this review, the 3D computer-aided design (CAD) reconstructions and 3D multi-material polymer replica printings of the first “Iron hand“, which were developed in the last few years at Offenburg University, are presented. Even by today’s standards, the first “Iron Hand”—as could be shown in the replicas—demonstrates sophisticated mechanics and well thought-out functionality and still offers inspiration and food for discussion when it comes to the question of an artificial prosthetic replacement for a hand. It is also outlined how some of the ideas of this mechanical passive prosthesis can be translated into a modern motorized active prosthetic hand by using simple, commercially available electronic components.
Positioning mobile systems with high accuracy is a prerequisite for intelligent autonomous behavior, both in industrial environments and in field robotics. This paper describes the setup of a robotic platform and its use for the evaluation of simultaneous localization and mapping (SLAM) algorithms. A configuration using a mobile robot Husky A200, and a LiDAR (light detection and ranging) sensor was used to implement the setup. For verification of the proposed setup, different scan matching methods for odometry determination in indoor and outdoor environments are tested. An assessment of the accuracy of the baseline 3D-SLAM system and the selected evaluation system is presented by comparing different scenarios and test situations. It was shown that the hdl_graph_slam in combination with the LiDAR OS1 and the scan matching algorithms FAST_GICP and FAST_VGICP achieves good mapping results with accuracies up to 2 cm.
Recent developments in information and communication technology, along with advanced displaying techniques and high computational performance open up new visualisation methods to both scientists and lecturers. Thus simulations of complex processes [1] can be computed and visualised in image sequences. The particular idea in our approach is the outsourcing of computationally intensive calculations to servers which then send the results back to mobile users. In order to improve interpretations of the visualised results, users can view them in a 3D-perspective or stereoscopically, given the technical requirements. Today’s technology even permits to view these visualisations on a mobile phone. An example for such a computationally intensive calculation originating from the theory of relativity is depicted in Figure 4.1-1.
Disturbances of the cardiac conduction system causing reentry mechanisms above the atrioventricular (AV) node are induced by at least one accessory pathway with different conducting properties and refractory periods. This work aims to further develop the already existing and continuously expanding Offenburg heart rhythm model to visualise the most common supraventricular reentry tachycardias to provide a better understanding of the cause of the respective reentry mechanism.
Background: This paper presents a novel approach for a hand prosthesis consisting of a flexible, anthropomorphic, 3D-printed replacement hand combined with a commercially available motorized orthosis that allows gripping.
Methods: A 3D light scanner was used to produce a personalized replacement hand. The wrist of the replacement hand was printed of rigid material; the rest of the hand was printed of flexible material. A standard arm liner was used to enable the user’s arm stump to be connected to the replacement hand. With computer-aided design, two different concepts were developed for the scanned hand model: In the first concept, the replacement hand was attached to the arm liner with a screw. The second concept involved attaching with a commercially available fastening system; furthermore, a skeleton was designed that was located within the flexible part of the replacement hand.
Results: 3D-multi-material printing of the two different hands was unproblematic and inexpensive. The printed hands had approximately the weight of the real hand. When testing the replacement hands with the orthosis it was possible to prove a convincing everyday functionality. For example, it was possible to grip and lift a 1-L water bottle. In addition, a pen could be held, making writing possible.
Conclusions: This first proof-of-concept study encourages further testing with users.
In 4D printing, an additively manufactured component is given the ability to change its shape or function in an intended and useful manner over time. The technology of 4D printing is still in an early stage of development. Nevertheless, interesting research and initial applications exist in the literature. In this work, a novel methodical approach is presented that helps transfer existing 4D printing research results and knowledge into solving application tasks systematically. Moreover, two different smart materials are analyzed, used, and combined following the presented methodical approach to solving the given task in the form of recovering an object from a poorly accessible space. This is implemented by self-positioning, grabbing, and extracting the target object. The first smart material used to realize these tasks is a shape-memory polymer, while the second is a polymer-based magnetic composite. In addition to the presentation and detailed implementation of the methodical approach, the potentials and behavior of the two smart materials are further examined and narrowed down as a result of the investigation. The results show that the developed methodical approach contributes to moving 4D printing closer toward a viable alternative to existing technologies due to its problem-oriented nature.
A simple measuring method for acquiring the radiation pattern of an ultrawide band Vivaldi antenna is presented. The measuring is performed by combining two identical Vivaldi antennas and some of the intrinsic properties of a stepped-frequency continue wave radar (SFCW radar) in the
range from 1.0 GHz to 6.0 GHz. A stepper-motor provided the azimuthal rotation for one of the antennas from 0 ◦ to 360 ◦. The tests have been performed within the conventional environment (laboratory / office) without using an anechoic chamber or absorbing materials. Special measuring devices have not been used either. This method has been tested with different pairs of Vivaldi antennas and it can be also used for different ones (with little or no change in the system), as long as their operational
bandwidth is within the frequency range of the SFCW radar.
Keywords — SFCW Radar, Antenna Gain Characterization,
Azimuthal Radiation Pattern
Gamification is increasingly successful in the field of education and health. However, beyond call-centers and applications in human resources, its utilization within companies remains limited. In this paper, we examine the acceptance of gamification in a large company (with over 17,000 employees) across three generations, namely X, Y, and Z. Furthermore, we investigate which gamification elements are suited for business contexts, such as the dissemination of company principles and facts, or the organization of work tasks. To this end, we conducted focus group discussions, developed the prototype of a gamified company app, and performed a large-scale evaluation with 367 company employees. The results reveal statistically significant intergenerational disparities in the acceptance of gamification: younger employees, especially those belonging to Generation Z, enjoy gamification more than older employees and are most likely to engage with a gamified app in the workplace. The results further show a nuanced range of preferences regarding gamification elements: avatars are popular among all generations, badges are predominantly appreciated by Generations Z and Y, while leaderboards are solely liked by Generation Z. Drawing upon these insights, we provide recommendations for future gamification projects within business contexts. We hope that the results of our study regarding the preferences of the gamification elements and understanding generational differences in acceptance and usage of gamification will help to create more engaging and effective apps, especially within the corporate landscape.
Threat Modeling is a vital approach to implementing ”Security by Design” because it enables the discovery of vulnerabilities and mitigation of threats during the early stage of the Software Development Life Cycle as opposed to later on when they will be more expensive to fix. This thesis makes a review of the current threat Modeling approaches, methods, and tools. It then creates a meta-model adaptation of a fictitious cloud-based shop application which is tested using STRIDE and PASTA to check for vulnerabilities, weaknesses, and impact risk. The Analysis is done using Microsoft Threat Modeling Tool and IriusRisk. Finally, an evaluation of the results is made to ascertain the effectiveness of the processes involved with highlights of the challenges in threat modeling and recommendations on how security developers can make improvements.
The Internet of Things is spreading significantly in every sector, including the household, a variety of industries, healthcare, and emergency services, with the goal of assisting all of those infrastructures by providing intelligent means of service delivery. An Internet of Vulnerabilities (IoV) has emerged as a result of the pervasiveness of the Internet of Things (IoT), which has led to a rise in the use of applications and devices connected to the IoT in our day-to-day lives. The manufacture of IoT devices are growing at a rapid pace, but security and privacy concerns are not being taken into consideration. These intelligent Internet of Things devices are especially vulnerable to a variety of attacks, both on the hardware and software levels, which leaves them exposed to the possibility of use cases. This master’s thesis provides a comprehensive overview of the Internet of Things (IoT) with regard to security and privacy in the area of applications, security architecture frameworks, a taxonomy of various cyberattacks based on various architecture models, such as three-layer, four-layer, and five-layer. The fundamental purpose of this thesis is to provide recommendations for alternate mitigation strategies and corrective actions by using a holistic rather than a layer-by-layer approach. We discussed the most effective solutions to the problems of privacy and safety that are associated with the Internet of Things (IoT) and presented them in the form of research questions. In addition to that, we investigated a number of further possible directions for the development of this research.
This paper provides a comprehensive overview of approaches to the determination of isocontours and isosurfaces from given data sets. Different algorithms are reported in the literature for this purpose, which originate from various application areas, such as computer graphics or medical imaging procedures. In all these applications, the challenge is to extract surfaces with a specific isovalue from a given characteristic, so called isosurfaces. These different application areas have given rise to solution approaches that all solve the problem of isocontouring in their own way. Based on the literature, the following four dominant methods can be identified: the marching cubes algorithms, the tessellation-based algorithms, the surface nets algorithms and the ray tracing algorithms. With regard to their application, it can be seen that the methods are mainly used in the fields of medical imaging, computer graphics and the visualization of simulation results. In our work, we provide a broad and compact overview of the common methods that are currently used in terms of isocontouring with respect to certain criteria and their individual limitations. In this context, we discuss the individual methods and identify possible future research directions in the field of isocontouring.
This thesis focuses on the development and implementation of a Datagram Transport Layer Security (DTLS) communication framework within the ns-3 network simulator, specifically targeting the LoRaWAN model network. The primary aim is to analyse the behaviour and performance of DTLS protocols across different network conditions within a LoRaWAN context. The key aspects of this work include the following.
Utilization of ns-3: This thesis leverages ns-3’s capabilities as a powerful discrete event network simulator. This platform enables the emulation of diverse network environments, characterized by varying levels of latency, packet loss, and bandwidth constraints.
Emulation of Network Challenges: The framework specifically addresses unique challenges posed by certain network configurations, such as duty cycle limitations. These constraints, which limit the time allocated for data transmission by each device, are crucial in understanding the real-world performance of DTLS protocols.
Testing in Multi-client-server Scenarios: A significant feature of this framework is its ability to test DTLS performance in complex scenarios involving multiple clients and servers. This is vital for assessing the behaviour of a protocol under realistic network conditions.
Realistic Environment Simulation: By simulating challenging network conditions, such as congestion, limited bandwidth, and resource constraints, the framework provides a realistic environment for thorough evaluation. This allows for a comprehensive analysis of DTLS in terms of security, performance, and scalability.
Overall, this thesis contributes to a deeper understanding of DTLS protocols by providing a robust tool for their evaluation under various and challenging network conditions.
A report from the World Economic Forum (2019) stated loneliness as the third societal stressor in the world, mainly in western countries. Moreover, research shows that loneliness tends to be experienced more severely by young adults than other age groups (Rokach, 2000), which is the case of university students who face profound periods of loneliness when attending university in a new place (Diehl et al., 2018). Digital technology, especially mental health apps (MHapps), have been viewed as promising solutions to address this distress in universities, however, little evidence on this topic reveals uncertainty around how these resources impact individual well-being. Therefore, this research proposed to investigate how the gamified social mobile app Noneliness reduced loneliness rates and other associated mental health issues of students from a German university. As little work has focused on digital apps targeting loneliness, this project also proposed to describe and discuss the app’s design and development processes. A multimethod approach was adopted: literature review on high-efficacy MHapps design, gamification for mental health and loneliness interventions; User Experience Design and Human-centered Computing. Evaluations occurred according to the app’s development iterations, which assessed four versions (from prototype to Beta) through quantitative and qualitative studies with university students. The main results obtained regarding the design aspects were: users' preference for minimalistic interfaces; importance in maintaining privacy and establishing trust among users; students' willingness to use an online support space for emotional and educational support. Most used features were those related to group discussions, private chats and university social events. Preferred gamification elements were those that provided positive reinforcement to motivate social interactions (e.g. Points, Levels and Achievements). Results of a pilot randomized controlled trial with university students (N = 12), showed no statistically significant interactions in reducing loneliness among experimental group members (n = 7, x² = 3.500, p-value = 0.477, Cramer’s V = 0.27) who made continued use of the app for six weeks. On the other hand, the app showed effects of moderate magnitude on loneliness reduction in this group. The app also demonstrated relatively strong magnitude effects on other associated variables, such as depression and stress in the experimental group. In addition to motivating the conduct of further studies with larger samples, the findings point to a potential app effectiveness not only to reduce loneliness, but also other variables that may be associated with the distress.
Lithium-ion batteries exhibit slow voltage dynamics on the minute time scale that are usually associated with transport processes. We present a novel modelling approach toward these dynamics by combining physical and data-driven models into a Grey-box model. We use neural networks, in particular neural ordinary differential equations. The physical structure of the Grey-box model is borrowed from the Fickian diffusion law, where the transport domain is discretized using finite volumes. Within this physical structure, unknown parameters (diffusion coefficient, diffusion length, discretization) and dependencies (state of charge, lithium concentration) are replaced by neural networks and learnable parameters. We perform model-to-model comparisons, using as training data (a) a Fickian diffusion process, (b) a Warburg element, and (c) a resistor-capacitor circuit. Voltage dynamics during constant-current operation and pulse tests as well as electrochemical impedance spectra are simulated. The slow dynamics of all three physical models in the order of ten to 30 min are well captured by the Grey-box model, demonstrating the flexibility of the present approach.
Pure orbital blowout fractures occur within the confines of the internal orbital wall. Restoration of orbital form and volume is paramount to prevent functional and esthetic impairment. The anatomical peculiarity of the orbit has encouraged surgeons to develop implants with customized features to restore its architecture. This has resulted in worldwide clinical demand for patient-specific implants (PSIs) designed to fit precisely in the patient’s unique anatomy. Material extrusion or Fused filament fabrication (FFF) three-dimensional (3D) printing technology has enabled the fabrication of implant-grade polymers such as Polyetheretherketone (PEEK), paving the way for a more sophisticated generation of biomaterials. This study evaluates the FFF 3D printed PEEK orbital mesh customized implants with a metric considering the relevant design, biomechanical, and morphological parameters. The performance of the implants is studied as a function of varying thicknesses and porous design constructs through a finite element (FE) based computational model and a decision matrix based statistical approach. The maximum stress values achieved in our results predict the high durability of the implants, and the maximum deformation values were under one-tenth of a millimeter (mm) domain in all the implant profile configurations. The circular patterned implant (0.9 mm) had the best performance score. The study demonstrates that compounding multi-design computational analysis with 3D printing can be beneficial for the optimal restoration of the orbital floor.
Background:
Ankle braces aim to reduce lateral ankle sprains. Next to protection, factors influencing user compliance, such as sports performance, motion restriction, and users’ perceptions, are relevant for user compliance and thus injury prevention. Novel adaptive protection systems claim to change their mechanical behavior based on the intensity of motion (eg, the inversion velocity), unlike traditional passive concepts of ankle bracing.
Purpose:
To compare the performance of a novel adaptive brace with 2 passive ankle braces while considering protection, sports performance, freedom of motion, and subjective perception.
Study Design:
Controlled laboratory study.
Methods:
The authors analyzed 1 adaptive and 2 passive (one lace-up and one rigid brace) ankle braces, worn in a low-cut, indoor sports shoe, which was also the no-brace reference condition. We performed material testing using an artificial ankle joint system at high and low inversion velocities. Further, 20 male, young, healthy team sports athletes were analyzed using 3-dimensional motion analysis in sports-related movements to address protection, sports performance, and active range of motion dimensions. Participants rated subjective comfort, stability, and restriction experienced when using the products.
Results:
Subjective stability rating was not different between the adaptive and passive systems. The rigid brace was superior in restricting peak inversion during the biomechanical testing compared with the passive braces. However, in the material test, the adaptive brace increased its stiffness by approximately 400% during the fast compared with the slow inversion velocities, demonstrating its adaptive behavior and similar stiffness values to passive braces. We identified minor differences in sports performance tasks. The adaptive brace improved active ankle range of motion and subjective comfort and restriction ratings.
Conclusion:
The adaptive brace offered similar protective effects in high-velocity inversion situations to those of the passive braces while improving range of motion, comfort, and restriction rating during noninjurious motions.
Clinical Relevance:
Protection systems are only effective when used. Compared with traditional passive ankle brace technologies, the novel adaptive brace might increase user compliance by improving comfort and freedom of movement while offering similar protection in injurious situations.
The NaSiO Institute (Institute for Sustainable Silicate Research in Offenburg, https://inasio.hs-offenburg.de/) has been working for years on climate-friendly alternatives to insulation materials and inorganic binders, as well as the reasonable use of construction waste in the building industry. The aim of research is to realize the enormous CO 2 saving potential of the construction sector worldwide. A stopping of climate heating will only succeed if these climate-friendly alternatives are used in the construction industry. This is the only way to realize the enormous CO2 savings that will be needed in future to comply with the Paris Agreement.
Treadmills are essential to the study of human and animal locomotion as well as for applied diagnostics in both sports and medicine. The quantification of relevant biomechanical and physiological variables requires a precise regulation of treadmill belt velocity (TBV). Here, we present a novel method for time-efficient tracking of TBV using standard 3D motion capture technology. Further, we analyzed TBV fluctuations of four different treadmills as seven participants walked and ran at target speeds ranging from 1.0 to 4.5 m/s. Using the novel method, we show that TBV regulation differs between treadmill types, and that certain features of TBV regulation are affected by the subjects’ body mass and their locomotion speed. With higher body mass, the TBV reductions in the braking phase of stance became higher, even though this relationship differed between locomotion speeds and treadmill type (significant body mass × speed × treadmill type interaction). Average belt speeds varied between about 98 and 103% of the target speed. For three of the four treadmills, TBV reduction during the stance phase of running was more intense (> 5% target speed) and occurred earlier (before 50% of stance phase) unlike the typical overground center of mass velocity patterns reported in the literature. Overall, the results of this study emphasize the importance of monitoring TBV during locomotor research and applied diagnostics. We provide a novel method that is freely accessible on Matlab’s file exchange server (“getBeltVelocity.m”) allowing TBV tracking to become standard practice in locomotion research.
Melamine (1,3,5-triazine-2,4,6-triamine or cyanuramide, C3H6N6) is a trimer of cyanamide, with a 1,3,5-triazine skeleton (Figure 3.5-1). The molecule contains 66% nitrogen by mass and, if mixed with resins, has fire retardant properties due to its release of nitrogen gas when burned or charred. The word melamine (from German) is a combination of the word melam (which is a distillation derivative of ammonium thiocyanate) and amine [1]. Melamine is also a metabolite of cyromazine, an insecticide in which the proton of an NH2-group is substituted by a cyclopropyl group.
Electronic pills, smart capsules or miniaturized microsystems swallowed by human beings or animals for various biomedical and diagnostic applications are growing rapidly in the last years. This paper searched out the important existing electronic pills in the market and prototypes in research centers. Further objective of this research is to develop a technology platform with enhanced feature to cover the drawback of most
capsules. The designed telemetry unit is a synchronous bidirectional communication block using continuous phase DQPSK of 115 kHz low carrier frequency for inductive data transmission suited for human body energy transfer. The communication system can assist the electronic pill to trigger an actuator for drug delivery, to record temperature, or to measure pH of the body. It consists additionally to a 32bit processor, memory, external peripheries, and detection facility. The complete system is designed to fit small-size mass medical application with low power consumption, size of 7x25mm. The system is designed, simulated and emulated on FPGA.
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT security applications, such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of different devices to generate unique fingerprints for security applications. When generating PUF-based secret keys, the reliability and entropy of the keys are vital factors. This study proposes a novel method for generating PUF-based keys from a set of measurements. Firstly, it formulates the group-based key generation problem as an optimization problem and solves it using integer linear programming (ILP), which guarantees finding the optimum solution. Then, a novel scheme for the extraction of keys from groups is proposed, which we call positioning syndrome coding (PSC). The use of ILP as well as the introduction of PSC facilitates the generation of high-entropy keys with low error correction costs. These new methods have been tested by applying them on the output of a capacitor network PUF. The results confirm the application of ILP and PSC in generating high-quality keys.
A novel peptidyl-lys metalloendopeptidase (Tc-LysN) from Tramates coccinea was recombinantly expressed in Komagataella phaffii using the native pro-protein sequence. The peptidase was secreted into the culture broth as zymogen (~38 kDa) and mature enzyme (~19.8 kDa) simultaneously. The mature Tc-LysN was purified to homogeneity with a single step anion-exchange chromatography at pH 7.2. N-terminal sequencing using TMTpro Zero and mass spectrometry of the mature Tc-LysN indicated that the pro-peptide was cleaved between the amino acid positions 184 and 185 at the Kex2 cleavage site present in the native pro-protein sequence. The pH optimum of Tc-LysN was determined to be 5.0 while it maintained ≥60% activity between pH values 4.5—7.5 and ≥30% activity between pH values 8.5—10.0, indicating its broad applicability. The temperature maximum of Tc-LysN was determined to be 60 °C. After 18 h of incubation at 80 °C, Tc-LysN still retained ~20% activity. Organic solvents such as methanol and acetonitrile, at concentrations as high as 40% (v/v), were found to enhance Tc-LysN’s activity up to ~100% and ~50%, respectively. Tc-LysN’s thermostability, ability to withstand up to 8 M urea, tolerance to high concentrations of organic solvents, and an acidic pH optimum make it a viable candidate to be employed in proteomics workflows in which alkaline conditions might pose a challenge. The nano-LC-MS/MS analysis revealed bovine serum albumin (BSA)’s sequence coverage of 84% using Tc-LysN which was comparable to the sequence coverage of 90% by trypsin peptides.
Governments have restricted public life during the COVID-19 pandemic, inter alia closing sports facilities and gyms. As regular exercise is essential for health, this study examined the effect of pandemic-related confinements on physical activity (PA) levels. A multinational survey was performed in 14 countries. Times spent in moderate-to-vigorous physical activity (MVPA) as well as in vigorous physical activity only (VPA) were assessed using the Nordic Physical Activity Questionnaire (short form). Data were obtained for leisure and occupational PA pre- and during restrictions. Compliance with PA guidelines was calculated based on the recommendations of the World Health Organization (WHO). In total, n = 13,503 respondents (39 ± 15 years, 59% females) were surveyed. Compared to pre-restrictions, overall self-reported PA declined by 41% (MVPA) and 42.2% (VPA). Reductions were higher for occupational vs. leisure time, young and old vs. middle-aged persons, previously more active vs. less active individuals, but similar between men and women. Compared to pre-pandemic, compliance with WHO guidelines decreased from 80.9% (95% CI: 80.3–81.7) to 62.5% (95% CI: 61.6–63.3). Results suggest PA levels have substantially decreased globally during the COVID-19 pandemic. Key stakeholders should consider strategies to mitigate loss in PA in order to preserve health during the pandemic.
In recent years, the topic of embedded machine learning has become very popular in AI research. With the help of various compression techniques such as pruning, quantization and others compression techniques, it became possible to run neural networks on embedded devices. These techniques have opened up a whole new application area for machine learning. They range from smart products such as voice assistants to smart sensors that are needed in robotics. Despite the achievements in embedded machine learning, efficient algorithms for training neural networks in constrained domains are still lacking. Training on embedded devices will open up further fields of applications. Efficient training algorithms would enable federated learning on embedded devices, in which the data remains where it was collected, or retraining of neural networks in different domains. In this paper, we summarize techniques that make training on embedded devices possible. We first describe the need and requirements for such algorithms. Then we examine existing techniques that address training in resource-constrained environments as well as techniques that are also suitable for training on embedded devices, such as incremental learning. At the end, we also discuss which problems and open questions still need to be solved in these areas.
Nowadays decarbonisation of the energy system is one of the main concerns for most governments. Renewable energy technologies, such as rooftop photovoltaic systems and home battery storage systems, are changing the energy system to be more decentralised. As a consequence, new ways of energy business models are emerging, e.g., peer-to-peer energy trading. This new concept provides an online marketplace where direct energy exchange can occur between its participants. The purpose of this study is to conduct a content analysis of the existing literature, ongoing research projects, and companies related to peer-to-peer energy trading. From this review, a summary of the most important aspects and journal papers is assessed, discussed, and classified. It was found that the different energy market types were named in various ways and a proposal for standard language for the several peer-to-peer market types and the different actors involved is suggested. Additionally, by grouping the most important attributes from peer-to-peer energy trading projects, an assessment of the entry barrier and scalability potential is performed by using a characterisation matrix.
A Review on Kinetic Energy Harvesting with Focus on 3D Printed Electromagnetic Vibration Harvesters
(2021)
The increasing amount of Internet of Things (IoT) devices and wearables require a reliable energy source. Energy harvesting can power these devices without changing batteries. Three-dimensional printing allows us to manufacture tailored harvesting devices in an easy and fast way. This paper presents the development of hybrid and non-hybrid 3D printed electromagnetic vibration energy harvesters. Various harvesting approaches, their utilised geometry, functional principle, power output and the applied printing processes are shown. The gathered harvesters are analysed, challenges examined and research gaps in the field identified. The advantages and challenges of 3D printing harvesters are discussed. Reported applications and strategies to improve the performance of printed harvesting devices are presented.
It is generally agreed that the development and deployment of an important amount of IoT devices throughout the world has revolutionized our lives in a way that we can rely on these devices to complete certain tasks that may have not been possible just years ago which also brought a new level of convenience and value to our lives.
This technology is allowing us in a smart home environment to remotely control doors, windows, and fridges, purchase online, stream music easily with the use of voice assistants such as Amazon Echo Alexa, also close a garage door from anywhere in the world to cite some examples as this technology has added value to several domains ranging from household environments, cites, industries by exchanging and transferring data between these devices and customers. Many of these devices’ sensors, collect and share information in real-time which enables us to make important business decisions.
However, these devices pose some risks and also some security and privacy challenges that need to be addressed to reach their full potential or be considered to be secure. That is why, comprehensive risk analysis techniques are essential to enhance the security posture of IoT devices as they can help evaluate the robustness and reliability towards potential susceptibility to risks, and vulnerabilities that IoT devices in a smart home setting might possess.
This approach relies on the basis of ISO/IEC 27005 methodology and risk matrix method to highlight the level of risks, impact, and likelihood that an IoT device in smart home settings can have, map the related vulnerability, threats and risks and propose the necessary mitigation strategies or countermeasures that can be taken to secure a device and therefore satisfying some security principles. Around 30 risks were identified on Amazon Echo and the related IoT system using the methodology. A detailed list of countermeasures is proposed as a result of the risk analysis. These results, in turn, can be used to elevate the security posture of the device.
Background: Assistive Robotic Arms are designed to assist physically disabled people with daily activities. Existing joysticks and head controls are not applicable for severely disabled people such as people with Locked-in Syndrome. Therefore, eye tracking control is part of ongoing research. The related literature spans many disciplines, creating a heterogeneous field that makes it difficult to gain an overview.
Objectives: This work focuses on ARAs that are controlled by gaze and eye movements. By answering the research questions, this paper provides details on the design of the systems, a comparison of input modalities, methods for measuring the performance of these controls, and an outlook on research areas that gained interest in recent years.
Methods: This review was conducted as outlined in the PRISMA 2020 Statement. After identifying a wide range of approaches in use the authors decided to use the PRISMA-ScR extension for a scoping review to present the results. The identification process was carried out by screening three databases. After the screening process, a snowball search was conducted.
Results: 39 articles and 6 reviews were included in this article. Characteristics related to the system and study design were extracted and presented divided into three groups based on the use of eye tracking.
Conclusion: This paper aims to provide an overview for researchers new to the field by offering insight into eye tracking based robot controllers. We have identified open questions that need to be answered in order to provide people with severe motor function loss with systems that are highly useable and accessible.
A simple Method for quantifying Triazine Herbicides using Thin-Layer Chromatography and a CCD-Camera
(2010)
We present a video-densitometric quantification method for the triazine herbicides atraton, terbumeton, simazine, atrazine, and terbutylazine. Triazine herbicides were separated on silica gel using methyl-t-butyl ether, cyclohexane (1 + 1, v/v) as mobile phase. The quantification is based on a derivation reaction using chlorine and starch-iodine which forms red-brown triazine zones. Measurements were carried out using a 16 bit ST-1603ME CCD camera with 1.56 megapixel from Santa Barbara Instrument Group, Inc., Santa Barbara, USA. A white LED was used for illumination purposes. The range of linearity covers two magnitudes using the (1/R-1) expression data transformation. The signal-to-noise ratio increases directly linearly with the measurement time. The separation method is cheap, fast and reliable.
In short-reach connections, large-diameter multimode fibres allow for robust and easy connections. Unfortunately, their propagation properties depend on the excitation conditions. We propose a launching technique using a fibre stub that can tolerate fabrication tolerances in terms of tilts and off-sets to a large extent. A study of the influence of displaced connectors along the transmission link shows that the power distributions approach a steady-state power distribution very similar to the initial distribution established by the proposed launching scheme.
Decentralized applications (dApp) have proliferated in recent years, but their long-term viability is a topic of debate. However, for dApps to be sustainable, and suitable for integration into a larger service networks, they need to attract users and promise reliable availability. Therefore, assessing their longevity is crucial. Analyzing the utilization trajectory of a service is, however, challenging due to several factors, such as demand spikes, noise, autocorrelation, and non-stationarity. In this study, we employ robust statistical techniques to identify trends in currently popular dApps. Our findings demonstrate that a significant proportion of dApps, across a range of categories, exhibit statistically significant positive overall trends, indicating that success in decentralized computing can be sustainable and transcends specific fields. However, there is also a substantial number of dApps showing negative trends, with a disproportionately high number from the decentralized finance (DeFi) category. Furthermore, a more detailed inspection of time series segments shows a clearly diminishing proportion of positive trends from mid-2021 to the present. In summary, we conclude that the dApp economy might have lost some momentum, and that there is a strong element of uncertainty regarding its future significance.
The increase of the Internet of Things (IoT) calls for secure solutions for industrial applications. The security of IoT can be potentially improved by blockchain. However, blockchain technology suffers scalability issues which hinders integration with IoT. Solutions to blockchain’s scalability issues, such as minimizing the computational complexity of consensus algorithms or blockchain storage requirements, have received attention. However, to realize the full potential of blockchain in IoT, the inefficiencies of its inter-peer communication must also be addressed. For example, blockchain uses a flooding technique to share blocks, resulting in duplicates and inefficient bandwidth usage. Moreover, blockchain peers use a random neighbor selection (RNS) technique to decide on other peers with whom to exchange blockchain data. As a result, the peer-to-peer (P2P) topology formation limits the effective achievable throughput. This paper provides a survey on the state-of-the-art network structures and communication mechanisms used in blockchain and establishes the need for network-based optimization. Additionally, it discusses the blockchain architecture and its layers categorizes existing literature into the layers and provides a survey on the state-of-the-art optimization frameworks, analyzing their effectiveness and ability to scale. Finally, this paper presents recommendations for future work.
In this paper, a temperature-dependent viscoplasticity model is presented that describes thermal and cyclic softening of the hot work steel X38CrMoV5-3 under thermomechanical fatigue loading. The model describes the softening state of the material by evolution equations, the material properties of which can be determined on the basis of a defined experimental program. A kinetic model is employed to capture the effect of coarsening carbides and a new isotropic cyclic softening model is developed that takes history effects during thermomechanical loadings into account. The temperature-dependent material properties of the viscoplasticity model are determined on the basis of experimental data measured in isothermal and thermomechanical fatigue tests for the material X38CrMoV5-3 in the temperature range between 20 and 650 ∘C. The comparison of the model and an existing model for isotropic softening shows an improved description of the softening behavior under thermomechanical fatigue loading. A good overall description of the experimental data is possible with the presented viscoplasticity model, so that it is suited for the assessment of operating loads of hot forging tools.
Air traffic control today still works primarily with classical sensors like primary and Secondary Surveillance Radars (PSR, MSSR, Mode-S) [1]. Upcoming is a new technology, ADS (Automatic Dependent Surveillance), which derives positional information from a Global Navigation Satellite System (GNSS) and distributes this data together with additional information from the on-board Flight Management System (FMS) to other aircraft (air-to-air) and to ADS groundstations (air-to-ground). [2] Because the transmission of the data takes place on a shared broadcasting media, like the 1090 MHz Extended Squitter (ES) channel, the technology is also referred to as ADS-Broadcast (ADS-B).
Featherweight Generic Go (FGG) is a minimal core calculus modeling the essential features of the programming language Go. It includes support for overloaded methods, interface types, structural subtyping, and generics. The most straightforward semantic description of the dynamic behavior of FGG programs is to resolve method calls based on runtime type information of the receiver. This article shows a different approach by defining a type-directed translation from FGG− to an untyped lambda-calculus. FGG− includes all features of FGG but type assertions. The translation of an FGG− program provides evidence for the availability of methods as additional dictionary parameters, similar to the dictionary-passing approach known from Haskell type classes. Then, method calls can be resolved by a simple lookup of the method definition in the dictionary. Every program in the image of the translation has the same dynamic semantics as its source FGG− program. The proof of this result is based on a syntactic, step-indexed logical relation. The step index ensures a well-founded definition of the relation in the presence of recursive interface types and recursive methods. Although being non-deterministic, the translation is coherent.
We present a densitometric quantification method for triclosan in toothpaste, separated by high-performance thin-layer chromatography (HPTLC) and using a 48-bit flatbed scanner as the detection system. The sample was band-wise applied to HPTLC plates (10 × 20 cm), with fluorescent dye, Merck, Germany (1.05554). The plates were developed in a vertical developing chamber with 20 min of chamber saturation over 70 mm, using n-heptane–methyl tert-butyl ether–acetic acid (92:8:0.1, V/V) as solvent. The RF value of triclosan is hRF = 22.4, and quantification is based on direct measurements using an inexpensive 48-bit flatbed scanner for color measurements (in red, green, and blue) after plate staining with 2,6-dichloroquinone-4-chloroimide (Gibbs' reagent). Evaluation of the red channel makes the measurements of triclosan very specific. For linearization, an extended Kubelka–Munk expression was used for data transformation. The range of linearity covers more than two orders of magnitude and is between 91 and 1000 ng. The separation method is inexpensive, fast and reliable.
The Metering Bus, also known as M-Bus, is a European standard EN13757-3 for reading out metering devices, like electricity, water, gas, or heat meters. Although real-life M-Bus networks can reach a significant size and complexity, only very simple protocol analyzers are available to observe and maintain such networks. In order to provide developers and installers with the ability to analyze the real bus signals easily, a web-based monitoring tool for the M-Bus has been designed and implemented. Combined with a physical bus interface it allows for measuring and recording the bus signals. For this at first a circuit has been developed, which transforms the voltage and current-modulated M-Bus signals to a voltage signal that can be read by a standard ADC and processed by an MCU. The bus signals and packets are displayed using a web server, which analyzes and classifies the frame fragments. As an additional feature an oscilloscope functionality is included in order to visualize the physical signal on the bus. This paper describes the development of the read-out circuit for the Wired M-Bus and the data recovery.
For the treatment of bone defects, biodegradable, compressive biomaterials are needed as replacements that degrade as the bone regenerates. The problem with existing materials has either been their insufficient mechanical strength or the excessive differences in their elastic modulus, leading to stress shielding and eventual failure. In this study, the compressive strength of CPC ceramics (with a layer thickness of more than 12 layers) was compared with sintered β-TCP ceramics. It was assumed that as the number of layers increased, the mechanical strength of 3D-printed scaffolds would increase toward the value of sintered ceramics. In addition, the influence of the needle inner diameter on the mechanical strength was investigated. Circular scaffolds with 20, 25, 30, and 45 layers were 3D printed using a 3D bioplotter, solidified in a water-saturated atmosphere for 3 days, and then tested for compressive strength together with a β-TCP sintered ceramic using a Zwick universal testing machine. The 3D-printed scaffolds had a compressive strength of 41.56 ± 7.12 MPa, which was significantly higher than that of the sintered ceramic (24.16 ± 4.44 MPa). The 3D-printed scaffolds with round geometry reached or exceeded the upper limit of the compressive strength of cancellous bone toward substantia compacta. In addition, CPC scaffolds exhibited more bone-like compressibility than the comparable β-TCP sintered ceramic, demonstrating that the mechanical properties of CPC scaffolds are more similar to bone than sintered β-TCP ceramics.
In pandemic times, the possibilities for conventional sports activities are severely limited; many sports facilities are closed or can only be used with restrictions. To counteract this lack of health activities and social exchange, people are increasingly adopting new digital sports solutions—a behavior change that had already started with the trend towards fitness apps and activity trackers. Existing research suggests that digital solutions increase the motivation to move and stay active. This work further investigates the potentials of digital sports incorporating the dimensions gender and preference for team sports versus individual sports. The study focuses on potential users, who were mostly younger professionals and academics. The results show that the SARS-CoV-19 pandemic had a significant negative impact on sports activity, particularly on persons preferring team sports. To compensate, most participants use more digital sports than before, and there is a positive correlation between the time spent physically active during the pandemic and the increase in motivation through digital sports. Nevertheless, there is still considerable skepticism regarding the potential of digital sports solutions to increase the motivation to do sports, increase performance, or raise a sense of team spirit when done in groups.
Most recently, the federal government in Germany published new climate goals in order reach climate neutrality by 2045. This paper demonstrates a path to a cost optimal energy supply system for the German power grid until the year 2050. With special regard to regionality, the system is based on yearly myopic optimization with the required energy system transformation measures and the associated system costs. The results point out, that energy storage systems (ESS) are fundamental for renewables integration in order to have a feasible energy transition. Moreover, the investment in storage technologies increased the usage of the solar and wind technologies. Solar energy investments were highly accompanied with the installation of short-term battery storage. Longer-term storage technologies, such as H2, were accompanied with high installations of wind technologies. The results pointed out that hydrogen investments are expected to overrule short-term batteries if their cost continues to decrease sharply. Moreover, with a strong presence of ESS in the energy system, biomass energy is expected to be completely ruled out from the energy mix. With the current emission reduction strategy and without a strong presence of large scale ESS into the system, it is unlikely that the Paris agreement 2° C target by 2050 will be achieved, let alone the 1.5° C.
Active participation of industrial enterprises in electricity markets - a generic modeling approach
(2021)
Industrial enterprises represent a significant portion of electricity consumers with the potential of providing demand-side energy flexibility from their production processes and on-site energy assets. Methods are needed for the active and profitable participation of such enterprises in the electricity markets especially with variable prices, where the energy flexibility available in their manufacturing, utility and energy systems can be assessed and quantified. This paper presents a generic model library equipped with optimal control for energy flexibility purposes. The components in the model library represent the different technical units of an industrial enterprise on material, media, and energy flow levels with their process constraints. The paper also presents a case study simulation of a steel-powder manufacturing plant using the model library. Its energy flexibility was assessed when the plant procured its electrical energy at fixed and variable electricity prices. In the simulated case study, flexibility use at dynamic prices resulted in a 6% cost reduction compared to a fixed-price scenario, with battery storage and the manufacturing system making the largest contributions to flexibility.
In a randomized controlled cross-over study ten male runners (26.7 ± 4.9 years; recent 5-km time: 18:37 ± 1:07 min:s) performed an incremental treadmill test (ITT) and a 3-km time trial (3-km TT) on a treadmill while wearing either carbon fiber insoles with downwards curvature or insoles made of butyl rubber (control condition) in light road racing shoes (Saucony Fastwitch 9). Oxygen uptake, respiratory exchange ratio, heart rate, blood lactate concentration, stride frequency, stride length and time to exhaustion were assessed during ITT. After ITT, all runners rated their perceived exertion, perceived shoe comfort and perceived shoe performance. Running time, heart rate, blood lactate levels, stride frequency and stride length were recorded during, and shoe comfort and shoe performance after, the 3-km TT. All parameters obtained during or after the ITT did not differ between the two conditions [range: p = 0.188 to 0.948 (alpha value: 0.05); Cohen's d = 0.021 to 0.479] despite the rating of shoe comfort showing better scores for the control insoles (p = 0.001; d = −1.646). All parameters during and after the 3-km TT showed no differences (p = 0.200 to 1.000; d = 0.000 to 0.501) between both conditions except for shoe comfort showing better scores for control insoles (p = 0.017; d = −0.919). Running with carbon fiber insoles with downwards curvature did not change running performance or any submaximal or maximal physiological or biomechanical parameter and perceived exertion compared to control condition. Shoe comfort is impaired while running with carbon fiber insoles. Wearing carbon fiber insoles with downwards curvature during treadmill running is not beneficial when compared to running with control insoles.
Blockchain-IIoT integration into industrial processes promises greater security, transparency, and traceability. However, this advancement faces significant storage and scalability issues with existing blockchain technologies. Each peer in the blockchain network maintains a full copy of the ledger which is updated through consensus. This full replication approach places a burden on the storage space of the peers and would quickly outstrip the storage capacity of resource-constrained IIoT devices. Various solutions utilizing compression, summarization or different storage schemes have been proposed in literature. The use of cloud resources for blockchain storage has been extensively studied in recent years. Nonetheless, block selection remains a substantial challenge associated with cloud resources and blockchain integration. This paper proposes a deep reinforcement learning (DRL) approach as an alternative to solving the block selection problem, which involves identifying the blocks to be transferred to the cloud. We propose a DRL approach to solve our problem by converting the multi-objective optimization of block selection into a Markov decision process (MDP). We design a simulated blockchain environment for training and testing our proposed DRL approach. We utilize two DRL algorithms, Advantage Actor-Critic (A2C), and Proximal Policy Optimization (PPO) to solve the block selection problem and analyze their performance gains. PPO and A2C achieve 47.8% and 42.9% storage reduction on the blockchain peer compared to the full replication approach of conventional blockchain systems. The slowest DRL algorithm, A2C, achieves a run-time 7.2 times shorter than the benchmark evolutionary algorithms used in earlier works, which validates the gains introduced by the DRL algorithms. The simulation results further show that our DRL algorithms provide an adaptive and dynamic solution to the time-sensitive blockchain-IIoT environment.
The progress in machine learning has led to advanced deep neural networks. These networks are widely used in computer vision tasks and safety-critical applications. The automotive industry, in particular, has experienced a significant transformation with the integration of deep learning techniques and neural networks. This integration contributes to the realization of autonomous driving systems. Object detection is a crucial element in autonomous driving. It contributes to vehicular safety and operational efficiency. This technology allows vehicles to perceive and identify their surroundings. It detects objects like pedestrians, vehicles, road signs, and obstacles. Object detection has evolved from being a conceptual necessity to an integral part of advanced driver assistance systems (ADAS) and the foundation of autonomous driving technologies. These advancements enable vehicles to make real-time decisions based on their understanding of the environment, improving safety and driving experiences. However, the increasing reliance on deep neural networks for object detection and autonomous driving has brought attention to potential vulnerabilities within these systems. Recent research has highlighted the susceptibility of these systems to adversarial attacks. Adversarial attacks are well-designed inputs that exploit weaknesses in the deep learning models underlying object detection. Successful attacks can cause misclassifications and critical errors, posing a significant threat to the functionality and safety of autonomous vehicles. With the rapid development of object detection systems, the vulnerability to adversarial attacks has become a major concern. These attacks manipulate inputs to deceive the target system, significantly compromising the reliability and safety of autonomous vehicles. In this study, we focus on analyzing adversarial attacks on state-of-the-art object detection models. We create adversarial examples to test the models’ robustness. We also check if the attacks work on a different object detection model meant for similar tasks. Additionally, we extensively evaluate recent defense mechanisms to see how effective they are in protecting deep neural networks (DNNs) from adversarial attacks and provide a comprehensive overview of the most commonly used defense strategies against adversarial attacks, highlighting how they can be implemented practically in real-world situations.
This Master's Thesis discusses intelligent sensor networks considering autonomous sensor placement strategies and system health management. Sensor networks for an intelligent system design process have been researched recently. These networks consist of a distributed collective of sensing units, each with the abilities of individual sensing and computation. Such systems can be capable of self-deployment and must be scalable, long-lived and robust. With distributed sensor networks, intelligent sensor placement for system design and online system health management are attractive areas of research. Distributed sensor networks also cause optimization problems, such as decentralized control, system robustness and maximization of coverage in a distributed system. This also includes the discovery and analysis of points of interest within an environment. The purpose of this study was to investigate a method to control sensor placement in a world with several sources and multiple types of information autonomously. This includes both controlling the movement of sensor units and filtering of the gathered information depending on individual properties to increase system performance, defined as a good coverage. Additionally, online system health management was examined in this study regarding the case of agent failures and autonomous policy reconfiguration if sensors are added to or removed from the system. Two different solution strategies were devised, one where the environment was fully observable, and one with only partial observability. Both strategies use evolutionary algorithms based on artificial neural networks for developing control policies. For performance measurement and policy evaluation, different multiagent objective functions were investigated. The results of the study show that in the case of a world with multiple types of information, individual control strategies performed best because of their abilities to control the movement of a sensor entity and to filter the sensed information. This also includes system robustness in case of sensor failures where other sensing units must recover system performance. Additionally, autonomous policy reconfiguration after adding or removing of sensor agents was successful. This highlights that intelligent sensor agents are able to adapt their individual control policies considering new circumstances.
The significant market growth of stationary electrical energy storage systems both for private and commercial applications has raised the question of battery lifetime under practical operation conditions. Here, we present a study of two 8 kWh lithium-ion battery (LIB) systems, each equipped with 14 lithium iron phosphate/graphite (LFP) single cells in different cell configurations. One system was based on a standard configuration with cells connected in series, including a cell-balancing system and a 48 V inverter. The other system featured a novel configuration of two stacks with a parallel connection of seven cells each, no cell-balancing system, and a 4 V inverter. The two systems were operated as part of a microgrid both in continuous cycling mode between 30% and 100% state of charge, and in solar-storage mode with day–night cycling. The aging characteristics in terms of capacity loss and internal resistance change in the cells were determined by disassembling the systems for regular checkups and characterizing the individual cells under well-defined laboratory conditions. As a main result, the two systems showed cell-averaged capacity losses of 18.6% and 21.4% for the serial and parallel configurations, respectively, after 2.5 years of operation with 810 (serial operation) and 881 (parallel operation) cumulated equivalent full cycles. This is significantly higher than the aging of a reference single cell cycled under laboratory conditions at 20 °C, which showed a capacity loss of only 10% after 1000 continuous full cycles.
AI-based Ground Penetrating Radar Signal Processing for Thickness Estimation of Subsurface Layers
(2023)
This thesis focuses on the estimation of subsurface layer thickness using Ground Penetrating Radar (GPR) A-scan and B-scan data through the application of neural networks. The objective is to develop accurate models capable of estimating the thickness of up to two subsurface layers.
Two different approaches are explored for processing the A-scan data. In the first approach, A-scans are compressed using Principal Component Analysis (PCA), and a regression feedforward neural network is employed to estimate the layers’ thicknesses. The second approach utilizes a regression one-dimensional Convolutional Neural Network (1-D CNN) for the same purpose. Comparative analysis reveals that the second approach yields superior results in terms of accuracy.
Subsequently, the proposed 1-D CNN architecture is adapted and evaluated for Step Frequency Continuous Wave (SFCW) radar, expanding its applicability to this type of radar system. The effectiveness of the proposed network in estimating subsurface layer thickness for SFCW radar is demonstrated.
Furthermore, the thesis investigates the utilization of GPR B-scan images as input data for subsurface layer thickness estimation. A regression CNN is employed for this purpose, although the results achieved are not as promising as those obtained with the 1-D CNN using A-scan data. This disparity is attributed to the limited availability of B-scan data, as B-scan generation is a resource-intensive process.