Refine
Year of publication
- 2018 (111) (remove)
Document Type
- Conference Proceeding (61)
- Article (reviewed) (31)
- Part of a Book (9)
- Letter to Editor (4)
- Article (unreviewed) (3)
- Patent (2)
- Doctoral Thesis (1)
Conference Type
- Konferenzartikel (44)
- Konferenz-Abstract (13)
- Sonstiges (3)
- Konferenz-Poster (1)
Language
- English (111) (remove)
Has Fulltext
- no (111) (remove)
Is part of the Bibliography
- yes (111)
Keywords
- Mikrostruktur (3)
- Plastizität (3)
- RoboCup (3)
- 5G mobile communication (2)
- Access protocols (2)
- Decoding (2)
- Gamification (2)
- MPC (2)
- Multiuser detection (2)
- Payloads (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (50)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (27)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (15)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (15)
- Fakultät Wirtschaft (W) (13)
- INES - Institut für nachhaltige Energiesysteme (10)
- ACI - Affective and Cognitive Institute (6)
- CRT - Campus Research & Transfer (2)
- WLRI - Work-Life Robotics Institute (1)
- Zentrale Einrichtungen (1)
Open Access
- Closed Access (58)
- Open Access (43)
- Bronze (3)
- Closed (2)
- Diamond (1)
In the 19th century Alexander von Humboldt explored the nature and was conceived a new vision of nature that still influences the way we understand the new world. Humboldt believed in the importance of accurate measurements and precise description of observations. His vision of nature included not only facts but also emotions.
Nowadays smart solutions will be developed by using computer technology, which will influence our relationship to nature, our handling of the complexity and diversity of nature itself and the technological influences on the society. Could we avoid a new form of “Colonialism”, when a network of super computers will create a smarter world?
This paper describes the Sweaty II humanoid adult size robot trying to qualify for the RoboCup 2018 adult size humanoid competition. Sweaty came 2nd in RoboCup 2017 adult size league. The main characteristics of Sweaty are described in the Team Description Paper 2017. The improvements that have been made or are planned to be implemented for RoboCup 2018 are described in this paper.
A Nonlinear FEM Model to Calculate Third-Order Harmonic and Intermodulation in TC-SAW Devices
(2018)
Nonlinearities in Temperature Compensated SAW (TC-SAW) devices in the 2 GHz range are investigated using a nonlinear finite element model by simultaneously considering both third-order intermodulation distortion (IMD3)and third harmonic (H3). In the employed perturbation approach, different contributions to the total H3, the direct and indirect contribution, are discussed. H3 and IMD3 measurements were fitted simultaneously using scaling factors for SiO 2 film and Cu electrode nonlinear material tensors in TC-SAW devices. We employ a P-Matrix simulation as intermediate step: Firstly, measurement and nonlinear P-Matrix calculations for finite devices are compared and coefficients of the P-Matrix simulation are determined. The nonlinear tensor data of the different materials involved in periodic nonlinear finite element method (FEM) computations are optimized to fit periodic P-Matrix calculations by introducing scaling factors. Thus, the contribution of different materials to the nonlinear behavior of TC-SAW devices is obtained and the role of materials is discussed.
Quantification of astaxanthin in salmons by chemiluminescence and absorption after TLC separation
(2018)
Astaxanthin is a keto-carotenoid, belongs to the chemical class of terpenes and is a yellow lipid soluble compound. The compound is present in marine animals like salmons and crustacean. Its colour is due to conjugated double bonds and these double bonds are responsible for its antioxidant effect. Its antioxidant activity is ten times stronger than other carotenoids and nearly 500 fold stronger than vitamin-E. We present a new thin layer chromatography (TLC) method to measure astaxanthin on TLC-plates (Merck, 1.05554) in the visible absorption range as well as by using chemiluminescence. For separation a solvent mixture of cyclohexane and acetone (10 + 2.4, v/v) was used. The RF-value of astaxanthin is 0.14.The limit of detection in vis-absorption is 64 ng / band and the limit of quantification is 92 ng/band. In chemiluminescence the values are 90 ng / band and 115 ng/band. The method offers two independently working measurement modes on a single plate which increase the accuracy of the quantification.
The authors claim that location information of stationary ICT components can never be unclassified. They describe how swarm-mapping crowd sourcing is used by Apple and Google to worldwide harvest geo-location information on wireless access points and mobile telecommunication systems' base stations to build up gigantic databases with very exclusive access rights. After having highlighted the known technical facts, in the speculative part of this article, the authors argue how this may impact cyber deterrence strategies of states and alliances understanding the cyberspace as another domain of geostrategic relevance. The states and alliances spectrum of activities due to the potential existence of such databases may range from geopolitical negotiations by institutions understanding international affairs as their core business, mitigation approaches at a technical level, over means of cyber deterrence-by-retaliation.
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.