Refine
Year of publication
Document Type
- Conference Proceeding (734) (remove)
Conference Type
- Konferenzartikel (734) (remove)
Language
- English (734) (remove)
Keywords
- Gamification (12)
- Machine Learning (12)
- Assistive Technology (8)
- Kommunikation (8)
- Deep Leaning (7)
- TRIZ (7)
- Additive Manufacturing (6)
- Ausbildung (6)
- Design (6)
- Education (6)
- Produktion (6)
- machine learning (6)
- Deafblindness (5)
- Eingebettetes System (5)
- Human Computer Interaction (5)
- Optik (5)
- Roboter (5)
- Sensortechnik (5)
- Wearables (5)
- research-oriented education (5)
- 3D printing (4)
- Education in Optics and Photonics (4)
- Finite-Elemente-Methode (4)
- Haustechnik (4)
- Messung (4)
- Netzwerk (4)
- Robustness (4)
- Sicherheit (4)
- Stahl (4)
- User Experience (4)
- VR (4)
- eco-innovation (4)
- energy harvesting (4)
- injury (4)
- optics and photonics (4)
- 5G mobile communication (3)
- Affective Computing (3)
- Applied computing (3)
- Applikation (3)
- Brennstoffzelle (3)
- Couplings (3)
- Deep Learning (3)
- Design automation (3)
- E-Learning (3)
- Energieversorgung (3)
- Energy Management (3)
- Generative Adversarial Network (3)
- Haptics (3)
- Human Resources (3)
- Innovation (3)
- Künstliche Intelligenz (3)
- Leistungselektronik (3)
- Licht (3)
- Materialermüdung (3)
- Messtechnik (3)
- Photonik (3)
- Radar (3)
- Rehabilitation (3)
- Rissausbreitung (3)
- Robotics (3)
- Security (3)
- Sound Synthesis (3)
- Substrates (3)
- TRIZ Inventive Principles (3)
- TRIZ methodology (3)
- Tactile (3)
- cryptography (3)
- deep learning (3)
- neural networks (3)
- printed electronics (3)
- ACL (2)
- Access protocols (2)
- Additive Tooling (2)
- Alexander von Humboldt (2)
- Artificial Intelligence (2)
- Astronomical events (2)
- Augmented Reality (2)
- Batterie (2)
- Biomimetics (2)
- Blockchain (2)
- Chemical engineering (2)
- Computer Vision (2)
- Computersicherheit (2)
- Current measurement (2)
- Decoding (2)
- Demand side flexibility (2)
- Dienstleistung (2)
- Digitalisierung (2)
- Digitalization (2)
- Dünnschichtchromatographie (2)
- Eco-Innovation (2)
- Eco-inventive principles (2)
- Ecodesign (2)
- Elektrofahrzeug (2)
- Emotion Recognition (2)
- Empirical Research (2)
- Energieverbrauch (2)
- Energy Flexibility (2)
- Energy Storage Systems (2)
- Energy systems modeling (2)
- Engineering Creativity (2)
- Engineering creativity (2)
- Eye Tracking (2)
- FETs (2)
- Faseroptik (2)
- Festigkeit (2)
- Finite difference methods (2)
- Frequency (2)
- Funktechnik (2)
- Generative Art (2)
- Geophysik (2)
- Grid Integration (2)
- HCI (2)
- Harmonic analysis (2)
- Hochtemperatur (2)
- Human-Robot Collaboration (2)
- Human-centered computing (2)
- Humanoid Robots (2)
- Improvisation (2)
- Industrie 4.0 (2)
- Information systems (2)
- Integrated circuit interconnections (2)
- Intelligentes Stromnetz (2)
- International Day of Light, IDL (2)
- International Year of Light, IYL (2)
- Internet der Dinge (2)
- Internet of Things (2)
- Inventive principles (2)
- Knowledge-based innovation (2)
- Kreativität (2)
- Leistung (2)
- Lightweight design (2)
- Live Broadcasting (2)
- MEMS (2)
- Machine learning (2)
- Maschinenbau (2)
- Maschinenelement (2)
- Microwave devices (2)
- Mikrowellentechnik (2)
- Mobile Applications (2)
- Mobile Learning (2)
- Monitoring (2)
- Multiuser detection (2)
- NB-IoT (2)
- Navigation (2)
- Neural networks (2)
- Optics and Photonics (2)
- Optimization and control (2)
- PKI (2)
- PV System (2)
- Partikel (2)
- Payloads (2)
- Physical layer (2)
- Plastizität (2)
- Predictive Maintenance (2)
- Process Design (2)
- Process engineering (2)
- Prototyp (2)
- Semiconductor device packaging (2)
- Simulation (2)
- Simulation-based Interaction (2)
- Smart Grid (2)
- Smart Textiles (2)
- Social Robots (2)
- Software (2)
- Soziale Roboter (2)
- Stability (2)
- Sustainabilty (2)
- Switches (2)
- TLS (2)
- Transceivers (2)
- UWB radars (2)
- University students (2)
- Virtual Reality (2)
- Virtual reality (2)
- Virtuelle Realität (2)
- Visual Programming (2)
- Wissenschaft (2)
- Wärmepumpe (2)
- accelerometer (2)
- access protocols (2)
- accountability (2)
- artificial dancer (2)
- artificial intelligence (2)
- autoattack (2)
- biomechanics (2)
- catheter ablation (2)
- certificate management (2)
- content adaptation (2)
- convolutional neural networks (2)
- cybersecurity (2)
- dance and technology (2)
- decoding (2)
- design methods (2)
- device independent learning (2)
- e-learning (2)
- education and research (2)
- efficient training (2)
- environmental education (2)
- explainability (2)
- fairness (2)
- gamification (2)
- image classification (2)
- imaging algorithms (2)
- interactive visualization (2)
- learning scenarios (2)
- loneliness (2)
- medical imaging (2)
- microwave (2)
- motion synthesis (2)
- network coding (2)
- process engineering (2)
- programming (2)
- responsibility (2)
- running (2)
- scattering measurements (2)
- security (2)
- semantics (2)
- sport (2)
- standardization (2)
- sustainability (2)
- trust (2)
- understandability (2)
- virtual reality (2)
- 1.5-Degree target (1)
- 100% Renewable (1)
- 2D-TLC (1)
- 3D Printed Force Sensor (1)
- 3D bin picking (1)
- 3D displays (1)
- 3D interaction (1)
- 3D modeling (1)
- 3D virtual reality (1)
- 3D-Druck (1)
- 3D-Time-of-Flight Cameras (1)
- 4D-Druck (1)
- 4D-Printing (1)
- 5G (1)
- 5G private networks (1)
- 6LoWPAN (1)
- AC machines (1)
- AI aided Innovation (1)
- AI-Aided Innovation (1)
- AIN Cantilever (1)
- AR (1)
- Abbreviate Injury Scale (1)
- Abgas (1)
- Absatz (1)
- Academic Advising (1)
- Accident Analysis (1)
- Achilles tendonitis (1)
- Actuators (1)
- Additive Fertigung (1)
- Additive Manufacture (1)
- Additive manufacturing (1)
- Advanced Driver Assistance System (1)
- Adversarial Attacks (1)
- Adversarial Robustness (1)
- Aflatoxin (1)
- Agent based sensor (1)
- Agile Business (1)
- Agility (1)
- Air Pollution (1)
- Air Traffic Control (1)
- Aircraft (1)
- Akustik (1)
- Algorithmus (1)
- Aliasing (1)
- Aluminum (1)
- Amplitude and Phase Errors (1)
- Analytical Query (1)
- Anbieter (1)
- Android (1)
- Angle of Arrival (1)
- Anti-Windup (1)
- Approximation (1)
- Arbeitstag (1)
- Arbeitswissenschaft (1)
- Archives (1)
- Art and Photonics (1)
- Assistive Technologies (1)
- Astronomical optics (1)
- Atrial fibrillation (1)
- Atrioventricular delay (1)
- Attenuation (1)
- Audiovisual Performance (1)
- AudiovisualPerformance (1)
- Augmented reality (1)
- Authentication (1)
- Authorization (1)
- Automated Ideation (1)
- Automated Invention (1)
- Automated idea generation (1)
- Automation (1)
- Automotive After Market (1)
- Automotive Industry (1)
- Automotive Radar (1)
- Automotive engineering (1)
- BLE (1)
- Batteries (1)
- Battery storage (1)
- Bauteilfestigkeit (1)
- Bearings (1)
- Beschichtung (1)
- Bike Path Analysis (1)
- Bildverarbeitung (1)
- Binary Executable (1)
- Bio-based materials (1)
- Bio-based plastics (1)
- Biomedizin (1)
- Bioreaktor (1)
- Biosignals (1)
- Biventricular pacing (1)
- Blechformteil (1)
- Blockchains (1)
- Bloom filters (1)
- Bluetooth Low Energy (1)
- Boiler (1)
- Boundary conditions (1)
- Bowtie antenna (1)
- Breitbandkommunikation (1)
- Bruchmechanik (1)
- Building energy efficiency (1)
- Business Model Canvas (1)
- Bussystem (1)
- CAAD (1)
- CAD (1)
- CAD-System (1)
- CNN (1)
- CNNs (1)
- COVID (1)
- COVID-19 (1)
- Calibration (1)
- Cameras (1)
- Capacitive Liquid Level Sensor (1)
- Car Repair Service Performance (1)
- Car-2-Car communication (1)
- Car-2-X communication (1)
- Car-to-Car-(C2C)-Communication (1)
- Cardiac resynchronization therapy (1)
- Cascading Style Sheets (1)
- Challenges During Pandemic 2022 (1)
- Challenges in Action Recognition (1)
- Chatbot (1)
- Cheer and Challenge (1)
- Chemical Engineering (1)
- Circular polarizing filter (1)
- Cleaning (1)
- Climate change (1)
- Closed-form solution (1)
- Cloud Computing (1)
- Cloud Security (1)
- Cloud Service Provider (1)
- Cloud User (1)
- Cloud computing (1)
- Clustering (1)
- CoBot (1)
- Coal phase-out (1)
- Coatings (1)
- Cobotik (1)
- Codierung (1)
- Cogeneration (1)
- Collaboration (1)
- Collaboration of Academia and Industry (1)
- Collaborative learning (1)
- Collision Point (1)
- Collision avoidance (1)
- Communication networks (1)
- Compensation (1)
- Computer Games (1)
- Computer-assisted instruction (1)
- Computersimulation (1)
- Computerunterstützte Kommunikation (1)
- Context-Awareness (1)
- Context-awareness (1)
- Context-based Services (1)
- Control Algorithms (1)
- Controlling (1)
- Conversational user experience (1)
- Convolutional neural networks (1)
- Couplers (1)
- Creativity (1)
- Cross-industry innovation (1)
- Crowdsourcing-based ideation (1)
- Current Control (1)
- Curricular concepts (1)
- Customer Centricity (1)
- Customer Solution Design (1)
- Cyber Physical Systems, (1)
- Cybersecurity (1)
- DC-AC converters (1)
- DC-DC-Wandler (1)
- DDS (1)
- DMD (1)
- DVB-T (1)
- Data Distribution Service (1)
- Data Mining (1)
- Data breech (1)
- Data communications (1)
- Data mining (1)
- Data modeling (1)
- Databases (1)
- Datenbank (1)
- Datenbanksystem (1)
- Datenmanagement (1)
- Datensicherung (1)
- Dauerschwingprüfung (1)
- Deaf-Blindness (1)
- Debinding (1)
- Deep Neural Network (1)
- Deepfake (1)
- Degradability (1)
- Design , Produktgestaltung (1)
- Design Methods (1)
- Design education (1)
- Design for fibre reinforced AM (1)
- Design method (1)
- Device characterization (1)
- Device independency (1)
- Diagnostics (1)
- Diesel-Ethanol-Mischkraftstoff (1)
- Differential equations (1)
- Digital Beamforming (1)
- Digital Business Models (1)
- Digital Flex Twin Optimization (1)
- Digital Library (1)
- Digital Transformation (1)
- Digital Twin (1)
- Dimension 2 (1)
- Dimension 3 (1)
- Diode-array detection (1)
- Diskretisierung (1)
- Downlink (1)
- Drahtloses lokales Netz (1)
- Drohne (1)
- Druck (1)
- E-Commerce (1)
- E-learning (1)
- EAP-TLS (1)
- EMG features (1)
- ERP (1)
- ETAP Simulations (1)
- Easter Package (1)
- Ecercises (1)
- Eco Sciences (1)
- Eco-Design (1)
- Eco-innovation (1)
- Eco-inventive Principles (1)
- Economics (1)
- Edge AI (1)
- Edge mode (1)
- Educations (1)
- Effectiveness of fraud detection (1)
- Eigenvalues (1)
- Einkapselung (1)
- Einsamkeit (1)
- Elderly (1)
- Elderly care (1)
- Electromagnetic compatibility (1)
- Electronic Commerce (1)
- Elektrochemie (1)
- Elektrode (1)
- Elektrokardiogramm (1)
- Elektronische Medien (1)
- Embedded AI (1)
- Embedded Constantan Wire (1)
- Embedded Software (1)
- Embedded Systems (1)
- Emission (1)
- Emotion analysis (1)
- Emotional Communication (1)
- Emotional Interaction (1)
- Emotions (1)
- Empirical Studies (1)
- Empirical research (1)
- Encapsulation (1)
- Energieeffizienz (1)
- Energiemanagement (1)
- Energiewirtschaft (1)
- Energy Flexibility for Companies (1)
- Energy Market (1)
- Energy Marketing of Industrial Flexibilities (1)
- Energy Planning (1)
- Energy System Analysis (1)
- Energy System Optimization (1)
- Energy Transition (1)
- Energy management (1)
- Energy policy (1)
- Energy storage (1)
- Engineering Education (1)
- Engineering education in the age of digitalization (1)
- Enhanced Security (1)
- Enterprise computing (1)
- Environmental monitoring (1)
- Equations (1)
- Equivalent circuits (1)
- Ermüdung (1)
- Ermüdungslebensdauer (1)
- Error (1)
- Erweiterte Realität <Informatik> (1)
- Erziehung (1)
- Estimation (1)
- European structural and investment funds (1)
- Extrusion (1)
- Eöelktrokardiogramm (1)
- FSK Wake-Up (1)
- FT-Raman-Spektroskopie (1)
- FUSION (1)
- Fahrzeug (1)
- Failure analysis (1)
- Faserstoff (1)
- Fault Classification (1)
- Fault detection (1)
- Feasibility study (1)
- Featherweight Go (1)
- Feature extraction (1)
- Federal Republic of Germany (1)
- Federated Learning (1)
- Fertigungstechnik (1)
- Festoxidbrennstoffzelle (1)
- Fiber reinforcement (1)
- Field Programmable Gate Array (FPGA) (1)
- Filament (1)
- Filter Dimension (1)
- Filters (1)
- Finite element analysis (1)
- Finite-Differenz-Methode (1)
- Finite-Differenzen-Methode (1)
- Flugregelung (1)
- Flugzeugsteuerwerk (1)
- Flüssigkeit (1)
- Flüssigkristall (1)
- Formgebung (1)
- Fotovoltaik (1)
- Fractionated atrial signals (1)
- Fractionated ventricular signals (1)
- Frameworks (1)
- Fraud detection rates (1)
- Fused Filament Fabrication (1)
- Fused Layer Modeling (1)
- GIS (1)
- GPU Computing (1)
- GPU computing (1)
- Gait phase detection (1)
- Game Design (1)
- Games (1)
- Gasanalyse (1)
- Gebäude (1)
- Gefäßverschluß (1)
- Gehirn (1)
- Generative Design (1)
- Geothermie (1)
- Gerichtliche Wissenschaften (1)
- Geschäftsmodell (1)
- Gesellschaft (1)
- Gestaltung (1)
- Gesundheit (1)
- Gewebe (1)
- Gewichtseinsparung (1)
- Glasfaserkabel (1)
- Glasfaseroptik (1)
- Google Maps (1)
- Gratings (1)
- Gummi (1)
- Gyroskop (1)
- HPTLC (1)
- HR (1)
- Hands ON (1)
- Handschrift (1)
- Handswritten Character Recognition (1)
- Hash Function (1)
- Hash Table (1)
- Head-mounted displays (1)
- Health (1)
- Heat pumps (1)
- Helmholtz coil (1)
- Herstellung (1)
- Herz (1)
- Herzkrankheit (1)
- Herzschrittmacher (1)
- Hidden Champions (1)
- High-Cycle Fatigue (1)
- Hot forging (1)
- Hubschrauber (1)
- Human Computrer Interaction (1)
- Human computer interaction (1)
- Humanoid robot (1)
- Humanoid robots programming (1)
- Humanoider Roboter (1)
- Hybrid system (1)
- Höhensensor (1)
- IDL (1)
- IEC/IEEE 60802 security (1)
- IEEE802.11p/WAVE (1)
- IEEE802.15.4 (1)
- IIoT (1)
- IYL (1)
- Ideation Performance (1)
- Ideation efficiency (1)
- Ideation performance function (1)
- Image restoration (1)
- Immersive Technology (1)
- Impairments (1)
- Implementation (1)
- Imprägnierung (1)
- In-flight entertainment (1)
- InceptionTime (1)
- Inclined surface (1)
- Industrial Blockchain (1)
- Inertial measurement unit (1)
- Informatik (1)
- Informationssystem (1)
- Informationstechnik (1)
- Informationsvermittlung (1)
- Ingenieurwissenschaften (1)
- Injection Molds (1)
- Injection Moulding (1)
- Ink (1)
- Instandhaltung (1)
- Integrated product development (1)
- Intelligent Agents (1)
- Intelligent Buildings (1)
- Interaction metaphor (1)
- Interferometrie (1)
- International Day of Light (1)
- International Year of Light (1)
- Internet Overlay networks (1)
- Internet portal (1)
- Inventive problem solving (1)
- Inverters (1)
- IoT Security (1)
- IoT security (1)
- Irregularities (1)
- Isolation (1)
- Joining processes (1)
- Jones calculus (1)
- KI-Labor Südbaden (1)
- Kabel (1)
- Kalibrierung (1)
- Kamera (1)
- Karbon (1)
- Kinetik (1)
- Klein- und Mittelbetrieb (1)
- Knowledge sharing (1)
- Knowledge-based Innovation (1)
- Kontextbewusstsein (1)
- Kontrolltheorie (1)
- Korrelation (1)
- Kostensenkung (1)
- Kraftstoff (1)
- Kraftwerk (1)
- Kryoptologie (1)
- Kryptographie (1)
- Kupplung (1)
- LPWAN (1)
- LXP (1)
- Landau-Lifshitz-Gilbert equations (1)
- Language acquisition (1)
- Large Grid-Connected PV Systems (1)
- Lastenverschiebung (1)
- Leap Motion Controller (1)
- Learning (1)
- Left atrial ECG (1)
- Left atrial delay (1)
- Left cardiac ECG (1)
- Lehre (1)
- Leistungsdichte (1)
- Lernen (1)
- Lichtdispersion (1)
- Limiting (1)
- Lithium compounds (1)
- Lithium niobate (1)
- Load Flow Analysis (1)
- Location-Based Services (1)
- Location-based Services (1)
- Logic gates (1)
- Loneliness (1)
- Long Term Evolution (1)
- Low-Cycle Fatigue (1)
- Lärmschutz (1)
- MIMO (1)
- MLOps (1)
- MPC (1)
- Machine-to- Machine-(M2M)-Communication (1)
- Magnetic sensors (1)
- Magnetismus (1)
- Makespan (1)
- Management (1)
- Manufacturing (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Many-core architectures (1)
- Martensitic die steel (1)
- Material Extrusion (1)
- Material Properties (1)
- Mathematical model (1)
- Mean Square Error (1)
- Measurement (1)
- Mechanik (1)
- Media Object (1)
- Media Stream (1)
- Medizin (1)
- Medizintechnik (1)
- Membran (1)
- Mensch-Maschine-Kommunikation (1)
- Metallization (1)
- Meters (1)
- Methanisierung (1)
- Microelectronics (1)
- Microgrid (1)
- Microgrid(s) (1)
- Microgrids (1)
- Microwave integrated circuits (1)
- Microwave integrated circuits Equivalent circuits (1)
- Mikrocontroller (1)
- Mikrostruktur (1)
- Mobile Computing (1)
- Mobile device (1)
- Mobile devices (1)
- Mobilkommunikation (1)
- Mode Collapse (1)
- Model Calibration (1)
- Model Predictive Control (1)
- Model Search (1)
- Modell (1)
- Modellhubschrauber (1)
- Modellierung (1)
- Module Manufacturing (1)
- Monocular Depth Estimation (1)
- Monomodefaser (1)
- Monte-Carlo (1)
- Monte-Carlo Simulation (1)
- Monte-Carlo method (1)
- Movement (1)
- Multi-Material 3D-Printing (1)
- Multi-core architectures (1)
- Multimedia information systems (1)
- Myocontrol (1)
- NETCONF security (1)
- Nachtsichtgerät (1)
- Natural fibers (1)
- Nature-Inspired Innovation (1)
- Nature-inspired principles (1)
- Naturwissenschaften (1)
- Network Test (1)
- Network topology (1)
- Neurodivergent (1)
- New Product Development (1)
- New product development (1)
- Nickel (1)
- Niedrige Energie (1)
- Nonlinear waves (1)
- Nonlinearity (1)
- Nyquist-Shannon (1)
- OT security (1)
- Oberfläche (1)
- Object-Based Services (1)
- Octave Convolution (1)
- Onboarding (1)
- Online Magazine (1)
- Online Studies (1)
- Online simulation (1)
- Ontology (1)
- Ontology-based Classification (1)
- Optimierung (1)
- Optimization (1)
- Optimization with Digital Twins (1)
- Optische Zeichenerkennung (1)
- Oxidation (1)
- PCB-printing (1)
- PI control (1)
- PROFINET IO (1)
- PROFINET Security (1)
- PV Applications (1)
- PV Applications, Smart PV, PV Battery Systems, PV Power Supplies (1)
- PV Module (1)
- Parallelization (1)
- Parameter Estimation (1)
- Parameter estimation (1)
- Particle emissions (1)
- Pattern Recognition (1)
- Peak shaving (1)
- Peer to peer computing (1)
- Peer to peer network (1)
- Performance (1)
- Performance evaluation (1)
- Periodic Table of AI (1)
- Permanent magnet machines (1)
- Phontonik (1)
- Photography (1)
- Photonics (1)
- Photovoltaic (1)
- Photovoltaik (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Physik (1)
- Physiotherapy (1)
- Plant commissioning (1)
- Planung (1)
- Plastic Sheet (1)
- Plasticity model (1)
- Poisoning (1)
- Polarization (1)
- PolyJet Modelling (1)
- Polymere (1)
- Power Loss (1)
- Predictions (1)
- Predictive Models (1)
- Preis (1)
- Printing parameters (1)
- Problemlösen (1)
- Process design (1)
- Process innovation (1)
- Process intensification (1)
- Processing (1)
- Product Design (1)
- Produktentwicklung (1)
- Programmierung (1)
- Propagation losses (1)
- Prosthetic control (1)
- Prozessautomation (1)
- Pulse width modulation (1)
- QFD (1)
- Quality Function Deployment (1)
- Qualität (1)
- Quantitative Marketing Research (1)
- Quarter-wave plate (1)
- Quellcode (1)
- RFID (1)
- RPA (1)
- RUL (1)
- Radio frequency (1)
- Radiologie (1)
- Rahmen (1)
- Rails (1)
- Raman-Spektroskopie (1)
- Random call model (1)
- Range imaging RGB-D (1)
- Rapid Prototype (1)
- Rapid Prototyping (1)
- Real-Time Communication (1)
- Real-time (1)
- Realtime simulation (1)
- Recommendation (1)
- Recommendation Techniques (1)
- Recruiting (1)
- Recycling (1)
- Regularization (1)
- Reliability (1)
- Renewable Energy Markets (1)
- Representation Learning (1)
- ResNet (1)
- Reynolds-Zahl (1)
- Risikobewertung (1)
- Risk Assessment (1)
- Road-Quality Prediction (1)
- Robot Applications (1)
- Robot vision systems (1)
- Robotic Process Automation (1)
- Robotic Soccer (1)
- Robotik (1)
- Robots (1)
- Rohrbiegen (1)
- Rohrleitung (1)
- Rotors (1)
- Routing (1)
- Russian Ukrainian war (1)
- SAW-Bauelement (1)
- Safe Speed and Separation Monitoring. (1)
- Sampling (1)
- Scanner (1)
- Second-order Optimization (1)
- Security Engineering (1)
- Segmentierung (1)
- Selective Laser Sinter (1)
- Self-Calibration (1)
- Semiconductor Device (1)
- Semiconductor device measurement (1)
- Sensing Element (1)
- Sensor phenomena and characterization (1)
- Sensors (1)
- Sensortechniik (1)
- Separation Monitoring (1)
- Service Specification (1)
- Servqual (1)
- Session Initiation Protocol (1)
- Sicherheitstechnik (1)
- Signal averaging ECG (1)
- Signaltechnik (1)
- Sintering (1)
- Smart Energy Metering (1)
- Smart Grid Operation (1)
- Smart Grids (1)
- Smart Materials (1)
- Smart PV (1)
- Smart grids (1)
- Smart wearables (1)
- Smart-UPS (1)
- SmartMAC (1)
- Social Interaction (1)
- Social Isolation (1)
- Social Media (1)
- Social isolation (1)
- Soft Robot (1)
- Software Robot (1)
- Software Security (1)
- Software algorithms (1)
- Software for measurements (1)
- Software-Engineering (1)
- Software-Qualitätssicherung (1)
- Software-Sicherheit (1)
- Software-Testautomatisierung (1)
- Software-Tool (1)
- Solar Radiation (1)
- Solitary waves (1)
- Spectral-temporal mapping (1)
- Spektralanalyse (1)
- Spektroskopie (1)
- Spektrum (1)
- Stahlband (1)
- Stahlrohr (1)
- Strahl (1)
- Streaming Service (1)
- Stromerzeugung (1)
- Stromregelung (1)
- Stromzustandsregler (1)
- Strömungsmechanik (1)
- Strömungsprofil (1)
- Student activities (1)
- Studienanfänger (1)
- Studium (1)
- Subspace Clustering (1)
- Subspace clustering (1)
- Sulphonamides (1)
- Surface acoustic wave (1)
- Surface acoustic waves (1)
- Sustainable (1)
- Sustainable Innovation (1)
- Sustainable product development (1)
- Sustainable technology (1)
- Sweaty (1)
- Synchronisation (1)
- Synchronisierung (1)
- Synchronmaschine (1)
- System (1)
- Systematic innovation (1)
- TLC (1)
- TSN security (1)
- TTCN3 (1)
- Tailored-Strip (1)
- Tailored-Tube (1)
- Target Group Oriented Communication (1)
- Target Group Oriented Design (1)
- Target Path (1)
- Target Vehicle (1)
- Task Analysis (1)
- Technik (1)
- Technische Mechanik (1)
- Temperature sensors (1)
- Temperaturmessung (1)
- Testbed (1)
- Testumgebung (1)
- Textile (1)
- Theory of computation (1)
- Thermische Solaranlage (1)
- Thermomechanik (1)
- Thermomechanische Ermüdung (1)
- Threat Modeling (1)
- Tiefziehen (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- Time series data (1)
- Time-series Classification (1)
- TinyML (1)
- TinyOS (1)
- Torque (1)
- Total Harmonic Distortion (1)
- Touch (1)
- Traceability (1)
- Training (1)
- Transducers (1)
- Transesophageal electrocardiography (1)
- Transfer learning (1)
- Transistor (1)
- Traubenzucker (1)
- Traubenzucker-Brennstoffzelle (1)
- Trigeneration (1)
- Trust management (1)
- Trägheit (1)
- Ultra-Low Energy (1)
- Ultra-Low Power (1)
- Ultraschall (1)
- Ultraweitband (1)
- Umwandlungswirkungsgrad (1)
- Umweltschutz (1)
- Unity Engine (1)
- Unsupervised Conditional Training (1)
- Unsupervised Learning (1)
- Unternehmensführung (1)
- Use Case (1)
- User Acceptance (1)
- User Experience Test (1)
- User behavior (1)
- User generated content (1)
- User interface (1)
- User-generated content (1)
- VRU eSafety (1)
- Variational Autoencoders (1)
- Vehicle safety (1)
- Ventricular tachycardia (1)
- Verfahren (1)
- Verfügbarkeit (1)
- Vergleich (1)
- Verifiability (1)
- Verlassenheit (1)
- Vervielfältigung (1)
- Verwaltung (1)
- Vibrotactile Feedback (1)
- Virtual Research Environment (1)
- Virtual experiments (1)
- Virtual private networks (1)
- Visual Impairments (1)
- Visual programming (1)
- Visual programming languages (1)
- Visualization (1)
- Voice User Experience (1)
- Voice assistants (1)
- Voice user interfaces (1)
- Voxel (1)
- Voxelization (1)
- Wahrscheinlichkeitsrechnung (1)
- Wake-Up Receiver (1)
- Wanddicke (1)
- Wasser (1)
- Wasserstand (1)
- Web service architecture (1)
- Web-Applikation (1)
- Wedge waves (1)
- Welle (1)
- Werkstofffehler (1)
- Wirbelströmung (1)
- Wireless IoT (1)
- Wireless M-Bus (1)
- Wirtschaftswissenschaften (1)
- World Wide Web (1)
- Yolov5 (1)
- Zahlung (1)
- Zelle (1)
- Zenware (1)
- Zugbeanspruchung (1)
- Zusatzstoff (1)
- Zwischenmodulation (1)
- accuracy (1)
- acoustic phonons (1)
- adversarial (1)
- adversarial attacks (1)
- adversarial detection (1)
- agent (1)
- agent based systems (1)
- akustisches Bauelement (1)
- anisotropy (1)
- approximate histograms (1)
- approximation (1)
- attribute manipulation (1)
- autoML (1)
- autonomous systems (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- bio-inspired models (1)
- biocompatibility test (1)
- biodegradable (1)
- biologische Brennstoffzelle (1)
- biomaterials (1)
- biomimetics (1)
- building energy model (1)
- building management systems (1)
- business applications (1)
- camera-based navigation (1)
- cantilever (1)
- car2x networks (1)
- carbon fiber (1)
- cellular radio (1)
- cifar (1)
- climate (1)
- cloud (1)
- cloud computing (1)
- cloud security (1)
- cluster (1)
- collaborative learning (1)
- color vision (1)
- computer network management (1)
- content formatting (1)
- content synchronization (1)
- correlation (1)
- crack growth simulation (1)
- credentials (1)
- cross-industry innovation (1)
- crossbar (1)
- curb (1)
- curricular concepts (1)
- curriculum learning (1)
- cyclic plasticity (1)
- data aggregation (1)
- data architecture (1)
- data migration (1)
- data model (1)
- data replication (1)
- deep reinforcement learning (1)
- defense (1)
- degradation stages (1)
- design education (1)
- detection (1)
- device detection (1)
- device independency (1)
- dictionary passing (1)
- differential mode-delay (1)
- digital games (1)
- digital library (1)
- display technologies (1)
- distributed computing (1)
- distributed systems (1)
- dynamic hyperlinks (1)
- e-Mobilität (1)
- eingebettete Datenverarbeitung (1)
- eingebettetes Gerät (1)
- electrolyte-gated transistors (1)
- embedded systems (1)
- emulation (1)
- energy consumption (1)
- energy efficiency (1)
- equivalent circuit model (1)
- ethical frameworks (1)
- evaluation (1)
- exchange magnons (1)
- face editing (1)
- face recognition (1)
- fail-operational (1)
- ferromagnetic resonance (1)
- fingerprinting (1)
- flexible job shop (1)
- footwear (1)
- force controlled robot (1)
- fourier (1)
- gan (1)
- generalized content (1)
- generation Y (1)
- generation Z (1)
- generative adversarial networks (1)
- genetic algorithms (1)
- glass (1)
- glazing systems (1)
- grey-box model (1)
- ground penetrating radar (1)
- guided waves (1)
- gyroscope (1)
- hair (1)
- hardness (1)
- heat pump (1)
- heating and cooling (1)
- height estimation (1)
- high performance (1)
- home automation (1)
- hot work tool steel (1)
- humanoid robot walking (1)
- hybrid systems (1)
- identification (1)
- image color analysis (1)
- imagenet (1)
- implantierbares System (1)
- industrial Ethernet (1)
- industrial IoT (1)
- industrial communication (1)
- industry (1)
- inertial measurement unit (1)
- inertiales Navigationssystem (1)
- information network (1)
- innovation management (1)
- insoles (1)
- interconnected data (1)
- irrigation (1)
- joint torque sensors (1)
- kabellos (1)
- kanal (1)
- kinetic (1)
- konstitutive Gleichung (1)
- language learning (1)
- laser material processing (1)
- laser triangulation (1)
- learning scenario (1)
- lid (1)
- lithium-ion battery (1)
- load profiles (1)
- local electricity markets (1)
- localization (1)
- low power wireless (1)
- m-learning (1)
- machine-to-machine communication (1)
- magnetization dynamics (1)
- magneto-acoustics (1)
- magnetoactive smart materials (1)
- magnetresponsive Werkstoffe (1)
- mahalanobis (1)
- maintenance scheduling (1)
- masked Stereolithography (1)
- master data (1)
- measurement (1)
- media technology (1)
- media tyechnolog (1)
- mehrachsige Spannung (1)
- mental health apps (1)
- message complexity (1)
- metal oxide transistor (1)
- metatarsals (1)
- metaverse (1)
- middleware (1)
- mikroelektromechanisches System (1)
- millimeter-wave (1)
- mobile app (1)
- mobile applications (1)
- mobile learning (1)
- model driven design (1)
- model-predictive control (1)
- molybdenum (1)
- multi-material (1)
- multidimensional flashcard (1)
- multimode fibre (1)
- multimode fibre connectors (1)
- multipath (1)
- mutual authentication (1)
- neural architecture search (1)
- neural ordinary differential equations (1)
- new product development (1)
- noise measurement (1)
- non interfering measurements (1)
- nonlinearity (1)
- nose (1)
- numerische Simulation (1)
- offensive security techniques (1)
- optical on-line/in-line measurements (1)
- optimization (1)
- orthosis (1)
- overuse (1)
- overuse injury (1)
- parking (1)
- particle coarsening (1)
- pattern recognition (1)
- peer to peer network (1)
- peer-to-peer energy trading (1)
- perception (1)
- performance (1)
- physical unclonable function (1)
- physically unclonable function (PUF) (1)
- pigment paste (1)
- powder filled gripper (1)
- power distribution (1)
- predictive maintenance (1)
- presentation skills (1)
- prevention (1)
- primary authentication (1)
- printed Antennas (1)
- printing technologies (1)
- privacy (1)
- programming languages (1)
- project-based learning (1)
- pruning (1)
- quality function deployment (QFD) (1)
- radio networks (1)
- railway system (1)
- random call model (1)
- real time (1)
- reference data (1)
- rekeying (1)
- reliability (1)
- remanufacturing (1)
- repeatability (1)
- resource efficiency (1)
- risk factor (1)
- robot (1)
- robotics (1)
- scanning electron microscope (SEM) (1)
- scheduling (1)
- secondary surveillance radar (1)
- secure communication (1)
- self-organizing networks (1)
- sensor network (1)
- sensor node (1)
- service engineering (1)
- service research (1)
- simulation (1)
- skin cancer (1)
- skin cancer detection (1)
- slope (1)
- smart grid (1)
- smart materials (1)
- smart metering (1)
- software defined radio (1)
- softwaregenerierter Code (1)
- solar module (1)
- soliton (1)
- sparse backpropagation (1)
- spatial imagination (1)
- spectral defense (1)
- spectraldefense (1)
- statistical methods, ROS (1)
- stochastic computing (1)
- style (1)
- style transfer (1)
- subsystem design (1)
- surface treatment (1)
- synthetical profiles (1)
- system authenticity (1)
- taxonomy (1)
- teaching and learning culture (1)
- technical drawings (1)
- telecommunication equipment testing (1)
- temperature dependency (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- time series data (1)
- transmit beamforming (1)
- ultrafast laser interaction with materials (1)
- vacuum (1)
- vibration (1)
- vibration harvester (1)
- virtual experiments (1)
- virtual worlds (1)
- walking (1)
- wedge wave (1)
- wide area networks (1)
- wireless comunication (1)
- wireless sensor (1)
- wireless sensor networks (1)
- Ältere (1)
- Ökologie (1)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (212)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (169)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (130)
- Fakultät Wirtschaft (W) (125)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (109)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (90)
- IMLA - Institute for Machine Learning and Analytics (44)
- INES - Institut für nachhaltige Energiesysteme (40)
- ACI - Affective and Cognitive Institute (39)
- Fakultät Medien (M) (ab 22.04.2021) (30)
Open Access
- Closed Access (325)
- Open Access (234)
- Closed (167)
- Bronze (48)
- Diamond (21)
- Grün (11)
- Gold (6)
- Hybrid (6)
RETIS – Real-Time Sensitive Wireless Communication Solution for Industrial Control Applications
(2020)
Ultra-Reliable Low Latency Communications (URLLC) has been always a vital component of many industrial applications. The paper proposes a new wireless URLLC solution called RETIS, which is suitable for factory automation and fast process control applications, where low latency, low jitter, and high data exchange rates are mandatory. In the paper, we describe the communication protocol as well as the hardware structure of the network nodes for implementing the required functionality. Many techniques enabling fast, reliable wireless transmissions are used – short Transmission Time Interval (TTI), Time-Division Multiple Access (TDMA), MIMO, optional duplicated data transfer, Forward Error Correction (FEC), ACK mechanism. Preliminary tests show that reliable end-to-end latency down to 350 μs and packet exchange rate up to 4 kHz can be reached (using quadruple MIMO and standard IEEE 802.15.4 PHY at 250 kbit/s).
The ability to detect a signal masked by noise is improved in normal-hearing (NH) listeners when interaural phase differences (IPD) between the ear signals exist either in the masker or the signal. We determined the impact of different coding strategies in bilaterally implanted cochlear implant (BiCI) users with and without fine-structure coding (FSC) on masking level differences. First, binaural intelligibility level differences (BILD) were determined in NH listeners and BiCI users using their clinical speech processors. NH subjects (n=8) showed a significant mean BILD of 7.5 dB. In contrast, BiCI users (n=9) without FSC as well as with FSC revealed a barely significant mean BILD (0.4 dB respectively 0.6 dB). Second, IPD thresholds were measured in BiCI users using either their speech processors with FS4 or direct stimulation with FSC. With the latter approach, synchronized stimulation providing an interaural accuracy of stimulation timing of 1.67 µs was realized on pitch matched electrode pairs. The resulting individual IPD threshold was lower in most of the subjects with direct stimulation than with their speech processors. These outcomes indicate that some BiCI users can benefit from increased temporal precision of interaural FSC and adjusted interaural frequency-place mapping presumably resulting in improved BILD.
Learning programming fundamentals is considered as one of the most challenging and complex learning activities. Some authors have proposed visual programming language (VPL) approaches to address part of the inherent complexity [1]. A visual programming language lets users develop programs by combining program elements, like loops graphically rather than by specifying them textually. Visual expressions, spatial arrangements of text and graphic symbols are used either as syntax elements or secondary notation. VPLs are normally used for educational multimedia, video games, system development, and data warehousing/business analytics purposes. For example, Scratch, a platform of Massachusetts Institute of Technology, is designed for kids and after school programs.
Design of mobile software applications is considered as one of the most challenging application domains due to the build in sensors as part of a mobile device, like GPS, camera or Near Field Communication (NFC). Sensors enable creation of context-aware mobile applications in which applications can discover and take advantage of contextual information, such as user location, nearby people and objects, and the current user activity. As a consequence, context-aware mobile applications can sense clues about the situational environment making mobile devices more intelligent, adaptive, and personalized. Such context aware mobile applications seem to be motivating and attractive case studies, especially for programming beginners (“my own first app”).
In this work, we introduce a use-case centered approach as well as clear separation of user interface design and sensor-based program development. We provide an in-depth discussion of a new VPL based teaching method, a step by step development process to enable programming beginners the creation of context aware mobile applications. Finally, we argue that addressing challenges for programming beginners by our teaching approach could make programming teaching more motivating, with an additional impact on the final software quality and scalability.
The key contributions of our study are the following:
- An overview of existing attempts to use VPL approaches for mobile applications
- A use case centered teaching approach based on a clear separation of user interface design and sensor-based program development
- A teaching case study enabling beginners a step by step creation of context-aware mobile applications based on the MIT App Inventor (a platform of Massachusetts Institute of Technology)
- Open research challenges and perspectives for further development of our teaching approach
References:
[1] Idrees, M., Aslam, F. (2022). A Comprehensive Survey and Analysis of Diverse Visual Programming Languages, VFAST Transactions on Software Engineering, 2022, Volume 10, Number 2, pp 47-60.
In this paper we suggest to combine the areas of media streaming services, mobile devices, and manufacturing processes to support monitoring, controlling and supervising production processes in order to achieve high levels of efficiency and environmentally friendly production. It contains a comprehensive and detailed explanation of the proposed E-Learning streaming framework, especially the adaption of streaming services to mobile environments. The key components of our approach are 1) an XML-based streaming service specification language, 2) adaption of multimedia E-Learning services to mobile environments, and 3) a media delivery platform for searching, registration, and creation of streaming services for mobile devices.
Integrating voice / video communication into business processes can accelerate resolution time, reduce mistakes, and establish a full audit-trail of the interactions. Some VoIP service providers offer website based or plugin based solutions, which are, however, difficult to integrate with other applications. A promising approach to overcome these disadvantages is the development of appropriate Web Services to allow applications interacting with a VoIP system. We propose a generic framework for VoIP applications consisting of an XML-based service specification language and a set of reusable Web Service components. Service providers using the proposed service-oriented architecture can offer to their customers a protocol-neutral Web Service interface, thus enabling the deployment of a general and integrated VoIP solution.
The goal of eLearning services integration in manufacturing is, through the development of new multimedia solutions, to accelerate and enhance the ability of the manufacturing industry to capitalise on the emergence of a powerful global information infrastructure. The key components of our approach are: (1) an XML based streaming service specification language; (2) automatic configuration of distributed eLearning streaming service implementations; (3) a set of Web services for searching, registration, and creation of streaming services; (4) caching and replication policies based on timing information derived from the service specifications. We also introduce a new concept for cache management during runtime, e.g., content is distributed to cache servers located at the edge of a network close to the client.
This paper presents an approach where closer integration between learning and work is achieved by integrating multimedia services into manufacturing processes. The goal of E-Learning services integration in manufacturing processes is, through the development of new multimedia services, to accelerate and enhance the ability of manufacturing industry to capitalise on the emergence of a powerful global information infrastructure. In this paper we suggest to combine the areas of media streaming services and manufacturing processes, by providing electronic learning offerings as collections of media streaming services. The key components of our approach are 1) an xml based streaming service specification language, 2) automated configuration of distributed E-Learning streaming applications, 3) Web Services for searching, registration, and creation of E-Learning streaming services.
Most E-Learning projects tend to separate learning activities from everyday work. This paper presents an approach where closer integration between learning and work is achieved by integrating multimedia services into manufacturing processes. The goal of E-Learning services integration in manufacturing is, through the development of new multimedia solutions, to accelerate and enhance the ability of manufacturing industry to capitalise on the emergence of a powerful global information infrastructure. In this paper we suggest to combine the areas of media streaming services and manufacturing processes, by providing electronic learning offerings as collections of media streaming services. The key components of our approach are 1) an xml based streaming service specification language, 2) automated configuration of distributed E-Learning streaming applications, 3) web services for searching, registration, and creation of E-Learning streaming services.
We propose a new streaming media service development environment comprising of a streaming media service model, a XML based service specification language and several implementation and configuration management tools. In our project, the described approach is used for integration of streaming based eLearning services in manufacturing processes of a subcontractor to the automotive industry. The key components of our approach are 1) an xml based streaming service specification language, 2) a set of web services for searching, registration, and creation of streaming services, 3) caching and replication policies based on timing information derived from the service specifications.
In this paper, we propose a new streaming media service development environment comprising of a streaming media service model, a XML based service specification language and several implementation and configuration management tools. Our approach is based on a high level streaming service specification language, which allows specifying a service in terms of media objects, QoS, and distribution policies. Driven by such a streaming service specification and a streaming component library implemented with Java Media Framework, the required distributed application infrastructure is generated automatically by a service manager. To support flexible instantiation and termination of services as well as change management during runtime, e.g. migration or substitution of streaming components, we introduce instantiation and termination rules, and reconfiguration rules.
Visual programming languages (VPL) let users develop software programs by combining visual program elements, like lists of objects, loops or conditional statements rather than by specifying them textually.
Humanoid robots programming is a very attractive and motivating application domain for students, especially for programming beginners. Humanoid robots are constructed in such a way that they mimic the human body by using actuators that perform like muscles. Typically, a humanoid robot consists of sensors and actuators, i.e. torso, a head, two arms, and two legs, though some humanoid robots may replicate only part of the body, for example, from the waist up. In some cases, humanoid robots are equipped with heads designed to replicate additional human facial features such as eyes. Additional sensors are needed by a robot to gather information about the conditions of the environment to allow the robot to make necessary decisions about its position or certain actions that the situation requires, e.g. an arm movement or an open/close hand action. Other examples for sensor are reflective infrared sensors used to detect objects in proximity.
In this work, we introduce a use-case centered approach based on sensors and actors of a robot and a workflow model to visually describe the sequence of actions including conditional actions or concurrent actions. We provide an in-depth discussion of a new VPL based teaching method for programming humanoid robots based on VPLs. Open research challenges, limits and perspectives for further development of our teaching approach are discussed as well.
The main advantage of mobile context-aware applications is to provide effective and tailored services by considering the environmental context, such as location, time, nearby objects and other data, and adapting their functionality according to the changing situations in the context information without explicit user interaction. The idea behind Location-Based Services (LBS) and Object-Based Services (OBS) is to offer fully-customizable services for user needs according to the location or the objects in a mobile user's vicinity. However, developing mobile context-aware software applications is considered as one of the most challenging application domains due to the built-in sensors as part of a mobile device. Visual Programming Languages (VPL) and hybrid visual programming languages are considered to be innovative approaches to address the inherent complexity of developing programs. The key contribution of our new development approach for location and object-based mobile applications is a use case driven development approach based on use case templates and visual code templates to enable even programming beginners to create context-aware mobile applications. An example of the use of the development approach is presented and open research challenges and perspectives for further development of our approach are formulated.
Sensors and actuators enable creation of context-aware applications in which applications can discover and take advantage of contextual information, such as user location, nearby people and objects. In this work, we use a general context definition, which can be applied to various devices, e.g., robots and mobile devices. Developing context-based software applications is considered as one of the most challenging application domains due to the sensors and actuators as part of a device. We introduce a new development approach for context-based applications by using use-case descriptions and Visual Programming Languages (VPL). The introduction of web-based VPLs, such as Scratch and Snap, has reinvigorated the usefulness of VPLs. We provide an in-depth discussion of our new VPL based method, a step by step development process to enable development of context-based applications. Two case studies illustrate how to apply our approach to different problem domains: Context-based mobile apps and context-based humanoid robot applications.
Novel manufacturing technologies, such as printed electronics, may enable future applications for the Internet of Everything like large-area sensor devices, disposable security, and identification tags. Printed physically unclonable functions (PUFs) are promising candidates to be embedded as hardware security keys into lightweight identification devices. We investigate hybrid PUFs based on a printed PUF core. The statistics on the intra- and inter-hamming distance distributions indicate a performance suitable for identification purposes. Our evaluations are based on statistical simulations of the PUF core circuit and the thereof generated challenge-response pairs. The analysis shows that hardware-intrinsic security features can be realized with printed lightweight devices.
Uncontrollable manufacturing variations in electrical hardware circuits can be exploited as Physical Unclonable Functions (PUFs). Herein, we present a Printed Electronics (PE)-based PUF system architecture. Our proposed Differential Circuit PUF (DiffC-PUF) is a hybrid system, combining silicon-based and PE-based electronic circuits. The novel approach of the DiffC-PUF architecture is to provide a specially designed real hardware system architecture, that enables the automatic readout of interchangeable printed DiffC-PUF core circuits. The silicon-based addressing and evaluation circuit supplies and controls the printed PUF core and ensures seamless integration into silicon-based smart systems. Major objectives of our work are interconnected applications for the Internet of Things (IoT).
In this paper a practical way for fatigue life prediction of rubber products under multiaxial loads is shown. This is done by means of fracture mechanical concepts and the energy release rate as the failure criterion. Due to a FEA post-processor the potential energy release rate might be calculated at every material point supposed there was a crack. And therefore the risk of failure and with the help of a strain number curve the time to fatigue is able to be calculated by FEA. This concept is applied for an estimation of the life time of a test specimen with tensile loading from fatigue data of a shear loaded specimen of different design. This rather more theoretical concept of the energy release rate is complemented by experimental crack growth data by a Tear Fatigue Analyzer with its great advantage of reduction of testing time and costs compared to those of fatigue tests. For some materials a thorough characterization of crack growth and fatigue behavior is presented and is applied to estimate the time to fatigue by FEA for a real component under multiaxial loads.
There are additional long-term effects which also change the micro-structure of the polymer network and consequently the effective number of polymer chains in the material. These effects are summarized by ageing processes and will be used in the following to explain the basic assumptions of the model which can be generalized to simulate the viscous behaviour of the material. An implementation of these concepts into FEM codes is straightforward and has been carried out to the solver ABAQUS, Baaser & Ziegler (2006), Baaser et al. (2009).
Narrowband Internet-of-Things (NB-IoT) is a 3rd generation partnership project (3GPP) standardized cellular technology, adopted for 5G and optimized for massive Machine Type Communication (mMTC). Applications are anticipated around infrastructure monitoring, asset management, smart city and smart energy applications. In this paper, we evaluate the suitability of NB-IoT for private (campus) networks in industrial environments, including complex cloud-based applications around process automation. An end-to-end system has been developed, comprising of a sensor unit connected to a NB-IoT modem, a base station (gNodeB) equipped with a beamforming array and a local (private) network architecture comprising a sensor management system in the edge cloud. The experimental study includes field tests in realistic industrial environments with latency, reliability and coverage measurements. The results show a good suitability of NB-IoT for process automation with high scalability, low-power requirements and moderate latency requirements.
Remote code attestation protocols are an essential building block to offer a reasonable system security for wireless embedded devices. In the work at hand we investigate in detail the trustability of a purely software-based remote code attestation based inference mechanism over the wireless when e.g. running the prominent protocol derivate SoftWare-based ATTestation for Embedded Devices (SWATT). Besides the disclosure of pitfalls of such a protocol class we also point out good parameter choices which allow at least a meaningful plausibility check with a balanced false positive and false negative ratio.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
Digital, virtual environments and the metaverse are rapidly taking shape and will generate disruptive changes in the areas of ethics, privacy, safety, and how the relationships between human beings will be developed. To uncover some of some of the implications that will impact those areas, this study investigates the perceptions of 101 younger people from the generations Y and Z. We present a first exploratory analysis of the findings, focusing on knowledge and self-perception. Results show that these young generations are seriously doubting their knowledge on the metaverse and virtual worlds – regarding both the definition and the usage. It is interesting to see only a medium confidence level, considering that the participants are young and from an academic environment, which should increase their interest in and the affinity towards virtual worlds. Males from both generations perceive themselves as significantly more knowledgeable than females. Regarding a fitting definition, almost 40% agreed on the metaverse as a “universal and immersive virtual world that is made accessible using virtual reality and augmented reality technologies”. Regarding the topic in general, several participants (almost 40%) considered themselves sceptics or “just” users (38%). Interestingly, generation Y participants were more likely than the younger generation Z participants to identify themselves as early adopters or innovators. In result, the considerable amount of “mixed feelings” regarding digital, virtual environments and the metaverse shows that in-depth studies on the perception of the metaverse as well as its ethical and integrity implications are required to create more accessible, inclusive, safe, and inclusive digital, virtual environments.
The importance of obtaining simultaneous particle size and concentration values has grown up with continuing discussion of the health effects, of internal combustion engine generated particulate emissions and in particular of Diesel soot emissions. In the present work an aerosol measurement system is described that delivers information about particle size and concentration directly from the undiluted exhaust gas.
Using three laser diodes of different wavelengths which form one parallel light beam, each spectral attenuation is analysed by a single detector and the particle diameter and concentration is evaluated by the use of the Mie theory and shown on-line at a frequency of 1 Hz. The system includes an optical long-path-cell (White principle) with an adjustable path length from 2.5 to 15 m, which allows the analysis within a broad concentration range.
On-line measurements of the particulate emissions in the hot, undiluted exhaust of Diesel engines are presented under stationary and transient engine’s load conditions. Mean particle diameters well below 100 nm are detected for modern Diesel engines. The measured particle concentration corresponds excellently with the traditional gravimetrical measurements of the diluted exhaust. Additionally, measurements of particle emissions (mostly condensed hydricarbons) from a two-stroke engine are presented and discussed.
A system for the on-line/in-line measurement of soot particle sizes and concentrations in the undiluted exhaust gas of diesel engines was developed and successfully tested. The unit uses the individual attenuations of three different laser wavelengths and is combined with an optical cell (white principle) with adjustable path lengths from 2.5 to 15 meters.
The development of Internet of Things (IoT) embedded devices is proliferating, especially in the smart home automation system. However, the devices unfortunately are imposing overhead on the IoT network. Thus, the Internet Engineering Task Force (IETF) have introduced the IPv6 Low-Power Wireless Personal Area Network (6LoWPAN) to provide a solution to this constraint. 6LoWPAN is an Internet Protocol (IP) based communication where it allows each device to connect to the Internet directly. As a result, the power consumption is reduced. However, the limitation of data transmission frame size of the IPv6 Routing Protocol for Low-power and Lossy Network’s (RPL’s) had made it to be the running overhead, and thus consequently degrades the performance of the network in terms of Quality of Service (QoS), especially in a large network. Therefore, HRPL was developed to enhance the RPL protocol to minimize redundant retransmission that causes the routing overhead. We introduced the T-Cut Off Delay to set the limit of the delay and the H field to respond to actions taken within the T-Cut Off Delay. Thus, this paper presents the comparison performance assessment of HRPL between simulation and real-world scenarios (6LoWPAN Smart Home System (6LoSH) testbed) in validating the HRPL functionalities. Our results show that HRPL had successfully reduced the routing overhead when implemented in 6LoSH. The observed Control Traffic Overhead (CTO) packet difference between each experiment is 7.1%, and the convergence time is 9.3%. Further research is recommended to be conducted for these metrics: latency, Packet Delivery Ratio (PDR), and throughput.
The Internet of Things (IoT) application has becoming progressively in-demand, most notably for the embedded devices (ED). However, each device has its own difference in computational capabilities, memory usage, and energy resources in connecting to the Internet by using Wireless Sensor Networks (WSNs). In order for this to be achievable, the WSNs that form the bulk of the IoT implementation requires a new set of technologies and protocol that would have a defined area, in which it addresses. Thus, IPv6 Low Power Area Network (6LoWPAN) was designed by the Internet Engineering Task Force (IETF) as a standard network for ED. Nevertheless, the communication between ED and 6LoWPAN requires appropriate routing protocols for it to achieve the efficient Quality of Service (QoS). Among the protocols of 6LoWPAN network, RPL is considered to be the best protocol, however its Energy Consumption (EC) and Routing Overhead (RO) is considerably high when it is implemented in a large network. Therefore, this paper would propose the HRPL to enchance the RPL protocol in reducing the EC and RO. In this study, the researchers would present the performance of RPL and HRPL in terms of EC, Control traffic Overhead (CTO) and latency based on the simulation of the 6LoWPAN network in fixed environment using COOJA simulator. The results show HRPL protocol achieves better performance in all the tested topology in terms of EC and CTO. However, the latency of HRPL only improves in chain topology compared with RPL. We found that further research is required to study the relationship between the latency and the load of packet transmission in order to optimize the EC usage.
In the last decade, IPv6 over Low power Wireless Personal Area Networks (IEEE802.15.4), also known as 6LoWPAN, has well evolved as a primary contender for short range wireless communications and holds the promise of an Internet of Things, which is completely based on the Internet Protocol. The authors' team has developed a 6LoWPAN protocol stack in C language, the stack without the necessity to use a specific design environment or operating system. It is highly flexible, modular, and portable and can be enhanced by several interesting modules, like a Wake-On-Radio-(WOR) MAC layer or a TLS1.2 based security sublayer. The stack is made available as open source at https://github.com/hso-esk/emb6. It was extensively tested on the Automated Physical Testbed (APTB) for Wireless Systems, which is available in the authors' lab and allows a flexible setup and full control of arbitrary topologies. The results of the measurements demonstrate a very good stability and short-term with long-term performance also under dynamic conditions.
The overview of public key infrastructure based security approaches for vehicular communications
(2015)
Modern transport infrastructure becomes a full member of globally connected network. Leading vehicle manufacturers have already triggered development process, output of which will open a new horizon of possibilities for consumers and developers by providing a new communication entity - a car, thus enabling Car2X communications. Nevertheless some of available systems already provide certain possibilities for vehicles to communicate, most of them are considered not sufficiently secured. During last 15 years a number of big research projects funded by European Union and USA governments were started and concluded after which a set of standards were published prescribing a common architecture for Car2X and vehicles onboard communications. This work concentrates on combining inner and outer vehicular communications together with a use of Public Key Infrastructure (PKI).
Wireless communication systems more and more become part of our daily live. Especially with the Internet of Things (IoT) the overall connectivity increases rapidly since everyday objects become part of the global network. For this purpose several new wireless protocols have arisen, whereas 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks) can be seen as one of the most important protocols within this sector. Originally designed on top of the IEEE802.15.4 standard it is a subject to various adaptions that will allow to use 6LoWPAN over different technologies; e.g. DECT Ultra Low Energy (ULE). Although this high connectivity offers a lot of new possibilities, there are several requirements and pitfalls coming along with such new systems. With an increasing number of connected devices the interoperability between different providers is one of the biggest challenges, which makes it necessary to verify the functionality and stability of the devices and the network. Therefore testing becomes one of the key components that decides on success or failure of such a system. Although there are several protocol implementations commonly available; e.g., for IoT based systems, there is still a lack of according tools and environments as well as for functional and conformance testing. This article describes the architecture and functioning of the proposed test framework based on Testing and Test Control Notation Version 3 (TTCN-3) for 6LoWPAN over ULE networks.
Extended Performance Measurements of Scalable 6LoWPAN Networks in an Automated Physical Testbed
(2015)
IPv6 over Low power Wireless Personal Area Networks, also known as 6LoWPAN, is becoming more and more a de facto standard for such communications for the Internet of Things, be it in the field of home and building automation, of industrial and process automation, or of smart metering and environmental monitoring. For all of these applications, scalability is a major precondition, as the complexity of the networks continuously increase. To maintain this growing amount of connected nodes a various 6LoWPAN implementations are available. One of the mentioned was developed by the authors' team and was tested on an Automated Physical Testbed for Wireless Systems at the Laboratory Embedded Systems and Communication Electronics of Offenburg University of Applied Sciences, which allows the flexible setup and full control of arbitrary topologies. It also supports time-varying topologies and thus helps to measure performance of the RPL implementation. The results of the measurements prove an excellent stability and a very good short and long-term performance also under dynamic conditions. In all measurements, there is an advantage of minimum 10% with regard to the average times, like global repair time; but the advantage with reagr to average values can reach up to 30%. Moreover, it can be proven that the performance predictions from other papers are consistent with the executed real-life implementations.
In the last decade, IPv6 over Low power Wireless Personal Area Networks, also known as 6LoWPAN, has well evolved as a primary contender for short range wireless communication and holds the promise of an Internet of Things, which is completely based on the Internet Protocol. In the meantime, various 6LoWPAN implementations are available, be it open source or commercial. One of these implementations, which was developed by the authors' team, was tested on an Automated Physical Testbed for Wireless Systems at the Laboratory Embedded Systems and Communication Electronics of Offenburg University of Applied Sciences, which allows the flexible setup and full control of arbitrary topologies. It also supports time-varying topologies and thus helps to measure performance of the RPL implementation. The results of the measurements show a very good stability and short-term and long-term performance also under dynamic conditions. In addition, it can be proven that the performance predictions from other papers are consistent with real-life implementations.
The CAN bus still is an important fieldbus in various domains, e.g. for in-car communication or automation applications. To counter security threats and concerns in such scenarios we design, implement, and evaluate the use of an end-to-end security concept based on the Transport Layer Security protocol. It is used to establish authenticated, integrity-checked, and confidential communication channels between field devices connected via CAN. Our performance measurements show that it is possible to use TLS at least for non time-critical applications, as well as for generic embedded networks.
Practical exercises are a crucial part of many curricula. Even simple exercises can improve the understanding of the underlying subject. Most experimental setups require special hardware. To carry out e. g. a lens experiments the students need access to an optical bench, various lenses, light sources, apertures and a screen. In our previous publication we demonstrated the use of augmented reality visualization techniques in order to let the students prepare with a simulated experimental setup. Within the context of our intended blended learning concept we want to utilize augmented or virtual reality techniques for stationary laboratory exercises. Unlike applications running on mobile devices, stationary setups can be extended more easily with additional interfaces and thus allow for more complex interactions and simulations in virtual reality (VR) and augmented reality (AR). The most significant difference is the possibility to allow interactions beyond touching a screen. The LEAP Motion controller is a small inexpensive device that allows for the tracking of the user’s hands and fingers in three dimensions. It is conceivable to allow the user to interact with the simulation’s virtual elements by the user’s very hand position, movement and gesture. In this paper we evaluate possible applications of the LEAP Motion controller for simulated experiments in augmented and virtual reality. We pay particular attention to the devices strengths and weaknesses and want to point out useful and less useful application scenarios. © (2016) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
In many scientific studies lens experiments are part of the curriculum. The conducted experiments are meant to give the students a basic understanding for the laws of optics and its applications. Most of the experiments need special hardware like e.g. an optical bench, light sources, apertures and different lens types. Therefore it is not possible for the students to conduct any of the experiments outside of the university’s laboratory. Simple optical software simulators enabling the students to virtually perform lens experiments already exist, but are mostly desktop or web browser based.
Augmented Reality (AR) is a special case of mediated and mixed reality concepts, where computers are used to add, subtract or modify one’s perception of reality. As a result of the success and widespread availability of handheld mobile devices, like e.g. tablet computers and smartphones, mobile augmented reality applications are easy to use. Augmented reality can be easily used to visualize a simulated optical bench. The students can interactively modify properties like e.g. lens type, lens curvature, lens diameter, lens refractive index and the positions of the instruments in space. Light rays can be visualized and promote an additional understanding of the laws of optics. An AR application like this is ideally suited to prepare the actual laboratory sessions and/or recap the teaching content.
The authors will present their experience with handheld augmented reality applications and their possibilities for light and optic experiments without the needs for specialized optical hardware.
Walking interfaces offer advantages in navigation of VE systems over other types of locomotion. However, VR helmets have the disadvantage that users cannot see their immediate surroundings. Our publication describes the prototypical implementation of a virtual environment (VE) system, capable of detecting possible obstacles using an RGB-D sensor. In order to warn users of potential collisions with real objects while they are moving throughout the VE tracking area, we designed 4 different visual warning metaphors: Placeholder, Rubber Band, Color Indicator and Arrow. A small pilot study was carried out in which the participants had to solve a simple task and avoid any arbitrarily placed physical obstacles when crossing the virtual scene. Our results show that the Placeholder metaphor (in this case: trees), compared to the other variants, seems to be best suited for the correct estimation of the position of obstacles and in terms of the ability to evade them.
Activities for rehabilitation and prevention are often lengthy and associated with pain and frustration. Their playful enrichment (hereafter: gamification) can counteract this, resulting in so-called “exergames”. However, in contrast to games designed solely for entertainment, the increased motivation and immersion in gamified training can lead to a reduced perception of pain and thus to health deterioration. Therefore, it is necessary to monitor activities continuously. However, only an AI-based system able to generate autonomous interventions could vacate the therapists’ costly time and allow better training at home. An automated adjustment of the movement training’s difficulty as well as individualized goal setting and control are essential to achieve such autonomy. This article’s contribution is two-fold: (1) We portray the potentials of gamification in the health area. (2) We present a framework for smart rehabilitation and prevention training allowing autonomous, dynamic, and gamified interactions.
The purpose of this study was to describe the effects of running speed and slope on metatarsophalangeal (MTP) joint kinematics. 22 male and female runners underwent 3D motion analysis on an instrumented treadmill at three different speeds (2.5 m/s, 3.0 m/s, 3.5 m/s). At each speed, participants ran at seven slope conditions (downhill: -15%, -10%, -5%, level, and uphill: +5%, +10%, +15%). We found a significant main effect (p < 0.001) of running speed and slope on peak MTP dorsiflexion and a running speed by slope interaction effect (p < 0.001) for peak MTP dorsiflexion velocity. These findings highlight the need to consider running intensity and environmental factors like running surface inclination when considering MTP joint mechanics and technological aids to support runners.
We propose in this work to solve privacy preserving set relations performed by a third party in an outsourced configuration. We argue that solving the disjointness relation based on Bloom filters is a new contribution in particular by having another layer of privacy on the sets cardinality. We propose to compose the set relations in a slightly different way by applying a keyed hash function. Besides discussing the correctness of the set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. We are in particular interested in how having bits overlapping in the Bloom filters impacts the privacy level of our approach. Finally, we present our results with real-world parameters in two concrete scenarios.
Printed circuit boards (PCB) are a foundation of electronical devices in modern society. The fabrication of these boards requires various processes and machines. The utilisation of a robot with multiple tools can shorten the process chain compared to screen printing. In this paper a system is presented, which utilises an industrial six axis robot to manufacture
PCBs. The process flow and conversion process of the Gerber format into robot specific commands is presented. The advantages and challenges applying a robot to print circuits are discussed.
The demand of wireless solutions in industrial applications increases since the early nineties. This trend is not only ongoing, it is further pushed by developments in the area of software stacks like the latest Bluetooth Low Energy Stack. It is also pushed by new chip-designs and powerful and highly integrated electronic hardware. The acceptance of wireless technologies as a possible solution for industrial applications, has overcome the entry barrier [1]. The first step to see wireless as standard for many industrial applications is almost accomplished. Nevertheless there is nearly none acceptance of wireless technology for Safety applications. One highly challenging and demanding requirement is still unsolved: The aspect safety and robustness. Those topics have been addressed in many cases but always in a similar manner. WirelessHART as an example addresses this topic with redundant so called multiple propagation paths and frequency hopping to handle with interferences and loss of network participants. So far the pure peer to peer link is rarely investigated and there are less safety solutions available. One product called LoRa™ can be seen as one possible solution to address this lack of safety within wireless links. This paper focuses on the safety performance evaluation of a modem-chip-design. The use of diverse and redundant wireless technologies like LoRa can lead to an increase acceptance of wireless in safety applications. Many measurements in real industrial application have been carried out to be able to benchmark the new chip in terms of the safety aspects. The content of this research results can help to raise the level of confidence in wireless. In this paper, the term “safety” is used for data transmission reliability.
In safety critical applications wireless technologies are not widely spread. This is mainly due to reliability and latency requirements. In this paper a new wireless architecture is presented which will allow for customizing the latency and reliability for every single participant within the network. The architecture allows for building up a network of inhomogeneous participants with different reliability and latency requirements. The used TDMA scheme with TDD as duplex method is acting gentle on resources. Therefore participants with different processing and energy resources are able to participate.
Established robot manufacturers have developed methods to determine and optimize the accuracy of their robots. These methods vary from robot manufacturers to their competitors. Due to the lack of published data, a comparison of robot performance is difficult. The aim of this article is to find methods to evaluate important characteristics of a robot with an accurate and cost-effective setup. A laser triangulation sensor and geometric referenced spheres were used as a base to compare the robot performance.
Neuromorphic computing systems have demonstrated many advantages for popular classification problems with significantly less computational resources. We present in this paper the design, fabrication and training of a programmable neuromorphic circuit, which is based on printed electrolytegated field-effect transistor (EGFET). Based on printable neuron architecture involving several resistors and one transistor, the proposed circuit can realize multiply-add and activation functions. The functionality of the circuit, i.e. the weights of the neural network, can be set during a post-fabrication step in form of printing resistors to the crossbar. Besides the fabrication of a programmable neuron, we also provide a learning algorithm, tailored to the requirements of the technology and the proposed programmable neuron design, which is verified through simulations. The proposed neuromorphic circuit operates at 5V and occupies 385mm 2 of area.
Printed electronics (PE) offers flexible, extremely low-cost, and on-demand hardware due to its additive manufacturing process, enabling emerging ultra-low-cost applications, including machine learning applications. However, large feature sizes in PE limit the complexity of a machine learning classifier (e.g., a neural network (NN)) in PE. Stochastic computing Neural Networks (SC-NNs) can reduce area in silicon technologies, but still require complex designs due to unique implementation tradeoffs in PE. In this paper, we propose a printed mixed-signal system, which substitutes complex and power-hungry conventional stochastic computing (SC) components by printed analog designs. The printed mixed-signal SC consumes only 35% of power consumption and requires only 25% of area compared to a conventional 4-bit NN implementation. We also show that the proposed mixed-signal SC-NN provides good accuracy for popular neural network classification problems. We consider this work as an important step towards the realization of printed SC-NN hardware for near-sensor-processing.
Battery degradation is a complex physicochemical process that strongly depends on operating conditions and environment. We present a model-based analysis of lithium-ion battery degradation in smart microgrids, in particular, a single-family house and an office tract with photovoltaics generator. We use a multi-scale multi-physics model of a graphite/lithium iron phosphate (LiFePO4, LFP) cell including SEI formation as ageing mechanism. The cell-level model is dynamically coupled to a system-level model consisting of photovoltaics, inverter, power consumption profiles, grid interaction, and energy management system, fed with historic weather data. The behavior of the cell in terms of degradation propensity, performance, state of charge and other internal states is predicted over an annual operation cycle. As result, we have identified a peak in degradation rate during the battery charging process, caused by charging overpotentials. Ageing strongly depends on the load situation, where the predicted annual capacity fade is 1.9 % for the single-family house and only 1.3 % for the office tract.
Ensuring that software applications present their users the most recent version of data is not trivial. Self-adjusting computations are a technique for automatically and efficiently recomputing output data whenever some input changes.
This article describes the software architecture of a large, commercial software system built around a framework for coarse-grained self-adjusting computations in Haskell. It discusses advantages and disadvantages based on longtime experience. The article also presents a demo of the system and explains the API of the framework.
Strings
(2020)
This article presents the currently ongoing development of an audiovisual performance work with the title Strings. This work provides an improvisation setting for a violinist, two laptop performers, and two generative systems. At the core of Strings lies an approach that establishes a strong correlation among all participants by means of a shared physical principle. The physical principle is that of a vibrating string. The article discusses how this principle is used in both natural and simulated forms as main interaction layer between all performers and as natural or generative principle for creating audio and video.
A simple model is introduced that describes the interaction of surface acoustic waves (SAWs) with a 2D periodic array of objects on the surface that give rise to internal resonances. Such objects may be high-aspect ratio structures like micro-pillars fabricated of a material different from that of the substrate. The model allows for an approximate determination of the band structure for the acoustic modes in such systems. Results are presented for the dependence on structural parameters of a total bandgap in the non-radiative regime of a semi-infinite substrate, and it is shown how the frequency and radiation damping of vibrational modes can be determined that are associated with defects in the periodic 2D array.
IPv6 over LoRaWAN™
(2016)
Although short-range wireless communication explicitly targets local and regional applications, range continues to be a highly important issue. The range directly depends on the so-called link budget, which can be increased by the choice of modulation and coding schemes. The recent transceiver generation in particular comes with extensive and flexible support for software-defined radio (SDR). The SX127× family from Semtech Corp. is a member of this device class and promises significant benefits for range, robust performance, and battery lifetime compared to competing technologies. This contribution gives a short overview of the technologies to support Long Range (LoRa™) and the corresponding Layer 2 protocol (LoRaWAN™). It particularly describes the possibility to combine the Internet Protocol, i.e. IPv6, into LoRaWAN™, so that it can be directly integrated into a full-fledged Internet of Things (IoT). The proposed solution, which we name 6LoRaWAN, has been implemented and tested; results of the experiments are also shown in this paper.
Signal detection and bandwidth estimation, also known as channel segmentation or information channel estimation, is a perpetual topic in communication systems. In the field of radio monitoring this issue is extremely challenging, since unforeseeable effects like fading occur accidentally. In addition, most radio monitoring devices normally scan a wide frequency range of several hundred MHz and have to detect a multitude of different signals, varying in signal power, bandwidth and spectral shape. Since narrowband sensing techniques cannot be directly applied, most radio monitoring devices use Nyquist wideband sensing to discover the huge frequency range. In practice, sensing is normally conducted by an FFT sweep spectrum analyzer that delivers the power spectral density (PSD) values to the radio monitoring system. The channel segmentation is the initial step of a comprehensive signal analysis in a radio monitoring system based on the PSD values. In this paper, a novel approach for channel segmentation is presented that is based on a quantization and a histogram evaluation of the measured PSD. It will be shown that only the combination of both evaluations will lead to an successful automatic channel segmentation. The performance of the proposed algorithm is shown in a real radio monitoring szenario.
In an experience economy market competition in software branches is becoming more and more intense. Technical innovations, global retail practices and the multidimensional conception of experiences provide both opportunities and challenges for companies worldwide. Retailers strive for an optimized conversion rate, but poor UX still abound. Particularly Germany-based companies are less evolved in an international comparison of industrialized economies. The value of integrating users in the development process is recognized, but methodologies must carefully be incorporated into existing agile workflows. The goal of this study is to bridge the gaps between internal agency and external client and user interests. The contribution is four-fold: an overview of the current status of customer centricity in the E-Commerce branch of trade is provided (I). Based on this corpus, a methodical framework, aiming to incorporate the experience logic in UX practices within an agile project team, is presented (II). The framework is applied by a single case study - the shop relaunch of a motorbike accessory store (III). Finally, all interest groups (UX, development and project management) are incorporated in the qualitative content analysis (IV).
Wow, You Are Terrible at This!: An Intercultural Study on Virtual Agents Giving Mixed Feedback
(2020)
While the effects of virtual agents in terms of likeability, uncanniness, etc. are well explored, it is unclear how their appearance and the feedback they give affects people's reactions. Is critical feedback from an agent embodied as a mouse or a robot taken less serious than from a human agent? In an intercultural study with 120 participants from Germany and the US, participants had to find hidden objects in a game and received feedback on their performance by virtual agents with different appearances. As some levels were designed to be unsolvable, critical feedback was unavoidable. We hypothesized that feedback would be taken more serious, the more human the agent looked. Also, we expected the subjects from the US to react more sensitively to criticism. Surprisingly, our results showed that the agents' appearance did not significantly change the participants' perception. Also, while we found highly significant differences in inspirational and motivational effects as well as in perceived task load between the two cultures, the reactions to criticism were contrary to expectations based on established cultural models. This work improves our understanding on how affective virtual agents are to be designed, both with respect to culture and to dialogue strategies.
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.
The Transport Layer Security (TLS) protocol is a cornerstone of secure network communication, not only for online banking, e-commerce, and social media, but also for industrial communication and cyber-physical systems. Unfortunately, implementing TLS correctly is very challenging, as becomes evident by considering the high frequency of bugfixes filed for many TLS implementations. Given the high significance of TLS, advancing the quality of implementations is a sustained pursuit. We strive to support these efforts by presenting a novel, response-distribution guided fuzzing algorithm for differential testing of black-box TLS implementations. Our algorithm generates highly diverse and mostly-valid TLS stimulation messages, which evoke more behavioral discrepancies in TLS server implementations than other algorithms. We evaluate our algorithm using 37 different TLS implementations and discuss―by means of a case study―how the resulting data allows to assess and improve not only implementations of TLS but also to identify underspecified corner cases. We introduce suspiciousness as a per-implementation metric of anomalous implementation behavior and find that more recent or bug-fixed implementations tend to have a lower suspiciousness score. Our contribution is complementary to existing tools and approaches in the area, and can help reveal implementation flaws and avoid regression. While being presented for TLS, we expect our algorithm's guidance scheme to be applicable and useful also in other contexts. Source code and data is made available for fellow researchers in order to stimulate discussions and invite others to benefit from and advance our work.
PROFINET Security: A Look on Selected Concepts for Secure Communication in the Automation Domain
(2023)
We provide a brief overview of the cryptographic security extensions for PROFINET, as defined and specified by PROFIBUS & PROFINET International (PI). These come in three hierarchically defined Security Classes, called Security Class 1,2 and 3. Security Class 1 provides basic security improvements with moderate implementation impact on PROFINET components. Security Classes 2 and 3, in contrast, introduce an integrated cryptographic protection of PROFINET communication. We first highlight and discuss the security features that the PROFINET specification offers for future PROFINET products. Then, as our main focus, we take a closer look at some of the technical challenges that were faced during the conceptualization and design of Security Class 2 and 3 features. In particular, we elaborate on how secure application relations between PROFINET components are established and how a disruption-free availability of a secure communication channel is guaranteed despite the need to refresh cryptographic keys regularly. The authors are members of the PI Working Group CB/PG10 Security.
The Datagram Transport Layer Security (DTLS) protocol has been designed to provide end-to-end security over unreliable communication links. Where its connection establishment is concerned, DTLS copes with potential loss of protocol messages by implementing its own loss detection and retransmission scheme. However, the default scheme turns out to be suboptimal for links with high transmission error rates and low data rates, such as wireless links in electromagnetically harsh industrial environments. Therefore, in this paper, as a first step we provide an analysis of the standard DTLS handshake's performance under such adverse transmission conditions. Our studies are based on simulations that model message loss as the result of bit transmission errors. We consider several handshake variants, including endpoint authentication via pre-shared keys or certificates. As a second step, we propose and evaluate modifications to the way message loss is dealt with during the handshake, making DTLS deployable in situations which are prohibitive for default DTLS.
Short-term load forecasting (STLF) has been playing a key role in the electricity sector for several decades, due to the need for aligning energy generation with the demand and the financial risk connected with forecasting errors. Following the top-down approach, forecasts are calculated for aggregated load profiles, meaning the sum of singular loads from consumers belonging to a balancing group. Due to the emerging flexible loads, there is an increasing relevance for STLF of individual factories. These load profiles are typically more stochastic compared to aggregated ones, which imposes new requirements to forecasting methods and tools with a bottom-up approach. The increasing digitalization in industry with enhanced data availability as well as smart metering are enablers for improved load forecasts. There is a need for STLF tools processing live data with a high temporal resolution in the minute range. Furthermore, behin-the-meter (BTM) data from various sources like submetering and production planning data should be integrated in the models. In this case, STLF is becoming a big data problem so that machine learning (ML) methods are required. The research project “GaIN” investigates the improvement of the STLF quality of an energy utility using BTM data and innovative ML models. This paper describes the project scope, proposes a detailed definition for a benchmark and evaluates the readiness of existing STLF methods to fulfil the described requirements as a reviewing paper.
The review highlights that recent STLF investigations focus on ML methods. Especially hybrid models gain more and more importance. ML can outperform classical methods in terms of automation degree and forecasting accuracy. Nevertheless, the potential for improving forecasting accuracy by the use of ML models depends on the underlying data and the types of input variables. The described methods in the analyzed publications only partially fulfil the tool requirements for STLF on company level. There is still a need to develop suitable ML methods to integrate the expanded data base in order to improve load forecasts on company level.
Colored glass products with various printing technologies are becoming more important in industry. The aim is to achieve individual solution in a very short delivery time. Conventional thermal treatment of burning glasses in oven for tempered color printing has predominant issues with high time consumption, energy consumption and manufacturing cost. It requires alternative process development.
This paper proposes laser process to overcome issues in conventional treatment with the latest results of tempering colored glass. Samples have been analyzed with the scanning electron microscope (SEM). Two different laser systems have been applied and the glass has been printed with black paste.
Combined heat and power production (CHP) based on solid oxide fuel cells (SOFC) is a very promising technology to achieve high electrical efficiency to cover power demand by decentralized production. This paper presents a dynamic quasi 2D model of an SOFC system which consists of stack and balance of plant and includes thermal coupling between the single components. The model is implemented in Modelica® and validated with experimental data for the stack UI-characteristic and the thermal behavior. The good agreement between experimental and simulation results demonstrates the validity of the model. Different operating conditions and system configurations are tested, increasing the net electrical efficiency to 57% by implementing an anode offgas recycle rate of 65%. A sensitivity analysis of characteristic values of the system like fuel utilization, oxygen-to-carbon ratio and electrical efficiency for different natural gas compositions is carried out. The result shows that a control strategy adapted to variable natural gas composition and its energy content should be developed in order to optimize the operation of the system.
Complex tourism products with intangible service components are difficult to explain to potential customers. This research elaborates the use of virtual reality (VR) in the field of shore excursions. A theoretical research model based on the technology acceptance model was developed, and hypotheses were proposed. Cruise passengers were invited to test 360° excursion images on a landing page. Data was collected using an online questionnaire. Finally, data was analyzed using the PLS-SEM method. The results provide theoretical implications on technology acceptance model (TAM) research in the field of cruise tourism. Furthermore, the results and implications indicate the potential of virtual 360° shore excursion presentations for the cruise industry.
One of the challenges for autonomous driving in general is to detect objects in the car's camera images. In the Audi Autonomous Driving Cup (AADC), among those objects are other cars, adult and child pedestrians and emergency vehicle lighting. We show that with recent deep learning networks we are able to detect these objects reliably on the limited Hardware of the model cars. Also, the same deep network is used to detect road features like mid lines, stop lines and even complete crossings. Best results are achieved using Faster R-CNN with Inception v2 showing an overall accuracy of 0.84 at 7 Hz.
When designing and installing Indoor Positioning Systems, several interrelated tasks have to be solved to find an optimum placement of the Access Points. For this purpose, a mathematical model for a predefined number of access points indoors is presented. Two iterative algorithms for the minimization of localization error of a mobile object are described. Both algorithms use local search technique and signal level probabilities. Previously registered signal strengths maps were used in computer simulation.
HiSiMo cast irons are frequently used as material for high temperature components in engines as e.g. exhaust manifolds and turbo chargers. These components must withstand severe cyclic mechanical and thermal loads throughout their service life. The combination of thermal transients with mechanical load cycles results in a complex evolution of damage, leading to thermomechanical fatigue (TMF) of the material and, after a certain number of loading cycles, to failure of the component. In this paper (Part I), the low-cycle fatigue (LCF) and TMF properties of HiSiMo are investigated in uniaxial tests and the damage mechanisms are addressed. On the basis of the experimental results a fatigue life model is developed which is based on elastic, plastic and creep fracture mechanics results of short cracks, so that time and temperature dependent effects on damage are taken into account. The model can be used to estimate the fatigue life of components by means of finite-element calculations (Part II of the paper).
The Institute of Applied Research Offenburg is working in the field of autonomous data loggers since many years. In collaboration with industry, a new RFID based active sensor data logger for continuous recording of temperature has been developed and is now manufactured in mass production. Compared to existing systems, an unusual large data memory is integrated, which can be used via a simplified file system in a flexible way. The system will be used to accompany and monitor temperature sensitive goods of high value. The transponder is the first member of a new class of logging devices, the smallest will be not larger than a 2 Euro-coin with a fully integrated ASIC frontend.
Remote measurement of the physiology, so-called biotelemetry, is a key technology in the modern veterinary medicine. The usage of wireless implants has less impact on the behavior of animals than manual measurement methods and cause less disturbance than wired devices. But, common biotelemetry still uses proprietary communication and power concepts focused on small systems with one animal. Therefore, the University of Applied Sciences Offenburg is developing a low-cost RFID system called muTrans1, which is able to measure ECG, pressure, temperature, oxygen saturation and activity. The muTrans uses an own RFID sensor transponder and standardized commercial components and combines them to a scalable RFID system able to build-up RFID sensor networks with a nearly unlimited size.
The conversion of space heating for private households to climate-neutral energy sources is an essential component of the energy transition, as this sector as of 2018 was responsible for 9.4 % of Germany’s carbon dioxide emissions. In addition to reducing demand through better insulation, the use of heat pumps fed with electricity from renewable energy sources, such as on-site photovoltaics (PV) systems, is an important solution approach.
Advanced energy management and control can help to make optimal use of such heating systems. Optimal here can e.g. refer to maximizing self-consumption of self-generated PV power, extended component lifetime or a grid-friendly behavior that avoids load peaks. A powerful method for this is model predictive control (MPC), which calculates optimal schedules for the controllable influence variables based on models of the system dynamics, current measurements of system states and predictions of future external influence parameters.
In this paper, we will discuss three different use cases that show how artificial intelligence can contribute to the realization of such an MPC-based energy management and control system. This will be done using the example of a real inhabited single family home that has provided the necessary data for this purpose and where the methods are implemented and tested. The heating system consists of an air-water heat pump with direct condensation, a thermal stratified storage tank, a pellet burner and a heating rod and provides both heating and hot water. The house generates a significant portion of its electricity needs through a rooftop PV system.
The Paper presents the design and development of a blended learning concept for an engineering course in the field of color representation and display technologies. A suitable learning environment is crucial for the success of the teaching scenario. A mixture of theoretical lectures and hands-on activities with practical applications and experiments, combined with the advantages of modern digital media is the main topic of the paper. Blended learning describes the didactical change of attendance periods and online periods. The e-learning environment for the online period is designed toward an easy access and interaction. Present digital media extends the established teaching scenarios and enables the presentation of videos, animations and augmented reality (AR). Visualizations are effective tools to impart learning contents with lasting effect. The preparation and evaluation of the theoretical lectures and the hands-on activities are stimulated and affects positively the attendance periods. The tasks and experiments require the students to work independently and to develop individual solution strategies. This engages and motivates the students, deepens the knowledge. The authors will present their experience with the implemented blended learning scenario in this field of optics and photonics. All aspects of the learning environment will be introduced.
Monitors are in the center of media productions and hold an important function as the main visual interface. Tablets and smartphones are becoming more and more important work tools in the media industry. As an extension to our lecture contents an intensive discussion of different display technologies and its applications is taking place now. The established LCD (Liquid Crystal Display) technology and the promising OLED (Organic Light Emitting Diode) technology are in the focus.
The classic LCD is currently the most important display technology. The paper will present how the students should develop sense for display technologies besides the theoretical scientific basics. The workshop focuses increasingly on the technical aspects of the display technology and has the goal of deepening the students understanding of the functionality by building simple Liquid Crystal Displays by themselves.
The authors will present their experience in the field of display technologies. A mixture of theoretical and practical lectures has the goal of a deeper understanding in the field of digital color representation and display technologies. The design and development of a suitable learning environment with the required infrastructure is crucial. The main focus of this paper is on the hands-on optics workshop “Liquid Crystal Display in the do-it-yourself”.
VR-based implementation of interactive laboratory experiments in optics and photonics education
(2022)
Within the framework of a developed blended learning concept, a lot of experience has already been gained with a mixture of theoretical lectures and hands-on activities, combined with the advantages of modern digital media. Here, visualizations using videos, animations and augmented reality have proven to be effective tools to convey learning content in a sustainable way. In the next step, ideas and concepts were developed to implement hands-on laboratory experiments in a virtual environment. The main focus is on the realization of virtual experiments and environments that give the students a deep insight into selected subfields of optics and photonics.
This paper explains the realization of a concept for research-oriented photonics education. Using the example of the integration of an actual PhD project, it is shown how students are familiarized with the topic of research and scientific work in the first semesters. Typical research activities are included as essential parts of the learning process. Research should be made visible and tangible for the students. The authors will present all aspects of the learning environment, their impressions and experiences with the implemented scenario, as well as first evaluation results of the students.
The authors explain a developed concept for research-oriented education in optics and photonics. It is presented which goals are to be achieved, which strategies have been developed and how these can be implemented in a blended learning scenario. The goal of our education is the best possible qualification of the students on the basis of a strong scientific and research-oriented education, which also includes the acquisition of important interdisciplinary competences. All phases of a research process are to be mapped in the learning process and offer students an insight into current research topics in optics and photonics.
Increased knowledge transfer through the integration of research projects into university teaching
(2019)
This paper describes the integration of the research project "Characterization of Color Vision using Spectroscopy and Nanotechnology: Application to Media Photonics" into an engineering course in the field of media technology. The aim is to develop the existing learning concept towards a more research-oriented teaching. Involving students in research projects as part of the learning process provides a deeper insight into current research topics and the key elements of scientific work. This makes it easier for students to recognize the importance of the acquired theoretical knowledge for the practice, which enables them to derive new insights of their own.
Redesigning a curriculum for teaching media technology is a major challenge. Up-to-date teaching and learning concepts are necessary that meet the constant technological progress and prepare students specifically for their professional life. Teaching and studying should be characterized by a student-oriented teaching and learning culture. In order to achieve this goal, consistent evaluation is essential. The aim of the evaluation concept presented here is to generate structured information regarding the quality of content-related, didactic and organizational aspects of teaching. The exchange of opinions between students and lecturers should be encouraged in order to continuously improve the teaching and learning processes.
Skin cancer detection proves to be complicated and highly dependent on the examiner’s skills. Millimeter-wave technologies seem to be a promising aid for the detection of skin cancer. The different water content of the skin area affected by cancer compared to healthy skin changes its reflective property. Due to limited available resources on the dielectric properties of skin cancer, especially in comparison to surrounding healthy skin, accurate simulations and evaluations are quite challenging. Therefore, comparing different results for different approaches and starting points can be difficult. In this paper, the Effective Medium Theory is applied to model skin cancer, which provides permittivity values dependent on the water content.
A method for evaluating skin cancer detection based on millimeter-wave technologies is presented. For this purpose, the relative permittivities are calculated using the effective medium theory for the benign and cancerous lesion, considering the change in water content between them. These calculated relative permittivities are further used for the simulation and evaluation of skin cancer detection using a substrate-integrated waveguide probe. A difference in the simulated scattering parameters S 11 of up to 13dB between healthy and cancerous skin can be determined in the best-case.
In public transportation, the motor pool often consists of various different vehicles bought over a duration of many years. Sometimes, they even differ within one batch bought at the same time. This poses a considerable challenge in the storage and allocation of spare parts, especially in the event of damage to a vehicle. Correctly assigning these parts before the vehicle reaches the workshop could significantly reduce both the downtime and, therefore, the actual costs for companies. In order to achieve this, the current software uses a simple probability calculation. To improve the performance, the data of specific companies was analysed, preprocessed and used with several modelling techniques to classify and, therefore, predict the spare parts to be used in the event of a faulty vehicle. We summarize our experience running through the steps of the Cross Industry Standard Process for Data Mining and compare the performance to the previously used probability. Gradient Boosting Trees turned out to be the best modeling technique for this special case.
This paper describes the use of the single-linkage hierarchical clustering method in outlier detection for manufactured metal work pieces. The main goal of the study is to group defects that occur 5 mm into a work piece from the edge, i.e., the border of the metal work piece. The goal is to remove defects outside the area of interest as outliers. According to the assumptions made for the performance criteria, the single-linkage method has achieved better results compared to other agglomeration methods.
Due to its numerous application fields and benefits, virtualization has become an interesting and attractive topic in computer and mobile systems, as it promises advantages for security and cost efficiency. However, it may bring additional performance overhead. Recently, CPU virtualization has become more popular for embedded platforms, where the performance overhead is especially critical. In this article, we present the measurements of the performance overhead of the two hypervisors Xen and Jailhouse on ARM processors in the context of the heavy load “Cpuburn-a8” application and compare it to a native Linux system running on ARM processors.
In the railway technical centers, scheduling the maintenance activities is a very complex task, it consists in ordering, in the time, all the maintenance operations on the workstations, while respecting the number of resources, precedence constraints, and the workstations' availabilities. Currently, this process is not completely automatic. For improving this situation, this paper presents a mathematical model for the maintenance activities scheduling in the case of railway remanufacturing systems. The studied problem is modeled as a flexible job-shop, with the possibility for a job to be executed several times on a stage. MILP formulation is implemented with the Makespan as an objective, representing the time for remanufacturing the train. The aim is to create a generic model for optimizing the planning of the maintenance activities and improving the performance of the railway technical centers. At last, numerical results are presented, discussing the impact of the instances size on the computing time to solve the described problem.
Deafblindness, also known as dual sensory loss, is the combination of sight and hearing impairments of such extent that it becomes difficult for one sense to compensate for the other. Communication issues are a key concern for the Deafblind community. We present the design and technical implementation of the Tactile Board: a mobile Augmentative and Alternative Communication (AAC) device for individuals with deafblindness. The Tactile Board allows text and speech to be translated into vibrotactile signs that are displayed real-time to the user via a haptic wearable. Our aim is to facilitate communication for the deafblind community, creating opportunities for these individuals to initiate and engage in social interactions with other people without the direct need of an intervener.
Co-Designing Assistive Tools to Support Social Interactions by Individuals Living with Deafblindness
(2020)
Deafblindness is a dual sensory impairment that affects many aspects of life, including mobility, access to information, communication, and social interactions. Furthermore, individuals living with deafblindness are under a high risk of social isolation. Therefore, we identified opportunities for applying assistive tools to support social interactions through co-ideation activities with members of the deafblind community. This work presents our co-design approach, lessons learned and directions for designing meaningful assistive tools for dual sensory loss.
In the work at hand, we combine a Private Information Retrieval (PIR) protocol with Somewhat Homomorphic Encryption (SHE) and use Searchable Encryption (SE) with the objective to provide security and confidentiality features for a third party cloud security audit. During the auditing process, a third party auditor will act on behalf of a cloud service user to validate the security requirements performed by a cloud service provider. Our concrete contribution consists of developing a PIR protocol which is proceeding directly on a log database of encrypted data and allowing to retrieve a sum or a product of multiple encrypted elements. Subsequently, we concretely apply our new form of PIR protocol to a cloud audit use case where searchable encryption is employed to allow additional confidentiality requirements to the privacy of the user. Exemplarily we are considering and evaluating an audit of client accesses to a controlled resource provided by a cloud service provider.
This work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloomfilter based privacy approach is a valuable technical building block for the arising General Data Protection Regulation (GDPR) requirements in this area. In short, we apply a solution based on the Bloom filters data structure that allows a 3rd party to performsome privacy saving setrelations on a mobiletelco’s access logfile or other mobile access logfile from harvesting parties without revealing any other mobile users in the proximity of a mobile base station but still allowing to track perpetrators.
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.
The Go programming language is an increasingly popular language but some of its features lack a formal investigation. This article explains Go's resolution mechanism for overloaded methods and its support for structural subtyping by means of translation from Featherweight Go to a simple target language. The translation employs a form of dictionary passing known from type classes in Haskell and preserves the dynamic behavior of Featherweight Go programs.
Featherweight Go (FG) is a minimal core calculus that includes essential Go features such as overloaded methods and interface types. The most straightforward semantic description of the dynamic behavior of FG programs is to resolve method calls based on run-time type information. A more efficient approach is to apply a type-directed translation scheme where interface-values are replaced by dictionaries that contain concrete method definitions. Thus, method calls can be resolved by a simple lookup of the method definition in the dictionary. Establishing that the target program obtained via the type-directed translation scheme preserves the semantics of the original FG program is an important task.
To establish this property we employ logical relations that are indexed by types to relate source and target programs. We provide rigorous proofs and give a detailed discussion of the many subtle corners that we have encountered including the need for a step index due to recursive inter- faces and method definitions.
Today's network landscape consists of many different network technologies, a wide range of end-devices with a large scale of capabilities and power, and an immense quantity of information and data represented in different formats. Research on 3D imaging, virtual reality and holographic techniques will result in new user interfaces (UI) for mobile devices and will increase their diversity and variety. In this paper software architecture has been proposed to establish device and content format independent communication, implemented in Language Learning Game (LLG).
Network landscape of recent time contains many different network technologies, a wide range of end-devices with a large scale of capabilities and power, and an immense quantity of information and data represented in different formats. Research on 3D imaging, virtual reality and holographic techniques will result in new user interfaces (UI) for mobile devices, will increase their diversity and variety. In this paper software architecture has been proposed to establish device and content format independent communication including 3D imaging and virtual reality data as content. As experimental validation the concept is implemented in collaborative Language Learning Game (LLG), which is a learning tool for language acquisition.
The improvements in the hardware and software of communication devices have allowed running Virtual Reality (VR) and Augmented Reality (AR) applications on those. Nowadays, it is possible to overlay synthetic information on real images, or even to play 3D on-line games on smart phones or some other mobile devices. Hence the use of 3D data for business and specially for education purposes is ubiquitous. Due to always available at hand and always ready to use properties of mobile phones, those are considered as most potential communication devices. The total numbers of mobile phone users are increasing all over the world every day and that makes mobile phones the most suitable device to reach a huge number of end clients either for education or for business purposes. There are different standards, protocols and specifications to establish the communication among different communication devices but there is no initiative taken so far to make it sure that the send data through this communication process will be understood and used by the destination device. Since all the devices are not able to deal with all kind of 3D data formats and it is also not realistic to have different version of the same data to make it compatible with the destination device, it is necessary to have a prevalent solution. The proposed architecture in this paper describes a device and purpose independent 3D data visibility any time anywhere to the right person in suitable format. There is no solution without limitation. The architecture is implemented in a prototype to make an experimental validation of the architecture which also shows the difference between theory and practice.
Nowadays, it is assumed of many applications, companies and parts of the society to be always available online. However, according to [Times, Oct, 31 2011], 73% of the world population do not use the internet and thus aren't “online” at all. The most common reasons for not being “online” are expensive personal computer equipment and high costs for data connections, especially in developing countries that comprise most of the world’s population (e.g. parts of Africa, Asia, Central and South America). However it seems that these countries are leap-frogging the “PC and landline” age and moving directly to the “mobile” age. Decreasing prices for smart phones with internet connectivity and PC-like operating systems make it more affordable for these parts of the world population to join the “always-online” community. Storing learning content in a way accessible to everyone, including mobile and smart phones, seems therefore to be beneficial. This way, learning content can be accessed by personal computers as well as by mobile and smart phones and thus be accessible for a big range of devices and users. A new trend in the Internet technologies is to go to “the cloud”. This paper discusses the changes, challenges and risks of storing learning content in the “cloud”. The experiences were gathered during the evaluation of the necessary changes in order to make our solutions and systems “cloud-ready”.