Refine
Year of publication
Document Type
- Conference Proceeding (376) (remove)
Conference Type
- Konferenzartikel (325)
- Konferenz-Abstract (37)
- Sonstiges (8)
- Konferenz-Poster (5)
- Konferenzband (1)
Language
- English (376) (remove)
Is part of the Bibliography
- yes (376)
Keywords
- Assistive Technology (8)
- Gamification (8)
- Kommunikation (7)
- Deafblindness (5)
- Human Computer Interaction (5)
- Applikation (4)
- Messung (4)
- Sicherheit (4)
- Stahl (4)
- Wearables (4)
- Affective Computing (3)
- Batterie (3)
- Dünnschichtchromatographie (3)
- Eingebettetes System (3)
- Haptics (3)
- Heart rhythm model (3)
- Innovation (3)
- Leistungselektronik (3)
- Modeling and simulation (3)
- Sensortechnik (3)
- TRIZ methodology (3)
- Tactile (3)
- neural networks (3)
- 5G mobile communication (2)
- Access protocols (2)
- Atrial fibrillation (2)
- Biomimetics (2)
- Brennstoffzelle (2)
- CST (2)
- Cardiac resynchronization therapy (2)
- Datensicherung (2)
- Decoding (2)
- Education in Optics and Photonics (2)
- Emotion Recognition (2)
- Energieversorgung (2)
- Energy Management (2)
- Funktechnik (2)
- Gehirn (2)
- HF-Ablation (2)
- Haustechnik (2)
- Herz (2)
- Hochtemperatur (2)
- Human Resources (2)
- Inventive principles (2)
- Kreativität (2)
- Leistung (2)
- Maschinenelement (2)
- Messtechnik (2)
- Methanisierung (2)
- Mikrowellentechnik (2)
- Multiuser detection (2)
- Navigation (2)
- Netzwerk (2)
- Optik (2)
- Partikel (2)
- Payloads (2)
- Physical layer (2)
- Process engineering (2)
- Produktion (2)
- Rehabilitation (2)
- Smart Textiles (2)
- TRIZ (2)
- TRIZ Inventive Principles (2)
- User Experience (2)
- access protocols (2)
- convolutional neural networks (2)
- decoding (2)
- image classification (2)
- network coding (2)
- optics and photonics (2)
- printed electronics (2)
- research-oriented education (2)
- security (2)
- 3D interaction (1)
- 3D-Time-of-Flight Cameras (1)
- 6LoWPAN (1)
- AC machines (1)
- Abgas (1)
- Absatz (1)
- Abtragung (1)
- Achilles tendonitis (1)
- Additive manufacturing (1)
- Agile Business (1)
- Agility (1)
- Air Pollution (1)
- Akustik (1)
- Algorithmus (1)
- Amplitude and Phase Errors (1)
- Analytical Query (1)
- Anbieter (1)
- Angle of Arrival (1)
- Arbeitswissenschaft (1)
- Artificial intelligence (1)
- Astronomical events (1)
- Atrioventricular delay (1)
- Augmented Reality (1)
- Ausbildung (1)
- Automated Invention (1)
- Automated idea generation (1)
- Automotive After Market (1)
- Automotive Industry (1)
- Automotive Radar (1)
- Banana residues (1)
- Battery storage (1)
- Bestrahlung (1)
- Biogas (1)
- Biogas Potential (1)
- Biogasreaktor (1)
- Bioreaktor (1)
- Biosignals (1)
- Biventricular pacing (1)
- Bloom filters (1)
- Bluetooth Low Energy (1)
- Breitbandkommunikation (1)
- Bruchmechanik (1)
- Bussystem (1)
- COVID-19 (1)
- CRT (1)
- Calibration (1)
- Car Repair Service Performance (1)
- Challenges During Pandemic 2022 (1)
- Cheer and Challenge (1)
- Chemical engineering (1)
- Cloud Computing (1)
- Cloud computing (1)
- Clustering (1)
- CoBot (1)
- Codierung (1)
- Cogeneration (1)
- Collision avoidance (1)
- Compensation (1)
- Computer Games (1)
- Computersicherheit (1)
- Computerunterstützte Kommunikation (1)
- Context-Awareness (1)
- Control Algorithms (1)
- Controlling (1)
- Cross-industry innovation (1)
- Cryoballoon catheter ablation (1)
- Current Control (1)
- Customer Centricity (1)
- Customer Solution Design (1)
- DC-AC converters (1)
- Data Mining (1)
- Data mining (1)
- Datenbank (1)
- Datenbanksystem (1)
- Datenmanagement (1)
- Defibrillator (1)
- Design (1)
- Design for fibre reinforced AM (1)
- Device characterization (1)
- Diagnostics (1)
- Diesel-Ethanol-Mischkraftstoff (1)
- Digital Beamforming (1)
- Digital Business Models (1)
- Digital Transformation (1)
- Digital Twin (1)
- Digitalisierung (1)
- Dimension 2 (1)
- Diskretisierung (1)
- Drahtloses lokales Netz (1)
- Drohne (1)
- Durchblutung (1)
- E-Commerce (1)
- Eco Sciences (1)
- Eco-innovation (1)
- Eco-inventive principles (1)
- Ecodesign (1)
- Educations (1)
- Einkapselung (1)
- Elderly care (1)
- Electromagnetic and thermal simulation (1)
- Electronic Commerce (1)
- Elektrochemie (1)
- Elektrode (1)
- Elektrofahrzeug (1)
- Elektrokardiogramm (1)
- Elektronik (1)
- Elektronische Medien (1)
- Emission (1)
- Emotion analysis (1)
- Emotions (1)
- Empirical Research (1)
- Encapsulation (1)
- Energiemanagement (1)
- Energieverbrauch (1)
- Energy Flexibility (1)
- Engineering Creativity (1)
- Engineering Education (1)
- Engineering creativity (1)
- Environmental monitoring (1)
- Ermüdung (1)
- Error (1)
- Erweitere Realität (1)
- Eöelktrokardiogramm (1)
- FSK Wake-Up (1)
- FT-Raman-Spektroskopie (1)
- FUSION (1)
- Faseroptik (1)
- Faserstoff (1)
- Feature extraction (1)
- Fertigungstechnik (1)
- Festoxidbrennstoffzelle (1)
- Field Programmable Gate Array (FPGA) (1)
- Filter Dimension (1)
- Finite-Elemente-Methode (1)
- Footwear (1)
- Fotovoltaik (1)
- Fractionated atrial signals (1)
- Fractionated ventricular signals (1)
- GPU Computing (1)
- GPU computing (1)
- Game Design (1)
- Games (1)
- Gefäßverschluß (1)
- Gerichtliche Wissenschaften (1)
- Gewebe (1)
- Grid Integration (1)
- Hands ON (1)
- Hash Function (1)
- Hash Table (1)
- Herzrhythmusstörung (1)
- Hidden Champions (1)
- High frequency ablation (1)
- Hochfrequenztechnik (1)
- Human Computrer Interaction (1)
- Human-Robot Collaboration (1)
- Human-centered computing (1)
- IEEE802.15.4 (1)
- Ideation Performance (1)
- Ideation efficiency (1)
- Ideation performance function (1)
- Impairments (1)
- Implementation (1)
- Imprägnierung (1)
- Informatik (1)
- Informationssystem (1)
- Informationsvermittlung (1)
- Ingenieurwissenschaften (1)
- Ink (1)
- Instandhaltung (1)
- Intelligent Agents (1)
- Interaction metaphor (1)
- International Day of Light, IDL (1)
- International Year of Light, IYL (1)
- Internet der Dinge (1)
- Internet of Things (1)
- Inventive problem solving (1)
- Kalibrieren (1)
- Kalibrierung (1)
- Kamera (1)
- Kardiale Resynchronisationstherapie (1)
- Kinetik (1)
- Konferenz (1)
- Konsum (1)
- Kontextbewusstsein (1)
- Kontrolltheorie (1)
- Korrelation (1)
- Kraftstoff (1)
- Kraftwerk (1)
- Kryoptologie (1)
- Künstliche Intelligenz (1)
- Lastenverschiebung (1)
- Learning (1)
- Left atrial ECG (1)
- Left atrial delay (1)
- Left cardiac ECG (1)
- Lernen (1)
- Lightweight design (1)
- Live Broadcasting (1)
- Loneliness (1)
- Long Term Evolution (1)
- Lumineszenz (1)
- Lärmschutz (1)
- MIMO (1)
- Machine Learning (1)
- Many-core architectures (1)
- Materialermüdung (1)
- Materialwirtschaft (1)
- Mean Square Error (1)
- Measurement (1)
- Mechanik (1)
- Medizin (1)
- Membran (1)
- Mensch-Maschine-Kommunikation (1)
- Methan (1)
- Microgrid (1)
- Microgrid(s) (1)
- Microgrids (1)
- Mikrostruktur (1)
- Mobile Computing (1)
- Mobilkommunikation (1)
- Model Predictive Control (1)
- Modell (1)
- Modellierung (1)
- Module Manufacturing (1)
- Monitoring (1)
- Monte-Carlo (1)
- Monte-Carlo Simulation (1)
- Multi-core architectures (1)
- Multiside heart stimulation (1)
- Nature-inspired principles (1)
- Neurodivergent (1)
- Oberfläche (1)
- Online Studies (1)
- PKI (1)
- PROFINET IO (1)
- PV Applications (1)
- PV Applications, Smart PV, PV Battery Systems, PV Power Supplies (1)
- PV Module (1)
- PV System (1)
- Parallelization (1)
- Parameter Estimation (1)
- Peak shaving (1)
- Photovoltaik (1)
- Plastizität (1)
- Polymere (1)
- Predictive Models (1)
- Preis (1)
- Process design (1)
- Process innovation (1)
- Processing (1)
- Programmierung (1)
- Prototyp (1)
- Pulmonary vein isolation (1)
- QFD (1)
- Quality Function Deployment (1)
- Quantitative Marketing Research (1)
- Quellcode (1)
- RFID (1)
- Radar (1)
- Rahmen (1)
- Raman-Spektroskopie (1)
- Range imaging RGB-D (1)
- Rapid Prototyping (1)
- Real-Time Communication (1)
- Real-time (1)
- Recruiting (1)
- Recycling (1)
- Rede (1)
- Reliability (1)
- Risk Assessment (1)
- Rohrleitung (1)
- SAW-Bauelement (1)
- Safe Speed and Separation Monitoring. (1)
- Scanner (1)
- Schleudertrauma (1)
- Schrittmacher (1)
- Security Engineering (1)
- Segmentierung (1)
- Self-Calibration (1)
- Semiconductor Device (1)
- Servqual (1)
- Signal averaging ECG (1)
- Signaltechnik (1)
- Smart Grid (1)
- Smart Grid Operation (1)
- Smart Grids (1)
- Smart PV (1)
- SmartMAC (1)
- Social Interaction (1)
- Social isolation (1)
- Software Security (1)
- Software for measurements (1)
- Spectral-temporal mapping (1)
- Speiseröhre (1)
- Spektralanalyse (1)
- Spektroskopie (1)
- Spektrum (1)
- Steuerung (1)
- Strömungsmechanik (1)
- Studienanfänger (1)
- Studium (1)
- Subspace Clustering (1)
- Subspace clustering (1)
- Substrates (1)
- Supraventricular tachycardia (1)
- Sustainable (1)
- Sustainable Innovation (1)
- Sustainable product development (1)
- Sustainable technology (1)
- Synchronisation (1)
- System (1)
- Systematic innovation (1)
- Target Path (1)
- Task Analysis (1)
- Technik (1)
- Temperaturmessung (1)
- Textile (1)
- Thermomechanik (1)
- Threat Modeling (1)
- Touch (1)
- Transesophageal electrocardiography (1)
- Transesophageal left atrial pacing (1)
- Trigeneration (1)
- Trägheit (1)
- Ultra-Low Energy (1)
- Ultra-Low Power (1)
- Ultraschall (1)
- Ultraweitband (1)
- Umweltschutz (1)
- Unity Engine (1)
- University students (1)
- User Acceptance (1)
- User Experience Test (1)
- VR (1)
- Ventricular tachycardia (1)
- Verbrennungsmotor (1)
- Verfügbarkeit (1)
- Vervielfältigung (1)
- Virtual Reality (1)
- Visual Impairments (1)
- Wake-Up Receiver (1)
- Wasser (1)
- Web-Applikation (1)
- Welle (1)
- Wellenlänge (1)
- Wärmepumpe (1)
- Zahlung (1)
- Zelle (1)
- Zenware (1)
- Zwischenmodulation (1)
- adversarial attacks (1)
- adversarial detection (1)
- agent (1)
- agent based systems (1)
- akustisches Bauelement (1)
- approximate histograms (1)
- autonomous systems (1)
- bio-inspired models (1)
- building management systems (1)
- camera-based navigation (1)
- car2x networks (1)
- carbon fiber (1)
- cellular radio (1)
- cloud security (1)
- color vision (1)
- computer network management (1)
- correlation (1)
- crossbar (1)
- curb (1)
- cushioning (property) (1)
- customization (1)
- cyclic plasticity (1)
- display technologies (1)
- distributed computing (1)
- e-Mobilität (1)
- education and research (1)
- eingebettetes Gerät (1)
- electrolyte-gated transistors (1)
- energy harvesting (1)
- face recognition (1)
- fail-operational (1)
- fingerprinting (1)
- footwear (1)
- generative adversarial networks (1)
- hair (1)
- hardness (1)
- height estimation (1)
- home automation (1)
- hot work tool steel (1)
- hybrid systems (1)
- identification (1)
- image color analysis (1)
- industrial Ethernet (1)
- industrial communication (1)
- insoles (1)
- irrigation (1)
- kabellos (1)
- kanal (1)
- learning scenario (1)
- machine learning (1)
- machine-to-machine communication (1)
- metal oxide transistor (1)
- metatarsals (1)
- mild traumatic brain injury (1)
- modeling (1)
- multipath (1)
- noise measurement (1)
- nose (1)
- overuse injury (1)
- parking (1)
- particle coarsening (1)
- pattern recognition (1)
- peer to peer network (1)
- perception (1)
- physically unclonable function (PUF) (1)
- prevention (1)
- printed Antennas (1)
- privacy (1)
- radio networks (1)
- rekeying (1)
- reliability (1)
- running (1)
- self-organizing networks (1)
- semantics (1)
- sensor node (1)
- slope (1)
- softwaregenerierter Code (1)
- statistical methods, ROS (1)
- stochastic computing (1)
- style (1)
- telecommunication equipment testing (1)
- time series data (1)
- virtual experiments (1)
- walking (1)
- wide area networks (1)
- wireless sensor networks (1)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (136)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (79)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (65)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (56)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (55)
- Fakultät Wirtschaft (W) (53)
- ACI - Affective and Cognitive Institute (28)
- INES - Institut für nachhaltige Energiesysteme (14)
- WLRI - Work-Life Robotics Institute (12)
- IMLA - Institute for Machine Learning and Analytics (7)
Open Access
- Closed Access (376) (remove)
RETIS – Real-Time Sensitive Wireless Communication Solution for Industrial Control Applications
(2020)
Ultra-Reliable Low Latency Communications (URLLC) has been always a vital component of many industrial applications. The paper proposes a new wireless URLLC solution called RETIS, which is suitable for factory automation and fast process control applications, where low latency, low jitter, and high data exchange rates are mandatory. In the paper, we describe the communication protocol as well as the hardware structure of the network nodes for implementing the required functionality. Many techniques enabling fast, reliable wireless transmissions are used – short Transmission Time Interval (TTI), Time-Division Multiple Access (TDMA), MIMO, optional duplicated data transfer, Forward Error Correction (FEC), ACK mechanism. Preliminary tests show that reliable end-to-end latency down to 350 μs and packet exchange rate up to 4 kHz can be reached (using quadruple MIMO and standard IEEE 802.15.4 PHY at 250 kbit/s).
In this paper, we propose a new streaming media service development environment comprising of a streaming media service model, a XML based service specification language and several implementation and configuration management tools. Our approach is based on a high level streaming service specification language, which allows specifying a service in terms of media objects, QoS, and distribution policies. Driven by such a streaming service specification and a streaming component library implemented with Java Media Framework, the required distributed application infrastructure is generated automatically by a service manager. To support flexible instantiation and termination of services as well as change management during runtime, e.g. migration or substitution of streaming components, we introduce instantiation and termination rules, and reconfiguration rules.
Novel manufacturing technologies, such as printed electronics, may enable future applications for the Internet of Everything like large-area sensor devices, disposable security, and identification tags. Printed physically unclonable functions (PUFs) are promising candidates to be embedded as hardware security keys into lightweight identification devices. We investigate hybrid PUFs based on a printed PUF core. The statistics on the intra- and inter-hamming distance distributions indicate a performance suitable for identification purposes. Our evaluations are based on statistical simulations of the PUF core circuit and the thereof generated challenge-response pairs. The analysis shows that hardware-intrinsic security features can be realized with printed lightweight devices.
Uncontrollable manufacturing variations in electrical hardware circuits can be exploited as Physical Unclonable Functions (PUFs). Herein, we present a Printed Electronics (PE)-based PUF system architecture. Our proposed Differential Circuit PUF (DiffC-PUF) is a hybrid system, combining silicon-based and PE-based electronic circuits. The novel approach of the DiffC-PUF architecture is to provide a specially designed real hardware system architecture, that enables the automatic readout of interchangeable printed DiffC-PUF core circuits. The silicon-based addressing and evaluation circuit supplies and controls the printed PUF core and ensures seamless integration into silicon-based smart systems. Major objectives of our work are interconnected applications for the Internet of Things (IoT).
There are additional long-term effects which also change the micro-structure of the polymer network and consequently the effective number of polymer chains in the material. These effects are summarized by ageing processes and will be used in the following to explain the basic assumptions of the model which can be generalized to simulate the viscous behaviour of the material. An implementation of these concepts into FEM codes is straightforward and has been carried out to the solver ABAQUS, Baaser & Ziegler (2006), Baaser et al. (2009).
Remote code attestation protocols are an essential building block to offer a reasonable system security for wireless embedded devices. In the work at hand we investigate in detail the trustability of a purely software-based remote code attestation based inference mechanism over the wireless when e.g. running the prominent protocol derivate SoftWare-based ATTestation for Embedded Devices (SWATT). Besides the disclosure of pitfalls of such a protocol class we also point out good parameter choices which allow at least a meaningful plausibility check with a balanced false positive and false negative ratio.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
The importance of obtaining simultaneous particle size and concentration values has grown up with continuing discussion of the health effects, of internal combustion engine generated particulate emissions and in particular of Diesel soot emissions. In the present work an aerosol measurement system is described that delivers information about particle size and concentration directly from the undiluted exhaust gas.
Using three laser diodes of different wavelengths which form one parallel light beam, each spectral attenuation is analysed by a single detector and the particle diameter and concentration is evaluated by the use of the Mie theory and shown on-line at a frequency of 1 Hz. The system includes an optical long-path-cell (White principle) with an adjustable path length from 2.5 to 15 m, which allows the analysis within a broad concentration range.
On-line measurements of the particulate emissions in the hot, undiluted exhaust of Diesel engines are presented under stationary and transient engine’s load conditions. Mean particle diameters well below 100 nm are detected for modern Diesel engines. The measured particle concentration corresponds excellently with the traditional gravimetrical measurements of the diluted exhaust. Additionally, measurements of particle emissions (mostly condensed hydricarbons) from a two-stroke engine are presented and discussed.
The development of Internet of Things (IoT) embedded devices is proliferating, especially in the smart home automation system. However, the devices unfortunately are imposing overhead on the IoT network. Thus, the Internet Engineering Task Force (IETF) have introduced the IPv6 Low-Power Wireless Personal Area Network (6LoWPAN) to provide a solution to this constraint. 6LoWPAN is an Internet Protocol (IP) based communication where it allows each device to connect to the Internet directly. As a result, the power consumption is reduced. However, the limitation of data transmission frame size of the IPv6 Routing Protocol for Low-power and Lossy Network’s (RPL’s) had made it to be the running overhead, and thus consequently degrades the performance of the network in terms of Quality of Service (QoS), especially in a large network. Therefore, HRPL was developed to enhance the RPL protocol to minimize redundant retransmission that causes the routing overhead. We introduced the T-Cut Off Delay to set the limit of the delay and the H field to respond to actions taken within the T-Cut Off Delay. Thus, this paper presents the comparison performance assessment of HRPL between simulation and real-world scenarios (6LoWPAN Smart Home System (6LoSH) testbed) in validating the HRPL functionalities. Our results show that HRPL had successfully reduced the routing overhead when implemented in 6LoSH. The observed Control Traffic Overhead (CTO) packet difference between each experiment is 7.1%, and the convergence time is 9.3%. Further research is recommended to be conducted for these metrics: latency, Packet Delivery Ratio (PDR), and throughput.
The Internet of Things (IoT) application has becoming progressively in-demand, most notably for the embedded devices (ED). However, each device has its own difference in computational capabilities, memory usage, and energy resources in connecting to the Internet by using Wireless Sensor Networks (WSNs). In order for this to be achievable, the WSNs that form the bulk of the IoT implementation requires a new set of technologies and protocol that would have a defined area, in which it addresses. Thus, IPv6 Low Power Area Network (6LoWPAN) was designed by the Internet Engineering Task Force (IETF) as a standard network for ED. Nevertheless, the communication between ED and 6LoWPAN requires appropriate routing protocols for it to achieve the efficient Quality of Service (QoS). Among the protocols of 6LoWPAN network, RPL is considered to be the best protocol, however its Energy Consumption (EC) and Routing Overhead (RO) is considerably high when it is implemented in a large network. Therefore, this paper would propose the HRPL to enchance the RPL protocol in reducing the EC and RO. In this study, the researchers would present the performance of RPL and HRPL in terms of EC, Control traffic Overhead (CTO) and latency based on the simulation of the 6LoWPAN network in fixed environment using COOJA simulator. The results show HRPL protocol achieves better performance in all the tested topology in terms of EC and CTO. However, the latency of HRPL only improves in chain topology compared with RPL. We found that further research is required to study the relationship between the latency and the load of packet transmission in order to optimize the EC usage.
In the last decade, IPv6 over Low power Wireless Personal Area Networks (IEEE802.15.4), also known as 6LoWPAN, has well evolved as a primary contender for short range wireless communications and holds the promise of an Internet of Things, which is completely based on the Internet Protocol. The authors' team has developed a 6LoWPAN protocol stack in C language, the stack without the necessity to use a specific design environment or operating system. It is highly flexible, modular, and portable and can be enhanced by several interesting modules, like a Wake-On-Radio-(WOR) MAC layer or a TLS1.2 based security sublayer. The stack is made available as open source at https://github.com/hso-esk/emb6. It was extensively tested on the Automated Physical Testbed (APTB) for Wireless Systems, which is available in the authors' lab and allows a flexible setup and full control of arbitrary topologies. The results of the measurements demonstrate a very good stability and short-term with long-term performance also under dynamic conditions.
Extended Performance Measurements of Scalable 6LoWPAN Networks in an Automated Physical Testbed
(2015)
IPv6 over Low power Wireless Personal Area Networks, also known as 6LoWPAN, is becoming more and more a de facto standard for such communications for the Internet of Things, be it in the field of home and building automation, of industrial and process automation, or of smart metering and environmental monitoring. For all of these applications, scalability is a major precondition, as the complexity of the networks continuously increase. To maintain this growing amount of connected nodes a various 6LoWPAN implementations are available. One of the mentioned was developed by the authors' team and was tested on an Automated Physical Testbed for Wireless Systems at the Laboratory Embedded Systems and Communication Electronics of Offenburg University of Applied Sciences, which allows the flexible setup and full control of arbitrary topologies. It also supports time-varying topologies and thus helps to measure performance of the RPL implementation. The results of the measurements prove an excellent stability and a very good short and long-term performance also under dynamic conditions. In all measurements, there is an advantage of minimum 10% with regard to the average times, like global repair time; but the advantage with reagr to average values can reach up to 30%. Moreover, it can be proven that the performance predictions from other papers are consistent with the executed real-life implementations.
Cell lifetime diagnostics and system be-havior of stationary LFP/graphite lithium-ion batteries
(2018)
Walking interfaces offer advantages in navigation of VE systems over other types of locomotion. However, VR helmets have the disadvantage that users cannot see their immediate surroundings. Our publication describes the prototypical implementation of a virtual environment (VE) system, capable of detecting possible obstacles using an RGB-D sensor. In order to warn users of potential collisions with real objects while they are moving throughout the VE tracking area, we designed 4 different visual warning metaphors: Placeholder, Rubber Band, Color Indicator and Arrow. A small pilot study was carried out in which the participants had to solve a simple task and avoid any arbitrarily placed physical obstacles when crossing the virtual scene. Our results show that the Placeholder metaphor (in this case: trees), compared to the other variants, seems to be best suited for the correct estimation of the position of obstacles and in terms of the ability to evade them.
Do you know that for each banana bunch the complete plant must be cut as well? Only in Brazil 440 million trees are planted annually. With an average weight of 30 kg per banana plant you can estimate about 13,5 million tons of banana residues per year. Although there exist some projects to use these residues for the production of valuable products (e.g fibers for textile and paper production) most of this organic waste material is unused and left for composting on the farmland.
The basic idea of this project is to evaluate this organic waste material for converting it to a renewable and CO2 neutral fuel. Therefore, the different parts of the banana plant (heart, leaves and pseudo stem) were analyzed regarding their biogas potential (specific biogas yield and biogas production kinetics). In further studies the effect of mechanical and enzymatic pretreatments of the different parts of the plants was investigated. This examination could then be the basis for an energetic usage of this organic residue.
The biogas batch experiments were performed according to the german guideline VDI 4630 in 2-L-Batch reactors at 37°C. As biogas substrates, the heart, the leaves and the pseudo stem of the banana plant residue with and without enzymatic/mechanical pretreatment were used.
The different parts of the banana plants result in a specific biogas production yield in the range of 260-470 norm liters per kg organic dry mass.
To determine the influence of the mechanical pretreatment (particle size 1-15 mm) on the biogas production kinetics, the kinetic constants were defined and calculated. The reduction of the particle size leads to an improved biogas production kinetics. Therefore experiments will demonstrate, if the results from the batch experiments can be converted in the continuous fed biogas reactor. The experiments of the enzymatic pretreatment are still under investigation.
We propose in this work to solve privacy preserving set relations performed by a third party in an outsourced configuration. We argue that solving the disjointness relation based on Bloom filters is a new contribution in particular by having another layer of privacy on the sets cardinality. We propose to compose the set relations in a slightly different way by applying a keyed hash function. Besides discussing the correctness of the set relations, we analyze how this impacts the privacy of the sets content as well as providing privacy on the sets cardinality. We are in particular interested in how having bits overlapping in the Bloom filters impacts the privacy level of our approach. Finally, we present our results with real-world parameters in two concrete scenarios.
The demand of wireless solutions in industrial applications increases since the early nineties. This trend is not only ongoing, it is further pushed by developments in the area of software stacks like the latest Bluetooth Low Energy Stack. It is also pushed by new chip-designs and powerful and highly integrated electronic hardware. The acceptance of wireless technologies as a possible solution for industrial applications, has overcome the entry barrier [1]. The first step to see wireless as standard for many industrial applications is almost accomplished. Nevertheless there is nearly none acceptance of wireless technology for Safety applications. One highly challenging and demanding requirement is still unsolved: The aspect safety and robustness. Those topics have been addressed in many cases but always in a similar manner. WirelessHART as an example addresses this topic with redundant so called multiple propagation paths and frequency hopping to handle with interferences and loss of network participants. So far the pure peer to peer link is rarely investigated and there are less safety solutions available. One product called LoRa™ can be seen as one possible solution to address this lack of safety within wireless links. This paper focuses on the safety performance evaluation of a modem-chip-design. The use of diverse and redundant wireless technologies like LoRa can lead to an increase acceptance of wireless in safety applications. Many measurements in real industrial application have been carried out to be able to benchmark the new chip in terms of the safety aspects. The content of this research results can help to raise the level of confidence in wireless. In this paper, the term “safety” is used for data transmission reliability.
In safety critical applications wireless technologies are not widely spread. This is mainly due to reliability and latency requirements. In this paper a new wireless architecture is presented which will allow for customizing the latency and reliability for every single participant within the network. The architecture allows for building up a network of inhomogeneous participants with different reliability and latency requirements. The used TDMA scheme with TDD as duplex method is acting gentle on resources. Therefore participants with different processing and energy resources are able to participate.
Neuromorphic computing systems have demonstrated many advantages for popular classification problems with significantly less computational resources. We present in this paper the design, fabrication and training of a programmable neuromorphic circuit, which is based on printed electrolytegated field-effect transistor (EGFET). Based on printable neuron architecture involving several resistors and one transistor, the proposed circuit can realize multiply-add and activation functions. The functionality of the circuit, i.e. the weights of the neural network, can be set during a post-fabrication step in form of printing resistors to the crossbar. Besides the fabrication of a programmable neuron, we also provide a learning algorithm, tailored to the requirements of the technology and the proposed programmable neuron design, which is verified through simulations. The proposed neuromorphic circuit operates at 5V and occupies 385mm 2 of area.
Printed electronics (PE) offers flexible, extremely low-cost, and on-demand hardware due to its additive manufacturing process, enabling emerging ultra-low-cost applications, including machine learning applications. However, large feature sizes in PE limit the complexity of a machine learning classifier (e.g., a neural network (NN)) in PE. Stochastic computing Neural Networks (SC-NNs) can reduce area in silicon technologies, but still require complex designs due to unique implementation tradeoffs in PE. In this paper, we propose a printed mixed-signal system, which substitutes complex and power-hungry conventional stochastic computing (SC) components by printed analog designs. The printed mixed-signal SC consumes only 35% of power consumption and requires only 25% of area compared to a conventional 4-bit NN implementation. We also show that the proposed mixed-signal SC-NN provides good accuracy for popular neural network classification problems. We consider this work as an important step towards the realization of printed SC-NN hardware for near-sensor-processing.
Battery degradation is a complex physicochemical process that strongly depends on operating conditions and environment. We present a model-based analysis of lithium-ion battery degradation in smart microgrids, in particular, a single-family house and an office tract with photovoltaics generator. We use a multi-scale multi-physics model of a graphite/lithium iron phosphate (LiFePO4, LFP) cell including SEI formation as ageing mechanism. The cell-level model is dynamically coupled to a system-level model consisting of photovoltaics, inverter, power consumption profiles, grid interaction, and energy management system, fed with historic weather data. The behavior of the cell in terms of degradation propensity, performance, state of charge and other internal states is predicted over an annual operation cycle. As result, we have identified a peak in degradation rate during the battery charging process, caused by charging overpotentials. Ageing strongly depends on the load situation, where the predicted annual capacity fade is 1.9 % for the single-family house and only 1.3 % for the office tract.
IPv6 over LoRaWAN™
(2016)
Although short-range wireless communication explicitly targets local and regional applications, range continues to be a highly important issue. The range directly depends on the so-called link budget, which can be increased by the choice of modulation and coding schemes. The recent transceiver generation in particular comes with extensive and flexible support for software-defined radio (SDR). The SX127× family from Semtech Corp. is a member of this device class and promises significant benefits for range, robust performance, and battery lifetime compared to competing technologies. This contribution gives a short overview of the technologies to support Long Range (LoRa™) and the corresponding Layer 2 protocol (LoRaWAN™). It particularly describes the possibility to combine the Internet Protocol, i.e. IPv6, into LoRaWAN™, so that it can be directly integrated into a full-fledged Internet of Things (IoT). The proposed solution, which we name 6LoRaWAN, has been implemented and tested; results of the experiments are also shown in this paper.
Signal detection and bandwidth estimation, also known as channel segmentation or information channel estimation, is a perpetual topic in communication systems. In the field of radio monitoring this issue is extremely challenging, since unforeseeable effects like fading occur accidentally. In addition, most radio monitoring devices normally scan a wide frequency range of several hundred MHz and have to detect a multitude of different signals, varying in signal power, bandwidth and spectral shape. Since narrowband sensing techniques cannot be directly applied, most radio monitoring devices use Nyquist wideband sensing to discover the huge frequency range. In practice, sensing is normally conducted by an FFT sweep spectrum analyzer that delivers the power spectral density (PSD) values to the radio monitoring system. The channel segmentation is the initial step of a comprehensive signal analysis in a radio monitoring system based on the PSD values. In this paper, a novel approach for channel segmentation is presented that is based on a quantization and a histogram evaluation of the measured PSD. It will be shown that only the combination of both evaluations will lead to an successful automatic channel segmentation. The performance of the proposed algorithm is shown in a real radio monitoring szenario.
In an experience economy market competition in software branches is becoming more and more intense. Technical innovations, global retail practices and the multidimensional conception of experiences provide both opportunities and challenges for companies worldwide. Retailers strive for an optimized conversion rate, but poor UX still abound. Particularly Germany-based companies are less evolved in an international comparison of industrialized economies. The value of integrating users in the development process is recognized, but methodologies must carefully be incorporated into existing agile workflows. The goal of this study is to bridge the gaps between internal agency and external client and user interests. The contribution is four-fold: an overview of the current status of customer centricity in the E-Commerce branch of trade is provided (I). Based on this corpus, a methodical framework, aiming to incorporate the experience logic in UX practices within an agile project team, is presented (II). The framework is applied by a single case study - the shop relaunch of a motorbike accessory store (III). Finally, all interest groups (UX, development and project management) are incorporated in the qualitative content analysis (IV).
Wow, You Are Terrible at This!: An Intercultural Study on Virtual Agents Giving Mixed Feedback
(2020)
While the effects of virtual agents in terms of likeability, uncanniness, etc. are well explored, it is unclear how their appearance and the feedback they give affects people's reactions. Is critical feedback from an agent embodied as a mouse or a robot taken less serious than from a human agent? In an intercultural study with 120 participants from Germany and the US, participants had to find hidden objects in a game and received feedback on their performance by virtual agents with different appearances. As some levels were designed to be unsolvable, critical feedback was unavoidable. We hypothesized that feedback would be taken more serious, the more human the agent looked. Also, we expected the subjects from the US to react more sensitively to criticism. Surprisingly, our results showed that the agents' appearance did not significantly change the participants' perception. Also, while we found highly significant differences in inspirational and motivational effects as well as in perceived task load between the two cultures, the reactions to criticism were contrary to expectations based on established cultural models. This work improves our understanding on how affective virtual agents are to be designed, both with respect to culture and to dialogue strategies.
The Transport Layer Security (TLS) protocol is a cornerstone of secure network communication, not only for online banking, e-commerce, and social media, but also for industrial communication and cyber-physical systems. Unfortunately, implementing TLS correctly is very challenging, as becomes evident by considering the high frequency of bugfixes filed for many TLS implementations. Given the high significance of TLS, advancing the quality of implementations is a sustained pursuit. We strive to support these efforts by presenting a novel, response-distribution guided fuzzing algorithm for differential testing of black-box TLS implementations. Our algorithm generates highly diverse and mostly-valid TLS stimulation messages, which evoke more behavioral discrepancies in TLS server implementations than other algorithms. We evaluate our algorithm using 37 different TLS implementations and discuss―by means of a case study―how the resulting data allows to assess and improve not only implementations of TLS but also to identify underspecified corner cases. We introduce suspiciousness as a per-implementation metric of anomalous implementation behavior and find that more recent or bug-fixed implementations tend to have a lower suspiciousness score. Our contribution is complementary to existing tools and approaches in the area, and can help reveal implementation flaws and avoid regression. While being presented for TLS, we expect our algorithm's guidance scheme to be applicable and useful also in other contexts. Source code and data is made available for fellow researchers in order to stimulate discussions and invite others to benefit from and advance our work.
The Datagram Transport Layer Security (DTLS) protocol has been designed to provide end-to-end security over unreliable communication links. Where its connection establishment is concerned, DTLS copes with potential loss of protocol messages by implementing its own loss detection and retransmission scheme. However, the default scheme turns out to be suboptimal for links with high transmission error rates and low data rates, such as wireless links in electromagnetically harsh industrial environments. Therefore, in this paper, as a first step we provide an analysis of the standard DTLS handshake's performance under such adverse transmission conditions. Our studies are based on simulations that model message loss as the result of bit transmission errors. We consider several handshake variants, including endpoint authentication via pre-shared keys or certificates. As a second step, we propose and evaluate modifications to the way message loss is dealt with during the handshake, making DTLS deployable in situations which are prohibitive for default DTLS.
Combined heat and power production (CHP) based on solid oxide fuel cells (SOFC) is a very promising technology to achieve high electrical efficiency to cover power demand by decentralized production. This paper presents a dynamic quasi 2D model of an SOFC system which consists of stack and balance of plant and includes thermal coupling between the single components. The model is implemented in Modelica® and validated with experimental data for the stack UI-characteristic and the thermal behavior. The good agreement between experimental and simulation results demonstrates the validity of the model. Different operating conditions and system configurations are tested, increasing the net electrical efficiency to 57% by implementing an anode offgas recycle rate of 65%. A sensitivity analysis of characteristic values of the system like fuel utilization, oxygen-to-carbon ratio and electrical efficiency for different natural gas compositions is carried out. The result shows that a control strategy adapted to variable natural gas composition and its energy content should be developed in order to optimize the operation of the system.
Social Haptic Communication (SHC) is one of the many tactile modes of communication used by persons with deafblindness to access information about their surroundings. SHC usually involves an interpreter executing finger and hand signs on the back of a person with multi-sensory disabilities. Learning SHC, however, can become challenging and time-consuming, particularly to those who experience deafblindness later in life. In this work, we present PatRec: a mobile game for learning SHC concepts. PatRec is a multiple-choice quiz game connected to a chair interface that contains a 3x3 array of vibration motors emulating different SHC signs. Players collect scores and badges whenever they guess the right SHC vibration pattern, leading to continuous engagement and a better position on a leaderboard. The game is also meant for family members to learn SHC. We report the technical implementation of PatRec and the findings from a user evaluation.
When designing and installing Indoor Positioning Systems, several interrelated tasks have to be solved to find an optimum placement of the Access Points. For this purpose, a mathematical model for a predefined number of access points indoors is presented. Two iterative algorithms for the minimization of localization error of a mobile object are described. Both algorithms use local search technique and signal level probabilities. Previously registered signal strengths maps were used in computer simulation.
HiSiMo cast irons are frequently used as material for high temperature components in engines as e.g. exhaust manifolds and turbo chargers. These components must withstand severe cyclic mechanical and thermal loads throughout their service life. The combination of thermal transients with mechanical load cycles results in a complex evolution of damage, leading to thermomechanical fatigue (TMF) of the material and, after a certain number of loading cycles, to failure of the component. In this paper (Part I), the low-cycle fatigue (LCF) and TMF properties of HiSiMo are investigated in uniaxial tests and the damage mechanisms are addressed. On the basis of the experimental results a fatigue life model is developed which is based on elastic, plastic and creep fracture mechanics results of short cracks, so that time and temperature dependent effects on damage are taken into account. The model can be used to estimate the fatigue life of components by means of finite-element calculations (Part II of the paper).
This paper explains the realization of a concept for research-oriented photonics education. Using the example of the integration of an actual PhD project, it is shown how students are familiarized with the topic of research and scientific work in the first semesters. Typical research activities are included as essential parts of the learning process. Research should be made visible and tangible for the students. The authors will present all aspects of the learning environment, their impressions and experiences with the implemented scenario, as well as first evaluation results of the students.
Increased knowledge transfer through the integration of research projects into university teaching
(2019)
This paper describes the integration of the research project "Characterization of Color Vision using Spectroscopy and Nanotechnology: Application to Media Photonics" into an engineering course in the field of media technology. The aim is to develop the existing learning concept towards a more research-oriented teaching. Involving students in research projects as part of the learning process provides a deeper insight into current research topics and the key elements of scientific work. This makes it easier for students to recognize the importance of the acquired theoretical knowledge for the practice, which enables them to derive new insights of their own.
Due to its numerous application fields and benefits, virtualization has become an interesting and attractive topic in computer and mobile systems, as it promises advantages for security and cost efficiency. However, it may bring additional performance overhead. Recently, CPU virtualization has become more popular for embedded platforms, where the performance overhead is especially critical. In this article, we present the measurements of the performance overhead of the two hypervisors Xen and Jailhouse on ARM processors in the context of the heavy load “Cpuburn-a8” application and compare it to a native Linux system running on ARM processors.
Deafblindness, also known as dual sensory loss, is the combination of sight and hearing impairments of such extent that it becomes difficult for one sense to compensate for the other. Communication issues are a key concern for the Deafblind community. We present the design and technical implementation of the Tactile Board: a mobile Augmentative and Alternative Communication (AAC) device for individuals with deafblindness. The Tactile Board allows text and speech to be translated into vibrotactile signs that are displayed real-time to the user via a haptic wearable. Our aim is to facilitate communication for the deafblind community, creating opportunities for these individuals to initiate and engage in social interactions with other people without the direct need of an intervener.
Co-Designing Assistive Tools to Support Social Interactions by Individuals Living with Deafblindness
(2020)
Deafblindness is a dual sensory impairment that affects many aspects of life, including mobility, access to information, communication, and social interactions. Furthermore, individuals living with deafblindness are under a high risk of social isolation. Therefore, we identified opportunities for applying assistive tools to support social interactions through co-ideation activities with members of the deafblind community. This work presents our co-design approach, lessons learned and directions for designing meaningful assistive tools for dual sensory loss.
In the work at hand, we combine a Private Information Retrieval (PIR) protocol with Somewhat Homomorphic Encryption (SHE) and use Searchable Encryption (SE) with the objective to provide security and confidentiality features for a third party cloud security audit. During the auditing process, a third party auditor will act on behalf of a cloud service user to validate the security requirements performed by a cloud service provider. Our concrete contribution consists of developing a PIR protocol which is proceeding directly on a log database of encrypted data and allowing to retrieve a sum or a product of multiple encrypted elements. Subsequently, we concretely apply our new form of PIR protocol to a cloud audit use case where searchable encryption is employed to allow additional confidentiality requirements to the privacy of the user. Exemplarily we are considering and evaluating an audit of client accesses to a controlled resource provided by a cloud service provider.
This work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloomfilter based privacy approach is a valuable technical building block for the arising General Data Protection Regulation (GDPR) requirements in this area. In short, we apply a solution based on the Bloom filters data structure that allows a 3rd party to performsome privacy saving setrelations on a mobiletelco’s access logfile or other mobile access logfile from harvesting parties without revealing any other mobile users in the proximity of a mobile base station but still allowing to track perpetrators.
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.
The Go programming language is an increasingly popular language but some of its features lack a formal investigation. This article explains Go's resolution mechanism for overloaded methods and its support for structural subtyping by means of translation from Featherweight Go to a simple target language. The translation employs a form of dictionary passing known from type classes in Haskell and preserves the dynamic behavior of Featherweight Go programs.
In online analytical processing (OLAP), filtering elements of a given dimensional attribute according to the value of a measure attribute is an essential operation, for example in top-k evaluation. Such filters can involve extremely large amounts of data to be processed, in particular when the filter condition includes “quantification” such as ANY or ALL, where large slices of an OLAP cube have to be computed and inspected. Due to the sparsity of OLAP cubes, the slices serving as input to the filter are usually sparse as well, presenting a challenge for GPU approaches which need to work with a limited amount of memory for holding intermediate results. Our CUDA solution involves a hashing scheme specifically designed for frequent and parallel updates, including several optimizations exploiting architectural features of Nvidia’s Fermi and Kepler GPUs.
Formal Description of Use Cases for Industry 4.0 Maintenance Processes Using Blockchain Technology
(2019)
Maintenance processes in Industry 4.0 applications try to achieve a high degree of quality to reduce the downtime of machinery. The monitoring of executed maintenance activities is challenging as in complex production setups, multiple stakeholders are involved. So, full transparency of the different activities and of the state of the machine can only be supported, if these stakeholders trust each other. Therefore, distributed ledger technologies, like Blockchain, can be promising candidates for supporting such applications. The goal of this paper is a formal description of business and technical interactions between non-trustful stakeholders in the context of Industry 4.0 maintenance processes using distributed ledger technologies. It also covers the integration of smart contracts for automated triggering of activities.
In this work we describe the implementation details of a protocol suite for a secure and reliable over-the-air reprogramming of wireless restricted devices. Although, recently forward error correction codes aiming at a robust transmission over a noisy wireless medium have extensively been discussed and evaluated, we believe that the clear value of the contribution at hand is to share our experience when it comes to a meaningful combination and implementation of various multihop (broadcast) transmission protocols and custom-fit security building blocks: For a robust and reliable data transmission we make use of fountain codes a.k.a. rateless erasure codes and show how to combine such schemes with an underlying medium access control protocol, namely a distributed low duty cycle medium access control (DLDC-MAC). To handle the well known problem of packet pollution of forward-error-correction approaches where an attacker bogusly modifies or infiltrates some minor number of encoded packets and thus pollutes the whole data stream at the receiver side, we apply homomorphic message authentication codes (HomMAC). We discuss implementation details and the pros and cons of the two currently available HomMAC candidates for our setting. Both require as the core cryptographic primitive a symmetric block cipher for which, as we will argue later, we have opted for the PRESENT, PRIDE and PRINCE (exchangeable) ciphers in our implementation.
HPTLC (High Performance Thin Layer Chromatography) is a well known and versatile separation method which shows a lot of advantages and options in comparison to other separation techniques. The method is fast and inexpensive and does not need time-consuming pretreatments. Using fiber-optic elements for controlled light-guiding, the TLC-method was significantly improved: the new HPTLC-system is able to measure simultaneously at different wavelengths without destroying the plate surface or the analytes on the surface. For registration of the sample distribution on a HPTLC-plate we developed a new and sturdy diode-array HPTLC- scanner which allows registration of spectra on the TLC- plates in the range of 198 nm to 610 nm with a spectral resolution better than 1.2 nm. The spatial resolution on plate is better than 160 micrometers . In the spectral mode, the new HPTLC-scanner delivers much more information than the commonly used TLC-scanner. The measurement of 450 spectra of one separation track does not need more than three minutes. However, in the fixed wavelength mode the contour plot can be measured within 15 seconds. In this case, the signal will be summarized and averaged over a spectral range having FWHM from 10 nm to 25 nm depending on the substance under test. The new diode-array HPTLC-scanner makes various chemometric applications possible. The new method can be used easily in clinical diagnostic systems easily, e.g. for blood and uring investigations. In addition, new applications are possible. For example, the rich structured PAHs were studied. Although the separation is incomplete the 16 compounds can be quantified using suitable wavelengths.
HPTLC (High Performance Thin Layer Chromatography) is a well known and versatile separation method which shows many advantages when compared to other separation techniques. The method is fast and inexpensive and does not need time-consuming pretreatments. For visualisation of the sample distribution on a HPTLC-plate we developed a new and sturdy HPTLC-scanner. The scanner allows simultaneous registrations of spectra in a range from 198 nm to 612 nm with a spectral resolution of better than 0.8 nm. The on-plate spatial resolution is better than 160 μm. The measurement of 450 spectra in one separation track does not need more than two minutes. The new diode-array scanner offers a fast survey over a TLC-separation and makes various chemometric applications possible. For compound identification a cross-correlation function is described to compare UV sample spectra with appropriate library data. The cross-correlation function herein described can also be used for purity testing. Unresolved peaks can be virtually separated by use of a least squares fit algorithm. In summary, the diode arry system delivers much more information than the commonly used TLC-scanner.
It seems to be a widespread impression that the use of strong cryptography inevitably imposes a prohibitive burden on industrial communication systems, at least inasmuch as real-time requirements in cyclic fieldbus communications are concerned. AES-GCM is a leading cryptographic algorithm for authenticated encryption, which protects data against disclosure and manipulations. We study the use of both hardware and software-based implementations of AES-GCM. By simulations as well as measurements on an FPGA-based prototype setup we gain and substantiate an important insight: for devices with a 100 Mbps full-duplex link, a single low-footprint AES-GCM hardware engine can deterministically cope with the worst-case computational load, i.e., even if the device maintains a maximum number of cyclic communication relations with individual cryptographic keys. Our results show that hardware support for AES-GCM in industrial fieldbus components may actually be very lightweight.
In the course of the last few years, our students are becoming increasingly unhappy. Sometimes they stop attending lectures and even seem not to know how to behave correctly. It feels like they are getting on strike. Consequently, drop-out rates are sky-rocketing. The lecturers/professors are not happy either, adopting an “I-don’t-care” attitude.
An interdisciplinary, international team set in to find out: (1) What are the students unhappy about? Why is it becoming so difficult for them to cope? (2) What does the “I-don’t-care” attitude of professors actually mean? What do they care or not care about? (3) How far do the views of the parties correlate? Could some kind of mutual understanding be achieved?
The findings indicate that, at least at our universities, there is rather a long way to go from “Engineering versus Pedagogy” to “Engineering Pedagogy”.
Both German and French Air-Source Heat Pump (ASHP) markets have been enjoying an overall upwards trend for many years but, nevertheless, they remain merely slightly penetrated. In terms of market players and their share, the French market is aptly diversified, whereas the German one, being utterly dominated by one single manufacturer, is badly in need of some diversification. At the same time Korean ASHP manufacturers are targeting the French but not German ASHP market. The main purpose of the paper is to find out likely reasons for their one-sided engagement, primarily those associated with the ASHP technology and its system-related aspects.
Due to a controversial enrollment policy in most engineering programs at German Universities of Applied Sciences (UAS), many freshmen show very low school grades in key subjects like Math and Physics. Nevertheless they expect to be entertained in the lectures and get demotivated easily. Despite initial reservations, a cheer-and-challenge approach was developed for teaching Mechanics to freshmen having very diverse school grades. When tested, it showed astonishing results.
Efficient, low-cost, secure and reliable communication solutions are a major stepping stone for smart metering and smart grid applications. This especially holds true for the so called primary communication or local metrological network (LMN) between a local meter or actuator and a data collector or gateway, where the highest requirements with regard to cost, bandwidth, and energy efficiency have to be taken into consideration. Multiple developments and field tests are going on in this field, however, energy autarkic devices are hardly found, yet. This contribution describes the development of an automatic water meter reading (AWMR) technology based on Wireless M-Bus to provide water utility companies with an automatic remote water meter reading solution. It addresses the special needs of home utilities by providing a remote metering solution independent from the electricity infrastructure, both in terms of data communication and in terms of power supply. For this project, a cost efficient integrated energy harvesting system powered by the available water flow was developed, to enable operation independently of the mains grid, and eliminate the need for battery replacement for near-zero maintenance costs.
Efficient, low-cost, secure and reliable communication solutions are a major stepping stone for smart metering and smart grid applications. This especially holds true for the so called primary communication or local metrological network (LMN) between a local meter or actuator and a data collector or gateway, where the highest requirements with regard to cost, bandwidth, and energy efficiency have to be taken into consideration. Multiple developments and field tests are going on in this field, however, energy autarkic devices are hardly found, yet.
With the increasing degree of interconnectivity in industrial factories, security becomes more and more the most important stepping-stone towards wide adoption of the Industrial Internet of Things (IIoT). This paper summarizes the most important aspects of one keynote of DESSERT2020 conference. It highlights the ongoing and open research activities on the different levels, from novel cryptographic algorithms over security protocol integration and testing to security architectures for the full lifetime of devices and systems. It includes an overview of the research activities at the authors' institute.
eTPL: An Enhanced Version of the TLS Presentation Language Suitable for Automated Parser Generation
(2017)
The specification of the Transport Layer Security (TLS) protocol defines its own presentation language used for the purpose of semi-formally describing the structure and on-the-wire format of TLS protocol messages. This TLS Presentation Language (TPL) is more expressive and concise than natural language or tabular descriptions, but as a result of its limited objective has a number of deficiencies. We present eTPL, an enhanced version of TPL that improves its expressiveness, flexibility, and applicability to non-TLS scenarios. We first define a generic model that describes the parsing of binary data. Based on this, we propose language constructs for TPL that capture important information which would otherwise have to be picked manually from informal protocol descriptions. Finally, we briefly introduce our software tool etpl-tool which reads eTPL definitions and automatically generates corresponding message parsers in C++. We see our work as a contribution supporting sniffing, debugging, and rapid-prototyping of wired and wireless communication systems.
The low cost and small size of MEMS inertial sensors allows their combination into a multi sensor module in order to improve performance. However the different linear accelerations measured on different places on a rotating rigid body have to be considered for the proper fusion of the measurements. The errors in measurement of MEMS inertial sensors include deterministic imperfection, but also random noise. The gain in accuracy of using multiple sensors depends strongly on the correlation between these errors from the different sensors. Although for sensor fusion it usually assumed that the measurement errors of different sensors are uncorrelated, estimation theory shows that for the combination of the same type of sensors actually a negative correlation will be more beneficial. Therefore we describe some important and often neglected considerations for the combination of several sensors and also present some preliminary results with regard to the correlation of measurements from a simple multi sensor setup.
A novel approach of a test environment for embedded networking nodes has been conceptualized and implemented. Its basis is the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes run in parallel, connected via so-called virtual channels. The environment allows to modifying the behavior of the virtual channels as well as the overall topology during runtime to virtualize real-life networking scenarios. The presented approach is very efficient and allows a simple description of test cases without the need of a network simulator. Furthermore, it speeds up the process of developing new features as well as it supports the identification of bugs in wireless communication stacks. In combination with powerful test execution systems, it is possible to create a continuous development and integration flow.
A novel approach of a testbed for embedded networking nodes has been conceptualized and implemented. It is based on the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes are running in parallel and are connected via so-called virtual interfaces. The presented approach is very efficient and allows a simple description of test cases without the need of a network simulator. Furthermore, it speeds up the process of developing new features.
Wireless sensor networks have found their way into a wide range of applications, among which environmental monitoring systems have attracted increasing interests of researchers. Main challenges for these applications are scalability of the network size and energy efficiency of the spatially distributed nodes. Nodes are mostly battery-powered and spend most of their energy budget on the radio transceiver module. In normal operation modes most energy is spent waiting for incoming frames. A so-called Wake-On-Radio (WOR) technology helps to optimize trade-offs between energy consumption, communication range, complexity of the implementation and response time. We already proposed a new protocol called SmartMAC that makes use of such WOR technology. Furthermore, it gives the possibility to balance the energy consumption between sender and receiver nodes depending on the use case. Based on several calculations and simulations, it was predicted that the SmartMAC protocol was significantly more efficient than other schemes being proposed in recent publications, while preserving a certain backward compatibility with standard IEEE802.15.4 transceivers. To verify this prediction, we implemented the SmartMAC protocol for a given hardware platform. This paper compares the realtime performance of the SmartMAC protocol against simulation results, and proves the measured values are very close to the estimated values. Thus we believe that the proposed MAC algorithms outperforms all other Wake-on-Radio MACs.
A highly scalable IEEE802.11p communication and localization subsystem for autonomous urban driving
(2013)
The IEEE802.11p standard describes a protocol for car-to-X and mainly for car-to-car-communication. It has found its place in hardware and firmware implementations and is currently tested in various field tests. In the research project Ko-TAG, which is part of the research initiative Ko-FAS, cooperative sensor technology is developed for the support of highly autonomous driving. A secondary radar principle based on communication signals enables localization of objects with simultaneous data transmission. It mainly concentrates on the detection of pedestrians and other vulnerable road users (VRU), but also supports pre crash safety applications. Thus it is mainly targeted for the support of traffic safety applications in intra-urban scenarios. This contribution describes the Ko-TAG part of the overall initiative, which develops a subsystem to improve the real-time characteristics of IEEE802.11p needed for precise time of flight real-time localization. In doing this, it still fits into the regulatory schemes. It discusses the approach for definition and verification of the protocol design, while maintaining the close coexistence with existing IEEE802.11p subsystems. System simulations were performed and hardware was implemented. Test results are shown in the last part of the paper.
The authentication method of electronic devices, based on individual forms of correlograms of their internal electric noises, is well-known. Specific physical differences in the components – for example, caused by variations in production quality – cause specific electrical signals, i.e. electric noise, in the electronic device. It is possible to obtain this information and to identify the specific differences of the individual devices using an embedded analog-to-digital converter (ADC). These investigations confirm the possibility to identify and authenticate electronic devices using bit templates, calculated from the sequence of values of the normalized autocorrelation function of noise. Experiments have been performed using personal computers. The probability of correct identification and authentication increases with increasing noise recording duration. As a result of these experiments, an accuracy of 98.1% was achieved for a 1 second-long registration of EM for a set of investigated computers.
The paper describes the hardware and software architecture of the developed multi MEMS sensor prototype module, consisting of ARM Cortex M4 STM32F446 microcontroller unit, five 9-axis inertial measurement units MPU9255 (3D accelerometer, 3D gyroscope, 3D magnetometer and temperature sensor) and a BMP280 barometer. The module is also equipped with WiFi wireless interface (Espressif ESP8266 chip). The module is constructed in the form of a truncated pyramid. Inertial sensors are mounted on a special basement at different angles to each other to eliminate hardware sensors drifts and to provide the capability for self-calibration. The module fuses information obtained from all types of inertial sensors (acceleration, rotation rate, magnetic field and air pressure) in order to calculate orientation and trajectory. It might be used as an Inertial Measurement Unit, Vertical Reference Unit or Attitude and Heading Reference System.
The communication between objects, i.e. between cars (car-2-car, C2C), between cars and infrastructure (car-2-infrastructure, C2I) and between cars and vulnerable road users (car-2-VRU, C2VRU) is a major stepping stone towards traffic applications to enable efficient and safe traffic flow. However, these applications pose very high requirements to the communication protocols, which go beyond the capabilities of an available standardized solution.
This contribution shows how iterative design processes can help to fulfill these requirements, while re-using a maximum of elements from one level to the next and thus avoiding unrealistic overhead. In especially, the added value of simulation and emulation in this iterative process is elaborated.
Climate change and resultant scarcity of water are becoming major challenges for countries around the world. With the advent of Wireless Sensor Networks (WSN) in the last decade and a relatively new concept of Internet of Things (IoT), embedded systems developers are now working on designing control and automation systems that are lower in cost and more sustainable than the existing telemetry systems for monitoring. The Indus river basin in Pakistan has one of the world's largest irrigation systems and it is extremely challenging to design a low-cost embedded system for monitoring and control of waterways that can last for decades. In this paper, we present a hardware design and performance evaluation of a smart water metering solution that is IEEE 802.15.4-compliant. The results show that our hardware design is as powerful as the reference design, but allows for additional flexibility both in hardware and in firmware. The indigenously designed solution has a power added efficiency (PAE) of 24.7% that is expected to last for 351 and 814 days for nodes with and without a power amplifier (PA). Similarly, the results show that a broadband communication (434 MHz) over more than 3km can be supported, which is an important stepping stone for designing a complete coverage solution of large-scale waterways.
Due to climate change and scarcity of water reservoirs, monitoring and control of irrigation systems is now becoming a major focal area for researchers in Cyber-Physical Systems (CPS). Wireless Sensor Networks (WSNs) are rapidly finding their way in the field of irrigation and play the key role as data gathering technology in the domain of IoT and CPS. They are efficient for reliable monitoring, giving farmers an edge to take precautionary measures. However, designing an energy-efficient WSN system requires a cross-layer effort and energy-aware routing protocols play a vital role in the overall energy optimization of a WSN. In this paper, we propose a new hierarchical routing protocol suitable for large area environmental monitoring such as large-scale irrigation network existing in the Punjab province of Pakistan. The proposed protocol resolves the issues faced by traditional multi-hop routing protocols such as LEACH, M-LEACH and I-LEACH, and enhances the lifespan of each WSN node that results in an increased lifespan of the whole network. We used the open-source NS3 simulator for simulation purposes and results indicate that our proposed modifications result in an average 27.8% increase in lifespan of the overall WSN when compared to the existing protocols.
Home Care Applications and Ambient Assisted Living become increasingly attractive. This is caused as well by market pull, as the number of elderly people grows monotonously, as well as by technology push, as technological advances and attractive products pave the way to economically advantageous offerings. However, in real-life applications, a significant number of challenges remain. Those include seamless communication between products from different supplier, due to the lack of sufficiently standardized solutions, energy budgets, and scalability of solutions. This paper presents the experience from the InCASA project (Integrated Network for Completely Assisted Senior Citizen's Autonomy), where architectures for heterogeneous physical and logical communication flows are examined.
The communication technologies for automatic meter reading (smart metering) and for energy production and distribution networks (smart grid) have the potential to be one of the first really highly scaled machine-to-machine-M2M-applications. During the last years, two very promising developments around the wireless part of the smart grid communication were initialized, which possibly could have an impact on the network architectures and the markets far beyond Germany and far beyond energy automation. Besides the specification of the OMS Group of a security extension to the Wireless M-Bus protocol (EN13757-4), the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, BSI) has designed a Protection Profile (PP) and a Technical Directive (TR) for the communication unit of an intelligent measurement system (Smart Meter Gateway), which were released in March 2013. This design uses state of the art technologies and prescribes their implementation in real-life systems. At first, the proposed paper will present the most important characteristics of this architecture. It will then give an insight into the implementation of the OMS security protocols, which imply the usage of a mutually authenticated SSL protocol also in the Local Metrological Network. This is achieved with the help of an additional Authentication and Fragmentation Layer (AFL). This secure communication will be terminated in a BSI conformant secure smart meter gateway, which is developed in a different project and described in the second step. Finally, the contribution will discuss the integration of such a metering network into an overall telecommunication network and PKI infrastructure.
The provisioning of security for highly dynamic wireless networks, as for Car2X applications is still a major topic, as very specific requirements have to be solved. Those include a perfect privacy level and advanced real-time behavior, and the necessity to work with a public infrastructure (PKI) to support secure authentication.
This contribution analyzes these requirements, discusses the existing approaches, performs a gap analysis and elaborates on proposals to fill these gaps. It describes work in progress within the KoFAS-initiative for the development of a cooperative pedestrian protection system (CPPS).
In this work, we consider a duty-cycled wireless sensor network with the assumption that the on/off schedules are uncoordinated. In such networks, as all nodes may not be awake during the transmission of time synchronization messages, nodes will require to re-transmit the synchronization messages. Ideally a node should re-transmit for the maximum sleep duration to ensure that all nodes are synchronized. However, such a proposition will immensely increase the energy consumption of the nodes. Such a situation demands that there is an upper bound of the number of retransmissions. We refer to the time a node spends in re-transmission of the control message as broadcast duration. We ask the question, what should be the broadcast duration to ensure that a certain percentage of the available nodes are synchronized. The problem to estimate the broadcast duration is formulated so as to capture the probability threshold of the nodes being synchronized. Results show the proposed analytical model can predict the broadcast duration with a given lower error margin under real world conditions, thus demonstrating the efficiency of our solution.
HiSiMo cast irons are frequently used as material for high temperature components in engines as e.g. exhaust manifolds and turbo chargers. These components must withstand severe cyclic mechanical and thermal loads throughout their life cycle. The combination of thermal transients with mechanical load cycles results in a complex evolution of damage, leading to thermomechanical fatigue (TMF) of the material and, after a certain number of loading cycles, to failure of the component. In Part I of the paper, a fracture mechanics model for TMF life prediction was developed based on results of uniaxial tests. In this paper (Part II), the model is formulated for three-dimensional stress states, so that it can be applied in a post-processing step of a finite-element analysis. To obtain reliable stresses and (time dependent plastic) strains in the finite-element calculation, a time and temperature dependent plasticity model is applied which takes non-linear kinematic hardening into account. The material properties of the model are identified from the results of the uniaxial test. The plasticity model and the TMF life model are applied to assess the lifetime of an exhaust manifold.
Video game developers continuously increase the degree of details and realism in games to create more human-like characters. But increasing the human-likeness becomes a problem in regard to the Uncanny Valley phenomenon that predicts negative feelings of people towards artificial entities. We developed an avatar creation system to examine preferences towards parametrized faces and explore in regard to the Uncanny Valley phenomenon how people design faces that they like or reject. Based on the 3D model of the Caucasian average face, 420 participants generate 1341 faces of positively and negatively associated concepts of both gender. The results show that some characteristics associated with the Uncanny Valley are used to create villains or repulsive faces. Heroic faces get attractive features but are rarely and little stylized. A voluntarily designed face is very similar to the heroine. This indicates that there is a tendency of users to design feminine and attractive but still credible faces.
Brand identification has the potential of shaping individuals' attitudes, performance and commitment within learning and work contexts. We explore these effects, by incorporating elements of branded identification within gamified environments. We report a study with 44 employees, in which task performance and emotional outcomes are assessed in a real-world assembly scenario - namely, while performing a soldering task. Our results indicate that brand identification has a direct impact on individuals' attitude towards the task at hand: while instigating positive emotions, aversion and reactance also arise.
Physically Unclonable Functions (PUFs) are hardware-based security primitives, which allow for inherent device fingerprinting. Therefore, intrinsic variation of imperfect manufactured systems is exploited to generate device-specific, unique identifiers. With printed electronics (PE) joining the internet of things (IoT), hardware-based security for novel PE-based systems is of increasing importance. Furthermore, PE offers the possibility for split-manufacturing, which mitigates the risk of PUF response readout by third parties, before commissioning. In this paper, we investigate a printed PUF core as intrinsic variation source for the generation of unique identifiers from a crossbar architecture. The printed crossbar PUF is verified by simulation of a 8×8-cells crossbar, which can be utilized to generate 32-bit wide identifiers. Further focus is on limiting factors regarding printed devices, such as increased parasitics, due to novel materials and required control logic specifications. The simulation results highlight, that the printed crossbar PUF is capable to generate close-to-ideal unique identifiers at the investigated feature size. As proof of concept a 2×2-cells printed crossbar PUF core is fabricated and electrically characterized.
As one result of the digital transformation in the automotive industry, new digital business models comprising software-based solutions are demanded by OEMs. To adequately meet these new requirements, automotive suppliers implement interdisciplinary roles – called Customer Solution Designers. However, due to the novelty, the Customer Solution Design research field is not yet well developed, neither in theory nor in practice. Besides giving an overview of the current state of the Customer Solution Design research field, the core of this paper is two-fold: Based on the conduction of 14 guided expert interviews with selected experts of a large German automotive supplier, we establish a uniform understanding of the Customer Solution Design role by using the Role Model Canvas (I). In addition, a case study strategy comprising two software-based projects, which are executed by a large German automotive supplier, is used to derive a common approach for Customer Solution Design in the context of an agile business framework (II).
This paper focuses on appropriately measuring the accuracy of forecasts of load behavior and renewable generation in micro-grid operation. Common accuracy measures like the root mean square of the error are often difficult to interpret for system design, as they describe the mean accuracy of the forecast. Micro-grid systems, however, have to be designed to handle also worst case situations. This paper therefore suggests two error measures that are based on the maximum function and that better allow understanding worst case requirements with respect to balancing power and balancing energy supply.
With increasing flexible AC transmission system (FACTS) devices in operation, like the most versatile unified power flow controller (UPFC), the AC/DC transmission flexibility and power system stability have been suffering unprecedented challenge. This paper introduces the user-defined modeling (UDM) method into the UPFC dynamic modeling process, to deal with the challenging requirements of power system operation. This has also been verified using a leading-edge stability analysis software named DSATools TM in the IEEE-39 bus benchmark system. The characteristics of steady-state and dynamic responses are compared and analyzed under different conditions. Furthermore, simulation results prove the feasibility and effectiveness of the proposed UPFC in terms of both the independent regulation of power flow and the improvement of transient stability.
Model-based analysis of Electrochemical Pressure Impedance Spectroscopy (EPIS) for PEM Fuel Cells
(2019)
Electrochemical impedance spectroscopy (EIS) is a widely-used diagnostic technique to characterize electrochemical processes. It is based on the dynamic analysis of two electrical observables, that is, current and voltage. Electrochemical cells with gaseous reactants or products, in particular fuel cells, offer an additional observable, that is, the gas pressure. The dynamic coupling of current or voltage with gas pressure gives rise to a number of additional impedance definitions, for which we have previously introduced the term electrochemical pressure impedance spectroscopy (EPIS) [1,2]. EPIS shows a particular sensitivity towards transport processes of gas-phase or dissolved species, in particular, diffusion coefficients and transport pathway lengths. It is as such complementary to standard EIS, which is mainly sensitive towards electrochemical processes. First EPIS experiments on PEM fuel cells have recently been shown [3].
We present a detailed modeling and simulation analysis of EPIS of a PEM fuel cell. We use a 1D+1D continuum model of a fuel/air channel pair with GDL and MEA. Backpressure is dynamically varied, and the resulting simulated oscillation in cell voltage is evaluated to yield the ▁Z_( V⁄p_ca ) EPIS signal. Results are obtained for different transport situations of the fuel cell, giving rise to very complex EPIS shapes in the Nyquist plot. This complexity shows the necessity of model-based interpretation of the complex EPIS shapes. Based on the simulation results, specific features in the EPIS spectra can be assigned to different transport domains (gas channel, GDL, membrane water transport).
6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks) is gaining more and more attraction for the seamless connectivity of embedded devices for the Internet of Things. It can be observed that most of the available solutions are following an open source approach, which significantly leads to a fast development of technologies and of markets. Although the currently available implementations are in a pretty good shape, all of them come with some significant drawbacks. It was therefore decided to start the development of an own implementation, which takes the advantages from the existing solutions, but tries to avoid the drawbacks. This paper discussed the reasoning behind this decision, describes the implementation and its characteristics, as well as the testing results. The given implementation is available as open-source project under [15].
For the past few years Low Power Wide Area Networks (LPWAN) have emerged as key technologies for the connectivity of many applications in the Internet of Things (IoT) combining low-data rates with strict cost and energy restrictions. Especially LoRa/LoRaWAN enjoys a high visibility on today’s markets, because of its good performance and its open community. Originally LoRa was designed for operation within the Sub-GHz ISM bands for Industrial, Scientific and Medical applications. However, at the end of 2018, a LoRa-based solution in the 2.4GHz ISM-band was presented promising higher bandwidths and higher data rates. Furthermore, it overcomes the limited duty-cycle prescribed by the regulations in the ISM-bands and therefore also opens doors to many novel application fields. Also, due to higher bandwidths and shorter transmission times, the use of alternative MAC layer protocols becomes very interesting, i.e. for TDMA based-approaches. Within this paper, we propose a system architecture with 2.4GHz LoRa components combining two aspects. On the one hand, we present a design and an implementation of a 2.4GHz based LoRaWAN solution that can be seamlessly integrated into existing LoRaWAN back-hauls. On the other hand, we describe deterministic setup using a Time Slotted Channel Hopping (TSCH) approach as defined in the IEEE802.15.4-2015 standard for industrial applications. Finally, measurements show the performance of the system.
Heart rhythm model and simulation of electrophysiological studies and high-frequency ablations
(2017)
Background: The simulation of complex cardiologic structures has the potential to replace clinical studies due to its high efficiency regarding time and costs. Furthermore, the method is more careful for the patients’ health than the conventional ways. The aim of the study was to create an anatomic CAD heart rhythm model (HRM) as accurate as possible, and to show its usefulness for cardiac electrophysiological studies (EPS) and high-frequency (HF) ablations.
Methods: All natural heart components of the new HRM were based on MRI records, which guaranteed electronic functionality. The software CST (Computer Simulation Technology, Darmstadt) was used for the construction, while CST’s material library assured genuine tissue properties. It should be applicable to simulate different heart rhythm diseases as well as various diffusions of electromagnetic fields, caused by electrophysiological conduction, inside the heart tissue.
Results: It was achievable to simulate normal sinus rhythm and fourteen different heart rhythm disturbance with different atrial and ventricular conduction delays. The simulated biological excitation of healthy and sick HRM were plotted by simulated electrodes of four polar right atrial catheter, six polar His bundle catheter, ten polar coronary sinus catheter, four polar ablation catheter and eight polar transesophageal left cardiac catheter (Fig.). Accordingly, six variables were rebuilt and inserted into the anatomic HRM in order to establish heart catheters for ECG monitoring and HF ablation. The HF ablation catheters made it possible to simulate various types of heart rhythm disturbance ablations with different HF ablation catheters and also showed a functional visualisation of tissue heating. The use of tetrahedral meshing HRM made it attainable to store the results faster accompanied by a higher degree of space saving. The smart meshing function reduced unnecessary high resolutions for coarse structures.
Conclusions: The new HRM for EPS simulation may be additional useful for simulation of heart rhythm disturbance, cardiac pacing, HF ablation and for locating and identification of complex fractioned signals within the atrium during atrial fibrillation HF ablation.