Refine
Year of publication
- 2018 (267) (remove)
Document Type
- Conference Proceeding (79)
- Part of a Book (78)
- Article (reviewed) (36)
- Article (unreviewed) (24)
- Other (16)
- Book (11)
- Contribution to a Periodical (10)
- Letter to Editor (4)
- Patent (4)
- Report (3)
Conference Type
- Konferenzartikel (59)
- Konferenz-Abstract (14)
- Konferenz-Poster (3)
- Sonstiges (3)
Has Fulltext
- no (267) (remove)
Is part of the Bibliography
- yes (267)
Keywords
- Digitalisierung (13)
- Data Analytics (12)
- Industrie 4.0 (12)
- Social Media Marketing (12)
- Big Data (11)
- Fraud Analytics (11)
- Smart City (11)
- Surveillance (11)
- Autonomie (4)
- Mikrostruktur (3)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (115)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (69)
- Fakultät Wirtschaft (W) (39)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (38)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (17)
- INES - Institut für nachhaltige Energiesysteme (10)
- ACI - Affective and Cognitive Institute (7)
- CRT - Campus Research & Transfer (2)
- POIM - Peter Osypka Institute of Medical Engineering (2)
- WLRI - Work-Life Robotics Institute (2)
Open Access
- Closed Access (160)
- Open Access (65)
- Closed (6)
- Bronze (4)
- Diamond (1)
Die Hersteller von Cochlea-Implantat (CI)-Systemen sehen für klinische Audiologen die Möglichkeit vor, die Mikrofonleistung der meisten aktuellen CI-Sprachprozessoren mittels anschließbarer Monitorkopfhörer zu prüfen. Nähere Angaben dazu, nach welchem Prozedere diese Prüfung stattfinden soll, z. B. welche Stimuli mit welchen Pegeln verwendet werden sollen, sind nach Wissen der Autoren seitens der CI-Hersteller nicht verfügbar. Auf der Basis dieser subjektiven Prüfung entscheidet dann der Audiologe, ob der betreffende Sprachprozessor an den Hersteller eingeschickt wird oder nicht. Wir haben eine Messbox entwickelt, mit der die Mikrofonleistung aller abhörbaren CI-Sprachprozessoren der Hersteller Advanced Bionics, Cochlear und MED-EL objektiv geprüft werden kann. Die Box wurde im 3-D-Druckverfahren hergestellt. Der zu prüfende Sprachprozessor wird in die Messbox eingehängt und über einen verbauten Lautsprecher mit definierten Prüfsignalen (Sinustönen unterschiedlicher Frequenz) beschallt. Das Signal des Mikronfons bzw. der Mikrofone wird über das in der Audio-/Abhörbuchse des Prozessors eingesteckte Kabel der Monitorkopfhörer herausgeführt und mit einer Shifting and Scaling-Schaltung in einen Spannungsbereich transformiert, der für die A/D-Wandlung mit einem Mikrokontroller (ATmega1280 verbaut auf einem Arduino Mega) geeignet ist. Derselbe Mikrokontroller übernimmt über einen eigens gebauten D/AWandler die Ausgabe der Prüfsignale über den Lautsprecher. Signalaufnahme und –wiedergabe erfolgt jeweils mit einer Samplingrate von 38,5 kHz. Der frequenzspezifische Effektivwert des abgegriffenen Mikrofonsignals wird mit einem Referenzwert verglichen. Die (frequenzspezifischen) Referenzwerte wurden mit einem neuwertigen Sprachprozessor gleichen Typs ermittelt und im Speicher des Mikrokontrollers abgelegt. Das Ergebnis wird nach Abschluss der Messung grafisch auf einem Touchscreen ausgegeben. Derzeit läuft eine erste Datenerhebung mit in der Klinik subjektiv auffällig gewordenen CI-Sprachprozessoren, die anschließend in der Messbox untersucht werden. Längerfristiges Ziel ist es, die hit und false alarm Raten der subjektiven Prüfung zu ermitteln.
Uncontrollable manufacturing variations in electrical hardware circuits can be exploited as Physical Unclonable Functions (PUFs). Herein, we present a Printed Electronics (PE)-based PUF system architecture. Our proposed Differential Circuit PUF (DiffC-PUF) is a hybrid system, combining silicon-based and PE-based electronic circuits. The novel approach of the DiffC-PUF architecture is to provide a specially designed real hardware system architecture, that enables the automatic readout of interchangeable printed DiffC-PUF core circuits. The silicon-based addressing and evaluation circuit supplies and controls the printed PUF core and ensures seamless integration into silicon-based smart systems. Major objectives of our work are interconnected applications for the Internet of Things (IoT).
Grundzüge der Strömungslehre
(2018)
Dieses ausgereifte Lehrbuch bringt in prägnant kurzer und mathematisch verständlicher Darstellung die strömungstechnischen Grundlagen. In der aktuellen Auflage wurde ein Abschnitt zu Dissipation und Viskosen Potentialströmungen ergänzt. Aufgaben mit Lösungen helfen den Lernstoff richtig anzuwenden und fördern das Verständnis.
Marketingrecht
(2018)
SWOT-Analyse
(2018)
Portfolio-Analyse
(2018)
Business Reengineering
(2018)
Einleitung
(2018)
Benchmarking
(2018)
Online-Marktforschung
(2018)
Social CRM
(2018)
No-Line Ansatz
(2018)
Einführender Überblick
(2018)
Social Media Controlling
(2018)
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
The CAN bus still is an important fieldbus in various domains, e.g. for in-car communication or automation applications. To counter security threats and concerns in such scenarios we design, implement, and evaluate the use of an end-to-end security concept based on the Transport Layer Security protocol. It is used to establish authenticated, integrity-checked, and confidential communication channels between field devices connected via CAN. Our performance measurements show that it is possible to use TLS at least for non time-critical applications, as well as for generic embedded networks.
Cell lifetime diagnostics and system be-havior of stationary LFP/graphite lithium-ion batteries
(2018)
Szenario-Technik
(2018)
Delphi-Technik
(2018)
Kundenbindung
(2018)
Kundenbindungscontrolling
(2018)
Das Standardlehrbuch zum internationalen Steuerrecht
Kenntnisse im internationalen Steuerrecht werden in der steuerlichen Ausbildung immer wichtiger. Mit dem „Wilke“ sichern Sie sich einen umfassenden und fundierten Einstieg in diese komplexe Materie.
Leicht verständlich und anschaulich vermittelt dieses Standardlehrbuch Ihnen alle relevanten Grundlagen des internationalen Steuerrechts. Der Aufbau des Buchs orientiert sich dabei sowohl an den Bedürfnissen der Ausbildung als auch denen der Praxis. Als idealer Begleiter unterstützt es Sie in jeder Phase Ihrer beruflichen Entwicklung – von den ersten Schritten in der Steuerberater-Ausbildung bis hin zur erfolgreich abgeschlossenen Weiterbildung zum Fachberater für Internationales Steuerrecht.
Die 14. Auflage berücksichtigt die Entwicklung auf dem Gebiet des internationalen Steuerrechts in Gesetzgebung, Rechtsprechung, Literatur und Verwaltung bis Ende Oktober 2018.
Rechtsstand: 1.11.2018
The authors claim that location information of stationary ICT components can never be unclassified. They describe how swarm-mapping crowd sourcing is used by Apple and Google to worldwide harvest geo-location information on wireless access points and mobile telecommunication systems' base stations to build up gigantic databases with very exclusive access rights. After having highlighted the known technical facts, in the speculative part of this article, the authors argue how this may impact cyber deterrence strategies of states and alliances understanding the cyberspace as another domain of geostrategic relevance. The states and alliances spectrum of activities due to the potential existence of such databases may range from geopolitical negotiations by institutions understanding international affairs as their core business, mitigation approaches at a technical level, over means of cyber deterrence-by-retaliation.
Dieser Beitrag stellt die Möglichkeiten des 3D-Druckes unter der Berücksichtigung von Mensch-Roboter-Kollaborations-Anforderungen dar. Dabei werden die Vorteile mit besonderem Fokus auf die zusätzliche Gestaltungsfreiheit erläutert. Anhand von Beispielen wird der Stand der Technik bereits eingesetzter Sensorik sowie deren Notwendigkeit in Greifsystemen erläutert. Im weiteren Verlauf dieses Beitrags werden allgemeine Verfahren für die additive Verarbeitung von leitfähigen Materialien vorgestellt. Daran angeknüpft sind Beispiele speziell zur 3D-gedruckten Sensorik. Abgerundet wird der Beitrag mit einem Ausblick bezüglich 3D-gedruckter Sensorik in MRK-Greifsystemen.
Kreditsicherungsrecht
(2018)
The Transport Layer Security (TLS) protocol is a cornerstone of secure network communication, not only for online banking, e-commerce, and social media, but also for industrial communication and cyber-physical systems. Unfortunately, implementing TLS correctly is very challenging, as becomes evident by considering the high frequency of bugfixes filed for many TLS implementations. Given the high significance of TLS, advancing the quality of implementations is a sustained pursuit. We strive to support these efforts by presenting a novel, response-distribution guided fuzzing algorithm for differential testing of black-box TLS implementations. Our algorithm generates highly diverse and mostly-valid TLS stimulation messages, which evoke more behavioral discrepancies in TLS server implementations than other algorithms. We evaluate our algorithm using 37 different TLS implementations and discuss―by means of a case study―how the resulting data allows to assess and improve not only implementations of TLS but also to identify underspecified corner cases. We introduce suspiciousness as a per-implementation metric of anomalous implementation behavior and find that more recent or bug-fixed implementations tend to have a lower suspiciousness score. Our contribution is complementary to existing tools and approaches in the area, and can help reveal implementation flaws and avoid regression. While being presented for TLS, we expect our algorithm's guidance scheme to be applicable and useful also in other contexts. Source code and data is made available for fellow researchers in order to stimulate discussions and invite others to benefit from and advance our work.
The Datagram Transport Layer Security (DTLS) protocol has been designed to provide end-to-end security over unreliable communication links. Where its connection establishment is concerned, DTLS copes with potential loss of protocol messages by implementing its own loss detection and retransmission scheme. However, the default scheme turns out to be suboptimal for links with high transmission error rates and low data rates, such as wireless links in electromagnetically harsh industrial environments. Therefore, in this paper, as a first step we provide an analysis of the standard DTLS handshake's performance under such adverse transmission conditions. Our studies are based on simulations that model message loss as the result of bit transmission errors. We consider several handshake variants, including endpoint authentication via pre-shared keys or certificates. As a second step, we propose and evaluate modifications to the way message loss is dealt with during the handshake, making DTLS deployable in situations which are prohibitive for default DTLS.
Colored glass products with various printing technologies are becoming more important in industry. The aim is to achieve individual solution in a very short delivery time. Conventional thermal treatment of burning glasses in oven for tempered color printing has predominant issues with high time consumption, energy consumption and manufacturing cost. It requires alternative process development.
This paper proposes laser process to overcome issues in conventional treatment with the latest results of tempering colored glass. Samples have been analyzed with the scanning electron microscope (SEM). Two different laser systems have been applied and the glass has been printed with black paste.
In this article, we present a taxonomy in Robot-Assisted Training; a growing body of research in Human–Robot Interaction which focuses on how robotic agents and devices can be used to enhance user’s performance during a cognitive or physical training task. Robot-Assisted Training systems have been successfully deployed to enhance the effects of a training session in various contexts, i.e., rehabilitation systems, educational environments, vocational settings, etc. The proposed taxonomy suggests a set of categories and parameters that can be used to characterize such systems, considering the current research trends and needs for the design, development and evaluation of Robot-Assisted Training systems. To this end, we review recent works and applications in Robot-Assisted Training systems, as well as related taxonomies in Human–Robot Interaction. The goal is to identify and discuss open challenges, highlighting the different aspects of a Robot-Assisted Training system, considering both robot perception and behavior control.
In public transportation, the motor pool often consists of various different vehicles bought over a duration of many years. Sometimes, they even differ within one batch bought at the same time. This poses a considerable challenge in the storage and allocation of spare parts, especially in the event of damage to a vehicle. Correctly assigning these parts before the vehicle reaches the workshop could significantly reduce both the downtime and, therefore, the actual costs for companies. In order to achieve this, the current software uses a simple probability calculation. To improve the performance, the data of specific companies was analysed, preprocessed and used with several modelling techniques to classify and, therefore, predict the spare parts to be used in the event of a faulty vehicle. We summarize our experience running through the steps of the Cross Industry Standard Process for Data Mining and compare the performance to the previously used probability. Gradient Boosting Trees turned out to be the best modeling technique for this special case.
This paper describes the use of the single-linkage hierarchical clustering method in outlier detection for manufactured metal work pieces. The main goal of the study is to group defects that occur 5 mm into a work piece from the edge, i.e., the border of the metal work piece. The goal is to remove defects outside the area of interest as outliers. According to the assumptions made for the performance criteria, the single-linkage method has achieved better results compared to other agglomeration methods.
Data Science gilt als eine der wichtigsten Entwicklungen der letzten
Jahre und viele Unternehmen sehen in Data Science die Möglichkeit,
ihre Daten zusätzlich wertschöpfend zu nutzen. Dabei kann es sich um
die Optimierung von Maintenance-Prozessen handeln, um eine bessere
Steuerung der eigenen Preis- und Lagerhaltungsstrategie oder auch
um völlig neue Services und Produkte, die durch Data Science möglich
werden. Die im Unternehmen vorliegenden Daten, an die so hohe Erwartungen
geknüpft wurden, sollen dazu genutzt werden, um Services
und Prozesse effizienter und passgenauer gestalten zu können. Vielfach
gilt Data Science dabei als Allheilmittel: Daten, die über Jahre hinweg
gesammelt wurden und mit zunehmender Geschwindigkeit und Heterogenität
anfallen, sollen endlich nutzbar gemacht werden. Zwar sind die
eingesetzten Techniken und Algorithmen teilweise schon zehn Jahre und
mehr alt, doch erst jetzt entfalten sie im Zusammenspiel mit Big Data
ihr Potenzial im Unternehmensumfeld. Die Erwartungen sind hoch, doch
der Weg zu den neuen Erkenntnissen ist mit hohem Aufwand verbunden
und wird von einigen Unternehmen noch immer unterschätzt.
Für Unternehmen mit einem traditionellen BI-Ansatz stellt Data Science
ein ergänzendes Set von Methoden und Werkzeugen dar, mit deren Hilfe
die Informationsversorgung der Entscheider auf den verschiedenen
hierarchischen Ebenen noch besser gestaltet werden kann. So zum Beispiel,
wenn man mit Data Science feststellt, dass die Wahrscheinlichkeit
für einen Versicherungsabschluss steigt, wenn bei der Auswahl der
anzusprechenden Kunden zusätzliche Daten herangezogen werden, die
zwar bereits vorliegen, aber noch nicht berücksichtigt worden sind. Im
Extremfall werden auch Entscheidungen vollständig automatisiert, die
bisher von Mitarbeiterinnen und Mitarbeitern getroffen wurden. Ein Algorithmus
legt dann fest, wann Ware nachbestellt oder welcher Preis für
den Endkunden festgesetzt wird.
Im vorliegenden E-Book soll ein Überblick über das Gebiet Data Science
gegeben werden. Dabei wird ein besonderes Augenmerk auf das Zusammenspiel
sowie das Mit- und Nebeneinander von Data Science und vorhandenen
BI-Systemen gelegt.
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.
Autonome Systeme im Consumerbereich - Was bedeutet die Autonomie technischer Systeme für den Kunden
(2018)
Optische Navigationssysteme weisen bisher eine eindeutige Trennung zwischen nachverfolgendem Gerät (Tool Tracker) und nachverfolgten Geräten (Tracked Tools) auf. In dieser Arbeit wird ein neues Konzept vorgestellt, dass diese Trennung aufhebt: Jedes Tracked Tool ist gleichzeitig auch Tool Tracker und besteht aus Marker-LEDs sowie mindestens einer Kamera, mit deren Hilfe andere Tracker in Lage und Orientierung nachverfolgt werden können. Bei Verwendung von nur einer Kamera geschieht dies mittels Pose Estimation, ab zwei Kameras werden die Marker-LEDs trianguliert. Diese Arbeit beinhaltet die Vorstellung des neuen Peer-To-Peer-Tracking-Konzepts, einen sehr schnellen Pose-Estimation-Algorithmus für beliebig viele Marker sowie die Klärung der Frage, ob die mit Pose Estimation erreichbare Genauigkeit vergleichbar mit der eines Stereo-Kamera-Systems ist und den Anforderungen an die chirurgische Navigation gerecht wird.
The production of potable water in dry areas nowadays is mainly done by the desalination of seawater. State of the art desalination plants usually are built with high production capacities and consume a lot of electrical energy or energy from primary resources such as oil. This causes difficulties in rural areas, where no infrastructure is available neither for the plants’ energy supply nor the distribution of the produced potable water. To address this need, small, self-sustaining and locally operated desalination plants came into the focus of research. In this work, a novel flash evaporator design is proposed which can be driven either by solar power or by low temperature waste heat. It offers low operation costs as well as easy maintenance. The results of an experimental setup operated with water at a feed flow rate of up to 1,600 l/h are presented. It is shown that the proof of concept regarding efficient evaporation as well as efficient gas-liquid separation is provided successfully. The experimental evaporation yield counts for 98 % of the vapor content that is expected from the vapor pressure curve of water. Neither measurements of the electrical conductivity of the gained condensate, nor the analysis of the vapor flow by optical methods show significant droplet entrainment, so there are no concerns regarding the purity of the produced condensate for the use as drinking water.
Entscheidungstechniken
(2018)
Der Beitrag befasst sich mit den Besonderheiten neuer Nutzungsarten bei der Einräumung von urheberrechtlichen Nutzungsrechten. Er legt außerdem einen Schwerpunkt auf die tatsächlichen Herausforderungen bei der Verhandlung solcher Rechtseinräumungen mit Unternehmen der Tech-Branche, die bei neuen Geschäftsmodellen oft über einen Wissensvorsprung verfügen.
Zum Handbuch der Musikwirtschaft: "In dem Standardwerk der Musikbranche geben 80 namhafte Autoren einen umfassenden Überblick über sämtliche Bereiche der deutschen Musikwirtschaft und ihrer Marktteilnehmer sowie über branchenspezifische Rechtsfragen und Vertragstypen. Unentbehrlich für alle, die im Musikbusiness tätig sind oder sich für diese Branche interessieren."
Membrane distillation (MD) is a thermal separation process which possesses a hydrophobic, microporous
membrane as vapor space. A high potential application for MD is the concentration of hypersaline brines, such as
e.g. reverse osmosis retentate or other saline effluents to be concentrated to a near saturation level with a Zero
Liquid Discharge process chain. In order to further commercialize MD for these target applications, adapted MD
module designs are required along with strategies for the mitigation of membrane wetting phenomena. This
work presents the experimental results of pilot operation with an adapted Air Gap Membrane Distillation
(AGMD) module for hypersaline brine concentration within a range of 0–240 g NaCl /kg solution. Key performance
indicators such as flux, GOR and thermal efficiency are analyzed. A new strategy for wetting mitigation
by active draining of the air gap channel by low pressure air blowing is tested and analyzed. Only small reductions
in flux and GOR of 1.2% and 4.1% respectively, are caused by air sparging into the air gap channel.
Wetting phenomena are significantly reduced by avoiding stagnant distillate in the air gap making the air blower
a seemingly worth- while additional system component.
Brand identification has the potential of shaping individuals' attitudes, performance and commitment within learning and work contexts. We explore these effects, by incorporating elements of branded identification within gamified environments. We report a study with 44 employees, in which task performance and emotional outcomes are assessed in a real-world assembly scenario - namely, while performing a soldering task. Our results indicate that brand identification has a direct impact on individuals' attitude towards the task at hand: while instigating positive emotions, aversion and reactance also arise.
A method for determining properties of a pipeline includes feeding a sound wave signal at a predetermined feed point into the pipeline so that the sound wave signal propagates in an axial direction of the pipeline. The frequency spectrum of the transmitted sound wave signal has a frequency component or a spectral range with a maximum frequency that is smaller than the lower limit frequency for the first upper mode. Reflected portions of the transmitted sound wave signal are detected as received sound wave signal and are evaluated with regard to the transmitted sound wave signal to determine at least the distance of each reflection site from the feed point.
In this paper we report on the commercial background as well as resulting high-level architecture and design of a cloud-based system for cryptographic software protection and licensing. This is based on the experiences and insights gained in the context of a real-world commercial R&D project at Wibu-Systems AG, a company that specialises in software encryption and licensing solutions.
With the need for automatic control based supervisory controllers for complex energy systems, comes the need for reduced order system models representing not only the non-linear behaviour of the components but also certain unknown process dynamics like their internal control logic. At the Institute of Energy Systems Technology in Offenburg we have built a real-life microscale trigeneration plant and present in this paper a rational modelling procedure that satisfies the necessary characteristics for models to be applied in model predictive control for grid-reactive optimal scheduling of this complex energy system. These models are validated against experimental data and the efficacy of the methodology is discussed. Their application in the future for the optimal scheduling problem is also briefly motivated.
Kernkompetenz-Management
(2018)
Cardiac contractility modulation (CCM) is a device-based therapy for the treatment of systolic left ventricular chronic heart failure. Unlike other device-based therapies for heart failure, CCM delivers non-excitatory pacing signals to the myocardium. This leads to an extension of the action potential and to an improved contractility of the heart. The modeling and simulation was done with the electromagnetic simulation software CST. Three CCM electrodes were inserted into the Offenburg heart rhythm model and subsequently simulated the electric field propagation in CCM therapy.
In addition, simulations of CCM have been performed with electrodes from other device-based therapies, such as cardiac resynchronization therapy (CRT) and implantable cardioverter / defibrillator (ICD) therapy. At the same distance to the simulation electrode, the electric field is slightly stronger in CCM therapy than in CCM therapy with additionally implanted CRT or ICD electrodes. In addition, there is a change in the electric field propagation at the electrodes of the CRT and the shock electrode of the ICD.
By simulating several different therapy procedures on the heart, it is possible to check how they affect their behavior during normal operation. CCM heart rhythm model simulation allows the evaluation the individual electrical pacing and sensing field during CCM.
Micro-cracks give rise to non-analytic behavior of the stress-strain relation. For the case of a homogeneous spatial distribution of aligned flat micro-cracks, the influence of this property of the stress-strain relation on harmonic generation is analyzed for Rayleigh waves and for acoustic wedge waves with the help of a simple micromechanical model adopted from the literature. For the efficiencies of harmonic generation of these guided waves, explicit expressions are derived in terms of the corresponding linear wave fields. The initial growth rates of the second harmonic, i.e., the acoustic nonlinearity parameter, has been evaluated numerically for steel as matrix material. The growth rate of the second harmonic of Rayleigh waves has also been determined for microcrack distributions with random orientation, using a model expression for the strain energy in terms of strain invariants known in a geophysical context.
For an elastic medium containing a homogeneous distribution of micro-cracks, an effective one-dimensional stress-strain relation has been determined with finite element simulations. In addition to flat micro-cracks, voids were considered that contain a Hertzian contact, which represents an example for micro-cracks with internal structure. The orientation of both types of micro-cracks was fully aligned or, for flat micro-cracks, totally random. For micro-cracks with Hertzian contacts, the case of random orientation was treated in an approximate way. The two types of defects were found to give rise to different degrees of non-analytic behavior of the effective stress-strain relation, which governs the nonlinear propagation of symmetric (S0) Lamb waves in the long-wavelength limit. The presence of flat micro-cracks causes even harmonics to grow linearly with propagation distance with amplitudes proportional to the amplitude of the fundamental wave, and gives rise to a static strain. The presence of the second type of defects leads to a linear growth of all harmonics with amplitudes proportional to the power 3/2 of the fundamental amplitude, and to a strain-dependent velocity shift. Simple expressions are given for the growth rates of higher harmonics of S0 Lamb waves in terms of the parameters occurring in the effective stress-strain relation. They have partly been determined quantitatively with the help of the FEM results for different micro-crack concentrations.
Frühwarnsysteme
(2018)
The paper describes the methodology and experimental results for revealing similarities in thermal dependencies of biases of accelerometers and gyroscopes from 250 inertial MEMS chips (MPU-9250). Temperature profiles were measured on an experimental setup with a Peltier element for temperature control. Classification of temperature curves was carried out with machine learning approach.
A perfect sensor should not have thermal dependency at all. Thus, only sensors inside the clusters with smaller dependency (smaller total temperature slopes) might be pre-selected for production of high accuracy inertial navigation modules. It was found that no unified thermal profile (“family” curve) exists for all sensors in a production batch. However, obviously, sensors might be grouped according to their parameters. Therefore, the temperature compensation profiles might be regressed for each group. 12 slope coefficients on 5 degrees temperature intervals from 0°C to +60°C were used as the features for the k-means++ clustering algorithm.
The minimum number of clusters for all sensors to be well separated from each other by bias thermal profiles in our case is 6. It was found by applying the elbow method. For each cluster a regression curve can be obtained.
A printed electronics technology has the advantage of additive and extremely low-cost fabrication compared with the conventional silicon technology. Specifically, printed electrolyte-gated field-effect transistors (EGFETs) are attractive for low-cost applications in the Internet-of-Things domain as they can operate at low supply voltages. In this paper, we propose an empirical dc model for EGFETs, which can describe the behavior of the EGFETs smoothly and accurately over all regimes. The proposed model, built by extending the Enz-Krummenacher-Vittoz model, can also be used to model process variations, which was not possible previously due to fixed parameters for near threshold regime. It offers a single model for all the operating regions of the transistors with only one equation for the drain current. Additionally, it models the transistors with a less number of parameters but higher accuracy compared with existing techniques. Measurement results from several fabricated EGFETs confirm that the proposed model can predict the I-V more accurately compared with the state-of-the-art models in all operating regions. Additionally, the measurements on the frequency of a fabricated ring oscillator are only 4.7% different from the simulation results based on the proposed model using values for the switching capacitances extracted from measurement data, which shows more than 2× improvement compared with the state-of-the-art model.
Among the various types of guided acoustic waves, acoustic wedge waves are non-diffractive and non-dispersive. Both properties make them susceptible to nonlinear effects. Investigations have recently been focused on effects of second-order nonlinearity in connection with anisotropy. The current status of these investigations is reviewed in the context of earlier work on nonlinear properties of two-dimensional guided acoustic waves, in particular surface waves. The role of weak dispersion, leading to solitary waves, is also discussed. For anti-symmetric flexural wedge waves propagating in isotropic media or in anisotropic media with reflection symmetry with respect to the wedge’s mid-plane, an evolution equation is derived that accounts for an effective third-order nonlinearity of acoustic wedge waves. For the kernel functions occurring in the nonlinear terms of this equation, expressions in terms of overlap integrals with Laguerre functions are provided, which allow for their quantitative numerical evaluation. First numerical results for the efficiency of third-harmonic generation of flexural wedge waves are presented.
In this paper, we establish a simple model for the exchange of messages in a vehicular network and we consider fundamental limits on the achievable data rate. For a vehicular network, the exchange of data with other nearby vehicles is particularly important for traffic safety, e.g. for collision avoidance, but also for cooperative applications like platooning. These use cases are currently addressed by standards building on IEEE 802.11p, namely ITS-G5 and DSRC (dedicated short range communication), which encounter saturation problems at high vehicle densities. For this reason, we take a step back and ask for the fundamental limits for the common data rate in a vehicular network. After defining a simple single-lane model and the corresponding capacity limits for some basic multiple- access schemes, we present results for a more realistic setting. For both scenarios, non-orthogonal multiple-access (NOMA) yields the best results.
In this paper, we present a frame synchronization method which consists of the non-orthogonal superposition of a synchronization sequence and the data. We derive the optimum detection criterion and compare it to the classical sequential concatenation of synchronization and data sequences. Computer simulations confirm the benefits of the non-orthogonal allocation for the case of short frames, which makes this technique particularly suited for the increasingly important regime of low latency and ultra- reliable communication.
Dieser technische Bericht stellt die Verwendung der Zuwendung und der erzielten Ergebnisse im Einzelnen dar. Die Gegenüberstellung mit den vorgegebenen Zielen erfolgt anhand der Beschreibung des Arbeitspakete. Die Verwendung der Zuwendung und Gegenüberstellung mit den vorgegebenen Zielen wird anhand der Arbeitspakete beschrieben, um den Abgleich zwischen Planung und durchgeführten Arbeiten unmittelbar darstellen zu können.
Online comment on: "Printing ferromagnetic domains for untethered fast-transforming soft materials"
(2018)
eLetter zu "Illusory movement perception improves motor control for prosthetic hands" von Paul D. Marasco et al., veröffentlicht in Science Translational Medicine, Vol. 10, No. 432 (DOI: 10.1126/scitranslmed.aao6990)
This paper evaluates the implementation of Medium Access Control (MAC) protocols suitable for massive access connectivity in 5G multi-service networks. The access protocol extends multi-packet detection receivers based on Physical Layer Network Coding (PLNC) decoding and Coded Random Access protocols considering practical aspects to implement one-stage MAC protocols for short packet communications in mMTC services. Extensions to enhance data delivery phase in two- stage protocols are also proposed. The assessment of the access protocols is extended under system level simulations where a suitable link to system interface characterization has been taken into account.
Recently, the demand for scalable, efficient and accurate Indoor Positioning Systems (IPS) has seen a rising trend due to their utility in providing Location Based Services (LBS). Visible Light Communication (VLC) based IPS designs, VLC-IPS, leverage Light Emitting Diodes (LEDs) in indoor environments for localization. Among VLC-based designs, Time Difference of Arrival (TDOA) based techniques are shown to provide very low errors in the relative position of receivers. Our considered system consists of five LEDs that act as transmitters and a single receiver (photodiode or image sensor in smart phone) whose position coordinates in an indoor environment are to be determined. As a performance criterion, Cramer Rao Lower Bound (CRLB) is derived for range estimations and the impact of various factors, such as, LED transmission frequency, position of reference LED light, and the number of LED lights, on localization accuracy has been studied. Simulation results show that depending on the optimal values of these factors, location estimation on the order of few centimeters can be realistically achieved.
Pulmonary vein isolation (PVI) is a common therapy in atrial fibrillation (AF). The cryoballoon was invented to isolate the pulmonary vein in one step and in a shorter time than a point-by-point radiofrequency (RF) ablation. The aim of the study was to model two cryoballoon catheters, one RF catheter and to integrate them into a heart rhythm model for the static and dynamic simulation of PVI by cryoablation and RF ablation in AF. The modeling and simulation were carried out using the electromagnetic and thermal simulation software CST (CST, Darmstadt). Two cryoballons and one RF ablation catheter were modeled based on the technical manuals of the manufacturers Medtronic and Osypka. The PVI especially the isolation of the left inferior pulmonary vein using a cryoballoon catheter was performed with a -50 °C heatsource and an exponential signal. The temperature at the balloon surface was -50 °C after 20 s ablation time, -24 °C from the balloon 0,5 mm in the myocardium, at a distance of 1 mm -3 °C, at 2 mm 18 °C and at a distance of 3mm 29 °C. PVI with RF energy was simulated with an applied power of 5 W at 420 kHz at the distal 8 mm ablation electrode. The temperature at the tip electrode was 110 °C after 15 s ablation time, 75 °C from the balloon at 0,5 mm in the myocardium, at a distance of 1 mm 58 °C, at 2 mm 45 °C and at a distance of 3 mm 38 °C. Virtual heart rhythm and catheter models as well as the simulation of the temperature allow the simulation of PVI in AF by cryo ablation and RF ablation. The 3D simulation of the temperature profile may be used to optimize RF and cryo ablation.
Real-Time Ethernet has become the major communication technology for modern automation and industrial control systems. On the one hand, this trend increases the need for an automation-friendly security solution, as such networks can no longer be considered sufficiently isolated. On the other hand, it shows that, despite diverging requirements, the domain of Operational Technology (OT) can derive advantage from high-volume technology of the Information Technology (IT) domain. Based on these two sides of the same coin, we study the challenges and prospects of approaches to communication security in real-time Ethernet automation systems. In order to capitalize the expertise aggregated in decades of research and development, we put a special focus on the reuse of well-established security technology from the IT domain. We argue that enhancing such technology to become automation-friendly is likely to result in more robust and secure designs than greenfield designs. Because of its widespread deployment and the (to this date) nonexistence of a consistent security architecture, we use PROFINET as a showcase of our considerations. Security requirements for this technology are defined and different well-known solutions are examined according their suitability for PROFINET. Based on these findings, we elaborate the necessary adaptions for the deployment on PROFINET.
Bank and trust – two words but one meaning in customers’ minds. When interacting with financial service providers, customers are consistently looking for “trust signals” that comfort their decisions and “distrust signals” which create doubt. Therefore, service providers need a deep understanding of the customers’ requirements and wishes. To identify trust and distrust signals, we combine established user experience research methods with a new testing procedure to gain helpful recommendations for optimizing the online appearance of banks. The contribution is divided into three parts: Firstly, we investigate current approaches in the financial service industry. Secondly, we provide a corpus describing the relationship between the customers’ perception of a bank’s website and trust. Thirdly, an empirical study based on qualitative user experience testing with banking website customers shows the value gained by optimizing the banks’ virtual interface by enhancing “trust signals” and avoiding “distrust signals”.
This paper is discussing the development of a wireless Indoor Smart Gardening System with the focus on energy autonomous working. The Smart Gardening System, which is presented in this paper consists of a network of energy autonomous wireless sensor nodes which are used for monitoring important plant parameters like air temperature, soil moisture, pressure or humidity and in future to control an actuator for the plant irrigation and to measure further parameter as light and fertilizer level. Solar energy harvesting is used for powering the wireless nodes without the usage of a battery. Comparable Smart Gardening Systems are usually battery-powered. Furthermore, the overall Smart Gardening System consists of a battery powered gateway based on a Raspberry Pi 3 system, which controls the wireless nodes and collects their sensor data. The gateway is able to send the information to an internet server application and via Wi-Fi to mobile devices. Particularly the architecture of the energy autonomous wireless nodes will be considered because fully energy autonomous wireless networks could not be implemented without special concepts for the energy supply and architecture of the wireless nodes.
We present a planar chromatographic separation method for the phytoestrogenic active compound equol, separated on RP-18 W (Merck, 1.14296) phase. It could be shown that an ethanolic cattle manure extract contains this phytoestrogenic active compound to a larger amount. As solvents for the mobile phase, hexane, ethyl acetate, and acetone (45:15:10, v/v); acetone and water (15:10, v/v); and n-hexane, CH2Cl2, ethyl acetate, methanol, and formic acid (40:40:20:5:1, v/v) have been used. After separation, a modified yeast estrogen screen (YES) test was applied, using the yeast strain Saccharomyces cerevisiae BJ3505 containing an estrogen receptor. Its activation by equol induces the reporter gene lacZ which encodes the enzyme β-galactosidase. The enzyme activity is measured directly on the TLC plate by using the substrate MUG (4-methylumbelliferyl-β-d-galactopyranoside) or the substrate X-β-Gal (5-bromo-4-chloro-3-indoxyl-β-d-galactopyranoside). β-Galactosidase cleaves MUG into a fluorescing compound. X-β- Gal is also hydrolyzed and then oxidized by oxygen forming the deep-blue dye 5,5′-dibromo-4,4′-dichloro-indigo. Both reactions in combination with a thin-layer chromatography (TLC) separation allow very specific detecting of equol in cattle manure, although that is a very challenging matrix. Preliminary results show that the average content of equol in liquid manure is roughly 60 μg g−1. The value for urine is 50 μg mL−1.
A Validated Quantification of Sudan Red Dyes in Spicery using TLC and a 16-bit Flatbed Scanner
(2018)
We present a video-densitometric quantification method for Sudan red dyes in spices and spice mixtures, separated by TLC. Application was done band-wise in small dots using a 5 μL glass pipette. For separation, the RP-18 plates (20 × 20 cm with fluorescent dye; Merck, Germany, 1.05559) were developed in a vertical developing chamber without vapor saturation from the starting point to a distance of 70 mm by using acetonitrile, methanol, and aqueous ammonia solution (25%; 8 + 1.8 + 0.2, v/v) as mobile phase. The quantification is based on direct measurements using an inexpensive 16-bit flatbed scanner for color measurements (in red, green, and blue). Evaluation of only the green channel makes the measurements very specific. For linearization, an extended Kubelka-Munk expression for data transformation was used. The range of linearity covers more than two magnitudes and lies between 20 and 500 ng. The extraction from a 2 g sample with acetonitrile, evaporation, and reconstitution to 200 μL with methanol and the band-wise application (7 mm) of a 10 μL sample allows a statistically defined LOD of less than 500 ppb of Sudan red dyes. To perform the analysis, a separation chamber, RP-18 plates, 5 μL glass pipettes, and a 16-bit flatbed scanner for 105 € are needed; therefore, the separation method is inexpensive, fast, and reliable.
Quantification of astaxanthin in salmons by chemiluminescence and absorption after TLC separation
(2018)
Astaxanthin is a keto-carotenoid, belongs to the chemical class of terpenes and is a yellow lipid soluble compound. The compound is present in marine animals like salmons and crustacean. Its colour is due to conjugated double bonds and these double bonds are responsible for its antioxidant effect. Its antioxidant activity is ten times stronger than other carotenoids and nearly 500 fold stronger than vitamin-E. We present a new thin layer chromatography (TLC) method to measure astaxanthin on TLC-plates (Merck, 1.05554) in the visible absorption range as well as by using chemiluminescence. For separation a solvent mixture of cyclohexane and acetone (10 + 2.4, v/v) was used. The RF-value of astaxanthin is 0.14.The limit of detection in vis-absorption is 64 ng / band and the limit of quantification is 92 ng/band. In chemiluminescence the values are 90 ng / band and 115 ng/band. The method offers two independently working measurement modes on a single plate which increase the accuracy of the quantification.
In this paper the yield surface of a recently presented microstructure-based volume element of the gray cast iron material GJL-250 is assessed after different plastic loading histories. The evolution of the yield surface is investigated for different volumetric, deviatoric and uniaxial loadings. The micromechanical material properties of the metallic matrix and the graphite inclusions are validated by means experimental stress-strain hysteresis loops. The metallic matrix is modeled as elastic-plastic with a non-linear kinematic hardening law. The graphite inclusions are described by means of a volumetric strain state dependent Young’s modulus. The results show that the shape of the yield surface does not change significantly in comparison to the initial yield surface after pure deviatoric loadings. After volumetric loadings, the dependence of the material on the Lode angle is significantly reduced. Uniaxial tensile preloadings result in a deformed yield surface, whereby the magnitude of the deformation depends on the applied load. Uniaxial preloadings to compression do not change the shape of the initial yield surface.