Refine
Year of publication
- 2018 (79) (remove)
Document Type
- Conference Proceeding (79) (remove)
Conference Type
- Konferenzartikel (59)
- Konferenz-Abstract (14)
- Konferenz-Poster (3)
- Sonstiges (3)
Has Fulltext
- no (79) (remove)
Is part of the Bibliography
- yes (79)
Keywords
- RoboCup (3)
- 5G mobile communication (2)
- Access protocols (2)
- Decoding (2)
- Gamification (2)
- Multiuser detection (2)
- Payloads (2)
- Physical layer (2)
- access protocols (2)
- decoding (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (35)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (19)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (13)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (11)
- Fakultät Wirtschaft (W) (10)
- INES - Institut für nachhaltige Energiesysteme (7)
- ACI - Affective and Cognitive Institute (4)
- WLRI - Work-Life Robotics Institute (2)
- CRT - Campus Research & Transfer (1)
- Zentrale Einrichtungen (1)
Open Access
- Closed Access (42)
- Open Access (31)
- Closed (6)
- Bronze (3)
This paper describes the Sweaty II humanoid adult size robot trying to qualify for the RoboCup 2018 adult size humanoid competition. Sweaty came 2nd in RoboCup 2017 adult size league. The main characteristics of Sweaty are described in the Team Description Paper 2017. The improvements that have been made or are planned to be implemented for RoboCup 2018 are described in this paper.
A Nonlinear FEM Model to Calculate Third-Order Harmonic and Intermodulation in TC-SAW Devices
(2018)
Nonlinearities in Temperature Compensated SAW (TC-SAW) devices in the 2 GHz range are investigated using a nonlinear finite element model by simultaneously considering both third-order intermodulation distortion (IMD3)and third harmonic (H3). In the employed perturbation approach, different contributions to the total H3, the direct and indirect contribution, are discussed. H3 and IMD3 measurements were fitted simultaneously using scaling factors for SiO 2 film and Cu electrode nonlinear material tensors in TC-SAW devices. We employ a P-Matrix simulation as intermediate step: Firstly, measurement and nonlinear P-Matrix calculations for finite devices are compared and coefficients of the P-Matrix simulation are determined. The nonlinear tensor data of the different materials involved in periodic nonlinear finite element method (FEM) computations are optimized to fit periodic P-Matrix calculations by introducing scaling factors. Thus, the contribution of different materials to the nonlinear behavior of TC-SAW devices is obtained and the role of materials is discussed.
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.
Existing ultrasonic stress evaluation methods utilize the acoustoelastic effect for bulk waves propagating in volume, which is unsuitable for a surface treated material, possessing a significant variation in material properties with depth. With knowledge of nonlinear elastic parameters – third-order elastic constants (TOEC) close to the surface of the sample, the acoustoelastic effect might be used with surface acoustic waves. This work is focused on the development of an independent method of TOEC measurement using the effect of nonlinear surface acoustic waves scattering – i.e. the effect of elastic waves interaction in a nonlinear medium.
In this paper, the possible three wave interactions of surface guided waves and bulk waves are described and formulae for the efficiency of harmonic generation and mode mixing are derived. A comparison of the efficiency of surface waves scattering in an isotropic medium for different interaction types is carried out with the help of nonlinear perturbation theory. First results for surface and bulk wave mixing with known second- and third-order elastic constants are shown.
In this paper, we establish a simple model for the exchange of messages in a vehicular network and we consider fundamental limits on the achievable data rate. For a vehicular network, the exchange of data with other nearby vehicles is particularly important for traffic safety, e.g. for collision avoidance, but also for cooperative applications like platooning. These use cases are currently addressed by standards building on IEEE 802.11p, namely ITS-G5 and DSRC (dedicated short range communication), which encounter saturation problems at high vehicle densities. For this reason, we take a step back and ask for the fundamental limits for the common data rate in a vehicular network. After defining a simple single-lane model and the corresponding capacity limits for some basic multiple- access schemes, we present results for a more realistic setting. For both scenarios, non-orthogonal multiple-access (NOMA) yields the best results.
This paper evaluates the implementation of Medium Access Control (MAC) protocols suitable for massive access connectivity in 5G multi-service networks. The access protocol extends multi-packet detection receivers based on Physical Layer Network Coding (PLNC) decoding and Coded Random Access protocols considering practical aspects to implement one-stage MAC protocols for short packet communications in mMTC services. Extensions to enhance data delivery phase in two- stage protocols are also proposed. The assessment of the access protocols is extended under system level simulations where a suitable link to system interface characterization has been taken into account.
This paper is discussing the development of a wireless Indoor Smart Gardening System with the focus on energy autonomous working. The Smart Gardening System, which is presented in this paper consists of a network of energy autonomous wireless sensor nodes which are used for monitoring important plant parameters like air temperature, soil moisture, pressure or humidity and in future to control an actuator for the plant irrigation and to measure further parameter as light and fertilizer level. Solar energy harvesting is used for powering the wireless nodes without the usage of a battery. Comparable Smart Gardening Systems are usually battery-powered. Furthermore, the overall Smart Gardening System consists of a battery powered gateway based on a Raspberry Pi 3 system, which controls the wireless nodes and collects their sensor data. The gateway is able to send the information to an internet server application and via Wi-Fi to mobile devices. Particularly the architecture of the energy autonomous wireless nodes will be considered because fully energy autonomous wireless networks could not be implemented without special concepts for the energy supply and architecture of the wireless nodes.
The economic dispatch (ED) problem is a large-scale optimization problem in electricity power grids. Its goal is to find a power output combination of all generator nodes that meet the demand of the customers at minimum operating cost. In recent years, distributed protocols have been proposed to replace the traditional centralized ED calculation for modern smart grid infrastructures with the most realistic being the one proposed by Binetti et al. (2014). However, we show that this protocol leaks private information of the generator nodes. We then propose a privacy-preserving distributed protocol that solves the ED problem. We analyze the security of our protocol and give experimental results from a prototype implementation to show the feasibility of the solution.
Optische Navigationssysteme weisen bisher eine eindeutige Trennung zwischen nachverfolgendem Gerät (Tool Tracker) und nachverfolgten Geräten (Tracked Tools) auf. In dieser Arbeit wird ein neues Konzept vorgestellt, dass diese Trennung aufhebt: Jedes Tracked Tool ist gleichzeitig auch Tool Tracker und besteht aus Marker-LEDs sowie mindestens einer Kamera, mit deren Hilfe andere Tracker in Lage und Orientierung nachverfolgt werden können. Bei Verwendung von nur einer Kamera geschieht dies mittels Pose Estimation, ab zwei Kameras werden die Marker-LEDs trianguliert. Diese Arbeit beinhaltet die Vorstellung des neuen Peer-To-Peer-Tracking-Konzepts, einen sehr schnellen Pose-Estimation-Algorithmus für beliebig viele Marker sowie die Klärung der Frage, ob die mit Pose Estimation erreichbare Genauigkeit vergleichbar mit der eines Stereo-Kamera-Systems ist und den Anforderungen an die chirurgische Navigation gerecht wird.