Refine
Year of publication
- 2015 (77) (remove)
Document Type
- Conference Proceeding (77) (remove)
Conference Type
- Konferenzartikel (63)
- Konferenz-Abstract (7)
- Konferenzband (3)
- Sonstiges (3)
- Konferenz-Poster (1)
Keywords
- Applikation (5)
- Kommunikation (5)
- Ausbildung (4)
- Funktechnik (3)
- Licht (3)
- Physik (3)
- Sicherheit (3)
- Abtragung (2)
- Alexander von Humboldt (2)
- Datensicherung (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (40)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (17)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (14)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (14)
- Fakultät Wirtschaft (W) (10)
- ACI - Affective and Cognitive Institute (7)
- WLRI - Work-Life Robotics Institute (5)
- INES - Institut für nachhaltige Energiesysteme (3)
- IUAS - Institute for Unmanned Aerial Systems (1)
- POIM - Peter Osypka Institute of Medical Engineering (1)
Open Access
- Closed Access (41)
- Open Access (34)
- Bronze (7)
- Diamond (1)
This paper presents a new approach for the teaching of competence in additive manufacturing to engineering students in product development. Particularly new to this approach is the combination of the students' autonomous assembly and commissioning of a 3D-printer, and the independent development of guidelines for this new technology regarding the design of components. This way the students will be able to gain first practical experiences with the data preparation, the additive manufacturing process itself and also the required post-treatment of the 3D-printed parts. To allow the students a significantly deeper insight into the functioning of 3D-printing, the workshop Rapid Prototyping developed a new approach in the course of which the students first assemble a construction kit for a 3D-printer themselves and then commission the printer. This enables the students to gain a better understanding of the functionality and configuration of additive manufacturing. In a next step, the students used the 3D-printers they constructed themselves to produce components which they take from a database. Finally, the experiences of the students in the course of the workshop will be evaluated to review the effectiveness of the new approach.
Application of Polymer Plaster Composites in Additive Manufacturing of High-Strength Components
(2015)
Today, 3D-printing with polymer plaster composites is a common method in Additive Manufacturing. This technique has proven to be especially suitable for the production of presentation models, due to the low cost of materials and the possibility to produce color-models. But nowadays it requires refinishing through the manual application of a layer of resin. However, the strength of these printed components is very limited, as the applied resin only penetrates a thin edge layer on the surface. This paper develops a new infiltration technique that allows for a significant increase in the strength of the 3D-printed component. For this process, the components are first dehydrated in a controlled two-tier procedure, before they are then penetrated with high-strength resin. The infiltrate used in this process differs significantly from materials traditionally used for infiltration. The result is an almost complete penetration of the components with high-strength infiltrate. As the whole process is computer-integrated, the results are also easier to reproduce, compared to manual infiltration. On the basis of extensive material testing with different testing specimen and testing methods, it can be demonstrated that a significant increase in strength and hardness can be achieved. Finally, this paper also considers the cost and energy consumption of this new infiltration method. As a result of this new technology, the scope of applicability of 3D-printing can be extended to cases that require significantly more strength, like the production of tools for the shaping of metals or used for the molding of plastics. Furthermore, both the process itself and the parameters used are monitored and can be optimized to individual requirements and different fields of application.
Ripple: Overview and Outlook
(2015)
Ripple is a payment system and a digital currency which evolved completely independently of Bitcoin. Although Ripple holds the second highest market cap after Bitcoin, there are surprisingly no studies which analyze the provisions of Ripple.
In this paper, we study the current deployment of the Ripple payment system. For that purpose, we overview the Ripple protocol and outline its security and privacy provisions in relation to the Bitcoin system. We also discuss the consensus protocol of Ripple. Contrary to the statement of the Ripple designers, we show that the current choice of parameters does not prevent the occurrence of forks in the system. To remedy this problem, we give a necessary and sufficient condition to prevent any fork in the system. Finally, we analyze the current usage patterns and trade dynamics in Ripple by extracting information from the Ripple global ledger. As far as we are aware, this is the first contribution which sheds light on the current deployment of the Ripple system.
Extended Performance Measurements of Scalable 6LoWPAN Networks in an Automated Physical Testbed
(2015)
IPv6 over Low power Wireless Personal Area Networks, also known as 6LoWPAN, is becoming more and more a de facto standard for such communications for the Internet of Things, be it in the field of home and building automation, of industrial and process automation, or of smart metering and environmental monitoring. For all of these applications, scalability is a major precondition, as the complexity of the networks continuously increase. To maintain this growing amount of connected nodes a various 6LoWPAN implementations are available. One of the mentioned was developed by the authors' team and was tested on an Automated Physical Testbed for Wireless Systems at the Laboratory Embedded Systems and Communication Electronics of Offenburg University of Applied Sciences, which allows the flexible setup and full control of arbitrary topologies. It also supports time-varying topologies and thus helps to measure performance of the RPL implementation. The results of the measurements prove an excellent stability and a very good short and long-term performance also under dynamic conditions. In all measurements, there is an advantage of minimum 10% with regard to the average times, like global repair time; but the advantage with reagr to average values can reach up to 30%. Moreover, it can be proven that the performance predictions from other papers are consistent with the executed real-life implementations.
The overview of public key infrastructure based security approaches for vehicular communications
(2015)
Modern transport infrastructure becomes a full member of globally connected network. Leading vehicle manufacturers have already triggered development process, output of which will open a new horizon of possibilities for consumers and developers by providing a new communication entity - a car, thus enabling Car2X communications. Nevertheless some of available systems already provide certain possibilities for vehicles to communicate, most of them are considered not sufficiently secured. During last 15 years a number of big research projects funded by European Union and USA governments were started and concluded after which a set of standards were published prescribing a common architecture for Car2X and vehicles onboard communications. This work concentrates on combining inner and outer vehicular communications together with a use of Public Key Infrastructure (PKI).
Additive Manufacturing and Reverse Engineering have increasingly been gaining in importance over the past years. This paper investigates the current status of the implementation of these new technologies in design education and also identifies current shortcomings. Then it develops two new approaches for the teaching of the necessary expertise for the design of 3D-printed components and illustrates these with case studies. First, a workshop is presented in which students gain a broad understanding for the functionalities of additive manufacturing and the creative possibilities and limits of this process, through the assembly and installation of a 3D-printer. A second new approach is the combination of reverse engineering and 3D-printing. Thereby, students learn how to deal with this complex process chain. The result of these new approaches can e.g. be seen in the design guidelines for Additive Manufacturing, which were developed by the students themselves. At the same time, the students are able to estimate opportunities and limits of both technologies. Finally, the success of the new course contents and form is reviewed by an evaluation by the students.
The aim of this research work was to develop a boiler model with few parameters required for energy planning. The showcase considered for this work was the boiler system of the energy center at Offenburg University of Applied Sciences. A grey box model of the boiler was developed systematically starting from model abstraction, simplification, model break-down and to the use of empirical correlations wherever necessary to describe the intermediate effects along with the use of information from manufacturer’s specification in order to reduce parameters. This strategy had resulted in a boiler model with only 6 parameters, namely, nominal burner capacity, water gallery capacity, air ratio, heat capacity of wall, thermal conductance on flue gas and hot water side. Most of these parameters can be obtained through the information available in the spec sheets and thus an energy planner will be able to parameterize the model with low effort. The model was validated with the monitored data of the showcase. It was tested for the start-up, shut-down behavior and the effect of storage.
Der Studienbeginn wird an der Hochschule Offenburg durch Vorbereitungskurse, sogenannte Brückenkurse, unterstützt. Wir stellen vorläufige Ergebnisse beim Einsatz von Smartphones und Tablets im Rahmen des Physik-Brückenkurses vor, bei dem die Studenten Hilfen zum selbständigen Üben durch eine App erhalten. Durch die Überarbeitung des Kurses und den Einsatz der App konnte der Teilnehmerschwund verringert werden. Die Evaluationsergebnisse bestätigen eine hohe Akzeptanz der Neuerungen seitens der Studierenden. Erste Auswertungen von Ein- und Ausgangstests deuten darauf hin, dass durch den Brückenkurs eine Angleichung der Vorkenntnisse der Studienanfänger erreicht wird, da Teilnehmer mit geringeren Vorkenntnissen tendenziell einen größeren Lernfortschritt erreichen. Durch unterschiedliche Schwierigkeitsstufen und selbstregulierte Übungsphasen in individuellem Tempo können aber auch die Erfordernisse der stärkeren Teilnehmer angemessen berücksichtigt werden.
The United Nations have declared 2015 as the International Year of Light (IYL2015) and light-based technologies [1]. As a main result, the public interest is focused on both the achievements and the new frontiers of optics and photonics. This opens up new perspectives in the teaching and training of optics and photonics. In the first part of the paper, the author presents the numerous anniversaries occurring in the International Year of Light 2015 together with their importance to the development of science and technology. In the second part, we report on an interactive video projection at the opening ceremony of the IYL2015 in Paris on January 19-20, 2015. Students of Offenburg University have established an interactive video projection which visualizes Twitter and Facebook messages posted with the hashtag #iyl2015 in a mapping technique. Thus, the worldwide community can be interactively part of the opening ceremony. Finally, upcoming global community projects related to optics and astronomy events are presented.
We propose secure multi-party computation techniques for the distributed computation of the average using a privacy-preserving extension of gossip algorithms. While recently there has been mainly research on the side of gossip algorithms (GA) for data aggregation itself, to the best of our knowledge, the aforementioned research line does not take into consideration the privacy of the entities involved. More concretely, it is our objective to not reveal a node's private input value to any other node in the network, while still computing the average in a fully-decentralized fashion. Not revealing in our setting means that an attacker gains only minor advantage when guessing a node's private input value. We precisely quantify an attacker's advantage when guessing - as a mean for the level of data privacy leakage of a node's contribution. Our results show that by perturbing the input values of each participating node with pseudo-random noise with appropriate statistical properties (i) only a minor and configurable leakage of private information is revealed, by at the same time (ii) providing a good average approximation at each node. Our approach can be applied to a decentralized prosumer market, in which participants act as energy consumers or producers or both, referred to as prosumers.
Sowohl Angebot als auch Nachfrage nach Videos mit Lehrinhalt verzeichnen aktuell ein nahezu explosionsartiges Wachstum; MOOCs machen dabei jedoch nur einen geringen Anteil aus. Während Studierende einen positiven Effekt von Lehrvideos auf den eigenen Lernerfolg wahrnehmen, ist dieser bei objektiver Prüfung jedoch oft nicht nachweisbar. Für Dozenten eröffnet dies ein Spannungsfeld, für dessen Lösung dieser Beitrag die im Selbstversuch erprobte Möglichkeit der Produktion von Kurzvideos und deren Veröffentlichung auf YouTube vorstellt.
Eye-Tracking-Analyse des Betrachtungsverhaltens bei Micro-Präsentationen in der CAE-Ausbildung
(2015)
Die Zielsetzung des vorliegenden Beitrags ergibt sich aus der persönlichen Motivation der Autoren, das visuelle Verhalten und das Handeln vom jungen Ingenieur beim Micro-Präsentieren technischer Inhalte und Lösungsergebnisse in bildlicher und begrifflicher Form besser zu verstehen und somit effizienter unterstützen zu können. Dabei wurden mehrere Einzelpersonen aus dem Studiengang des Maschinenbaus der Hochschule Offenburg mit Hilfe der Eye-Tracking-Technick beobachtet. Die Probanden befinden sich im 6. Semester, sind im Alter von 21 bis 24 Jahren und zeichnen sich durch einen einheitlichen Ausbildungsstand aus. Die Versuchszeit für die Präsentation der Aufgabe betrug 100 Sekunden. Die Analyse der gewonnenen Daten dieser empirischen Laboruntersuchung erlaubt erste Einblicke in die visuelle Wahrnehmung technischer Objekte beim Vortragen.
Der hier vorliegende Beitrag beschreibt erste Untersuchungsergebnisse mit der Finite-Elemente-Methode (FEM) zur Entlastung der Kerbspannungen an Getriebewellen mit Durchdringungskerben. Es handelt sich bei den Kerben um eine Umlaufnut mit überlagerter Querbohrung und um einen Wellenabsatz mit überlagerter Querbohrung. Die neu entwickelte Entlastungskerbe erweitert die üblichen Möglichkeiten zur Entlastung von Durchdringungskerben und ermöglicht bedeutende Spannungsreduktionen bis etwa 48% bei Biegung oder Zug/Druck. Die Entlastung bei Torsionsbelastung beträgt maximal etwa 18%. Es wurden Spannungsdiagramme der variierten Entlastungsnutparameter erstellt und Formeln zur näherungsweisen Berechnung der zu erwartenden Spannungen in der Durchdringungskerbe und in der Entlastungsnut ermittelt, zudem werden Empfehlungen zur Gestaltung der Entlastungskerbe gegeben. Dieser Beitrag bietet eine Grundlage zur weiteren Untersuchung zum Thema „räumliche Durchdringungskerben“ und deren Entlastung.
Theoretical details about optics and photonics are not common knowledge nowadays. Physicists are keen to scientifically explain ‘light,’ which has a huge impact on our lives. It is necessary to examine it from multiple perspectives and to make the knowledge accessible to the public in an interdisciplinary, scientifically well-grounded and appealing medial way. To allow an information exchange on a global scale, our project “Invisible Light” establishes a worldwide accessible platform. Its contents will not be created by a single instance, but user-generated, with the help of the global community. The article describes the infotainment portal “Invisible Light,” which stores scientific articles about light and photonics and makes them accessible worldwide. All articles are tagged with geo-coordinates, so they can be clearly identified and localized. A smartphone application is used for visualization, transmitting the information to users in real time by means of an augmented reality application. Scientific information is made accessible for a broad audience and in an attractive manner.
Skills, abilities and capability of our freshmen are increasingly heterogeneous, regarding age, attained levels of education and motivational aspects. Additionally, students tend to recoil from subjects dealing with mathematical backgrounds. As a result high, drop-out numbers are a huge problem in technical degree programs.
Since mechanics is based on physics and mathematics our students face enormous difficulties. To deal with them, a form of teaching and learning has been developed that is composed of the following arrangements:
1. Problems and tasks of different levels are solved during lessons. The access to theoretical issues is being developed by or rather as a result of solving these problems. By doing so, especially students with yet insufficient skills are enabled to develop their methodological skills.
2. Challenging students to independently transfer these skills on other problems is helpful. At the end of each lecture two students are selected randomly. Each of them is faced with an exercise they have to solve and present at the beginning of the next lecture. Because of small student numbers, chances are high that every student participates at least once by the end of semester. Surveys show that particularly weaker students benefit from that kind of model learning.
3. We are surrounded by mechanical issues. Given that, students are presented with “every-day-life” problems which students can apply their theoretical knowledge on. The problems are analyzed by groups of students, which leads to an enhanced and reflective perception of each and every one. Some examples are: “A broomstick in equilibrium”, “Sensitive cups”, “Transforming a roman basilica into a gothic cathedral”.
4. All lectures have been filmed by the staff of the Information Center of the Offenburg University during the previous term. Additionally to the notes taken by the students individually during the lectures, these recordings are helpful in the process of preparation and post-processing of the material. The recordings are accessible via the university’s learning management system “Moodle”.
Surveys show that students benefit from the great variety of the provided, interactive learning arrangements. It is interesting to discover that students not only take positive advantages in the lecture “mechanics 1/statics” but tend to transfer these positive experiences on other subjects.
In this paper an RFID/NFC (ISO 15693 standard) based inductively powered passive SoC (system on chip) for biomedical applications is presented. A brief overview of the system design, layout techniques and verification method is dis-cussed here. The SoC includes an integrated 32 bit microcontroller, sensor interface circuit, analog to digital converter, integrated RAM, ROM and some other peripherals required for the complete passive operation. The entire chip is realized in CMOS 0.18 μm technology with a chip area of 1.52mm x 3.24 mm.
Cardiac resynchronization therapy (CRT) is an established biventricular pacing therapy in heart failure patients with left bundle branch block and reduced left ventricular ejection fraction, but not all patients improved clinically as CRT responder. Purpose of the study was to evaluate electrical left atrial conduction delay (LACD) with focused transesophageal electrocardiography in CRT responder and CRT non-responder.
Methods: Twenty heart failure patients (age 66.6±8.2 years; 2 females, 18 males) with New York Heart Association functional class 3.0±0.3 and 174.2±40.2ms QRS duration were analysed using posterior left atrial transesophageal electrocardiography with hemispherical electrodes. Electrical LACD was measured between onset and offset of transesophageal left atrial signal before implantation of CRT devices.
Results: Electrical LACD could be evaluated by bipolar transesophageal left atrial electrocardiography using TO Osypka electrode in all heart failure patients with negative correlation between 54.7±18.1ms LACD and 24.9±6.4% left ventricular ejection fraction (r=-0.65, P=0.002). There were 16 CRT responders with reduction of New York Heart Association functional class from 3.0±0.29 to 2.1±0.2 (r=0.522, P=0.038) during 9.41±10.96 month biventricular pacing and negative correlation between 49.6±14.2ms LACD and 26.0±6.2% left ventricular ejection fraction (r=-0.533, P=0.034). There were 4 CRT non-responders with no reduction of New York Heart Association functional class from 3.0±0.4 to 2.8±0.5 (r=0.816, P=0.184) during with 13.88±16.39 month biventricular pacing and no correlation between 75.25±19.17ms LACD and 20.75±6.4% left ventricular ejection fraction (r=-0.831, P=0.169).
Conclusions: Focused transesophageal left atrial electrocardiography can be utilized to analyse electrical LACD in heart failure patients. LACD correlated negative with left ventricular ejection fraction in CRT responders. LACD may be a useful parameter to evaluate electrical left atrial desynchronization in heart failure patients.
Cardiac resynchronization therapy (CRT) is an established class I level A biventricular pacing therapy in chronic heart failure patients with left bundle branch block and reduced left ventricular ejection fraction, but not all patients improved clinically. Purpose of the study was to evaluate electrical interatrial conduction delay (IACD) to interventricular conduction delay (IVCD) ratio with focused transesophageal left atrial and left ventricular electrocardiography.
Methods: Thirty eight chronic heart failure patients (age 63.4±10.2 years; 3 females, 35 males) with New York Heart Association (NYHA) functional class 3.0±0.2 and 171.71±36.17ms QRS duration were analysed using posterior left atrial and left ventricular transesophageal electrocardiography with hemispherical electrodes before CRT. Electrical IACD was measured between onset of P-wave in the surface ECG and onset of left atrial signal. Electrical IVCD was measured between onset of QRS complex in the surface ECG and onset of left ventricular signal.
Results: Electrical IACD and IVCD could be evaluated by transesophageal left atrial and left ventricular electrocardiography in all heart failure patients with correlation to 1.18±0.92 IACD-IVCD-ratio (r=-0.57, P<0.001; r=0.66, P<0.001). There were 32 CRT responder with reduction of NYHA class from 3.0±0.22 to 1.97±0.31 (P<0.001) during 16.5±18.9 month CRT with 75.19±33.49ms IACD, 78.91±24.73ms IVCD, 1.04±0.66 IACD-IVCD-ratio and correlation between IACD and IACDIVCD- ratio (r=0.84, P<0.001). There were 6 CRT nonresponder with no reduction of NYHA class from 3.0±0.3 to 2.9±0.5 during 14.3±13.7 month biventricular pacing, 50.0±28.26ms IVCD (P=0.014), 1.92±1.65 IACD-IVCD-ratio (P=0,029) and correlation between 67.0±24.9ms IACD and IACD-IVCD-ratio (r=0.85, P=0.031).
Conclusions: Focused transesophageal left atrial and left ventricular electrocardiography can be utilized to analyse electrical IACD and IVCD in heart failure patients. IACDIVDC- ratio may be a useful parameter to evaluate electrical left cardiac desynchronization in heart failure patients.
Soccer simulation league is one of the founding leagues of RoboCup. In this paper we discuss the past, present and planned future achievements and changes. Also we summarize the connections and inter-league achievements of this league and provide an overview of the community contributions that made this league successful.
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit (ALU) as well as the L1 and L2 cache which enables establishing multiple covert channels. Even virtualization which is known for its isolation of multiple machines is prone to covert and side-channel attacks due to the sharing of resources. Therefore itis not surprising that cloud computing is not immune to this kind of attacks. Even more, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of unwanted communication. In such a setting the ”air gap” between physical servers and networks disappears and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand we will provide a survey on weak spots an adversary trying to exfiltrate private data from target virtual machines could exploit in a cloud environment. We will evaluate the feasibility of example attacks and point out possible mitigation solutions if they exist.