Refine
Year of publication
Document Type
- Conference Proceeding (628) (remove)
Language
- English (471)
- German (155)
- Multiple languages (1)
- Russian (1)
Has Fulltext
- no (628) (remove)
Keywords
- Gamification (9)
- Kommunikation (9)
- Assistive Technology (8)
- Produktion (8)
- Ausbildung (7)
- Design (6)
- Deafblindness (5)
- Eingebettetes System (5)
- Energieversorgung (5)
- Heart rhythm model (5)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (244)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (142)
- Fakultät Medien und Informationswesen (M+I) (95)
- Fakultät Betriebswirtschaft und Wirtschaftsingenieurwesen (B+W) (79)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (66)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (64)
- ACI - Affective and Cognitive Institute (27)
- INES - Institut für Energiesystemtechnik (25)
- Zentrale Einrichtungen (6)
- IaF - Institut für angewandte Forschung (5)
Real-Time Ethernet has become the major communication technology for modern automation and industrial control systems. On the one hand, this trend increases the need for an automation-friendly security solution, as such networks can no longer be considered sufficiently isolated. On the other hand, it shows that, despite diverging requirements, the domain of Operational Technology (OT) can derive advantage from high-volume technology of the Information Technology (IT) domain. Based on these two sides of the same coin, we study the challenges and prospects of approaches to communication security in real-time Ethernet automation systems. In order to capitalize the expertise aggregated in decades of research and development, we put a special focus on the reuse of well-established security technology from the IT domain. We argue that enhancing such technology to become automation-friendly is likely to result in more robust and secure designs than greenfield designs. Because of its widespread deployment and the (to this date) nonexistence of a consistent security architecture, we use PROFINET as a showcase of our considerations. Security requirements for this technology are defined and different well-known solutions are examined according their suitability for PROFINET. Based on these findings, we elaborate the necessary adaptions for the deployment on PROFINET.
Cell lifetime diagnostics and system be-havior of stationary LFP/graphite lithium-ion batteries
(2018)
Besides of conventional CAD systems, new, cloud-based CAD systems have also been available for some years. These CAD systems designed according to the principle of software as a service (SaaS) differ in some important features from the conventional CAD systems. Thus, these CAD systems are operated via a browser and it is not necessary to install the software on a computer. The CAD-data is stored in the cloud and not on a local computer or central server. This new approach should also facilitate the sharing and management of data. Finally, many of these new CAD systems are available as freeware for education purposes, so the universities can save license costs. This contribution examines newly developed, cloud-based CAD systems. In the context of a case study, the application of these new CAD systems are investigated in the training of engineers in design education. Thus, the students compare a conventional and a cloud-based CAD system as part of an exercise of designing and 3D modelling of a pinion shaft. Subsequently, the students manufacture a drawing with different views of the pinion shaft. This assessment evaluates different criteria such as user-friendliness, tutorial support and installation effort.
Well-designed and informative product presentations can support consumers in making purchase decisions. There are plenty of facts and details about a product of interest. However, also emotions are an important aspect for the purchase decision. The unique visualization opportunities of virtual reality (VR) can give users of VR applications the feeling of being there (telepresence). The applications can intensely engage them in a flow experience, comprising the four dimensions of enjoyment, curiosity, focused attention and control. In this work, we claim that VR product presentations can create subjective product experiences for consumers and motivate them to reuse this innovative type of product presentation in the future, by immersing them in a virtual world and causing them to interact with it. To verify the conceptual model a study was conducted with 551 participants who explored a VR hotel application. The results indicate that VR product presentations evoke positive emotions among consumers. The virtual experience made potential customers focus their attention on the virtual world and aroused their curiosity about getting more information about the product in an enjoyable way. In contrast to the theoretical assumption, control did not influence the users’ behavioral intentions to reuse VR product presentation. We conclude that VR product presentations create a feeling of telepresence, which leads to a flow experience that contributes to the behavioral intention of users to reuse VR product presentations in the future.
Introduction: To simplify AV delay (AVD) optimization in cardiac resynchronization therapy (CRT), we reported that the hemodynamically optimal AVD for VDD and DDD mode CRT pacing can be approximated by individually measuring implant-related interatrial conduction intervals (IACT) in oesophageal electrogram (LAE) and adding about 50ms. The programmer-based St Jude QuickOpt algorithm is utilizing this finding. By automatically measuring IACT in VDD operation, it predicts the sensed AVD by adding either 30ms or 60ms. Paced AVD is strictly 50ms longer than sensed AVD. As consequence of those variations, several studies identified distinct inaccuracies of QuickOpt. Therefore, we aimed to seek for better approaches to automate AVD optimization.
Methods: In a study of 35 heart failure patients (27m, 8f, age: 67±8y) with Insync III Marquis CRT-D systems we recorded telemetric electrograms between left ventricular electrode and superior vena cava shock coil (LVtip/SVC = LVCE) simultaneously with LAE. By LVCE we measured intervals As-Pe in VDD and Ap-Pe in DDD operation between right atrial sense-event (As) or atrial stimulus (Ap), resp., and end of the atrial activity (Pe). As-Pe and Ap-Pe were compared with As-LA an Ap-LA in LAE, respectively.
Results: End of the left atrial activity in LVCE could clearly be recognized in 35/35 patients in VDD and 29/35 patients in DDD operation. We found mean intervals As-LA of 40.2±24.5ms and Ap-LA of 124.3±20.6ms. As-Pe was 94.8±24.1ms and Ap-Pe was 181.1±17.8ms. Analyzing the sums of As-LA + 50ms with duration of As-Pe and Ap-LA + 50ms with duration of Ap-Pe, the differences were 4.7±9.2ms and 4.2±8.6ms, resp., only. Thus, hemodynamically optimal timing of the ventricular stimulus can be triggered by automatically detecting Pe in LVCE.
Conclusion: Based on minimal deviations between LAE and LVCE approach, we proposed companies to utilize the LVCE in order to automate individual AVD optimization in CRT pacing.
Covert- and side-channels as well as techniques to establish them in cloud computing are in focus of research for quite some time. However, not many concrete mitigation methods have been developed and even less have been adapted and concretely implemented by cloud providers. Thus, we recently conceptually proposed C 3 -Sched a CPU scheduling based approach to mitigate L2 cache covert-channels. Instead of flushing the cache on every context switch, we schedule trusted virtual machines to create noise which prevents potential covert-channels. Additionally, our approach aims on preserving performance by utilizing existing instead of artificial workload while reducing covert-channel related cache flushes to cases where not enough noise has been achieved. In this work we evaluate cache covert-channel mitigation and performance impact of our integration of C 3 -Sched in the XEN credit scheduler. Moreover, we compare it to naive solutions and more competitive approaches.