Doctoral Thesis
Refine
Document Type
- Doctoral Thesis (31) (remove)
Is part of the Bibliography
- yes (31)
Keywords
- Finite-Elemente-Methode (2)
- Implantat (2)
- Materialermüdung (2)
- Simulation (2)
- Ablationstherapie (1)
- Adaptive Steuerung (1)
- Algotithmus (1)
- Aluminiumgusslegierung (1)
- Aluminiumlegierung (1)
- Batterie (1)
Institute
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (12)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (5)
- Fakultät Wirtschaft (W) (4)
- INES - Institut für nachhaltige Energiesysteme (4)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (3)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (2)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (1)
- Fakultät Medien (M) (ab 22.04.2021) (1)
- IMLA - Institute for Machine Learning and Analytics (1)
- POIM - Peter Osypka Institute of Medical Engineering (1)
Open Access
- Open Access (21)
- Diamond (5)
- Bronze (4)
- Closed Access (4)
- Closed (3)
Клиновые акустические волны в твёрдом те-ле — это третий фундаментальный тип волн, после объёмных и поверхност-ных волн, импульсы которых распространяются без изменений своих форм (дисперсия отсутствует). Систему упругого клина можно получить из систе-мы упругого полупространства, “разрезав” его вдоль некоторой плоскости, а систему упругого полупространства можно получить из распределённой в пространстве упругой среды тем же методом, поэтому связи между поверх-ностными и объёмными волнами должны во многом повторяться при рас-смотрении клиновых и поверхностных волн. Например, существование быст-рых псевдоповерхностных волн в системе упругого полупространства, излу-чающих энергию при распространении в объёмные волны, имеет свой аналог и для системы упругого клина: совсем недавно были открыты псевдоклино-вые волны, излучающие как объёмные, так и поверхностные волны по мере своего распространения. С другой стороны, в этой же последовательности объёмных, поверхностных и клиновых волн должны выделяться и отличи-тельные особенности. Если поверхностные волны отличаются от объёмных волн тем, что они локализованы на двухмерной поверхности (объёмные вол-ны являются нелокализованными), то клиновые волны локализованы вдоль одномерной поверхности (линии) — кромки клина. Клиновые волны — это волноводные акустические волны, которые распространяются без дифракци-онных потерь, а также они не обладают дисперсией, поскольку в системе бесконечного упругого клина нет ни одного параметра размерности длины.
В заключении приведены основные результаты работы, которые со-стоят в следующем:
1. С помощью метода функций Лагерра была построена функция динами-ческого отклика на импульсный линейный источник (функция Грина) для задачи Лэмба в полупространстве, а также были изучены вопросы о сходимости и устойчивости данного построения. Было показано, что в предельном случае построенная функция динамического отклика совпа-дает с классической функцией Грина для этой задачи.
2. На основе результатов предыдущего пункта была построена функция Грина для упругого клина (и функция плотности состояния на кром-ке, совпадающая с диагональными компонентами функции Грина), с по-мощью которой удалось идентифицировать импульсы псевдоклиновых волн на экспериментальных кривых.
3. Для определённых клиновых конфигураций в анизотропных упругих средах (тетрагональных кристаллах) удалось получить критерий суще-ствования клиновых волн на основе характеристик поверхностных волн, распространяющихся на гранях исследуемых конфигураций, а также в некоторых случаях удалось классифицировать клиновые волны по типу симметрии.
4. Была разработана теория, описывающая формы импульсов клиновых волн при различных режимах генерации: абляционном и термоупругом.
5. Для клиновых волн была представлена нелинейная теория второго по-рядка. Были проведены численные расчёты функции ядра эволюцион-ного уравнения клиновых волн для кремниевых клиньев с одной гранью, совпадающей с поверхностью (111) (поверхность скола), и с произволь-ной ориентацией второй грани.
6. Были описаны фундаментальные отличия нелинейных линовых волн от нелинейных объёмных и поверхностных волн, а также было проведено численное моделирование эволюции импульса клиновых волн, которое показало соответствие теории эксперименту.
7. Получены решения солитонного типа для клиновых волн. Рассмотрены взаимодействия солитонов и свойства солитонного распада.
In diesem Buch erfolgt die Ausarbeitung eines im Sinne der kaufmännischen Rechnungslegung zweckadäquat ausgestalteten Hochschulrechnungswesens, das insbesondere auch hochschulspezifische Sachverhalte einer Lösung zuzuführen vermag.
Auf der Grundlage kaufmännischer Jahresabschlüsse aus unterschiedlichen Bundesländern werden zunächst bestehende Unterschiede in der Rechnungslegung der Hochschulen aufgezeigt. Im Hinblick auf Sinn und Zweck der kaufmännischen Rechnungslegung werden unterschiedliche Vorgehensweisen in einer vereinheitlichten Ausgestaltung zusammengefasst. In diesem Zusammenhang sind auch die Governance-Strukten im Steuerungsverhältnis zwischen den Bundesländern und den öffentlichen Hochschulen in der Entwicklung des Rechnungslegungssystems berücksichtigt.
Virtual-Reality
(2023)
Die Virtual-Reality (VR) Technologie ermöglicht Unternehmen eine Produktpräsentation, die weit über traditionelle Darstellungsmethoden hinausgeht. Obgleich die Integration der VR-Technologie für Unternehmen viele Chancen eröffnet, ist deren Einsatz auch mit Risiken verbunden. Insbesondere der Mangel an empirisch gesicherten Erkenntnissen zur Kundenakzeptanz, zu den Auswirkungen der Nutzung sowie zu Kannibalisierungseffekten ist ein wesentlicher Grund, der die Verbreitung von VR in der Kundenkommunikation noch hemmt. Das Buch adressiert diese Forschungslücken und identifiziert mittels eines nutzerzentrierten, quantitativen Forschungsdesigns konkrete Chancen und Risiken, die mit dem Einsatz von VR-Produktpräsentationen verbunden sind.
Emotionale Reaktionen von Nutzern auf Stimuli einer interaktiven Anwendung gelten als zentrale Indikatoren für positive oder negative User Experience. Oliver Gasts Untersuchung stellt ein Verfahren vor, das die Messung und Interpretation der Emotionen bei der Nutzung interaktiver Anwendungen ermöglicht. Denn der Erfolg von webbasierten Applikationen, wie z. B. Online-Shops, hängt in sehr hohem Maße von der Erfüllung der Erwartungen des einzelnen Nutzers ab. Mit den Ergebnissen seiner Untersuchung hat der Autor ein Modell erstellt und evaluiert, welches die relevanten Indikatoren für Mimik basierte Emotionsbewertung umfassend aufzeigt.
The last decades have seen the evolution of industrial production into more sophisticated processes. The development of specialized, high-end machines has increased the importance of predictive maintenance of mechanical systems to produce high-quality goods and avoid machine breakdowns. Predictive maintenance has two main objectives: to classify the current status of a machine component and to predict the maintenance interval by estimating its remaining useful life (RUL). Nowadays, both objectives are covered by machine learning and deep learning approaches and require large training datasets that are often not available. One possible solution may be transfer learning, where the knowledge of a larger dataset is transferred to a smaller one. This thesis is primarily concerned with transfer learning for predictive maintenance for fault classification and RUL estimation. The first part presents the state-of-the-art machine learning techniques with a focus on techniques applicable to predictive maintenance tasks (Chapter 2). This is followed by a presentation of the machine tool background and current research that applies the previously explained machine learning techniques to predictive maintenance tasks (Chapter 3). One novelty of this thesis is that it introduces a new intermediate domain that represents data by focusing on the relevant information to allow the data to be used on different domains without losing relevant information (Chapter 4). The proposed solution is optimized for rotating elements. Therefore, the presented intermediate domain creates different layers by focusing on the fault frequencies of the rotating elements. Another novelty of this thesis is its semi and unsupervised transfer learning-based fault classification approach for different component types under different process conditions (Chapter 5). It is based on the intermediate domain utilized by a convolutional neural network (CNN). In addition, a novel unsupervised transfer learning loss function is presented based on the maximum mean discrepancy (MMD), one of the state-of-the-art algorithms. It extends the MMD by considering the intermediate domain layers; therefore, it is called layered maximum mean discrepancy (LMMD). Another novelty is an RUL estimation transfer learning approach for different component types based on the data of accelerometers with low sampling rates (Chapter 6). It applies the feature extraction concepts of the classification approach: the presented intermediate domain and the convolutional layers. The features are then used as input for a long short-term memory (LSTM) network. The transfer learning is based on fixed feature extraction, where the trained convolutional layers are taken over. Only the LSTM network has to be trained again. The intermediate domain supports this transfer learning type, as it should be similar for different component types. In addition, it enables the practical usage of accelerometers with low sampling rates during transfer learning, which is an absolute novelty. All presented novelties are validated in detailed case studies using the example of bearings (Chapter 7). In doing so, their superiority over state-of-the-art approaches is demonstrated.
Die vorliegende Arbeit beschäftigt sich mit dem Ermüdungs- und Schädigungsverhalten der in Verbrennungsmotoren eingesetzten Aluminiumgusslegierungen AlSi7Cu0,5Mg-T7 und AlSi12Cu3Ni2Mg-T7. Im Vergleich zur niederzyklischen sowie thermomechanischen Ermüdungsbeanspruchung führt die zusätzliche Überlagerung hochzyklischer Belastungen zu einer signifikanten Lebensdauerreduktion, die mit der Replika-Technik beobachteten Beschleunigung des Kurzrisswachstums erklärt werden kann. Frakto- und metallographische Untersuchungen zeigen, dass Rissinitiierung und Lebensdauerverhalten durch Gussdefekte sowie von belastungs- und temperaturabhängigen Schädigungsmechanismen bestimmt werden. Die Lebensdauern werden mit einem mechanismenbasierten Risswachstumsmodell vorhergesagt. Dazu wird der Schädigungsparameter DTMF,brittle entwickelt, der die charakteristischen Schädigungsmechanismen berücksichtigt. Die Legierung AlSi12Cu3Ni2Mg-T7 wird abschließend mit der Finite-Elemente-Methode und mikrostrukturbasierten Zellmodellen untersucht. Mit den Simulationsergebnissen können die experimentell beobachteten Schädigungsmechanismen fundiert gestützt werden.
This thesis deals with the redesign of manufacturing systems by simulation and optimization. Material flow simulation is a common tool for solving problems in system design. Limitations are the high requirements in time and knowledge to execute simulation studies, evaluate results and solve design problems. New chances arrives with the technologies of industry 4.0 and the digital shadow, providing data for simulation. However, the methods to use production data for the redesign of production systems are not available yet. Purpose of this work is providing the methods to automate simulation from digital shadow, use simulation to optimize and solve problems in system design. Two case studies are used to support the action research approach of this work. The result of this work is a framework for the application of the digital shadow in optimization and problem-solving.
With this generation of devices, Virtual Reality (VR) has actually made it into the living rooms of end-users. These devices feature 6-DOF tracking, allowing them to move naturally in virtual worlds and experience them even more immersively. However, for a natural locomotion in the virtual, one needs a corresponding free space in the real environment. The available space is often limited, especially in everyday environments and under normal spatial conditions. Furnishings and objects of daily life can quickly become obstacles for VR users if they are not cleared away. Since the idea behind VR is to place users into a virtual world and to hide the real world as much as possible, invisible objects represent potential obstacles. The currently available systems offer only rudimentary assistance for this problem. If a user threatens to leave the space previously defined for use, a visual boundary is displayed to allow orientation within the space. These visual metaphors are intended to prevent users from leaving the safe area. However, there is no detection of potentially dangerous objects within this part of space. Objects that have not been cleared away or that have been added in the meantime may still become obstacles. This thesis shows how possible obstacles in the environment can be detected automatically with range imaging cameras and how users can be effectively warned about them in the virtual environment without significantly disturbing their sense of presence. Four different interactive visual metaphors are used to signalize the obstacles within the VE. With the help of a user study, the four signaling variants and the obstacle detection were evaluated and tested.
In the work at hand, we state that privacy and malleability of data are two aspects highly desired but not easy to associate. On the one hand, we are trying to shape data to make them usable and editable in an intelligible way, namely without losing their initial information. On the other hand, we are looking for effective privacy on data such that no external or non-authorized party could learn about their content. In such a way, we get overlapping requirements by pursuing different goals; it is trivial to be malleable without being secure, and vice versa. We propose four “real-world” use cases identified as scenarios where these two contradictory features are required and taking place in distinct environments. These considered backgrounds consist of firstly, cloud security auditing, then privacy of mobile network users and industry 4.0 and finally, privacy of COVID-19 tracing app users. After presenting useful background material, we propose to employ multiple approaches to design solutions to solve the use cases. We combine homomorphic encryption with searchable encryption and private information retrieval protocol to build an effective construction for the could auditing use case. As a second step, we develop an algorithm to generate the appropriate parameters to use the somewhat homomorphic encryption scheme by considering correctness, performance and security of the respective application. Finally, we propose an alternative use of Bloom filter data structure by adding an HMAC function to allow an outsourced third party to perform set relations in a private manner. By analyzing the overlapping bits occurring on Bloom filters while testing the inclusiveness or disjointness of the sets, we show how these functions maintain privacy and allow operations directly computed on the data structure. Then, we show how these constructions could be applied to the four selected use cases. Our obtained solutions have been implemented and we provide promising results that validate their efficiency and thus relevancy.
Modern society is more than ever striving for digital connectivity -- everywhere and at any time, giving rise to megatrends such as the Internet of Things (IoT). Already today, 'things' communicate and interact autonomously with each other and are managed in networks. In the future, people, data, and things will be interlinked, which is also referred to as the Internet of Everything (IoE). Billions of devices will be ubiquitously present in our everyday environment and are being connected over the Internet.
As an emerging technology, printed electronics (PE) is a key enabler for the IoE offering novel device types with free form factors, new materials, and a wide range of substrates that can be flexible, transparent, as well as biodegradable. Furthermore, PE enables new degrees of freedom in circuit customizability, cost-efficiency as well as large-area fabrication at the point of use.
These unique features of PE complement conventional silicon-based technologies. Additive manufacturing processes enable the realization of many envisioned applications such as smart objects, flexible displays, wearables in health care, green electronics, to name but a few.
From the perspective of the IoE, interconnecting billions of heterogeneous devices and systems is one of the major challenges to be solved. Complex high-performance devices interact with highly specialized lightweight electronic devices, such as e.g. smartphones and smart sensors. Data is often measured, stored, and shared continuously with neighboring devices or in the cloud. Thereby, the abundance of data being collected and processed raises privacy and security concerns.
Conventional cryptographic operations are typically based on deterministic algorithms requiring high circuit and system complexity, which makes them unsuitable for lightweight devices.
Many applications do exist, where strong cryptographic operations are not required, such as e.g. in device identification and authentication. Thereby, the security level mainly depends on the quality of the entropy source and the trustworthiness of the derived keys. Statistical properties such as the uniqueness of the keys are of great importance to precisely distinguish between single entities.
In the past decades, hardware-intrinsic security, particularly physically unclonable functions (PUFs), gained a lot of attraction to provide security features for IoT devices. PUFs use their inherent variations to derive device-specific unique identifiers, comparable to fingerprints in biometry.
The potentials of this technology include the use of a true source of randomness, on demand key derivation, as well as inherent key storage.
Combining these potentials with the unique features of PE technology opens up new opportunities to bring security to lightweight electronic devices and systems. Although PE is still far from being matured and from being as reliable as silicon technology, in this thesis we show that PE-based PUFs are promising candidates to provide key derivation suitable for device identification in the IoE.
Thereby, this thesis is primarily concerned with the development, investigation, and assessment of PE-based PUFs to provide security functionalities to resource constrained printed devices and systems.
As a first contribution of this thesis, we introduce the scalable PE-based Differential Circuit PUF (DiffC-PUF) design to provide secure keys to be used in security applications for resource constrained printed devices. The DiffC-PUF is designed as a hybrid system architecture incorporating silicon-based and inkjet-printed components. We develop an embedded PUF platform to enable large-scale characterization of silicon and printed PUF cores.
In the second contribution of this thesis, we fabricate silicon PUF cores based on discrete components and perform statistical tests under realistic operating conditions. A comprehensive experimental analysis on the PUF security metrics is carried out. The results show that the silicon-based DiffC-PUF exhibits nearly ideal values for the uniqueness and reliability metrics. Furthermore, the identification capabilities of the DiffC-PUF are investigated and it is shown that additional post-processing can further improve the quality of the identification system.
In the third contribution of this thesis, we firstly introduce an evaluation workflow to simulate PE-based DiffC-PUFs, also called hybrid PUFs. Hereof, we introduce a Python-based simulation environment to investigate the characteristics and variations of printed PUF cores based on Monte Carlo (MC) simulations. The simulation results show, that the security metrics to be expected from the fabricated devices are close to ideal at the best operating point.
Secondly, we employ fabricated printed PUF cores for statistical tests under varying operating conditions including variations in ambient temperature, relative humidity, and supply voltage. The evaluations of the uniqueness, bit aliasing, and uniformity metrics are in good agreement with the simulation results. The experimentally determined mean reliability value is relatively low, which can be explained by the missing passivation and encapsulation of the printed transistors. The investigation of the identification capabilities based on the raw PUF responses shows that the pure hybrid PUF is not suitable for cryptographic applications, but qualifies for device identification tasks.
The final contribution is to switch to the perspective of an attacker. To judge on the security capabilities of the hybrid PUF, a comprehensive security analysis in the manner of a cryptanalysis is performed. The analysis of the entropy of the hybrid PUF shows that its vulnerability against model-based attacks mainly depends on the selected challenge building method. Furthermore, an attack methodology is introduced to assess the performances of different mathematical cloning attacks on the basis of eavesdropped challenge-response pairs (CRPs). To clone the hybrid PUF, a sorting algorithm is introduced and compared with commonly used supervised machine learning (ML) classifiers including logistic regression (LR), random forest (RF), as well as multi-layer perceptron (MLP).
The results show that the hybrid PUF is vulnerable against model-based attacks. The sorting algorithm benefits from shorter training times compared to the ML algorithms. If the eavesdropped CRPs are erroneous, the ML algorithms outperform the sorting algorithm.